Herein, the solvent costing method was used to prepare the chitosan/poly vinyl alcohol (CS/PVA) nanocomposite films and the properties of structural, vibrational, optical, thermal and electrochemical of these films have been reported. XRD and SEM were confirmed the presence of CS in PVA matrix. The vibrational properties and functional group assignment were studied. The thermal stability and electrochemical properties of chitosan/poly vinyl alcohol nanocomposite films were reported.
本文采用溶剂成本法制备了壳聚糖/聚乙烯醇(CS/PVA)纳米复合薄膜,并报告了这些薄膜的结构、振动、光学、热学和电化学特性。XRD 和 SEM 证实了 PVA 基质中存在 CS。研究了其振动特性和官能团分配。报告了壳聚糖/聚乙烯醇纳米复合薄膜的热稳定性和电化学特性。
{"title":"Chitosan/PVA Nanocomposite Films with Improved Structural, Vibrational and Optical Properties","authors":"G. Jeya Jothi, P. Kanchana, R. Vinotha","doi":"10.32628/ijsrset2310664","DOIUrl":"https://doi.org/10.32628/ijsrset2310664","url":null,"abstract":"Herein, the solvent costing method was used to prepare the chitosan/poly vinyl alcohol (CS/PVA) nanocomposite films and the properties of structural, vibrational, optical, thermal and electrochemical of these films have been reported. XRD and SEM were confirmed the presence of CS in PVA matrix. The vibrational properties and functional group assignment were studied. The thermal stability and electrochemical properties of chitosan/poly vinyl alcohol nanocomposite films were reported.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140523114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mycoremediation, a form of bioremediation facilitated by fungi, has been employed for the biodegradation of azo dyes, including congo red, acid red, and basic blue. In this study, four fungal isolates, namely Aspergillus niger, Aspergillus piperis, Penicillium oxalicum, and Penicillium chrysogenum, obtained from dye effluent were used. Four biodegradation methods were selected, including solid media dye accumulation, liquid media methods under stationary and shaking conditions at 28°C, and biosorption using dead biomass. For the first time, we report the involvement of the isolated fungal species A. piperis, derived from textile effluent, in the biodegradation of textile dyes. Comparative spectrophotometric analysis revealed more than 90% of dye decolourization in the fungus-inoculated medium supplemented with dyes, compared to control. Higher percentage of decolorization were obtained under shaking conditions compared to the stationary method. Dead fungal biomass exhibited effective dye absorption, resulting in a noticeable color change during dye degradation. The seed germination bioassay revealed that treated dye solutions promoted germination; however, untreated inhibited it. Further, untreated dye effluent hindered microbial growth. The excellent performance of A. piperis in the biodegradation of textile azo dyes with diverse chemical structures highlights and reinforces the bioremediation potential of these fungi for environmental decontamination.
菌核修复是一种由真菌促进的生物修复形式,已被用于对包括刚果红、酸性红和碱性蓝在内的偶氮染料进行生物降解。本研究使用了从染料废水中分离的四种真菌,即黑曲霉、哌啶曲霉、草青霉和蛹青霉。我们选择了四种生物降解方法,包括固体培养基染料累积法、28°C 固定和振荡条件下的液体培养基法以及利用死亡生物质的生物吸附法。我们首次报道了从纺织污水中分离出的真菌 A. piperis 参与纺织染料的生物降解。分光光度法比较分析表明,与对照组相比,在真菌接种的培养基中,染料脱色率超过 90%。与固定法相比,摇动法的脱色率更高。死亡的真菌生物量能有效吸收染料,从而在染料降解过程中产生明显的颜色变化。种子萌发生物测定显示,处理过的染料溶液能促进种子萌发;而未经处理的染料溶液则会抑制种子萌发。此外,未经处理的染料废水阻碍了微生物的生长。A. piperis 在生物降解具有不同化学结构的纺织品偶氮染料方面的优异表现,凸显并加强了这些真菌在环境净化方面的生物修复潜力。
{"title":"Mycoremedial Approach for Biodegradation of Textile Dyes","authors":"Sakshi Suman, Yamini Agrawal, Aarti Yadav, Nitin Chauhan","doi":"10.32628/ijsrset2310652","DOIUrl":"https://doi.org/10.32628/ijsrset2310652","url":null,"abstract":"Mycoremediation, a form of bioremediation facilitated by fungi, has been employed for the biodegradation of azo dyes, including congo red, acid red, and basic blue. In this study, four fungal isolates, namely Aspergillus niger, Aspergillus piperis, Penicillium oxalicum, and Penicillium chrysogenum, obtained from dye effluent were used. Four biodegradation methods were selected, including solid media dye accumulation, liquid media methods under stationary and shaking conditions at 28°C, and biosorption using dead biomass. For the first time, we report the involvement of the isolated fungal species A. piperis, derived from textile effluent, in the biodegradation of textile dyes. Comparative spectrophotometric analysis revealed more than 90% of dye decolourization in the fungus-inoculated medium supplemented with dyes, compared to control. Higher percentage of decolorization were obtained under shaking conditions compared to the stationary method. Dead fungal biomass exhibited effective dye absorption, resulting in a noticeable color change during dye degradation. The seed germination bioassay revealed that treated dye solutions promoted germination; however, untreated inhibited it. Further, untreated dye effluent hindered microbial growth. The excellent performance of A. piperis in the biodegradation of textile azo dyes with diverse chemical structures highlights and reinforces the bioremediation potential of these fungi for environmental decontamination.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"28 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140518687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Artificial intelligence is the science of making machines that can think and act same as like humans. ‘Artificial’ are the objects created by the human beings and ‘Intelligence’ is the capability to perform the given task by interacting with a huge information. The AI in healthcare has made dramatic progress in recent years. Artificial intelligence may give better treatment to patients by taking the excellent decision in healthcare and medicine by prevention, detection, diagnosis, and treatment of the disease.
