Issue-1 October 2016

Volume-6 Issue-1 Published on October 30, 2016
 Download Abstract Book

S. No

Volume-6 Issue-1, October 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Joseph Zacharias, Jayakrishnan S B, Vijayakumar Narayanan

Paper Title:

82 GHz Millimeter-Wave Transmission Over OFDM ROF System

Abstract: Orthogonal Frequency Division Multiplexing (OFDM) based signal transmission over Millimeter-Wave Radio-over-Fiber (mm-Wave RoF) systems is proposed.  For that an external modulator and an optical interleaver are used to generate dual octupling-frequency optical millimeter waves. Simultaneously. The frequency of local oscillator signal is reduced largely due to frequency octupling.  OFDM signal is used as the downlink data for transmission. Most of the advanced systems are using OFDM based signal such as LTE 4G or WiMAX network. So a system that uses RoF technology to transmit OFDM signal by mm-Wave will be effective. In this proposal, the advanced technologies are combined in order to get an effective model to transmit data at higher speed with a reasonable price.

Keywords:
 Orthogonal frequency division multiplexing, Radio over fiber (RoF), Millimeter-wave, wavelegth reuse.


References:

1.       Tam Hoang Thi and Mitsuji Matsumoto, “Transmission Analysis of OFDM Millimeter-Wave Radio-over-Fiber System ”, Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 800- 804, July 2013
2.       J. Armstrong, “OFDM for optical communications ”, J. Lightw. Technol., vol. 27, no. 3, pp. 189204, Feb. 2009.

3.       Guangming Cheng, Banghong Guo, Songhao Liu, Weijin Fang, “A novel full-duplex radio-over-fiber system based on dual octupling-frequency for 82 GHz W-band radio frequency and wavelength reuse for uplink connection ”.

4.       Jianjun Yu, Zhensheng Jia, Ting Wang, Gee-Kung Chang “A Novel Radio- Over-Fiber configuration using optical phase modulator to generate an optical mm-Wave and centralized lightwave for uplink connection ”, IEEE Photonics Technology Letters, vol. 19, no. 3, pp. 140 – 142, February 2007

5.       SPP “Planning of the 7176 GHz and 8186 GHz bands for millimeter wave highcapacity fixed link technology, ”, Australian Communication and Media Authority, 2006

6.       Colombo, M. Cirigliano, “Next-generation access network: a wireless networkusing E-band radio frequency (7186 GHz) to provide wideband connectivity, ”, Bell Labs Tech. J. , vol. 16, no. 1, pp. 187 – 206, 2011.

7.       Zizheng Cao, Jianjun Yu,Minmin Xia, Qi Tang, Yang Gao,  Wenpei Wang, and Lin Chen, “Reduction of Intersubcarrier Interference and Frequency-Selective Fading in OFDM-RoF Systems”, Journal of lightwave technology, vol. 28, no. 16, August 15, 2010

8.       R. Karthikeyan and Dr. S. Prakasam, “OFDM Signal  Improvement Using Radio over Fiber for Wireless System ”, International Journal of Computer Networks and Wireless Communications (IJCNWC), ISSN: 2250-3501 vol. 3, no. 3, June 2013.

9.       Jianjun Yu, Zhensheng Jia,Ting Wang, and Gee Kung Chang, “Centralized Lightwave Radio-Over-Fiber System With Photonic Frequency Quadrupling for High-Frequency Millimeter-Wave Generation ”,  IEEE photonics technology letters, vol. 19, no. 19, Oct 2007

10.    Wake,  C.  R.  Lima  and  P.  A.  Davies,  “Transmission  of  60-GHz Signals over 100 km of Optical Fiber Using a dual mode Semiconductor Laser Source ”, IEEE photonics technology letters, vol 8, no 4, April 1996

11.    C. van den Bos , M. H. L. Kouwenhoven and W. A. Serdijn, “The influence of non-linear distortion on OFDM bit error rate ”, IEEE International Conference on Communications, vol. 2, pp. 1125 – 1129, June 2000

12.    Lin Chen, Hong Wen, and Shuangchun Wen, “A Radio-Over-Fiber system with a novel scheme for Millimeter-Wave generation and wavelength reuse for up-link connection ”, IEEE Photonics Technology Letters, vol. 18, no. 19, pp. 2056 – 2058, October 2006

13.    G.-K. Chang, J. Yu, Z. Jia, J. Yu “Novel optical-wireless access network architecture for simultaneously providing broadband wireless and wired services ”, Proc.OFC, Paper OFM1D, Anaheim, USA, March 2006.

14.    Yoon-Khang Wong, S.M. Idrus, and I.A. Ghani, “Performance Analysis of the OFDM Scheme for Wireless over Fiber Communication Link,”, International Journal of Computer Theory and Engineering , vol. 4, no. 5, October 2012.

15.    Ajay Kumar Vyas, Dr. Navneet Agrawal, “Radio over Fiber: Future Technology of Communication, International Journal of Emerging Trends and Technology in Computer Science (IJETTCS) , vol. 1, no. 2, August 2012.

 

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Anila V M, Seena Thomas

Paper Title:

Detection of Diabetic Retinopathy from Fundus Images through Local Binary Patterns and Artificial Neural Network

Abstract:  Diabetic retinopathy (DR) is one of the most frequent cause of blindness and vision loss in diabetic patients. The diabetic retinopathy is detected earlier, the better the chance that it can be effectively treated and further vision loss prevented. This condition increases the importance of automated detection of the disease. This work focuses on distinguishing between diabetic retinopathy (DR) and normal fundus images by analyzing the texture of the retina background. Local Binary Patterns (LBP) are used as texture descriptors. They are the powerful grey-scale texture descriptors that is commonly used because of its computation simplicity. Local Binary Pattern is based on looking at the local variations around each pixel, and assigning labels to different local patterns and the labels are evaluated and used in the classification stage. Probabilistic Neural Network (PNN) is the classifier that is used for the classification of abnormal and healthy images. This work suggest that LBP is a robust texture descriptor for retinal images and the proposed method analyzing the retina background directly and avoiding difficult lesion segmentation such as exudates, microaneurysms etc. can be useful for diagnostic aid.

Keywords:
  Diabetic Retinopathy, Local Binary Patterns, Probabilistic Neural Network, Fundus Images.


References:

1.       Sandra Morales, Kjersti Engan, Valery Naranjo and Adri´an ColomerT. “Retinal Disease Screening through
2.       Local Binary Patterns” IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, VOL. 00, NO. 00, 2015

3.       Frdric Zana and Jean-Claude Klein ,Segmentation of Vessel-Like Patterns Using Mathematical Morphology and Curvature Evaluation IEEE Transactions On Image Processing, Vol. 10, No.7, July 2001

4.       Keith A. Goatman, Alan D. Fleming, Sam Philip, Graeme J.Williams, John A. Olson and Peter F. Sharp, Detection of New Vessels on the Optic Disc Using Retinal Photographs, IEEE Transactions on Medical Imaging, Vol. 30, No. 4, pp. 972 979, 2011.

5.       E. Ricci and R. Perfetti, Retinal blood vessel segmentation using line operators and support vector classification, IEEE Trans. Med. Imag., vol. 26, no. 10, pp. 13571365, Oct. 2007

6.       E. Ricci and R. Perfetti, Retinal blood vessel segmentation using line operators and support vector classification, IEEE Trans. Med. Imag., vol. 26, no. 10, pp. 3571365, Oct. 2007

7.       T. Walter, J.C. Klein, P. Massin, and A. Erginay, A contribution of image processing to the diagnosis of diabetic retinopathy-detection of exudates in colour fundus images of the human retina , IEEE Transactions on Medical Imaging , Vol. 22(10),pp. 1236 1243, 2002.

8.       Jo£o V. B. Soares, Jorge J. G. Leandro, Roberto M. Cesar Jr.,Herbert F. Jelinek, and Michael J. Cree, Retinal Vessel Segmentation Using the 2-D Gabor Wavelet and supervised Classification IEEE TRANSACTIONS ON MEDICALIMAGING, VOL. 25, NO. 9, SEPTEMBER 2006

9.       World Health Organization (WHO), Universal eye health: a global action plan 2014-2019, 2013.

10.    T. Ojala, M. Pietikinen, and T. Menp, A generalized local binary pattern operator for multiresolution gray scale and rotation invariant texture classification, in Advances in Pattern Recognition, 2nd International Conference on, 2001, pp. 397406.

11.    T. Ojala, M. Pietikainen, and T. Maenpaa, Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 24, no. 7, pp. 971987, 2002.

12.    M. Heikkil, M. Pietikinen, and C. Schmid, Description of interest regions with local binary patterns, Pattern Recognition, vol. 42, no. 3, pp. 425 436, 2009.

13.    Z. Yang and H. Ai, Demographic classification with local binary patterns, in Advances in Biometrics, ser. Lecture Notes in Computer Science, S.-W. Lee and S. Li, Eds., 2007, vol. 4642, pp. 464473.

14.    L. Nanni, A. Lumini, and S. Brahnam, Local binary patterns variants as texture descriptors for medical image analysis, Artificial Intelligence in Medicine, vol. 49, no. 2, pp. 117 125, 2010.

15.    M. Mookiah, U. R. Acharya, R. J. Martis, C. K. Chua, C. Lim, E. Ng, and A. Laude, Evolutionary algorithm based classifier parameter tuning for automatic diabetic retinopathy grading: A hybrid feature extraction approach, Knowledge-Based Systems, vol. 39, no. 0, pp. 9 22, 2013.

16.    M. M. R. Krishnan and A. Laude, An integrated diabetic retinopathy index for the diagnosis of retinopathy using digital fundus image features, Journal of Medical Imaging and Health Informatics, vol. 3, no. 2, pp. 306313, 2013.

6-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

3.

Authors:

Wael Zaghloul ElSayad, Hussein Mahmoud Hussein

Paper Title:

Reducing the Negative Effects of Dust Storms using Solar Energy to Recycle Plastic Waste

Abstract:  A sandstorm is characterized as one that whips up extraordinary loads of sand into the air, forming a dense cloud above the ground in the process. While most of the sand will rise higher than 50 cm, some sand particles can even ascend to the height of 2 meters. According to Wikipedia, the average diameter of the particles carried by such dust storm winds will vary between 0.15 and 0.30 mm. Wind speeds such during sandstorms have been recorded at up to 16 km per hour and more, while most storms continue to blow for between three hours to five hours. The dust unleashed from sandstorms continues to pose severe environmental concerns in certain Arab and Middle East countries, causing great hardships to its citizens in the form of lost income and widespread infrastructure damage. Perhaps more importantly, when it comes to measuring the effects on people’s health, it has been well documented that sandstorms have, in many cases, led to both the death and destruction of livestock, crops and even human beings. Based on the above factors, scientific researchers continue to work tirelessly to confront sandstorms in an effort to both prevent and alleviate this dangerous natural phenomenon. This particular study will look to establish a low-cost system of erecting plastic trees built from solar energy and recycled plastic waste in order to reduce the risks of sandstorms.

Keywords:
 Middle East countries, recycled plastic, sandstorms, solar energy.


References:

1.    Sultan Ayoub Meo, Mohammad Fahad A Al-Kheraiji, Ziyad Fahad AlFaraj, Nasser abdulaziz Alwehaibi, and Ahmad Adnan Aldereihim. “ Respiratory and general health complaints in subjects exposed to sandstorm at Riyadh, Saudi Arabia”. (2013, April). Pakistan Journal of Medical Sciences. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3809255/
2.    Miller, Ron and Tegan, Ina. “Desert Dust, Dust Storms and Climate”. National Aeronautics and Space Administration Goddard Institute for Space Studies, (1997, April). http://www.giss.nasa.gov/research/briefs/miller_01/

3.    Buttiker, N & Krupp (Eds). Climatologically features of Saudi Arabia, in Fauna of Saudi Arabia, a, No.6, Meteorological Environmental Protection Administration, Saudi Arabia

4.    Ayoub Meyo, Sultan, Fahad A Al-Kheraiji, Mohammed et al. ‘Respiratory and general     health complaints in subjects exposed to sandstorm at Riyadh, Saudi Arabia.’ Pakistan Journal of Medical Sciences, April 29, 2013, 642–646.

5.    Regional Master Plan for the prevention and control of Dust and Sandstorms in Northeast Asia. Volume No. 1. March 2005.

6.    Deserts and Desertification Seminar. (2006). “Danger of dust storms leads to the transfer of germs that cause for «anthrax»” http://archive.aawsat.com/details.asp

7.    Al Turki, Ali bin Mohammed, Al Maghrbi, Salem al-Azab and Ghazi Algamd, Abdul Aziz. “Properties and the amount of soil losing by wind drift in the Riyadh region.”

8.    “High-density polyethylene.” Wikipedia. July 6, 2016. https://en.wikipedia.org/wiki/High- density polyethylene.

10-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

4.

Authors:

Safia Yasmeen, G. Manoj Someswar

Paper Title:

Design & Development of a Suitable Model to Validate New Estimation Approaches for Effective Performance

Abstract: As COCOMO is a non-proprietary model, its details are available in the public domain, encouraging researchers and practitioners in the software engineering community to independently evaluate the model. There have been many extensions independently reported where machine learning techniques are used to generate effort models from the original COCOMO model. In our research work, we proposed a calibration method by transforming the model equation into a linear form and estimating the model parameters using standard linear regression techniques. This calibration method has been adopted by the COCOMO development team in their calibration work.  COCOMO has also been a model used to validate new estimation approaches such as fuzzy logic and neural networks. The COCOMO development team continues to calibrate and extend the model using different calibration approaches on more augmented data sets and our research work is mainly based upon these approaches wherein we have evolved newer and better approaches over the existing approaches and gave a realistic outlook to the very purpose of achieving the best performance.

Keywords:
Calibration Technique, Maintenance Function Point (MFP), Maintenance Impact Ratio (MIR), Developed for Reusability (RUSE), Required Development Schedule (SCED), Required Software Reliability (RELY)


References:

1.       Abran A., Silva I., Primera L. (2002), “Field studies using functional size measurement in building estimation models for software maintenance”, Journal of Software Maintenance and Evolution, Vol 14, part 1, pp. 31-64
2.       Albrecht A.J. (1979), “Measuring Application Development Productivity,” Proc. IBM Applications Development Symp., SHARE-Guide, pp. 83-92.

3.       Albrecht A.J. and Gaffney J. E. (1983) “Software Function, Source Lines of Code, and Development Effort Prediction: A Software Science Validation,” IEEE Transactions on Software Engineering, vol. SE-9, no. 6, November

4.       Banker R., Kauffman R., and Kumar R. (1994), “An Empirical Test of Object-Based Output Measurement Metrics in a Computer Aided Software Engineering (CASE) Environment,” Journal of Management Information System.

5.       Basili V.R., (1990) “Viewing Maintenance as Reuse-Oriented Software Development,” IEEE Software, vol. 7, no. 1, pp. 19-25, Jan.

6.       Basili V.R., Briand L., Condon S., Kim Y.M., Melo W.L., Valett J.D. (1996), “Understanding and predicting the process of software maintenance releases,” Proceedings of International Conference on Software Engineering, Berlin, Germany, pp. 464-474.

7.       Basili V.R., Condon S.E., Emam K.E., Hendrick R.B., Melo W. (1997) “Characterizing and Modeling the Cost of Rework in a Library of Reusable Software Components”. Proceedings of the 19th International Conference on Software Engineering, pp.282-291

8.       Boehm B.W. (1981), “Software Engineering Economics”, Prentice-Hall, Englewood Cliffs, NJ, 1981.

9.       Boehm B.W. (1988), “Understanding and Controlling Software Costs”, IEEE Transactions on Software Engineering.

10.    Boehm B.W., Royce W. (1989), “Ada CCCOMO and Ada Process Model,” Proc. Fifth COCOMO User’s Group Meeting, Nov.

11.    Boehm B.W., Clark B., Horowitz E., Westland C, Madachy R., Selby R. (1995), “Cost models for future software life cycle processes: COCOMO 2.0, Annals of Software Engineering 1, Dec, pp. 57-94.

12.    Boehm B.W. (1999), “Managing Software Productivity and Reuse,” Computer 32, Sept., pp.111-113

13.    Boehm B.W., Abts C, Chulani S. (2000), “Software development cost estimation approaches: A survey,” Annals of Software Engineering 10, pp. 177-205.

14.    Boehm B.W., Horowitz E., Madachy R, Reifer D., Clark B.K., Steece B., Brown A.W., Chulani S., and Abts C. (2000), “Software Cost Estimation with COCOMO II,” Prentice Hall.

15.    Boehm B.W., Valerdi R. (2008), “Achievements and Challenges in Cocomo-Based Software Resource Estimation,” IEEE Software, pp. 74-83, September/October

16.    Bradley E., Gong G. (1983), “A leisurely look at the bootstrap, the jack-knife and cross-validation”, American Statistician 37 (1), pp.836-848.

17.    Briand L.C., Basili V., Thomas W.M. (1992), “A pattern recognition approach for software engineering analysis”, IEEE Transactions on Software Engineering 18 (11)931
942.

18.    Briand L.C. & Basili V.R. (1992) “A Classification Procedure for an Effective Management of Changes during the Software Maintenance Process”, Proc. ICSM ’92, Orlando, FL.

19.    Briand L.C, El-Emam K., Maxwell K., Surmann D., and Wieczorek I., “An Assessment and Comparison of Common Cost Estimation Models,” Proc. 21st International Cor ference on Software Engineering, pp. 313-322, 1999.

14-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

M Veera Chandra Kumar, K. Satyanarayana, M.N.V.V. Brahmam

Paper Title:

An SMC based RZVDPWM Algorithm of Vector Controlled Induction Motor Drive for Better Speed Response with Reduced Acoustical Noise

Abstract:  In this paper, an sliding mode controller (SMC) based Random Zero vector Distribution PWM (RZVDPWM) algorithm of vector controlled induction motor drive for better speed response with reduced Acoustical Noise is analyzed. In order to mitigate the difficulty faced in the conventional Space Vector PWM (SVPWM) approach, the proposed RZVDPWM algorithm is created by taking the concept of Simplified PWM sequence. This algorithm is developed by using the concept of random number generation technique. Simulation studies are carried out to validate proposed RZVDPWM algorithm, the results obtained are presented and compared. The simulation results shows that the overall performance of SMC based RZVDPWM drive is better when compared to SVPWM technique under different conditions of operation.

Keywords:
 Simplified PWM sequence, SVPWM, RZVDPWM, Vector control, SMC


References:

1.    F. Blaschke “The principle of field orientation as applied to the new transvector closed loop control system for rotating-field machines,” Siemens Review, 1972, pp 217-220.
2.    Heinz Willi Vander Broeck, Hnas-Christoph Skudelny and Georg Viktor Stanke, “Analysis and realization of a pulse width modulator based on voltage space vectors” IEEE Trans. Ind. Applicat., vol. 24, no. 1, Jan/Feb 1988, pp. 142-150.

3.    Michael M.Bech, Frede Blaabjerg, and John K. Pedersen, “Random modulation techniques with fixed switching frequency for three-phase power converters” IEEE Trans. Power Electron., vol.15, no.4, pp. 753-761, Jul, 2000.

4.    S-H Na, Y-G Jung, Y-C. Lim, and S-H. Yang, “Reduction of audible switching noise in induction motor drives using random position space vector PWM” IEE. Proc. Electr. Power Appl., vol.149, no.3, pp. 195-200, May, 2002.

5.    Andzrej M. trzynadlowski, Konstantin, Yuin Li, and Ling Qin, “A novel random PWM technique with low computational overhead and constant sampling frequency for high-volume, low-cost applications” IEEE Trans. Power Electron., vol. 20, no.1, pp.116-122, Jan, 2005.

6.    Dae-Woong Chung, Joohn-Sheok Kim and Seung-Ki Sul, “Unified voltage modulation technique for real-time three-phase power conversion” IEEE Trans. Ind. Applicat., vol. 34, no. 2, Mar/Apr 1998, pp. 374-380.

7.    T. Brahmananda Reddy, J. Amarnath and D. Subbarayudu, “Improvement of DTC performance by using hybrid space vector Pulse width modulation algorithm” International Review of Electrical Engineering, Vol.4, no.2, pp. 593-600, Jul-Aug, 2007.

8.    K. Satyanarayana1, J. Amarnath2, and A. Kailasa Rao1, “Hybrid PWM Algorithm with Low Computational Overhead for Induction Motor Drives for Reduced Current Ripple” ICGST-ACSE journal, vol.10, isuue.1, pp. 29-37, Dec, 2010.

9.    N Subba rao, K. Satyanarayana, K.Siva Prasad “Performance Improvement of Sliding Mode Controller based Indirect Vector Controlled Induction Motor Drives” International Journal of Engineering and Advanced Research Technology (IJEART)  ISSN: 2454-9290, Volume-2, Issue-1, January 2016.

 

22-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Thamizharasi A, Jayasudha J.S

Paper Title:

Face Recognition of Enhanced Contrast Limited Adaptive Histogram Equalization using Feature Extraction Method

Abstract:  Face recognition is most widely useful for social networks and surveillance applications. Face recognition is complex if there are variations in light. The proposed work is to develop an illumination invariant face recognition system by enhancing Contrast Limited Adaptive Histogram Equalization (CLAHE). The face recognition of Enhanced CLAHE is done using feature extraction method. The features extracted are DWT statistical features, moments, texture, regional features, shape ratios, Fourier descriptors and facial features from Enhanced CLAHE images. These features are combined to create a feature vector. The feature vector is classified using Support Vector Machine (SVM) classifier and Multilayer Perceptron (MLP) neural network. The efficiency of feature vector is tested with three public face databases AR, Yale and ORL. The testing result proves that feature vector has high recognition accuracy rate.

Keywords:
  face recognition, CLAHE, Enhanced CLAHE, feature vector, illumination invariant, SVM and MLP classifier.


References:

1.       R. Chellappa, C.L. Wilson, and S. Sirohey, “Human and machine recognition of faces: A survey,” Proceedings of. IEEE, vol. 83, pp. 705–740, 1995.
2.       Franco Scarselli and Ah Chung Tsoi, “Universal Approximation Using Feed forward Neural Networks: A Survey of Some Existing   Methods, and Some New Results”, Neural Networks, Vol 11, No 1, pp15-37, 1998

3.       Thamizharasi  and J.S. Jayasudha, “An Illumination invariant face recognition by enhanced contrast limited adaptive histogram equalization”, ICTACT Journal on Image and Video Processing, May 2016, Vol. 06, Issue: 04, ISSN: 0976-9102

4.       Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing”, Addison-Weseky, 1993.

5.       Taiping Zhang, Yuan Yan Tang, Bin Fang and Xiaoyu Liu, “Face Recognition Under Varying Illumination using Gradientfaces,” IEEE Transactions on Image Processing, Vol. 18, No. 11, pp. 2599-2606, 2009.

6.       H.Wang, S.Z.Li and Y.Wang, “Face Recognition under varying lighting conditions using self-quotient image,” in Proceedings of IEEE International Conferencec on Automatic Face and Gesture Recognition, pp. 819-824, 2004

7.       Zhang Y., Tian J., He X. and Yang X., “MQI Based Face Recognition under Uneven Illumination,” Advances in Biometircs, Vol. 4642, pp. 290-298, 2007

8.       D.J.Jobson, Z.Rahman and G.A.Woodell , “A multiscale retinex for bridging the gap between color images and the human observation of scenes,” IEEE Transactions on Image Processing, Vol. 6, pp. 965-976, 1997

9.       D.J.Jobson, Z.Rahman and G.A.Woodell , “Properties and Performance of a Center/Surround Retinex,” IEEE Transactions on Image Processing, Vol. 6, No. 3, pp. 451-462, 1997.

10.    T.Chen, W.Yin, X.S.Zhou, D.Comaniciu and T.S.Huang, “Total Variation Models for variable lighting face recognition,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, pp. 1519-1524, 2006.

11.    X.Tan and B.Triggs , “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” IEEE Transactions on Image Processing, Vol. 19, pp. 1635-1650, 2010

12.    A.S.Georghiades , P.N.Belhumeur and D.J.Kriegman , “From few to many: Illumination cone models for face recognition under variable lighting and pose,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 23, No. 6, pp. 643-660, 2001

13.    Dao Qing Dai and Hong Yan, Wavelets and Face Recognition.: ISBN 978-3-902613-03-5, I-Tech, Austria, pp. 558, 2007

14.    X.Xie, W.Zheng, J.Lai, P.C.Yuen and C.Suen , “Normalization of face illumination based on large and small-scale features,” IEEE Transactions on Image Processing, Vol. 20, pp. 1807-1821, 2011.

15.    Zhenhua Chai, Heydi Mendez Vazquez, Ran He and Tieniu Tan, “Gabor Ordinal Measures for Face Recognition,” IEEE Transactions on Information Forensics and Security, Vol. 9, No. 1, 2014.

16.    Jiwen Lu and Yap-Peng Tan, “Cost-Sensitive Subspace Analysis and Extensions for Face Recognition,” IEEE Transactions on Information Forensics and Security, Vol. 8, No. 3, pp. 510-519, 2013

17.    Weiping Chen and Yongsheng Gao, “Face Recognition using Ensemble String Matching,” IEEE Transactions on Image Processing, Vol. 22, No. 12, pp. 4798-4808, 2013.

18.    Jiwen Lu, Venice Erin Liong, Gang Wang  and Pierre Moulin, “Joint Feature Learning for Face Recognition,” IEEE Transactions on Information Forensics and Security, Vol. 10, No. 7, pp. 1371-1383, 2015

19.    Luciano da Fontoura Costa and Roberto Marcondes Cesar Jr., “Shape Classification and Analysis:Theory and Practice”, 2nd Edition, Pages. 674, 2009

20.    Christican Walck , “Hand-book on Statistical Distributions for experimentalists”, Internal Report, University of Stockholm, Pages.190, 1996

21.    Shailendrakumar M.Mukane , Dattatraya S.Bormane , and Sachine R.Gengaje , “Wavelet and Co-occurence Matrix based Rotation Invariant Features for Texture Image Retrieval Using Fuzzy Logic,” International Journal of Computer Applications, ISSN 0975-8887, Vol. 24, No. 7, 2011

22.    Dengsheng Zhang and Guojun Lu , “A Comparative Study on Shape Retrieval Using Fourier Descriptors with Different Shape Signatures,” Journal of Visual Communication and Image Representation, Vol.14, No. 1, pp. 39-57, 2003

23.    Mark Nixon and Alberto Aguado, “Feature Extraction and Image Processing for Computer Vision”, Third Edition,  Academic Press, Pages. 350, 2012

24.    V.Vapnik , “The Nature of Statistical Learning Theory”, Springer-Verlag, Newyork, Pages.39, 1995

25.    Franco Scarselli and Ah Chung Tsoi , “Universal Approximation Using Feed Forward Neural Networks: A Survey of Some Existing Methods and Some New Results,” Neural Networks, Vol. 11, No. 1, pp. 15-37, 1998

26.    A.M.Martinez and R.Benavente, “The AR Face Database,” 24, CVC Technical Report, 1998.

27.    (Checked on 10th September 2016) ORL Face database. [Online]. http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html

28.    P.N.Belhumeur, J.P.Hespanha and D.J Kriegman, “Eigenfaces vs Fisherfaces: Recognition using class specific linear projection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 19, No. 7, 1997.

29.    Rafael C.Gonzalez , Richard E.Woods  and Steven L.Eddins, “Digital Image processing with MATLAB”, 2nd Edition, 2009

30.    (Checked on 10th September, 2016) Weka Software. [Online]. http://www.cs.waikato.ac.nz/ml/weka/

31.    Amany Farag and Randa Atta , “Illumination Invariant Face Recognition Using the Statistical Features of BDIP and Wavelet Transform,” International Journal of Machine Learning and Computing, Vol. 2, No. 1, 2012

32.    Kai Li, Zhen Liu and Peng Tang , “On Linear Discriminant Analysis and its Variants in Face Recognition,” International Journal of Artificial Intelligence and Mechatronics, Vol. 4, No. 1, 2015.

33.    Jamal Husain Shah , Muhammad Sharif, Mudassar Raza and Aisha Azeem, “A Survey: Linear and Nonlinear PCA Based Face Recognition Techniques,” The International Arab Journal of Information Technology, Vol. 10, No. 6, 2013.

34.    Liu N., Wang H. and Yau W., “Face Recognition with Weighted Kernel Principal Component Analysis,” in Proceedings of the nineth International Conference on Control, Automation, Roboticcs and Vision, pp. 1-5, 2006.

35.    Gautham Sitaram Yajia, Sankhadeep Sarkara, K Manikantana  and S Ramachandran, “DWT feature extraction based face recognition using intensity mapped unsharp masking and laplacian of Gaussian filtering with scalar multiplier,” in Second International Conference on Communication, Computing and Security (ICCCS-2012), Procedia Technology, Vol.6, pp. 475-484, 2012

36.    Zahraddeen Sufyanu, Fatma S.Mohamad, Abdulganiyu A.Yusuf and Mustafa B.Mamat, “Enhanced Face Recognition Using Discrete Cosine Transform,” Engineering Letters, Vol. 24, No. 1, pp. 52-61, 2016

37.    M.H Yang, “Kernel Eigenfaces vs Kernel Fisherfaces: Face Recognition using Kernel Methods,” in Proceedings of fifth IEEE International Conference on Automatic Face and Gesture Recognition (RGR’02), pp. 215-220, 2002

 

29-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

K. Murali Krishna, S. Ashok Reddy, K. Siva Shankar

Paper Title:

MPPT for Standalone PV System under Partially Shaded Condition using Genetic Algorithm

Abstract:   sun oriented vitality is spotless, renewable and its decentralized character is suitable well at the scattered State of the zones with low thickness of populace. The expense of Electricity from the sun oriented cluster framework is more costly than the power from the utility network. In this way, it is important to work the PV framework at most extreme proficiency by following greatest force point at any natural condition. In this work, the Genetic algorithm is utilized to control the operation of the PV exhibit keeping in mind the end goal to separate the most extreme force. The outcomes acquired are looked at and talked about.

Keywords:
PV System, Maximum Power Point Tracking (MPPT), Genetic algorithm, P&O algorithm.


References:

1.       Bidyadhar Subudhi and Raseswari Pradhan, “A Comparative Study on Maximum Power Point Tracking Techniques for Photovoltaic Power Systems” IEEE Transactions on Sustainable Energy, 2013, Vol. 4, No. 1
2.       Moacyr Aureliano Gomes de Brito, Luigi Galotto, Jr., Leonardo Poltronieri Sampaio, Guilherme de Azevedo e Melo, and Carlos Alberto Canesin, Senior Member, “Evaluation of the Main MPPT Techniques for Photovoltaic Applications” IEEE Transactions on Industrial Electronics, 2013, Vol. 60, No. 3.

3.       M. A. S. Masoum, H. Dehbonei, and E. F. Fuchs, “Theoretical and experimental analyses of photovoltaic systems with voltage and current based maximum power point tracking,” IEEE Trans. Energy Conv., 2002, Vol. 17, No. 4, pp. 514–522

4.       Subudhi and R. Pradhan, “Characteristics evaluation and parameter extraction of a solar array based on experimental analysis,” in Proc. 9th IEEE Power Electron. Drives Syst., Singapore, 2011

5.       T. Esram, J. W. Kimball, P. T. Krein, P. L. Chapman, and P. Midya, “Dynamic maximum power point tracking of photovoltaic arrays using ripple correlation control,” IEEE Trans. Power Electron.,2006, Vol. 21, No.5, pp. 1282–1291

6.       K. Ishaque, Z. Salam, and H. Taheri, “Simple, fast and accurate two diode model for photovoltaic modules,” Solar Energy Mater. Solar Cells, 2011, Vol. 95, pp. 586–594.

7.       LI Chun, ZHU Xin, SUI Sheng and HU Wan, “Maximum Power Point Tracking of a Photovoltaic Energy System Using Neural Fuzzy Techniques”, J Shanghai Univ (Engl Ed), 2009, 13(1), pp.29-36.

8.       Abdulaziz M, S. Aldobhani and Robert John, ” Maximum Power Point Tracking of PV System Using ANFIS Prediction and Fuzzy Tracking”, Procs. Of the Inter. Multi Conf. of engineers and Computer  cientists 2008, vol. II, IMECS 2008, 19-21 March,Hong Kong.

9.       K. Abdelsalam, A. M. Massoud, S. Ahmed and P. N. Enjeti, “Highperformance adaptive perturb and observe MPPT technique for photovoltaic-based microgrids,” IEEE Trans. Power Electron., vol. 26, no. 4, pp. 1010–1021, Apr. 2011

10.    D.G. Lorente, S. Pedrazzi, G. Zini, A. Dalla Rosa, P. Tartarini, Mismatch losses inPV power plants, Sol. Energy 100 (2014) 42–49.

11.    Y.Shaiek, M.Ben Smida, A.Sakly, M.F.Mimouni“Partial Shading Impact on MPPT Methods of Solar PV Generator’ ,Solar Energy ,2013

12.    S. Silvestre, A. Boronat, A. Chouder, Study of bypass diodes configuration on PVmodules, Appl. Energy 86 (2009) 1632–1640.

13.    S.Daraban, D. Petreus, C. Morel“A novel MPPT (maximum power point tracking) algorithm based on a modified genetic algorithm specialized on tracking the global maximum power point in photovoltaic systems affected by partial shading”,Energy,2014

 

35-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Preethi W, Binu Rajan M R

Paper Title:

Atomic Web Service Reliability Prediction

Abstract:  Web service is one of the main supporting underlying technologies in Service Oriented Architecture (SOA). This work is focused on atomic web service reliability, as one of the most important non-functional properties. Service reliability can be defined as the probability that a service invocation gets retrieved successfully, i.e. correct response to the service invocation gets successfully retrieved under the specified conditions and the time constraints. A model-based collaborative filtering approach CLUS (CLUStering) is used to estimate the reliability of an ongoing web service. It considers user, service and environment specific parameters to provide a more accurate description of the service invocation context. Incorporating K-Strings clustering algorithm is highly prominent for clustering of high dimensional data rather than using K-Means algorithm. This aims to generate higher accuracy and efficiency to the prediction model.

Keywords:
 reliability prediction, K-Strings, atomic web services, QoS prediction, K-Means

References:
1.       M. P. Papazoglou, “Service-oriented computing: Concepts, characteristics and directions,” in Web Information Systems Engineering, 2003. WISE 2003. Proceedings of the Fourth International Conference on. IEEE, 2003, pp. 3–12.
2.       Hongbing Wang, Haixia Sun and Qi Yu, “Reliable Service Composition via Automatic QoS Prediction”, IEEE 2013.

3.       L. Zeng, B. Benatallah, A. Ngu, M. Dumas, J. Kalagnanam, and H. Chang, “Qos-aware middleware for web services composition,” Software Engineering, IEEE Transactions on, 2004.

4.       D. Wang and S. T. KISHOR, “Modeling user-perceived reliability based on user behavior graphs,” International Journal of Reliability, Quality and Safety Engineering, 2009.

5.       V. Cortellessa and V. Grassi, “Reliability modeling and analysis of service-oriented architectures,” pp. 339–362

6.       Z. Zheng and M. R. Lyu, “Collaborative reliability prediction of service-oriented systems,” in ACM/IEEE International Conference on Software Engineering – Volume 1, ACM, 2010.

7.       Z. Zheng, H. Ma, M. R. Lyu, and I. King, “Qos-aware web service recommendation by collaborative filtering,” IEEE Transactions on Services Computing, 2011.

8.       L. Baresi and S. Guinea, “Event-based multi-level service monitoring,” in ICWS, pp. 83–90, 2013.

9.       Marin Silic, Goran Delac, and Sinisa Srbljic, “Prediction of Atomic Web Services Reliability for QoS-aware Recommendation”, IEEE 2014.

10.    G. Delac, M. Silic, and S. Srbljic, “A reliability improvement method for soa-based applications,” Dependable and Secure Computing, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2014.

11.    V.GrassiandS.Patella,“Reliability prediction for service-oriented computing environments,” IEEE Internet Computing, 2006.

12.    W. T. Tsai, D. Zhang, Y. Chen, H. Huang, R. Paul, and N. Liao, “A software reliability model for web services,” in International Conference on Software Engineering and Applications, 2004.

13.    J. Ma and H.-p. Chen, “A reliability evaluation framework on composite web service,” in IEEE International Symposium on Service-Oriented System Engineering, IEEE Computer Society, 2008.

14.    B. Li, X. Fan, Y. Zhou, and Z. Su, “Evaluating the reliability of web services based on bpel code structure analysis and runtime information capture,” in Asia Pacific Software Engineering Conference 2010, IEEE Computer Society, 2010.

15.    X. Su and T. M. Khoshgoftaar, “A survey of collaborative filtering techniques,” Adv. in Artif. Intell., vol. 2009.

16.    B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, ‘‘Item-Based Collaborative Filtering Recommendation Algorithms,’’ in Proc. 10th Int’l Conf. World Wide Web, 2001, pp. 285/295.

17.    Z. Zheng and M.R. Lyu, ‘‘Collaborative Reliability Prediction of Service-Oriented Systems,’’ in Proc. 32nd ACM/IEEE Int’l Conf. Softw. Eng., New York, NY, USA, 2010, vol. 1, pp. 35/44, ACM.

18.    Klein, F. Ishikawa, and S. Honiden, ‘‘Towards NetworkAware Service Composition in the Cloud,’’ inProc. 21st Int’l Conf. World Wide Web, 2012, pp. 959/968.

19.    N.B. Mabrouk, S. Beauche, E. Kuznetsova, N. Georgantas, and V.Issarny,‘‘QoS-AwareServiceCompositioninDynamicService Oriented Environments,’’ in Proc. 10th ACM/IFIP/USENIX Int’l Conf. Middleware, 2009, pp. 123/142.

20.    Y. Wang, W.M. Lively, and D.B. Simmons, ‘‘Web Software Traffic Characteristics and Failure Prediction Model Selection,’’ J. Comput. Methods Sci. Eng., vol. 9, no. 1, pp. 23-33, Apr 2009.

21.    “Service Selection for Web Services with Probabilistic QoS” , IEEE transactions on services computing, vol. 8, no. 3, may/june 2015.

22.    Mingdong Tang et al., “Collaborative Web Service Quality Prediction via Exploiting Matrix Factorization and Network Map”, IEEE 2015.

23.    Xin Luo et al., “Generating Highly Accurate Predictions for Missing  QoS Data via Aggregating Nonnegative Latent Factor Models”, IEEE 2015.

24.    Y. Xu, J. Yin, and W. Lo, “A unified framework of QoS-based web service recommendation with neighborhood-extended matrix factorization,” in Proc. 6th IEEE Int. Conf. Service Oriented Computing and Applications (SOCA 2013), 2013, pp. 198–205.

25.    X.Luo,Y.-N.Xia,andQ.-S. Zhu, “Incremental collaborative filtering recommender based on regularized matrix factorization,” Knowl. Based Syst., vol. 27, pp. 271–280, 2012.

26.    Jianlong Xu, Zibin Zhen, and Michael R. Lyu, “Web Service Personalized Quality of Service Prediction via Reputation-Based Matrix Factorization”, IEEE transactions on reliability, vol. 65, no.1, march 2016.

27.    Xin Luo et al., “Generating Highly Accurate Predictions for Missing QoS Data via Aggregating Nonnegative Latent Factor Models”, IEEE 2015.

28.    R.XuandI.Wunsch,D.,“Survey of clustering algorithms”, Neural Networks, IEEE Transactions on, 2005.

29.    Marin Silic, Goran Delac, and Sinisa Srbljic, “Prediction of Atomic Web Services Reliability for QoS-aware Recommendation”, IEEE, 2015.

30.    Y. Wang, W. M. Lively, and D. B. Simmons, “Web software traffic characteristics and failure prediction model selection,” J. Comp. Methods in Sci. and Eng., 2009.

31.    Y. Baryshnikov, E. Coffman, G. Pierre, D. Rubenstein, M. Squillante, and T. Yimwadsana, “Predictability of web-server traffic congestion,” Web Content Caching and Distribution, International Workshop on, 2005.

32.    M. Andreolini and S. Casolari, “Load prediction models in web based systems,” in International conference on Performance evaluation methodolgies and tools, ACM, 2006.

33.    Y.-T. Lee and K.-T. Chen, “Is server consolidation beneficial to mmorpg? a case study of world of warcraft,” in Cloud Computing, 2010 IEEE 3rd International Conference on, pp. 435–442, 2010.

34.    Viet-Hoang Le and Sung-Ryul Kim, “K-strings algorithm, a new approach based on Kmeans”, ACM 2015.

 

42-46

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Hameed R. M. Al-Mishmish, H. S. Al-Raweshidy

Paper Title:

Interface and Traffic Handover Mechanism in Multi-homed Mobile IP Node

Abstract:  Network Mobility is a relatively new networking concept aimed at improving the reliability and scalability of data communications within vehicles moving at high speed. The growing use of IP devices in portable applications has created the demand for mobility support for entire networks of IP devices. Users are expected to be connected to the internet from anywhere at any time this facilities will provide to own user to more than mobile devices, there are several mobile devices such as mobile phone, laptop and PDA and other type, all these devices could have multiple network interfaces, these interfaces enable mobile devices to maintain ongoing communication while its moving from one point to another.

Keywords: Mobile IP, IETF, Network Mobility, Network Simulator (NS2), Multi-homed node, Interface selection mechanism, Throughput, Delay, Jitter.

References:

1.       Hesham Soliman, “Mobile IPv6, mobility in wireless internet,” April 2004.
2.       C. Perkins, Ed. Internet Engineering Task Force (IETF), RFC 5944, 2010.

3.       Nicolas Montavont and Thomas Noel and Thierry Ernst, “Multihoming in Nested Mobile Networking”, IEEE Jan 2004.

4.       “Introduction to Mobile IP” Cisco IOS IP. 2001.

5.       Albert Cabellos-Aparicio, Jordi Domingo Pascual, “Load Balancing in Mobile IPv6’s Correspondent Networks with Mobility Agents” IEEE 2007.

6.       M. Suthar, A. Ranavadiya, and S. Patel “A survey paper on mobile IP,”International Journal for Scientific Research and Development. IJSRD,Vol. 2, pp. 655-658, 2014.

7.       Esraa Hassan Abdelhafiz Alsaied, Sayda Maowia Alshareef Modatheir “Performance Evaluation of Mobile IP with DSDV Routing Protocol using NS2” IEEE 2015.

8.       Noureen, Z. llyas, 1. Shahzadi, M. Iqbal, M. Shafiq and A. Irshad “Mobile IP issues and their potential solutions: an overview,” Advances in Computer Science: an International Journal. ACSlJ, Vol. 3, No. 07, pp. 106-114,2014.

9.       Younghwan Choi, Bongsoo Kim, Sang-Ha Kim, Minkyo In, and Seungyun Lee. “A Multihoming Mechanism to Support Network Mobility in Next Generation Networks”, IEEE Aug 2006.

10.    Hiroshi Esaki, “Multi-Homing and Multi-Path Architecture Using Mobile IP and NEMO Framework”, IEEE, 2004.

11.    Christer Åhlund, Robert Brännström and Arkady Zaslavsky, “A Multihoming approach to Mobile IP”, Luleå University of Technology, Skellefteå Campus, SE-931 87 Skellefteå, Sweden.

 

47-50

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

M Indu, Kavitha K V

Paper Title:

A Varied Efficient Approach on Sketch Based Image Retrieval System

Abstract:   Especially with the vogue of touch screen devices, retrieval of images that match with a hand-drawn query sketch became a highly desirable feature. Since 1990s, query-by sketch has been an extensive study. Due to the lack of effective and efficient matching solutions they are still very challenging. Compared to face recognition, face photo recognition using face sketch is relatively a younger area. The exceptional triumph of search techniques have encouraged to revisit the problem and focused at solving the problem of sketch based image retrieval. To this end, a novel method is presented here which is as follows: for each image in the database feature extraction is carried out and edge correspondence metric is computed which will be stored. Similarly for the query sketch the same steps are repeated. For each value the query sketch searches for a match score. The database image with highest match score is the retrieved match against the query sketch from the face photo database. An optimized algorithm is also incorporated for images that are corrupted by various types of noises. This method can handle non-facial factors such as such as hair style, hairpins, and glasses. During investigation results show that the proposed method outperforms several state of-the-arts in terms of accuracy and running time.

Keywords:
 Face sketch synthesis, Feature vector, Edge correspondence metric, Sketch based image retrieval.


References:

1.       W. Zhao, R. Chellappa, A. Rosenfeld, and J. Phillips, “Face recognition: A literature survey,” ACM Comput. Surv., vol. 35, no. 4, pp. 399–458, 2003.
2.       Chalechale, G. Naghdy, and A. Mertins, “Edge image description using angular radial partitioning,” IEEE Proc.-Vis., Image Signal Process., vol. 151, no. 2, pp. 93–101, Apr. 2004.

3.       R. Uhl, N. da Vitoria Lobo, and Y. Kwon, “Recognizing police sketches of faces,” in Proc. IEEE Workshop Appl. Comput. Vis., 1994, pp. 129–137.

4.       J. W. Brahan, K. P. Lam, H. Chan, and W. Leung, “AICAMS—Artificial intelligence crime analysis and management system,” Applications and Innovations in Expert Systems V, J. Knowl. Based Syst., pp. 143–153, 1997.

5.       Turk, M. and Pentland, A., “Eigenfaces for recognition,” Journal of Cognitive Neuroscience 3(1), 71-86 (1991).

6.       Phillips, P., Scruggs, W., OToole, A., Flynn, P., Bowyer, K., Schott, C., and Sharpe, M., “Frvt 2006 and ice 2006 large-scale results,” in [NISTIR 7408], (2007).

7.       Gross, R., Baker, S., Matthews, I., and Kanade, T., “Face recognition across pose and illumination,” in [Handbook of Face Recognition], Li, S. Z. and Jain, A. K., eds., Springer-Verlag (2004).

8.       Wright, J., Yang, A. Y., Ganesh, A., Sastry, S. S., and Ma, Y., “Robust face recognition via sparse representation,” IEEE Trans. Pattern Analysis & Machine Intelligence 31(2), 210-227 (2009).

9.       Tang, X. and Wang, X., “Face sketch synthesis and recognition,” in [Proc. of IEEE International Conference on Computer Vision], 687-694 (2003).

10.    Tang, X. and Wang, X., “Face sketch recognition,” IEEE Trans. Circuits and Systems for Video Technology 14(1), 50-57 (2004).

11.    Liu, Q., Tang, X., Jin, H., Lu, H., and Ma, S., “A nonlinear approach for face sketch synthesis and recognition,” in [Proc. of IEEE Conference on Computer Vision & Pattern Recognition], 1005-1010 (2005).

12.    Wang, X. and Tang, X., “Face photo-sketch synthesis and recognition,” IEEE Trans. Pattern Analysis & Machine Intelligence 31, 1955-1967 (Nov. 2009).

13.    W. Konen, “Comparing facial line drawings with gray-level images: A case study on PHANTOMAS,” in Proc. Int. Conf. Artif. Neural Netw., 1996, pp. 727–734.

14.    Y. Gao and M. K. H. Leung, “Face recognition using line edge map,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 6, pp. 764–779, Jun. 2002.

15.    G. Mackenzie, “Agent-based sketch recognition,” Ph.D. dissertation, Univ. Nottingham, Nottingham, U.K., 2003.

16.    D. Marr and E. Hildreth, Theory of edge detection”, Proc. Royal Society, London, 1980, pp.187-217.

17.    E. Argyle. “Techniques for edge detection,” Proc. IEEE, vol. 59, pp. 285-286, 1971.

18.    M Sudarshan, P Ganga Mohan and Suryakanth, V Gangashetty “Optimized Edge Detection Algorithm for Face Recognition”.

 

51-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Gailan Abdul Qadir, Hassan Ali Salman, Sabah Shehd Abdulabas

Paper Title:

Energy Ventilation Air Flow Electronic Meter

Abstract: The measurement of ventilation losses is one of several types in the energy balance of building, depends on nonlinear single slope type analog to digital convertor (NL-ADC), in this papera digital electronics method is described which is useful in measuring the ear flow via leakage per meter of length of windows and doors. The pressure difference signal is provided as an electrical voltage through appropriate transducer, the digital instrument receives the voltage and processes it together with input coming data of the living area geometry, the resulting readout is digital output number representing of the air flow in the building, the energy ventilation meter will be tested in two different room to measure energy conservation in building related to ventilation losses measurement.

Keywords:
 (NL-ADC), measurement, papera digital electronics, measurement. Appropriate transducer


References:

1.    J.F. kreider and F.Kreith,”” Solar energy Handbook”, 1981.
2.    Moran M.J. and Shapiro H.N. Fundamentals of Engineering Thermodynamics. Second edition. New York: John Wiley & Sons, 1992.

3.    William H. Hayt , Gerold W. Neudeck ” Electronic Circuit Analysis and Design”  2nd Edition, 1989.

4.    J. Chris Stratton, W.J.N Turner, Craig P. Wray, Iain S. Walker,”Measuring Residential Ventilation  System Airflows”,2012.

5.    Lian Zhang, Yu Feng Zhang,” Research on Heat Recovery Technology for Reducing the Energy Consumption of Dedicated Ventilation Systems: An Application to the Operating Model of a Laboratory”, Energies,4 January 2016.

56-58

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

12.

Authors:

Vijay Kumar, Rakesh Kumar

Paper Title:

Optimal Analysis of Economic Load Dispatch using Artificial Intelligence Techniques

Abstract:  Applications of artificial intelligence to economic load dispatch problems are discussed in the paper. The fuelcost equation of a thermal plant is generally expressed as continuous quadratic equation. In real situations the fuel cost equations can be discontinuous. Continuous and discontinuous fuel cost equations are explained here as thermal palnts cost equation are continuous which are further a quadratic equation.GA technique used for 30 bus test system have continuous fuel cost equations. Various results compared with conservative quadratic programming methods to analyze superiority of the suggested artificial intelli-gence technique. A 10-generator system each with distributed areas is considered and particle swarm algorithm engaged to reduce the cost of generation. All obtained results compared with other conventional methods.

Keywords:
GA, ELD, PSO, Evolutionary methods


References:

1.       Jiang and S. Ertem, “Economic dispatch with non-monotonically  increasing incremental cost units and transmission system losses”, IEEE Transactions on Power Systems, vol. 10, no. 2, pp. 891-897, May 1995.
2.       H.W. Dommel, “Optimal power dispatch”, IEEE Transactions on Power Apparatus and Systems, PAS93 No. 3, pp. 820–830, 1974.

3.       N. Ramaraj and K. Nagappan, “Analytical method to optimize gen-eration schedule”, Journal of The Institution of Eng-neers (India), vol. 66, p 240, 1987.

4.       C.E. Lin and G.L. Vivianib, “Hierarchical Economic Dispatch of Piecewise Quadratic Cost Functions”, IEEE Transactions of PAS, vol.103, no 6, June, 1984.

5.       N. Ramaraj and R Rajaram, “Analytical approach to optimize genera-tion schedule of plant with multiple fuel options”, Journal of The Institution of Engineers (India), vol. 68, p 106, 1987

6.       N. Ramaraj and R Rajaram, “Analytical approach to optimize genera-tion schedule of plant with multiple fuel options”, Journal of The Institution of Engineers (India), vol. 68, p 106, 1987.

7.       J.V. Guttag, The Specification and Application to Program-ming of Abstract Data Types, Ph.D. Thesis, Dept. of Computer Science, Uni-versity of Toronto (1975).

8.       J.V. Guttag and J.J. Horning, “Formal Specification as a De-sign Tool,”Seventh ACM Symposium on Principles of Program-ming Languages, Las Vegas (1998), pp-2-9.

9.       J.V. Guttag, “Notes on Type Abstraction, Version 2,’’ IEEE Transac-tions on Software Engineering,pp-46-49, vol. SE-6, no. 1 (1980).

10.    C.A.R. Hoare, “An Axiomatic Basis for Computer Pro-gramming,”Communications of the ACM, vol. 12, no. 10 (1985).

11.    A.Igelais, “Proofs of Correctness of Data Representations,” Acta Informatica, pp- 56,vol. 1, no. 4 (2006).

12.    J. H. Holland, Adaptation in Natural and Artficial Systems, Univer-sityof Michigan Press, Ann Arbor, MI, 1975.S. Koziel and Z. Michalewicz, Evolutionary algorithms, homomorphous map-pings, and constrained parameter optimization, Evolutionary Computation 7(1), 19-44, 1999.

13.    T.S. Metcalfe, P. Charbonneau, Stellar structure modeling using a parallel genetic algorithm for objective global optimiza-tion, Journal of Computational Physics 185, 176-193, 2003.

14.    Z. Michalewicz, A Survey of Constraint Handling Tech-niques in Evolutionary Computation Methods, Evolutionary Pro-gramming, Vol.4, pp.135, 1995.Z. Michalewicz, Genetic algo-rithms + data structures =evolution pro-grams,Berlin,Springer,1996

 

59-63

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

13.

Authors:

Arathy S. Mohan, M. Nazeer

Paper Title:

Experimental Investigation on the Properties of Gap Graded Aggregate Medium Strength Concrete

Abstract:   Concrete is a mixture of cementations material, aggregate, and water. Aggregate is commonly considered inert filler, which accounts for 60 to 80 percent of the volume and 70 to 85 percent of the weight of concrete. Thus concrete properties are highly affected by physical properties of its aggregate. The particle size distribution of coarse and fine aggregate (grading of aggregate) may have an effect on concrete behaviour. However, due to the inherent difficulties related to the characterization of fine sized particles, little research has been made to evaluate the effect of grading. In the present investigation, packing density of combined aggregate is considered as the criteria for aggregate gradation thus selecting four combinations of gap graded aggregate for making medium strength (M40) concrete mixes. The workability, density and strength results from these concrete mixes are finally compared with conventional concrete to propose a suitable aggregate gradation. Within the premises of this study, it is concluded that gap graded concrete, though of a relatively stiffer and drier mix, can be placed and finished without undue effort for the non-structural, massive construction works demand less workability wherein continuously graded concrete has been customarily used heretofore. A considerable saving in cement content, sand and notable improvements in mechanical properties are the realistically achievable advantages through the use of gap graded concrete. Good control and, above all, care in handling, so as to avoid segregation, are essential.

Keywords:  aggregate, gap graded, gradation, packing density

References:

1.       Quiroga, P. N. (2003)The Effect of the Aggregates Characteristics on the Performance ofPortland Cement Concrete, Doctoral Dessertation,The University of Texas at Austin.
2.       Elices, M. and C.G. Rocco (2008) Effect of Aggregate Size on the Fracture and Mechanical Properties of a Simple Concrete, Journal of Engineering Fracture Mechanics,75, 3839-3851.

