Overview on the Methods of Preparation of Nano Particles
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Nanoparticles are particles between 1 to 100nm in size. Nanotechnology is an interdisciplinary and crossing-over technology. The most important thing is observing and characterizing the phenomena showing in the nanotechnology, but also the practical use of new and unusual properties of nanoparticles. In this present work a comparative study on the different preparation methods of nano materials including Chemical Vapor Deposition, Chemical Vapor Condensation, Mechanical Attrition, Chemical Precipitation, Gas Condensation, Sol-Gel Techniques, Electrodeposition, are studied.
Authors and Affiliations
S. Karthikeyan, P. Karuppuswamy
slugA Survey on Image Segmentation Using Clustering Techniques
Image is information which has to be processed effectively. Segmentation, partitions the image into multiple segments. Image segmentation assigns label to every pixel in an image such that p...
Corrosion Inhibition of Copper Metal by Prosopis Cineraria Leaves as Green Corrosion Inhibitor in Acidic Medium
Ethanolic extract of Prosopis cineraria leaves(EEPcL) behaves as a green corrosion inhibitor to replace toxic chemicals. The corrosion inhibition of copper in 0.5 N HCl by Prosopis cineraria leaves has been studied by m...
Seismic Response of Multi Storey RC Building with Friction Pendulum Bearing System
Buildings are very important after any natural hazards such as earthquake. The structural and nonstructural components are should repair and safe after earthquake. So to mitigate the effect of earthquake on the structur...
Design of Tuning Methods for Fractional order PIλDμ Controller using PSO Algorithm
PID controllers are widely used in many industrial applications due to their simplicity and robustness. In conventional PID controllers such as Ziegler’s-Nicholas tuning method it has been found that the controller desi...
Introduction to IEEE 802.11 Rogue Access Point Detection Mechanism Using Covert Channel
The problem of providing protection to the user from a rogue access point is a big problem today. To protect against the rogue access point through existing mechanism is by using IEEE 802.1x. However, it is difficult to...