{"title":"Artificial Intelligence in Medical Imaging : A Review","authors":"Miss. Aboli Sanjay Gujar, Chinmay R. Sambhe, Miss. Tanmayi Ajay Dubey","doi":"10.32628/ijsrset241119","DOIUrl":"https://doi.org/10.32628/ijsrset241119","url":null,"abstract":"Artificial intelligence is the science of making machines that can think and act same as like humans. ‘Artificial’ are the objects created by the human beings and ‘Intelligence’ is the capability to perform the given task by interacting with a huge information. The AI in healthcare has made dramatic progress in recent years. Artificial intelligence may give better treatment to patients by taking the excellent decision in healthcare and medicine by prevention, detection, diagnosis, and treatment of the disease.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"20 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140526922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper provides an overview of the significant role of computational group theory in cryptography. Group theory plays a crucial role in various cryptographic applications, such as key exchange, encryption, and digital signatures. This paper examines the fundamental concepts, algorithms, and applications of computational group theory in cryptography, using polycyclic groups with a focus on key findings and recent developments in quantum-era cryptography.
{"title":"Computational Group Theory and Quantum-Era Cryptography","authors":"Michael N. John, Udoaka O. G.","doi":"10.32628/ijsrset2310556","DOIUrl":"https://doi.org/10.32628/ijsrset2310556","url":null,"abstract":"This paper provides an overview of the significant role of computational group theory in cryptography. Group theory plays a crucial role in various cryptographic applications, such as key exchange, encryption, and digital signatures. This paper examines the fundamental concepts, algorithms, and applications of computational group theory in cryptography, using polycyclic groups with a focus on key findings and recent developments in quantum-era cryptography.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136361168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None Fatma Ayad Raghb, None Dr. Abdulkareem H. Dagher
Rate equation approach has been prepared for interaction process in optical fiber laser of three levels system. Information that we have dealt with conclude the results theoretically processed using the MATLAB program (R 2019 a). The results show that concentration of rare earth ions and the efficiency of optical fibers is an inverse relationship. At concentration 1×1023 ion m-3, the lowest & highest value of output power & laser efficiency 19.2W & 44.6% respectively. While at concentration 10×1023 ion m-3, the highest & lowest value of output power & laser efficiency 83.2W & 19.6% respectively.
{"title":"Theoretical Study for Holmium Doped Fiber Laser","authors":"None Fatma Ayad Raghb, None Dr. Abdulkareem H. Dagher","doi":"10.32628/ijsrset2310537","DOIUrl":"https://doi.org/10.32628/ijsrset2310537","url":null,"abstract":"Rate equation approach has been prepared for interaction process in optical fiber laser of three levels system. Information that we have dealt with conclude the results theoretically processed using the MATLAB program (R 2019 a). The results show that concentration of rare earth ions and the efficiency of optical fibers is an inverse relationship. At concentration 1×1023 ion m-3, the lowest & highest value of output power & laser efficiency 19.2W & 44.6% respectively. While at concentration 10×1023 ion m-3, the highest & lowest value of output power & laser efficiency 83.2W & 19.6% respectively.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136361180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The polarization encoding-based optical validation and security verification approach is provided in this paper. This technique involves simulating information optically and bonding it to a polarization-encoded mask, such as a biological order or a reaction. The linear polarizers that make up the polarization-encoded mask are positioned at random. The polarization-encoded signal is the name given to this composite signal. In this simulation study, a primary optical neural network adapting a light brain technology is proposed theoretically based on a feed-forward model. Calibration of the nonlinear behavior in such a network is assumed by a semiconductor laser of the Distributed Feedback (DFB) type. Four laser networks are constructed as three influencers, followed by one embedding laser followers. Each of the influencer’s lasers has a different wavelength frequency and polarization (30-60–90) degree, respectively, and then combines the signal with WDM for the last laser. With each value, from the last values, of the polarization effect after this effect, the results indicated that these values would present the greatest weight of spikes and chaotic behavior for the uploaded virtual message.