3.       Ashraf, W. B. and  M. A. Noor (2011) Performance-Evaluation of Concrete Properties for Different Combined Aggregate Gradation Approaches, The Twelfth East Asia-Pacific Conference on Structural Engineering and Construction, 14, 2627-2634.

4.       Hilf, J. W. (1987) Rolled Concrete Dams Using GapGraded Aggregate, Journal of Construction Engineering and Management, 1, 27-33.

5.       Meddah, M.S., Zitouni, S. and S. Belaabes (2009) Effect of content and particle size distribution of coarse aggregate on the compressive strength of concrete, construction of building materials, 24, 505-518.

6.       Shetty, M. S., Concrete Technology, Ram Nagar, New Delhi, S. ChandPublications,2012.

7.       IS: 12269-1987- Specification for 53 Grade Ordinary Portland Cement, Bureau of Indian Standards, New Delhi, 2000.

8.       IS: 383-1970, Specification for Coarse and Fine Aggregate from Natural Sources for Concrete, Bureau of Indian Standards, New Delhi.

9.       IS: 10262-1982, Recommended guidelines for Concrete Mix Design, Bureau of Indian Standards, New Delhi, 2000.

10.    IS: 2386 (Part 1) –1963, Methods of Test for Aggregates for Concrete Part 1- Particle Size and Shape, Bureau of Indian Standards, New Delhi.

11.    Al-Sahawneh, E. I. (2015) A New Approach for the Determination of Tensile and Shear Strengths of Normal Weight Concrete, International organization of Scientific Research, 05, 38-48.

12.    IS: 516-1959,Method of Tests for Strength of Concrete, Bureau of Indian Standards, New Delhi, India.

13.    IS: 1199-1959, Methods of Sampling and Analysis of Concrete, Bureau of Indian Standards, New Delhi.

 

64-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Ambika P, Binu Rajan M.R

Paper Title:

Link Based Overlapping Community Detection and Medical Data Mining of Social Media for Cancer Prognosis

Abstract: Social media, ranging from personal messaging to live foras, is providing unlimited opportunities for patients to exchange their views on their experiences with drugs and devices. Here the aim is to understand the correlation between user posts and positive or negative judgment on drugs along with its side effects in cancer patients with particular emphasis on analysing the notion of community detection within this social network by analysing link properties. The proposed system is a two-step analysis framework where positive negative user sentiments are evaluated using data mining tools and techniques followed by identifying overlapping community structures (influential user modules) within the user forum. The two-way process utilizes the comments on internet message boards (cancer research forums) to infer the acceptance and effectiveness of a drug in cancer treatment and maps to the influential user within the network. In the first stage of the current study, opinion labels are developed about each drug based on opinion analysis from user posts and each word is given weightage per node using data mining tools. In the second stage, networks are built from the search results of the forum, a network ranking system reflecting the opinion formation about the drug is developed. Different from traditional algorithms based on node clustering, the proposed method is based on link clustering to discover overlapping communities. Since links usually represent unique relations among nodes, the link clustering will discover groups of links that have the same characteristics. The current approach effectively searches for different levels of organization within the networks and uncovers dense modules using partition density factor. Finally, the accuracy of novel link based overlapping community detection method is compared with the traditional network based community detection model using graph benchmark. Thus the experiment is used to determine opinion from consumer and identify influential users within the retrieved modules using information derived from both term occurrence and word frequency of data and network-based properties in an accurate way.

Keywords:
Community detection, Health Informatics, Multi-scale, Markovprocess, Modularity, Overlapping communities, Random walks, Social media, Stability.


References:

1.       Reza Zafarani, Mohammad Ali Abbasi,Huan Liu, “Social Media Mining An Introduction,”, April 2014.J. Cambridge university.
2.       Zhu,F., Patumcharoenpol, P., Zhang, C., Yang, Y., Chan, J., Meechai, A. et al, “Biomedical text mining and its applications in cancer research. “J. Biomed. Inform. 2013;46:200–211.

3.       David F. Nettleton,”Data mining of social networks represented as graphs,” Expert Systems with Application, October 2012

4.       G. Angulakshmi, Dr.R. Manicka Chezian,”An Analysis on Opinion Mining: Techniques and Tools”,Intrn. Journal of Advanced Research in Computer and Communication Engineering Vol. 3,Issue 7, July 2014

5.       Richa Sharma, Shweta Nigam and Rekha Jain,”Oinion mining of movie reviews at document level”, International Journal on Information Theory (IJIT), Vol.3, No.3, July 2014.

6.       WalaaM edhat a, Ahmed Hassan b, HodaKorashy,” Sentiment analysis algorithms and applications: A survey”, Ain Shams Engineering Journal (2014) ,Volume:5,Issue:4,pp: 1093–1113

7.       Vishal Shrivastava, Rajesh Boghey, BhupendraVerma,”A Framework for Improving Target Marketing Using Collaborative Data Mining Approach”, IJICT Journal, Volume 1 No. 2, June 2011

8.       LiseGetoor,” Link Mining: A New Data Mining Challenge,”UMIACS, 415- 444,Volume 4, Issue 2,2013

9.       Mohammad Al Hasan , Mohammed J. Zaki,”A Survey of Link Prediction in Social Networks”,Springer,March,2011

10.    P.Ambika, M.R BinuRajan, “Multi-scale Community Detection in Complex Networks,” IEEE International Conference on research Advances in Integrated Navigation System,2016.

11.    V.R. Nagarajan, Monisha.P.M” Extracting Knowledge from Social Media toImprove Health Informatics”IJARCC,Vol. 4, Issue 7, July 2015.

12.    Akay, A. Dragomir, and B. E. Erlandsson, “A novel data-mining approach leveraging social media to monitor consumer opinion of sitagliptin,” J. Biomed Health Inform. Vol: PP, Issue: 99.

13.    Akay, A. Dragomir, and B. E. Erlandsson, “Network-Based Modeling and Intelligent DataMining of Social Media for Improving CareVol:19, 2015

14.    J. Vesanto, J. Himberg, E. Alhoniemi, and J. Parhankangas, “Self-Organizing Map in MATLAB: The SOM Toolbox,” in Proc. Matlab DSP Conf., Espoo, Finland, 1999, pp. 35–40.

15.    Chuan Shi, Yanan Cai, Di Fu, Yuxiao Dong, Bin Wu, “A link clustering based overlapping community detection algorithm,” Data & Knowledge Engineering, Elsevier, vol. 87, pp. 394–404, May 2013.

16.    Le Yu,BinWu,Bai Wang,“LBLP :Link-Clustering-Based Approach for Overlapping Community Detection,” ISSN, Volume 18, pp387-397, Number 4, August 2013.

17.    Erwan Le Martelot , Chris Hankin, “Multi-scale community detection using stability optimisation,” International Journal of Web Based Communities, v.9 n.3, p.323-348, June 2013

18.    E. Le Martelot and C. Hankin, “Multi-scale community detection using stability as optimization criterion in a greedy algorithm,” Proceedings of the 2011 International. Conf. erence on Knowledge Discovery and Information Retrieval (KDIR 2011), Paris, France: SciTePress, Oct. 2011, pp. 216–225.

19.    Esuli ,A., Sebastian,F.,” SENTIWORDNET: A Publicly Available Lexical Resource for Opinion Mining, ”In: Proceedings of 3rd Conf. on Intrn. Language Resource and Evaluation,pp.417-422(2006)

20.    Design and Analysis of Computer Algorithms1,David M. Mount, CMSC 451

21.    Y.Y. Ahn, J.P. Bagrow, S. Lehmann, Link communities reveal multi-scale complexity in networks, Nature 466 (2010) 761–764.

22.    Fei Zhu, Preecha Patumcharoenpol, Cheng Zhanga, Yang Yang b, Jonathan Chan ,Asawin Meechai , Wanwipa Vongsangnak , Bairong Shen ,”Biomedical text mining and its applications in cancer research ,” Journal of Biomedical Informatics 46 (2013) 200–211

 

70-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

15.

Authors:

Ambika Omana Menon, Sakuntala S. Pillai

Paper Title:

A Paradigm Shift from OFDM to WPMCM as the Preferred Multi-Carrier Modulation Technique

Abstract: As of now, Multi-Carrier modulation (MCM) is considered an effective technique for both wired and wireless communications. Studies have been done by different researchers in this area and analysis of the comparative advantages and disadvantages of the different options for multi-carrier modulation have been extensively done. The place of OFDM, which was once considered as a very strong candidate for multi-carrier modulation technique, has almost been taken over by its successor, WPMCM. This paper reviews the paradigm shift from OFDM to WPMCM as the preferred multi-carrier modulation technique.

Keywords:
 Multicarrier modulation, WPMCM, OFDM, Discrete Wavelet Packet Transform.


References:

1.       A multicarrier primer- John M.Cioffi
2.       D. Karamehmedović, M.K. Lakshmanan, H. Nikookar, “Performance Evaluation of WPMCM with Carrier Frequency Offset and Phase Noise”, Journal of communications, vol. 4, no. 7, August  2009

3.       Ove Edfors -Magnus Sandell Jan-jaap Van De Beek, Daniel Landstrom, Frank Sjoberg, “An introduction to orthogonal frequency division multiplexing”

4.       H. Umadevi, K.S. Gurumurthy, “OFDM Technique for Multi-carrier Modulation (MCM) Signaling” Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS)
2 (5): 787-794

5.       D. Karamehmedović , Dr. H. Nikookar, M. K. Lakshmanan, “A Study of Synchronization Issues of Wavelet Packet based Multicarrier Modulation”

6.       S.Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications‖”, IEEE JSAC, Vol.23, No.2, pp.201-220, February 2005

7.       J.Mitola, G.Q.Maguire, “Cognitive Radio: Making Software Radios More Personal”, IEEE Personal Communications, Vol.6, No.4, pp.13-18, August 1999

8.       Sobia Baig, Fasih-ud-Din Farrukh and M. Junaid Mughal, “Discrete Wavelet Multitone Modulation for ADSL & Equalization Techniques”, Intech Open Access Publisher, pp. 3-24

9.       A.Lindsay, “Wavelet Packet Modulation for Orthogonally Transmultiplexed Communications”, IEEE Transactions on Signal Processing, Vol.45, pp.1336-1339, May 1997

10.    Haleh Hosseini, Norsheila Fisal, Sharifah K. Syed-Yusof, “Wavelet Packet based Multicarrier Modulation for Cognitive UWB Systems”, Signal Processing – An International Journal (SPIJ), Volume (4): Issue (2)

 

76-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

16.

Authors:

M. Sghiar

Paper Title:

Turbulent Functions and Solving the Navier-Stokes Equation by Fourier Series

Abstract: I give a resolution of the Navier-Stokes [2] equation by using the series of Fourier. Résumé: Je donne une résolution de l’équation de Navier-Stokes [2] par les séries de Fourier.

Keywords:
 Navier-Stokes, Fourier, Séries de Fourier.

References:

1.    Joseph Fourier, Théorie analytique de la chaleur, Firmin Didot Père et Fils (Paris-1822). Réédition Jacques Gabay, 1988 (ISBN 2-87647-046-2)
2. http://www.claymath.org/sites/default/files/navierstokes.pdf

79-80

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

17.

Authors:

Alaa Ibrahim, Ibrahim Marouf

Paper Title:

Methods and Techniques of Conservation Process for the Heritage Building Walls

Abstract: The issue of the conservation of architectural heritage has been given much attention on the political, cultural and academic level due to the heritage values for being cultural wealth for the nations. However the remains and ruins of these properties come under threat due to the propagation of structural work resulting from industrial development and urbanization. Hence, it has become the responsibility of government institutions to ensure the protection and conservation of humanity’s cultural heritage. That’s in a manner which strikes a balance and ensures harmony between the preservation of cultural heritage and the changes required by social and economic developments. All efforts have to be exerted to fulfill these two objectives in a spirit of understanding, in a planned timely manner and employing efficient technologies. Therefore, the main aim of the research is to enhance and highlight the new techniques and methods that used for maintaining the heritage building’s walls that could achieve the execution of temporary and definitive works. The most used methods that have been successfully implemented for several years for conserving walls are wall grouting injection, Cintec anchoring system, Fiber reinforced polymers, using prestressed steel in buildings consolidation and scaffolding systems .The research methodology is following a qualitative approach through first, defining each technique and it’s details (eg, characteristics, way of execution ,advantages , disadvantages and case study) . Second, by analyzing, evaluating the techniques and ensure its efficiency. The implementation of these techniques requires skilled labors, not only at the execution process, but also in the planning stages. The main mission of the conservators of the restoration process is to select the technique that keeps the heritage value of the building without deteriorating the building characteristics, elements or historical materials. To sum up using these techniques with accurate and suitable implementation methods, resulted in conserving the values of the heritage buildings and could safely transform them to the next generations. (The researcher 2016)

Keywords:
Grouting injection, Cintec anchoring system, Fiber reinforced polymers, prestressed steel, Scaffolding systems.


References:

1.       Kate Clark. (2005). Conservation Planning Methodology search, Developing policies for the conservation of historic places. Columbia: Heritage branch.
2.       Asamer Ahmed. (2005). Master Thesis: Contemporary techniques in restoration of historical buildings. Cairo: Cairo University.

3.       Jack Gillon. (2001). CONSERVATION CHARTERS AND STANDARDS. Retrieved from http://ihbc.org.uk

4.       Webber Nodro.(2009). Cultural heritage and the law search. Africa: ICCROM.

5.       WORLD HERITAGE CENTRE. (2013). Operational Guidelines for the Implementation of the World Heritage Convention. France: UNESCO World Heritage Centre.

6.       Intergovernmental Committee.(2013). Operational Guidelines for the Implementation of the World Heritage Convention. France: UNITED NATIONS EDUCATIONAL, SCIENTIFIC AND CULTURAL ORGANISATION.

7.       ICOMOS. (2001). International Council on Monuments and Sites. Retrieved from http://www.icomos.org.

8.       The parliament. (2006). قانون رقم 144. Cairo: The parliament publishing center.

9.       Ashraf Ali. (2012). Master Thesis: Restoration of historic Islamic buildings and its compliance with international standards. Egypt: Faculty of engineering, Cairo University.

10.    Adel Saad. (2002).Master Thesis: اسس وقواعد ترميم المباني الاثريه بين النظريه والتطبيق. Cairo: Faculty of archaeology, Restoration department.

11.    Lisandra Miranda. (2014). DEFINITION AND EVALUATION OF A GROUT FOR CONSOLIDATION OF ANCIENT MASONRY . SEISMIC VULNERABILITY OF A “PLACA” BUILDING. Portugal: DECivil, Instituto Superior Técnico, Universidade de Lisboa.

12.    PJ materials Consultants, 2009, Restoration of a National Historic Site Building, Fredericton City Hall, New Brunswick. Retrieved from http://www.pjmc.org.

13.    Faloon.F Construction. (2015). Scientific paper:Cementitious Sock Anchors. United States: Faloon Construction Center.

14.    Ian Hume. (1997). Scaffolding and Temporary Works for Historic Buildings. Retrieved from http://www.buildingconservation.net

15.    Cestelli Guidio. (2015). Strengthening of buildings structures – therapy search  . Berlin: ETH Zürich, Rämistrasse 101, 8092 Zürich.

16.    Lorenzo Jurina. (2003). The structural consolidation of old massive structures search . Italy: Department of Structural Engineering.

17.    Federico M. Mazzolani. (2009). Refurbishment by steelwork search .: Department of Structural Analysis and Design, University of Naples, Naples, Italy “Federico II”

18.    Peter Cox. (2012).Scientific paper:Wall Stabilization, Aniseed Park, Manchester,  Broadway Business center.

 

81-87

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Md. Lutfor Rahman, Najmus Saquib Sifat, Md. Zakaria Rahman, M. Ali

Paper Title:

Thermal Performance Analysis of a Closed Loop Pulsating Heat Pipe without Insert and with Insert

Abstract:  In this paper, thermal performance of a Closed Loop Pulsating Heat Pipe (CLPHP) without insert and with insert inside the tube has been investigated. The effect of different parameters like working fluid, the filling ratio, inclination angle and the input heat load on the thermal performance has been analyzed thoroughly. In this study, CLPHP is made from long capillary copper tubes with inner diameter of 2.0 mm and outer diameter of 3.0 mm. The heat pipe is bent into eight U-turns and divided into three sections: evaporator section (50 mm), adiabatic section (120 mm) and condenser section (80 mm). Adiabatic section is maintained by using aluminum foil surrounded by appropriate insulation. An insert made of copper wire with diameter 0.5mm is used throughout the tube of all three sections. Methanol and Ethanol are used as working fluids with different filling ratio varied from 40% to 60% in steps of 10%. The thermal resistance has been investigated with different inclination angles (viz. 0°, 30°, 45° and 60° from vertical) at various heat input from 10 to 100W in the steps of 10W. The result shows that, the thermal resistance decreases as heat input increases. CLPHP with insert structure shows better performance than the CHPHP without insert structure particularly at 45°inclination angle. CLPHP without insert structure shows better performance than the CHPHP with insert structure at 00inclinations. Methanol with 40% filling ratio and Ethanol with 60% filling ratio shows the best performance at 0° inclination angle for CLPHP without insert structure. CLPHP with insert structure shows better performance than the CLPHP without insert structure at high heat input particularly at 45°inclination angle.

Keywords:
CLPHP, filling ratio, inclination angle, working fluid, insert structure and without insert structure, PHP, thermal resistance


References:

1.       G. F. Smyrnov and G. A. Savchenkov, (USSR Patent 504065), 1971.
2.       H. Akachi, Structure of a heat pipe, U.S. Patent Number 4921041, 1990.

3.       H. Akachi, F. Polasek and P. Stulc, Pulsating heat pipes, Proc.5th International Heat Pipe Symposium, pp. 208–217, Melbourne, Australia, 1996.

4.       Y. Zhang and A. Faghri, Advances and unsolved issues in in pulsating heat pipes, Copyright Taylor and Francis Group, LLC, Heat Transfer Engineering, 29(1):20–44, 2008, ISSN: 0145-7632 print / 1521-0537 on line DOI: 10.1080/01457630701677114.

5.       S. Maezawa, R. Nakajima, Gi K. and H. Akachi, Cooling of note book PC by oscillating heat pipe, in: 10th Int. Heat Pipe Conf., Vol. 3/4, Session F, Stuttgart, Germany, 1997.

6.       M. B. Shafii, A. Faghri and Y. Zhang, Thermal modeling of un looped and looped pulsating heat pipes, asme journal of heat transfer, Vol. 123, No. 6, pp. 1159- 1172, 2001.

7.       Zhang X. M., Xu, J. L., and Zhou, Z. Q., Experimental study of a pulsating heat pipe using fc-72, ethanol, and methanol as working fluids, experimental heat transfer, vol. 17, no. 1, pp. 47–67, 2004.

8.       P. Meena, S. Rittidech and P. Tammasaeng , Effect of inner diameter and inclination angles on operation limit of closed-loop oscillating heat-pipes with check valves, American Journal of Engineering and Applied Sciences, Vol. 1 (2), pp. 100-103,2008.

9.       P. Meena and S. Rittidech, Comparisons of heat transform performance of a CLOHP and CLOHP with check valves heat exchangers, American Journal of Applied Sciences 1(1): 7-11, 2008, ISSN 1941-7020.

10.    S. Rittidech P. Meena and P. Terdtoon, effect of evaporator lengths and ratio of check valves to number of turns on internal flow patterns of a closed–loop oscillating heat-pipe with check valves, American Journal of Applied Sciences 5 (3): 184-188, 2008 ISSN 1546-9239

11.    P. Meena, S. Rittidech and P. Tammasaeng, Effect of evaporator section lengths and working fluids on operational limit of closed loop oscillating heat pipes with check valves (CLOHP/CV), American Journal of Applied Sciences, Vol.6(1), pp.133-136,  ISSN 1546-9239, 2009.

12.    P. Charoensawan, S. Khandekar, Manfred Groll, and P. Terdtoon, Closed loop pulsating heat pipes, part a: parametric experimental investigations, Applied Thermal Engineering, Vol. 23, No.16, pp. 2009–2020, 2003.

13.    S. Khandekar, N. Dollinger and M. Groll, Understanding operational regimes of closed loop pulsating heat pipes: an experimental study, Applied Thermal Engineering, Vol.23, No.6, pp.707-719, 2003.

14.    Honghai Yang, S. Khandekar, M. Groll, Operational limit of closed loop pulsating heat pipes, Applied Thermal Engineering,  Vol.28 , pp.49–59, 2008.

15.    N. Panyoyai, P. Terdtoon and P. Sakulchangsatjatai, Effects of aspect ratios and number of meandering turns on performance limit of an inclined closed-loop oscillating heat pipe, Energy Research Journal, Vol. 1 (2), pp. 91-95, 2010.

16.    Dharmapal A Baitule1 and Pramod R Pachghare, Experimental analysis of closed loop pulsating heat pipe with variable filling ratio, Int. J. Mech. Eng. & Rob. Res. ISSN 2278 – 0149   www. ijmerr.com, Vol. 2, No. 3, July 2013.

17.    Bhawna Verma, Vijay Lakshmi Yadav and Kaushal Kumar Srivastava, Experimental studies on thermal performance of a pulsating heat pipe with methanol/di methanol, Journal of Electronics Cooling and Thermal Control, pp 27-34, 3 March 2013.

18.    R. Naik, V. Varadarajan , G. Pundarika and K. R. Narasimha, Experimental investigation and performance evaluation of a closed loop pulsating heat pipe, Journal of Applied Fluid Mechanics, Vol. 6, No. 2, pp. 267-275, 2013. ISSN 1735-3572, EISSN 1735-3645.

19.    E. R. Babu and  G. V. Gnanendra Reddy,  Effect of working fluid and filling ratio on performance of a closed loop pulsating heat pipe,  Journal of Engineering Science and Technology Vol. 11, No. 6 (2016) 872 – 880 © School of Engineering, Taylor’s University

20.    ANSI/ASME, Measurement Uncertainty, Report PTC 19.1- (1985, 1986)

 

88-94

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Rishikesh Mishra, Prashant Thakare, Shreyas Patil, Kartik Kannav, Nikunj Vitalkar

Paper Title:

VC-T Engine An Advancement in 4-Stroke Engine

Abstract: The most important challenge which the car manufacturers are facing today is to offer vehicles that deliver excellent fuel efficiency and superb performance while maintaining cleaner emissions and driving comfort. This paper deals with the VC-T (Variable Compression Turbo) engine technology which is going to be one of the advanced technology in the IC engine, and also deals with it’s working principle and it’s advantages. VC-T is the brand new technology in four cylinder petrol engine family. The VC-T engine is able to maximize it’s efficiency by running a higher compression ratio at idle or low speeds and boost performance by switching over to lower compression ratio under hard acceleration or heavy engine loads. The VC-T is able to adjust it’s compression ratio anywhere between it’s lower limit of 8:1 to higher limit of 14:1. According to Infiniti, the engine intrinsic smoothness allows it to achieve the NVH (Noise vibration & harshness) level similar to that of V6 engine. The paper rounds off with conclusions and an agenda for future research in this area.

Keywords:
 VC-T Engine, Compression ratio, Nissan Infiniti, Efficiency.


References:

1.    Tanaka, Y., Hiyoshi, R., Takemura, S., Ikeda, Y. et al. (2007) “A Study of a Compression Ratio Control
2.    Mechanism for a Multiple-Link Variable Compression Ratio Engine,” SAE Technical Paper 2007-01-3547 doi: 10.4271/2007-01-3547

3.    Hiyoshi, R., Aoyama, S., Takemura, S., Ushijima, K. et al. (2006) “A Study of a Multiple-link Variable Compression Ratio System for Improving Engine Performance,” SAE Technical Paper 2006-01-0616 doi: 10.4271/2006-01-0616

4.    Takahashi, N., Aoyama, S., Moteki, K., and Hiyoshi, R. (2005) “A Study Concerning the Noise and Vibration Characteristics of an Engine with Multiple-Link Variable Compression Ratio Mechanism,” SAE Technical Paper 2005-01-1134 doi: 10.4271/2005-01-1134

5.    M Ayaz Afsar, Mr Prafulla V. Pawar, Mr Prathik Dahule, Mr. S. Papinwar. “ Experimental investigation of direct air injection scavenged two stroke engine”. 2009 International symposium on computing, communication and control (ISCCC). Proc. Of CSIT vol.1 (2001). PP. 21-24.

 

95-98

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Vivian Brian Lobo, Nazneen Ansari, Annies Minu, Sehba Siddiqui, Flevina D’souza, Jeba Sangeetha Augestin

Paper Title:

Smartphone Selection using Analytic Hierarchy Process

Abstract: Analytic hierarchy process (AHP) is a measurement theory that is used to obtain ratio scales from distinct as well as continuous paired comparisons, and such comparisons can be selected from either tangible measurements or a basic scale that imitates virtual strength of feelings and predilections. AHP is a decision-making process that was developed by Prof. Thomas L. Saaty (1970), and it aims to quantify virtual significances for a given set of alternatives on a ratio scale—based on decision maker’s judgment—and focuses on the importance of instinctive decisions of both a decision maker and the steadiness of comparison of alternatives. AHP has been an instrument at the hands of decision makers since its discovery and is one of the widely used multicriteria decision-making methods. There have been some exceptional works that have been broadcasted based on AHP in various fields such as scheduling, best alternative selection, allocation of resources, conflict resolution, and optimization. AHP’s forte is its suppleness to be integrated with techniques such as linear programming and fuzzy logic that allows a user to excerpt benefits from all techniques and helps to achieve a desired goal. Similarly, we too use AHP to meet our desired goal. That is, in this study, we consider four smartphones (i.e., ph1, ph2, ph3, and ph4) and determine which smartphone is the best by considering numerous criteria such as cost, camera, internal memory, battery life, and style and generate a rank of alternatives using AHP.

Keywords:
analytic hierarchy process, battery life, camera, cost, criteria, internal memory, smartphone, style


References:

1.       T. L. Saaty, “Axiomatic foundation of the analytic hierarchy process,” Manage. Sci., vol. 32, no.7, 1986, pp. 841–855.
2.       B. G. Merkin, Group choice, John Wiley & Sons, 1979, N.Y.

3.       T. L. Saaty, “The analytic hierarchy process,” McGraw-Hill Book Co., 1980, N.Y.

4.       T. L. Saaty, “How to make a decision: The analytic hierarchy process,” Interfaces, vol. 24, 1994a, pp. 19–43.

5.       T. L. Saaty, “Fundamentals of decision making,” RWS Publications, Pittsburgh, 1994b, P.A.

6.       “The analytic hierarchy process—An exposition,” [Online] Available: https://business.highbeam.com/412157/article-1G1-93610861/analytical-hierarchy-process-exposition [Accessed on October 23, 2016].

7.       “The analytic hierarchy process—An exposition [Online] Available: http://www.johnsaunders.com/papers/ahpexpo.pdf [Accessed on October 23, 2016].

8.       E. H. Forman and M. A. Selly, “Decision by objectives: how to convince others that you are right,” World Scientific, 2001.

9.       http://shodhganga.inflibnet.ac.in/bitstream/10603/101833/11/11_chapter%201.pdf [Online] [Accessed on October 23, 2016].

10.    H. W. Brock, “The problem of “utility weights” in group preference aggregation,” Oper. Res., vol. 28, no. 1, 1980, pp. 176–187.

11.    R. L. Keeney, “A group preference axiomatization with cardinal utility,” Manage. Sci., vol. 23, no. 2, 1976, pp. 140–145.

12.    R. L. Keeney and C. W. Kirkwood, “Group decision making using cardinal social welfare functions,” Manage. Sci., vol. 22, no. 4, 1975, pp. 430–437.

13.    P. L. Yu, “A class of solutions for group decision problems,” Manage. Sci., vol. 19, no. 8, 1973, pp. 936–946.

14.    F. Chiclana, E. Herrera-Viedma, F. Herrera, and S. Alonso, “Some induced ordered weighted averaging operators and their use for solving group decision-making problems based on fuzzy preference relations.” Eur. J. Oper. Res., vol. 182, no. 1, 2007, pp. 383–399.

15.    H. Hsi-Mei and C. Chen-Tung, “Aggregation of fuzzy opinions under group decision making.” Fuzzy Set Syst., vol. 79, no. 3, 1996, pp. 279–285.

16.    C. Tan, “A multi-criteria interval-valued intuitionistic fuzzy group decision making with Choquet integral-based TOPSIS,” Expert Syst. Appl., vol. 38, no. 4, 2011, pp. 3023–3033.

17.    T. Tanino, “Fuzzy preference orderings in group decision making,” Fuzzy Set Syst., vol. 12, no. 2, 1984, pp. 117–131.

18.    Y. Dong, Y. Xu, and S. Yu, “Computing the numerical scale of the linguistic term set for the 2-tuple fuzzy linguistic representation model,” IEEE Trans. Fuzzy Syst., vol. 17, no. 6, 2009, pp. 1366–1378.

19.    E. Herrera-Viedma, L. Martinez, F. Mata, and F. Chiclana, “A consensus support system model for group decision-making problems with multigranular linguistic preference relations,” IEEE Trans Fuzzy Syst., vol. 13, no. 5, 2005, pp. 644–658.

20.    R. -C. Wang and S. -J. Chuu, “Group decision-making using a fuzzy linguistic approach for evaluating the flexibility in a manufacturing system,” Eur. J. Oper. Res., vol. 154, no. 3, 2004, pp. 563–572.

21.    Z. Wu and J. Xu, “A concise consensus support model for group decision making with reciprocal preference relations based on deviation measures,” Fuzzy Set Syst., vol. 206, 2012a, pp. 58–73.

22.    E. H. Forman and S. I. Gass, “The analytic hierarchy process—An exposition,” Oper. Res., vol. 49, no. 4, 2001, pp. 469–486.

23.    N. Subramanian and R. Ramanathan, “A review of applications of analytic hierarchy process in operations management,” Int. J. Prod. Econ., vol. 138, no. 2, 2012, pp. 215–241.

24.    O. S. Vaidya and S. Kumar, “Analytic hierarchy process: An overview of applications,” Eur. J. Oper. Res., vol. 169, no. 1, 2006, pp. 1–29.

25.    E. Forman and K. Peniwati, “Aggregating individual judgments and priorities with the analytic hierarchy process,” Eur. J. Oper. Res., vol. 108, no. 1, 1998, pp.
165–169.

26.    R. Ramanathan and L. S. Ganesh, “Group preference aggregation methods employed in AHP: An evaluation and an intrinsic process for deriving members’ weightages,” Eur. J. Oper. Res., vol. 79, no. 2, 1994, pp. 249–265.

27.    T. L. Saaty, “Fundamentals of decision making and priority theory with the analytic hierarchy process,” RWS Publications, Pittsburgh, 1994a.

28.    Y. Xu, K. W. Li, and H. Wang, “Distance-based consensus models for fuzzy and multiplicative preference relations,” Inform. Sciences, vol. 253, 2013, pp. 56–73.

29.    S. M. Lee, “Goal programming for decision analysis,” Philadelphia: Auerbach, 1972.

30.    R. L. Keeney and H. Raiffa, “Decisions with multiple objectives: Preferences and value tradeoffs,” New York: Wiley, 1976.

31.    T. L. Saaty, “A scaling method for priorities in hierarchical structures,” J. Math. Psychol., vol. 15, no. 3, 1977, pp. 234–281.

32.    T. L. Saaty, “Decision making for leaders,” Belmont, CA: Lifetime Learning Publications, Division of Wadsworth, 1982.

33.    K. D. Lawerence and G. Kleinman (Eds.), “Applications of Management Science,” vol. 15, Emerald Group Publishing, 2012.

34.    D. Golmohammadi, “A decision making model for evaluating suppliers by multi-layer feed forward neural networks,” PeoQuest, 2007.

35.    M. J. Liberatore, B. R. Myers, R. L. Nydick, and H. J. Weiss, “Revisiting the ranking of outstanding professional sports records,” J. Sport. Anal., vol. 2, no. 1, 2016, pp. 1–18.

36.    J. S. Dyer, “Remarks on the analytic hierarchy process,” Manage. Sci., vol. 36, no. 3, 1990a, pp. 249–258.

37.    J. S. Dyer, “A clarification of ‘remarks on the analytic hierarchy process,”’ Manage. Sci., vol. 36, no. 3, 1990b, pp. 274–275.

38.    P. T. Harker and L. G. Vargas, “Reply to ‘remarks on the analytic hierarchy process’ by J. S. Dyer,” Manage. Sci., vol. 36, no. 3, 1990, pp. 269–273.

39.    T. L. Saaty, “An exposition of the AHP in reply to the paper ‘remarks on the analytic hierarchy process,”’ Manage. Sci., vol. 36, no. 3, 1990, pp. 259–268.

40.    R. L. Winkler, “Decision modeling and rational choice, AHP and utility theory,” Manage. Sci., vol. 36, no. 3, 1990, pp. 247–248.

41.    Expert Choice, Inc. Expert Choice for Windows, Version 9.0, Pittsburgh, 1995, P.A.

42.    B. L. Golden, E. A. Wasil, and P. T. Harker (eds.), “The analytic hierarchy process,” New York, Springier-Verlag, 1989.

43.    F. Zahedi, “The analytic hierarchy process—A survey of the method and its applications,” Interfaces, vol. 16, no. 4, 1986, pp. 96–108.

44.    L. G. Vargas and F. Zahedi (eds.), “Special issue on the analytic hierarchy process,” Math. Comput. Model., vol. 17, no. 4–5, 1993.

45.    E. A. Wasil and B. L. Golden (eds.), “Public sector applications of the analytic hierarchy process,” Socio. Econ. Plan. Sci., vol. 25, no. 2, 1991, pp. 87–88.

46.    F. A. Lootsma, “Saaty’s priority theory and the nomination of a senior professor in operations research,” Eur. J. Oper. Res., vol. 4, no. 6, 1980, pp. 380–388.

47.    T. L. Saaty and V. Ramanujam, “An objective approach to faculty promotion and tenure by the analytic hierarchy process,” Res. High. Educ., vol. 18, no. 3, 1983, pp. 311–331.

48.    M. D. Trout and S. K. Tadisina, “The analytic hierarchy process as a model base for a merit salary recommendation system,” Math. Comput. Model., vol. 16, no. 5, 1992, pp. 99–105.

49.    V. M. R. Tummala and P. P. Sanchez, “Evaluating faculty merit awards by analytic hierarchy process,” Model., Simulat. Control C: Environ., Biomed., Hum. Soc. Syst., vol. 11, no. 4, 1988, pp. 1–13.

50.    T. L. Saaty and L. R. Rogers, “Higher education in the United States (19852000): Scenario construction using a hierarchical framework with eigenvector weighting,” Socio. Econ. Plan. Sci., vol. 10, no. 6, 1976, pp. 251–263.

51.    Arbel, “A university budget problem: A priority-based approach,” Socio. Econ. Plan. Sci., vol. 17, no. 4, 1983, pp. 181–189.

52.    N. K. Kwak and C. B. Diminnie, “A goal programming model for allocating operating budgets of academic units,” Socio. Econ. Plan. Sci., vol. 21, no. 5, 1987, pp. 333–339.

53.    R. P. Hope and J. A. Sharpe, “The use of two planning decision support systems in combination for the redesign of an MBA information technology programme,” Computers and Oper. Res., vol. 16, no. 4, 1989, pp. 325–332.

54.    S. K. Tadisina and V. Bhasin, “Doctoral program selection using pairwise comparisons,” Res. High. Educ., vol. 30, no. 4, 1989, pp. 403–418.

55.    J. R. Canada, E. H. Frazelle, R. K. Roger, and E. MacCormac, “How to make a career choice: The use of the analytic hierarchy process,” Ind. Manage., vol. 27, no. 5, 1985, pp. 16–22.

56.    D. Anderson, “An introduction to Management Science: Quantitative approaches to decision making,” Publisher: Thomas R. Williams, 2003.

57.    D. R. Anderson, D. J. Sweeney, T. A. Williams, J. D. Camm, and R. K. Martin, “An introduction to Management Science: Quantitative approaches to decision making,” revised. Cengage Learning, 2011.

58.    F. G. M. Al-Azab and M. A. Ayu, “Web based multi criteria decision making using AHP method,” Int. Conf. Info. Comm. Tech. Muslim World (ICT4M), IEEE, 2010, pp. A6–A12.

59.    D. J. Jakóbczak, “Analyzing risk through probabilistic modeling in Operations Research,” October 2015, DOI: 10.4018/978-1-4666-9458-3.

60.    “Analytic hierarchy process [Wikipedia],” [Online] Available: https://en.wikipedia.org/wiki/Analytic_hierarchy_process [Accessed on October 23, 2016].

61.    F. P. G. Márquez and B. Lev (Eds.), Advanced Business Analytics, Springer, 2015.

62.    C. C. Frangos, K. C. Fragkos, I. Sotiropoulos, I. Manolopoulos, and E. Gkika, “Student preferences of teachers and course importance using the analytic hierarchy process model,” In Proc. World Congress on Eng. (WCE 2014), vol. 2, 2014.

 

99-105

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

21.

Authors:

Prakash C. Sharma, Narendra S. Chaudhari

Paper Title:

Investigation of Satisfiability Based Solution Approach for Graph Coloring Problem

Abstract: Graph k-colorability (for k ≥ 3) problem (GCP) is a well-known NP-Complete problem. There are many approaches proposed to solve graph coloring problem till date. There is an alternative approach to solve it efficiently by Satisfiability which is first known NP-Complete problem. We can reduce any NP-complete problem to/from SAT. Reduction from graph k-colorability problem to satisfiability is an important concept to solve it using efficient SAT solver. In this paper, we are presenting a polynomial 3-SAT encoding technique for k colorable graph. Our formulation generates total (((k-2)*|V| ) + (k*|E|) ) clauses in 3-CNF for k-colorable graph. We tested our encoding formulation approach on different graph coloring instances of DIMACS[8][9] and then investigated the solution of graph coloring problem as a decision problem based on SAT approach using powerful SAT solver Minisat 2.2.

Keywords:
3-SAT, CNF, DNF, graph coloring, NP-Complete, k-colorable, chromatic number, DIMACS.


References:

1.       Prakash C Sharma and Narendra S Chaudhari, “Polynomial 3-SAT Encoding for K-Colorability of Graph”, IJCA Special Issue on Evolution in Networks and Computer Communications (1): 2011, pp 19-24
2.       Garey, M. R. and Johnson, D. S., Computers and Interactability: A Guide to the Theory of NP-Completeness, Freeman, San Francisco, 1979.

3.       S. A. Cook, “The Complexity of Theorm Proving Procedures,” in Proceeding of the ACM Symposium on the Theory of Computing, 2004, pp 151-158.

4.       Koen Claessen, Niklas Een, Mary Sheeran and Niklas Sorensson, “SAT-solving in practice”, Proceedings of the 9th International Workshop on Discrete Event Systems Goteborg, Sweden, pp 61-67,May 28-30, 2008.

5.       Prakash C. Sharma and Narendra S Chaudhari, “A graph coloring approach for channel assignment in cellular network via propositional satisfiability”, International Conference on Emerging Trends in Networks and Computer Communications (ETNCC) at Udaipur,  22-24 April 2011, pp 23-26

6.       Alexander Tsiatas, “Phase Transitions in Boolean Satisfiability and Graph Coloring”, May 2008, Department of Computer Science, Cornell University,(www.cseweb.ucsd.edu/users/atsiatas/phase.pdf).

7.       L. Adleman and K. Manders, “Reducibility, randomness and intractability (abstract)”, in STOC 77: Proceedings of the ninth annual ACM symposium on Theory of computing. New York NY, USA: ACM Press, 1977, pp. 151-163.

8.       DIMACS Implementation Challenges, http://dimacs.rutgers .edu/Challenges/

9.       Petersen graph, http://en.wikipedia.org/wiki/ Petersen _graph

10.    N. Een and N. Sorensson. An extensible sat solver. In Proc. of the 6th Int. Conference onTheory and Applications of Satisfiability Testing, 2003.

11.    N. Een and N. Sorensson. MiniSat v1.13 – A SAT Solver with Conict-Clause Minimization. System description for the SAT competition 2005.

12.    The MiniSAT page by Niklas Een and N Sorensson. http://minisat.se/

13.    MiniSAT User Guide: How to use the MiniSAT SAT Solver by David A. Wheeler. http://www.dwheeler.com/ essays/minisat-user-guide.html

14.    Computational Series: Graph Coloring and Its Generalizations, http://mat.gsia.cmu.edu/COLOR04.

15.    E. Malaguti, P. Toth, “A survey on vertex coloring problems”, International Transactions in Operational Research 17, 2010, pp 1–34.

16.    W.K Hale, “Frequency Assignment: Theory and Applications”, in IEEE Proceeding, Vol.68, no.12, 1980, pp. 1497-1514.

 

106-112

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

 

Issue-5 June 2017

S. No

Volume-6 Issue-5, June 2017, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Shubhangi Pandhare, Abhishek Gautam, Sayali Chavan, Shital Sungare

Paper Title:

Co-Operative Content Downloading Framework Over Cellular Network

Abstract: The multifold advancement over wireless communication has in a way, predicted to use smartphones, laptops, and tabs vastly for downloading purpose. But due to confined data transfer capacity, the statistics of downloading quantity approximately for a distinctive person is constrained and time taking for a high precision video. The co-operative content downloading framework will permit the requested joiners inside the network to download a section of the file independently. This may aid the potential to download the document with cost effectiveness and with a reduced time consumption component. The above mentioned framework will additionally trace the real process how the transfer speed (bandwidth) will be distributed within the joiners and one requestor. The entire framework will deliver the efficient utilization of bandwidth in specific environments.

Keywords:
 Segmentation, Cluster formation, Adhoc network, Sequencing.


References:

1.       Haibo Zhou, Student Member, IEEE, Bo Liu, Member, IEEE, Tom H. Luan, Member,, “ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications”, IEEE transactions on intelligent transportation systems, 2014.
2.       Chao-Hsien Lee, Chung-Ming Huang, Senior Member, IEEE, Chia-Ching Yang, and Hsiao-Yu Lin,,“ The K-hop Cooperative Video Streaming Protocol Using H.264/SVC Over the Hybrid Vehicular Networks,” , IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 6, JUNE 2014.

3.       Aarti R. Thakur,  Prof. Jagdish Pimple, “Performing vehicle to vehicle communication based on two tier approach with high security using aodv protocol in VANET”, 1) International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-7),July 2014

4.       J. Luo and D. Guo, “Neighbor discovery in wireless ad-hoc networks based on group testing,” in Proc. 46th Annu. Allerton Conf.Communication, Control, Computing, Urbana-Champaign, IL, USA Sep. 2008, pp. 791–797.

5.       R. Khalili, D. L. Goeckel, D. Towsley, and A. Swami, “Neighbor discovery with reception status feedback to transmitters,” in Proc. 29th IEEE Conf. INFOCOM, San Diego, CA, USA, Mar. 2010,pp. 2375–2383

6.       C.-M. Huang, C.-C. Yang, and H.-Y. Lin, “A K-hop bandwidth aggregation scheme for member-based cooperative transmission over vehicular networks,” in Proc. 17th IEEE ICPADS, Tainan, Taiwan, 2011, pp. 436–443.

7.       Nandan, S. Das, G. Pau, M. Gerla, and M. Y. Sanadidi, “Cooperative downloading in vehicular ad-hoc wireless networks,” in Proc. 2nd Annu. Conf. WONS, Washington, DC, USA, 2005 pp. 32–41

8.       M. F. Tsai, N. Chilamkurti, J. H. Park, and C. K. Shieh, “Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment,” Instit. Eng. Technol. Commun., vol. 4, no. 8, pp. 937–945, 2010.

9.       M. Y. Hsieh, Y. M. Huang, and T. C. Chiang, “Transmission of layered video streaming via multi-path on ad-hoc networks,” Multimedia Tools Appl., vol. 34, no. 2, pp. 155–177, 2007.

10.    D. Fan, V. Le, Z. Feng, Z. Hu, and X. Wang, “Adaptive joint session scheduling for multimedia services in heterogeneous wireless networks, in Proc. 70th IEEE VTC, Anchorage, AK, USA, Sep. 2009, pp. 1–5.

11.    M. Li, Z. Yang, and W. Lou, “Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding,” IEEE J. Sel. Areas Commun., vol. 29, no. 1, pp. 223–235, Jan. 2011.

1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Cini K.

Paper Title:

Value Based Reliability Evaluation of Primary Power Distribution System

Abstract: Distribution system reliability is concerned with the availability and quality of power supply at each customer’s service entrance. Analysis of customer failure statistics shows that failure in distribution system contribute as much as 90% towards the unavailability of supply to a load as compared with each part of electric systems. These statistics reinforces the need for reliability evaluation of distribution systems. In recent years with the advent of smart grids the significance of distribution system has enhanced because of the importance of co generation and distributed generation. The different causes and duration of failures are analysed season wise. The failure rate of the different feeders of the system under study was calculated and the reliable feeders were identified. Suggestions are given to improve the reliability of the feeders. This type of analysis will help the operation and maintenance engineers to maintain the quality service to the customers and schedule the maintenance services.  

Keywords:
Distribution Systems, Reliability Indices, Failure Rate, Availability.

References:
1.       Biyun Chen; Qianyi Chen “The whole-process reliability evaluation  of  power  system including generation, transmission, transformation and distribution” IEEE 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), pp 482-487
2.       H. 2. Andrews, Laura, Samuel” Novel Power System Reliability Indices calculation method” 23rd International Conference on Electricity Distribution, Lyon  15-18, June .

3.       Roy Billinton and Peng Wang “ Distribution System Reliability Cost/worth analysis Using Analytical and sequential Simulation Techniques” IEEE transactions on power systems, Vol.13, No.4, November 1998,pp1245-1250.

4.       R. Billinton and J. E. Billinton, “Distribution System Reliability Indices”, IEEE Trans. on Power Delivery, Vol. 4, No. 1, Jan. 1989, pp. 561-568.

5.       Vito Longo ,Walter R. Puntel, “Evaluation of Distribution System Enhancements Using Value-Based Reliability Planning” Procedures IEEE Transactions on Power
systems, vol. 15, no. 3, august 2000.

6.       Billinton, R., and Allan, R. N., “Reliability Evaluation of Power Systems”,Pitman Books, New York and London, 1984.

7.       Billinton, R., “Evaluation of Reliability Worth in an Electric Power system”. Reliability Engineering and System Safety, Vol. 46, No. 1, 1994.

8.       Carlos Eduardo Paida Tenemaza “State of Art, Reliability In Electrical Distribution Systems Based On Markov Stochastic Model”  IEEE Latin America Transactions, Volume: 14, Issue: 2, pp 799-804.

9.       Farajollah Soudi and Kevin Tomsovic  “Optimal Trade-Offs in Distribution Protection Design” IEEE  transactions on power delivery, vol. 16, no. 2, April 2001.

10.    Amir Safdarian; Mohammad Farajollahi; Mahmud Fotuhi-Firuzabad “ Impacts of Remote Control Switch Malfunction on Distribution System Reliability” IEEE Transactions on Power Systems, Volume: 32, Issue: 2, 2017, pp 1572-1573.

11.    Siripha Junlakarn; Marija Ilić , “Distribution System Reliability Options and Utility Liability”  IEEE Transactions on Smart Grid , Volume: 5, Issue: 5, 2014, pp 2227-2234.

6-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

S. L. Deshpande, D S Chaudhari

Paper Title:

Wireless Nodes Assisted Micro-Irrigation System: an IoT Approach

Abstract: Irrigation systems deployed with Wireless Sensor Network (WSN) while transforming them to Micro-Irrigation systems are emerging as fruitful solution to ongoing ground water crisis. Field parameters like soil moisture, temperature and humidity can be monitored taking help of sensor array and can be fed back to decision making control system. Organized parametric results can help the optimized use of the water. By using wireless communication and environmental energy harvesting techniques, sensor network can be made totally wireless. Internet of Things (IoT) is another emerging technology that goals to extend the application of internet from complex computational machines (computer) to the stand alone devices such as consumer electronics. Integrating IoT to WSN not only can provide remote access but also allow two distinct information systems to frequently collaborate and provide common services. Also the user can be provided with flexible interface like mobile application. The miniaturization in technology and even more reliable communication are the strongest suits of such sensor network. This paper reviews for various technologies to fulfil requirement of such application and the shows some system characteristics.

Keywords:
 WSN, IoT, Irrigation, Moisture, Humidity, Energy Harvesting, etc.


References:

1.       Basic Botany, Physiology, and Environmental Effects on Plant Growth, AZ master gardner manual, The University of Arizona, AZ, 1998.
2.       M. Morris. (2006). Soil Moisture Monitoring: Low-Cost Tools and Methods [Online]. Available FTP: attra.ncat.org Directory: attra-pub/PDF File: soil moisture.pdf

3.       Y. Kim, R. Evans and W. Iversen, “Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network,” in IEEE Transactions on Instrumentation and Measurement, vol. 57, pp. 1379ꟷ1387, July 2008.

4.       W. Wang and S. Cao, “Application Research on Remote Intelligent Monitoring System of Greenhouse Based on ZIGBEE WSN,” 2nd International Congress on Image and Signal Processing, Tianjin, pp. 1-5, 2009.

5.       Yu, Y. Cui, L. Zhang and S. Yang, “ZigBee Wireless Sensor Network in Environmental Monitoring Applications,” 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1ꟷ5, 2009.

6.       Z. Rasin, H. Hamzah and M. Aras, “Application and evaluation of high power Zigbee based wireless sensor network in water irrigation control monitoring system,” IEEE Symposium on Industrial Electronics & Applications, Kuala Lumpur, pp. 548ꟷ551, 2009.

7.       M. Zorzi, A. Gluhak, S. Lange and A. Bassi, “From today’s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view,” in IEEE Wireless Communications, vol. 17, no. 6, pp. 44-51, December 2010.

8.       G. Kortuem, F. Kawsar, V. Sundramoorthy and D. Fitton, “Smart objects as building blocks for the Internet of things,” in IEEE Internet Computing, vol. 14, no. 1, pp. 44-51, Jan.-Feb. 2010.

9.       K. Langendoen, A. Baggio and O. Visser, “Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture,” Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes Island, pp. 1ꟷ8, 2006.

10.    L. Li, H. Xiaoguang, C. Ke and H. Ketai, “The applications of WiFi-based Wireless Sensor Network in Internet of Things and Smart Grid,” 6th IEEE Conference on Industrial Electronics and Applications, Beijing, pp. 789-793, 2011

11.    M. Lee, J. Hwang and H. Yoe, “Agricultural Production System Based on IoT,” IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, pp. 833-837, 2013.

11-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Sajith A.G, Hariharan S

Paper Title:

A Region based Active Contour Approach for Liver CT Image Analysis Driven by Local likelihood Image Fitting Energy

Abstract: Computer tomography images are widely used in the diagnosis of liver tumor analysis because of its faster acquisition and compatibility with most life support devices. Accurate image segmentation is very sensitive in the field of medical image analysis. Active contours plays an important role in the area of medical image analysis. It constitute a powerful energy minimization criteria for image segmentation. This paper presents a region based active contour model for liver CT image segmentation based on variational level set formulation driven by local likelihood image fitting energy. The neigh bouring intensities of image pixels are described in terms of Gaussian distribution. The mean and variances of intensities in the energy functional can be estimated during the energy minimization process. The updation of mean and variance guide the contour evolving toward tumor boundaries. Also this model has been compared with different active active contour models. Our results shows that the presented model achieves superior performance in CT liver image segmentation. 

Keywords:
Active Contours, Chan-Vese model, Level sets


References:

1.       Kass, M., Witkin, A., and Terzopoulos, D.: ‘Snakes: Active contour models’, International journal of computer vision, 1988, 1, (4), pp. 321-331
2.       Osher, S., and Sethian, J.A.: ‘Fronts propagating with curvature-dependent speed: algorithms based on Hamilton-Jacobi formulations’, Journal of computational
physics, 1988, 79, (1), pp. 12-49

3.       Caselles, V., Kimmel, R., and Sapiro, G.: ‘Geodesic active contours’, International journal of computer vision, 1997, 22, (1), pp. 61-79

4.       Kimmel, R., Amir, A., and Bruckstein, A.M.: ‘Finding shortest paths on surfaces using level sets propagation’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995, 17, (6), pp. 635-640

5.       Li, C., Xu, C., Gui, C., and Fox, M.D.: ‘Distance regularized level set evolution and its application to image segmentation’, IEEE transactions on image processing, 2010, 19, (12), pp. 3243-3254

6.       Malladi, R., Sethian, J.A., and Vemuri, B.C.: ‘Shape modeling with front propagation: A level set approach’, IEEE transactions on pattern analysis and machine intelligence, 1995, 17, (2), pp. 158-175

7.       Vasilevskiy, A., and Siddiqi, K.: ‘Flux maximizing geometric flows’, IEEE transactions on pattern analysis and machine intelligence, 2002, 24, (12), pp. 1565-1578

8.       Xu, C., and Prince, J.L.: ‘Snakes, shapes, and gradient vector flow’, IEEE Transactions on image processing, 1998, 7, (3), pp. 359-369

9.       Chan, T.F., and Vese, L.A.: ‘Active contours without edges’, IEEE Transactions on image processing, 2001, 10, (2), pp. 266-277

10.    Cremers, D., Rousson, M., and Deriche, R.: ‘A review of statistical approaches to level set segmentation: integrating color, texture, motion and shape’, International journal of computer vision, 2007, 72, (2), pp. 195-215

11.    He, L., Peng, Z., Everding, B., Wang, X., Han, C.Y., Weiss, K.L., and Wee, W.G.: ‘A comparative study of deformable contour methods on medical image segmentation’, Image and Vision Computing, 2008, 26, (2), pp. 141-163

12.    Li, C., Huang, R., Ding, Z., Gatenby, J.C., Metaxas, D.N., and Gore, J.C.: ‘A level set method for image segmentation in the presence of intensity inhomogeneities with application to MRI’, IEEE Transactions on Image Processing, 2011, 20, (7), pp. 2007-2016

13.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Minimization of region-scalable fitting energy for image segmentation’, IEEE transactions on image processing, 2008, 17, (10), pp. 1940-1949

14.    Paragios, N., and Deriche, R.: ‘Geodesic active regions and level set methods for supervised texture segmentation’, International Journal of Computer Vision, 2002, 46, (3), pp. 223-247

15.    Ronfard, R.: ‘Region-based strategies for active contour models’, International journal of computer vision, 1994, 13, (2), pp. 229-251

16.    Samson, C., Blanc-Féraud, L., Aubert, G., and Zerubia, J.: ‘A variational model for image classification and restoration’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22, (5), pp. 460-472

17.    Tsai, A., Yezzi, A., and Willsky, A.S.: ‘Curve evolution implementation of the Mumford-Shah functional for image segmentation, denoising, interpolation, and magnification’, IEEE transactions on Image Processing, 2001, 10, (8), pp. 1169-1186

18.    Vese, L.A., and Chan, T.F.: ‘A multiphase level set framework for image segmentation using the Mumford and Shah model’, International journal of computer vision, 2002, 50, (3), pp. 271-293

19.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Implicit active contours driven by local binary fitting energy’, in Editor (Ed.)^(Eds.): ‘Book Implicit active contours
driven by local binary fitting energy’ (IEEE, 2007, edn.), pp. 1-7

20.    Wang, L., He, L., Mishra, A., and Li, C.: ‘Active contours driven by local Gaussian distribution fitting energy’, Signal Processing, 2009, 89, (12), pp. 2435-2447

21.    Zhang, K., Song, H., and Zhang, L.: ‘Active contours driven by local image fitting energy’, Pattern recognition, 2010, 43, (4), pp. 1199-1206

22.    Mumford, D., and Shah, J.: ‘Optimal approximations by piecewise smooth functions and associated variational problems’, Communications on pure and applied mathematics, 1989, 42, (5), pp. 577-685

15-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ogundare A.B, Ihiovi M.M

Paper Title:

Design of a 3 Phase Automatic Change-Over Switch using a PIC Microcontroller (PIC16F877A)

Abstract: Change over process involves switching electrical load from one power source to another, when the load is powered by two alternative sources (main utility and stand by generator). The process can be complex if it involves starting and stopping of source like generator and monitoring of mains. This paper presents a method to ease this rigorous process. A 3 phase automatic change over which uses generator control mechanism is designed to select between two available sources of power in this case, generator and utility with preference to the utility. The system monitors the utility mains supply and checks for complete failure as well as phase failure upon which it automatically start the generator, run it on idle for a minute, then switch the load to it. The system keeps monitoring the utility source for power restoration, it also monitor the generator output for failure upon any of which it switches back the load to utility supply and automatically switch off the generator. Once power is restored, the system delays for two minute before transferring the load to the utility supply. Success was recorded as the above processes were automated. This was achieved with the combination of discrete electrical and electronics components

Keywords:
 Electrical Load, Utility, Generator, Electrical and Electronics Components.


