Eco-Physiological Studies On Fox Sagar Lake With Reference To Water Quality
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 10
Abstract
The present paper deals with the ecological studies on Fox Sagar lake with reference to pollution. For this purpose both physicochemical and biological parameters were analysed. Fox Sagar lake is famous for its natural beauty known locally as Kotta Cheruvu. It is located in Jeedimetla near Kompally, Hyderabad. The lake is popular for fishing and a popular spot for picnics. The water samples from the surface were collected from the three sampling stations every month in polythene cans for a period of 2 years from June 2013 to May 2015. All the samples were carried to the laboratory. The samples were analyzed on the same day for different physico-chemical factors following the standard methods. Surface water samples for phytoplankton were collected from the 3 sampling stations. One litre of the sample was kept in sedimentation columns after adding 4% Formaldehyde solution. In Fox Sagar lake four groups of algae were recorded i.e, Cyanophyceae, Chlorophyceae, Bacillariophyceae and Euglenophyceae.
Authors and Affiliations
A. Rajani| Department of Botany, RBVRR Womens College, Hyderabad, Telangana, E. M. Sunitha| Department of Botany, RBVRR Womens College, Hyderabad, Telangana, T. Sreelakshmi| Department of Boatny Govt. Degree college, Ranga Reddy, Telangana, P. Vaani| Department of Botany, RBVRR Womens College, Hyderabad, Telangana, O. Sitakumari| Department of Botany, RBVRR Womens College, Hyderabad, Telangana, K. Shailaja| Osmania University College for Women, Koti, Hyderabad, Telangana
Consideration And Evolution of Real Time Operating Systems: RTOS
This context deliberates the literature evolution of RTOS (Real Time Operating Systems) and its contributions to the embedded world. RTOS is is an operating system (OS) intended to serve real-time application process...
Virus Attack Identification And Representation In Sensor Network
Clusters consist of circulated sensors and motor that interact with each other via wireless network. The use of open wireless intermediate and unattended deployment leaves these systems vulnerable to intelligent adve...
Adaptable conveyed administration uprightness verification for software as a service clouds
SaaS gives an adaptable situation through which application administration providers permitted to have their applications in a conveyed domain, with the goal that clients can get to the facilitated administrations in...
A Data De-duplication Procedure To Protect The Data Security
Data de-duplication carry a lot of benefits, security and privacy concerns arise as users’ sensitive data are vulnerable to both inside and outside attacks. Traditional encryption, while as long as data confidential...
Spyware prevention using graphical passwords
our future work will be based on Click-based graphical password schemes require a user to click on a set of points on one or more presented background images. With the Pass Points and to create users to a password by...