{"title":"Effect of Input Layer Signal Polarization on the Dynamics of Optical Neural Networks","authors":"None Mariam R. Dhyaa, None Ayser A. Hemed","doi":"10.32628/ijsrset2310543","DOIUrl":"https://doi.org/10.32628/ijsrset2310543","url":null,"abstract":"The polarization encoding-based optical validation and security verification approach is provided in this paper. This technique involves simulating information optically and bonding it to a polarization-encoded mask, such as a biological order or a reaction. The linear polarizers that make up the polarization-encoded mask are positioned at random. The polarization-encoded signal is the name given to this composite signal. In this simulation study, a primary optical neural network adapting a light brain technology is proposed theoretically based on a feed-forward model. Calibration of the nonlinear behavior in such a network is assumed by a semiconductor laser of the Distributed Feedback (DFB) type. Four laser networks are constructed as three influencers, followed by one embedding laser followers. Each of the influencer’s lasers has a different wavelength frequency and polarization (30-60–90) degree, respectively, and then combines the signal with WDM for the last laser. With each value, from the last values, of the polarization effect after this effect, the results indicated that these values would present the greatest weight of spikes and chaotic behavior for the uploaded virtual message.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136361188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None Amalia Nailul Husna, None Muhammad Nur Aidi, None Indahwati, None Fitrah Ernawati
Analysis of Variance (ANOVA) is a statistical technique used to compare means from various samples. Generally, a balanced design is used in ANOVA, but in some conditions, an unbalanced design can happen when the sample size is different in each treatment. This design will have the calculation of the F-test is different from usual for fixed, random, and mixed models. In this research, a simulation study will be carried out to see the differences in the results of the F-test decision in a three-way ANOVA with an unbalanced design based on a fixed, random, and mixed model. Simulation data is generated based on several scenarios, small sample size and large sample size, e~Normal (0,1) and e~Gamma (2,3), and applied to 8 models, that combine fixed effects and random effects in a 3-factor design. The simulation shows that sample size, error distribution, and the used model can affect F-test decisions. Designs with large sample sizes and e~Normal (0,1) produce more significant F-test decisions than small sample sizes and e~Gamma (2,3), and model 1 or the fixed model has more significant F-test decisions than other models in each scenario.
{"title":"Simulation Studies of Three-Way Unbalanced Design on Fixed, Random, and Mixed Model","authors":"None Amalia Nailul Husna, None Muhammad Nur Aidi, None Indahwati, None Fitrah Ernawati","doi":"10.32628/ijsrset2310548","DOIUrl":"https://doi.org/10.32628/ijsrset2310548","url":null,"abstract":"Analysis of Variance (ANOVA) is a statistical technique used to compare means from various samples. Generally, a balanced design is used in ANOVA, but in some conditions, an unbalanced design can happen when the sample size is different in each treatment. This design will have the calculation of the F-test is different from usual for fixed, random, and mixed models. In this research, a simulation study will be carried out to see the differences in the results of the F-test decision in a three-way ANOVA with an unbalanced design based on a fixed, random, and mixed model. Simulation data is generated based on several scenarios, small sample size and large sample size, e~Normal (0,1) and e~Gamma (2,3), and applied to 8 models, that combine fixed effects and random effects in a 3-factor design. The simulation shows that sample size, error distribution, and the used model can affect F-test decisions. Designs with large sample sizes and e~Normal (0,1) produce more significant F-test decisions than small sample sizes and e~Gamma (2,3), and model 1 or the fixed model has more significant F-test decisions than other models in each scenario.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136361182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
None Fathima Jameera. B, None G. Suresh, None S. Hemalatha, None S. Vilma Veronica
This research effort uses cutting-edge anti-spoofing techniques in conjunction with deep learning approaches to address the issue of spoofing assaults on facial recognition systems. A diversified dataset containing real facial photos and several spoofing attack scenarios is compiled as the project's first step. Then, data pretreatment methods are used to guarantee data consistency and the best model performance. The research makes use of MobileNet and VGG-16, two well-known deep-learning architectures, to build reliable facial recognition models. A thorough evaluation using well-established metrics including classification reports, accuracy scores, and confusion matrices is undertaken after thorough training and validation. It's significant because this research incorporates real-time anti-spoofing capabilities, which go beyond traditional facial recognition jobs. Webcam functionality is added to the deployed models to assess real-time images in comparison to reference passport-size photos. Dynamically shifting boundary box colors—blue for real faces and red for detected fake images—indicate the anti-spoofing technology. The project's conclusion contains a thorough comparison of the MobileNet and VGG-16 models that identifies and compares each model's advantages and disadvantages. Real-time demos also highlight the anti-spoofing methodology's effectiveness in practice.