References:

1.       Ahmed M.S., Mohammed A.S. and Agusiobo O.B. (2006) ‘’Development of a Single Phase Automatic Change-Over Switch’’. AU J.T. 10(1): 68-74. Federal University of Technology Minna, Nigeria. (Jul. 2006)
2.       Amos, S.W. and James, M. (1981). Principles of transistor circuit: Introduction to the design of amplifiers, receivers and digital circuits. 6th ed., Hartnolls ltd., bodmin.UK.

3.       Atser A. Roy et-al, (2014). Design and Implementation of a 3-Phase Automatic Power Change-over Switch. e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-3, Issue-9, pp-07-14

4.       Ezema L.S., Peter B.U., Harris O.O. (2012). Design of automatic change over switch with Generator control mechanism. SAVAP international.

5.       L.S. Ezema et-al, (2012). Design of Automatic Change Over Switch with Generator Control Mechanism. ISSN-L: 2223-9944. Vol.3, No.3, November 2012.

6.       Faissler, W.L. (1991). An introduction to modern Electronics, Willey, New York, NY, USA.

7.       Horowitz, P. and Winfield, H. (2002). The Art of Electronics, 2nd ed. Cambridge Univ. Press, Cambridge, UK

8.       Owen, B. (1995). Beginner’s Guide to Electronics 4th Ed. A Newness Technical Book, McGraw-Hill Companies Inc. New York, N.Y, USA.

9.       Oduobuk, E. J. et-al (2014). Design and Implementation of Automatic Three Phase Changer over Using LM324 Quad Integrated Circuit. International Journal of
Engineering and Technology Research Vol. 2, No. 4, April 2014, pp. 1 – 15, ISSN: 2327 – 0349.

10.    Rocks G. and Mazur G., (1993). Electrical motor controls. American Technical Publication, New-York, N.Y, USA.

11.    Ragnar, H. (1958). Electric Contacts Handbook. 3rd Edition, Springer-Verlag, Berlin/ Göttingen /Heidelberg. pp. 331-342.

12.    Theraja, B.L.; and Theraja, A.K. 2002. Electrical Technology, 21st ed. Ranjendra Ravida, New Delhi, India.

24-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Pooja C.S, K. R. Prassana Kumar 

Paper Title:

Survey on Load Balancing and Auto Scaling techniques for cloud Environment

Abstract: Cloud computing became now first choice and priority for every person who access the internet, one of the advantageous features of cloud computing is its scalability and flexibility. Auto scaling offers the facility to the individuals to scale up and scale down the resources as per their requirements, using only the needed resouce and paying for what they have used i.e “pay-as-you-use”. As everything take place in automatic manner, so human involvement errors are less and reduce the manpower and costs. so to make use of elasticity user must use auto scaling technique that balances the incoming workload, and reduce the total cost and maintain the Service Level Agreement (SLA).In this work main ideas revolve around the problems in scalable cloud computing systems. In modern days, management of resources is in boom and most talked topic in cloud environment. we present some of the existing load balancing policies and about Autoscaling categories.

Keywords:
cloud computing, scaling, auto scaling, load balancing.


References:

1.    Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf,”NIST Cloud Computing Reference Architecture”, NIST Special Publication 500-292, September 2011.
2.    M.Kriushanth, L. Arockiam and G. JustyMirobi,”Auto Scaling in Cloud Computing: An Overview”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013, ISSN (Print): 2319-5940,ISSN (Online) : 2278-1021.

3.    Tania Lorido-Botran, Jose Miguel-Alonso , Jose A. Lozano, “A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments”, ARTICLE in JOURNAL OF GRID COMPUTING DECEMBER 2014, Impact Factor: 1.51 • DOI: 10.1007/s10723-014-9314-7.

4.    ChenhaoQu, Rodrigo N. Calheiros, and RajkumarBuyya,”A Reliable and Cost-Ecient Auto-Scaling System for Web Applications Using Heterogeneous Spot Instances”, Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing and Information Systems, The University of Melbourne, Australia, September 17, 2015.

5.    Gunpriya Makkar, Pankaj Deep Kaur,”A Review of Load Balancing in Cloud Computing”, Guru Nanak Dev University, Jalandhar, India, Volume 5, Issue 4, 2015 ISSN: 2277 128X.

6.    Priyanka P. Kukade and Geetanjali Kale “Survey of Load Balancing and Scaling approaches in cloud” vol.4 Feb 2015.

7.    Ashalatha R Evaluation of Auto Scaling and Load Balancing Features in Cloud” vol.117 may 2015.

8.    Dr. D .Ravindran, Ab Rashid Dar loud Based Resource Management with Autoscaling vol.2 .

28-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Cini K.

Paper Title:

Value Based Reliability Evaluation of Primary Power Distribution System

Abstract: Distribution system reliability is concerned with the availability and quality of power supply at each customer’s service entrance. Analysis of customer failure statistics shows that failure in distribution system contribute as much as 90% towards the unavailability of supply to a load as compared with each part of electric systems. These statistics reinforces the need for reliability evaluation of distribution systems. In recent years with the advent of smart grids the significance of distribution system has enhanced because of the importance of co generation and distributed generation. The different causes and duration of failures are analysed season wise. The failure rate of the different feeders of the system under study was calculated and the reliable feeders were identified. Suggestions are given to improve the reliability of the feeders. This type of analysis will help the operation and maintenance engineers to maintain the quality service to the customers and schedule the maintenance services.  

Keywords:
Distribution Systems, Reliability Indices, Failure Rate, Availability.

References:
1.       Biyun Chen; Qianyi Chen “The whole-process reliability evaluation  of  power  system including generation, transmission, transformation and distribution” IEEE 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), pp 482-487
2.       H. 2. Andrews, Laura, Samuel” Novel Power System Reliability Indices calculation method” 23rd International Conference on Electricity Distribution, Lyon  15-18, June .

3.       Roy Billinton and Peng Wang “ Distribution System Reliability Cost/worth analysis Using Analytical and sequential Simulation Techniques” IEEE transactions on power systems, Vol.13, No.4, November 1998,pp1245-1250.

4.       R. Billinton and J. E. Billinton, “Distribution System Reliability Indices”, IEEE Trans. on Power Delivery, Vol. 4, No. 1, Jan. 1989, pp. 561-568.

5.       Vito Longo ,Walter R. Puntel, “Evaluation of Distribution System Enhancements Using Value-Based Reliability Planning” Procedures IEEE Transactions on Power
systems, vol. 15, no. 3, august 2000.

6.       Billinton, R., and Allan, R. N., “Reliability Evaluation of Power Systems”,Pitman Books, New York and London, 1984.

7.       Billinton, R., “Evaluation of Reliability Worth in an Electric Power system”. Reliability Engineering and System Safety, Vol. 46, No. 1, 1994.

8.       Carlos Eduardo Paida Tenemaza “State of Art, Reliability In Electrical Distribution Systems Based On Markov Stochastic Model”  IEEE Latin America Transactions, Volume: 14, Issue: 2, pp 799-804.

9.       Farajollah Soudi and Kevin Tomsovic  “Optimal Trade-Offs in Distribution Protection Design” IEEE  transactions on power delivery, vol. 16, no. 2, April 2001.

10.    Amir Safdarian; Mohammad Farajollahi; Mahmud Fotuhi-Firuzabad “ Impacts of Remote Control Switch Malfunction on Distribution System Reliability” IEEE Transactions on Power Systems, Volume: 32, Issue: 2, 2017, pp 1572-1573.

11.    Siripha Junlakarn; Marija Ilić , “Distribution System Reliability Options and Utility Liability”  IEEE Transactions on Smart Grid , Volume: 5, Issue: 5, 2014, pp 2227-2234.

6-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

S. L. Deshpande, D S Chaudhari

Paper Title:

Wireless Nodes Assisted Micro-Irrigation System: an IoT Approach

Abstract: Irrigation systems deployed with Wireless Sensor Network (WSN) while transforming them to Micro-Irrigation systems are emerging as fruitful solution to ongoing ground water crisis. Field parameters like soil moisture, temperature and humidity can be monitored taking help of sensor array and can be fed back to decision making control system. Organized parametric results can help the optimized use of the water. By using wireless communication and environmental energy harvesting techniques, sensor network can be made totally wireless. Internet of Things (IoT) is another emerging technology that goals to extend the application of internet from complex computational machines (computer) to the stand alone devices such as consumer electronics. Integrating IoT to WSN not only can provide remote access but also allow two distinct information systems to frequently collaborate and provide common services. Also the user can be provided with flexible interface like mobile application. The miniaturization in technology and even more reliable communication are the strongest suits of such sensor network. This paper reviews for various technologies to fulfil requirement of such application and the shows some system characteristics.

Keywords:
 WSN, IoT, Irrigation, Moisture, Humidity, Energy Harvesting, etc.


References:

1.       Basic Botany, Physiology, and Environmental Effects on Plant Growth, AZ master gardner manual, The University of Arizona, AZ, 1998.
2.       M. Morris. (2006). Soil Moisture Monitoring: Low-Cost Tools and Methods [Online]. Available FTP: attra.ncat.org Directory: attra-pub/PDF File: soil moisture.pdf

3.       Y. Kim, R. Evans and W. Iversen, “Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network,” in IEEE Transactions on Instrumentation and Measurement, vol. 57, pp. 1379ꟷ1387, July 2008.

4.       W. Wang and S. Cao, “Application Research on Remote Intelligent Monitoring System of Greenhouse Based on ZIGBEE WSN,” 2nd International Congress on Image and Signal Processing, Tianjin, pp. 1-5, 2009.

5.       Yu, Y. Cui, L. Zhang and S. Yang, “ZigBee Wireless Sensor Network in Environmental Monitoring Applications,” 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1ꟷ5, 2009.

6.       Z. Rasin, H. Hamzah and M. Aras, “Application and evaluation of high power Zigbee based wireless sensor network in water irrigation control monitoring system,” IEEE Symposium on Industrial Electronics & Applications, Kuala Lumpur, pp. 548ꟷ551, 2009.

7.       M. Zorzi, A. Gluhak, S. Lange and A. Bassi, “From today’s INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view,” in IEEE Wireless Communications, vol. 17, no. 6, pp. 44-51, December 2010.

8.       G. Kortuem, F. Kawsar, V. Sundramoorthy and D. Fitton, “Smart objects as building blocks for the Internet of things,” in IEEE Internet Computing, vol. 14, no. 1, pp. 44-51, Jan.-Feb. 2010.

9.       K. Langendoen, A. Baggio and O. Visser, “Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture,” Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes Island, pp. 1ꟷ8, 2006.

10.    L. Li, H. Xiaoguang, C. Ke and H. Ketai, “The applications of WiFi-based Wireless Sensor Network in Internet of Things and Smart Grid,” 6th IEEE Conference on Industrial Electronics and Applications, Beijing, pp. 789-793, 2011

11.    M. Lee, J. Hwang and H. Yoe, “Agricultural Production System Based on IoT,” IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, pp. 833-837, 2013.

11-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Sajith A.G, Hariharan S

Paper Title:

A Region based Active Contour Approach for Liver CT Image Analysis Driven by Local likelihood Image Fitting Energy

Abstract: Computer tomography images are widely used in the diagnosis of liver tumor analysis because of its faster acquisition and compatibility with most life support devices. Accurate image segmentation is very sensitive in the field of medical image analysis. Active contours plays an important role in the area of medical image analysis. It constitute a powerful energy minimization criteria for image segmentation. This paper presents a region based active contour model for liver CT image segmentation based on variational level set formulation driven by local likelihood image fitting energy. The neigh bouring intensities of image pixels are described in terms of Gaussian distribution. The mean and variances of intensities in the energy functional can be estimated during the energy minimization process. The updation of mean and variance guide the contour evolving toward tumor boundaries. Also this model has been compared with different active active contour models. Our results shows that the presented model achieves superior performance in CT liver image segmentation. 

Keywords:
Active Contours, Chan-Vese model, Level sets


References:

1.       Kass, M., Witkin, A., and Terzopoulos, D.: ‘Snakes: Active contour models’, International journal of computer vision, 1988, 1, (4), pp. 321-331
2.       Osher, S., and Sethian, J.A.: ‘Fronts propagating with curvature-dependent speed: algorithms based on Hamilton-Jacobi formulations’, Journal of computational
physics, 1988, 79, (1), pp. 12-49

3.       Caselles, V., Kimmel, R., and Sapiro, G.: ‘Geodesic active contours’, International journal of computer vision, 1997, 22, (1), pp. 61-79

4.       Kimmel, R., Amir, A., and Bruckstein, A.M.: ‘Finding shortest paths on surfaces using level sets propagation’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995, 17, (6), pp. 635-640

5.       Li, C., Xu, C., Gui, C., and Fox, M.D.: ‘Distance regularized level set evolution and its application to image segmentation’, IEEE transactions on image processing, 2010, 19, (12), pp. 3243-3254

6.       Malladi, R., Sethian, J.A., and Vemuri, B.C.: ‘Shape modeling with front propagation: A level set approach’, IEEE transactions on pattern analysis and machine intelligence, 1995, 17, (2), pp. 158-175

7.       Vasilevskiy, A., and Siddiqi, K.: ‘Flux maximizing geometric flows’, IEEE transactions on pattern analysis and machine intelligence, 2002, 24, (12), pp. 1565-1578

8.       Xu, C., and Prince, J.L.: ‘Snakes, shapes, and gradient vector flow’, IEEE Transactions on image processing, 1998, 7, (3), pp. 359-369

9.       Chan, T.F., and Vese, L.A.: ‘Active contours without edges’, IEEE Transactions on image processing, 2001, 10, (2), pp. 266-277

10.    Cremers, D., Rousson, M., and Deriche, R.: ‘A review of statistical approaches to level set segmentation: integrating color, texture, motion and shape’, International journal of computer vision, 2007, 72, (2), pp. 195-215

11.    He, L., Peng, Z., Everding, B., Wang, X., Han, C.Y., Weiss, K.L., and Wee, W.G.: ‘A comparative study of deformable contour methods on medical image segmentation’, Image and Vision Computing, 2008, 26, (2), pp. 141-163

12.    Li, C., Huang, R., Ding, Z., Gatenby, J.C., Metaxas, D.N., and Gore, J.C.: ‘A level set method for image segmentation in the presence of intensity inhomogeneities with application to MRI’, IEEE Transactions on Image Processing, 2011, 20, (7), pp. 2007-2016

13.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Minimization of region-scalable fitting energy for image segmentation’, IEEE transactions on image processing, 2008, 17, (10), pp. 1940-1949

14.    Paragios, N., and Deriche, R.: ‘Geodesic active regions and level set methods for supervised texture segmentation’, International Journal of Computer Vision, 2002, 46, (3), pp. 223-247

15.    Ronfard, R.: ‘Region-based strategies for active contour models’, International journal of computer vision, 1994, 13, (2), pp. 229-251

16.    Samson, C., Blanc-Féraud, L., Aubert, G., and Zerubia, J.: ‘A variational model for image classification and restoration’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22, (5), pp. 460-472

17.    Tsai, A., Yezzi, A., and Willsky, A.S.: ‘Curve evolution implementation of the Mumford-Shah functional for image segmentation, denoising, interpolation, and magnification’, IEEE transactions on Image Processing, 2001, 10, (8), pp. 1169-1186

18.    Vese, L.A., and Chan, T.F.: ‘A multiphase level set framework for image segmentation using the Mumford and Shah model’, International journal of computer vision, 2002, 50, (3), pp. 271-293

19.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Implicit active contours driven by local binary fitting energy’, in Editor (Ed.)^(Eds.): ‘Book Implicit active contours
driven by local binary fitting energy’ (IEEE, 2007, edn.), pp. 1-7

20.    Wang, L., He, L., Mishra, A., and Li, C.: ‘Active contours driven by local Gaussian distribution fitting energy’, Signal Processing, 2009, 89, (12), pp. 2435-2447

21.    Zhang, K., Song, H., and Zhang, L.: ‘Active contours driven by local image fitting energy’, Pattern recognition, 2010, 43, (4), pp. 1199-1206

22.    Mumford, D., and Shah, J.: ‘Optimal approximations by piecewise smooth functions and associated variational problems’, Communications on pure and applied mathematics, 1989, 42, (5), pp. 577-685

15-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ogundare A.B, Ihiovi M.M

Paper Title:

Design of a 3 Phase Automatic Change-Over Switch using a PIC Microcontroller (PIC16F877A)

Abstract: Change over process involves switching electrical load from one power source to another, when the load is powered by two alternative sources (main utility and stand by generator). The process can be complex if it involves starting and stopping of source like generator and monitoring of mains. This paper presents a method to ease this rigorous process. A 3 phase automatic change over which uses generator control mechanism is designed to select between two available sources of power in this case, generator and utility with preference to the utility. The system monitors the utility mains supply and checks for complete failure as well as phase failure upon which it automatically start the generator, run it on idle for a minute, then switch the load to it. The system keeps monitoring the utility source for power restoration, it also monitor the generator output for failure upon any of which it switches back the load to utility supply and automatically switch off the generator. Once power is restored, the system delays for two minute before transferring the load to the utility supply. Success was recorded as the above processes were automated. This was achieved with the combination of discrete electrical and electronics components

Keywords:
 Electrical Load, Utility, Generator, Electrical and Electronics Components.


References:

1.       Ahmed M.S., Mohammed A.S. and Agusiobo O.B. (2006) ‘’Development of a Single Phase Automatic Change-Over Switch’’. AU J.T. 10(1): 68-74. Federal University of Technology Minna, Nigeria. (Jul. 2006)
2.       Amos, S.W. and James, M. (1981). Principles of transistor circuit: Introduction to the design of amplifiers, receivers and digital circuits. 6th ed., Hartnolls ltd., bodmin.UK.

3.       Atser A. Roy et-al, (2014). Design and Implementation of a 3-Phase Automatic Power Change-over Switch. e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-3, Issue-9, pp-07-14

4.       Ezema L.S., Peter B.U., Harris O.O. (2012). Design of automatic change over switch with Generator control mechanism. SAVAP international.

5.       L.S. Ezema et-al, (2012). Design of Automatic Change Over Switch with Generator Control Mechanism. ISSN-L: 2223-9944. Vol.3, No.3, November 2012.

6.       Faissler, W.L. (1991). An introduction to modern Electronics, Willey, New York, NY, USA.

7.       Horowitz, P. and Winfield, H. (2002). The Art of Electronics, 2nd ed. Cambridge Univ. Press, Cambridge, UK

8.       Owen, B. (1995). Beginner’s Guide to Electronics 4th Ed. A Newness Technical Book, McGraw-Hill Companies Inc. New York, N.Y, USA.

9.       Oduobuk, E. J. et-al (2014). Design and Implementation of Automatic Three Phase Changer over Using LM324 Quad Integrated Circuit. International Journal of
Engineering and Technology Research Vol. 2, No. 4, April 2014, pp. 1 – 15, ISSN: 2327 – 0349.

10.    Rocks G. and Mazur G., (1993). Electrical motor controls. American Technical Publication, New-York, N.Y, USA.

11.    Ragnar, H. (1958). Electric Contacts Handbook. 3rd Edition, Springer-Verlag, Berlin/ Göttingen /Heidelberg. pp. 331-342.

12.    Theraja, B.L.; and Theraja, A.K. 2002. Electrical Technology, 21st ed. Ranjendra Ravida, New Delhi, India.

24-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Pooja C.S, K. R. Prassana Kumar 

Paper Title:

Survey on Load Balancing and Auto Scaling techniques for cloud Environment

Abstract: Cloud computing became now first choice and priority for every person who access the internet, one of the advantageous features of cloud computing is its scalability and flexibility. Auto scaling offers the facility to the individuals to scale up and scale down the resources as per their requirements, using only the needed resouce and paying for what they have used i.e “pay-as-you-use”. As everything take place in automatic manner, so human involvement errors are less and reduce the manpower and costs. so to make use of elasticity user must use auto scaling technique that balances the incoming workload, and reduce the total cost and maintain the Service Level Agreement (SLA).In this work main ideas revolve around the problems in scalable cloud computing systems. In modern days, management of resources is in boom and most talked topic in cloud environment. we present some of the existing load balancing policies and about Autoscaling categories.

Keywords:
cloud computing, scaling, auto scaling, load balancing.


References:

1.    Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf,”NIST Cloud Computing Reference Architecture”, NIST Special Publication 500-292, September 2011.
2.    M.Kriushanth, L. Arockiam and G. JustyMirobi,”Auto Scaling in Cloud Computing: An Overview”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013, ISSN (Print): 2319-5940,ISSN (Online) : 2278-1021.

3.    Tania Lorido-Botran, Jose Miguel-Alonso , Jose A. Lozano, “A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments”, ARTICLE in JOURNAL OF GRID COMPUTING DECEMBER 2014, Impact Factor: 1.51 • DOI: 10.1007/s10723-014-9314-7.

4.    ChenhaoQu, Rodrigo N. Calheiros, and RajkumarBuyya,”A Reliable and Cost-Ecient Auto-Scaling System for Web Applications Using Heterogeneous Spot Instances”, Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing and Information Systems, The University of Melbourne, Australia, September 17, 2015.

5.    Gunpriya Makkar, Pankaj Deep Kaur,”A Review of Load Balancing in Cloud Computing”, Guru Nanak Dev University, Jalandhar, India, Volume 5, Issue 4, 2015 ISSN: 2277 128X.

6.    Priyanka P. Kukade and Geetanjali Kale “Survey of Load Balancing and Scaling approaches in cloud” vol.4 Feb 2015.

7.    Ashalatha R Evaluation of Auto Scaling and Load Balancing Features in Cloud” vol.117 may 2015.

8.    Dr. D .Ravindran, Ab Rashid Dar loud Based Resource Management with Autoscaling vol.2 .

28-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Issue-2 Published on December 30, 2016

Volume-6 Issue-2 Published on December 30, 2016
 Download Abstract Book

S. No

Volume-6 Issue-2, December 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Katsikides S., Markoulis S., Papaminas M.

Paper Title:

Corporate Social Responsibility and Stock Market Performance: An Event Study Approach

Abstract: This paper examines the relationship between Corporate Social Responsibility and stock market performance. To examine this relationship the “event-study” methodology is utilised to examine five events, two from the oil industry (BP and Exxon oil spills) and three from the banking industry (HSBC – money laundering; Barclays and Royal Bank of Scotland – Libor scandal). Results suggest that, apart from the HSBC money laundering event, all other events appear to have a significant effect on stock market performance as the shares of the firms involved tend to exhibit significant negative average abnormal returns during the period which followed the event. We also find some differences regarding the time-frame of the effect, since for some events it took more time to get into “full swing” and lasted longer.

Keywords:
  Event-study; Corporate Social Responsibility; Stock market performance.


References:

1.       Abbot, Walter F.,R.,Joseph, M. (1979). On the Measurement of Corporate Social Responsibility. Academy of Management Journal, pp. 501-515.
2.       Agle, B. R., Donaldson, T., Freeman, R. E., Jensen, M. C., Mitchell, R. K., & Wood, D. J. (2008). Dialogue: Towards superior stakeholder theory. Business Ethics Quarterly, 18, pp.153‒190.

3.       Alexander, Gordon J. and Buchholz, R.A. (1978). Corporate social responsibility and stock market performance. The Academy of Management Journal, 21,(3), pp. 479-486.

4.       Anderson, C. and Frankle, A.D. (1980). Voluntary social reporting: an iso-beta portfolio analysis. Accounting Review, 33, pp. 467–479.

5.       Ball, R., and P. Brown (1968). An empirical evaluation of accounting income numbers. Journal of Accounting Research 6, pp. 159-177.

6.       Brammer, S., Brooks,C. and Pavelin, S. (2006). Corporate Social Performance and Stock Returns: UK Evidence from Disaggregate Measures. Financial Management 35(3), pp. 97-116.

7.       Boulatoff, C., & Boyer, C. (2009). Green Recovery: How Are Environmental Stocks Doing? The Journal of Wealth Management. pp. 9-20.

8.       Brown, S.J. and Warner J.B. (1980). Measuring Security Price Performance. Journal of Financial Economics 8.

9.       Carroll, A. (2004). Managing ethically with global stakeholders: A present and future challenge. Academy of Management Executive, 2004, Vol. 18, No. 2.

10.    Cheung Y. L, Tan W., Ahn H-J., and Zhang Z. (2010). Does Corporate Social Responsibility Matter in Asian Emerging Markets? Journal of Business Ethics, 92, pp. 401-413.

11.    Cox, P., Brammer, S. and Millington, A. (2004). An Empirical Examination of Institutional Investor Preferences for Corporate Social Performance. Journal of Business Ethics 52(1), pp.27-43.

12.    Derwall, J., Günster, N., Bauer, R., and Koedijk, K. (2004). The Eco-Efficiency Premium Puzzle Mimeo. Rotterdam School of Management, Erasmus University.

13.    Fama, E., Fisher, L., Jensen, M., Roll, R. (1969). The adjustment of stock prices to new information. International Economic Review 10, pp. 1–21.

14.    Feldman, S.J., Soyka, P.A., and Ameer, P.G. (1997). Does Improving a Firm’s Environmental Management System and Environmental Performance Result in a Higher Stock Price? Journal of Investing 6(4), pp. 87-97.

15.    Flammer, C. (2012). Corporate Social Responsibility and Stock Prices: The Environmental Awareness of Shareholders. MIT Sloan School of Management.

16.    Freeman, R. E. (1984). Strategic management: A stakeholder approach. Boston: Pitman.

17.    M. Friedman (1962). Capitalism and Freedom. Chicago University Press.

18.    Geczy, C.C., Stambaugh, R. F., and Levin, D. (2003). Investing in socially responsible mutual funds. mimeo.

19.    Griffin, J.J. and Mahon, J.F. (1997). The corporate social performance and financial performance debate: twenty-five years of incomparable research. Business & Society, 36(1), pp. 5-31.

20.    Guerard, J.B. Jr. (1997a). Is there a Cost to being Socially Responsible? Journal of Investing 6(2), pp. 11-18.

21.    Guerard, J.B. Jr. (1997b). Additional Evidence on the Cost of being Socially Responsible in Investing Journal of Investing 6(4), pp. 31-35.

22.    Hamilton, S., Jo, H., and Statman, M. (1993). Doing Well While Doling Good? The Investment Performance of Socially Responsible Mutual Funds. Financial Analysts Journal November, pp. 62-66.

23.    Jensen, M.C (2001). Value maximization, stakeholder theory, and the corporate objective function. Journal of Applied Corporate Finance, 14, pp. 2001.

24.    Jones, T. M. (1995). Instrumental stakeholder theory: A synthesis of ethics and economics. Academy of Management Review, 20, pp. 404 ‒ 437.

25.    Kothari, S. P., & Warner, J. B. 2007. Econometrics of event studies. In B. E. Eckbo (Ed.), Handbook of corporate finance: Empirical corporate finance: pp. 3 ‒ 36. North Holland: Elsevier.

26.    Kotler, P., & Lee, N. (2005). Corporate Social Responsibility: Doing the most good for your company and your cause. New Jersey: John Wiley & Sons.

27.    MacKinlay, A. C., (1997). Event studies in economics and finance, Journal of Economic Literature 35, pp. 13-39.

28.    Moskowitz, M. R., (1972). Choosing socially responsible stocks. Business and Society review, 1, pp. 71-75.

29.    Orlitzky, M, Schmidt, F.L., and Rynes, S.L. (2003). Corporate Social and Financial Performance: A Meta-Analysis Organization Studies, 24(3), pp. 403-441.

30.    Porter, M.E. (1991). Towards a dynamic theory of strategy, Strategic Management Journal, Special Issue: Volume 12, Issue S2, pp. 95–117.

31.    Shen C-H., and Chang Y. (2009). Ambition Versus Conscience, Does Corporate Social Responsibility Pay off? The Application of Matching Methods. Journal of Business Ethics, Vol. 88, pp. 133-153.

32.    Statman, M. (2000) Socially Responsible Mutual Funds Financial Analysts Journal May, pp. 30-39

33.    Tirole, J. (2001). Corporate governance. Econometrica, 69, 1, pp. 1-35.

34.    Vance, Stanley C. (1975). Are socially responsible corporations good investment risks? Management Review, 64, pp. 18-24.

35.    William S.G. (1981). Using financial data to measure effects of   Regulation. Journal of Law and Economics, 24, pp. 121-158.

1-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Ramazan ŞENER

Paper Title:

Design and Thermal Analysis of Free Piston Linear Generator using In Range Extended Electric Vehicles

Abstract: Today, battery electric vehicles (BEV) have zero emission (tank to wheel) and very high efficiency. However, the most important obstacle of BEV is insufficient range. This disadvantage can be eliminated in term of range extender systems. Range extender system like generator can charge battery when required. Free Piston Linear Generator (FPLG), Wankel engine, Piston Internal Combustion Engine, Gas Turbine Engine and Fuel Cell Engine can be used as range extender unit. In this study, opposed-piston free-piston linear generator which can be used in low weight electric vehicles, which has spark ignition, 153 cm3 volume, and gasoline direct fuel injection was designed via SOLIDWORKS® software. Thermal analysis of the engine was performed by means of ANSYS® software using temperature in the literature. Finally, the engine design is determined to suit thermal operating conditions. It is find out that this system can be used as a range extender unit.

Keywords:
Finite Element Method, Thermal Analysis, Free Piston Linear Generator, Computer Aided Design.


References:

1.       Ferrari, C., Offinger, S., Schier, M., Philipps, F., et al., “Studie zu Range Extender Konzepten für den Einsatz in einem batterieelektrischen Fahrzeug – REXEL, DLR,  Hacker  Media, Stuttgart, Germany, 2012.
2.       Virsik, R., Heron, A., “Free piston linear  generator in  comparison  to  other range-extender  Technologies”  EVS  27  Electric  Vehicle  Symposium  & Exhibition, Spain, 2013.

3.       Varnhagen,  S.J., “Experimental  Investigation  of  the  Wankel  Engine  for Extending the Range of Electric Vehicles” Master thesis, University of California, Davis, 2011.

4.       (2016) Freikolben website. [online]. Available: http://www.freikolben.ch/

5.       Narayan, K.L., Rao, K.M., Sarcar, M.M.M., “Computer Aided Design and Manufacturing” New Delhi: Prentice Hall of India, ISBN 812033342X, 2008.

6.       (2016) Beetron website. [online]. Available: http://www.beetron.ch/

7.       Ferziger, J.H., Peric, M., “Computational methods for fluid dynamics” Springer, 3rd edition, 2002.

8.       Huebner, H.K., Thornton, E.A., Byrom T.G., “The finite element method for engineers” 3rd edition, John Wiley & Sons, 1999.

9.       Durat, M., Kapsiz, M., Nart, E., Ficici, F, Parlak, A., “The effects of coating materials in spark ignition engine design” Materials and Design, s. 540-545, 2012.

10.    Cerit, M., Soyhan, H.S., “Thermal analysis of a combustion chamber surrounded by deposits in an HCCI engine” Applied Thermal Engineering, s. 81-88, 2013.

11.    Çakır, U., “Seramik Kaplı Bir Dizel Motor Yanma Odasının Termal Analizi” M.Sc. Thesis, Sakarya University, 2007.

12.    Cerit, M., “Thermo mechanical analysis of a partially ceramic coated piston used in an SI engine” Surface & Coatings Technology, s. 3499-3505, 2007.

13.    Varol, B., “Turbo Dizel Bir Motorda Bir Pistonun Termal Ve Mekanik Yükler Altında Sonlu Elemanlar Yöntemiyle Gerilim Analizi” M.Sc. Thesis, Hacettepe University, 2012.

14.    Ceylan, S., “Seramik Kaplı Dizel Pistonlarda Termal Gerilmelerin Sonlu Elemanlar Metoduyla Belirlenmesi” M.Sc. Thesis, Sakarya University, 2009.

15.    (2016) Matbase website. [online]. Available: http://www.matbase.com/material-categories/

16.    (2016) Matweb website. [online]. Available: http://asm.matweb.com/

17.    (2016) Makeitfrom website. [online]. Available: http://www.makeitfrom.com/material-properties/

18.    Okur,  M., “Dört  Zamanlı,  Tek  Silindirli,  Buji  İle  Ateşlemeli  Bir  Benzin Motorunun  Sonlu  Elemanlar  Yöntemi  Kullanılarak  Tasarımı  Ve  İmali” Ph.D. thesis, Gazi University, 2007.

19.    Cornforth, J.W., “Finite element analysis of engines” Materials and Design, 1985.

 

9-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

3.

Authors:

N. Maksimov, A. Panas

Paper Title:

Modified Ultra-Wideband Microwave Chaotic Colpitts Oscillator with a Simplified Structure: Implementation, Experiments

Abstract:  Modified Colpitts oscillator with SiGe bipolar transistor as an active element was introduced, implemented and experimentally studied. It enables generation of ultra-wideband chaotic oscillations in the microwave range. Compared to its classical analogue, the oscillator has an extremely simple structure comprising only one single external reactive element (an inductor). The transistor p-n junction capacitance performs the function of oscillator external capacitors. Stable generation of chaotic oscillations in the range of 1 to 8.5 GHz (at 10 dB level) with highest ever efficiency values (7%) for a given class of oscillators has been obtained.

Keywords:
 Chaotic Colpitts oscillator, ultra wideband chaotic oscillations, microwave band, power spectra, power efficiency, implementation, bipolar SiGe transistor


References:

1.       Dmitriev, A.S., Panas, A., Starkov, S.O.: Experiments on speech and music signals transmission using chaos. Int. J. Bifurc. Chaos 5, 1249-1254 (1995)
2.       Dmitriev, A., Panas, A., Starkov, S., Kuzmin, L.: Experiments on RF band communication using chaos. Int. J. Bifurc. Chaos 7, 2511-2527 (1997)

3.       Dmitriev, A.S., Kyarginsky, B.Ye., Panas, A.I., Starkov, S.O.: Experiments on ultra wideband direct chaotic information transmission in microwave band. Int. J. Bifurc. Chaos 13, 1495-1507 (2003)

4.       Panas, A.I., Kyarginsky, B.E., Maximov, N.A.: Single-transistor microwave chaotic oscillator. Proc. NOLTA-2000 2, Dresden, Germany, 445-448 (2000)

5.       Kyarginsky, B.E., Maximov, N.A., Panas, A.I., Starkov, S.O.: Wideband microwave chaotic oscillators. Proc. 1st IEEE Conf. Circuits and Systems for Communications (Circuits and Systems in Broadband Communication Technologies), St. Petrsburg, Russia, 296-299 (2002)

6.       Panas A.I., Kyarginsky B.E., Efremova E.V.: Ultra-wideband microwave chaotic oscillator. Proc. 12th Mediterranean microwave symposium MICROCOLL-2007, Budapest, Hungary, 14-16 May, 145-148 (2007)

7.       Efremova E.V., Nikishov A.Yu., Panas A.I.: UWB Microwave Chaotic Oscillator: from Distributed Structure to CMOS IC Realization. Proc. of 5th European Conf. Circuits and Systems for Communications ECCSC’10. Belgrade, Serbia, November 23-25, 67-70 (2010)

8.       Panas: Ultra wideband microwave chaotic oscillator. Eurasian physical technical journal. 9, 50-56 (2012)

9.       Chong, S.K. Young: UWB Direct Chaotic Communications Technology for Low-Rate WPAN Applications. IEEE Trans. on Vehicular Technology. 57, 1527-1536 (2008)

10.    Efremova E.: Generator of 3-10 GHz ultrawideband microwave chaos. Proc. of 21th Int. Conf. Nonlinear Dynamics of Electronics Systems (NDES). Bari, Italy, (2013)

11.    Kennedy M.P.: Chaos in the Colpitts oscillator. IEEE Trans. on Circuits and Systems I: Theory ans Applications. 41, 771-774 (1994)

12.    G.M. Maggio, O. De Feo, and M.P. Kennedy: Nonlinear analysis of the Colpitts oscillator and application to design. IEEE Trans. on Circuits and Systems. 46(9), 1118-1130 (1999)

13.    Tamasevicius A., Mykolaitis G., Bumelene S., Baziliauskas A., Krivickas R., Lindberg E.: Chaotic Colpitts oscillator for the ultrahigh frequency range. Nonlinear Dynamics. 44, 159-165 (2006)

14.    N.A. Maksimov, and A.I. Panas: Three-point circuits for generating band-limited chaotic oscillators. Proc. Int. Symp. Signals, Circuits, Systems (SCS’2001). Iasi, Romania, 10-11 July, 65-68 (2001)

15.    Maximov N.A., Panas A.I.: Microwave chaotic oscillators with controlled bandwidth. Proc. ICCSC’2004. Moscow, Russia, June 30-July 2, (2004)

16.    Z.G. Shi, L.X. Ran.: Microwave chaotic Colpitts oscillator: design, implementation and applications. Int. J. of Electromagn. Waves and Appl. 20, 1335-1349 (2006)

17.    W. Chen, Yu Guo, Huai Gao, G.P. Li: A novel ultra-wideband microwave chaotic Colpitts oscillator. Proc. Wireless and Microwave Technology Conference (WAMICON). Orlando, Florida, April 16, 1-4 (2013)

18.    Panas A., Maximov N.: Modified microwave chaotic Colpitts oscillator. Proc. of 23th Int. Conf. on Nonlinear Dynamics in Electronic Systems. Como, Italy, (2015)

19.    Jing Xia Li, Yun Cai Wang, Fu Chang Ma.: Experimental demonstration of 1.5 GHz chaos generation using an improved Colpitts oscillator. Nonlinear Dyn. 72, 575-580 (2013)

 

14-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

4.

Authors:

John Kiplagat Biwott, Wanyona Githae, Charles Kabubo

Paper Title:

Challenges Facing Construction of Affordable Decent Low Cost Housing in Turkana County

Abstract: Housing problems in developed countries are characterized by overcrowding, dilapidated structures and shared bathrooms. On the other hand, developing countries like Kenya, the problem is largely complicated by lack of serviced land, lack of access to housing finances, rigid legal framework and over dependence on non-local construction materials, techniques and technologies. Although there have been significant interventions in the effort to reverse this trend in Kenya, some counties especially in marginalized areas like Turkana County have continued to lag behind in provision of decent and affordable houses for its residents. In an effort to establish where the problem is, this study, seek to determine and describe challenges faced by different stakeholders and residents of Turkana County in their endeavor to put up decent low cost housing. 

Keywords:
Affordable housing, decent housing and alternative building technologies and Turkana County


References:

1.       Ayedun, C. A. & Oluwatobi, A. O. (2011). Issues and Challenges Militating against the Sustainability of Affordable Housing Provision in Nigeria. Business Management Dynamics Journal 1(4), pp 1-8.
2.       Barrett, J. A. (1998). Sacrifice and Prophecy in Turkana Cosmology. Nairobi: Paulines Publications.

3.       Buckley, R.M. & Mayo, S. (1988). Housing Policy in Developing Countries: Evaluating the Macroeconomic Impacts. Washington, DC: International Bank for Reconstruction and Development/World Bank.

4.       Hassanali, F.M. (2009). Understanding Reduced Private- Sector Participation in Low Income Housing Delivery in Nairobi.

5.       Kenya National Bureau of Statistics (KNBS). 2007. Basic Report: Kenya Integrated Household Budget Survey (KIHBS) – 2005/06. Nairobi: The Regal Press Kenya Ltd.

6.       Kenya National Bureau of Statistics (KNBS). 2010. The 2009 Kenya Population and Housing Census. Nairobi: Government Printer.

7.       Kenya National Bureau of Statistics (March 2012). Analytical Report on Housing Conditions, Amenities and Household Assets (Vol. 9). Nairobi: Government Printer.

8.       Kothari, C.R. (2004). Research Methodology: Methods and Techniques, (2nd edition). New Delhi: New Age International Publishers.

9.       Krejcie R.V. & Morgan D.W. (1970). Determining Sample Size for Research Activities. Educational and Psychological Measurement 30, pp. 607-610.

10.    Macoloo, G. (1994). The Changing Nature of Financing Low Income Urban Housing Development in Kenya. Housing Studies (Volume 9, Issue 2), pp 189-281.

11.    Ministry of Housing (2004). Sessional Paper No. 3 of 2004: National Housing Policy for Kenya. Nairobi: Government Printers.

12.    Nabutola, W. (2004). Affordable Housing in Kenya: A Case Study of Policy on Informal Settlements, Land Administration and Housing Issues in Informal Environments. 3rd FIG Regional Conference, Jakarta, Indonesia.

13.    Otiso, K.M. (2003). State, Voluntary and Private Sector Partnerships for Slum Upgrading and Basic Service Delivery in Nairobi City. Kenya Cities, 20(4), pp 221-229.

14.    Republic of Kenya (2010). The Constitution of Kenya. Nairobi: Government Printer.

15.    Schussheim, M. J. (2004). Housing Low-Income Families: Problems, Programs Prospects.  Journal of Housing and Community Development Washington; 56(5).

16.    Shitemi, K. (2014, May 9).  Exploring Equalization Fund under Devolution. Retrieved from http://www.shitemi.com/devolution/exploring-equalization-fund-under-devolution/

17.    Wilcox, S. & Fitzpatrick, S. (2010). The Impact of Devolution Housing and Homelessness. London: Joseph Rowntree Foundation.

 

18-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

5.

Authors:

Seyed Amin Ahmadi Olounabadi, Avula.Damodaram, V Kamakshi Prasad, Mahdi Hosseini

Paper Title:

Impact of Multi-Path Security in Wireless Ad Hoc Networks in Indoor Environments by using AOMDV Methods

Abstract:  Ad hoc Network is a decentralized type of wireless network and also is a local area network (LAN) that is built spontaneously as devices connect. , Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. Basically, an ad hoc network is a temporary network connection created for a specific purpose (such as transferring data from one computer to another). Multipath routing is the routing technique of using multiple alternative paths through a network, which can yield a variety of benefits such as fault tolerance, increased bandwidth, or improved security. Ad-hoc On-demand Multipath Distance Vector Routing (AOMDV) protocol is an extension to the AODV protocol for computing multiple loop-free and link disjoint paths and also increases the reliability through transmitting the messages in multiple paths with minimal redundancy, which used in present work. Simulations were conducted using the NS2 network simulator. In order to simulate most of the proposed Byzantine attacks in NS2, a protocol independent Byzantine attack simulation module was developed. This module provides the capability to simulate the black hole, Byzantine wormhole, and Byzantine overlay network wormhole attacks without modifying the routing protocol. We are considering our communication path is changeable even path or node is node failed. So data is sending through different paths, it provide high security than single path.

Keywords:
 wireless network, Ad hoc, AOMDV, Byzantine attacks


References:

1.    Reza Curtmola Cristina Nita-Rotaru, “BSMR: Byzantine- Resilient Secure Multicast Routing in Multi-hop Wireless Networks”, IEEE Transactions on Mobile Computing, vol. 8, Issue. 4, pp. 445 – 459, February 2009.
2.    A.Tsirigos and Z.J.Hass (2004), “Analysis of multi path routing, Part 1: The effects on the packet delivery ratio” IEEE Transactions on Wireless Communication., vol.3, no.2, pp: 500- 511.

3.    Banner, R. Orda, A, “Multipath Routing Algorithms for Congestion Minimization”. This paper appears in: Networking, IEEE/ACM Transactions on Publication Date: April 2007 Volume: 15, Issue: 2, on page(s): 413-424.

4.    Jun Peng, Biplab Sikdar and Liang Cheng (2009) “Multicasting with Localized Control in Wireless Ad Hoc Networks” IEEE Transaction on Mobile Computing.

5.    Papadimitratos, P. Haas, Z.J, “Secure data communication in mobile ad-hoc networks” , This paper appears in: Selected Areas in Communications, IEEE Journal on Publication Date: Feb. 2006,Volume: 24, Issue: 2,On page(s): 343- 356.

6.    Banner , R. Orda, A. “Multipath Routing Algorithms for Congestion Minimization”Conference version in Proc. IFIP Networking 2005.

7.    Papadimitratos, P. Haas, Z.J, Sirer, E, G.”Path Set Selection in Mobile Ad Hoc   Networks”. June 09 – 11, 2002. Pages 1 – 11.

 

24-36

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

6.

Authors:

Immandi Solomon Raju, I Prudhvi Kumar Raju, D Krishna Chaitanya

Paper Title:

Performance Analysis of a Grid Current Compensator using Fuzzy Logic Controller

Abstract: This paper introduces an advanced current control strategy for distributed generation into the utility grid despite the distorted grid voltage and RC loads. The proposed current controller is designed in synchronous reference frame and composed of a fuzzy logic controller. The fuzzy logic controller greatly simplifies the control strategy. It does not require the local load current measurement and harmonic analysis of the grid voltage. Therefore, the proposed control method can be easily adopted into the traditional DG control system without installation of external hardware. The operation principle of the proposed control method is analyzed in detail, and its effectiveness is validated through simulated results.

Keywords:
Distributed Generation (DG), RC load, Fuzzy Logic Controller (FLC), PI Controller, PI-RC Controller


References:

1.       Quoc-Nam Trinh and Hong-HeeLee,”An enhanced grid current compensator for Grid-connected Distribuited Generation uinderNoninear loads and Grid voltage distortions”, IEEE Trans. Ind. Electron., vol. 61, no. 12, pp. 6528– 6536, December,2014.
2.       Q. Zeng and L. Chang, “An advanced SVPWM-based predictive current controller for three-phase C. A. Busada, S. Gomez Jorge, A. E. Leon, and J. A.

3.       Solsona, “Current controller based on reduced order generalized integrators for distributed generation systems,”IEEE Trans. Ind. Electron., vol. 59, no. 7, pp. 2898– 2909, Jul. 2012.

4.       M. Liserre, R. Teodorescu, and F. Blaabjerg, “Multiple harmonics control for three-phase grid converter systems with the use of PI-RES current controller in a rotating
frame,” IEEE Trans. Power Electron., vol. 21, no. 3, pp. 836–841, May 2006.

5.       M. Castilla, J. Miret, A. Camacho, J. Matas, and L. G. de Vicuna, “Reduction of current harmonic distortion in three-phase grid-connected photo- voltaic inverters via resonant current control,” IEEE Trans. Ind. Electron., vol. 60, no. 4, pp. 1464–1472, Apr. 2013.

6.       R.-J. Wai, C.-Y. Lin, Y.-C. Huang, and Y.-R. Chang, “Design of high- performance stand-alone and grid-connected inverter for distributed generation applications,”IEEE Trans. Ind. Electron., vol. 60, no. 4, pp. 1542–1555, Apr. 2013.

7.       J. Balaguer, Q. Lei, S. Yang, U. Supatti, and F. Z. Peng, “Control for grid-connected and intentional islanding operations of distributed power generation,” IEEE Trans.Ind. Electron., vol. 58, no. 1, pp. 147–157, Jan. 2011.

8.       R. C. Dugan and T. E. McDermott, “Distributed generation,” IEEE Ind. Appl. Mag., vol. 8, no. 2, pp. 19–25, Mar./Apr. 2002.

9.       F. Blaabjerg, R. Teodorescu, M. Liserre, and A. V. Timbus, “Overview of control and grid synchronization for distributed power generation systems,” IEEE Trans. Ind.Electron., vol. 53, no. 5, pp. 1398–1409, Oct. 2006.

10.    Z. Yao and L. Xiao, “Control of single-phase grid-connected inverters with nonlinear loads,” IEEE Trans.Ind. Electron., vol. 60, no. 4, pp. 1384– 1389, Apr. 2013.

11.    Z. Liu, J. Liu, and Y. Zhao, “A unified control strategy for three-phase inverter in distributed generation,”IEEE Trans. Power Electron., vol. 29, no. 3, pp. 1176– 1191, Mar. 2014.

12.    IEEE Application Guide for IEEE Std 1547, IEEE Standard for Interconnecting Distributed Resources with Electric Power Systems, IEEE Std. 1547.2-2008, 2008.

13.    Q.-N. Trinh and H.-H. Lee, “Improvement of current performance for grid connected converter under distorted grid condition,” in Proc. IET Conf. RPG, Sep. 6–8, 2011, pp. 1–6

 

37-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

M. Bhanu Divya Bharathi, P. Krishna Chaitanya, K. Sandhya Rani

Paper Title:

Power Quality Improvement of DFIG using FLC Based Variable Wind Turbines by IPC Method

Abstract:  Because of the wind speed variation, breeze shear along with tower shadow effects, grid connected wind generators are the options for power fluctuations which could produce sparkle during constant operation. This paper presents a type of an MW-level varying speed windmill with a new doubly feasted induction generator to analyze the Flicker emission along with mitigation difficulties. Fuzzy logic controller (FLC) was designed to obtain maximum power extraction at low wind speeds to limit power extraction at 1.5MW nominal power set point. The Fuzzy logic based IPC (Individual Pitch Control) scheme is proposed along with the individual message controller is made using generator active power along the wind turbine. A 1.5MW horizontal axis breeze turbine model was designed for tuning as well as simulation performance is studied and the results show the damping of this generator active power by IPC is an efficient means for flicker minimization of varying speed wind generators during constant operation.

Keywords:
 Flicker mitigation, IPC, variable speed wind turbine, DFIG, FLC.


References:

1.       T. Sun, “Power Quality of grid-connected wind turbines with DFIG and their interaction with the grid,” Ph.D. dissertation, Aalborg Univ., Aalborg, Denmark, 2004.
2.       L. Rossetto, P. Tenti, and A. Zuccato, “Electromagnetic compatibility issues in industrial equipment,” IEEE Ind. Appl. Mag., vol. 5, no. 6, pp. 34–46, Nov./Dec. 1999.

3.       A° .Larsson, “Flicker emission of wind turbines during continuous operation,” IEEE Trans. Energy Convers., vol. 17, no. 1, pp. 114–118, Mar. 2002.

4.       H. Sharma, S. Islam, T. Pryor, and C. V. Nayar, “Power quality issues in a wind turbine driven induction generator and diesel hybrid autonomous grid,” J. Elect. Electron.Eng., vol. 21, no. 1, pp. 19–25, 2001.

5.       M. P. Papadopoulos, S. A. Papathanassiou, S. T. Tentzerakis, and N. G. Boulaxis, “Investigation of the flicker emission by grid connected wind turbines,” in Proc. 8th Int. Conf. Harmonics Quality Power, Athens, Greece, 1998, vol. 2, pp. 1152–1157.

6.       T. Sun, Z. Chen, and F. Blaabjerg, “Flicker study on variable speed wind turbines with doubly fed induction generators,” IEEE Trans. Energy Convers., vol. 20, no. 4, pp. 896–905, Dec. 2005.

7.       K. Yun-SeongandW. Dong-Jun, “Mitigation of the flicker level of a DFIG using power factor angle control,” IEEE Trans. Power Del., vol. 24, no. 4, pp. 2457–2458, Oct. 2009.

8.       W. Hu, Z. Chen, Y. Wang, and Z. Wang, “Flicker mitigation by active power control of variable-speed wind turbines with full-scale back-toback power converters,”
IEEE Trans. Energy Convers., vol. 24, no. 3, pp. 640–649, Sep. 2009.

9.       Bossanyi, “Individual blade pitch control for load reduction,” Wind Energy, vol. 6, pp. 119–128, 2002.

10.    Bossanyi, “Further load reductions with Individual pitch control,” Wind Energy, vol. 8, pp. 481–485, 2005.

11.    Y. Zhang, Z. Chen, M. Cheng, and J. Zhang, “Mitigation of fatigue loads using Individual pitch control of wind turbines based on FAST,” in Proc.46th Int. Conf. Universities’ Power Eng., Soest, Germany, 2011.

12.    J. Jonkman and M. L. J. Buhl, “FAST User’s Guide,” National Renewable Energy Laboratory (NREL), Golden, CO, USA, Tech. Rep. NREL/EL-500-38230, (2005). [Online]. Available: http://wind. nrel.gov/designcodes/simulators/fast/

13.    S. M. Muyeen,M. Hasan, R. Takahashi, T.Murata, J. Tamura, Y. Tomaki, A. Sakahara, and E. Sasano, “Comparative study on transient stability analysis of wind
turbine generator system using different drive train models,” IET Renewable Power Generation, vol. 1, no. 2, pp. 131–141, 2007.

14.    D. Wright and L. J. Fingersh, “Advanced control design for wind turbines—Part I: Control design, implementation, and initial tests,” National Renewable Energy Laboratory, NREL Rep. TP-500–42437, National Renewable Energy Laboratory, Mar. 2008.

15.    Electromagnetic Compatibility (EMC)—Part 4: Testing and Measurement Techniques—Section 15: Flickermeter—Functional and Design Specifications,IEC Std. 61 000–4–15, Nov. 1997.

16.    A° .Larsson, “Flicker emission of wind turbines during continuous operation,” IEEE Trans. Energy Convers., vol. 17, no. 1, pp. 114–118, Mar. 2002

 

43-49

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Begard Salih Hassen

Paper Title:

The Powerful Activity of DSDV Algorithm in WSN System

Abstract:   Lately, technological developments in the strategy of processors, memory and radio communications have pushed an attention in the field of sensor network. Networks of those devices are denoted as Wireless Sensor Networks (WSNs). WSNs make possible information accumulation and investigation on an unmatched scale. Indeed, they have concerned care and get wide range of application in diverse areas. The Choice of the protocols and routing are the greatest common schemes that are to be dedicated when manipulative every type of wireless networks likes WSNs. In this paper, performance investigation of “Destination Sequenced Distance Vector DSDV” protocol is done. All the cases for working the protocol are discussed and the time for transmission the information is calculated within multi cases. The results show that this protocol is more strong and robust against the worst cases of losing the nodes or link failure within the network with minimum time for transfer the information through the WSN.

Keywords:
  WSN, DSDV, transmission time, sending and receiving node.


References:

1.       Shio Kumar Singh, M P Singh and D K Singh, “Routing Protocols in Wireless Sensor Networks A Survey”, International Journal of Computer Science & Engineering Survey (IJCSES), Vol. 1, No. 2, DOI : 10.5121/ijcses.2010.1206, November 2010.
2.       Fengju An, “Density Adaptive Sleep Scheduling in Wireless Sensor Networks”, Master of Science Thesis, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, Netherlands, 2013.

3.       Bilal Mustafa and Umar Waqas Raja, “Issues of Routing in VANET”, Master thesis, School of Computing, Blekinge Institute of Technology, Sweden, 2010.

4.       Luis Gironés Quesada, “A Routing Protocol for MANETs”, Master of Science in Communication Technology, Norwegian University of Science and Technology, Department of Telematics, 2007.

5.       Heng Luo, “A Best Effort QoS Support Routing in Mobile ad hoc Networks”, Ph.D. thesis, The University of Edinburgh, 2011.

6.       Ilker Demirkol, Cem Ersoy and Fatih Alagöz, “MAC Protocols for Wireless Sensor Networks: A Survey”, IEEE Communications Magazine, 0163-6804/06, April 2006.

7.       Jennifer Yick, Biswanath Mukherjee and Dipak Ghosal, “Wireless sensor network survey”, Computer Networks, 52 (2008) 2292–2330, journal homepage: www.elsevier.com , 2008.
8.       Ravi Kumar Bansal, “Performance Analysis of Cluster Based Routing Protocol in Manets”, Master Thesis of Engineering, Computer Science and Engineering Department, Thapar Institute of Engineering and Technology, 2006.
9.       Yujie Zhu, “Energy-Efficient Communication Strategies for Wireless Sensor Networks”, Ph.D. thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, 2007.

10.    Rajeshwar Singh, Dharmendra K Singh and Lalan Kumar, “Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks”, Int. Journal of Advanced Networking and Applications, Volume: 02, Issue: 04, Pages: 732-737, 2011.

11.    Kumar Prateek, Nimish Arvind and Satish Kumar Alaria, “MANET-Evaluation of DSDV, AODV and DSR Routing Protocol”, International Journal of Innovations in Engineering and Technology (IJIET), Vol. 2 Issue 1, ISSN: 2319 – 1058, 2013.

12.    Yatendra Mohan Sharma and Saurabh Mukherjee, “Comparative Performance Exploration of AODV, DSDV & DSR Routing Protocol in Cluster Based VANET Environment” International Journal of Advances in Engineering & Technology, IJAET ISSN: 2231-1963, Vol. 4, Issue 2, pp. 120-127, 2012.

13.    Aman Kumar and  Barinderpal Singh, “Performance Analysis of DSDV, I-DSDV Routing Protocol in Monile Ad Hoc Networks in IPv6 under Black Hole Attack”, International Journal of Future Generation Communication and Networking (IJFGCN), Vol. 8, No. 4 , pp. 155-160, http://dx.doi.org/10.14257/ijfgcn.2015.8.4.15, ISSN: 2233-7857, 2015.

14.    M. Pushpadevi and M.Sakthi, “Improved Minimum Delay Routing Using TBETX Routing Over DSDV Routing Protocol in Wireless Ad Hoc Networks”, International Journal of Innovative Research in Computer and Communication Engineering, www.ijircce.com , Vol. 2, Issue 9, ISSN(Online): 2320-9801, ISSN (Print): 2320-9798, 2014.

15.    B.N. Jagdale1, Pragati Patil, P. Lahane and D. Javale, “Analysis and Comparison of Distance Vector, DSDV and AODV Protocol of MANET”, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.2, DOI: 10.5121/ijdps.2012.3210 121, 2012.

16.    Biswaraj Sen and Sanku Sinha, “A Simulation Based Performance Analysis of AODV and DSDV Routing Protocols in MANETs”, International Journal of Modern Engineering Research (IJMER) www.ijmer.com, Vol.2, Issue.4, pp-2404-2408, ISSN: 2249-6645, 2012.

 

50-57

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

9.

Authors:

Vandana Vinayak, Sonika Jindal

Paper Title:

A Review on various Image Compression Methods in Content Based Image Retrieval

Abstract: This paper provides an overview about the various compression techniques available in the research area of Image retrieval, especially Content-Based Image Retrieval (CBIR), an evocative and authentic research area for the last decades. CBIR is used for the retrieval of the images based on the content of the images generally known as features. These features may be low level features i.e. color, shape, texture and spatial relationship or the high level features that use the concept of human brain. Now a days, the development and demand of multimedia product grows increasingly fast, contributing to insufficient storage of memory device. Therefore, the theory of data compression becomes more and more significant for reducing the data redundancy to save more hardware space. Compression is the process of reducing the amount of data required to represent the quality of information. Compression is also useful as it helps to reduce the consumption of expensive resources such as hard disk space.

Keywords:
Especially Content-Based Image Retrieval (CBIR), Therefore, increasingly fast, provides.


References:

1.       J. O. A. Tamer Mehyar, “An enhancement on content based image retrieval using color and texture features,” vol. 3, no. 4. Journal of Emerging Trends in Computing and Information Sciences, April 2012.
2.       S. J. Nitika Sharma, “A review on global features based cbir system.” International Conference on information and mathematical sciences.

3.       G. V. Tcheslavski, “Basic image compression methods,” 2008.

4.       M. Sharma, “Compression using huffman coding,” vol. 10, no. 5. IJCSNS International Journal of Computer Science and Network Security, May 2010.

5.       K. S. Julie Zelenski, “Huffman encoding and data compression.” Springer 2012, CS106B, May 23 2012.

6.       D. D. S. Mridul Kumar Mathur, Seema Loonker, “Lossless huffman coding technique for image compression and reconstruction using binary trees,” vol. Vol 3 (1). International Journal of Computer Technical Applications, pp. 76–79.

7.       J. Glen G. Langdon, “An introduction to arithmetic coding,” vol. 28, no. 2. IBM J. RES. DEVELOP., March 1984.

8.       P. P. Venkataram, Lossless Compression Algorithms, 2016, ch. 6.

9.       R. E. W. Rafael C. Gonzalez, Digital Image Processing, 3rd ed. Pearson Education, 2014.

10.    O. N. Pasi Franti and T. Kaukoranta, “Compression of digital images by block truncation coding:a survey,” no. 37(4). The Computer Journal, 1994, pp. 308–332.

11.    H. P. Jing-Ming Guo and J.-H. Chen, “Content-based image retrieval using error diffusion block truncation coding features,” vol. 25, no. 03. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY,, 2015.

 

58-62

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

10.

Authors:

Paul Thomas, R.S. Moni

Paper Title:

ANN based Multilevel Classification Technique with Optimum Measurement Period for Accurate Diagnosis using Biomedical Signals

Abstract: Biomedical signals are representations of the mechanical and electrical activities within the human body. These signals contain a lot of information on the state of health of a person and their analysis have a significant role in the diagnosis of various health disorders and medical abnormalities, such as activation levels and the biomechanics of the muscles and other human organs. Of the many Biomedical signals, focus of this work is on Electro-cardiogram (ECG) and Electro-myogram (EMG). ECG provides information on the rhythm and functioning of the heart. EMG is the recording of human muscular activity. ECG signals used in this work are taken from the standard MIT-BIH, and CU data bases of PhysioNet database and EMG signals are taken from the EMGLab and PhysioNet database. Automated analysis of Biomedical signals can largely assist the physicians in their diagnostic process. The extracted spectral and temporal features represent the diverse characteristics of a Biomedical signal. In this work, more emphasis is given to spectral features since a lot of critical information on the health of a person are hidden in the spectral content of the signal. A subset from a larger set of available features is experimentally selected for optimum performance. The feature vector has a size of 11 for ECG signal analysis and a size of 9 for EMG signal analysis. Accuracy of detecting a health disorder depends on the quality of the features extracted from a Biomedical signal. A few techniques are proposed to achieve improved quality for the features. Also a method is developed to arrive at the optimum length of the Biomedical signal to be used for analysis. Accordingly, the length of the ECG signal used in this work is 10 s and the length of the EMG signal is 11 s. It is observed that the variance of the features is minimum when the signal for analysis is taken from the mid portion of the whole Biomedical signal. To make the value of a feature close to its true value, each feature value is taken as the average of the values of the feature extracted from 20 consecutive signal segments. A technique is also proposed to reduce the effect of wild points in the computation of spectral parameters. It is observed that classification accuracy also depends on the sampling rate of the Biomedical signal. The sampling rate of ECG signal in this work is 128 Hz and that of EMG signal is 750 Hz. Classifying a Biomedical signal is the process of attaching the signal to a disease state or healthy state. The work proposes a Multi level classification approach for Biomedical signals. Each classifier is a cascade of two ANN classifiers, the first ANN has a linear transfer function and the second ANN has a sigmoid transfer function. First level classification is to the broad categories of the disorders. In the second level, these disorders are drilled down to more specific categories. This concept can be extended further to achieve finer classification of Biomedical signals. In this work the classification is demonstrated to two levels for ECG signals and one level for EMG signals. The performance of the proposed method is evaluated using the standard parameters of specificity, sensitivity and classification accuracy (CA). The performance is found to be better than the reported figures in the case of both ECG and EMG signals.

Keywords:
 ECG, EMG, FFT, DWT, Pattern recognition ANN, Feature extraction, Multilevel classification, Wavelet, PhysioNet database, CA, Atrial arrhythmias, Ventricular arrhythmias, NSR, MI, MUAP, Myopathy, ALS.


References:

1.  Martis, Roshan Joy, U. Rajendra Acharya, Lim Choo Min, “ECG beat classification using PCA, LDA, ICA and Discrete Wavelet Transform,” Biomedical Signal Processing and        Control, vol 8, issue 5, pp. 437-448, 2013.
2.  Naik, Ganesh, S. Selvan, and Hung Nguyen. “Single-Channel EMG Classification With EnsembleEmpirical-Mode-Decomposition-Based ICA for Diagnosing Neuromuscular  Disorders.”,pp.1-11,2015.
3.  Rahime Ceylan, Yuksel ozbay, “Comparison of FCM, PCA and WT techniques for classification ECG arrhythmias using artificial neural network,” Expert Systems with  Applications,vol 33, issue 2, pp. 286-295, 2007.
4.  Swati Banerjee, Madhuchanda Mitra. “A classification approach for Myocardial infarction using voltage features extracted from four standard ECG leads” IEEE International  conference on recent trends in information systems, 2011, pp.325-330.
5.  Sambhu D, Umesh A. C, “Automatic Classification of ECG Signals with Feature Extraction using Wavelet Transform and Support Vector Machine,” IJAREEIE, vol.2, special issue 1,  pp. 235-241, 2013.
6.  Felipe Alonso Atienza, Eduardo Morado, Lornea Fernandez Martinez, Arcadi Garcia Alberola, Jose Luis Rojo Alvarez, “Detection of life-threatening arrhythmias using feature  selection and support vector machines.” Biomedical Engineering, IEEE Transactions vol. 61, no.3, pp.832-840, 2014.
7.  Roger Dzwonczyk, Charles G. Brown, H. A. Werman, “The median frequency of the ECG during ventricular fibrillation: its use in an algorithm for estimating the duration of  cardiac arrest,” IEEE Transactions on Biomedical Engineering, vol. 37, no. 6, pp. 640-646, 1990.
8.  Subasi, Abdulhamit. “Classification of EMG signals using combined features and soft computing techniques.” Applied soft computing, Vol.12, Issue 08, pp. 2188-2198, 2012.
9.  Phinyomark, Angkoon, Pornchai Phukpattaranont, and Chusak Limsakul. “Feature reduction and selection for EMG signal classification.” Expert Systems with Applications Vol.39, Issue 08, pp. 7420-7431, 2012.


63-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

11.

Authors:

M. Brindha, K. Saranya, S. Rajesh

Paper Title:

Certain Investigation on Image Classification and Segmentation using Different Techniques

Abstract: A brain cancer is a tissue that structured by an addition of anomalous cells and important to detect and classify brain tumors from MRI (Magnetic Resonance Imaging) for treatment. Brain tumor segmentation and classification is considered to be more important tasks in medical imaging. MRI is used for the study of the human brain. A fully automated method plays an important role in the prediction of brain cancer. In this review paper, different classification and segmentation techniques are discussed.

Keywords:
 Image Segmentation, Classification and Mining Techniques.


References:

1.       Zeng, Hong, and Aiguo Song. “Optimizing Single-Trial EEG Classification by Stationary Matrix Logistic Regression in Brain-Computer Interface.” (2015).
2.       Al-Shaikhli, Saif Dawood Salman, Michael Ying Yang, and Bodo Rosenhahn. “Brain tumor classification using sparse coding and dictionary learning.” Image Processing (ICIP), 2014 IEEE International Conference on. IEEE, 2014.

3.       Pereira, Sérgio, et al. “Brain Tumor Segmentation using Convolutional Neural Networks in MRI Images.” (2016).

4.       Anitha, V., and S. Murugavalli. “Brain tumour classification using two-tier classifier with adaptive segmentation technique.” IET Computer Vision 10.1 (2016): 9-17.

5.       Nandpuru, Hari Babu, S. S. Salankar, and V. R. Bora. “MRI brain cancer classification using support vector machine.” Electrical, Electronics and Computer Science (SCEECS), 2014 IEEE Students’ Conference on. IEEE, 2014.

6.       Jui, Shang-Ling, et al. “Brain MR image tumor segmentation with 3-Dimensional intracranial structure deformation features.” (2015).

7.       Yang, Xiaofeng, and Baowei Fei. “A MR brain classification method based on multiscale and multiblock fuzzy C-means.” Bioinformatics and Biomedical Engineering,(iCBBE) 2011 5th International Conference on. IEEE, 2011.

8.       Ibrahim, Walaa Hussein, Ahmed AbdelRhman Ahmed Osman, and Yusra Ibrahim Mohamed. “MRI brain image classification using neural networks.” Computing, Electrical and Electronics Engineering (ICCEEE), 2013 International Conference on. IEEE, 2013.

9.       Joshi, Dipali M., N. K. Rana, and V. M. Misra. “Classification of brain cancer using artificial neural network.” Electronic Computer Technology (ICECT), 2010 International Conference on. IEEE, 2010.

10.    Othman, Mohd Fauzi Bin, Noramalina Bt Abdullah, and Nurul Fazrena Bt Kamal. “MRI brain classification using support vector machine.” Modeling, Simulation and Applied Optimization (ICMSAO), 2011 4th International Conference on. IEEE, 2011.

11.    Boberek, Marzena, and Khalid Saeed. “Segmentation of MRI brain images for automatic detection and precise localization of tumor.” Image Processing and Communications Challenges 3. Springer Berlin Heidelberg, 2011. 333-341.

12.    Ji, Zexuan, et al. “Fuzzy local Gaussian mixture model for brain MR image segmentation.” Information Technology in Biomedicine, IEEE Transactions on 16.3 (2012): 339-347.

13.    Dawngliana, Malsawm, et al. “Automatic brain tumor segmentation in MRI: Hybridized multilevel thresholding and level set.” Advanced Computing and Communication (ISACC), 2015 International Symposium on. IEEE, 2015.

 

71-73

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Revathi Nath H A, Jeena R S

Paper Title:

An Efficient Algorithm for Reversible Data Hiding in Encrypted Images by RRBE

Abstract: Recently reversible data hiding in encrypted images is gaining importance as this technique of watermarking can reconstruct the original image after extracting the desired data hidden in the image. In all the previous works, room was reserved for data in the image and the image would be encrypted using a standard stream cipher. This work proposes a technique for reversible data hiding in encrypted images where the data to be hidden is encrypted using Advanced Encryption Standard (AES) that can improve the PSNR. Also the encrypted image holding data would be permuted and transmitted, that can increase the level of security. Experimental results show that this method can achieve a PSNR of more than 60db thereby increasing the embedding rate.

Keywords:
Advanced Encryption Standard, Block merging, Image permutation, Reserving Room before encryption


References:

1.       W. Bender, D.Gruhl, N.Morimoto and A.Lu., Techniques For Data Hiding, IBM Systems Journal ,Vol.35,Pp 313-336,1996
2.       C.W.Honsinger, P.W.Jones, M.Rabbani and J.C.Stoffel, Lossless Recovery Of An Original Image Containing Embedded Data, U S Patent, Ed, 2001

3.       T.Kalker and F.M.Willems. “Capacity bounds and code construction for reversible datahiding,” in proc.14th Int. Conf. Digital Signal Processing (DSP2002), 2002, pp. 71-76.

4.       W. Zhang, B. Chen, and N. Yu, “Capacity-approaching codes for reversible data hiding,” in Proc 13th Information Hiding (IH’2011).LNCS 6958, 2011, pp. 255-269, Springer – Verlag.

5.       W. Zhang, B. Chen, and N. Yu, “ Improving various reversible data hiding shemes via optimal codes for binary covers,” IEEE Trans. Image Process., vol. 21, no. 6, pp. 2991-3003, Jun. 2012

6.       J. Fridric h and M. Goljan, “Lossless data embedding for all image for-mats,” in Proc. SPIE proc. Photonics West, Electronic Imaging, Security and Watermarking of
Multimedia Contents, San Jose, CA, USA, Jan. 2002, vol. 4675, pp. 572-583

7.       J. Tian, “Reversible data embedding using a difference expansion,” IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890-896, Aug. 2003

8.       Z Ni, Y. Shi, N. Ansari, and S. Wei, “Reversible data hiding,” IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354-362, Mar. 2006

9.       D.M. Thodi and J.J. Rodriguez, “Expansion embedding techniques for reversible watermarking,” IEEE Trans. Image Process., vol. 16, no. 3, pp. 721-730, Mar. 2007.

10.    X.L. Li, B. Yang, and T. Y. Zeng, “Efficient reversible watermarking based on adaptive prediction-error expansion and pixel selection,” IEEE Trans. Image Process., vol. 20, no. 12, pp. 3524-3533, Dec. 2011.

11.    P. Tsai, Y. C. Hu, and H. L. Yeh, “Reversible image hiding scheme using predictive coding and histogram shifting,” Signal Process., vol. 89, pp. 1129-1143, 2009.

12.    L. Luo et al., “Reversible image watermarking using interpolation technique,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 187-193, Mar. 2010.

13.    Sachnev, H. J. Kim, J. Nam, S. Suresh, and Y.-Q. Shi, “Reversible Waterm- arking algorithm using sorting and prediction,” IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 7, pp. 989-999, Jul. 2009.

14.    J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC, 1996

15.    K. Hwang and D. Li, “Trusted cloud computing with secure resources and data coloring,” IEEE Internet Comput., vol. 14, no. 5, pp. 14-22, Sep./Oct. 2010.

16.    M. Johnson, P. Ishwar, V. M. Prabhakaran, D. Schonberg, and K. Ramachandran, “On compressing encrypted data,” IEEE Trans. Signal Process., vol. 52, no. 10, pp.2992-3006, Oct. 2004.

17.    W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process. vol. 19, no. 4, pp. 1097-1102, Apr. 2010.

18.    X. Zhang, “Reversible data hiding in encrypted images,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255-258, Apr. 2011.

19.    W. Hong, T. Chen, and H. Wu, “An improved reversible data hiding in encrypted images using side match,” IEEE Signal Process. Lett., vol. 19, no. 4, pp. 199-202, Apr. 2012.

20.    X. Zhang, “Separable reversible data hiding in encrypted image,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 2, pp. 826-832, Apr. 2012.

21.    Kese Ma, Weiming Zhang, Xianfeng Zhao, “Reversible data hiding in Encrypted images by reserving room before encryption” IEEE Transactions on information forensics and security, Vol.8, No.3, March 2013

22.    Wien Honga, Tung-Shou Chen, Reversible Data Embedding For High Quality Images Using Interpolation And Reference Pixel Distribution Mechanism., Elsevier Journal For Visual Image R.22(2011) 131-140.

23.    Diljith.N.Thodi And Jeffrey.J.Rodriguez, Expansion Embedding Techniques For Reversible Watermarking, IEEE Transactions On Image Processing, Vol.16, No.3, March 2007

24.    Jessica Fridrich, Niroslav Goljan, Lossless Data Embedding With File Size Preservation, Proc. SPIE 5306, Security, Stenography And Watermarking Of Multimedia contents Vi, 354(June22,2004)

25.    Ching -Yu Chang, Chih – Hung Lin And Wu – Chih Hu, Reversible Data Hiding For High Quality Images Based On Integer Wavelet Transform, Journal Of Information Hiding And Multimedia Signal Processing Ubiquitous International, Volume 3,No.2, April 2012

26.    M.Pitchchaiah, Philenon Daniel, Praveen, Implementation Of Advanced Encry- ption Standard Algorithm, International Research Volume 3,Issue 3, March -2012.

27.    Miscellaneous Gray Level Images (Online) Available: http:// decsai. ugr.es/ cvg/ dbimagenes/ g512.php

 

74-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

13.

Authors:

Bhagwat P. Dwivedi, Shiv Kumar, Babita Pathik

Paper Title:

Intrusion Detection over Networking KDD Dataset using Enhance Mining Algorithm

Abstract: The intrusion detection systems (IDSs) generate large number of alarms most of which are false positives. Fortunately, there are reasons for triggering alarms where most of these reasons are not attacks. In this research, a rule based technique which is the enhancement of genetic algorithm has been developed. For this, The networking data and intrusion over the data is find to extract to recognize various entities into it. Data mining and its algorithm to process, data extraction, and data analysis is an important phase to monitor the features in it. Intrusion detection process follows the clustering and classification technique to monitor the data flow in it. In this paper our investigation is about to observe available algorithm for the intrusion detection. Algorithm such as Genetic, SVM etc have been processed over KDD cup 10% of dataset which contain 41 attributes and large number of data availability. Here our experiment also conclude that the proposed feature extraction algorithm outperform as best than the existing algorithm with computation parameter such as precision, recall and its accuracy.

Keywords:
 Intrusion Detection, Clustering Technique, Data Mining, KDD.


References:

1.       Zhan Jiuhua Intrusion Detection System Based on Data Mining Knowledge Discovery and Data Mining, 2008. WKDD 2008.
2.       Bane Raman Raghunath Network Intrusion Detection System (NIDS)Emerging Trends in Engineering and Technology, 2008. ICETET ’08.

3.       Changxin Song Design of Intrusion Detection System Based on Data Mining Algorithm 2009 International Conference on Signal Processing Systems.

4.       Wang Pu Intrusion detection system with the data mining technologies Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference.

5.       Gaikwad, D.P. Sonali Jagtap, Kunal Thakare, Vaishali Budhawant Anomaly Based Intrusion Detection System Using Artificial Neural Network and fuzzy clustering International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, 1 (9.) (2012 November).

6.       Goyal, C. Kumar GA-NIDS: A Genetic Algorithm based Network Intrusion Detection System, Electrical Engineering and Computer Science, North West University Technical Report (2008).

7.       G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee BotHunter: detecting malware infection through IDS-driven ialog correlation Proc. of 16th USENIX Security Symp. (SS’07) (2007 Aug), pp. 12:1–12:16.

8.       G. Gu, J. Zhang, W. Lee BotSniffer: detecting botnet command and control channels in network traffic Proc. of 15th Ann. Network and Distributed Sytem Security Symp. (NDSS’08) (2008 Feb).

9.       Ketan Sanjay Desale, Roshani Ade,” Genetic algorithm based feature selection approach for effective intrusion detection system”, IEEE 2015.

10.    Kajal rai, “Decision Tree Based Algorithm for Intrusion Detection”, Volume: 07 Issue: 04 Pages: 2828-2834 (2016) ISSN: 0975-0290.

 

79-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

Issue-3 February 2017

Volume-6 Issue-3 Published on February 28, 2017
 Download Abstract Book

S. No

Volume-6 Issue-3, February 2017, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Lerdlekha Sriratana, Sawatdee Poochong, Kridsda Bisalyaputra

Paper Title:

A Study on Thailand Solar Energy Business Opportunity in Very Small Power Producer (VSPP) Sector Contributed by Feed-in Tariff

Abstract: In recent Thailand energy business, solar power plants have high potential due to a clean and renewable energy of solar power. However, the information about solar energy business opportunity is also essential for private sector investment. Since 2013, Feed-in Tariff (FiT) has been announced to replace the Adder measure that also results in the difference of electricity cost structures. This study presents the review of solar energy business opportunity contributed by FiT focusing on Very Small Power Producer (VSPP) sector. The analysis of Adder and FiT measures in terms of business promotion was performed. Also, an 8 MW VSPP solar farm project was selected as a case study for investment analysis contributed by FiT. From analysis, it can be noted that the benefit from electricity purchase rate contributed by FiT would be lower than that of the Adder due to the high costs of PV system recently which is also included in the initial investment. However, if the technology and other related costs of PV system decrease, the solar power projects subsidized by the FiT would be more worthwhile for investment in the future.

Keywords:
Solar Energy, Policy, Subsidy, Measure, Investment


References:

1.    Department of Alternative Energy Development and Efficiency (DEDE), The Solar Map. Bangkok: Ministry of Energy, 2002.
2.    Open Energy Information. (2016). Solar Resources by Class per Country [Online]. Available http://en.openei.org/datasets/node/498

3.    Energy Policy and Planning Office (EPPO), Power Development Plan 2015–2036 (PDP2015). Bangkok: Ministry of Energy, 2015.

4.    M. Chimres and S. Wongwises, “Critical review of the current status of solar energy in Thailand,” Renewable and Sustainable Energy reviews, vol. 58, 2016, pp. 198-207. 

5.    Energy Policy and Planning Office (EPPO), Policy and Plan. Bangkok: Ministry of Energy, 2016.

6.    Energy Regulatory Commission (ERC). (2016). SPP/VSPP database [Online]. Available http://www.erc.or.th/ERCSPP/Default.aspx

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

2.

Authors:

M. Shoukath Ali, R. P. Singh

Paper Title:

A Study on Game Theory Approaches for Wireless Sensor Networks

Abstract:  Game Theory approaches and their application in improving the performance of Wireless sensor networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality and etc, however Game Theory is a field, which can efficiently used to analyze the WSNs. Game theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of Complex interactions among rational entities can be predicted by a set of analytical tools, however the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing and etc.

Keywords:
Wireless sensor network; Game Theory; Cooperative game theory; Non-cooperative game theory; Wireless communications.


References:

1.       Renita Machado, Sirin Tekinay, “A surve of game theoretic approaches in wireless sensor networks”-computer networks 52 (2008), pp 3047-3061.
2.       Erik Pertovt, Tomax javornik, Michael Mohorcic, “Game theory application for performance optimization in wireless networks”-pp287-292, 2011.

3.       Gengzhong zheng,” Study on the power control of wireless sensor networks based on Game theory”-Journal of information and computational science 7:4(2010) 957-964.

4.       Pedro O.S.Vaz De Melo, Cesar Fernandes, Raquel A.F.Mini, Aotonio. A.F.Loureiro and Virigilio.A.F.Almeda,”Game theory in wireless sensor networks”.

5.       R.J.Aumann and M.Maschler,”Game theoretic analysis of a bankruptcy problem from the Talmud” J.Econ. Theory, vol 36, pp 195-213, 1985.

6.       Ali, M. Shoukath. “Priority Based Packet Scheduling Scheme in Wireless Sensor Networks.”, IJARF, Volume 3, Issue 8, August 2016.

7.       P.Walker, “An outline of his history of game theory”, Available at: http://William – king.www.drekel.edu/top/class /histf.html April 1995.

8.       A.B.Mackenzie and Stephen B.Wicker, “Game theory and the design of self-configuring, Adaptive wireless networks”-IEEE communication, Nov 2001.

9.       S.Metha and K.S.Kwak, “Application of game theory to wireless sensor networks”- Inha university, Korea.

10.    Garth.V.Crosby, Niki Pissinou, “Evolution of cooperation in multi-class wireless sensor networks”-32nd IEEE conferences on local computer networks.

11.    J.F.Nash, “Equilibrium points in n-person game” Proc.Natl. Acad.Sci. U.S.A. vol.36, no.1, pp.48-49, January 1950.

12.    J.John F.Nash, “The bargaining problem”, Econometrica, vol.18, no.2, pp.155-162, April 1950.

5-7

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ahammad Vazim K. A., Jesin T. A., Anil Raj B., Midhun A. R., Sreekutten K. 

Paper Title:

Design and Fabrication of a Novel Low Cost Food Waste Composting System with Accelerating Process Technology

Abstract: Waste disposal is one of the biggest problems faced by the most countries. Unless and otherwise a proper methodology is met to treat the domestic and industrial effluents the public health and environment will face serious problems. Our project finds its application in the safe treatment of food waste aerobically with the help of mechanical agitation to reduce the risk of contamination in our households. Composting can be defined as the biological decomposition of organic matter under controlled, aerobic conditions into a stable product that may be used to improve soil quality or as a potting medium. Composting also disinfects organic wastes so that they may be beneficially used in a safe matter. The purpose of the project was to design and fabricate a low cost food waste composting system which ultimately accelerate the composting process. Experimentally it was found that the composting of normal vegetable residues take about 60 days with the help of a bacterial composter, like any biochemical reaction time duration required for the completion of composting was contributed by many factors which includes particle size, water content, temperature, air circulation. The device fabricated was fully functional in controlling the major factors among the above stated and can accelerate the overall process by 50%.

Keywords:
 food waste, composting system, accelerating process technology


References:

1.    Ajinkya S Hande and Vivek Padole, International  Journal  of  Innovative  Research  in  Science  and  Technology, Volume 2, Issue 03, 2015.
2.    Tom L Richard, Tom L Richard, Biomass and Bioenergy Vol. 3, Nos 34, pp. 163-I 80. Pergamon Press Ltd, Great Britain Received 22 May 1992; accepted 7 July 1992.

3.    Delia Teresa Sponza and Osman Nuri Agdag, Microbial  Technology  36(2005)25-3-Journal  of  Environmental  Engg., 2004.

4.    M. de Bertoldi, G. Vallini and A. Pera, Notes, International Solid Waste Management Association.

8-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

4.

Authors:

Amiya Ranjan Malik, Bibhuti Bhusan Pani, Sushant Kumar Badjena

Paper Title:

Powder Metallurgy Processed Ferrous Composites: A Review

Abstract: This paper reviews processing and synthesis of particulate reinforced ferrous based Metal Matrix Composites (MMC) and Nanocomposites through Powder Metallurgy (P/M) method. By this route it is possible to manufacture MMCs with wide range of compositions and density. As a result there is improvement of wear resistance, abrasion resistance, corrosion resistance, mechanical properties and high temperature friction properties. The reinforcing particles commonly adopted were carbides, oxides, borides, nitrides, carbonitrides, complex carbides, intermetallics, synthetic materials etc. Apart from this it also reviews how several factors affect properties of MMCs.

Keywords:
Ferrous Matrix Composites, Nanocomposites, Particle reinforcement, Powder Metallurgy.


References:

1.       O. N. Dogan, J. A. Hawk, J. H. Tylczak, R. D. Wilson, R. D. Govier, Wear of titanium carbide reinforced metal matrix composites. Wear, Volumes 225–229, Part 2, April 1999, Pages 758-769.
2.       E. Pagounis, E. Haimi, J. Pietikainen, M. Talvitie, S. Vahvaselka, V. K. Lindroos, Effect of Thermal expansion coefficients on the martensitic transformation in a steel matrix composite. Scripta Materialia, vol. 34, No.3, pp.407-413, 1996.

3.       E. Pagounis, M. Talvitie, V. K. Lindroos, Influence of metal ceramic interface on the microstructure and mechanical properties of HIPed iron-based composites. Composites Science and Technology 56 (1996) 1329-1337.

4.       T. Ram Prabhu, V. K. Varma, Srikanth Vedantam, Effect of reinforcement type ,size and volume fraction on the tribological behaviour of Fe matrix composites at high sliding speed condition. Wear 309 (2014) 247-255.

5.       T. Ram Prabhu, V. K. Varma, Srikanth Vedantam, Effect of SiC volume fraction and size on dry sliding wear of Fe/Sic/Graphite hybrid composites for high sliding wear application. Wear 309 (2004) 1-10.

6.       Sainatee Chakthin, Monnapas Morakotjinda, Thanyaporn yodkaew, Nattaya Torsangtum, Rungtip Krataithong, Pisarn Siriphol, Ornmanee Coovattanachai, Bhanu Vetayanugul, Nandh Thavarungkul, Nuchthana Poolthong, Ruangdaj Tongsri, Influence of carbides on properties of sintered Fe-based composites. Journals of Metals, Materials and Minerals, Vol.18 No.2 pp.67-70, 2008.

7.       Danqing Yi, Pengchao Yu, Bin Hu, Huiqun Liu, Bin Wang, Yong Jiang, Preparation of nickel-coated titanium carbide particulates and their use in the production of reinforced iron matrix composites. Materials and Design Volume 52, December 2013, page 572-579.

8.       XIAO Zhi-Yu, FANG Liang, ZHANG Wen, SHAO Ming, LI Yuan-Yuan, Fabrication of NbCp-reinforced iron matrix composites by PM techniques and its warm compaction. Journal of  Iron  and Steel Research, International, Volume 14, Issue 5, Supplement 1, September 2007, Pages 66-69.

9.       B. Sustarsic, M. Jenko, M. Godec, L. Kosec, Microstructural investigation of NbC-doped vacuum-sintered tool-steel-based-composites. Vacuum, Volume 71, Issues 1–2, 9 May 2003, Pages 77-82.

10.    E. Gordo, F. Velasco, N. Anton, J. M. Torralba, Wear mechanism in high speed steel reinforced with (NbC)p and (TaC)p MMCs. Wear volume 239, issue 2, April 2000, page 251-259.

11.    H. Fallahdoost, H. Khorsand, R. Eslami-Farsani, E. Ganjeh, On the tribological behaviour of nanoalumina reinforced low alloy sintered steel.  Materials and Design 57 (2014) 60-66.

12.    Pallav Gupta, Devendra Kumar, M. A. Quraishi, Om Parkash, Corrosion behaviour of Al2O3 reinforced Fe metal matrix nanocomposites produced by powder metallurgy technique. Advanced Science, engineering and medicine, volume 5, Number 4, April 2013, page.366-370(5).

13.    C. Parswajinan, B. Vijaya Ramnath, C. Elanchezhian, S. V. Pragadeesh, P. R. Ramkishore, V. Sabarish, Investigation on Mechanical Properties of Nano Ferrous Composite. Procedia engineering 97 (2014) 513-521.

14.    T. J. Goodwin, S. H. Yoo, P. Matteazzi, J. R. Groza, Cementite   Iron    Nanocomposite.  Nanostructured materials volume 8, issue 5, August 1997 page 559-566.

15.    Eugene E. Feldshtein, Larisa N. Dyachkova, On the properties and tribological behaviour of P/M composites reinforced with ultrafine particulates. Composites part: B volume 58, march 2014, page 16-24.

16.    Ping Han, Fu-ren Xiao, Wen-jun Zou, Bo Liao, Effect of different oxide addition on the thermal expansion coefficients and residual stress of Fe-based diamond composites. Ceramic International 40 (2014) 5007-5013.

17.    Katie Jo Sunday, Kristopher K. Darling, Francis G. Hanejko, Babak Anasori, Yan-Chun Li, Mitra L. Taheri, Al2O3  “self coated” iron powder composite via mechanical milling. Journals of Alloys and Compounds 653 (2015) 61-68.

18.    F. Velasco, R. Isabel, N. Anton, M. A. Martinez, J. M. Torralba, TiCN-high speed steel composites: sinterability and properties. Composite part A: Applied science and manufacturing volume 33, issue 6, June 2002, 819-827.

19.    B. Gomez, A. Jimenez-Suarez, E. Gordo, Oxidation and tribological behaviour of an Fe-based MMC reinforced with TiCN particles. Int. Journal of Refractory metals & hard materials volume 27, issue 2, march 2009, 360-366.

20.    G. Herranz, A. Romero, V. De Castro, G. P. Rodriguez, Processing of AISI M2 high speed steel reinforced with vanadium carbide by solar sintering. Material and Design volume 54, February 2014, 934-946.

21.    Guangming Zhang, Keqin Feng, Ying Li, Huifang Yue, Effect on sintering process on preparing iron-based friction material directly from vanadium bearing titanomagnetite concentrates. Materials and Design 86 (2015) 616-620.

22.    Guangming Zhang, Keqin Feng, Synthesis of iron-based friction material by in situ reactive sintering from Vanadium bearing titanomagnetite. Materials and manufacturing processes volume-31, issue-2, 2015, page 198-205.

23.    D. Lou, J. Hellman, D. Luhulima, J. Liimatainen, V. K. Lindroos, Interactions between tungsten carbide (WC) particulates and metal matrix in WC-reinforced composites. Material science and engineering: A volume 340, issue 1-2, January 2003, page 155-162.

24.    S. C. Tjong, K. C. Lau, Abrasion   resistance   of   stainless-steel composites reinforced with hard TiB2 particles. Composites science and technology volume 60, issue 8, June 2000, page 1141-1146.

25.    J. Abenojar, F. Velasco, J. M. Torralba, J. A. Bas, J. A. Calero, R. Marce, Reinforcing 316L stainless steel with intermetallic and carbide particles. Material science and engineering: A, volume 335, issue 1-2, 25 September 2002, page 1-5.

26.    J. Abenojar, F. Velasco, A. Bautista, M. Campos, J. A. Bas, J. M. Torralba, Atmosphere influences in sintering process of stainless steels matrix composites reinforced with hard particles. Composites science and technology, volume 63, issue 1, January 2003, page 69-79.

27.    Wang Jing, Wang Yisan, Ding Yichao, Production of (Ti,V)C reinforced Fe matrix composites. Material science and engineering: A volume 454-455, 25 April 2007, page 75-79.

28.    Ileana Nicoleta Popescu, Constantin Ghita, Vasile Bratu, Guillermo Palacios Navarro, Tribological behaviour and statistical experimental design of sintered iron-copper based composites. Applied Surface Science 285P (2013) 72-85.

29.    Hans Berns, Birgit Wewers, Development of an abrasion steel composite with in situ TiC particles. Wear 251(2001) 1386-1395.

30.    P. Mohan Raj, N. Selvakumar, R. Narayanasamy, C. Kailasanathan, Experimental investigation on workability and strain hardening behaviour of Fe-C-Mn sintered composites with different percentage of carbon and manganese content. Materials and Design 49 (2013) 791-801.

31.    N. Selvakumar, A. P. Mohan Raj, R. Narayanasamy, Experimental investigation on workability and strain hardening behaviour of Fe-C-0.5Mn sintered composites. Materials and Design 41 (2012) 349-357.

12-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ashok R Mundhada, Arun D Pofale

Paper Title:

Concrete’s Odyssey Through Heat: A Review

Abstract: Fire is a catastrophic event to which any building can fall victim during its lifetime. Not only does it pose a direct threat to the occupants through the release of harmful gases and devastating heat, but the elevated temperatures themselves also have seriously adverse effects on the structural integrity of entire building. Though undesired, fire is an exigency that cannot be avoided altogether. Therefore, impact of fire on concrete/ RCC deserves minute scrutiny. In this study, a review is carried out based on the experimental studies on the performance of concrete/RCC when exposed to FIRE/ higher temperatures. The compiled test data revealed distinct difference in mechanical properties of normal, high strength, self compacting & improvised concrete. Shape & size of specimens, concrete grade, admixtures, temperature level, applied load, exposure time to heat, rate of heating, rate of cooling, specimen type (stressed/unstressed member), type of cooling etc were the parameters that influenced the test results. Exposure time, exposure temperature & concrete cover were observed to be the principal factors. The outcome of the review helped in identifying the main problem areas, dubious claims & gaps/ lacunae in the research works.

Keywords:
 Concrete, Fire, RCC, Spalling


References:

1.       P.D. Morley, R. Royles, “The influence of high temperature on the bond in reinforced concrete”, Fire Safety Journal, Volume 2, Issue 4, 1980, pp. 243-255
2.       Chandra S & Baerntsson L, “Some effects of polymer addition on the fire resistance of concrete”, Cement and Concrete Research, Vol.10, 1980, pp. 367-375

3.       H. Gustaferro, T. D. Lin, “Rational design of reinforced concrete members for fire resistance”, Fire Safety Journal, Volume 11, Issues 1-2, 1986, pp. 85-98

4.       Gabriel A. Khoury, Patrick J. E. Sullivan, “Research at Imperial College on the effect of elevated temperatures on concrete”, Fire Safety Journal, Volume 13, Issue 1, 1988, pp. 69-72

5.       Bruce Ellingwood and T. D. Lin, “Flexure and shear behavior of concrete beams during fires”, Journal of Structural Engineering, Vol. 117, No. 2, ©ASCE, ISSN 0733-9445/91, Paper No. 25549, 1991, pp. 440-458

6.       Bruce R. Ellingwood, “Impact of fire exposure on heat transmission in concrete slabs”, Journal of Structural Engineering, ASCE, Vol 117, 1991

7.       S. C. Chakrabari, K. N. Sharma, Abha Mittal, “Residual strength in concrete after exposure to elevated temperature”, The Indian Concrete Journal, 1994, pp. 713-717

8.       Sunil Kumar & Rao Kameswara, “Fire Load in Residential Buildings”, Elsevier Building and Environment, Vol. 30, No. 2, 1995, pp. 299-305

9.       M. M. El-Hawary, A. M. Ragab, K. M. Osman and M. M. Abd El-Razak, “Behavior investigation of concrete slabs subjected to high temperatures”, Elsevier, Computers & Structures, Vol. 61, No. 2, 1996, pp. 345-360

10.    M. M. El-Hawary, A. M. Ragab, A. Abd El-Azim and S. Elibiari, “Effect of fire on shear behaviour of R.C. beams”, Elsevier, Computers & Structures, Vol. 65, No. 2,
1997, pp. 281-287

11.    James A. Milke, “Analytical methods to evaluate fire resistance of structural members”, Journal of Structural Engineering, ASCE, 25 (10), 1999, pp. 1179-1187

12.    Y. N. Chan, G. F. Peng, M. Anson, “Residual strength and pore structure of high-strength concrete and normal strength concrete after exposure to high temperatures”, Elsevier Cement and Concrete Composites 21, 1999, pp. 23-27

13.    Long T. Phan & Nicholas J. Carino, “Fire performance of high strength concrete: Research Needs”, Proceedings of ASCE/SEI Structures Congress, Philadelphia, USA, 2000

14.    V. K. R. Kodur, “Spalling in High Strength Concrete Exposed to Fire — Concerns, Causes, Critical Parameters and Cures”, Proceedings of ASCE/SEI Structures Congress, Philadelphia, USA, 2000, pp. 1-8

15.    Jean-Marc Franssen and Venkatesh Kodur, “Residual Load Bearing Capacity of Structures Exposed to Fire”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings 109, 89 2001

16.    Beth Tubbs, “ICC Performance Code for Buildings and Facilities — Structural Fire Protection Provisions”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings 109, 80, 2001

17.    George Faller, “Fire Resistance Requirements for Buildings: A Performance Based Approach”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings, Section: 37, 2001, pp. 1-12

18.    D. Bennetts,  C. C. Goh, “Fire behaviour of steel members penetrating concrete walls”, Electronic Journal of Structural Engineering, 1, 2001, pp. 38-51

19.    R. Sri Ravindrarajah, R. Lopez and H. Reslan, “Effect of Elevated Temperature on the Properties of High-Strength Concrete containing Cement Supplementary Materials”, 9th International Conference on Durability of Building Materials and Components, Rotterdam, Netherlands, Paper 081, 2002, 8 pages

20.    Colin Bailey, “Holistic behaviour of concrete buildings in fire”, Proceedings of the Institution of Civil Engineers, Structures and Buildings 152, Issue 3, 2002, pp. 199-212

21.    W. K. Chow, “Proposed Fire Safety Ranking System EB-FSRS for Existing High-Rise Nonresidential Buildings in Hong Kong”, Journal of Architectural Engineering, ASCE, vol. 8, No. 4, 2002

22.    Dr. A Kumar, V Kumar, “Behaviour of RCC Beams after Exposure to Elevated Temperatures”, Journal of the Institution of Engineers (I), Vol. 84, 2003, pp. 165-170

23.    K.D. Hertz, “Limits of spalling of fire-exposed concrete”, Elsevier Fire Safety Journal 38, 2003, pp. 103–116

24.    Faris Ali, Ali Nadjai, Gordon Silcock, Abid Abu-Tair, “Outcomes of a major research on fire resistance of concrete columns”, Elsevier Fire Safety Journal, 39, 2004, pp. 433–445

25.    Fu-Ping Cheng; V. K. R. Kodur and Tien-Chih Wang, “Stress-Strain Curves for High Strength Concrete at Elevated Temperatures”, Journal of Materials in Civil Engineering © ASCE, 2004, pp. 84-90

26.    Bonnie E. Manley, “Rehabilitation of Existing Structures in the NFPA C3 Code Set”, Structures — Building on the Past: Securing the Future, ASCE Proceedings of Structures Congress, 2004

27.    Xudong Shi; Teng-Hooi Tan; Kang-Hai Tan; and Zhenhai Guo, “Influence of Concrete Cover on Fire Resistance of Reinforced Concrete Flexural Members”, ASCE Journal of Structural Engineering, Vol. 130, No. 8, ISSN 0733-9445, 2004,  pp. 1225-1232

28.    V. K. R. Kodur and L. A. Bisby, “Evaluation of Fire Endurance of Concrete Slabs Reinforced with Fiber-Reinforced Polymer Bars”, Journal of structural engineering © ASCE, January 2005, pp. 34-43

29.    B. Georgali, P.E. Tsakiridis 2005, “Microstructure of fire-damaged concrete: A case study”, Cement & Concrete Composites 27 © Elsevier, 2005, pp. 255-259

30.    Michael L. Tholen, Amy Reineke Trygestad, “New engineers under fire”, Concrete International, Volume 1, Issue 07, USA, July 2005, pp. 45-48

31.    Z. Huang, Ian W. Burgess & Rojer J. Plank, “Behaviour of Reinforced Concrete Structures in Fire”, Structures in Fire Workshop, 2006

32.    B Stawiski, “Attempt to estimate fire damage to concrete building structure”, Archives of Civil & Mechanical Engineering, Vol 6, No 4, 2006, pp. 23-28

33.    Richard Barnes and James Fidell, “Performance in Fire of Small-Scale CFRP Strengthened Concrete Beams”, Journal of composites for construction © ASCE / December 2006, pp. 503-508

34.    Xin Yan; Hui Li and Yuk-Lung Wong, “Assessment and Repair of Fire-Damaged HSC: Strength and Durability”, Journal of materials in civil engineering © ASCE, June 2007, pp. 462-469

35.    Ufuk Dilek, “Assessment of Fire Damage to a Reinforced Concrete Structure during Construction”, Journal of performance of constructed facilities © ASCE, 2007, pp. 257-263

36.    Ian A. Fletcher, Stephen Welch, Jose L. Torero, Richard O. Karvel, “The behaviour of concrete structures in fire”, BRE Research Publications, The University of Edinburgh, UK , 2007

37.    Ilker Bekir Topcu and Cenk Karakurt, “Properties of reinforced concrete steel rebars exposed to high temperatures”, Research Letters in Materials Science, Article ID 814137, 2008

38.    David N. Bilow, Mahmoud E. Kamara, “Fire and Concrete Structures”, Part of ASCE Structures Congress, Crossing Borders, 2008, pp. 1-10

39.    Colin Gurley, “Structural Design for Fire in Tall Buildings”, Practice Periodical on Structural Design and Construction, ASCE, Vol. 13(2), 2008, pp. 93–97

40.    Kodur V. K. R. and Dwaikat M. B., “Effect of Fire Induced Spalling on the Response of Reinforced Concrete Beams”, International Journal of Concrete Structures and Materials, V 2, No 2, 2008, pp. 71-81

41.    Javadian Alireza, Teng Susanto, Tan Teng Hooi, “High temperature effect on flexural strength of steel-fibre concrete”, Proceedings of the 3rd International Conference ACF/VCA, 2008, pp. 1160-1167

42.    V.K.R. Kodur, “Enhancing resilience of urban structures to withstand fire hazard”, Resilience of Cities to Terrorist and other Threats, Book published by Springer, 2008, pp. 189-216

43.    Prabir Kumar Chaulia; Reeta Das, “Process parameter optimization for fly ash brick by Taguchi method”, Materials Research, Print version ISSN 1516-1439, Vol. 11, No.2, 2008

44.    V. K. R. Kodur, N. K. Raut, “Design equation for predicting fire resistance of reinforced concrete columns”, Structural Concrete, Vol. 10, no. 2,  Michigan State University, USA, 2009

45.    A Ferhat Bingol & Rustam Gul, “Residual bond strength between steel bars and concrete after elevated temperatures”, Elsevier Fire Safety Journal 44, 2009, pp. 854–859

46.    Ahmed Chérif Megri, “Integration of Different Fire Protection/Life Safety Elements into the Building Design Process”, Practice periodical on structural design and
construction © ASCE, 2009, pp. 181 to 189

47.    Masoud Ghandehari; Ali Behnood and Mostafa Khanzadi, “Residual Mechanical Properties of High-Strength Concretes”, Journal of materials in civil engineering © ASCE, January 2010, pp. 59-64

48.    John L. Gross and Long T. Phan, “Summary of Best Practice Guidelines for Structural Fire Resistance Design of Concrete and Steel, ASCE Proceedings of the Structures Congress, 2010, pp. 2369-2379

49.    Zhaohui Huang,“The behaviour of reinforced concrete slabs in fire”, Elsevier Fire Safety Journal 45, 2010, pp. 271–282

50.    V. K. R. Kodur, M. B. Dwaikat, “Design equation for predicting fire resistance of reinforced concrete beams”, Enginering Structures (Elsevier), Vol. 33, Issue 2, 2011, pp. 602–614

51.    Kulkarni D. B. & Patil S. N., “Comparative Study of Effect of Sustained High Temperature on strength Properties of Self Compacting Concrete and Ordinary Conventional Concrete”, International Journal of Engineering and Technology, ISSN: 0975-4024, Vol.3 (2), 2011, pp. 106-118

52.    N. K. Raut, V. K. R. Kodur, “Response of High-Strength Concrete Columns under Design Fire Exposure”, ASCE Journal of Structural Engineering, Vol. 137, No.1, 2011, pp. 69-79

53.    Peskava S & Prochazka P.P., “Impact of high temperature on different combinations of fiber reinforced concrete”, 36th Conference on Our World in Concrete & Structures Singapore, 2011

54.    Kiang Hwee Tan and Yuqian Zhou, “Performance of FRP Strengthened Beams Subjected to high Temperatures”, Journal of composites for construction © ASCE, June 2011, pp. 304-311

55.    M. Kanéma, P. Pliya, A. Noumowé, and J-L. Gallias, “Spalling, Thermal, and Hydrous Behavior of Ordinary and High-Strength Concrete Subjected to Elevated Temperature”, Journal of materials in civil engineering © ASCE, July 2011, pp. 921-930

56.    M. Bastami, A. Chaboki-Khiabani, M. Baghbadrani, M. Kordi, “Performance of high strength concretes at elevated temperatures, Elsevier Scientia Iranica A, 18 (5),
2011, pp. 1028–1036

57.    Venkatesh Kodur and Wasim Khaliq, “Effect of temperature on thermal properties of different types of high-strength concrete”, Journal of Materials in Civil Engineering © ASCE, June 2011, pp. 793-801

58.    M.V. Krishna Rao, M. Shobha and N. R. Dakshina, “Effect of elevated temperature on strength of differently cured concretes-a study”, Asian Journal of Civil Engineering, Vol. 12, No 1, 2011, pp. 73-85

59.    Rahim, U. K. Sharma, K. Murugesan & A. Sharma, “Optimization of Post-Fire Residual Compressive Strength of Concrete by Taguchi Method”, Journal of Structural Fire Engineering, June 2012, pp169-179

60.    Samir Shihada and Mohammed Arafa, “Mechanical Properties of RC Beams with Polypropylene Fibers under High Temperature”, International Journal of Engineering and Advanced Technology (ijbsac) ISSN: 2249 – 8958, Volume-1, Issue-3, 2012, pp. 194-199

61.    Siddesh Pai & Kaushik Chandra, “Analysis of polyester fibre reinforced concrete subjected to elevated temperatures”, International Journal of Civil, Structural, Environmental and Infrastructure Engineering Research and Development (IJCSEIERD), ISSN 2249-6866, Vol. 3, Issue 1, 2013, pp. 1-10

62.    K. Srinivasa Rao, S. Rakesh kumar, A. Laxmi Narayana, “Comparison of performance of standard concrete and fibre reinforced concrete exposed to elevated temperatures”, American Journal of Engineering Research (AJER), e-ISSN: 2320-0847 p-ISSN: 2320-0936, Volume-02, Issue-03, 2013, pp. 20-26

63.    Ashok R. Mundhada & Dr Arun D. Pofale, “Behavioural study of concrete at high temperatures”, Proceedings of International conference on ‘Recent trends in engineering & technology’, published by ELSEVIER, 2014, pp 243-248

64.    Gai-Fei Peng, Xu-Jing Niu, “Fire resistance of normal concrete, high performance concrete and ultra-high performance concrete: A review”, Proceedings of UKIERI Concrete Congress, India, ISBN: 978-93-84869-83-0, 2015, pp. 1354-1371

65.    Ashok R. Mundhada & Dr Arun D. Pofale, “Effect of elevated temperatures on strength and quality of concrete”, Proceedings of UKIERI Concrete Congress, India, ISBN: 978-93-84869-83-0, 2015, pp. 1402-1410
66.    Anand N & Prince Arulraj G, “The effect of elevated temperature on concrete materials A Literature review”, International Journal of Civil and Structural Engineering, Volume 1, No 4, 2011, pp. 928-938

67.    Malhotra H L, “Design of Fire Resisting Structures”, Surrey University Press, U.K., 1982

68.    Kodur V. K. R. et al., “Structures in Fire: State-of-the-Art, Research and Training Needs”, NIST Workshop Report, NIST GCR 07-915, Dec 2007

69.    Robin P. Nicolai & Rommert Dekker, “Automated Response Surface Methodology for Stochastic Optimization Models with Unknown Variance”, Tinbergen Institute Discussion Paper, The Netherlands, TI 2005-042/4, 2005

16-33

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

6.