{"title":"People Identification Through Facial Recognition and Anti-Spoofing Using Deep Learning","authors":"None Fathima Jameera. B, None G. Suresh, None S. Hemalatha, None S. Vilma Veronica","doi":"10.32628/ijsrset2310539","DOIUrl":"https://doi.org/10.32628/ijsrset2310539","url":null,"abstract":"This research effort uses cutting-edge anti-spoofing techniques in conjunction with deep learning approaches to address the issue of spoofing assaults on facial recognition systems. A diversified dataset containing real facial photos and several spoofing attack scenarios is compiled as the project's first step. Then, data pretreatment methods are used to guarantee data consistency and the best model performance. The research makes use of MobileNet and VGG-16, two well-known deep-learning architectures, to build reliable facial recognition models. A thorough evaluation using well-established metrics including classification reports, accuracy scores, and confusion matrices is undertaken after thorough training and validation. It's significant because this research incorporates real-time anti-spoofing capabilities, which go beyond traditional facial recognition jobs. Webcam functionality is added to the deployed models to assess real-time images in comparison to reference passport-size photos. Dynamically shifting boundary box colors—blue for real faces and red for detected fake images—indicate the anti-spoofing technology. The project's conclusion contains a thorough comparison of the MobileNet and VGG-16 models that identifies and compares each model's advantages and disadvantages. Real-time demos also highlight the anti-spoofing methodology's effectiveness in practice.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134946245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list, UGC Approved list, list of ugc approved journal, ugc approved journal,IJSRSET - international Research Journal,ijsrset.com,ijsrset.com, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET) , UGC Approved journal, ugc approved,ugc, ugc certify, publish free of cost, free publication, UGC and ISSN Approved, International Peer Reviewed, Open Access Journal, eISSN 2394-4099, Print ISSN 2395-1990, ISSN: 2394-4099, Impact Factor : 5.75 , E- journal, Low Cost INR 500, Free Publication
{"title":"Comparative Analysis of U-Net and DeepLab for Automatic Polyp Segmentation in Colonoscopic Frames Using CVC-ClinicDB Dataset","authors":"None Chandrakantha T S, None Basavaraj N Jagadale","doi":"10.32628/ijsrset2310550","DOIUrl":"https://doi.org/10.32628/ijsrset2310550","url":null,"abstract":"UGC-CARE list, New UGC-CARE Reference List, UGC CARE Journals, ugc care list of journal, ugc care list, UGC Approved list, list of ugc approved journal, ugc approved journal,IJSRSET - international Research Journal,ijsrset.com,ijsrset.com, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET) , UGC Approved journal, ugc approved,ugc, ugc certify, publish free of cost, free publication, UGC and ISSN Approved, International Peer Reviewed, Open Access Journal, eISSN 2394-4099, Print ISSN 2395-1990, ISSN: 2394-4099, Impact Factor : 5.75 , E- journal, Low Cost INR 500, Free Publication","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135547250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the present study the erosion behavior of basalt fibre reinforced composite was studied. Slurry pot erosion test were conducted on the composite samples with 30%, 40% 50% and 60% reinforcement. Slurry concentration, speed and contact angle were considered as the parameters. The sand particles from the range of 212, 425 and 600µm were suspended in the water. The results revels that the slurry erosion was found to be increased with slurry concentration and the turning speed. The impact angle with 900 has the major influence on the erosion. The highest mass loss due to erosion is found in the sample with 30% reinforcement and the minimal mass loss due to erosion is found in the sample with 60% reinforcement.
{"title":"Investigation of Erosion Effect on Surface of Basalt Fibre Reinforced Polymer Composites","authors":"None Sunil Nayak, None M. Prasanna Kumar","doi":"10.32628/ijsrset2310534","DOIUrl":"https://doi.org/10.32628/ijsrset2310534","url":null,"abstract":"In the present study the erosion behavior of basalt fibre reinforced composite was studied. Slurry pot erosion test were conducted on the composite samples with 30%, 40% 50% and 60% reinforcement. Slurry concentration, speed and contact angle were considered as the parameters. The sand particles from the range of 212, 425 and 600µm were suspended in the water. The results revels that the slurry erosion was found to be increased with slurry concentration and the turning speed. The impact angle with 900 has the major influence on the erosion. The highest mass loss due to erosion is found in the sample with 30% reinforcement and the minimal mass loss due to erosion is found in the sample with 60% reinforcement.","PeriodicalId":14228,"journal":{"name":"International Journal of Scientific Research in Science, Engineering and Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136198689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}