Authors:

Neha Chouhan, Rohit Gupta

Paper Title:

Experimental Investigation for Tool Life by Optimizing Cutting Parameters in Plain Turning Operation by Statistical Methods

Abstract:  Rate of production and tool material cost plays a significant role other than the material cost of the part to be made in a production run from economic point of view.  The maximum production rate can be achieved if the total time required per piece is reduced to a minimum [1]. The paper presents an optimization technique to achieve minimum tool wear which would lead to reduced tool changing time and tooling cost. The experimental layout is designed based on the Taguchi`s L9 orthogonal array technique and analysis of variance (ANOVA) is performed to identify the effect of the cutting parameters on the response variables. Two different set of response variables are used, first, variation of cutting speed with feed and depth of cut, second, variation of rake angle with feed and depth of cut. The calculation is performed using Minitab-17 software.  

Keywords:
Optimization Technique, Taguchi`s L9 orthogonal array, analysis of variance (ANOVA), Minitab-17


References:

1.    A.Ghosh, A K Mallik, Manufacturing Science
2.    https://www.ee.iitb.ac.in/~apte/CV_PRA_TAGUCHI_L9MAN.htm

3.    S. R. Das, R. P. Nayak, & D. Dhupal, “Optimization of the cutting parameters on tool wear and workpiece surface temperature in turning of AISI D2 steel”, International Journal of Lean Thinking, 2012.

4.    K Dhameliya, J Desai, M Gandhi, D Dave, “Experimental investigation of process parameters on MRR and Surface roughness in turning operation on CNC Lathe machine for Mild Steel – E250: IS 2062”

5.    Gunay M., Korkut I., Aslan E. and Eker U., Experimental investigation of the effect of cutting tool rake angle on main cutting force, Journal of materials processing technology,166, pp 44-49, 2005

34-39

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

7.

Authors:

Muhammad Abdus Samad

Paper Title:

Ergonomics and the Prevention of Musculoskeletal Strain and Back Injuries

Abstract: As technology becomes more complex, so ergonomics is undoubtedly destined to play an increasingly important role in industrial production and industrial health and safety. At the workplace, ergonomics places equal emphasis upon greater system efficiency and improved health of the individual. Ergonomics must be involved in fitting the tool and machine to the worker by design, fitting the worker to the machine by selection and training, and the optimization of the ambient environment to suit the man or the adaptation of the man to tough environmental conditions. Ergonomics aims to promote efficiency, safety and comfort at work situation in industry through better relationship between man, his tools and the work environment. This paper deals about the injuries such as backaches, neck aches, and other muscular strains due to bad seating and incorrect working posture and how to prevent them by designing of workstation that will be very comfortable and convenient to work at. This paper also discusses the optimal conditions for the workers, reduction of physical workload, improvement of working postures and facilitating psycho-sensorial functions in instrument handling, and so on.

Keywords:
Back injury, Workstation design, Human factor, Productivity and Anthropometry.  


References:

1.    Helander, Martin (1943). A Guide to the Ergonomics of Manufacturing.
2.    Kroemer, K. (1994). Egonomics: How to Design for Ease and Efficiency. Englewood Cliffs,NJ: Prentice Hall

3.    Eklund, J. (1997). Ergonomics, quality and continuous improvement— conceptual and empirical relationships in an industrial context, Ergonomics, Vol. 40, 982–1001

4.    Bunning, T. (1998). Designing ergonomically sound assembly workstations, Occupational Hazards, Vol. 60, No. 8, 63–65

5.    Bullinger, H. J. (1986). Systematische montageplanung   , Hanser, Munich (in German)

6.    Pheasant, S. and Haslegrave, C.M. (2005). Bodyspace: Anthropometry, Ergonomics and the Design of Work. Taylory & Francis group, LLC.

40-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Pakinam Ashraf, Hany Ayad, Dina Saadallah

Paper Title:

Sense of Community and Built Environment: How Can Built Environment, Social Economic Conditions and History of Place Shape Our Sense of Community?

Abstract:  Sense of community is a concept in community and social psychology and has been investigated in several researches. The sense of community level changes towards many independent variables and it is related to the quality of the built form. This research aims at investigating the relationship between the sense of community and some determinants such as; the physical environment, the historical background and the socio economic conditions in selected neighborhoods. Furthermore, this research examines the social interaction as it has an important role in measuring the sense of community. To achieve that, the authors propose a methodology composed mainly of two major tools; the first, a survey formed of sense of community indices, as well as other social and psychological factors according to Kim and Kaplan theory. The second tool is based on the observation of physical attributes of the neighborhood. The adopted methodology is applied on two neighborhoods in Alexandria city, Egypt. By analyzing the survey results and the researcher’s observation of physical attributes in the selected neighborhood, it was found that there is a strong correlation between the sense of community and several independent variables such as the built environment, the socio economic conditions, some demographic factors like age, monthly income, length of residence and the importance of pedestrian factors on measuring sense of community.

Keywords:
Sense of community, Built environment, Statistical analysis, Social Interaction, Alexandria neighborhoods.


References:

1.       Abdo, M. M., 2013. The “Open Cities” Approach: A Prospect for Improving the Quality of Life in the City of Alexandria, Egypt, Alexandria, Egypt: Unpublished master thesis.
2.       Alkalash, M. M. F. E., 2014. RETRIEVE THE WATERFRONT ALEXANDRIA: Strategies & Guidelines Framework Towards a Democratic Corniche, MILANO: Unpublished Master’s Thesis.

3.       Berkowitz, L., 1956. Group norms under bomber crews: Patterns of perceived crew attitudes, and crew liking related to air crew effectiveness of Far Eastern combat. Sociometry, Volume 19, pp. 141-153.

4.       Buckner, J., 1988. The Development of an Instrument to Measure Neighbourhood Cohesion. American Journal of community psychology, 16(6), pp. 771-791.

5.       CAPMAS, 2013. Statistical year book, Cairo: Central Agency For Public Mobilization and Statistics.

6.       Chavis, D., J. Hogge, D. McMillan and A. Wandersman, 1986. Sense of Community Through Brunswik’s Lens: A First Look. Journal of Community Psychology, Issue Theory, pp. 14: 24 -40.

7.       Giles-Corti, L. W. &. L. D. F. &. B., 2010. Sense of community and its relationship with walking and neighborhood design2. Social Science & Medicine Elsevier Ltd., Volume 70, pp. 1381-1390.

8.       Hussein, A., 2014. contemporary city | descriptions and projects. [Online]

9.       Available at: http://contemporarycity.org/2014/05/alexandria/[Accessed 10 7 2016].

10.    MARANS, D. O. &. A. R. &. R. W., 2009. Neighborhood satisfaction, sense of community, and attachment: Initial findings from Famagusta quality of urban life study. ITU A|Z, 6(1), pp. 6-20.

11.    Schweitzer, J., 1996. A desription of sense of Community in Lansing Neighbourhoods’ Project. University of Michigan: presented at the “Defining Community, Reinforcing Society” conference.

12.    Seymour Sarason, 1974. The psychological sense of community: Prospects for a community psychology, San Francisco: Jossey-Bass.

13.    The Sense of Commmunity Partners, 2004. Exploring Sense of Community An Annotated Bibliography. Calgary, Canada: the Sense of Community Partners, c/o The City of Calgary Community Strategies.

14.    UNDP, GOPP, MHUUD & CIDA, 2010. State of the built environment and housing indicators of seven Egyptian cities, Cairo, Egypt: comprihensive report.

15.    Strategic Leisure Pty Ltd t/a the Strategic Leisure Group, 2010. Cycling &Walking Strategy Review, Cairns, Australia: McCormick Rankin Cagney.

16.    The members of the City of Austin Design Commission, 2009. Urban Design Guidelines for Austin, City of Austin: City of Austin PECSD.

17.    Holdsworth, L & Hartman, YA, 2009. Indicators of community cohesion in an Australian country town. Commonwealth Journal of Local Governance, Volume 2, pp.76-97.

18.    Michael Quartuch, J. D. A. W. B. V. C. S. J. L. J. C.-G. K. B., 2012. Using Sense of Place and Sense of Community to Understand Landscape Change Behaviors, University of Maine, Orono, USA: Unpublished work.

44-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Sarah M. Sabry, Hany M. Ayad, Dina M. Saadallah

Paper Title:

Assessing the Factors Associated with Urban Mobility Behaviour: Case studies from Alexandrian Neighborhoods, Egypt

Abstract: With the rapid spread of urbanization, cities started to witness challenges related to its streets. It is becoming imperative that the mobility should be managed appropriately to minimize its negative impacts on urban areas. Unfortunately, city leaders in many developing countries like Egypt are following the same Car-Oriented development patterns made by cities in developed countries. Ironically, the developed countries are trying to recover from a car dominated development era by re-allocating road space for public and non-motorized transport. In this respect, this research aims at exploring the key aspects and factors that affect individuals’ mobility choices in Egypt. It focuses on the socio-demographic, attitudinal and physical factors that are associated with commuters’ mobility behaviour and their choice of mode for daily trips. Two neighborhoods in Alexandria are selected for comparative and analytical analyses. First, a survey is carried out in the two selected areas. Second, Pearson’s Chi-square χ2 test is performed to explore the significant differences of commuter’s attitudinal, personal and built environment factors between the two areas. Finally, cross-tabulation distribution of categorical variables are presented in terms of absolute frequencies, p-values from Pearson’s Chi-square χ2 test and t-test so as to look for the association of the urban form and non-urban form factors to mobility choices.

Keywords:
 Sustainable Urban Mobility (SUM) – Travel Behaviour – Mode choice –Non-urban form factors – Built environment factors – TOD development – Sustainable neighborhoods.


References:

1.       Paulley, N., et al. (2006). “The demand for public transport: The effects of fares, quality of service, income and car ownership.” Transport Policy 13(4): 295-306.
2.       Ortuzar J.D. & Willumsen L.G. (1999). Modelling Transport. England: John Wiley & Sons ltd.

3.       Dewi.A. (2010). “Research on factors affecting travel behaviour on choice of transportation means for working activity”. Yogyakarta, Indonesia: Faculty of Economic Sciences, Communication and IT.

4.       Aoun, C. (2014). Urban Mobility in the Smart City Age. London: ARUP, the climate group.

5.       Buis, J. (2009). A new Paradigm for Urban Transport Planning: Cyclin g Inclusive Planning at the Pre-event Training Workshop on Non-Motorized Transport in Urban Areas, 4th Regional EST Forum in Asia, 23 February 2009, Seoul, Republic of Korea.

6.       Rudolf, P. (2004). Sustainable Transport: A Sourcebook for policy-makers in developing cities module 2a (Environment and Infrastructure ed., Vol. Division 44). (D. G. für, Ed.) Deutsche Gesellschaft für (Technische Zusammenarbeit (GTZ) GmbH).

7.       Jacques, C. & Ahmed M. El-Geneidy (2010). Does travel behaviour matter in defining urban form? A quantitative analysis characterizing distinct areas within a region, The journal of transport and land-use, http://jtlu.org , Vol. 7 no. 1 [2014] pp. 1-14 doi: 10.5198/jtlu.v7i1.377

8.       Global urban development magazine GUD, 2005. Overview of our vision and purpose. [Online] Available at: http://www.globalurban.org/Vision%20and%20Purpose.htm

9.       Zegras, C. (September, 2005). Sustainable Urban Mobility: Exploring the Role of the Built Environment. Massachusetts: Massachusetts Institute of Technology.

10.    Jorge Gil. (2016). urban modality: Modelling and evaluating the sustainable mobility of urban areas in the city-region. Delft University of Technology, Faculty of Architecture and the Built Environment, Department of Urbanism.

11.    UN-Habitat. (2013). Planning and design for sustainable urban mobility. USA and Canada: Routledge.

12.    Cervero, R. and Kockelman, K. (1997). Travel demand and the 3Ds: Density, diversity, and design, Transportation Research Part D: Transport and Environment.

13.    Cervero, R., Sarmiento, Olga L., Jacoby, Enrique, Gomez, Luis Fernando & Neiman, Andrea (2009). Influences of Built Environments on Walking and Cycling: Lessons from Bogotá’, International Journal of Sustainable Transportation, 3:4,203 — 226, DOI: 10.1080/15568310802178314

14.    Handy, S. L. (2002). “Travel Behaviour–Land Use Interactions: An Overview and Assessment of the Research. In: In Perceptual Motion: Travel behaviour Research Opportunities and Application Challenges ” Pergamon, Amsterdam: pp. 223-236.

15.    Hanson, S. and M. Schwab. (1986). Describing disaggregate flows: individual and household activity patterns. The geography of urban transportation.

16.    Hanson, S. (1982). “The determinants of daily travel-activity patterns: relative location and sociodemographic factors.” Urban Geography 3(3): 179-202.

17.    Shaoli Wang & Carey Curtis. (2015).The Function of Individual Factors on Travel Behaviour: Comparative Studies on Perth and Shanghai. State of Australian Cities national Conference 2015. Queensland: Urban Research Program at Griffith University on behalf of the Australian Cities Research Network.

18.    Domencich, T. (1975). Urban travel demand: a behavioral analysis: a Charles River Associates research study / Thomas A. Domencich and Daniel McFadden.

19.    Olsson. A. (2003). Factors that influence choice of travel mode in major urban areas: The attractiveness of Park & Ride. Stockholm: Division of Transportation and Logistics.

20.    Ajzen, I. (1991). “The theory of planned behavior.” Organizational Behaviour and Human Decision Processes 50(2): 179-211.

21.    Anable, J. (2005). “‘Complacent car addicts’ or ‘aspiring environmentalists’? Identifying travel behaviour segments using attitude theory.” Transport Policy 12(1): 65-78.

22.    Ewing, R. and Cervero, R. (2010). Travel and the Built Environment. Journal of the American Planning Association, Vol. 76, No. 3, (265-94). Doi: 10.1080/01944361003766766.

23.    Brundtland, G. Harlem. (1987). Report of the World Commission on Environment and Development: Our Common Future. World Commission on Environment and Development.

24.    Jensen, M. (1999). “Passion and heart in transport: a sociological analysis on transport behavior.” Transport Policy 6(1): 19-33.

25.    The New York City Departments of Design and Construction (DDC), Health and Mental Hygiene, Transportation (DOT), and City Planning. (2010). Active Design Guidelines: Promoting physical activity and health in design. New York.

26.    OECD, (2002). OECD guidelines towards environmentally Sustainable Transport. (OECD) Organization for Economic Co-operation and Development publication.

56-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

10.

Authors:

Nor Azlina Abd Rahman, Vinothini Kasinathan, Rajasvaran Logeswaran, Nurwahida Faradila Taharim

Paper Title:

QR IT Seek: A Conceptual Model for Teaching and Learning by Digital Natives via Edutainment Game

Abstract:  The goal of teaching and learning activities is to for the target recipient to achieve the learning outcomes. As the Digital Natives generation is being brought up in a much more sophisticated technologically advanced world, the aptitude and requirements in their studies have changed. More interactive and fun learning, out of the classroom setting, is desired. This paper proposes a conceptual framework for edutainment and reports on a primary study on a developed QR IT Seek game. The primary study, results and analysis would aid in further improvements and adaptation of such activities to improve the teaching and learning performance of the Digital Natives. 

Keywords:
edutainment, QR-Code, QR IT Seek competition, Digital Natives, pedagogy.


References:

1.    N.F. Taharim, A. Mohd Lokman, W.A.R. Wan Mohd Isa and N. L. Md Noor (2014) “Investigating Feasibility of Mobile Learning for History Lesson,” International Colloquium of Art and Design Education Research (i-CADER), Springer, pp. 51-55.
2.    GS1 Japan (2009) “QR Code Overview & Progress of QR Code Application,”. Available at: http://www.gs1jp.org/pdf/001.pdf. [Accessed on 27th March 2016]

3.    EDUCASE (2009) “7 Things You Should Know about QR Codes,” EDUCASE Learning Initiative. Available at: https://net.educause.edu/ir/library/pdf/ELI7046.pdf [Accessed on 27th March 2016].

4.    Goh, Lay Huah & Jarrett, Barry W. (2014) “Integrating QR Codes And Mobile Technology In Developing Listening And Speaking Skills In The Teaching Of English Language,”  International Journal on E-Learning Practices (IJELP), Volume 1, Issue 1.

5.    Sari Wallden, Anne Soronen (2004) “Edutainment from Television and computers to Digital  Television” . Available at: http://www.sis.uta.fi/infim/infim_2011/julkaisut/hyper/b/fitv03b.pdf [Accessed 25th June 2016]

6.    Andrew Miller (2011) “Twelve Ideas for Teaching with QR Codes”. Available at: http://www.edutopia.org/blog/QR-codes-teaching-andrew-miller [Accessed on 22th June 2016]

7.    HubPages (2013) “QR Code secrets. Dynamic vs. Static what’s the difference?”. Available at : https://qrcode.trustthisproduct.com/what-is-a-qr-code-en.html [Accessed on 28th June 2016]

8.    Ben Van Sas, Joroen Steeman (2012) “QR Codes – Linking the real world with the digital world.” Available at: http://blog.qr4.nl/Documents/Presentation-QR-Codes.pdf [Accessed on 28th June 2016]

9.    C. H. Lai, S. A. Chen, F. S. Hsiao, S. Chen, (2013) “Scan & Learn: Exploring Application of Dynamic Quick Response Codes in Digital Classrooms”. Bulletin of the Technical Committee on Learning Technology, Volume 15, Issue 3, pp. 2-5, July 2013.

70-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

B. M. Mustapha, V. C. Ikpo, A. B. Bababe

Paper Title:

Intelligent Control for Laboratory DC Motor

Abstract: This paper presents the design of a fuzzy PD controller for laboratory DC motor (MS 150 Kit) to minimize the tracking error in applications. The Fuzzy PD controller was simulated and the responses obtained when compared with a conventional PD controller revealed better performance.

Keywords:
 Control, Direct-Current, Fuzzy, Motor


References:

1.       T. Nishiyama, S. Suzuki, M. Sato, and K. Masui, “Simple Adaptive Control with PID for MIMO Fault Tolerant Flight Control Design,” in AIAA Infotech@ Aerospace, ed, 2016, p. 0132.
2.       G.-J. Su and J. W. McKeever, “Low-cost sensorless control of brushless DC motors with improved speed range,” Power Electronics, IEEE Transactions on, vol. 19, pp. 296-302, 2004.

3.       R. Saidur, S. Mekhilef, M. Ali, A. Safari, and H. Mohammed, “Applications of variable speed drive (VSD) in electrical motors energy savings,” Renewable and Sustainable Energy Reviews, vol. 16, pp. 543-550, 2012.

4.       R. Krishnan, Electric motor drives: modeling, analysis, and control: Prentice Hall, 2001.

5.       N. Hemati, J. S. Thorp, and M. C. Leu, “Robust nonlinear control of brushless DC motors for direct-drive robotic applications,” Industrial Electronics, IEEE Transactions on, vol. 37, pp. 460-468, 1990.

6.       G.-R. Yu and R.-C. Hwang, “Optimal PID speed control of brush less DC motors using LQR approach,” in Systems, Man and Cybernetics, 2004 IEEE International Conference on, 2004, pp. 473-478.

7.       V. Vossos, K. Garbesi, and H. Shen, “Energy savings from direct-DC in US residential buildings,” Energy and Buildings, vol. 68, pp. 223-231, 2014.

8.       H. O. Ahmed, “Speed Sensorless Vector Control of Induction Motors Using Rotor Flux based Model Reference Adaptive System,” Journal of Engineering and Computer Science, vol. 17, 2016.

9.       W. Borutzky, Bond Graph Methodology. New York: Springer, 2010.

10.    B. O. B. Arun K. Samantaray, A Bond Graph Approach, Model-based Process Supervision. Scotland, UK, 2008.

76-79

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

12.

Authors:

Sanjay S. Bhagwat, S. D. Pohekar

Paper Title:

Performance Assessment of CHP Cycle in Sugar Industry

Abstract:  A huge potential for power generation from waste fuels exists within the sugar cane industry. This paper presents the findings of the energy and exergy analysis of cogeneration i.e. CHP cycle in sugar industry. The study was aimed at assessing the operational performance of the bagasse based cogeneration power plant in sugar industry by evaluating both the energy and exergy efficiency.

Keywords:
  Energy, Exergy, Entropy, CHP.


References:

1.    A.Cihan, O.Hacıhafızoglu, & K. Kahveci,,  “Energy–exergy analysis and modernization suggestions for a combinedcycle power plant” International Journal of Energy Research, 30(2), 2006,pp.115-126.
2.    M.Ameri, P. Ahmadi & A.Hamidi, “Energy, exergy and exergoeconomic analysis of a steam power plant: A case study”, International Journal of Energy Research, 33(5), 2009, pp. 499-512.

3.    O.Can, N. Celik and I. Dagtekin, “Energetic–exergetic-economic analyses of a cogeneration thermic power plant in Turkey”, International Communications in Heat and Mass Transfer, 36(10),2009, pp. 1044-1049.

4.    F.Jurado, O. Can., & J. Carpio, “ Modelling of combined cycle power plants using biomass”,. Renewable Energy, 28(5), 2003, pp. 743-753.

80-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

13.

Authors:

Raja Rao.Chella

Paper Title:

A Qualitative Review on Image Processing Algorithms to Detect Early Stage Lung Cancer

Abstract: Nowa days, the image processing algorithms are being usedwidely in medical systems for detection of lung cancer. It is observed that the life span rate of lung cancer patients increases from 15 to 50% if they were detected at early stages. Detection of cancer cells is the most important issue for medical researchers as it becomes more complex in the treatment process. The detection steps of presence of cancerous cells include image pre-processing, segmentation, feature extraction and classification. In this paper, algorithms for enhancement, segmentation and feature extractionto detect the cancerous tumors which are small and large in size from the lung CT scan images are reviewed. Finally thealgorithms are compared with one another using three parameters called accuracy, sensitivity and specificity.

Keywords:
CT Images, Image Preprocessing, Segmentation, Enhancement, Feature Extraction and Classification.


References:

1.       Ada, Rajneet Kaur “Early Detection and Prediction of Lung Cancer Survival using Neural Network Classifier”IJAIAM. Volume 2, Issue 6, June 2013
2.       Avinash. S, Dr. K. Manjunth, Dr. S. Senthil Kumar,” An Improved Image Processing Analysis for the Detection of Lung Cancer using Gabor Filters and Watershed Segmentation Technique”,IEEE,2016.

3.       P.B. Sangamithraa, S. Govindaraju.,” Lung Tumour Detection and Classification using EK-Mean Clustering”, IEEE –WiSPNET  conference,2016.

4.       Md. Badrul Alam Miah, Mohammad Abu Yousuf,” Detection of Lung Cancer from CT Image Using Image Processing and Neural Network”,  Electrical Engineering and Information &Communication Technology  (ICEEICT) 2015.

5.       Taruna Aggarwal, Asna Furqan, Kunal Kalra,” Feature Extraction and LDA based Classification of Lung Nodules in Chest CT scan Images”,IEEE,2015.

6.       Elmar Rendon-Gonzalez and Volodymyr Ponomaryov,”Automatic Lung

7.       Nodule Segmentation and Classification in CT Images Based on SVM”,IEEE-2016.

8.       T. Messay, R. Hardie and S. Rogers, “A new computationally efficient CAD system for pulmonary      nodule detection in CT imagery,”Med  Image Anal, vol. 14, pp. 390–406, 2010.

9.       D. Cascio, R. Magro, F. Fauci, M. Iacomi, and G. Raso, “Automatic detection of lung nodules in CT datasets based on stable 3D mass-spring models,” Computers in Biology and Medicine, vol. 42, no. 11, pp. 1098– 1109, 2012

10.    Saleem Iqbal et al,”Potential Lung Nodules Identification for Characterization by Variable Multistep Threshold and Shape Indices from CT     Images”, Computational and Mathematical Methods in Medicine Volume 2014 .

11.    M. Alilou, V. Kovalev, E. Snezhko, and V. Taimouri, “A comprehensive framework for automatic detection of pulmonary nodules in lung CTimages,” Image Anal Stereol, vol. 33, pp. 13-27, 2014.
12.    Dasari Hemalatha,  Raja Rao.Ch, S.J.Sugumar,” Detection of Lung Cancer Using Marker-Controlled Watershed Transform”, International Journal & Magazine Engineering, technology, management Research,Volume 3,Isuue no.10,2016.
13.    Vicky Ambule, Minal Ghute, Kanchan Kamble, Shilpa Katre,” Adaptive Median Filter for Image Enhancement”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.

14.    Raajan.P, Muthuselvi.S, Agnes Saleema. A,”  An Adaptive Image  Enhancement using Wiener Filtering with Compression and Segmentation”,  International Journal of Computer Applications, 2015

83-87

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Bababe Adam B., Ashish Kumar J., Rajiv Kumar

Paper Title:

Lora Based Intelligent Home Automation System

Abstract:  The home and Society are surrounded by “things” which are connected to each other, either directly or indirectly via the internet of things. To have access to controlling these devices remotely with precision within the network when required is a key factor in the process of home automation. There are numerous aspects in this automation that needs to be developed so as to enhance it. This research gives a solution to having a precise and direct control and automatic detection of current state of devices with the use of android application. It also gives a practical implementation of home automation using LoRa in comparison to other technologies.

Keywords:
 Home Automation; Internet of Things; LoRa; Android; Smart


References:

1.       Lee, K.M., Teng, W.G. and Hou, T.W., “Point-n-Press: An Intelligent Universal Remote Control System for Home Appliances,” IEEE Transactions on Automation Science and Engineering. 2016, 13(3), pp 1308 – 1317.
2.       Qu, Y., Xu, K., Wang, H., Wang, D. and Wu, B., December. “Lifetime maximization in rechargeable wireless sensor networks with charging interference,” In 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) 2015, pp. 1-8.

3.       Hsieh, C.W., Chi, K.H., Jiang, J.H. and Ho, C.C., 2014. “Adaptive binding of wireless devices for home automation,” IEEE Wireless Communications, 21(5), pp.62-69.

4.       Sheng, W., Matsuoka, Y., Ou, Y., Liu, M. and Mastrogiovanni, F.,. “Guest Editorial Special Section on Home Automation,” IEEE Transactions on Automation Science and Engineering, 2015, 12(4), pp.1155-1156.

5.       Gill, K., Yang, S.H. and Wang, W.L., “Secure remote access to home automation networks,” IET Information Security, 2013, 7(2), pp.118-125.

6.       Langhammer, N. and Kays, R., “Performance evaluation of wireless home automation networks in indoor scenarios,” IEEE Transactions on Smart Grid, 2012, 3(4), pp.2252-2261.

7.       Kumar SP, Rao SV. RF Module Based Wireless Secured Home Automation System Using FPGA. Journal of Theoretical and Applied Information Technology. 2015, 77(2)

8.       Kumar PM, Sandhya N. “Bluetooth Based Wireless Home Automation System Using FPGA”. Journal of Theoretical and Applied Information Technology. 2015, 77(3)

9.       ElShafee A, Hamed KA. “Design and implementation of a WIFI based home automation system”. World academy of science, engineering and Technology. 2012, 2177-80.

10.    Tseng SP, Li BR, Pan JL, Lin CJ. “An application of Internet of things with motion sensing on smart house”. InOrange Technologies (ICOT), 2014 IEEE International Conference on 2014 Sep 20 pp. 65-68

11.    Teymourzadeh R, Ahmed SA, Chan KW, Hoong MV. “Smart GSM based home automation system”. InSystems, Process & Control (ICSPC), 2013 IEEE Conference on 2013 Dec 13, pp. 306-309.

12.    Sivakrishnan J., Esakki Vigneswaran E. and Sakthi Vishnu R. “Home Automation Control and Monitoring System Using BLE Device”. Middle-East Journal of Scientific Research, 2016 pp. 78-82

13.    Bor, Martin, John Edward Vidler, and Utz Roedig. “LoRa for the Internet of Things.” (2016): 361-366.

14.    Tadimeti, H.C. and Pulipati, M., “Overview of Automation Systems and Home Appliances Control using PC and Microcontroller,” Int. Jr. of Sci. Res, 2013, 2, pp.127-31.

15.    Ruçi, L., Karçanaj, L. and Shurdi, O., “Energy efficiency combined SW techniques on mobiles Android OS,” In Computer and Energy Science (SpliTech), International Multidisciplinary Conference on 2016, pp. 1-8.

16.    LoRa. https://www.lora-alliance.org. Accessed: 2016-12-23

17.    Song, S. and Issac, B., “Analysis Of Wi-fi And Wimax And Wireless Network Coexistence,” International Journal of Computer Networks & Communications, 2014, 6(6), p.63.

18.    Chowdary, U.V., Rohith, K., Sandeep, P. and Ramu, M., “Home Automation System Using IR Sensors,” International Journal of Electrical and Electronics Engineering, 2015, 4(6),  pp 11-1.

88-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Shaik Noor Mohammad

Paper Title:

Security Attacks in MANETS (Survey Prospective)

Abstract: Mobile Adhoc Network (MANET) is a dynamic, foundation less Network comprising of agroup of dynamic nodes which communicate with each other. Such networks find application in real-life environment as communication in Battlefields and communication among rescue personnel in disaster affected areas. Recently, mobile ad-hoc networks (MANETs) have gained the attention of research community due to increased adoption of its usage in real life applications. Due to fundamental characteristic of being Adhoc and insecure medium the most challenging job in MANETS is security. In this paper we present a brief survey of security attacks and existing prevention techniques.

Keywords:
Mobile Adhoc Network (MANET), Security, Attacks, Routing, Mobile nodes, Dynamic Topology


References:

1.       Rutvij H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs “, (254-260)2012 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/12 / 2012 IEEE.
2.       Sanjay K. Dhurandher, Isaac  Woungang,  Raveena Mathur , Prashant Khurana,” GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs”,(357-362) 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 978-0-7695-4952-1/13/2013 IEEE.

3.       Yudhvir Singh, Avni Khatkar, Prabha Rani, Deepika, Dheer Dhwaj Barak ,“Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”,(283-287) 2013 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/13/ 2013 IEEE.

4.       Indirani, Dr. K. Selvakumar, V. Sivagamasundari, “Intrusion Detection and Defense Mechanism for Packet Replication Attack over MANET Using Swarm Intelligence”, (152-156) Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 978- 1-4673-5845-3/13/2013 IEEE.

5.       P.Karthikkannan, K.P.Lavanya Priya,” Reduction of Delays in Reactive Routing Protocol for Unobservable Mobile Ad-Hoc Networks”, 2013 IEEE.

6.       Sapna Gambhir and Saurabh Sharma,” PPN: Prime Product Number based Malicious Node Detection Scheme   for   MANETs”,   (335-340)   2012   3rd   IEEE International Advance Computing Conference (IACC), 978-1-4673-4529-3/12/ 2012 IEEE.

7.       Hizbullah Khattak, Nizamuddin, Fahad Khurshid, Noor ul Amin, ” Preventing Black and Gray Hole Attacks in AODV using Optimal Path Routing and Hash”,(645-648) 978-1-4673-5200-0/13/2013 IEEE.

8.       Roopal Lakhwani , Vikram Jain , Anand Motwani , “ Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks”, International Journal of Computer Applications (0975 – 8887) Volume 59– No.8, December 2012.

9.       Htoo Maung Nyo, Piboonlit Viriyaphol, ” Detecting and Eliminating Black Hole in AODV Routing”, 2011 IEEE, 978-1-4244-6252-0/11

10.    Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks”, in Proc. ACM Southeast Regional Conference, pp. 96-97, 2004.

11.    Pramod Kumar Singh, Govind Sharma,” An Efficient Prevention of Black Hole Problem in AODV Routing Protocol   in   MANET”,(902-906)   2012   IEEE   11th International Conference on Trust, Security and Privacy in Computing and Communications, 978-0-7695-4745- 9/12/ 2012 IEEE.

12.    Zhou L, Chao H-C, “Multimedia Traffic Security Architecture for the Internet of Things” IEEE Network 25(3):29–34. IEEE 2011.

13.    Yang H, Lou H, Ye F, Lu S, Zhang L (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1):38–47.

14.    S.Nithya, S.Prema, G.Sindhu, ” Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks “, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 01 , P.P 1083-1087, Jan-2016

15.    Wu B, Chen J, Wu J, Cardei M, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks” In: Xiao Y,Shen X, Du D-Z (eds) Wireless  Network Security.
on Signals and Communication Technology. Springer, New York 2007.

16.    Marti S, Giuli TJ, Lai K, Baker M, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks” 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, August 2000.

17.    Hu Y-C, Perrig A, Survey of Secure Wireless Ad   Hoc Routing. IEEE Security & Privacy 2(3):28–39, IEEE 2004.

93-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Sandeep P.

Paper Title:

A Comparative Analysis of Optimization Techniques  in Cognitive Radio (QoS)

Abstract: Wireless Technology has seen a tremendous advancement in recent times. There has been a huge growth in multimedia applications over the wireless networks. The requirement of significant bandwidth for multimedia services has increased the demand for radio spectrum. The scarcity of radio spectrum has become a challenge for the conventional fixed spectrum assignment policy.  Thus, Cognitive Radio (CR) has emerged as a new exclusive choice to address the spectrum underutilization problem by enabling users to opportunistically access unused spectrum bands. It offers a promising solution to meet this demand by fully utilizing available spectrum resources. It improves the utilization of the wireless spectrum by allowing the secondary users to access the primary channels in an opportunistic manner. Efficient utilization of frequency spectrum is possible using dynamic spectrum allocation. Optimization techniques like Genetic Algorithm (GA), Ant Colony Optimization (ACO) and Mutated Ant Colony Optimization (MACO) are discussed here to meet the users QoS needs in the Cognitive Radio. The transmission and environmental parameters along with performance objectives of cognitive radio are studied and compared in the paper using different optimization techniques. In this paper, the results of various optimization techniques in Cognitive Radio System along with CR objectives are analysed to meet users QoS.

Keywords:
Cognitive Radio Genetic Algorithm, Ant Colony Optimization, Mutated Ant Colony Optimization, QoS Provisioning.


References:

1.       Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation dynamic spectrum access cognitive radio wireless networks: A survey. Computer Networks, 50, 2127–2159.
2.       Haykin, S. (2005). Cognitive radio: Brain-empowered  wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.

3.       Gandetto, M., & Regazzoni, C.. Spectrum sensing: A  distributed approach for cognitive terminals. IEEE Journal on Selected Areas in Communications,   25(3),2007,546–557.

4.       Federal communication commission, “spectrum policy task   force”, Report of ET Docket 02-135, 2002.

5.       J. Mitola III, “cognitive radio: An integrated Agent Architecture for Software Radio”, PhD thesis, Royal   institute of Technology (KTH), 2000.

6.       C. Rieser “Biologically inspired cognitive radio engine   model utilizing distributed genetic algorithms for secure  and robust wireless communications and networking”, PhD thesis, Virginia Tech, 2004.

7.       J Mitola III and G. Q. Maguire, Jr” Cognitive radio:     making software radios more personal,” IEEE Personal  Communications Magazine,vol.6,nr 4, pp.13–18, Aug.1999

8.       Tim R. Newman, Brett A. Barker, AlexanderM. Wyglinski, Arvin Agah, Joseph B.Evans and Gary J Minden  “Cognitive engine implementation for wireless multicarrier transceivers”, Wiley Wireless communications and mobile computing, 7(9), 1129-1142 (2007).

9.       Sebastian Herry and Christophe J.Le Martret, “parameter determination of secondary user cognitive radio network using genetic algorithm”, IEEE 2009.

10.    Maninder Jeet Kaur, Moin Uddin, Harsh K.Verma,  “Performance Evaluation of QoS parameters in cognitive radio using Genetic Algorithms”, In World Academy of Science, Engineering & Technology, vol.4, No.10,  pp.830- 835, 2010.

11.    Nan Zhao, Shuying Li, Zhilu Wu, “Cognitive radio engine design based on Ant colony optimization”, Wireless pers communication, 2012. pp 15-24

12.    Kiranjot kaur, Munish Rattan, Manjeet Singh Patterh, “optimization of cognitive radio system using simulated annealing”, wireless pers communication, 2013.

13.    Abdelfatah Elarfaoui, Noureddine Elalami, “optimization of QOS parameters in cognitive radio using combination of two crossover methods in genetic algorithm”, Int. J. Communications, Network and System Sciences, pp. 478-483, November 2013.

14.    Stephen A. Adubi, Sanjay Misra “A Comparative Study on the Ant Colony Optimization Algorithms” IEEE, 2014

15.    Ismail AlQerm and Basem Shihada, “Adaptive Multi objective optimization scheme for cognitive radio resource management”, Globecom 2014

16.    Vinutha.P, Sutha.J, QOS Parameter Optimization For Cognitive Radio Networks, IJARCST, Vol. 2 Issue  Special -1 Jan-March 2014, pp 204-208

17.    Seshadri Binaya Behera, D.D.Seth, “Resource  allocation for cognitive radio network using particle swarm optimization”, IEEE sponsored (ICECS„2015‟).

18.    Vibhuti Rana and Dr.P.S.Mundra,” A Review on QOS Parameters in Cognitive Radio Using Optimization Techniques” IJEIT Volume 5, Issue12, June 2016, pp:59

19.    Supreet Kaur, Inderdeep Kaur Aulakh” Optimization of Cognitive Radio Sensing Techniques Using Genetic Algorithm” ijircce. Vol 3, Issue 5 May 2015 pp.4131

20.    M .Dorigo, M. Birattari and T. Stuetzle, “Ant colony optimization: artificial ants as computational intelligence technique,” IEEE   Computational Intelligence, vol.I,no. 4, pp. 28-39, 2006.

21.    M. Shoukath Ali, R. P. Singh, “A Study on Game Theory Approaches for Wireless Sensor Networks” ijbsac ISSN: 2249–8958, Volume-6 Issue-3, February 2017, pp:5-7

22.    Ramlakhan Singh Jadon, Unmukh Dutta” Modified Ant Colony Optimization Algorithm with Uniform Mutation   using Self-Adaptive Approach” IJCA (0975 –8887) Volume 74–No.13, July 2013, pp 5-8

97-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Francis Yao Anyan

Paper Title:

Assessment of Indigenous Knowledge usage Among Small Scale Farmers in Kpando Municipality, Ghana

Abstract: The study assessed the indigenous knowledge (IK)usage among small scale farmers. The study was conducted in the Kpando Municipality with a sample size of 140 respondents. Simple random sampling technique was used to collect data from respondents. Data collected were analyzed using descriptive tools such as frequencies, percentages, mean and standard deviation. The study reveal that majority of small scale farmers in the municipality are female. Also farmers in the municipality frequently use indigenous knowledge such as Organic manure, Mulching, Bush fallowing, Harvesting with hand and Rain water harvesting.

Keywords:
 Mulching, Harvesting, Indigenous, Knowledge, Bush fallowing, standard deviation.


References:

1.       Alavi, Maryam, and Dorothy E. Leidner. “Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues.” MIS    Quarterly 25, no. 1 (2001): pp.107–136.
2.       Flavier, J.M. et al. (1995)””The regional program for the promotion of indigenous knowledge in    Asia”, pp. 479-487 in Warren, D.M., L.J. Slikkerveer and D. Brokensha (eds) The cultural dimension of development: Indigenous knowledge systems. London: Intermediate Technology Publications.

3.       Johnson, M., 1992. Lore: capturing traditional environmental knowledge. Ottawa: Dene Cultural Institute and the International Development Research Centre Langhill, S., 1999. Indigenous knowledge: a resource kit for sustainable development researchers in dryland Africa. Ottawa: IDRC

4.       Mugabe, F.T., et al., 2010. Use of indigenous knowledge systems and scientific methods for climate forecasting in southern Zambia and north western Zimbabwe. Zimbabwe Journal of Technological Sciences, 1 (1).

5.   Steiner, A., 2008. Indigenous knowledge in disaster management in Africa. United Nations Environment Programme (UNEP). Available from: http://www.unep.org/IK/PDF/IndigenousBooklet.pdf

6.       Sundamari, M and Ranganathan, T.T. (2003). Indigenous agricultural practices for sustainable farming. Agrobios (India). Jodhpur, India.

7.       Warren, D. M. 1991 “Using Indigenous Knowledge in Agricultural Development”; World Bank    Discussion Paper No.127. Washington, D.C.: The World Bank.

103-108

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

N. Nachammai, R. Kayalvizhi

Paper Title:

Moth Flame Optimisation Algorithm for Control of LUO Converter

Abstract: Because of the effects of the parasitic elements, the output voltage and power transfer efficiency of all DC-DC converters are restricted. In order to eliminate the limitations caused by parasitic elements, the voltage lift technique is successfully applied to DC-DC converters resulting in a new series called Luo converters. Linear control methods ensure stability and good control only in small vicinity around the operating point. These classical controllers are designed using mathematical models by linearising non-linearities around the nominal operating point. Since these controllers are also sensitive to the operating points and parameters variations, a high degree of accuracy cannot be guaranteed from them. To ensure that the controllers work well in large signal conditions and to enhance their dynamic responses, intelligent method using fuzzy technique is suggested.The performance of a fuzzy logic controller depends on its control rules and membership functions. Hence, it is very important to adjust these parameters to the process to be controlled. A method is presented for tuning fuzzy control rules by Moth Flame Optimization(MFO) algorithm to make the fuzzy logic control systems behave as closely as possible to the operator or expert behavior in a control process. The tuning method fits the membership functions of the fuzzy rules given by the experts with the inference system and the defuzzification strategy selected, obtaining high-performance membership functions by minimizing an error function. Moth-flame Optimization (MFO) algorithm is one of the newest bio inspired optimization techniques in which the main inspiration of this optimizer is the navigation method of moths in nature called transverse orientation.MFO has a fast convergence rate due to use of roulette wheel selection method. Moth-Flame Optimizer (MFO) is used to control the LUO converter. MFO-Fuzzy is used to search the fuzzy rules and membership values to achieve minimum ISE, ITAE, settling time and peak overshoot. The proposed method is compared with fuzzy controller. Simulation results prove that the MFO algorithm is very competitive and achieves a high accuracy.

Keywords:
Moth Flame Optimisation Algorithm, Fuzzy Logic Controller, Positive Output Elementary LUO Converter.


References:

1.       F.L.Luo and Hong Ye, Advanced DC/DC Converters, CRC Press, LLC, 2004.
2.       S. Mirjalili, “Moth-flame optimization algorithm: A novel nature inspired heuristic paradigm”,  Knowledge-Based Systems, Elsevier, Vol . 89, 2015, pp.   228-249.

3.       Narottam Jangir, Indrajit N.Trivedi, Mahesh H. Pandya, R.H.Bhesdadiya, Pradeep Jangir and Arvind Kumar, “Moth-Flame Optimization Algorithm for Solving Real Challenging Constrained Engineering Optimization Problems”, Proceedings of IEEE Students Conference on Electrical, Electronics and Computer Science, Bhopal, 2016, pp. 1–5.

4.       Ghada M. A. Soliman, Motaz M. H. Khorshid and Tarek H. M. Abou-El-Enien “Modified Moth-Flame Optimization Algorithms For Terrorism Prediction”, International Journal of Application on Innovation in Engineering & Management, Vol. 5,Issue 7, 2016,pp. 47-58.

5.       Deepak Kumar Lal, Kiran Kumar Bhoi and Ajit Kumar Barisal, “Performance evaluation of MFO algorithm for AGC of a multi area power system”, proceedings   of International conference on Signal Processing,  Communication, Power and Embedded System, odisha, India, Oct. 2016,pp.1-6.

6.       Siddharth A. Parmar, Indrajit N. Trivedi, M. H. Pandya, Pradeep Jangir, Motilal Bhoye and Dilip Ladumor, “Optimal Active and Reactive Power Dispatch Problem Solution using Moth-Flame Optimizer Algorithm”, Proceedings on international conference on energy efficient technologies for sustainability, Oct. 2016,Nagercoil,Tamilnadu. pp. 491-496.

7.       N. Trivedi, Avani H. Ranpariya, Arvind Kumar and Pradeep Jangir, “Economic Load Dispatch Problem with Ramp Rate Limits and Prohibited Operating Zones Solve using Levy Flight Moth-Flame Optimizer”, proceedings of international conference on energy efficient technologies for sustainality, Nagercoil ,2016, pp. 442-447.

8.       Waleed Yamanya, Mohammed Fawzy, Alaa Tharwat and Aboul Ella Hassanien, “Moth-Flame Optimization for Training Multi-layer Perceptrons”, proceedings of eleventh international conference on computer Engineering, Cairo, Egypt, 2015.pp. 267-272.

9.       Pertik Garg and Ashu Gupta,“Optimised open shortest path first algorithm  based on Moth flame optimization”,Indian Journal of Science and Technology,Vol.9,Issue-6,2016,pp.1-9.

10.    Bachir Bentouati and Lakhdar Chaib and  Saliha Chettih, “Optimal power flow using moth flame optimizer” A case study of Algerian power system, Indonesian Journal of Electrical Engineering and Computer Science Engineering,Vol.1,Issue-3,2016, pp. 431-445.

11.    S.Gomariz, F.Guinjoan, E.Vidal, L.Martinz and A.Poreda, ‘On the use of the describing function in fuzzy controller design for switching DC-DC regulators’, in Proc. IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, 2000, pp. 247-250.

109-114

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Vipanjot Kaur Sidhu, Vijay Kumar Joshi

Paper Title:

A Novel Technique for Fault Recovery in Mobile Cloud Computing

Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. Task allocation is one of the issue of the cloud computing. Load imbalance occurs due to limited resources available and leads to the fault occurrence situation. In this paper, a novel technique has been proposed based on weights to overcome faults occurrence problem. In this work improvement will be proposed in agent base load balancing algorithm for task reallocation and reduced fault detection time in cloud architecture.

Keywords:
Cloud computing, deployment models, load balancing, fault tolerance


References:

1.       SanjoliSingla, Jasmeet Singh, 2013  “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology  (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
2.       Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012

3.       Sean Carlin, Kevin Curran “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19, 2011

4.       Barau M, Liang X, Lu R, Shen X. “ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing”, International Journal of Security and Networks; 2011; 6(2),p.67-76

5.       Sahai A, Waters B. “Fuzzy identity-based encryption. Advances in cryptology- EUROCRYPT” 2005,pp.557

6.       Deyan Chen, Hong Zhao, “ Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-65, 2012
7.       M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing” April 2010.
8.       Kuyoro S. O., Ibikunle F. &Awodele O, “Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks (IJCN), Volume 3, Issue 5, pp 247-255, 2011.

9.       BhushanLalSahu, Rajesh Tiwari, “A Comprehensive study on cloud computing”, Internatioinal Journal Of Advanced Research in Computer Science and Software Engineering,Volume 2,Issue 9,September 2012 .

10.    Ertaul L, Singhal S, Gokay S,  “Security challenges in Cloud Computing”, International conference on Security andManagement SAM’10. CSREA Press, Las Vegas, US, pp 36–42,2010.

11.    Grobauer B, Walloschek T, Stocker E, “ Understanding Cloud Computing vulnerabilities”, IEEE Security Privacy, 2011.

12.    Ajay Jangra, RenuBala “Spectrum of Cloud Computing Architecture: Adoption and Avoidance Issues”, International Journal of Computing and Business Research, Volume 2, Issue 2, May 2011.

13.    C. Braun, M. Kunze, J. Nimis, and S. Tai, “Web-based Dynamic IT-Services”,SpringerVerlag, Berlin, Heidelberg, 2010.

115-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Sathya Jose. S. L , K. Sivaraman

Paper Title:

Modified SDROM Filter

Abstract:  Noise is any unwanted component in an image. It is important to eliminate noise in the images before some subsequent processing, such as edge detection, image segmentation and object recognition. This work mainly concentrates on automatic detection and efficient removal of impulse (salt and pepper) noise. For automatic detection of impulse noise, a method based on probability density function is proposed. The basic idea of automatic detection is that the difference between the probabilities of black and white pixels will be small. After detecting the presence of impulse noise in an image, we have to remove that noise. For the removal of impulse noise a new efficient impulse noise removal method (Modified SDROM filter) is proposed. The Modified SDROM consists of two parts 1) Impulse detector and 2) Filter. The results show that this method has higher performance than other methods in terms of PSNR values and SSIM-Index values.

Keywords:
impulse noise, probability density function, PSM Filter, SDROM Filter, PWMAD Filter, Modified SDROM, PSNR, SSIM Index.


References:

1.    Keiko Kondo, Miki Haseyama and Hideo Kitajima”An Accurate Noise Detector for Image  Restoration”, Proc. of 2002 IEEE International Conference On Image Processing, , Vol.1, pp.321-324, 2002.
2.    Z.Wang and D.Zhang,”Progressive switching median filter for the removal of impulsenoise from highly corrupted images”, IEEE Trans. Circuits and Syst.II, Analog and Digital Signal Processing,vol.46,pp.78-80,January 1999.

3.    E. Ahreu and S. K. Mitra, “A signal-dependent rank ordered mean (SDROM) filter-A new approach for removal of impulses from highly corrupted images,” in Proc. Int. Conf Acoust. Speech Signal Processing, Detroit, MI, vol. 4, May 1995, pp. 2371-2374.

4.    Vladimir Crnojevic´, Vojin ˇSenk , Željen Trpovski,,”Advanced impulse detection based on Pixel-Wise MAD (PWMAD)”, IEEE Signal Processing Letters, Vol. 11, No. 7, July 2004,pp.589-592.

5.    Handbook of Image & Video Processing, Academic Press Series in Communications, Networking, and Multimedia, Editor AL Bovik.

6.    Digital Image Processing, Second Edition, Rafael .C. Gonzalez, Richard .E. Woods, Pearson Education, inc., 2002.

7.    Fundamentals of Digital Image Processing, A.K.Jain, Prentice Hall of India Private Limited, New Delhi, 2002.

8.    Digital Image Processing, Third Edition, William .K. Pratt, John Wiley & Sons (Asia), INC 2004.

119-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Jeena R S, Sukesh Kumar A

Paper Title:

GUI Based Model for Stroke Prediction

Abstract:  The innovations in the field of artificial intelligence have paved way to the development of tools for assisting physicians in disease diagnosis and prognosis. Stroke is a leading cause of disability in developing countries like India. Early diagnosis of stroke is required for reducing the mortality rate. Research shows that various physiological parameters carry vital information for the prediction of stroke.  This research work focuses on the design of a graphical user interface (GUI) for the prediction of stroke using risk parameters. Data collected from International Stroke Trial database was successfully trained and tested using Support vector machine (SVM). The linear kernel of SVM gave an accuracy of 90 %. This work has been implemented in MATLAB which can be used to predict the probability of occurrence of stroke.

Keywords:
Stroke, Graphical User Interface (GUI), Support Vector machine (SVM)


References:

1.       Subha PP,Pillai  Geethakumari SM, Athira M, Nujum ZT, Pattern and risk factors of stroke in the young among stroke  parients admitted in medical college hospital, Thiruvananthapuram., Ann indian Acad Neurol 2015;18:20-3.
2.       Barry L. Zaret, M.D., Marvin Moser, M.D., Lawrence S. Cohen, Chapter 18 Stroke – Lawrence M. Brass, M.D. (pgs 215-234)

3.       MacMahon S, Rodgers A. The epidemiological association between blood pressure and stroke: implications for primary and secondary prevention. Hypertens Res. 1994;17(suppl 1):S23-S32.

4.       Shinton R, Beevers G. Meta-analysis of relation between cigarette smoking and stroke. BMJ

5.       Benjamin EJ, Levy D, Vaziri SM, D’Agostino RB, Belanger AJ, Wolf PA. Independent risk factors for atrial fibrillation in a population-based cohort: the Framingham Heart Study. JAMA. 1994;271:840-844

6.       Saangyong Uhmn, Dong-Hoi Kim, Jin Kim, Sung Won Cho, Jae Youn Cheong, “Chronic Hepatitis Classification Using SNP Data and Data Mining Techniques”, Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007,pp.81 – 86 , 11-13 Oct. 2007B. Smith, “An approach to graphs of linear forms
(Unpublished work style),” unpublished.

7.       S. Bhatia, P. Prakash and G.N. Pillai, SVM based Decision Support System for Heart Disease Classification with Integer-coded Genetic Algorithm to select critical features, Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, pp.34-38, 2008.

8.       Yanwei Xing, Jie Wang and Zhihong Zhao Yonghong Gao 2007 “Combination data mining methods with new medical data to predicting outcome of Coronary Heart Disease” Convergence Information Technology, 2007. International Conference November 2007, pp 868-872.

9.       Jianxin Chen, Guangcheng Xi, Yanwei Xing, Jing Chen, and Jie Wang 2007 “Predicting Syndrome by NEI Specifications: A Comparison of Five Data Mining Algorithms in Coronary Heart Disease” Life System Modeling and Simulation Lecture Notes in Computer Science, pp 129-135

10.    Alexopoulos, E., Dounias, G.D., and Vemmos, K. (1999). “Medical diagnosis of stroke using inductive machine learning”. In Proceedings of Workshop on Machine Learning in Medical Applications, Advance Course in Artificial Intelligence-ACAI99, Chania, Greece, 20-23.

11.    C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning,vol. 20, no. 3, pp. 273–297, 1995..

12.    Sandercock, Peter; Niewada, Maciej; Czlonkowska, Anna. (2011). International Stroke Trial database (version 2),  University of Edinburgh. Department of Clinical Neurosciences.

13.    Jeena R S, Dr Sukesh Kumar A, ’Stroke Prediction using SVM’, Proceedings on International Conf. on Control, Instrumentation, Communication and Computational Technologies, (ICCICCT-2016),Tamil Nadu

123-125

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

22.

Authors:

Neha Mahakalkar, Vaishali Sahare

Paper Title:

Survey on Privacy Preserving Authentication Protocol in Cloud Computing

Abstract: Cloud computing provides facilities of shared computer processing resources and data to computers and other device on demand. System environment will develop by using three key entities trusted third party, data owner and user. The concept of shared authority based privacy preserving authentication protocol i.e., SAPA used to develop system to perform shared access in multiple user. Security and privacy issue as well as shared access authority will be achieve by using access request matching mechanism e.g. authentication, user privacy, user can only access its own data fields. The multiple users want to share data so that purpose re-encryption is used to provide high security for user private data. Universal Composability (UC) model use to prove that design of SAPA correctness. Develop a system with high security and attack free by analysing different attack related to the system. Privacy preserving data access authority sharing is attractive for multi user collaborative cloud applications

Keywords:
 authentication, security, shared access and cloud computing


References:

1.    Hong Liu, Huansheng Ning, Qingxu Xiong, Laurence T. Yang, “Shared Authority Based     Privacy-Preserving Authentication Protocol in Cloud Computing”, IEEE transactions on parallel and distributed systems, vol. 26, no. 1, january 2015.
2.    Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan,” Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE transactions on parallel and distributed systems, vol. 24, no. 6, june 2013.

3.    Mohamed Nabeel, Ning Shang, Elisa Bertino,”Privacy Preserving Policy-Based Content Sharing in Public Clouds , IEEE transactions on knowledge and data engineering, vol. 25, no. 11, november 2013.                      

4.    Smitha Sundareswaran, Anna C. Squicciarini, “Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE transactions on dependable and secure computing, vol. 9, no. 4, july/august 2012.

5.    Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Comm. Magazine, vol. 50, no. 9, pp. 24-25, Sept. 2012.

6.    R. Moreno-Voz media no, R.S. Montero, and I.M. Llorente, “Key Challenges in Cloud Compute into Enable the Future Internet of Services,” IEEE Internet Computing, vol.17, no.4, pp.1825 July/Au 2013.

7.    Privacy-preserving Authentication Protocol in Cloud Computing”,10.1109/TPDS.2014.2308218, IEEE Transactions on Parallel and Distributed Systems,2015

8.    Chia-Mu Yu, Chi-Yuan Chen, and Han Chieh Chao “Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency”, IEEE Network  March/April 2015.

126-127

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

23.

Authors:

Jerrin Thomas Panachakel

Paper Title:

Automatic Eigen Face Method

Abstract: Muzzle print recognition is the process of  finding any muzzle in the image. It is a two-dimension procedure used for detecting muzzles and analyzing the information contained in the muzzle image. Here the muzzle images are projected to a feature space or face space to encode the variation between the known muzzle images. In this paper Principal Component Analysis (PCA) is used for dimension reduction and the projected feature space is formed using fuzzy algorithm. The above method can be used to recognize a new muzzle in unsupervised manner.

Keywords:
 Muzzle Print, Principal Component Analysis (PCA), Membership Function.


References:

1. Brendan Barry, Ursula Gonzales Barron, Kevin McDonnell, Shane Ward “The use of muzzle pattern for biometric Identification of cattle”,  Biosystems  Engineering, University College Dublin, Earlsfort Terrace,  Dublin 2,  Ireland, 2002
2. J. Marchant, “Secure Animal Identification and Source Verification”, J M Communications  2002, UK
3. Kimura A, Itaya K, “Structural Pattern Recognition of Biological Textures with Growing Deformations:A case of Cattles Muzzle prints”, Electronics and Communications in Japan, part 2, 87(5):54-65, 2004.
4. Turk M, and Pentland A, “Eigenfaces for recognition” Cognitive Neuro Science, 2(1):71-86, 1991.
5. Wahab, S. H. Chin, E. C. Tan, “Novel approach to automated fingerprint recognition”, IEE Trans. Image Signal Process, Vol. 145, No. 3, June 1998.

128-130

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

24.

Authors:

Komati Sathish

Paper Title:

A Study on Check Pointing Protocols for Mobile Distributed Systems

Abstract: A large number of distributed checkpointing protocols have appeared in the literature.a distributed checkpointing protocol could be the best in a specific environment, but not in another environment.Distributed snapshots are an important building block for distributed systems and are useful for constructing checkpointing protocols among other users. Communication-Induced Checkpointing protocols are classified into two categories in the literature: Index-based and Model-based.Recently, more attention has been paid to providing checkpointing protocols for mobile systems. check point is defined as a designated place in a program at which normal processing is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. This paper surveys the protocols which have been appeared in the literature for checkpointing in mobile distributed systems.

Keywords:
Checkpoint/restart, checkpointing protocols, Distributed systems, rollback recovery, fault tolerant computing


References:

1.       Ch.D.V.Subba Rao and  MM Naidu :  A  new efficient coordinated checkpointing protocol combined with selective sender based message logging , IEEE,2008.
2.       Acharya and B.R.Badrinath, checkpointing distributed Applications on Mobil computers,proc.3rd Int’l conf.parallel and distributed Information systems, sept.1994.

3.       R.Prakash and M.Singhal, “Low-cost checkpointing and failure recovery in mobile computing systems,” IEEE Trans.parallel and  distributed systems pp.1035-1048,oct 1996

4.       Lalit kumar  p.kumar “A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach” Int.Journal of information and computer society 2007.

5.       G.H.Forman and J.Zahorjan, The changes of Mobile computing ,computer pp 38-47,Apr-1994

6.       Ms.Pooja Sharma and Dr.Ajay khuntala ” A survey of checkpointing Algorithm in Mobile Ad Hoc Network”Globl Journal of Computer Science and Technolgy 2012.

7.       Sarmistha Neogy,Anupam siha,pradip k Das ,CCMUL: A Checkpoinying protocol for  distributed system processes,IEEE,2004.

8.       B.bhargava,S.R.Lian “Independent checkpointing and concurrent rollback for recovery in distributed systems-An Optimistic approach”. proc 7th IEEE Symp.Rliable Distributed syst. pp 3-12 1988 oct.

9.       L. Alvisi, E.N. Elnozahy, S. Rao, S. A. Husain and A. Del Mel. “An analysis of communication-induced checkpointing.” In Proceedings of the Twenty Ninth International Symposium on Fault-Tolerant Computing, Jun. 1999.

10.    D.B. Johnson. “Distributed system fault tolerance using message logging and checkpointing.” Rice University, Dec. 1989.

11.    S. Mishra and D. Wang. Choosing an Appropriate Checkpointing and Rollback Recovery Algorithm for LongRunning Parallel and Distributed Applications. In 11th ISCA International Conference on Computers and their Applications, San Francisco, CA, March 1996

12.    J. S. Plank and M. G. Thomason. Processor allocation and checkpoint interval selection in cluster computing systems. Journal of Parallel and Distributed Computing, 61(11):1570–1590, November 2001.

13.    K. S. Trivedi. Probability and Statistics with Reliablity, Queuing, and Computer Scince Applications. Prentice-Hall, USA, 1982.

14.    Nitin Vaidya. On Checkpoint Latency. In Pacific Rim International Symposium on Fault-Tolerant Systems, Newport Beach, December 1995.

15.    Nitin H. Vaidya. Another Two-Level Failure Recovery Scheme: Performance Impact of Checkpoint Placement and Checkpoint Latency. Technical Report TR94-068, Deprt. of Computer Science, Texas A&M University, 1994.

16.    Y. M. Wang. Consistent Global Checkpoints that Contain a Given Set ofCheckpoints. IEEETransactions on Computers, 42(4):456–486, April 1997.

17.    Ziv and J. Bruck. Analysis of Checkpointing Schemes for Multiprocessor Systems. In Proceeding ofthe 13th Symposium on Reliable Distributed Systems, pages 52–61, 1994.

18.    Ziv and J. Bruck. Efficient checkpointing over local area network. In IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, June 1994.

131-134

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

25.

Authors:

Babak Mehravaran, Hossein Ansari, Ali Asghar Beheshti

Paper Title:

Nozzle Filter Modification for Water Pre-Treatment Technology In Water Treatment Plants (Case Study: Toroq Water Treatment Plant)

Abstract: Nozzle filtration can be considered as a major pre-treatment process for water and waste water, since they efficiency separate fine solids particles over prolonged periods without addition of chemicals. Proper nozzle performance can reduce operating costs, reduce maintenance costs, and improve cleaning quality. this review article summarized and evaluates modification to nozzle filtration technology .achieved results in this study shows that nozzle filtration may be considered as efficient pre-treatment process incase surface water is used as water supply. With pass of muddy water sample due to current rainfall in stilling basin of Toroq water treatment plant from nozzle filters in laboratory pilot, Turbidity Removal efficiency and also Suspended solids equal 9.6% and 86% respectively was obtained .And the results of Additional tests represent that Turbidity Removal and also solid suspensions efficiency by nozzle filters due to algae making inlet water to Toroq water treatment plant in warm seasons is 4/6% and 47% respectively The obtained results of the study indicate that use nozzle filters caused Increase the efficiency of the process water treatment, and it is prevents from emergency exits the Toroq water treatment plant.

Keywords:
 Nozzle filter, Muddy water, Algae water, Suspended solids, turbidity.


References:

1.       Herron. A. Hope, & Dabelko, Geoffrey,  (2006),“ Introduction:   Water Stories”, Water Stories: Expanding Opportunities in Small-Scale Water and Sanitation Projects, pp 1-8, Woodrow Wilson  International Center for Scholars
2.       P .SanjivKanade, S. Someshwar, Bhattacharya ,(2016),Chapter 1- Introduction to Water World A Guide to Filtration with String Wound Cartridges, 2016, Pages       1-10,

3.       Q . Shen, J. Zhu, L .Cheng, J. Zhang, Z. Zhang, X. Xu,(2011), Enhanced algae removal by drinking   water   treatment of chlorination coupled with   coagulation,   Desalination, Volume 271, Issues 1–3, 15 April 2011, Pages 236-240

4.       R. Srinivasan, G. A. Sorial ,(2011),Treatment of tast  and  odor causing compounds 2-methyl isoborneol and geosmin in drinking water: A critical review, Journal of  Environmental Sciences, Volume 23, Issue 1, January    2011, Pages 1-13

5.       A.J. Englande Jr., P. Krenkel, J. Shamas, Reference Module in Earth Systems and Environmental Sciences,

6.       T. Sparks, (2012), filter Design, Pages 81-124

7.       K.Sutherland,(2008), Types of Filter, Filters and Filtration Handbook (Fifth Edition), 2008, Pages 97-207

8.       T. Sparks, G. Chase,(2016),Filters and Filtration  Handbook (Sixth Edition), 2016, Pages 55-115

9.       Department of the Environment, (1990), Cryptosporidium in Water Supplies: Report of the Group of Experts. Chairman: Sir John Badenoch. HMSO, London.

10.    Department of the Environment (1994) Proceedings of Workshop on Cryptosporidium in Water Supplies. Edited by A. Dawson  and A Lloyd. HMSO, London.

11.    Smethurst, George (1990) Basic Water Treatment.   Second Edition, Thomas Telford Ltd.,  London .

12.    American Water works Association. Water Quality and Treatment A Handbook of Community Water Supplies, Fourth Edition .  A .W.W.A., 6666 W. Quincy Ave., Denver, CO 80235.

13.    C .Twort, Law, F. M., Crowley, F. W., and  Ratanayaka , D.D., (1994), Water Supply. 4th Edition. Edward Arnold, London.

14.    European Communities (Quality of Water Intended for  Human Consumption ) Regulations 1988. (S. I. No 84 of 1988) Stationary Office, Dublin.

15.    Code of Practice for the Safety, Health and Welfare at Work (Chemical Agents) Regulations, 1994, (S.I. No. 445 of 1994). Stationery Office, Dublin

16.    Peavey, Howard, Rowe, Donald and Tchobanoglous (1986) Environmental Engineering Mc Graw – Hill, New York.

17.    Flanagan, P.J., (1992) Parameters of Water Quality  –Interpretation and Standards. Second Edition.  Environmental Research Unit, Dublin.

18.    Engineering School, UCD (1972). Course   Notes – Water Quality Management. Department of Civil Engineering, University College, Dublin.

19.    Safety, Health and Welfare at Work Act, 1989 (No. 7 of 1989). Stationery Office, Dublin.

20.    US EPA (1994) Water Treatment Plant Operation Volume 1: A Field Study Training Program. Third  Edition

21.    Supplies. Fourth  Edition. A. W.W.A., 6666 W. Quincy Ave., Denver, CO 80235. Edward Arnold, London.

22.    Department of the Environment (1990). Cryptosporidium   in Water Supplies: Report of   the   Group of Experts. Chairman: Sir John Badenoch. HMSO, London.

23.    T.Pujol, G. Arbat, J. Bove, J. Puig-Bargues, M. Duran-Ros, J. Velayos, F. Ramírez de Cartagena ,(2016), Effects of the underdrain design on the  pressure drop in sand filters,Biosystems Engineering, Volume  150,Pages 1-9

24.    M. Boller (1993), Filter mechanisms in rousing filters;j  water Supply Res. Technol. Aqua. 42(3): 174-85.

25.    M. Wegelin. (1996). Surface water treatment. A design,  construction and operation manual, Swiss Federal Institute for environmental science and Technology (EAWAG) and department water and Sanitation in developing countries (SANDEC)

135-140

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Yao-Wen Tsai, Cong-Trang Nguyen

Paper Title:

Finite Time Sliding Mode Controller based on Reduced-Order Observer for the Mismatched Uncertain Systems with a Time Delay

Abstract:  This paper presents the design of the finite time sliding mode controller based on reduced order observer for time-delay systems with mismatched uncertainties. The main achievements of work are: (1) a suitable reduced order observer (ROO) is constructed to estimate the unmeasurable state variables, (2) a finite time sliding mode controller (FTSMC) is designed by employing the estimated variables, and (3) by the application of the Lyapunov stability theory and the linear matrix inequality (LMI) technique, the stability of the overall closed-loop mismatched uncertain systems with a time delay is guaranteed in sliding mode under sufficient condition. Finally, the design procedure is given to summarize the proposed method.

Keywords:
Variable Structure Control (VSC), reduced- order observer (ROO), finite-time convergence, mismatched uncertainty, time-varying delay.


References:

1.        J . Y. Hung, W. Gao, and J. C. Hung, “Variable structure control: A survey,” IEEE Trans. on Indus. Electro., vol. 40, 1993, pp. 2–22.
2.        S. H. Zak, Systems and Control, New York: Oxford Univ. Press, 2003.

3.        Z. He, X. Wang, Z. Gao, and J. Bai, “Sliding mode control based on observer for a class of state-delayed switched systems with uncertain perturbation,” Mathematical Problems in Engineering, vol. 2013, Article ID 614878, 2013, 9 pages.

4.        S.-H. Tsai, and Y.-H. Chang,“Sliding Mode Control for A Class of Uncertain Time-Delay System,”Ap. Mathematics and Infor. Sci., 2015, pp. 267-273.

5.        H. Li, P. Shi, D. Yao, and L. Wu, “Observer-based adaptive sliding mode control for nonlinear Markovian jump systems,” Automatica, vol. 64, Feb. 2016, pp. 133–142.

6.        Z. Liu, L. Zhao, Y. Kao, and C. Gao, “Robust passive control for a class of uncertain neutral systems based on sliding mode observer,” ISA Transactions, http://dx.doi.org/10.1016/j.isatra.2016.10.013, 2016.

7.        Boulaabi, A. Sellami, and F.B. Hmida, “A robust sensor fault reconstruction based on a new sliding mode observer design method for uncertain delayed systems: A satellite system application,” J. of Con. Engineering and Ap. Informatics, vol. 17, 2015, pp. 88–97.

8.        C.T. Chen and S. T. Peng, “A sliding mode control scheme for non-minimum phase non-linear uncertain input-delay chemical processes,” J. of Process Control, vol. 16, 2006, pp. 37–51.

9.        Rezoug, B. Tondu, M. Hamerlain, and M. Tadjine, “RBFNN-HOMS Non-singular Terminal Sliding Control of n-DOF Robotic Manipulator,” J. of Control Engineering and Ap. Infor., vol. 18, 2016, pp. 52–62.

10.     S. C. Garcia, M. C. M. Teixeira, J. P. F. Garcia, U. N. L. T. Alves, and J. M. S. Ribeiro, “Discrete-Time Sliding Mode Control for Uncertain Networked System Subject to Time Delay,” Mathematical Problems in Engineering, vol. 2015, Article ID 195120, 2015, 10 pages.

11.     Q. Zhang, “Adaptive observers for multiple–input–multiple–output (MIMO) linear time-varying systems,” IEEE Trans. Autom. Control, vol. 47, Mar. 2002, pp. 525–529.

12.     J. Koshkouei, K. J. Burnham,“Discontinuous Observers for Nonlinear Time-Delay Systems,”Int. J. Systems Science, vol. 40, 2009.

13.     F. J. Bejarano and A. Pisano, “Switched observers for switched linear systems with unknown inputs,” IEEE Trans. Automat. Control, vol. 56, Mar. 2011, pp. 681–686.

14.     F. Zhu, “State estimation and unknown input reconstruction via both reduced-order and high-order sliding mode observers,” J. Process Control, vol. 22, 2012, pp. 296-302.

15.     L. Wu and J. Lam, “Sliding mode control of switched hybrid systems with time-varying delay,” Int. J. Adapt. Control Signal Process., vol. 22, 2008, pp. 909–931.

16.     J. Lian, J. Zhao, and G. M. Dimirovski, “Robust H∞ sliding mode control for a class of uncertain switched delay systems,” Int. J. Syst. Sci., vol. 40, 2009, pp. 855–866.

17.     M. Pai,“Observer-based adaptive sliding mode control for nonlinear uncertain state-delayed systems,”International J. of Control, Auto., and Sys., vol. 7, 2009, pp.
536-544.

18.     L. Liu, Z. Han, and W. Li, “H∞ non-fragile observer-based sliding mode control for uncertain time-delay systems,” J. Franklin Inst., vol. 347, 2010, pp. 567–576.

19.     S. Boyd, L. El. Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in Systems and Control Theory, Philadelphia, PA: SIAM, 1994.

20.     P. Gahinet, A. Nemirovskii, A. J. Laub, and M. Chilali, LMI Control Toolbox, Natick, MA: The MathWorks, Inc, 1994.

21.     Y. W. Tsai and V. V. Huynh, “Output Feedback and Single-Phase Sliding Mode Control for Complex Interconnected Systems,” Mathematical Problems in Engineering, vol. 2013, Article ID 946385, 2015, 16 pages.

22.     S. Sayyaddelshad and T. Gustafsson, “H∞ observer design for uncertain nonlinear discrete-time systems with time-delay: LMI optimization approach,” Inter. J. of Robust and Nonlinear Control, vol. 25, 2015, pp. 1514–1527.

23.     O. M. E. El-Ghezawi, A. S. I. Zinober, and S. A. Billings, “Analysis and design of variable structure systems using a geometric approach,” International J. of Control, vol 38, 1983, pp. 657-671.

24.     S. H. Zak and S. Hui, “On variable structure output feedback controllers,” IEEE Trans. Autom. Control, vol. 38, 1993, pp. 1509–1512.

25.     K. Gu, V. L. Kharitonov, and J. Chen, Stability of Time-delay Systems, Birkh¨auser: Boston, 2003.

26.     X. G. Yan, S. K. Spurgeon, and C. Edwards, “Static output feedback sliding mode control for time-varying delay systems with time-delayed nonlinear disturbances,” Inter. J. Robust Nonlinear Control, vol. 20, 2010, pp. 777–788.

141-148

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Krishna Samalla

Paper Title:

A Novel Algorithm for Multiple Data Sharing Via Cloud Storage

Abstract:   As the way that computing concepts gives the cloud computing, which permits once needed and low maintenance usage of resources, but the information is shares to some cloud servers and numerous privacy connected considerations emerge from it .Various schemes like primary based on the attribute based encoding are developed to secure the cloud storage. Most of the work looking at the information privacy and therefore the access management, while less attention is given to the privilege management and the privacy. An economical scientific discipline approach for information sharing wherever information is shared among a bunch of users as information. How to firmly and with efficiency share a group of information associated with any subject areas with others in cloud storage. Development of new novel concept of Key Aggregate Searchable cryptography (KASE). This concept is enforced through development of a concrete key-aggregate searchable cryptography framework theme. This scheme is delineate as wherever knowledge an information owner solely has to generate and distribute one mixture key to a data user for sharing an outsized variety of documents and on the opposite aspect user solely has to submit one mixture trapdoor to the cloud server, so that he/she will question over the shared documents by the assistance of generated single mixture trapdoor. Advanced Key sharing system based on hint text methodology is created to share the information safely. Once the data sharing is completed then the key combination differs from its actual kind. So the user cannot guess the key combination cryptosystem and this method provides economical answer than the prevailing ones.

Keywords:
 Data Security, Cloud, Integrity, Bulk Request, Bulk Response, Dynamic Keys.


References:

1.       Cloud-Storage,http://www.thetop10bestonlinebackup.com/cloudstorage.
2.       Amazon Web Services (AWS), http://aws.amazon.com.

3.       Google App Enginehttp://code.google.com/appengine/.

4.       S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010..

5.       X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure multi-owner data sharing for dynamic groups in the cloud”, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191.

6.       C. Chu, S. Chow, W. Tzeng, et al. “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468- 477.

7.       X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000.

8.       R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. “Searchable symmetric encryption: improved definitions and efficient constructions”, In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79- 88, 2006.

9.       P. Van,S. Sedghi, JM. Doumen. “Computationally efficient searchable symmetric encryption”, Secure Data Management, pp. 87-100, 2010.

10.    S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric encryption”, Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965-976, 2012.

11.    D. Boneh, C. G, R. Ostrovsky, G. Persiano. “Public Key Encryption with Keyword Search”, EUROCRYPT 2004, pp. 506C522, 2004.

12.    Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System”, In: Pairing-Based Cryptography C Pairing 2007, LNCS, pp. 2-22, 2007.

13.    J. Li, Q. Wang, C. Wang. “Fuzzy keyword search over encrypt-ed data in cloud computing”, Proc. IEEE INFOCOM, pp. 1-5, 2010.

14.    C. Bosch, R. Brinkma, P. Hartel. “Conjunctive wildcard search over encrypted data”, Secure Data Management. LNCS, pp. 114-127, 2011

15.    C. Dong, G. Russello, N. Dulay. “Shared and searchable encrypted data for untrusted servers”, Journal of Computer Security, pp. 367-397, 2011.

16.    F. Zhao, T. Nishide, K. Sakurai. “Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control”. Information Security and Cryptology, LNCS, pp. 406-418, 2012.

17.    J. W. Li, J. Li, X. F. Chen, et al. “Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud”, In: Network and System Security 2012, LNCS, pp. 490-502, 2012.

18.    J. Li, K. Kim. “Hidden attribute-based signatures without anonymity revocation”, Information Sciences, 180(9): 1681- 1689, Elsevier, 2010.

19.    X.F. Chen, J. Li, X.Y. Huang, J.W. Li, Y. Xiang. “Secure Outsourced Attribute-based Signatures”, IEEE Trans. on Parallel and Distributed Systems,
DOI.ieeecomputersociety.org/10.1109/TPDS.2013.180, 2013.

20.    J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014. [22] Z. Liu, Z. Wang, X. Cheng, et al. “Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud”, Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249- 255, 2013.

21.    C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 525-533, 2010.

22.    B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud”, Proc. 10th Intl Conf. Applied Cryptography and Network Security, pp. 507-525, 2012.

23.    D. Boneh, C. Gentry, B. Waters. “Collusion resistant broadcast encryption with short ciphertexts and private keys”, Advances in Cryptology CCRYPTO 2005, pp. 258-275, 2005.

149-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Ahmed Shany Khusheef, Abdulkareem Shaheed Sabr

Paper Title:

Investigation of Converting a Building to Operate by Solar Energy

Abstract: Many governments recognize the advantages of generating the electricity from solar energy and therefore, they offer generous incentives and cash rebates to install photovoltaic (PV) systems. Despite Iraq that is, as result of the electric shortages, 90% of its households are dependent on diesel generators that are controlled by independent operators, solar energy has not been widely utilized. This paper provides the fundamental information about design and constructing of PV system.  It is also presenting a cost analysis of PV system that delivers about   per day. It is found that the solar energy price (0.1368$/kWh) is almost matching the actual cost of fuel-based electrical generation (0.13$/kWh [1]). Therefore, the PV systems can be competitive with the diesel power generators that are used by Iraqis if a source of funding is offered to offset the enormous up-front (initial) cost of PV systems.

Keywords:
PV system, Cost analysis, Levelized cost of electricity (LCOE), Electric demand.


References:

1.       Iraq Ministry of Electricity, electricity prices, 2015.
2.       P. Sudeepika and G. M. Gayaz Khan, “Analysis of mathematical model of PV cell codule in Matlab/Simulink environment,” International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 3, No. 3 pp. 7323-7827, 2014.  

3.       W. A. El-Basit, A. M. A. El–Maksood and F. A. E. S. Soliman, “Mathematical model for photovoltaic cells,” Leonardo Journal of Sciences, pp. 13-28, 2013.

4.       S. S. Mohammed, “Modeling and Simulation of Photovoltaic module using MATLAB/Simulink,” International Journal of Chemical and Environmental Engineering, Vol. 2, No. 5, pp. 350-355, 2011.

5.       S. Leva, D. Zaninelli, “Technical and Financial Analysis for Hybrid Photovoltaic Power Generation Systems”, WSEAS Transactions on Power Systems, Vol. 5, No. 1, pp.831-838, 2006.

6.       S. Leva, D. Zaninelli and R. Contino, “Integrated renewable sources for supplying remote power systems,” WSEAS Transactions on Power Systems, Vol. 2 No. 2, pp. 41-48, 2007.

7.       J. Schaefer, “Review of photovoltaic power plant performance and economics,” IEEE Transaction of Energy Conversation, Vol. 5, pp. 232-238, June, 1990.

8.       Ecometrica, “Electricity-specific emission factors for grid electricity,”  p. 6, 2011.

9.       United Nations Development Program (UNDP), “Catalysing the use of solar photovoltaic energy,” pp. 6-7&13, 2014.

10.    Free Sun Power. (last visit 2016, January 25). www.freesunpower.com/example_systems.php

11.    V. Lombardi, “A practical guide to solar power system design for homeowners,” pp. 11,12&21, 2012.

12.    Catalogue, “Integrated power system, back-up and solar power systems,” pp. 3&4, 2015. 

13.    C. Roos, “Solar electric system design, operation and installation: an overview for builders in the Pacific Northwest,” Washington State University, Extension Energy Program, 2009.

14.    Vasudev, “The levelized cost of electricity,” Stanford University, 2011.

15.    M. Cambell, “The Drivers of the Levelized Cost of Electricity for Utility-Scale Photovoltaics,” 2008.

16.    De, “Solar power – 1 kW system energy generation study and cost calculation,” International Journal of Electrical and Electronics Engineering (IJEEE), Vol. 3, No. 4, pp. 23-30, 2014.

17.    P. Poonpun and W. T. Jewell, “Analysis of the cost per kilowatt hour to store electricity,” IEEE Transactions on Energy Conversion, Vol. 23, No. 2, pp. 529-534, 2008.

18.    D. Steward, G. Saur, M. Penev, and T. Ramsden, “Lifecycle Cost Analysis of Hydrogen Versus Other Technologies for Electrical Energy Storage,” National Renewable Energy Laboratory, Technical Report, November 2009.

154-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Poonam Rajput, Prateek Wankhade

Paper Title:

A Review Paper on Microstrip Patch Antenna Used in Wlan Systems

Abstract:  A compact microstrip patch antenna became a very useful in communication systems. Properties like compactness, light weight, high bandwidth make it a good candidate of communication system. This paper reviews the performance analysis of Compact Dual-Band Microstrip Antenna for IEEE 802.11a WLAN Application (2014), comparative analysis of s-shaped Multiband microstrip patch Antenna (2013), Dual-Band Antenna with Compact Radiator for 2.4/5.2/5.8 GHz WLAN Applications (2012), A Slot-Monopole Antenna for Dual-Band WLAN Applications (2011) and Compact Broadband Slotted Rectangular Microstrip Antenna (2009). The paper also discusses the technology used in order to bring the required changes in terms of improved performance characteristics.

Keywords:
 WLAN (Wireless local area network), Dual band, Transmission line, Microstrip antenna, Monopole antenna, Dual band antenna, RMSA, Water Patch, L-probe.


References:

1.    Keisuke Noguchi et al. “Design of Wideband/Dual-Band E-Shaped Patch Antennas With the Transmission Line Mode Theory” IEEE Transactions on Antennas and Propogation, Vol. 64, Issue. 4, pp: 1183 – 1192, April 2016.
2.    Yujian li and Kwai-man luk “A Water Dense Dielectric Patch Antenna” IEEE Access, Vol. 3, pp: 274-280, 2015.

3.    Xiao Lei Sun et al. “Dual-Band Antenna with Compact Radiator for 2.4/5.2/5.8 GHz WLAN Applications” IEEE Antennas and Wireless Propogation, Vol. 60, issue 12, December 2012.

4.    Chih-Yu Huang and En-Zo Yu “A Slot-Monopole Antenna for Dual-Band WLAN Applications” IEEE Antennas and Wireless Propogation Letters, Vol. 10, 2011.

5.    Amit A. Deshmukh and K.P.Ray “Compact Broadband Slotted Rectangular Microstrip Antenna” IEEE Antennas and Wireless Propogation Letters, Vol.8, 2009.

6.    M. Ali et al. “Wide-Band/Dual-Band Packaged Antenna for 5–6 GHz WLAN Application” IEEE Antennas and Wireless Propogation, Vol. 52, Issue 2, February 2004.

159-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Ibrahim F. Shaker, Tamer F. Fath-Allah, Mohamed M. El-Habiby, Ahmed E. Ragheb, Alaa Al-Din I. Awad

Paper Title:

Increasing PPP Accuracy using Permanent Stations Corrections

Abstract:   One of the main current problems facing Global Positioning System (GPS) is to get the positions with high accuracy and low cost, effort and time. Two techniques are used in GPS positioning, which are the relative and point positioning. In common, the first technique provides the higher accuracy, but with higher cost and effort. Another kind of point positioning is the Precise Point Positioning (PPP) which counts on GNSS precise products. It is adequate for many applications that requires the decimeter level accuracy using one receiver, but requires scientific software or online services for data processing. The main challenge here is to raise the accuracy of PPP to add other applications suited to the gained accuracy. The main objective of the current study is to test different mathematical models producing positional corrections to select the best set depending on synchronized data and validate the selected model in synchronized and non-synchronized cases depending on data of two different campaigns. These corrections -produced from permanent stations- are added to the static PPP coordinates of the tested points near the permanent stations to reach the highest possible accuracy depending on GPS single frequency observations using a scientific package. The obtained results offered a synchronized average positional error reaching to 0.074m and RMSE of 0.023m in the first campaign and 0.146m with RMSE of 0.061m in the second campaign. It reaches 0.156m with RMSE of 0.074m in the best non-synchronized case. The user can raise the accuracy of single frequency static PPP when the data of four synchronized permanent stations are available in the same observational time or within 4 days before or after the observational time.

Keywords:
GPS, Non-synchronized, Precise Point Positioning (PPP), Single frequency, Synchronized.


References:

1.       T. F. Fath-Allah, “A New Approach for Cycle Slips Repairing Using  GPS Single Frequency Data”.  World Applied Science Journal 8 (3): 315-325, 2010.
2.       F. Ragab and T. F. Fath-Allah, “Towards The Improvement of 2D Coordinates Transformation Techniques between UTM and ETM”.  Royal Statistical Society Conference, Edinburgh, United Kingdom, 2009.

3.       M. El-Tokhey, A. H. Abd-Elrahman, T. F. Fath-Allah and A. I. Awad, “Preliminarily Evaluation of Baseline Relative Accuracies Using L1 Frequency Observations of Navigation-Grade GARMIN Receivers”. Journal of Surveying Engineering, Vol. 137, No. 1, February 2011.

4.       H. Wellenhof, H. Lichtenegger and J. Collins, “Global Positioning System Theory and Practice 5th edition”. Springer, Verlag, New York, USA, 2001.

5.       El-Rabbany, “Introduction to Global Positioning System (GPS)”. ArtechHousemobile communication series, Boston, London, 2002.

6.       Q. Le and C. Tiberius, “Single-frequency precise point positioning with optimal filtering”. GPS Solut (2007) 11: 61–69, DOI 10.1007/s10291-006-0033-9, Springer-Verlag, 2006.

7.       F. Shaker, T. F. Fath-Allah, M. M. El-habiby, A. E. Ragheb and A. I. Awad, “Enhancement of Precise Point Positioning Using GPS Single Frequency Data”. International Journal of Scientific & Engineering Research (IJSER), Volume 7, Issue 12, ISSN: 2229-5518, 642-650, 2016.

8.       El-Mowafy, “Decimeter Level Mapping Using Differential Phase Measurements of GPS Handheld Receivers”. The Survey Review, UK, Vol. 38, No. 295, pp. 47-57, 2005.

9.       T. F. Fath-Allah, “Quality Assessment of GPS Smoothed Codes for Different Smoothing Window Sizes and Times”. International Journal of Engineering Research & Technology (IJERT), Volume 4, Issue 5, ISSN: 2278-0181, 2015.

10.    Abdel Mageed “Assessment of the Accuracy of Processing GPS Static Baselines Up To 40 Km Using Single and Dual Frequency GPS Receivers”. International Journal of Modern Engineering Research (IJMER), Vol. 4, Iss. 1, ISSN: 2249–6645, 2014.

11.    F. Zumberge, M. B. Heflin, D. C. Jefferson, M. M Watkins, F. H. Webb “Precise Point Positioning for The Efficient and Robust Analysis of GPS Data from Large Networks”. J. Geophys. Res.  (B3), 5005–5017 (1997).

12.    Dawidowicz and G. Krzan “Coordinate estimation accuracy of static precise point positioning using on-line PPP service, a case study”. Acta Geod Geophys (2014) 49:37–55 DOI 10.1007/s40328-013-0038-0

13.    Q. Guo, “Precision Comparison and Analysis of Four Online Free PPP Services in Static Positioning and Tropospheric Delay Estimation”. Springer-Verlag Berlin Heidelberg, 2014.

163-169

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

M. Jeba Jeeva Rani, G. Allen Gnana Raj

Paper Title:

Synthesis, Characterization and Photocatalytic Activity of Amino Acid Doped Metal Free g-C3N4 Composite Photocatalyst

Abstract: The g-C3N4-Amino acid (CNA-g-C3N4) composite photocatalyst was synthesized by simple co-polymerization process. The photocatalyst was characterized by X-ray diffraction (XRD), Scanning election microscopy (SEM) with EDAX and FT-IR analysis. Rhodamine-B (Rh-B) dye solution under visible light irradiation was used to determine the photocatalytic activity. The photocatalytic activity of CNA-g-C3N4 composite posses long term stability and visible light activity than bare g-C3N4.

Keywords:
 Amino acid, composite, metal free, g-C3N4, melamine


References:

1.       Fujishima and K. Honda, Nature, (1972),238,37.
2.       N.F. Steven and A.J. Brad, J.Am. Chem. Soc., (1977), 99, 303.

3.       B.Cao and W. Cai, J. Phys. Chem. C., (2007), 112, 680.

4.       X.C. Wang, K. Maeda, A. Thomas, K. Takanabe, G. Xin, J.M. Carlsson, K. Domen and M.Antoietti, Nat. Mater., (2009), 25, 10397.

5.       S.C. Yan, Z.S.Li and Z.G Zou, Lamgnuir, (2009), 25, 10397.

6.       E.O. Frank, Chem. Mater., (2008), 20, 35.

7.       Y.Guo, S. Chu, S.C. Yan, Y. Wang and Z.G. Zou, Chem, Commum., (2010), 46, 7325.

8.       Y.J. Zhang, T. Mori, J.H. Ye and M.Antoni etti, J. Am. Chem.Soc., (2010), 132, 6294.

9.       H.J. Yan and H. X. Yang, J. Alloys Compd.,  (2011), 509, 126.

10.    H. Harada, T. Ueda, T. Sankata, J. Phys.Chem., (1989), 93, 1542.

11.    ESKIZEYBEK, F. SARI, H. GULCE, A. GLUCE, A. AVEI, APPL. CATA., B: ENVIRON, (2012), 119-197.

12.    Q.J. Xiang, J.G. Yu and Z.G. Zou, Dalton Trans.,( 2010), 39, 1488.

13.    M.Zhang, J. Xu, R. Zong, Y. Zhu, Appl. Catat. B: Environ., (2014)

170-175

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Sumaira M.Hayat Khan, Ayyaz Hussain, Imad Fakhri Taha Alshaikhli

Paper Title:

An Adequate Image Retrieval Technique Based on Global Level Feature Extraction

Abstract: Efficient and effective methods are required for the retrieval of relevant data from data stores. The two main approaches for retrieving a required image from a database are known as the local approach and the global approach. This paper presents the technique based on global approach of image feature extraction and comparison. Image features are calculated by taking into account image as a whole. All the three rudimentary image features like; color, texture and shape are utilized in the process of feature vector calculation. Besides these basic image features, Edge Histogram and Fourier Descriptors are also computed to extract edge information and shapes of the objects in the image respectively. Similarity between two images is determined by calculating Euclidean distance between their feature vectors. The experiments in this study were performed on natural images of diverse semantics from a Corel image database, and showed obvious improvement in results compared to several noble systems in the literature.

Keywords:
Content Based Image Retrieval, Feature Extraction, Feature Vector, Similarity Measure, Fourier descriptor, Edge Histogram Descriptor.


References:

1.       Y. Rui, T.S. Huang, S.F. Chang, “Image retrieval: current techniques, promising directions and open issues”, J. Visual Communication, Image Representation 1999.
2.       A.W.M. Smeulders, M. Worring, et al., “Content-based image retrieval at the end of the years”, IEEE TPAMI 2000.

3.       I.K. Sethi, I.L. Coman, “Mining association rules between low-level image features and high-level concepts”, Proceedings of the SPIE Data Mining and Knowledge Discovery, vol. III, (279–290) 2001.

4.       H. Armitage and P. G. Enser, “Analysis of user need in image archives,” Journal of Information Science, vol 23, no. 4, pp. 287–299, Apr. 1997.

5.       R.S. Torres, A.X. Falco, “Content-based image retrieval, theory and applications, Rev”. April, 2006.

6.       Fallouts, R. Barberet al., “Efficient and effective querying by image content”. Journal of Intelligent Information Systems, July 1994.

7.       Pentland, R. Picard, and S. Sclaro. Photo book, “Content-based manipulation of image databases”, International Journal of Computer Vision, 1996.

8.       Carson, S. Belongie etal, “Image segmentation using expectation maximization and its application to image querying”, IEEE Transaction on Pattern Analysis and Machine Intelligence, August. 2002.

9.       M. Squire, W. Mulleretal, “Content-based query of image databases, inspirations from text retrieval: Inverted les, frequency-based weights and relevance feedback”, In Scandinavian Conference on Image Analysis, June 1999.

10.    A.W.M. Smeulders, M. Worring, et al., “Content-based image retrieval at the end of the early years”, IEEE Trans. Pattern Anal. Mach. Intel, 2000.

11.    W.Y. Ma, B.S. Manjunath, “NeTra: a toolbox for navigating large image databases”, Multimedia Systems 7 (184–198) 1999.

12.    R. S. Choras, “Image Feature Extraction Techniques and Their Applications for CBIR and Biometrics Systems,” International Journal of Biology and Biomedical Engineering, vol. 1, no. 1, 2007.

13.    H.A, Jalab, “Image retrieval system based on color layout descriptor and Gabor filters”, IEEE Conference on Open Systems,  25-28 Sept. 2011, pp. 32 – 36.

14.    G. Zhang et al., “Shape feature extraction using fourier descriptors with brightness in content-based medical image retrieval,” in IEEE Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2008, pp. 71 – 74.

15.    H. Kauppinen et al., “An experimental comparison of autoregressive and Fourier based descriptors in 2D shape classification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 201–207, 1995.

16.    D. S. Zhang and G. Lu, “Evaluation of MPEG-7 shape descriptors against other shape descriptors,” Multimedia Systems, vol. 9, no. 1, pp. 15–30, 2003.

17.    J. Canny, “A computational approach to edge detection,” IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 679–698, 1986.

18.    Pentland et al., “Photobook: Content-based manipulation of image databases,” International Journal of Computer Vision, vol. 18, no. 3, pp. 233-254, 1996.

19.    S. Nandagopalan et al., “A universal model for content based image retrieval,” International Journal of Computer Science, vol. 4, no. 4, pp. 242, 2009.

20.    S. Soman et al., “Content Based Image Retrieval Using Advanced Color and Texture Features”, International Journal of Computer Applications, 2012.

21.    C.M.Pun and C.F.Wong, “Fast and robust color feature extraction for content based  image  retrieval”, Internation journal of advancments in computing technolog, vol 3, no 6, July 2011.

22.    M.A.Helala, “A content based image retrieval approach based on principal region detection”, IJCSI, International journal of computer science issues, vol 9, issue 4, no 1, July 2012

23.    X. Qi and Y. Han, “A novel fusion approach to content-based image retrieval,” Pattern Recognition, vol. 38 pp. 2449–2465, 2005.

24.    Y. Chen and J. Wang, “A region-based fuzzy feature matching approach to content-based image retrieval,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 24, no. 9, pp. 1252–1267, 2002.

25.    J. Li et al., “SIMPLIcity: semantics sensitive integrated matching for picture libraries,” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol. 23, pp. 947 – 963, 2001.

26.    B. S. Manjunath et al., Introduction to MPEG-7 multimedia content description interface. New York: Wiley, 2002.

27.    M. Swain and D. Ballard, “Color indexing,” International Journal of Computer Vision, vol. 7, no. 1, pp. 11–32, 1991.

176-185

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Deshmukh Bhakti S., Gharte Sneha H., Nagare Shruti R., H. R. Deshmane

Paper Title:

Agriculrtural Robot for Plant Health Indication

Abstract:  It is difficult task for producing agricultural products, various micro-organisms, pests and bacterial diseases attack on plants. These diseases can occur through the leaves, steams or fruit inspection. This paper covers technique of image processing for early detection of plant disease through feature extraction of leaf and preprocessing of image from RGB (YCbCr) to different color space conversion, image enhancement; segment the region of interest. Minimum distance classifier is used to compare extracted features from original image and stored database. When plant disease is detected fertilizer motor gets ON. By using Graphical User Interface symptoms and fertilizer for detected disease will displayed on computer. The robot has also watering mechanism it will water the plants according to their needs by observing temperature and LCD will display the temperature. Working of the Robot is based on Bluetooth.

Keywords:
 Plant Health, Open Agriculture, Bluetooth, Database. 


References:

1.       International Journal of Advanced Technology in Engineering and Science www.ijates.com Volume No.03, Issue No. 01, January 2015 ISSN (online): 2348 – 7550 ‘Autonomous Farming Robot with Plant Health Indication’. Prof. K.V. Fale 1, Bhure Amit P 2, Mangnale Shivkumar 3 Pandharkar Suraj R 4Professor, RSCOE, Pune, (India) 2, 3, 4 Student, RSCOE, Pune, (India)
2.       F. Argenti,L. Alparone,G. Benelli ,” Fast algorithms for texture analysis using co-occurrence matrices” Radar and Signal Processing, IEE Proceedings , vol. 137, Issue 6, pp:443-448 , No. 6, December 1990.

3.       Fang Jianjun, “Present Situation and Development of Mobile Harvesting Robot” and Transactions of the Chinese Society of Agricultural Engineering, 2004, vol. 20, no. 2,pp. 273-278.

4.       Bisgaard, M. Vinther, D., and Ostergaard, K. Z. 2004. Modelling and Fault-Tolerant Control of an Autonomous Wheeled Robot. Group Report 04gr1030a. Institute of Control Engineering, Aalborg University, Denmark.

5.       Mario M. F. and Giulio R., “Agricultural Robot for Radicchio Harvesting,”Journal of Field Robotics, 2006, vol. 23, no. 6-7, pp. 363-377.

6.       Belforte, R. Deboli, P. Gay and D. Ricauda Aimonino, “Robot Design andTesting for Greenhouse Applications,” Biosystems Engineering, 2006, vol. 95, no. 3,pp. 309-321.

7.       T. Bakker, K. van Asselt, J. Bontsema, J. Müller, and G. van Straten, “Autonomous navigation using a robot platform in a sugar beet field,” Biosyst. Eng., vol. 109, no. 4, pp. 357–368, 2011.

8.       Anand H. Kulkarni, Ashwin Patil R. K., “Applying image processing technique to detect plant diseases”, International Journal of Modern Engineering Research, vol.2, Issue.5, pp: 3661-3664, 2012.

9.       P. Revathi, M. Hemalatha, “Classification of Cotton Leaf Spot Diseases Using Image Processing Edge Detection Techniques”, IEEE International Conference on Emerging Trends in Science, Engineering and Technology, pp-169-173, Tiruchirappalli, Tamilnadu, India, 2012.

10.    Tushar H. Jaware, Ravindra D. Badgujar and Prashant G. Patil, “Crop disease detection using image segmentation”, National Conference on Advances in Communication and Computing, World Journal of Science and Technology, pp:190-194, Dhule, Maharashtra, India, 2012.

11.    Prof. Sanjay B.Dhaygude, Mr.Nitin P. Kumbhar, “Agricultural plant Leaf Disease Detection Using Image Processing”, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , S & S Publication vol. 2, Issue 1, pp: 599-602, 2013.

186-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

34.

Authors:

Dipali Wankhede, S. G. Tuppad

Paper Title:

Improvising of web Recommendation System by using K-Means and Bitap Algorithm

Abstract: Increasing the amount of information over the Internet in recent years has led to the increased risk of flooding of information which in turn has created the problem of access to relevant data users. Also with the rise in the number of websites and web pages, webmasters find it difficult to make the content according to user need. Demand for information Users can imagine evaluating web user browsing behavior. Web Usage Mining (WUM) is used to extract knowledge from access logs Web user by using Data mining techniques. One of the applications is WUM recommendation system that is customized information filtering technique used to determine whether any of a user approved a particular article or to identify a list of items that it can be of great importance to the user. In this document architecture that integrates product information with the user access to log data and then generates a set of recommendations for it is presented that particular user. The application has registered encouraging in terms of precision, recall and F1 results metrics.

Keywords:
Web Usage mining, Online Web Recommendation System, Clustering, Pattern Matching, Boyer Moore, K-Means, Recommendation.


References:

1.       Cormen, T.H., Leiserson, C.E., Rivest, R.L., Introduction to Algorithms, Chapter 34, MIT Press, 1990, pp 853-885.
2.       Knuth, D., Morris, J. H., Pratt, V., “Fast pattern matching in strings,” SIAM Journal on Computing, Vol. 6, No. 2, doi: 10.1137/0206024, 1977, pp.323–350.

3.       R.S. Boyer, J.S. Moore, “A fast string searching algorithm, “Communication of the ACM, Vol. 20, No. 10,1977, pp.762– 772.

4.       R. N. Horspool, “Practical fast searching in strings,” Software—Practice and Experience, Vol. 10, No. 3, 1980, 501–506.

5.       Sunday, D.M., “A very fast substring search algorithm,” Communications of the ACM, Vol. 33, No. 8, 1990, pp. 132- 142.

6.       Smith, P.D., “Experiments with a very fast substring search algorithm,” Software-Practice and Experience, Vol. 21, No. 10, pp.1065-1074.

7.       Crochemore, M., Czumaj, A., Gasieniec, L., Jarominek, S., Lecroq, T., Plandowski. W., Rytter, W., “Speeding up two string matching algorithms,” Algorithmica, Vol. 12, No. 4/5, 1994, pp.247-267.

8.       RVVSV Prasad, V Valli Kumari “A Categorical Review of  Recommender Systems” , International Journal of  Distributed and Parallel Systems (IJDPS) Vol.3, No.5, September 2012 Hadi Khosravi Farsani, and Mohammadali Nematbakhsh “A Semantic Recommendation Procedure for Electronic Product Catalog”, World Academy of
Science, Engineering and Technology 22 2006.

9.       Neelam Duhan, A. K. Sharma and Komal Kumar Bhatia, “Page Ranking Algorithms: A survey”, in proceedings of the IEEE International Advanced Computing Conference (IACC), 2009.

10.    Balint Domolki, An algorithm for syntactical analysis, Computational Linguistics 3, Hungarian Academy of Science pp. 29–46, 1964.

11.    R. K. Shyamasundar, Precedence parsing using Domolki’s algorithm, International Journal of Computer Mathematics, 6(2)pp 105–114, 1977.

12.    Udi Manber, Sun Wu. “Fast text searching with errors.” Technical Report TR-91-11. Department of Computer Science, University of Arizona, Tucson, June 1991.

13.    R. Baeza-Yates and G. Navarro. A faster algorithm for approximate string matching. In Dan Hirchsberg and Gene Myers, editors, Combinatorial Pattern Matching (CPM’96), LNCS 1075, pages 1–23, Irvine, CA, June 1996.

14.    G. Myers. “A fast bit-vector algorithm for approximate string matching based on dynamic programming.” Journal of the ACM 46 (3), May 1998, 395–415.

15.    Xavier Amatriain, Alejandro Jaimes, Nuria Oliver, and Josep M. Pujol, Data Mining Methods for Recommender Systems.

16.    R.Suguna, D, Sharmila, “Clustering Web log Files – A Review”, International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 4, April – 2013 ISSN: 2278-0181]

189-192

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Swagata S. Mawande, Hemlata Dakhore

Paper Title:

Review of Robust Video Watermarking Using DWT, SVD and DCT

Abstract: Due to increase in growth of internet, users of networks are increasing rapidly. Owners of the digital products are concerned about illegal copying of their products. Security and copyright protection are becoming important issues in multimedia applications and services. Digital watermarking is a technology used for copyright protection of digital media. Here ownership information data called watermark is embedded into the digital media without affecting its perceptual quality. In case of any dispute, the watermark data can be detected or extracted from the media and use as a proof of ownership. Digital video watermarking scheme based on Discrete Wavelet Transform and Singular Value Decomposition. Design of this scheme using Matlab is proposed. Embedded watermark is robust against various attacks that can be carried out on the watermarked video.

Keywords:
 Digital watermarking, Matlab, DWT,SVD,DCT


References:

1.    Asna Furqan, Munish Kumar, Study and Analysis of Robust DWT-SVD Domain Based Digital Image Watermarking Technique Using MATLAB, 2015 IEEE International Conference on Computational Intelligence & Communication Technology © 2015 IEEE
2.    Madhuri Rajawat, D S Tomar, A Secure Watermarking and Tampering detection technique on RGB Image using 2 Level DWT 2015 Fifth International Conference on Communication Systems and Network Technologies, 2015 IEEE

3.    A.Umaamaheshvari, Dr.K.Thanushkodi, Robust Image Watermarking Based On Block Based Error Correction Code International Conference on Current Trends in Engineering and Technology, ICCTET’13

4.    Hemdan, N. El-Fishaw, G. Attiya and F. A. El-Samii, “Hybrid Digital Image Watermarking Technique for Data Hiding”, IEEE 30th National Radio Science Conference, (2013)

5.    Dattatherya, S. Venkata Chalam and Manoj Kumar Singh, “A Generalized Image Authentication based on Statistical Moments of Color Histogram,” Int. J. on Recent Trends in Engineering and Technology,, Vol. 8, No-1, Jan. 2013

6.    Habibollah Danyali, Morteza Makhloghi, and Fardin Akhlagian Tab,“Robust Blind DWT based Digital Image Watermarking Using Singular Value Decomposition,” International Journal of Innovative Computing, Information and Control, Vol. 8, No.7, July 2012

193-194

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Kanchan P. Borade, Shewale Pooja J, Tayade Dipika P

Paper Title:

“ATM Theft Monitoring and Security System using Raspberry Pi2”

Abstract: Automated Teller Machines (ATMs) security is the field of Study that gives a solution that provides multiple points of protections against theft .This project deals with prevention of ATM theft from robberies overcome the drawback found in existing technology in our society. ATM video surveillance cameras and ATM monitoring options, security specialists are ready to help the people get more out of the ATM security and ATM loss prevention systems. Most of the time it happens that theft enter in ATM, collect the money, start running police cannot capture theft so, to avoid such condition this project gives real time data of sensor, images of theft and mechanism of door and shutter lock. Here Raspberry pi2 is a series of small computer used, to interface the camera, vibration sensor, GSM, DC motor, Buzzer. There must be the installation of the raspbian operating system. The aim of using raspberry pi 2 is its ease of portability, ease of connections, and ease of handling. The setup is proposed for ATM security, comprising of the modules namely, authentication of shutter lock, web enabled control, sensors and camera control.

Keywords:
Raspberrypi2, Camera, Vibration Sensor,D Cmotar, GSM, Buzzer.


References:

1.    Sivakumar, Gajjala Askok, k. Sai Venuprathap “Design and Implementation of  Security Based ATM theft  Monitoring system”. e- ISSN: 2278-7461, p-ISSN: 2319- 6491 Volume 3, Issue 1 (August 2013) PP: 01-07, ATM theft monitoring system with the help of LPC2148.
2.    S.P.Balwir, R.D.Thakare, K.R.Katole “Secured ATM transaction system”. Volume 4, Issued 4, April 2014, Transaction system is used.

3.    P.Kannan, Ms. P. Meenakshi vidya “Design and Implementation of Security Based ATM theft Monitoring system”. ISSN: 2320-0790, ATM theft monitoring system with the help of microcontrol00ler.

4.    R.Senthil Kumar, K.R.Sugavanam, D.Gajalakshmi “Novel vigilant real time monitoring and security system for ATM”. 10th September 2014. Vol. 67No.1© 2005 – 2014 JATIT & LLS, Real Time Monitoring and Security System for ATM Centre.

5.    Raj M M.E, Anita Julian “Design and Implementation of Anti-theft ATM Machine using Embedded Systems”. 2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT], Embedded based ATM security system.

195-197

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Srujana Rongali, Radhika Yalavarthi

Paper Title:

An Improved Ant Colony Optimization for Parameter Optimization using Support Vector Machine

Abstract:  Support Vector Machine (SVM) is one of the significant classification technique and it can be applied in various areas like meteorology, financial data analysis etc. The performance of SVM is influenced by parameters like C, which is cost constant and kernel parameter. In this paper, an improved Ant Colony Optimization (IACO) technique is proposed to optimize the parameters of SVM. To evaluate the proposed approach, the experiment adopts five benchmark datasets. The developed approach was compared with the ACO-SVM algorithm proposed by Zhang et al. The experimental results of the simulation show that performance of the proposed method is encouraging.

Keywords:
Support vector machines, Ant colony optimization, Parameter optimization


References:

1.       Vapnik VN. The Nature of Statistical Learning Theory. New York, NY: Springer New York; 1995. doi:10.1007/978-1-4757-2440-0.
2.       Li X, Zheng A, Zhang X, Li C, Zhang L. Rolling element bearing fault detection using support vector machine with improved ant colony optimization. Measurement 2013;46:2726–34. doi:10.1016/j.measurement.2013.04.081.

3.       Samanta B, Al-Balushi KR, Al-Araimi SA. Artificial neural networks and support vector machines with genetic algorithm for bearing fault detection. Eng Appl Artif Intell 2003;16:657–65. doi:10.1016/j.engappai.2003.09.006.

4.       Hou S, Li Y. Short-term fault prediction based on support vector machines with parameter optimization by evolution strategy. Expert Syst Appl 2009;36:12383–91. doi:10.1016/j.eswa.2009.04.047.

5.       Wu Q, Law R, Wu E, Lin J. A hybrid-forecasting model reducing Gaussian noise based on the Gaussian support vector regression machine and chaotic particle swarm optimization. Inf Sci (Ny) 2013;238:96–110. doi:10.1016/j.ins.2013.02.017.

6.       Wu Q. A hybrid-forecasting model based on Gaussian support vector machine and chaotic particle swarm optimization. Expert Syst Appl 2010;37:2388–94. doi:10.1016/j.eswa.2009.07.057.

7.       Liu S, Tai H, Ding Q, Li D, Xu L, Wei Y. A hybrid approach of support vector regression with genetic algorithm optimization for aquaculture water quality prediction. Math Comput Model 2013;58:458–65. doi:10.1016/j.mcm.2011.11.021.

8.       Wu CH, Tzeng GH, Goo YJ, Fang WC. A real-valued genetic algorithm to optimize the parameters of support vector machine for predicting bankruptcy. Expert Syst Appl 2007;32:397–408. doi:10.1016/j.eswa.2005.12.008.

9.       Patil SG, Mandal S, Hegde A V. Genetic algorithm based support vector machine regression in predicting wave transmission of horizontally interlaced multi-layer moored floating pipe breakwater. Adv Eng Softw 2012;45:203–12. doi:10.1016/j.advengsoft.2011.09.026.

10.    Chen F, Tang B, Chen R. A novel fault diagnosis model for gearbox based on wavelet support vector machine with immune genetic algorithm. Meas J Int Meas Confed 2013;46:220–32. doi:10.1016/j.measurement.2012.06.009.

11.    Lin S-W, Lee Z-J, Chen S-C, Tseng T-Y. Parameter determination of support vector machine and feature selection using simulated annealing approach. Appl Soft Comput 2008;8:1505–12. doi:10.1016/j.asoc.2007.10.012.

12.    Huang CL, Wang CJ. A GA-based feature selection and parameters optimizationfor support vector machines. Expert Syst Appl 2006;31:231–40. doi:10.1016/j.eswa.2005.09.024.

13.    Aydin I, Karakose M, Akin E. A multi-objective artificial immune algorithm for parameter optimization in support vector machine. Appl Soft Comput 2011;11:120–9. doi:10.1016/j.asoc.2009.11.003.

14.    Zhao H, Yin S. Geomechanical parameters identification by particle swarm optimization and support vector machine. Appl Math Model 2009;33:3997–4012. doi:10.1016/j.apm.2009.01.011.

15.    Eitrich T, Lang B. Efficient optimization of support vector machine learning parameters for unbalanced datasets. J Comput Appl Math 2006;196:425–36. doi:10.1016/j.cam.2005.09.009.

16.    Wang Z, Shao YH, Wu TR. A GA-based model selection for smooth twin parametric-margin support vector machine. Pattern Recognit 2013;46:2267–77. doi:10.1016/j.patcog.2013.01.023.

17.    Zhao M, Fu C, Ji L, Tang K, Zhou M. Feature selection and parameter optimization for support vector machines: A new approach based on genetic algorithm with feature chromosomes. Expert Syst Appl 2011;38:5197–204. doi:10.1016/j.eswa.2010.10.041.

18.    Reif M, Shafait F, Dengel A. Meta-learning for evolutionary parameter optimization of classifiers. Mach Learn 2012;87:357–80. doi:10.1007/s10994-012-5286-7.

19.    Zhang Q, Shan G, Duan X, Zhang Z. Parameters optimization of Support Vector Machine based on Simulated Annealing and Genetic Algorithm. 2009 IEEE Int Conf Robot Biomimetics 2009:1302–6. doi:10.1109/ROBIO.2009.5420717.

20.    Adankon MM, Cheriet M. Genetic algorithm-based training for semi-supervised SVM. Neural Comput Appl 2010;19:1197–206. doi:10.1007/s00521-010-0358-8.

21.    Boardman M, Trappenberg T. A Heuristic for Free Parameter Optimization with Support Vector Machines. 2006 IEEE Int Jt Conf Neural Netw Proc 2006:1337–44. doi:10.1109/IJCNN.2006.246739.

22.    Yu Q, Zhang B, Wang J. Parameter Optimization of ϵ-Support Vector Machine by Genetic Algorithm. 2009 Fifth Int Conf Nat Comput 2009:540–2. doi:10.1109/ICNC.2009.628.

23.    Huaitie X, Guoyu F, Zhiyong S, Jianjun C. Hybrid Optimization Method for Parameter Selection of Support Vector Machine. 2010 IEEE Int Conf Intell Comput Intell Syst 2010;1:613–6. doi:10.1109/ICICISYS.2010.5658455.

24.    Lin S-W, Ying K-C, Chen S-C, Lee Z-J. Particle swarm optimization for parameter determination and feature selection of support vector machines. Expert Syst Appl 2008;35:1817–24. doi:10.1016/j.eswa.2007.08.088.

25.    Zhang XL, Chen XF, He ZJ. An ACO-based algorithm for parameter optimization of support vector machines. Expert Syst Appl 2010;37:6618–28. doi:10.1016/j.eswa.2010.03.067.

26.    Alwan HB, Ku-Mahamud KR. Optimizing Support Vector Machine Parameters Using Continuous Ant Colony Optimization. Proc 7th Int Conf Comput Converg Technol 2012:164–9.

27.    Zhang XL, Chen XF, Zhang ZS, He ZJ. A Grid-based ACO Algorithm for Parameters Optimization in Support Vector Machines. IEEE Int Conf Granul Comput 2008 GrC 2008 2008:805–8. doi:10.1109/GRC.2008.4664645.

28.    Vapnik VN. An overview of statistical learning theory. IEEE Trans Neural Netw 1999;10:988–99. doi:10.1109/72.788640.

29.    Cristianini N, Shawe-Taylor J. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods. 1st ed. Cambridge: Cambridge University Press; 2000.

30.    Jiawei H, Kamber M. Data mining: concepts and techniques. 2006. doi:10.1007/978-3-642-19721-5.

31.    Duan K, Keerthi S, Poo A. Evaluation of simple performance measures for tuning SVM hyper parameters. Neurocomputing 2003;51:41–59.

32.    Imbault F, Lebart K. A Stochastic Optimization Approach for Parameter Tuning of Support Vector Machines. Proc 17th Int Conf Pattern Recognition, 2004ICPR 2004 2004;4:597–600. doi:10.1109/ICPR.2004.1333843.

33.    Chapelle O, Vapnik V, Bousquet O, Mukherjee S. Choosing Multiple Parameters for Support Vector Machines. Mach Learn 2002;46:131–59. doi:10.1023/ A:1012450327387.

198-204

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Sonali Kadam, Rutuja Pawar, Shweta Phule, Priyansha Kher, Manisha Kumari

Paper Title:

Ensemble of Classifiers for Intrusion Detection System

Abstract:   The continuous growth in Network attacks is being a serious problem in software industry. Intrusion detection framework is utilized to distinguish and break down system assaults so IDS should be upgraded that can screen the framework and can trigger the readiness in the framework. Numerous calculations have been proposed by various creators to enhance the execution of IDS yet at the same time they can’t give appropriate or finish arrangement. In proposed framework creators perform probes distinctive blends of Bayesian system, Naïve Bayes, JRip, MLP, IBK, PART and J48 classifier. What’s more for each mix two pre-processing procedures Normalization and discretization will be connected. The advantage of proposed approach is the combi-nation detecting majority attacks will be ensemble with the re-spective pre-processing technique. Hence, any kind attack in the network can be detected with best accuracy.

Keywords:
Bayesian network, Intrusion Detection System, IBK. JRip, J48, MLP, Naïve bayes, PART.


References:

1.    V. D. Katkar , S. V. Kulkarni, “Experiments on detection of Denial of Service attacks using ensemble of classifiers, Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on, Chennai, 2013, pp. 837-842.
2.    S. Choudhury, A. Bhowal, “Comparative analysis of machine learning algorithms along with classifiers for network intrusion  detection,” Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), 2015 International Conference on, Chennai,2015, pp. 89-95.

3.    P. Sornsuwit ,  S. Jaiyen, “Intrusion detection model based en-semble learning for U2R and R2L attacks,” 2015 7th International Conference on Information Technology and Electrical Engineering (ICITEE), Chiang Mai, 2015, pp. 354-359.

4.    K. Elekar, M. M. Waghmare and A. Priyadarshi, “Use of rule base data mining algorithm for intrusion detection,” Pervasive Computing (ICPC), 2015 International Conference on, Pune, 2015, pp. 1-5.

5.    T. Garg , S. S. Khurana, “Comparison of classification techniques for intrusion detection dataset using WEKA,” Recent Advances and Innovations in Engineering (ICRAIE), 2014, Jaipur, 2014, pp. 1-5.

6.    H. Chauhan, V. Kumar and S. Pundir and E. S. Pilli, “A Comparative Study of Classification Techniques for Intrusion Detection ,” Computational and Business Intelligence (ISCBI), 2013 International Symposium on, New Delhi, 2013, pp. 40-43.

7.    P. Amudha, S. Karthik and S. Sivakumari, “Intrusion detection based on Core Vector Machine and ensemble classification methods”, 2015 International Conference on Soft-Computing and Networks Security (ICSNS), 2015.

8.    G. Nadiammai , M. Hemalatha, “Effective approach toward Intrusion Detection System using data mining   techniques”, Egyptian Informat-ics Journal, vol. 15, no. 1, pp. 37-50, 2014.

9.    F. Nia , M. Khalili, “An efficient modelling algorithm for intrusion detection systems using C5.0 and Bayesian Network  struc-tures”, 2015 2nd International Conference of Knowledge-Based Engineering and Innovations (KBEI).

205-209

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Ahmed F. AlHallaq, Bassam A. Tayeh, Samir Shihada

Paper Title:

Investigation of the Bond Strength Between Existing Concrete Substrate and UHPC as a Repair Material

Abstract: The performance of any repaired concrete structure, depends on the quality of the interfacial transition zone of the composite system formed by the repair material and the existing concrete substrate. The main aim of this paper is to evaluate the bonding behavior between normal strength concrete (NSC) substrate as an old concrete and Ultra High Performance Concrete (UHPC) as a repair material. In order to assess the bond behavior, standard slant shear test and splitting tensile test were carried out. The relation between surface roughness and bond strength in shear and indirect tension for different surfaces roughness has been assessed. The old concrete surfaces were roughened by mechanical wire brush, scarifying using an electrical grinder, scabbling by a mechanical drill and as cast without roughening. Analysis of the results indicates that bond strength increases when UHPC is used for shear and tension alike. For the scabbling technique, the shear strength yields values 251.8% higher than the those for as cast  surface and 153% for tension strength. In addition, UHPC show advantages that qualify it for repairing and strengthening techniques including adding a new concrete to the existing concrete substrate. In general, rough surface preparation leads to a higher bond strength. Ra coefficient is a representative parameter and related to the bond strength, particularly, for shear strength. Finally, the results showed that tension strength is less sensitive to the surface roughness level and more proportional to the repair material strength.

Keywords:
Bond strength; Concrete overlay; Old concrete;  Slant shear test; Splitting test; Silica fume; Substrate; Surface roughness; Ultra High Performance Concrete,


References:

1.       Mather, B. and J. Warner. Why do Concrete Repairs Fail? Interview held at University of Wisconsin, Madison Engineering Professional Development, MD, WI,< http://epdweb.engr.wisc.edu/AEC_Articles/07_Concrete_Repair_text.html>. 2003  Jan., 2012].
2.       Rahman, A., et al., State-of-the-art review of interface bond testing devices for pavement layers: toward the standardization procedure. Journal of adhesion science and technology, 2016: p. 1-18.

3.       Sanchez-Silva, M., G.-A. Klutke, and D.V. Rosowsky, Life-cycle performance of structures subject to multiple deterioration mechanisms. Structural Safety, 2011. 33(3): p. 206-217.

4.       Espeche, A.D. and J. León, Estimation of bond strength envelopes for old-to-new concrete interfaces based on a cylinder splitting test. Construction and Building Materials, 2011. 25(3): p. 1222-1235.

5.       Ramge, P. and H.C. Khne, Investigations on the performance of concrete repair mortars in composite specimen tests., in International Conference on Concrete Repair, Rehabilitation and Retrofitting III (ICCRRR 2012), 02-05 September 2012. 2012: Cape Town, South Africa. p. 1046-1052.

6.       Júlio, E., et al., Accuracy of design code expressions for estimating longitudinal shear strength of strengthening concrete overlays. Engineering Structures, 2010. 32(8): p. 2387-2393.

7.       Gorst, N. and L. Clark, Effects of thaumasite on bond strength of reinforcement in concrete. Cement and Concrete Composites, 2003. 25(8): p. 1089-1094.

8.       Santos, P.M.D. and E.N.B.S. Julio, Factors Affecting Bond between New and Old Concrete. ACI Materials Journal, 2011. 108(4): p. 449.

9.       Kuebitz, K., Repairing and retrofitting prestressed concrete water tanks in the  San Francisco Bay area. , in International Conference on Concrete Repair, Rehabilitation and Retrofitting III (ICCRRR 2012), 02-05 September 2012. 2012: Cape Town, South Africa.

10.    Austin, S., P. Robins, and Y. Pan, Tensile bond testing of concrete repairs. Materials and structures, 1995. 28(5): p. 249-259.

11.    Bissonnette, B., et al., Concrete repair and interfacial bond: Influence of surface preparation, in International Conference on Concrete Repair, Rehabilitation and Retrofitting II (ICCRRR 2009), 24-26 November 2009. 2009: Cape Town, South Africa. p. 345-350.

12.    Tayeh, B.A., et al., Mechanical and permeability properties of the interface between normal concrete substrate and ultra high performance fiber concrete overlay. Construction and Building Materials, 2012. 36: p. 538-548.

13.    Owayda, Y., Strengthening and Repair of RC Beams with Cemintitions Repair Materials. 2013, Master Thesis, Islamic University in Gaza.

14.    ASTM-C150/C150M, Standard Specification for Portland Cement, in American Society for Testing and Materials, West Conshohocken, PA 55555, United States. 2009.

15.    ASTM-C1240, Standard Specification for Use of Silica Fume as a Mineral Admixture in Hydraulic Cement Concrete, Mortar, and Grout., in American Society for Testing and Materials, West Conshohocken, PA 19428-2959. 2000.

16.    ASTM-C882, Standard Test Method for Bond Strength of Epoxy-Resin Systems Used with Concrete by Slant Shear, in American Society for Testing and Materials,
West Conshohocken, PA 19428-2959, United States. 1999.

17.    ASTM-C496, Standard Test Method for Splitting Tensile Strength of Cylindrical Concrete., in American Society for Testing and Materials, West Conshohocken, PA 19428-2959, United States. 1996.

18.    Mummery, L., Surface texture analysis: the handbook. 2000: Hommelwerke.

19.    Tayeh, B.A., et al., The role of silica fume in the adhesion of concrete restoration systems  Advanced Materials Research, 2013. 626: p. 265-269.

20.    Tayeh, B.A., et al., The Relationship between Substrate Roughness Parameters and Bond Strength of Ultra High- Performance Fiber Concrete. Journal of Adhesion Science and Technology, 2012.

21.    Mohammadi, M., R. Moghtadaei, and N. Samani, Influence of silica fume and metakaolin with two different types of interfacial adhesives on the bond strength of repaired concrete. Construction and Building Materials, 2014. 51: p. 141-150.

22.    Mohammed, A.N., et al., Improving the engineering and fluid transport properties of ultra-high strength concrete utilizing ultrafine palm oil fuel ash. Journal of Advanced Concrete Technology, 2014. 12(4): p. 127-137.

23.    Grigoriadis, K., Use of laser interferometry for measuring concrete substrate roughness in patch repairs. Automation in Construction, 2016. 64: p. 27-35.

24.    Tayeh, B.A., et al., Existing concrete textures: their effect on adhesion with fibre concrete overlay. Proceedings of the Institution of Civil Engineers-Structures and
Buildings, 2014. 167(6): p. 355-368.

25.    Tayeh, B.A., B. Abu Bakar, and M.M. Johari. Mechanical properties of old concrete–UHPFC interface. in Concrete Repair, Rehabilitation and Retrofitting III: 3rd International Conference on Concrete Repair, Rehabilitation and Retrofitting, ICCRRR-3, 3-5 September 2012, Cape Town, South Africa. 2012: CRC Press.

26.    Perez, F., B. Bissonnette, and R. Gagné, Parameters affecting the debonding risk of bonded overlays used on reinforced concrete slab subjected to flexural loading. Materials and structures, 2009. 42(5): p. 645-662.

27.    Abu-Tair, A., S. Rigden, and E. Burley, Testing the bond between repair materials and concrete substrate. ACI Materials Journal, 1996. 93(6).

210-217

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

40.

Authors:

K. Bikshalu, Prathap Soma

Paper Title:

Design and Simulation of 16 Bit Arithmetic Unit using Gating Techniques in Cadence 45nm Technology

Abstract:  In any system ALU is the most important part of a processor as it is required for calculating the address of each memory location. It performs a particular arithmetic and logic operations on each set of operands, based upon the instructions given by the processor. In some processors ALU is split into two units, an Arithmetic unit (AU) and logic unit (LU). Some processors possess a couple of Arithmetic units – one for the fixed point operations and another for the floating point operations. As AU operates at a very high speed and it is accessed by the system frequently, it contributes to one of the highest power-density locations on the processor. Because of this reason, there exist thermal hotspots and sharp temperature gradients inside the execution core, thereby reducing the reliability as well as the battery life of the system. Therefore, there is a great need for the development of a power optimized AU design. This encourages powerfully for the design of a power optimized AU that satisfies the superior needs along with the reduction of average power consumption. This paper presents the various power optimized techniques for 16bit ALU like input gating, power gating in 45nm using cadence. Finally, comparison among all proposed techniques are represented.

Keywords:
 Arithmetic unit (AU), Power gating, Input Gating.


References:

1.       P. Kalyani, dr. P. Satishkumar, dr. K. Ragini-“various low power techniques for cmos circuits”, p. Kalyani et al int. Journal of engineering research and applications, issn: 2248-9622, vol. 3, issue 6, nov-dec 2013, pp.330-333.
2.       akhila abba, k amarender” improved power gating technique for leakage power reduction” international journal of engineering and science vol.4, issue 10 (october2014), pp 06-10.

3.       “adder subtractor design” islamic university of gaza, faculty of engineering department of computer engineering fall 2011 ecom 4113: digital design lab eng. Ahmed abumarasa

4.       pramod kumar. M.p, a. S. Augustine fletcher” a survey on leakage power reduction techniques by using power gating methodology” international journal of engineering trends and technology (ijett) – volume 9 number 11- mar 2014.

5.       ping huang, zuocheng xing, tianran wang, qiang wei, hongyan wang, guitao fu” a brief survey on power gating design” school of computer, national university of defense technology, changsha 410073, china.

6.       Sreenivasa rao n, y. Vishnuvardhan reddy, g.shivamanikanta, b. Vijaysree “design the 2×1 mux with 2t logic and comparing the power dissipation and area with different logics” international journal of advanced research in electrical, electronics and instrumentation engineering vol. 4, issue 3, march 2015.

7.       dursun baran, mustafa aktan and vojin g. Oklobdzija,” multiplier structures for low power applications in deep-cmos”, ieee international symposium on circuits and
systems (iscas), 2011

8.       sumit r. Vaidya, d.r. Dandekar,”delay-power performance comparison of multipliers in vlsi circuit design”, ijcnc, vol. 2,no. 4,pp. 47-56,july 2010.

9.       p.v. Rao, cyril prassana raj p, s. Ravi,“vlsi design and analysis of multipliers for low power”,ieee 2009 fifth international conference on intelligence information hiding and multipedia signal processing, pp. 1354-1357,2009.

10.    Suhwan kim, stephen v. Kosonocky, and daniel r. Knebel,“understanding and minimizing ground bounce during mode                transition of power gating structures,” proceedings of the ieeeinternational symposium on low power electronics and design (islped), pp.22 – 25, 25-27 aug. 2003.

11.    Harmander singh, kanak agarwal, dennis sylvester, and kevin j.nowka, “enhanced leakage reduction techniques using intermediate strength power gating,” ieee trans. On very large scale integration (vlsi) systems, vol. 15, no. 11, pp.12-15, november 2007.

12.    Ashoka. Sathanur, benini.l, macii.a, macii.e and poncino.m, “row-based power gating: a novel sleep transistor insertion methodologyfor leakage power optimization in nanometre cmos circuits,” ieeetrans. Vlsi syst., vol. 19, no.3, pp. 469–482, 2011.

13.    Kanak agarwal, harmander deogun , dennis sylvester and kevin nowka, “power gating with multiple sleep modes,” ieee proceedings of the international symposium on quality electronic design (isqed), pp 633-637, 27-29 march 2006.

14.    Pramod kumar.m.p and a.s.augustine fletcher, “a novel hybrid multiple mode power gating,” ieee international conference on electronics and communication system (icecs’14), feb.13-14, 2014.

15.    Prvinkumar g. Parate, prafulla s. Patil, dr (mrs) s. Subbaraman “asic implementation of 4 bit multipliers”,ieee first international conference on emerging trends in engineering and technology, pp. 408-413,2008

16.    T. Esther rani, m. Asha rani, dr. Rameshwar rao, area optimized low power arithmetic and logic unit”978-1-4244-8679-3/11/$26.00 ©2011 IEEE.

218-223

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

41.

Authors:

Loubna Berrich, Lahbib Zenkouar

Paper Title:

The Adaptation of a Microstrip Dipole Antenna for RFID Applications

Abstract: Radio frequency identification (Radio Frequency Identification) is a technology used primarily to identify tagged objects or to track their locations. An RFID tag is composed of integrated circuit. To design the antennas, it is necessary that the antenna must have an impedance value equal to the conjugate of the impedance of the IC to have a good adaptation allowing the maximum transfer of power. For the implementation of the impedance matching, there are several techniques. In this work, we are interested in the technique of adaptation T-match and the technique of adaptation by coupling. The T-match technique is based on the insertion of a second folded dipole at the center of the first dipole. This technique is modeled by an equivalent circuit to be able to calculate the dimension of the folded dipole to have a new input impedance of the antenna equal to the conjugate of the impedance of the integrated circuit. The second technique is based on the supply of the dipole via a small loop with inductive coupling placed in close proximity to the radiating body. The software used in this work is the Ansoft HFSS software which is based on the finite element method (FEM). The results obtained are satisfactory with a reflection coefficient that exceeds -22 dB.

Keywords:
Microruban Dipole Antenna, RFID, Tag.


References:

1.    H.Stockman, ‘’ Communication by Means of Reflected Power’’, Proceeding of the IRE, October 1948 , pp.1196-1204.
2.    A.Balanis, C, ”ANTENNA THEORY ANALYSIS AND DESIGN”, 2005.

3.    J.Landt, ”The History of RFID”,  IEEE Potentials , vol 24 (4), 2005, pp.8-11.

4.    al, N. &, ”Radiation Propreties od Microstrip Dipole”, IEEE Transactions on Antenna and Propagation ,  vol Ap-43 (3), , 1979,  pp.853-858.

5.    G.Marrocco, ”The Art of UHF RFID Antenna Design: Impedance Matching ande size reduction technique”, IEEE Antenna and Propagation Magazine ,  vol 50 (1), 2008, pp.66-79.

224-227

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

6 Issue-4 April 2017

Volume-6 Issue-4 Published on April 30, 2017
 Download Abstract Book

S. No

Volume-6 Issue-4, April 2017, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Nidhal Kamel Taha El-Omari, Ahmad H. Al-Omari, Ali Mohammad H. Al-Ibrahim, Tariq Alwada’n

Paper Title:

Text-Image Segmentation and Compression using Adaptive Statistical Block Based Approach

Abstract:  Images and scanned text documents are gradually more used in a vast range of applications. To reduce the needed storage or to accelerate their move through the computers networks, the document images have to be compressed. Traditional compression mechanisms, which are generally developed with a particular image type and purpose, are facing many challenges with mixed documents. This paper describes a statistical block-based technique for an automatic document image segmentation and compression. Based on the number of detected colors in each region of the image, this approach creates a new representation of the image that can produce very highly-compressed document files that nonetheless retain excellent image quality. The proposed algorithm segments the compound document image into blocks of equal size. The blocks are classified into seven different categories. Each category represents an image part that shares the same properties. A new representation of each category is formed and the similar adjacent blocks are merged to form labeled regions sharing the same properties. At the end, to achieve better compression ratio, the different regions of the image are compressed using different compression techniques.

Keywords:
Adaptive Compression, Block-Based Segmentation, Image Document Compression, Image Segmentation, Lookup Dictionary Table (LUD).


References:

1.       Acharyya, M. and Kundu, M.K. (2002). “Document Image Segmentation Using Wavelet Scale-Space Features”, IEEE Transactions Circuits Syst. Video Technol., Volume 12, Issue 12, pp. 1117–1127.
2.       Nidhal Kamel Taha El Omari. (2008). “A Hybrid Approach for Segmentation and Compression of Compound Images”, PhD Dissertation, the Arab Academy for Banking and Financial Sciences.

3.       Nidhal Kamel Taha El-Omari and Arafat A. Awajan. (December 20-22, 2009). “Document Image Segmentation and Compression Using Artificial Neural Network Based Technique”, International Conference on Information and Communication Systems (ICICS09), pp. 320-324, Amman, Jordan.

4.       Kai Uwe Barthel et al., (January 2000). “New Technology for Raster Document Image Compression”, SPIE. The International Society for Optical Engineering, Volume 3967, pp. 286-290, San Jose, CA.

5.       Patrice Y. Simard et al., (March 23-25, 2004). “A Foreground/Background Separation Algorithm for Image Compression”, IEEE Data Compression Conference (DCC), pp. 498–507, Snowbird, UT, USA.

6.       Ricardo L. de Queiroz et al., (February 1999). “Mixed Raster Content (MRC) Model for Compound Image Compression”, SPIE the International Society for Optical Engineering, Volume 3653, pp. 1106-1117.

7.       Ricardo L. de Queiroz. (October 8-11, 2006). “Pre-Processing for MRC Layers of Scanned Images”, Proceedings of the International Conference on Image Processing (ICIP), Atlanta, Georgia, USA, pp.  3093–3096.

8.       Lihong Zheng and Xiangjian He. (2004). “Edge Detection Based on Modified BP Algorithm of ANN”, Conferences in Research and Practice in Information Technology (RPIT), Volume 36, pp. 119–122.

9.       Guotong Feng and Charles A. Bouman. (October 2006). “High Quality MRC Document Coding”, IEEE Transactions Image Processing, Volume 15, Issue 10, pp. 3152-3169.

10.    Leon Bottou, Patrick Haffner et al., (July 1998). “High Quality Document Image Compression with DjVu”, Journal of Electronic Imaging, Volume 07, Issue 3, pp. 410-425.

11.    Wenpeng Ding et al., (January 30, 2007). “Rate-Distortion Optimized Color Quantization for Compound Image Compression”, Visual Communications and Image Processing Conference, SPIE Proceedings, Volume 6508, pp.  65082Q1-65082Q9, San Jose, CA, USA.

12.    Tony Lin and Pengwei Hao. (August 2005). “Compound Image Compression for Real Time Computer Screen Image Transmission”, IEEE Transactions on Image Processing, Volume 14, Issue 8, pp. 993-1005.

13.    Wenpeng Ding et al., (2006). “Block-based Fast Compression for Compound Images”, ICME, paper ID 1722, pp. 809–812.

14.    Debargha Mukherjee et al., (June 2002). “JPEG2000-Matched MRC Compression of Compound Documents”, IEEE International Conference on Image Processing (ICIP), Volume 3, pp.  225-228.

15.    Cheng H. and Bouman C. A. (April 2001). “Document Compression Using Rate-Distortion Optimized Segmentation”, Journal of Electronic Imaging, Volume 10, Issue 2, pp. 460–474.

16.    Nidhal Kamel Taha El-Omari et al., (2012). “Innoviate Text-Image Compression Technique”, European Journal of Scientific Research, © EuroJournals Publishing Inc., Volume 88, Issue 4, pp.  603-616.

17.    Gnana King, G.R.1 and Seldev Christopher, C.2. (2014). “Improved block based segmentation algorithm for compression of compound images”, Journal of Intelligent & Fuzzy Systems, Volume 27, Issue 6, pp.  3213-3225.

18.    Qindong Sun et al., (2015). “A Method of Image Segmentation based on the JPEG File Stream”, Journal of Computational Methods in Sciences & Engineering, Volume
15, Issue 3, pp.  467-475.

19.    Bo Chen et al., (June 2015). “A new image segmentation model with local statistical characters based on variance minimization”, Applied Mathematical Modelling, Volume 39, Issue 12, pp. 3227-3235.

20.    Gagan Jindal and Sikander Singh Cheema, (2016), “Review Paper of Segmentation of Natural Images using HSL Color Space Based on K- Mean Clustering”,
International Journal of Innovations & Advancement in Computer Science, Volume 5, Issue 7, pp.  26-29.

21.    Zhanjiang Zhi et al., (2016), “Two-Stage Image Segmentation Scheme Based on Inexact Alternating Direction Method”, Numer. Math. Theor. Meth. Appl., Volume 9, Issue 3, pp.  451-469.

22.    Haifeng Sima et al., (2016), “Objectness Supervised Merging Algorithm for Color Image Segmentation”, Mathematical Problems in Engineering, Volume 2016, Article ID 3180357, pp.  1-11.

23.    S.Thayammal, and D.Selvathi., (2013), “A Review On Segmentation Based Image Compression Techniques”, Journal of Engineering Science and Technology Review, Volume 6, Issue 3, pp.  134-140.

24.    Ian Sommerville, (2015), “Software Engineering”, 10th Edition, Pearson Education, Inc., ISBN-13: 978-0133943030, New York, USA.

25.    Er. Kuldeep Kaur et al., (2016), “Comparative Analysis of Compression Techniques: A Survey”, International Research Journal of Engineering and Technology (IRJET), Volume 03, Issue: 04, pp. 1042-1046.

 

1-9

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

2.

Authors:

Akhilesh Kumar Sharma, Brijendra Kumar Sharma

Paper Title:

Development of Sensors on Android Platform

Abstract: Mobile phones play increasingly bigger role in our everyday lives. Today, most smart phones comprise a wide variety of sensors which can sense the physical environment. In this research, we propose and demonstrate my DAM4GSN architecture to capture sensor data using sensors built into the mobile phones. Specifically, we combine an open source sensor data stream processing engine called ‘Global sensor n/w (GSN)’ with the android platform to capture sensor data. We present the design, implementation, evaluation, and user experiences of the Cence-me application, which represents the first system that combines the inference of the presence of individual using off-the self sensor enabled mobile phones with sharing of this information through social networking applications such as face-book and my-space. An android based application that monitors the vehicle through an On Board Diagnostics (OBD-2) interface, being able to detect accidents. 

Keywords:
 DAM4GSN architecture, Cence-Me application, On Board Diagonstics (OBD-2) interface.


References:

1.       K. Aberer, M. Hauswirth, and A. Salehi. Infrastructure for data processing in large-scale interconnected sensor networks. In Mobile Data Management, 2007 International Conference on, pages 198–205.
2.       L. Cai, S. Machiraju, and H. Chen. Defending   against sensor-sniffing attacks on mobile phones. In Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds, MobiHeld ’09, pages 31–36, New York, NY, USA, 2009. ACM.

3.       Crossbow Technology Inc. Crossbow-manuals getting started guide. Technical report, Crossbow Technology, September 2005.

4.       F. Fitzek, M. Pedersen, G. P. Perrucci, and T. Larsen. Energy and link measurements for mobile phones using ieee802.11b/g. In Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops, 2008. WiOPT 2008. 6th International Symposium on, page 36, april 2008.

5.       Google Inc. Android developer guide: Sensors, 2011. http://developer.android.com/guide/topics/sensors/index.html [Accessed on: 2011-12-26].

6.       GSN Team. Global sensors networks. Technical report, Ecole Polytechnique Federale de Lausanne (EPFL), 2009.

7.       GSN Team. Global sensor networks project, 2011. http://sourceforge.net/apps/trac/gsn/ [Accessed on: 2011-12-16].

8.       P. Guillemin and P. Friess. Internet of things strategic research roadmap. echnical report, The Cluster of European Research Projects, 2009.

9.       P. Klasnja, S. Consolvo, T. Choudhury, R. Beckwith, and J. Hightower. Exploring privacy concerns about personal sensing. In Proceedings of the 7th International Conference on Pervasive Computing, Pervasive ’09, pages 176–183, Berlin, Heidelberg, 2009. Springer-Verlag.

10.    G. Kortuem, F. Kawsar, D. Fitton, and V. Sundramoorthy. Smart objects as building blocks for the internet of things. Internet Computing, IEEE, 14(1):44–51, 2010.

11.    N. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. Campbell. A survey of mobile phone sensing. Communications Magazine, IEEE, 48(9):140 –150, sept. 2010.

12.    M. Lennighan. Total telecom: Number of phones exceeds population of world, May 2011. http://www.totaltele.com/view.aspx?ID=464922 [Accessed on: 2011-12-30].

13.    Salehi. Design and implementation of an efficient data stream processing system. PhD thesis, Ecole Polytechnique Federale de Lausanne (EPFL), 2010.

14.    H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelffl´e. Vision and challenges for realising the internet of things. Technical report, European Commission Information Society and Media, 2010.

 

10-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ahmed Sharieh, Raja Masadeh

Paper Title:

Implementing Fair Resource Synchronizer Algorithm for Distributed Mutual Exclusion in Mobile Computing Environment

Abstract:  Mutual exclusion in distributed systems is a critical feature required to coordinate access to shared resources. It is highly needed to be employed in distributed systems including mobile computing environments. Dynamic Resource Synchronizer algorithm (DRS) works on decreasing the amount of messages that transferred in the system by minimizing the amount of sites that are included in the mutual exclusion. In this paper, a DRS algorithm is presented with a simulation study for distributed mutual exclusion that could be used in mobile environments in which nodes communicate with each other based onto specific conditions. Also, ring topology is used, all nodes have a unique identifier, a node failure doesn’t occur, communication links are bi-directional, and First In First Out (FIFO) priority and a partition in a network doesn’t occur. In addition, decreasing the amount of storage which is needed at various sites on the system. The DRS algorithm proved that the mutual exclusion is achieved. Whereas, deadlock and starvation are impossible to occur. Thus development mutual exclusion algorithm is one of the most appropriate for mobile computer systems.

Keywords:
Distributed systems, synchronization, mutual exclusion, mobile computing.


References:

1.       Sharieh, A., Itriq, M., & Dbabat, W. (2008). A dynamic resource synchronizer mutual exclusion algorithm for wired/wireless distributed systems. American Journal of Applied Sciences, 5(7), 829-834.‏
2.       Badrinath, B. R., Acharya, A., & Imielinski, T. (1994, June). Structuring distributed algorithms for mobile hosts. In Distributed Computing Systems, 1994., Proceedings of the 14th International Conference on (pp. 21-28). IEEE.‏

3.       Liu, D., Liu, X., Qiu, Z., & Yan, G. (2003). A high efficiency Distributed Mutual Exclusion algorithm. In Advanced Parallel Processing Technologies (pp. 75-84). Springer Berlin Heidelberg.‏

4.       Erciyes, K. (2004). Distributed mutual exclusion algorithms on a ring of clusters.In Computational Science and Its Applications–ICCSA 2004 (pp. 518-527). Springer Berlin Heidelberg.‏

5.       Ricart, G., & Agrawala, A. K. (1981). An optimal algorithm for mutual exclusion in computer networks. Communications of the ACM, 24(1), 9-17.

6.       Lejeune, J., Arantes, L., Sopena, J., & Sens, P. (2015). A fair starvation-free prioritized mutual exclusion algorithm for distributed systems. Journal of Parallel and Distributed Computing, 83, 13-29.‏

7.       Tamhane, S. A., & Kumar, M. (2012). A token based distributed algorithm for supporting mutual exclusion in opportunistic networks. Pervasive and Mobile Computing, 8(5), 795-809.‏

8.       Lodha, S., & Kshemkalyani, A. (2000). A fair distributed mutual exclusion algorithm. Parallel and Distributed Systems, IEEE Transactions on, 11(6), 537-549.‏

9.       Ding, Z., Zhou, M., & Wang, S. (2014). Ordinary Differential Equation-Based Deadlock Detection. Systems, Man, and Cybernetics: Systems, IEEE Transactions on, 44(10), 1435-1454.‏

10.    Du, Y., & Gu, N. (2015, December). Accelerating Reachability Analysis on Petri Net for Mutual Exclusion-Based Deadlock Detection. In 2015 Third International Symposium on Computing and Networking (CANDAR) (pp. 75-81). IEEE.‏

11.    Lodha, S., & Kshemkalyani, A. (2000). A fair distributed mutual exclusion algorithm. IEEE Transactions on Parallel and Distributed Systems, 11(6), 537-549.‏

12.    Lamport, L. (1978). Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7), 558-565.‏

13.    Jani, K., & Kshemkalyani, A. D. (2004, December). Performance of fair distributed mutual exclusion algorithms. In International Workshop on Distributed Computing (pp. 2-15). Springer Berlin Heidelberg.

14.    Kanrar, S., Chattopadhyay, S., & Chaki, N. (2013). A New Link Failure Resilient Priority Based Fair Mutual Exclusion Algorithm for Distributed Systems. Journal of network and systems management, 21(1), 1-24.

15.    Lejeune, J., Arantes, L., Sopena, J., & Sens, P. (2015). A fair starvation-free prioritized mutual exclusion algorithm for distributed systems. Journal of Parallel and Distributed Computing, 83, 13-29.

16.    Kundu, S. (2005, December). Deadlock-Free distributed relaxed mutual-exclusion without revoke-messages. In International Workshop on Distributed Computing (pp. 463-474). Springer Berlin Heidelberg.‏

17.    Suzuki, I., & Kasami, T. (1985). A distributed mutual exclusion algorithm. ACM Transactions on Computer Systems (TOCS), 3(4), 344-349.

18.    Singhal, M. (1989). A heuristically-aided algorithm for mutual exclusion in distributed systems. IEEE transactions on computers, 38(5), 651-662.‏

19.    Raymond, K. (1989). A tree-based algorithm for distributed mutual exclusion. ACM Transactions on Computer Systems (TOCS), 7(1), 61-77.‏

20.    Itriq, M., Dbabat, W., & Sharieh, P. (2013). Adaptive Dynamic Resource Synchronization Distributed Mutual Exclusion Algorithm (ADRS). Journal of Theoretical & Applied Information Technology, 53(3).‏

21.    Altamony, H., Alshurideh, M., & Obeidat, B. (2012). Information Systems for Competitive Advantage: Implementation of an Organisational Strategic Management Process. Proceedings of the 18th IBIMA Conference on Innovation and Sustainable Economic Competitive Advantage: From Regional Development to World Economic, Istanbul, Turkey, 9th-10th May.

22.    Alkalha, Z., Al-Zu’bi, Z., Al-Dmour, H., & Alshurideh, M. (2012). Investigating the effects of human resource policies on organizational performance: An empirical study on commercial banks operating in Jordan. European Journal of Economics, Finance and Administrative Sciences, 51, 44-64.

23.    Masa’deh, R., Tayeh, M., & Al-Jarrah, I. M. (2015). Accounting vs. Market-based Measures of Firm Performance Related to Information Technology Investments. International Review of Social Sciences and Humanities, 9 (1), 129-145.

24.    Shannak, R., Obeidat, B., & Almajali, D. (2010). Information Technology Investments: A Literature Review. Proceedings of the 14th IBIMA Conference on Global Business Transformation through Innovation and Knowledge Management: An Academic Perspective, Istanbul-Turkey, 23rd-24th June, pp.1356-1368.

 

15-20

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

4.

Authors:

Jincy Das, Judith Mercy Praveena S, Mirna Genesia Asian, A. Monisha, R. Sindhuja

Paper Title:

Communication and Obstacle Detection System for the Disabled using Arduino Lilypad

Abstract: This paper proposes the design of a hand glove using Arduino Lilypad and Zigbee for the people with disability in hearing, speaking and vision. There are nearly 900,000 people who are deaf and dumb and 285 million people who are blind. This device would help for   communication by the bending of flex sensors which are fixed on the glove and the obstacles are detected by Ultrasonic sensor. And the combination of input is processed by the microcontroller Arduino Lilypad. The processed value is transmitted through the Zigbee to Microcontroller- AT89S2051 and the sign language is recognized and the corresponding value is obtained through LCD and speaker. The obstacle is sensed by Ultrasonic sensor and the person is alerted through vibration. The proposed system is compact, wireless and easy to use.

Keywords:
Arduino Lilypad, Flex sensor, Hand glove, Microcontroller- AT89S2051, Ultrasonic sensor, Vibration motor, Voice module-WTV040, Zigbee-CC2500.


References:

1.       Arslan Arif, Syed Tahir Hussain Rizvi, Iqra Jawaid, Muhammad Adam Waleed, Muhammad Raheel Shakeel “Techno-talk: An American Sign Language (ASL) Translator.2016 International Conference on Control, Decision and Information Technologies (CoDIT) – IEEE Conference Publications.
2.       P.Vamsi Praveen, K.Satya Prasad “Electronic Voice to Deaf and Dumb People Using Flex Sensor”. International Journal of Innovative Research in Computer and Communication Engineering – Vol.4, Issue 8, August 2016.

3.       Dhiraj Gupta, Pankhuri Singh, Khushbu Pandey, Jaya, Solanki “Design and Development of a Low Cost Electronic Hand Glove for Deaf and Blind”. IEEE-2015, 2nd International Conference on Computing for Sustainable Global Development (INDIACom).

4.       Neha Niharika, Heena, Bhavnesh Jaint “An Electronic Aid for the Mobility of Visual Impaired “ IEEE-2015.

5.       Ranjit A Wagh, Dr.U.B.S. Chandrawat “Hand Gloves for Deaf and Mute Person using Flex Sensor a Survey”. International Conference on Global Trends in Engineering, Technology and Management ICGTETM – 2016.

6.       Thuong N.Hoang, Ross T.Smith, Bruce H.Thomas “Ultrasonic Glove Input Device for Distance Based Interaction”.

7.       Adam Keyes, Mathew D’Souza and Adam Postula “Navigation for the Blind Using a Wireless Sensor Haptic Glove “- 4th Mediterranean Conference on Embedded Computing MECO – 2015.

8.       Mrs.Neela Harish, Dr.S.Poonguzhali “Design and Development of Hand Gesture Recognition System for Speech Impaired People”. – International Conference on Industrial Instrumentation and Control (ICIC) – 2015 May.

9.       J.Thilagavathy, A.Jeyapaul Murugan, S.Darwin “Embedded Based Hand Talk Assisting System for Deaf and Dumb. International Journal of Engineering Research and Technology (IJERT) – Vol.3, Issue 3, 2014 March.

10.    Leah Buchley and Michael Eisenberg. “The Lilypad Arduino: Toward Wearable Engineering for Everyone – IEEE.

 

21-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

5.

Authors:

Mena Ahmed, Abdul Halim Ghazali, Thamer Ahmed Mohammad, Badronnisa Yusuf, Aminuddin Abdul Ghani

Paper Title:

Hydraulic Simulation of Flow Around Spur Dikes

Abstract:  The morphological changes of rivers, which are manifested by bed and banks deformations, show a direct relationship with water flow and sediment transport. Spur dikes are among the most common structures used to regulate velocity distribution and control sedimentation in a river section. This paper aims to simulate the hydraulic properties of steady turbulent flow in a straight rectangular open channel which has spur dikes with various configurations, such as number, alignment and lengths. The effects of the spur dikes on the velocity distribution have been evaluated three-dimensional (3D) Computational Fluid Dynamic (CFD) method. The simulated results from the model are calibrated and validated using data obtained from physical model. Different scenarios with spur dikes were simulated, and the results were demonstrated using the isovels, velocity magnitudes and mass exchange between spur dikes fields and main flow. Eventually, each scenario gives a better understanding on employing spur dikes for river restoration, enhancing navigation (by increasing water depth and rearranging the thalweg line), and protecting abutments and pump intakes against erosion as well as creating stable aquatic habitat.

Keywords:
 Hydraulic simulation, velocity distribution, spur dike, river restoration.


References:

1.       Azinfar, H., “Flow resistance and associated backwater effect due to spur dikes in open channels,” Thesis, University of Saskatchewan, Saskatoon, Canada, 2010.
2.       Chang, Y., Hsieh, T., Chen, C., & Yang, J., “Two-dimensional numerical investigation for short- and long-term effects of spur dikes on weighted usable area of rhinogobius candidianus (Goby),” Journal of Hydraulic Engineering, (December) 2013, 1297–1303.

3.       Chrisohoides, A., Sotiropoulos, F., & Sturm, T.W., “Coherent structures in flat-bed abutment flow: computational fluid dynamics simulations and experiments” Journal of Hydraulic Engineering, 129(3), 2003, 177-186.

4.       Dargahi, B., “Controlling mechanism of local scouring,” Journal of Hydraulic Engineering, 116 (10), 1990 , 1197-1214.

5.       Engelhardt, C., Kruger, A., Sukhodolov, A., & Nicklisch, A. “A study of  phytoplankton spatial distributions, flow structure and characteristics of mixing in a river reach with groynes” J. Plankton Res., 26, 2004, 1351–1366.

6.       Hinterberger, C. “Three-dimensional and depth-average large eddy simulation of shallow water flows” Ph.D. thesis, Karlsruhe Univ., Karlsruhe, Germany, 2004.

7.       Kuhnle, R. A., Jia, Y., & Alonso, C. V., “Measured and simulated flow near a submerged spur dike” Journal of Hydraulic Engineering, 134 (7), 2008, 916–924.

8.       McCoy, A., Constantinescu, S. G., & Weber, L., “Exchange processes in a channel with two vertical emerged obstructions” Flow Turbul. Combust, 77, 2006, 97–126.

9.       McCoy, A., Constantinescu, S. G., & Weber, L., “A numerical investigation of the dynamics of coherent structures and mass exchange processes in a channel flow with two lateral submerged groynes” Water Resour. Res., 43, 2007, (43)5.

10.    McCoy, A., Constantinescu, G. & Weber, L. J., “Numerical investigation of flow hydrodynamics in a channel with a series of groynes” Journal of Hydraulic Engineering, 134(Feb.), 2008, 157–172.

11.    Melville, B. W. “Pier and Abutment Scour: Integrated Approach” Journal of Hydraulic Engineering, 123(2), 1997, 125-136.

12.    Pagliara, S., & Kurdistani, S. M. “Flume experiments on scour downstream of wood stream restoration structures” Geomorphology, 279, 2017, 141-149.

13.    Reynolds, C. S. “Potomoplankton: Paradigms, paradoxes, prognoses. Algae and aquatic environment” Biopress, Bristol, U.K., 1988, 285–311.

14.    Shi, F., Svendsen, I.A., Kirby, J.T. & McKee Smith, J. “A curvilinear version of a quasi 3D near shore circulation model” Coastal Engineering, 49(1–2), 2003, 99–124.
15.    Shields, F.D. “Fate of Lower Mississippi River habitats associated with river training dikes. Journal of Aquatic Conservation” Marine and Freshwater Conservation, 5(2), 1995, 97-108.
16.    Shields, F. D., Cooper, C. M., and Knight, S. S. 1995. Experiments in stream restoration. Journal of Hydraulic Engineering, 121, 494–502.

17.    Tingsanchali, T. & Maheswaran, S. “2-D depth-averaged flow computation near groyne” ASCE, Journal of Hydraulic Engineering, 116, 1990, 71-86.

18.    Tominaga, A., Ijima, K. & Nakano, Y. “Flow structures around submerged spur dikes with various relative height,” Proc. of 29th IAHR Congress, Beijing, China, Theme D, Hydraulic Structures, 2001, 421-427.

19.    Uijttewaal, W., & Van Schijndel, S. A. H. “The complex flow in groyne fields: Numerical modeling compared with experiments” Proc., River Flow 2004, Naples, Italy, 1331–3838.

20.    Wind, H.G., Vreugdenhil, C.B. “Rip-current generation near structures’ Journal of Fluid Mechanics 171, 1986, 459–476.

21.    Yossef, M. F. M. “The effects of groynes on rivers (literature review),” Delft Cluster Report No. DC1-334-4, Delft University, the Netherlands, 2002, 57-63.

 

24-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

6.

Authors:

Meenal P.Talekar, Ravindra Kale

Paper Title:

Review on Cryptoleq: Single Instruction Set Abstract Machine

Abstract: Today data communication mainly depends upon digital data communication, where is data security is prior requirement which become crucial now days in every sector. So in order to protect it, various methods and Algorithm have been implemented. Cryptography combines Science, Mathematics, Computer Engineering and Networking. The purpose of this research paper is (i) to find the best cryptographic algorithm for computations (ii) to study the Cryptoleq system which (iii) and finally the comparison of performance of algorithm with Cryptoleq and without Cryptoleq.

Keywords:
single instruction machine, heterogeneous computer, mathematical computations, encryption.


References:

1.       Oleg Mazonka, Nektarios Georgios Tsoutsos, “Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation” in (2016).
2.       S. Halevi and V. Shoup, “Bootstrapping for HElib,” in Advances in Cryptology. Heidelberg, Germany: Springer,, 641–670,2015.

3.       J. Zimmerman, “How to obfuscate programs directly,” in Advances in Cryptology. Heidelberg, Germany: Springer, 2015, pp. 439–467.

4.       S. Halevi and V. Shoup. HElib: Design and Implementation of a Homomorphic-Encryption Library, accessed on Nov. 13, 2015.

5.       D. Apon, Y. Huang, J. Katz, and A. J. Malozemoff, “Implementing cryptographic program obfuscation,” in Proc. IACR Cryptol. ePrint Arch., 2014, p. 779.

6.       S. Garg, C. Gentry, S. Halevi, and M. Zhandry, “Fully secure functional encryption without obfuscation,” in Proc. IACR Cryptol. ePrint Arch.,2014, p. 666.

7.       P. T. Breuer and J. P. Bowen, “A fully homomorphic crypto-processor design,” in Engineering Secure Software and Systems. Heidelberg, Germany: Springer, 2013, pp. 123–138.

8.       Naser A W S and Bin Md Fadli (2013), “ Use of Cryptography in Cloud Computing”, pp. 179-184, proceedings of IEEE International Conference on Control System Malaysia.

9.       Shahzadi Farah et al.”An Experimental Study on Performance Evaluation of Asymmetric Encryption Algorithms”, Recent Advances in information Science, Proceeding of the 3rd European Conf. of Computer Science, (EECS-12)  2012.

10.    Ramgovind S, Eloff M  and smith E “ The management of security in Cloud Computing”, Proceedings of IEEE Conference 2010.

 

29-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Ananya Kalita, Arnob Bormudoi, Mimi Das Saikia

Paper Title:

Probability Distribution of Rainfall and Discharge of Kulsi River Basin

Abstract: The frequency analysis of daily rainfall data of 24 years was carried out to determine the annual one day maximum rainfall and discharge of Ukiam. For evaluation of observed and expected values Weibull’s plotting position Gumbel, Log Pearson and Log normal probability distribution functions were fitted. For determination of goodness of fit chi square test was carried out by comparing the expected values with the observed values. The results found showed that the Log Pearson and Log Normal were the best fit probability distribution for determination of annual one day maximum rainfall and discharge for different return periods respectively.

Keywords:
  Probability distribution, Chi-Square Value


References:

1.       Benson, M. A. (1968). Uniform flood frequency estimating methods for federal agencies. Water Resources Research, 4(5) : 891-908.
2.       Bhakar  S. R., Iqbal Mohammed,  Devanda Mukesh, Chhajed  Neeraj and  Bansal Anil K.(2008). probablity analysis of rainfall at kota, Indian J. Agric. Res., 42 (3) : 201 -206.

3.       Choudhury P. And Bora Kaushik (2015), “Estimation of annual maximum daily rainfall of Silchar, Assam,” International Conference on Engineering Trends and Science & Humanities ISSN: 2348 – 8352.

4.       Chow, V.T., “Applied Hydrology”, McGraw-Hill Book Company Inc., NewYork, N.Y., 1988.

5.       Dingre S, Atre AA(2005). Probability analysis for prediction of annual  maximum daily rainfall of Srinagar region (Kashmir valley). Indian Journal of Soil Conservation , 33(3): 262-263.

6.       Dzubakova,K.(2010),Rainfallrunoffmodeling:Itsdevelopment,classification and possible applications. ACTA Geographical Univerciti Comenianae, 54, 2010, N0. 2, pp 173-181.

7.       Gharagozlou A., “Crisis Management (Flood) and GIS,” Geomatics College of NCC of Iran, Tehran, 2010, pp. 23-29.

8.       Gumbel, E. J. (1958). Statistics of Extremes, Columbia     University Press, New York.

9.       Heywood LAN, S, Cornelius and S. Carver, “Cornelius-An Introduction to Geographic Information Systems,” chap., 1998, pp. 2-5

10.    Jeevarathnam K. Jaykumar K(1979). Probability analysis for prediction of annual maximum daily rainfall for Ootacamund. Indian Journal of Soil Conservation, 7(1): 10-16.

11.    Kumar, D. and Bhattacharya, R. (2011), Distributed Rainfall Runoff Modelling. International Journal of Earth Sciences and Engineering, 4,(6) SPL, pp 270-275.

12.    Kumar, A.(2000). Prediction of annual maximum daily rainfall of Ranichauri (Tehri Garhwal) based on probability analysis. Indian Journal of Soil Conservation, 28 : 178-180.

13.    Kumar, A.,K. K. Kaushal and R.D. Singh (2007). Prediction of annual maximum daily rainfall of Almora based on probability analysis . Indian Journal of Soil Conservation, 35 : 82-83.

14.    Kumar Rajneesh and Bhardwaj Anil (2015). Probability analysis of return period of daily maximum rainfall in annual data set of Ludhiana, Punjab Indian J. Agric. Res., 49 (2) : 160-164.

15.    Prakash C, Rao DH(1986). Frequency Analysis of rain data for crop planning (Kota). Indian Journal of Soil Conservation, 14(2):23-26.

16.    Subramanya, K., “Engineering Hydrology”, McGraw-Hill Book Company Inc., New York, N.Y., 1999.

17.    Subudhi, R. (2007). Probability analysis for prediction of annual maximum daily rainfall of Chakapada block of Kandhamal district in Orissa. Indian Journal of Soil Conservation, 35: 84-85.

18.    Upadhaya, A. and S. R. Singh (1998). Estimation of consecutive day’s maximum rainfall by various methods and their comparison. Indian Journal of Soil Conservation, 26: 193-201.

19.    Vivekanandan, N. (2012). Intercomparison of Extreme Value Distributions for Estimation of ADMR. International Journal of Applied Engineering and Technology, 2(1) : 30-37.

31-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

8.

Authors:

Sandeep C. S, Sukesh Kumar A, Susanth M. J.

Paper Title:

The Online Datasets Used to Classify the Different Stages for the Early Diagnosis of Alzheimer’s Disease (AD)

Abstract:  Alzheimer Disease (AD) is one of the common forms of dementia which is an irreversible neurodegenerative progressive disorder of the brain which affects the elderly population above the age of 65. Alzheimer is a brain disease that causes problems with memory, thinking and behavior. It is severe enough to interfere with daily activities. Alzheimer symptoms are characterized by memory loss that affects day-to-day function, difficulty performing familiar tasks, problems with language, disorientation of time and place, poor or decreased judgment, problems with abstract thinking, misplacing things, changes in mood and behavior, changes in personality and loss of initiative. There are different types of tests associated with AD such as neuropsychological tests, laboratory tests and various imaging modalities for the early diagnosis of AD. Although these tests are available, they are inadequate for the definite diagnosis of the disease. In this paper we focus on the databases related to AD such as ADNI (Alzheimer Disease Neuroimaging Initiative), OASIS (Open Access Series of Imaging studies), Alz Gene, AD&FTDMDB (The Alzheimer Disease & Frontotemporal Dementia Mutation Database), (CAMD) Alzheimer’s disease Database and NAAC( National  Alzheimer’s  Coordinating  Center), TREAD (Trajectory-Related Early Alzheimer’s Database), Coalition Against Major Diseases use of the soft computing techniques and image analysis from the different imaging modalities in an efficient way for making a definite diagnosis and early prediction of AD. Our aim is to predict the early diagnosis in a reliable manner such that to combine the values of different tests with the help of soft computing techniques to develop software tool for a definite diagnosis.

Keywords:
Alzheimer Disease, Dementia, ADNI, OASIS, AlzGene, AD&FTDMDB, TREAD, NAAC. Soft Computing techniques, image analysis.


References:

1.       Sandeep C S, Sukesh Kumar A, Susanth M J “The Early Diagnosis Of Alzheimer Disease (Ad) Using CAMD, TREAD And NAAC Databases” International Journal for Science and Advance Research In Technology, ISSN ONLINE 2359-1052, IJSART – Volume 3 Issue 3 –MARCH 2017:366-371
2.       A Review on the Early Diagnosis of Alzheimer’s Disease (AD) through Different Tests, Techniques and Databases AMSE JOURNALS –2015-Series: Modelling C; Vol. 76; N° 1; pp 1-22 Submitted June 2014; Revised Dec. 26, 2014; Accepted Feb. 20, 2015

3.       Sandeep C.S, Sukesh Kumar.A, “A Review Paper on the Databases Used for the Early Diagnosis of Alzheimer’s Disease(AD)”, in proceedings of the International Conference on Intelligent Engineering Systems , EASA College of Engineering, Coimbatore, India, ISBN 978-93-83459-33-9, Apr 2014, p.145

4.       Sandeep C.S, Sukesh Kumar.A, “A Review Paper on the Early Diagnosis of Alzheimer’s Disease(AD) through Profiling of Human Body Parameters”, Scientistlink, Coimbatore, India, 2013, International Journal of Computer Science and Engineering Communications (IJCSEC), Vol.1 Issue.1, pp. 21-29, December 2013.

5.       2010 Alzheimer’s Disease Facts and Figures. Rep. Vol. 6. Chicago: Alzheimer’s Association, 2010. Print. Alzheimer’s and Dementia.

6.       Alzheimer’s Association 2010. Web. 01 Oct. 2010. <http://alz.org>.

7.       Alzheimer’s Disease International, World Alzheimer Report 2011, “The benefits of early diagnosis and intervention,” by Prof Martin Prince, Dr Renata Bryce and Dr Cleusa Ferri, Institute of Psychiatry, King’s College London, Summary, p.4

8.       ADI press release (http://www.alz.co.uk/media/nr100921.html) for “Alzheimer’s Disease International World Alzheimer Report 2010: The Global Economic Impact of Dementia,” Prof Anders Wimo, Karolinska Institutet, Stockholm, Sweden Prof Martin Prince, Institute of Psychiatry, King’s College London, UK. Published by Alzheimer’s Disease International (ADI ) 21 September 2010

9.       Healthy Aging-Normal Aging.” WebMD – Better Information. Better Health.Web.12Oct.2010.<http://www.webmd.com/healthy-aging/tc/healthy-aging-normal-aging?page=2>.

10.    Dementia Definition – Alzheimer’s Disease Information on MedicineNet.com.” Medicine Net. 21June 2002. Web. 10 Oct.2010.

11.    Mayo Clinic Medical Information and Tools for Healthy Living. 2010 Mayo Foundation for Medical Education and Research. Web. 21 Nov. 2010.

12.    Frosch, M.P., D.C. Anthony and U.D. Girolami, 2010. The Central Nervous System. In: Robbins and Cotran Pathologic Basis of Disease, Robbins, S.L., V. Kumar, A.K. Abbas, R.S. Cotran and N. Fausto (Eds.), Elsevier srl, Philadelphia, ISBN-10: 1416031219, pp: 1313-1317.

13.    Harvey, R.A., P.C. Champe, B.D. Fisher, 2006. Lippincott’s Illustrated Reviews: Microbiology. 2nd Edn., Lippincott Williams and Wilkins, ISBN-10: 0781782155,pp: 432.

14.    Cummings, J.L., H.V. Vinters, G.M. Cole and Z.S. Khachaturian, 1998. Alzheimer’s disease: etiologies, pathophysiology, cognitive reserve and treatment opportunities. Neurology. 51: 2-17. PMID: 9674758

15.    Yaari, R. and J. Corey-Bloom, 2007. Alzheimer’s disease: Pathology and pathophysiology. Semin Neurol. 27: 32-41.

16.    https://www.radiologyinfo.org/

17.    Meha Fatima Aftab and Rizwana S. Waraich /, a review of biochemical markers for early diagnosis of alzheimer’s disease ,American Journal of Neuroscience 3 (2) (2012) 54-62

18.    http://adni.loni.usc.edu/

19.    http://www.oasis-brains.org/

20.    https://www.ucl.ac.uk/

21.    https://www.alz.washington.edu/

22.    David Darby1 , Amy Brodtmann1 , Michael Woodward1 , Colin Masters2 , 1 Florey Institute of Neuroscience and Mental Health, Parkville VIC, Australia; 2 University of Melbourne, Melbourne, VIC, Australia THE TRAJECTORY-RELATED EARLY ALZHEIMER’S DATABASE (TREAD) STUDY,P4-188

23.    https://www.molgen.ua.ac.be/ADMutations/

24.    https://c-path.org/programs/camd/

25.    http://www.alzgene.org/

26.    A good introduction to evolutionary computing: http:// www.cs.bham.ac.uk/Mirrors/ftp.de.uu.net/EC/clife/www/top.htm

 

38-45

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Purushottam Sahu, Santosh Kumar Mishra, Shatendra Kumar Sahu

Paper Title:

Surface Alloying of Aluminum Alloy (Lm4) With Iron Powder using Tig Welding

Abstract: Development of Fe–Al composite layer by utilizing combination surface alloying process with blend of Al and Fe powders has been examined to enhance the surface hardness of cast aluminum amalgam LM4, business Al–Si compound substrate. Tungsten Arc welding procedure is utilized to adjust the surface. Components, for example, welding current, welding speed, terminal to work separation are changed to the composite the surface of LM4 with preplaced press covering on the substrate at different levels of welding current (3-6mm/sec) and cathode to work remove (2-3mm) in the argon gas protecting. The microstructure of the alloyed layer changed with expanding Fe content from hypo-eutectic structure to hyper-eutectic structure. Hardness of the surface changed LM4 combination shifts from HV98.96 to HV141.9 as for the elements chose and their levels [25]. The alloyed examples with low warmth input demonstrates high hardness when terminal to work separation is kept steady, as the cathode to work remove increments small scale hardness additionally increments. The greatest increment in hardness is 40.25% accomplished at Welding current 100A, welding speed 5mm/sec, Electrode to work separate 3mm because of the best possible dissemination of iron particles into the substrate bringing about the arrangement of Al-Fe  intermetallic.

Keywords:
 HV98.96 to HV141.9, LM4, Utilizing Combination, (3-6mm/sec), Intermetallic.


References:

1.       A.K. Gaiduchenko, S.G. Napara-Volgina (1995), Development of iron powder metallurgy, Powder Metallurgy and Metal Ceramics, retrieved 13 December 2013
2.       “What is iron powder?”. JFE Steel Corporation. Retrieved 8 January 2014.

3.       “Applications of Iron Powder”. JFE Steel Corporation. Retrieved 8 January 2014

4.       http://catalog.miniscience.com/Catalog/Metals/Iron_Powder.html

5.       http:/Type equation here./en.wikipedia.org/wiki/Vickers_hardness_test

6.       http://www.hardnesstesters.com/Applications/Vickers-Hardness-Testing.aspx

7.       R.L. Smith & G.E. Sand land, “An Accurate Method of Determining the Hardness of Metals, with Particular Reference to Those of a High Degree of Hardness,” Proceedings of the Institution of Mechanical Engineers, Vol. I, 1922, p 623–641.

8.       http://www.ukcalibrations.co.uk/vickers_htm.html

9.       ASTM E384-10e2

10.    ISO 6507-1:2005

11.    Vickers Test. Instron website.
12.    Smithells Metals Reference Book, 8th Edition, Ch. 22 “Hardness”.
13.    http://www.aibn.no/aviation/reports/1993-02-eng

14.    H.C Man, S Zhang, T.M Yue, F.T Cheng, Laser surface alloying of NiCrSiB on Al6061 aluminium alloy, Surface and Coatings Technology, Volume 148, Issues 2–3, December 2001, Pages 136-142, ISSN 0257-8972.

15.    Yongqing Fu, A.W. Batchelor, Yanwei Gu, K.A. Khor, Huting Xing, Laser alloying of aluminium alloy AA 6061 with Ni and Cr. Part 1. Optimization of processing parameters by X-ray imaging, Surface and Coatings Technology, Volume 99, Issue 3, 23 February 1998, Pages 287-294, ISSN 0257-8972, http://dx.doi.org/10.1016/S0257-8972(97)00569-0.

16.    Yongqing Fu, Andrew W Batchelor, Laser alloying of aluminium alloy AA 6061 with Ni and Cr. Part II. The effect of laser alloying on the fretting wear resistance, Surface and Coatings Technology, Volume 102, Issues 1–2, 1 April 1998, Pages 119-126, ISSN 0257-8972, http://dx.doi.org/10.1016/S0257-8972(97)00572-0.

17.    H.C. Man, S. Zhang, F.T. Cheng, Improving the wear resistance of AA 6061 by laser surface alloying with NiTi, Materials Letters, Volume 61, Issues 19–20, August 2007, Pages 4058-4061, ISSN 0167-577X, http://dx.doi.org/10.1016/j.matlet.2007.01.016.

18.    M.H. Staia, M. Cruz, Narendra B. Dahotre, Microstructural and tribological characterization of an A-356 aluminium alloy superficially modified by laser alloying, Thin Solid Films, Volumes 377–378, 1 December 2000, Pages 665-674, ISSN 0040-6090, http://dx.doi.org/10.1016/S0040-6090(00)01448-6.

19.    P Petrov, Electron beam surface remitting and alloying of aluminium alloys, Vacuum, Volume 48, Issue 1, January 1997, Pages 49-50, ISSN 0042-207X, http://dx.doi.org/10.1016/S0042-207X(96)00240-0.

20.    Almeida, M. Anjos, R. Vilar, R. Li, M.G.S. Ferreira, W.M. Steen, K.G. Watkins, Laser alloying of aluminium alloys with chromium, Surface and Coatings Technology, Volume 70, Issues 2–3, January 1995, Pages 221-229, ISSN 0257-8972, http://dx.doi.org/10.1016/0257-8972(94)02263-P.

21.    Takashi Ishikawa, Nobuki Yukawa, Kazuhiro Suzuki, Yutaka Suzuki, Takashi Jimma, Formability of superplastic aluminium alloy processed by mechanical alloying, Journal of Materials Processing Technology, Volume 68, Issue 3, 15 August 1997, Pages 236-240, ISSN 0924-0136, http://dx.doi.org/10.1016/S0924-0136(96)00107
0.

22.    K.G. Budinski, Surface Engineering for Wear Resistance, Prentice-Hall, 1988

23.    J.R. Davis, Ed., Surface Engineering for Corrosion and Wear Resistance, ASM International and IOM Communications, 2001

24.    G. Krauss, Advanced Surface Modification of Steels, J. Heat Treat.,Vol 9 (No.2), 1992, p 81–89

25.    S. Lampman, Introduction to Surface Hardening of Steels, Heat Treating,Vol4, ASM Handbook,1991, p 259–267

 

46-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Hazem Samih Mohamed

Paper Title:

Numerical analysis on Pre-Stressed Steel I-Beams

Abstract: Pre-stressing with external tendon is one of the most efficient techniques for rehabilitation of existing structures, strengthening of steel structures, controlling the structure deflection and reduction of the construction cost. This paper consisting of a parametric study to investigate the effect of several parameters on the structure behavior. The key variables examined were the number of deviator, eccentricity of the external tendon, pre-stressing technique. ANSYS software has been used to analyze and simulate the process of applying the pre-stressing force and the structure loads. Geometrical imperfections and buckling modes of the unloaded beam are taken into consideration as an initial condition. The results show that these variables impose additional challenges on the accurate prediction of pre-stressed steel structures performance during its service life.

Keywords:
Tendon; External pre-stressing; ANSYS; Steel I-beam; Deviator


References:

1.       Dunker, K. F. (1985). “Strengthening of simple span composite bridges by post-tensioning.”
2.       Vernigora, E., and Marcil, J. R. M. (1969). “Bridge Rehabilitation and Strengthening by Continuous Post-Tensioning.” Prestressed concrete institute journal, 14(2), 88-104.

3.       Kandall, C. (1968). “Increasing Load-Carrying Capacity Of Existing Steel Structures.” Civil Engineering, 38(10), 48-57.

4.       Knee, D. (1966). “The Prestressing of Steel Girders.” Structural Engineer.

5.       Troitsky, M. S. (1990). Prestressed steel bridges: Theory and design, Van Nostrand Reinhold New York.

6.       Bradford, M. A. (1991). “Buckling of prestressed steel girders.” Engineering journal, 28(3), 98-101.

7.       Aparicio, A. C., Ramos, G., and Casas, J. R. (2002). “Testing of externally prestressed concrete beams.” Engineering Structures, 24(1), 73-84.

8.       Aravinthan, T., Witchukreangkrai, E., and Mutsuyoshi, H. (2005). “Flexural behavior of two-span continuous prestressed concrete girders with highly eccentric external tendons.” ACI Structural Journal, 102(3), 402-411.

9.       El-Ariss, B. (2004). “Stiffness of reinforced concrete beams with external tendons.” Engineering Structures, 26(14), 2047-2051.

10.    Lou, T. J., and Xiang, Y. Q. (2006). “Finite element modeling of concrete beams prestressed with external tendons.” Engineering Structures, 28(14), 1919-1926.

11.    Ariyawardena, N., and Ghali, A. (2002). “Prestressing with unbonded internal or external tendons: analysis and computer model.” Journal of Structural Engineering, 128(12), 1493-1501.

12.    Saadatmanesh, H., Albrecht, P., and Ayyub, B. M. (1989). “Experimental study of prestressed composite beams.” Journal of Structural Engineering, 115(9), 2348-2363.

13.    Chen, S., and Jia, Y. (2010). “Numerical investigation of inelastic buckling of steel–concrete composite beams prestressed with external tendons.” Thin-Walled Structures, 48(3), 233-242.

14.    Chen, S., and Zhang, Z. (2006). “Effective width of a concrete slab in steel–concrete composite beams prestressed with external tendons.” Journal of Constructional Steel Research, 62(5), 493-500.

15.    Lorenc, W., and Kubica, E. (2006). “Behavior of composite beams prestressed with external tendons: Experimental study.” Journal of constructional steel research, 62(12), 1353-1366.

16.    Oh, J. Y., Lee, D. H., and Kim, K. S. (2012). “Accordion effect of prestressed steel beams with corrugated webs.” Thin-walled structures, 57, 49-61.

17.    Aydin, Z., and Cakir, E. (2015). “Cost minimization of prestressed steel trusses considering shape and size variables.” Steel and Composite Structures, 19(1), 43-58.

18.    Gosaye, J., Gardner, L., Wadee, M. A., and Ellen, M. E. “Compressive behaviour and design of prestressed steel elements.” Proc., Structures, Elsevier, 76-87.

19.    Saito, D., and Wadee, M. A. (2009). “Buckling behaviour of prestressed steel stayed columns with imperfections and stress limitation.” Engineering Structures, 31(1), 1-15.

20.    Ellen, M. E., Gosaye, J., Gardner, L., and Wadee, M. A. “Design and construction of long-span post-tensioned tubular steel structures.” Proc., 14th International Symposium on Tubular Structures, CRC Press, 687-693.

21.    Gosaye, J., Gardner, L., Wadee, M. A., and Ellen, M. E. (2014). “Tensile performance of prestressed steel elements.” Engineering Structures, 79, 234-243.

22.    Bourne, S. (2013). “Prestressing: Recovery of the lost art.” The Structural Engineer, 91(2), 12-22.

23.    Ponnada, M. R., and Vipparthy, R. (2013). “Improved method of estimating deflection in prestressed steel I-beams.” Asian Journal of Civil Engineering (BHRC), 14(5), 765-772.

24.    Boatman, B. (2010). “Prestressed vs. steel beams: Expected service life.” Lansing: State of Michigan Department of Transportation.

25.    Chen, Z., Liu, Z., and Sun, G. (2011). “Thermal behavior of steel cables in prestressed steel structures.” Journal of Materials in Civil Engineering, 23(9), 1265-1271.

26.    Belletti, B., and Gasperi, A. (2010). “Behavior of prestressed steel beams.” Journal of Structural Engineering, 136(9), 1131-1139
.

 

53-57

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Akshay Ashok Sonawane, Sultan Shahajahan, Azhar Rehaman

Paper Title:

Design and Fabrication of an Inline Pipe Inspection Robot

Abstract:  already there are various designs available in the case of an inline-pipe inspection robot. This research paper aims at preparing a new design along with its fabrication process. For a start we studied the readily available deigns and there advantages as well as limitations. We have used CATIA V5R19 to design our robot. The key factors we have considered while in the process of design are mobility, safety in operation, steer ability, and the most important one is size and shape adaptability. Our model is a wireless flexible pipe inspection robot which is capable to pass through a pipe with diameter in range of 6-9 inches. We can detect various defects such as cracks, corrosion, buckles, etc.

Keywords:
 inline pipe-inspection, mobility, shape adaptability, wireless.


References:

1.        Ankit Nayak , S. K. Pradhan, “Design of a New In-Pipe Inspection Robot,” in 12th Global congress on manufacturing and management, GCMM 2014.
2.        Lee Vuen Nee, I. Elamvazuthi, Timothy Ganesan, M.K.A. Ahamed Khan and S. Parasuraman, “Development of a Laboratory-scale Pipeline Inspection Robot,” in 2015 IEEE International Symposium on Robotics and Intelligent Sensors (IRIS 2015).

3.        Kentarou Nishijima, Yixiang Sun, Rupesh Kumar Srivastava Harutoshi Ogai, Bishakh Bhattacharya, “Advanced pipe inspection robot using rotating probe,” in The Fifteenth International Symposium on Artificial Life and Robotics 2010 (AROB 15th ’10), B-Con Plaza, Beppu,Oita, Japan, February 4-6, 2010.

4.        Nur Shahida Roslin, Adzly Anuar, Muhammad Fairuz Abdul Jalal, Khairul Salleh Mohamed Sahari, “A Review: Hybrid Locomotion of In-pipe Inspection Robot,” in 2012 International Symposium on Robotics and Intelligent Sensors.

5.        Xin Li, Wuyi Yu, Xiao Lin, and S. S. Iyengar, “On Optimizing Autonomous Pipeline Inspection,” in IEEE Transactions On Robotics, Vol. 28, No. 1, February 2012.

6.        Hanaa Said Salim Al-Hajry and G.R. Rameshkumar, “Designand Testing of Pipeline Inspection Robot,” in International Journal of Engineering Innovation & Research  Volume 2, Issue 4, ISSN: 2277 – 5668.

7.        Ankit Nayak, S. K. Pradhan, “Investigations of Design Issues Related To In-Pipe Inspection Robots,” in International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 3, March 2014).

8.        Atul A. Gargade, Dr. Shantipal S. Ohol, “Development of In-pipe Inspection Robot,” in IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 13, Issue 4 Ver. VII (Jul. – Aug. 2016), PP 64-72.

9.        E Navin Prasad, M Kannan, A Azarudeen and N Karuppasamy, “Defect Identification In Pipe Lines Using Pipe Inspection Robot,” in IJMERR.

10.     Dr. Sharanabasappa C. Sajjan , Naveen Srivatsa H.S, Dinesh Kumar P, “Design And Development Of Pipe Inspection Robot,”  in  TROI.

 

58-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Vivek Kumar, Namrata Patil, Bhavesh Zope

Paper Title:

Solar Panel Selection for 5KW System

Abstract: The theme of this project work is solar panel selection which capacity is 5KW. The first phase of the project is introduction, prospects, configuration about Photo-Voltaic systems (PV systems) and study of photo-voltaic cells, modular and array. The second phase includes the selection of solar panel, efficiency, economic considerations and calculations of the photo-voltaic system. The photo-voltaic technology is an off-shoot of the evaluation in semiconductor technology during 1980s. Several different base materials and doping materials were tried during early 1980s. By mid 1980s the silicon has been adopted as base material for producing photo-voltaic cells by almost all the photo-voltaic cell manufacturers. They work on principle of the light energy of the sun is directly converted in to electrical energy.

Keywords:
  photo-volatic; cell; modular; array


References:

1.    Dr V.M. Domkundwar, and Anand V. Domkundwar, “Dhanpat Rai & Co. (P) LTD,” Phil. , page. 11.8-11.15.
2.    D.P. Kothari, “Renewable energy source and emerging techonologies”, 2nd ed. PHI Learning PVT LTD Delhi-110092, page.129-132.

3.    G.N. Tiwari, “Solar Energy Fundamental, Design, Modellingand Applictaion” Revised edition , Narosa Publication House new Delhi, page. 452.

4.    J. B Gupta, “A course in electrical Power,” S.K Kataria & Sons, page. I, 131.

5.    H.A. Kazem, “Renewable Energy in Oman: Status and Future Prospects”, Renewable and Sustainable Energy Review, vol. 15, page. 3465-3469, .

 

62-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Nazrin Nazar, A. Nizad

Paper Title:

Effect of Treated Recycled Aggregate on the Mechanical Properties of Polypropylene Fibre Reinforced Concrete

Abstract: The non-availability of materials is one of the major factors affecting the progress of construction. Natural resources are becoming insufficient to meet the increasing demand in construction. As a solution to the above problems, recycled aggregates from the demolished waste are now being used as replacement of natural aggregates. But the use of recycled aggregates drastically decreases the strength of concrete. This is mainly due to old mortar on the surface of aggregate which render the surface porous and makes it of inferior quality. Recent literatures suggests surface treatment to improve the strength. Therefore in this study, recycled aggregate that is treated in dil. HCl to remove the loose mortar is used instead of recycled aggregate. Also fibre reinforced concrete is now being widely used in industry due to its abrasion resistance, shrinkage control and impact resistance. The objective of this study is to find out the combined effect of treated recycled aggregate with polypropylene fibres and the strength properties are compared with that of conventional concrete. Mix proportion is done for M25 concrete. Natural coarse aggregate is replaced by treated recycled coarse aggregate in proportions of 0, 20, 40, 60, 80 and 100%. In all mixes the proportion of polypropylene fibre is kept constant at 0.2% by volume of concrete. From the test results it is inferred that the use of concrete, containing up to 60% replacement of natural coarse aggregate with treated recycled coarse aggregate can be economically and judiciously encouraged for structural applications.

Keywords:
Fibre reinforced concrete, polypropylene fibre, recycled aggregate, treated recycled aggregate.


References:

1.       Akca, K. R., O. Cakik, M. Ipek (2015) Properties of polypropylene fibre reinforced concrete using recycled aggregates, Construction and Building Materials, 98, pp.  620-630.
2.       Dharani, N., A. Ashwini, G. Pavitha and G. Arulraj (2013) Experimental investigation on mechanical properties of Recron 3s fibre reinforced hyposludge concrete, International Journal Of Civil Engineering And Technology, 4, pp. 182-189.

3.       Dilbas, H. and O. Cakir (2014) An investigation on mechanical and physical properties of recycled aggregate concrete (RAC) with and without silica fume, Construction and Building Materials, 61, pp. 50–59.

4.       Ede, A. N. and A. O. Ige (2014) Optimal polypropylene fibre content for improved compressive and flexural strength of concrete, Journal of Mechanical and Civil Engineering, 11, pp. 129-135.

5.       Ismail, S. and M. Ramli (2013) Engineering properties of treated recycled concrete aggregate (RCA) for structural applications, Construction and Building Materials, 44, pp. 464–476.

6.       Kakooei, S., H. M. Akil, M. Jamshidi and J. Rouhi (2012) The effects of polypropylene fibres on the properties of reinforced concrete structures, Construction and Building Materials, 27, pp. 73-77.

7.       Khan, S., R. A. Khan, A. R. Khan, M. Islam and S. Nayal  (2015) Mechanical properties of polypropylene fibre reinforced concrete for M 25 & M 30 mixes: A comparative study, International Journal of Scientific Engineering and Applied Science, 1, pp. 327-340.

8.       Kwan, W. H., M. Ramli, K. J. Kam and M. Z. Sulieman (2012) Influence of the amount of recycled coarse aggregate in concrete design and durability properties, Construction and Building Materials, 26, pp. 565–573.

9.       Madhavi, T. C., L. S. Raju and D. Mathur (2014) Polypropylene fibre reinforced concrete: A Review, International Journal of Emerging Technology and Advanced Engineering , 4, pp. 114-119.

10.    Manzi, S., C. Mazzotti and M. C. Bignozzi (2013) Short and long-term behaviour of structural concrete with recycled concrete aggregate, Cement & Concrete Composites, 37, pp. 312–318.

11.    Wagih, A. M., H. Z. Karmoty, M. Ebid and S. H. Okba (2013) Recycled construction and demolition concrete waste as aggregate for structural concrete, Housing and Building National Research Center, 9, pp. 193–200.

 

66-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

14.

Authors:

Swati A.Patil, Suraj P. Ahirrao, Priya V. Chumble, Manali R. Navale, Tausif N. Mulani

Paper Title:

Industrial Waste Water Management by Implementing Wetland Ecosystem

Abstract: Constructed wetlands are natural alternative to technical methods of wastewater treatment, however our understanding of the complex processes caused by the plants, micro organisms, soil matrix and the substances in the wastewater, and how they all interact with each other, is still rather incomplete. The main objective of this project is to compare the parameters of industrial waste water sample which is treated by wetland ecosystem with another industrial waste water samples without applying wetland ecosystem. The Principle of this is to perform a preliminary comparative study between some coagulants on the removal of suspended solids organic matter and testing the Chemical and Biochemical Oxygen Demand from the industrial waste water. For implementation of wetland ecosystem, we are going to study specific plants which can be used for wetland ecosystem.

Keywords:
 industrial wastewater, characteristics of wastewater, constructed wetland, wetland ecosystem


References:

1.       Babatunde, A.O.; Zhao, Y.Q. “Constructive approaches towards water treatment works sludge management: an international review of beneficial re-uses” (2007)
2.       Calheiros, C. S. C., Rangel, A. O. S. S., and Castro, P. M. L. “Constructed wetland systems vegetated with different plants applied to the treatment of tannery wastewater” Water Res., 41, 1790–1798, (2007)

3.       Hans G. Peterson. “Use of constructed wetlands to process agricultural wastewater” Canadian Journal of Plant Sci. 78: 199–210(1998)

4.       Kapoor, A., Viraraghavan, T. Fungal Biosorption-an alternative treatment option for heavy metal bearing wastewater: a review. Bioresource. Technol. 53: 195-206(1995)

5.       Kadlec, R. H. and S. D. Wallace “Treatment Wetlands, Second Editions” Florida, CRC Press.(2009)

6.       Mungur, A. S., Shutes, R. B., Revitt, D. M., and House, M. A.“An assessment of metal removal by a laboratory scale wetland.” Water Science. Technol., 35(5), 125–133(1997)

7.       Villaescusa, I., Martinex, M., and Miralles, N. “Heavy metal uptake from aqueous solution by cork and yohimbe bark wastes.” J. Chem. Technol.Biotechnol., 75, 812–816(2000.)

8.       Knight, R.L., and Kadlec, R. H. “Treatment wetlands”, Lewis,Boca Raton, Fla. (1996)

9.       Siedel K. Patent: System for purification of polluted water. Washington DC.(1973)

10.    Barker, D. J. and Stuckey, D. C.“A review of soluble microbial products (SMP) in wastewatertreatment systems.” Water Research, 33(14), 30633082(1999).

 

72-74

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

15.

Authors:

R. Rathish, P. Mahendiran, R. Manikandan, M. Naveen Kumar, A. Pravin Kumar

Paper Title:

Fabrication of Solar Power using Vehicle

Abstract: Now a days without electrical energy there is nothing in the world. Electrical energy can be taken from various methods like wind mills, power plants. But the raw materials which are used for producing electrical energy is not sufficient for upcoming years. In order to overcome the   problem solar energy is necessary. It is an renewable, evergreen and everlasting energy. In our project we construct a  solar powered vehicle prototype  which convert the solar power  converted into electrical power  by the help of components like DC motor, Solar panel, DC battery

Keywords:
Electrical, DC motor, Solar panel, DC battery.


References:

1.    Jain A. Anderson, Ioannis A. Mitropoulos, Thomas McKay, Benjamin O’Brien, And Chris Melhuish, “Power For Robotic Artificial Muscles” IEEE/ASME Transaction son MechatronicsVol.16, No. 1,Feb 2011
2.    J.H. Lever A. Streeter And L.R.Ray “Performance Of A Solar-Powered Robot For Polar Instrument Networks”. Cold Regions Research And Engineering Laboratory Thayer School Of Engineering US Army Engineer Research And Development  Center Hanover

3.    Tom´As De J. Mateo Sanguine And Justo E. Gonz´ Alez Ramos “Smart Host Micro Controller For Optimal Battery Charging In A Solar-Powered Robotic Vehicle” IEEE/ASME Transactions On ISSN (Online) 2278-1021ISSN (Print) 2319-5940

4.    Theodore Amissah OCRAN, CAO Juny, CAO Binggan g, SU NXinghua,”Artificial Neural Network Maximum Power Point Tracker for Solar Electric Vehicle”Tsinghuascienceand technology, ISSN1007-021412/23 pp204-208 Volume10, , April 2005

5.    Nicolet-Irina Tatu, Catlin Alexandra “Modeling and Simulation of the Tracking Mechanism for a PV String” Department of ProductDesign, Mechatronics and Environment Transylvania University ofBrasov Romania

6.    Dr. R. C. Prasad “Design and Implementation of MPPT Algorithm for Solar Energy System “International Journal of Advanced Research in computer science and software engineering. Volume 3,Issue 10, October 2013

7.    N. Kemal Ure, Girish Chowdhary, Member, IEEE, Tuna Toksoz,Jonathan P. How, Senior Member, IEEE, Matthew A. Vavrina, and John Vian,”An Automated Battery Management System to Enable Persistent Missions With Multiple Aerial Vehicles” IEEE/ASME transactions on mechatronics 2013.

 

75-77

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Amruta Matkar, Tanmay Mhetre, Ashish More, Neha Gangraj

Paper Title:

Urine-The Source of Energy

Abstract:  The proposed work is all about electricity generation, whilst cleaning the urine ‘fuel’ and producing clean water in addition to fertilizer, and is focusing on small-scale MFC units, which have been shown to be more efficient and energy-dense. The continuous flow nature of the MFC technology facilitates continuous growth of the constituent biofilm organisms, which clean the input, and can be subsequently used as fertilizer. In essence, the more powerful the MFC is, the greater are the rates of urine utilization. A microbial fuel cell is a device that uses natural biological processes of ‘electric’ bacteria to turn organic matter, such as urine, into electricity. These fuel cells are efficient and relatively cheap to run, and produce nearly zero waste compared to other methods of electricity generation. In practice, urine will pass through the microbial fuel cell for the reaction to happen. From here, electricity is generated by the bacteria which can then be stored or used to directly power electrical devices. Microbial fuel cells could be a great source of energy in developing countries, particularly in impoverished and rural areas. To have created technology that can potentially transform the lives of poor people who don’t have access to, or cannot afford electricity, is an exciting prospect. I hope this will enable those in need to enjoy a better quality of life as a result of our research.e spacing. Fore more details, please download TEMPLATE HELP FILE from the website.

Keywords:
ACID (Anode Current Into Device), CCD (cathode current departs), MFC (Microbial Fuel Cell), CH4N2O (Molecular Formula of Urea), C5H4N4O3 (Uric Acid), Oxidant (Oxidizing Agent).


References:

1.    Ali Abul, Jun Zhang, “MFC: Design,Control oriented Modelling”, Michigan State University in partial fulfillment of the requirements for the degree of Mechanical Engineering – Master of Science 2015.
2.    Mahyudin Abdul Rachman, “Electricity from Biowaste based Gas Hydrogen as a Source of Renewable Energy”, 3rd International Conference On Informatics, Electronics & Vision 2014.

3.    Amarveer Singh, “Urine Powered Battery (UPB) for Low Power Sensors”,2015 International Conference on Sustainable Energy Engineering and Application (ICSEEA)

4.    Jaskiran Kaur,Amarpreet Singh, “Enhanced Urine Powered Battery (EUPB) for Low Power Applications”. IEEE WiSPNET 2016 conference.

5.    Wahidul Hasan, “Generation of Electricity Using Cow Urine”,International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 9 No. 4 Dec. 2014, pp.
1465-1471.

6.    Cochran, John F. and Mapother, D. E. “Superconducting Transition in Aluminum”. Physical Review 111. (1958).

7.    Charles, J.; Kopf, P. W.; Toby, S. “The Reaction of Pyrophoric Lead with Oxygen”. Journal of Physical Chemistry 70: 1478:10.1021/j100877a023. (1966).

 

78-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Richmond Adebiaye

Paper Title:

Interpreting Users’ Perceptions of Mobile Security Methods and Their Effectiveness

Abstract: The increasing adoption of open source operating system (OS) platforms, such as Android and iOS, have opened up new security vulnerabilities and threats to mobile devices and other wireless access technologies. Recent statistics show that mobile networks around the globe “generate exceedingly over 86 exabytes of traffic annually”.  Thus, mobile security vulnerabilities and threats such as SMS spam, rogue apps, adware, malware, cyber-attacks and unlawful eavesdropping have become an ever-increasing problem for mobile users around the world. This paper proposes a quantitative research survey to investigate mobile device security and the implications of security application recommendations for its users. The objective is to identify increased security risks, and recommend best security practices for mobile users. To obtain quantitative values, web-based questionnaires using the Likert scale were used, and data processed by factor analysis, ANOVA and multiple regression analysis tabulated along a continuum in numerical form. The study thus identifies and reveals the impacts of smartphone security threats such as mobile adware, rogue application downloads, and considers the suitability of smartphone security solutions offered by various vendors. This paper provided insights into users’ problems of malware, attack channels, black industry ‘chain of smartphone security’, and accessibility to smartphone security solutions introduced by mobile vendors. As this study adds to the available body of knowledge, it is anticipated that future research will continue to advance the available information regarding rogue applications, adware, malware, and other security threats related to mobile technology.

Keywords:
 Smartphones; Mobile security; Information Security; Android O/S; Vulnerabilities and Threats; iOS


References:

1.       Christian, M. (2014). Integrating Cloud Computing and Mobile Applications: A Comparative Study Based on Cloud and Sanscode, Journal of Cloud Computing. 2(14) 1-9.
2.       Gao, C, and Liu J. (2013). Modeling and Restraining Mobile Virus Propagation. IEEE Transactions on Mobile Computing, 12(3): 529-541.

3.       Greenberg, A. (2010). Google Pulls App that Revealed Android Flaw, Issues Fix, http://news.cnet.com/8301-270803-20022545-245.html.

4.       Harris, M, and Patten, K. (2013). Mobile Device Security Considerations for Small- and Medium-Sized Enterprise Business Mobility Integrated Information
Technology, Information Management and Computer Science, 22(1): 97-144

5.       Liu, D, Zhang, and Hu, K. (2013). A Survey on Smartphone Security, Applied Mechanics and Materials, (Vol 347-350): 3861-3865.

6.       Mavridis, I., & Pangalos, G. (2012). Security Issues in a Mobile Computing Paradigm. In I. Mavridis, & G. Pangalos, Communications and Multimedia Security (pp. 61-76). Springer US.

7.       Park, J., Yi, K and Jeong, Y. (2014). An Enhanced Smartphone Security Model based on Information Security Management Systems, Electronic Commerce Research, 14(3): 321-348.

8.       Patten, K and Passerini, K. (2007). Next Generation Small and Medium Enterprises Mobility Strategy Roadmap, Proceedings of ISOneWorldConference, Las Vegas, NV, 11-13 April.

9.       Waltz, M. (2011). Mobility Threats, Mobile Enterprise, 7 March, Accessed 9 Februrary 2013, http://mobileenterp rise.edgl.com/top-stories/Mobility-Threats71022

10.    Wei, J and Ozok, A. (2009). Development of a Mobile Commerce Security Analysis Method. Journal of Information Privacy & Security 5: 1; 28.

11.    Yaseen, B, and Tariq, M. (2012). Technical Comparison Between Android And IOS With Respect to Their Architecture. Technical Report Documentation Page,
Punjab University College of Information Technology, University (PUCIT), Report No:BCSF09A: 1- 16.

12.    Lookout, 2013. “2013 Mobile Threat Predictions”, Accessed 11 Februrary 2013,https://blog.lookout.com/blog/2012/12/13/2013-mobile-threat-predictions/

13.    Stat counter, 2013. “Top 8 Mobile Operating Systems in the United States from Jan 2012 to Jan 2013”, Stat Counter Global Stats, accessed 12 February 2013,http://gs.statcounter.com/#mobile_osUS-monthly-201201-

 

83-90

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Venkatesh Patil, Ganesh Satras, Mukund Pawar, Ranjitkumar Biradar

Paper Title:

Transformer Oil Temperature Monitoring with GSM Based Fault Detection

Abstract: Transformer is an important and costly device in the power system. The reliable and fault free operation of a decisive role in the availability of electricity. The ageing of transformer depends on several factors especially electrical and thermal stresses. Due to which incipient faults occurs which in turn if left undetected will cause deterioration and eventually lead to failure of the transformer. The presence of faults in transformer results in chemical decomposition of the transformer oil. The transformer oil is deteriorated due to the combination of the ageing process such as partial discharge (PD), electrical arcing and thermal ageing. But some faults occurs in the substation that faults are affect the transformer operation as well as transformer life. These faults are short circuit and open circuit faults. In this project, we will attempt to show that how to avoid such electrical equipment failures could be caused by temperature rise in transformer and short circuit, Open circuit in substation.

Keywords:
 AVR Microcontroller, LM35 Temperature Sensor, GSM Module Etc.


References:

1.    Karthik Parihar,Devesh Singh Pangtey,Bharat Singh Rana, “Transformer Oil Temperature Monitoring With Automatic Circuit Breaker” Volume 3, Issue 4 (April 2013) (ISSN 2231-4334).
2.    Piush Verma, Yog Raj Sood and Jashandeep Singh, “Review Of Important Diagnostics Parameters For Power Transformer.

3.    Z. Moravej *, S. Bagheri, “Condition Monitoring Techniques of Power Transformers: A

4.    Review” Vol. 3, No. 1, Winter & Spring 2015, Pages: 71-82.

5.    Jaroslav LELÁK, Michal VÁRY, Juraj PACKA, Eduard FIRICKÝ, Terézia SKORŠEPOVÁ “The Effect Of Temperature And Temperature Rise Test Of Distribution Transformers”.

 

91-95

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Johnson Y, Imthias Ahamed T P

Paper Title:

Robust Analysis with Controller Design of Forward-Velocity Dynamics of UAVs in Close Formation Flight

Abstract: Study of multi-UAVs (Unmanned Aerospace Vehicles) in close formation flight has received wide attention due to the significant advantages in resource mapping at greater swaths, 3-D imaging etc. The control design study and its analysis is carried out for two aerodynamically non-identical UAVs in a leader-follower pattern of flight and it can be extended for multi UAVs. The modeling includes the effect of leader-trailing-wing vortex on the follower, both for nominal and perturbed system dynamics. Robust controller design to maintain the relative velocity between two UAVs in longitudinal plane close formation flight under nominal, wind and aero-perturbed condition is the major objective of this article. The forward velocity control of the leading vehicle and its tracking by a follower are performed by a PID controller and then compared with that of a robust H_∞ controller.

Keywords:
 Formation flight, UAV, PID, robust H-infinity, tracking and control, wing vortex.


References:

1.          Zou, Y. and Pagilla, P.R., “Distributed Formation Flight Control  Using Constrained Forces”, J. of Guidance, Control and Dynamics, Vol.32, No.1, 2009
2.          Paul, T., Krogstad, T.R. and Gravdahl, J.T., ‘Modeling of UAV  Formation Flight Using 3D Potential Field’, Simulation Modeling Practice and Theory,Vol.16, Issue
9,pp.1453-1462,2008

3.          Innocenti, M., Guilietti, F. and Pollini, L., ‘Intelligent Management  Control for Unmanned Aircraft Navigation and Formation keeping’, RTO AVT Course at Belgium, May, 2002

4.          How, J., King, E. and Kuwata, Y., ‘Flight Demonstration of  Cooperative control for UAV Teams’, AIAA 3rd Unmanned Unlimited  Technical Conference, Workshop
and Exhibit, Illinois, 2004

5.          Yoon S., Bae. J, and Kim. Y, Cooperative Standoff Tracking of a Moving Target using Decentralized Extended Information Filter, KSAS (Korean Society for Aeronautical and Space Science) Spring Conference, Gyeongju, Republic of Korea, Apr 2011

6.          Kim H.J., Kim. M, Lim. H, Park. C, Yoon. S,  Lee. D,  Oh. G, Park. J  and Kim. Y, ‘Fully-Autonomous Vision- based Net-Recovery Landing  System for a Fixed-Wing UAV’,IEEE/ASME Transactions on  Mechatronics, accepted for publication, 2013.

7.          S. Yoon, S. Park, and Y. Kim, ‘Constrained Adaptive Backstepping Controller Design for Aircraft Landing in Wind Disturbance and Actuator Stuck’,International Journal of Aeronautical and Space Sciences, Vol. 13, No. 1, pp. 101-116, 2012.

8.          Proud, A., Pachter, M., and DAzzo, J. J., ‘Close Formation Control’,  Proceedings of the AIAA Guidance, Navigation, and Control  Conference, AIAA – 99 – 4207, pp. 123 1 – 1246, Portland, OR,  August, 1999.

9.          Vanek and Balint, ‘Practical approach to real-time trajectory tracking   Of UAV formations’ ,Proceedings of the American Control  Conference,2005.

10.       Saffarian, M. and Fahimi, F., ‘Control of helicopters formation using   non-iterative nonlinear model predictive approach, Proceedings of  IEEE American Control Conference, pp. 3707-3712, Seattle,   Washington, June 2008

11.       Min,H., Decentralized UAV formation tracking flight control using   gyroscopic force, IEEE International Conference on Computational Intelligence,  2009.

12.       Dogan,A. and Venkataramanan,S., ‘Nonlinear control for  Reconfiguration of Unmanned Aerial Vehicle Formation’, J. of  Guidance, Control and Dynamics, Vol 28, No 4(2005)

13.       Chichka D.F.,Speyer J.L.,Fanti C. and Park C.G., Peak-seeking  Control for Drag Reduction in Formation Flight, AIAA Journal of  Guidance, Control and Dynamics,University of California,2002.

14.       Ning S.A., Aircraft Drag Reduction through Extended Formation  Flight,PhD thesis,Dept of Aeronautics and Astronautics,Stanford University, August 2011.

15.       Saban,D.,Whidborne,J.F. and Cooke A., Simulation of Wake  Vortex Effects for UAV in close formation flight, Aeronautical Journal, Volume 113, Issue 1149,pp. 727-738,2009.

16.       Shyy,W.,Lian Y.,Tang J.,Liu H.,Trizila P.,Stanford P.,Bernal L.,Cesnik C.,Freedmann P. and Ifju P., Computational Aerodynamics of Low Reynolds Number Plunging, Pitching and  Flexible Wings for MAV Applications, Proceedings of the 46th AIAA Aerospace Sciences Meeting and Exhibit 7 – 10 January  2008.

17.       Morgan M.T., A Study in Drag Reduction of Close Formation Flight    accounting for trim control flight positions and Dissimilar Formations. ,thesis,M.S.Aeronautical Engineering,Air force  Institute of Technology, March,2005.

18.       Lewis T.A., Flight Data Analysis and Simulation of Wind Effects during Aerial Refuelling. ,thesis, M.S. Aerospace Engineering, University of  Texas,Arlington,May,2008.

19.       Proud, A.W., “Close Formation Flight Control”, M.S. Thesis in  Electrical Engineering, Air Force Institute of Technology, Air University, March, 1999.

20.       Campa,G,Gu,Y.,Design and Flight Testing of Non-linear   Formation Control Law,Science Direct,Control Engineering  Practise 15,pp-1077- 1092,2007.

21.       Christopher G., “Modeling, Simulation and Flight test for Automatic  Flight Control of the Condor Hybrid-Electric Remote Piloted  Aircraft,” Thesis, M.S. Aeronautical Engineering, Presented to the  faculty, Departments of System Engineering, Aeronautics and  Astronautics, Air University, March, 2012

22.       Nelson, R.C., “Flight Stability and Automatic Control”, Tata  McGraw-Hill Publishing Company Ltd., New Delhi, 2nd edition, 2007.

23.       Johnson Y. and  Dasgupta S.,  “Robust Hurwitz Stability and  Performance Analysis of H-Infinity Controlled Forward-Velocity  Dynamics of UAVs in Close Formation Flight Using Bounded Phase  Conditions in a Kharitonov Framework’, Int. J. Inst. Eng. India, Springer Publications, Series. C, vol  95, Issue 3,  pp  223-231,  July  2014.

24.       Johnson Y. and  Dasgupta S.,  “Control and Tracking of Longitudinal  Dynamics of UAVs in Synchronized Motion,”  Conference Proceedings,  IEEE, International Conference on Control Communication and Computing (ICCC),  Trivandrum,  2013

25.       Scherer C., “Theory of Robust Control”, Delft University of Technology,  The Netherlands, April 2001

26.       Johnson Y. and  Dasgupta S.,    “Pitch Attitude Dynamics Control and  Tracking of UAVs in Close Formation Flight,” Int. Conf. on Emerging Trends in Electrial Engineering (ICETREE-14), Kollam, Kerala, India, Conference Proceedings,  Elsevier Publications,  2014.

 

96-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

20.

Authors:

Sukanta Kumar Tulo, Madhusmruti Nayak, Manish Kumar, Khushboo

Paper Title:

Brain Tumor Detection from MRI Image using Digital Image Processing

Abstract: Tumor detection and removal is one medical issue that still remains challenging in field of biomedicine. Early imaging techniques had the drawback of being invasive and hence the CT and MRI imaging technique help the surgeons in providing a better vision. In this paper, tumor image processing involves three stages namely pre-processing, segmentation and morphological operation. After the acquisition of the source image, it is pre-processed by converting the original image to gray scale in addition high pass filter for noise removal and median filter for quality enhancement is provided which is followed by enhancement stage resulting with histogramic equivalent image. Finally segmentation is done by means of watershed algorithm. The above proposed methodology is helpful is generating the reports automatically in less span of time and advancement has resulted in extracting many inferior parameters of the tumor. The present work demonstrates that method can successfully detect the brain tumor and thereby help the doctors for analyzing tumor size and region .The algorithms have been developed by using MATLAB.

Keywords:
 Brain Tumor, MRI Image, Segmentation, Filtering


References:

1.  R. Kavitha, Dr. C. Chellamuthu, Ms. KavinRupa “An Efficient Approach for Brain TumourDetection Based on Modified Region Growing and Neural Network in MRI Images” International Conference on Computing, Electronics and Electrical Technologies [ICCEET] IEEE Xplorer 2011, pp(1087 – 1096).
2. Aamir Ahmad “Pathways to Breast Cancer Recurrence” Hindawi Publishing Corporation ISRN Oncology Volume 2013, Article ID 290568, 16 pages http://dx.doi.org/10.1155/2013/290568, pp(1-17).

3.    Ahmed KHARRAT Mohamed Ben MESSAOUD Nacéra BENAMRANE Mohamed ABID “Detection of Brain Tumor in Medical Images”, International Conference on Signals, Circuits and Systems 2009 IEEE, pp(1-6).

4.    Bryan  Cunitz,  BarbrinaDunmire,  Marla  Paun,  Oleg KaundinyaGopinath  “Brain  Functional  Localization:  Survey  of  Image  Registration  Techniques”,  IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 26, NO. APRIL 2007 pp(427-450).

 

103-105

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Janaki Sivakumar, K. Thangavel

Paper Title:

Gender Classification with Weighted Principal Component (wPC) using BPN

Abstract: Gender Classification in the field of forensic Science becomes essential in the case of criminal investigation. Automated tools can help forensic experts by reducing their manual efforts. Soft computing techniques like Fuzzy Computing, Neural Networks and Genetic Algorithm are all helpful to develop automated tools for human identification. Lateral Cephalogram plays a vital role in Gender Classification from skeletal remains. Principal component analysis (PCA) is a technique that is useful for the compression and classification of data. This study proposes Weighted Principal Components of lateral Cephalogram landmarks as an ideal measure .Also this study recommends BPN as an optimal classifier for Gender Classification from lateral Cephalogram.

Keywords:
Lateral Cephalogram, Forensic Anthropology, Cephalofacial Landmarks, Linear Measurements, GLCM Features, Principal Components, Weighted Principal Components, Feature Extraction and Back Propagation Neural Network


References:

1.       Patil KR, Mody RN. Determination of sex by discriminant function analysis and stature by regression analysis: a lateral cephalometric study. Forensic Sci. Int. 2005; 147:175-80.2.
2.       Graw M, Wahl J, Ahlbrecht M. Course of the meatus acusticus internus as criterion for sex differentiation Forensic Sci. Int. 2005; 147:113-7

3.       Almas Binal and BK yashoda devi,”Identification of sex using Lateral Cephalogram:Role of Cephalofacial Parameters”, JIAOMR, Oct-Dec, 2012, 24(4):280-283

4.       Jonathon Shlens, “A Tutorial on Principal Component Analysis..

5.       Delchambre L, Weighted principal component analysis: a weighted covariance eigen decomposition approach, Monthly Notices of Royal Astronomical Society, 446(4), December, 2014.

6.       . Debbie l, A primer for using and understanding weights with national datasets, The Journal of Experimental Education, 73(3), pp: 221–248, 2005

7.       Wei Lu, Neural Network Model for Distortion Buckling Behaviour of Cold-Formed Steel Compression Members, Helsinki University of Technology Laboratory of Steel Structures Publications 16, 2000

8.       Haykin S, Neural Networks – A comprehensive foundation, Macmillan Press, New York,1994

9.       Rinehart D.E, Hinton G.E and Williams R. J., learning internal representations by error propagation, Parallel Distributed Processing, Cambridge, MA: MIIT Press,1994

10.    Lu H, Setiono R and Liu H, Effective data mining using neural networks, IEEE Transaction On Knowledge and Data Engineering,1996

11.    Roy, Artificial neural networks – a science in trouble, SIGKDD Explorations, 2000

12.    Raul Rojas , Neural Networks – A Systematic Introduction,The Back propagation Algorithm, 1996.

13.    Robert Barry, Artificial Neural Network Prediction of Wavelet Sub-bands for Audio Compression, Thesis for Bachelor of Science, Dept. of Electrical & Computer Engineering, 2000

 

106-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Prasad M. Pawar, Pooja S. Gurav, Mrunali S. Raut, Pratik P. Shinde

Paper Title:

Design and Fabrication of Coco Pith Block Making Machine

Abstract: Small scale industries play a major role in the economic development of India. To enhance its growth and to effectively utilize the renewable energy, waste products to be reused one such product is coir pith Coir is mainly used in exporting and in agricultural field, as it is good absorbent of the water. It maintains the moisture content of the pith to enhance the quality of the product. The Konkan as well as costal region has a tremendous plantation of coconut trees. Coconut trees are known as ‘Kalpavruksha’ i.e each n every part of it is useful. The industries manufacturing coir ropes as their main output stores coco pith which is the left over product after the production of the coir ropes,as waste material and sold to the outer agencies at a very cheaper rate. We have designed and fabricated a machine to make the blocks of the coco pith. We have designed a machine in minimum possible cost, less work space, and portable which can be used in small scale and household use also. We have applied pressure of about 4bar using a lead screw, which is driven with the help of chain drive. Analysis for lead screw for static and torsional loading is done in which maximum stress intensity for static loading is 1.3684e+009 Pa and for torsion loading 1.2467e+009 Pa. Maximum equivalent stress in static loading is 1.1879e+009 Pa and for torsional loading is 1.1732e+009 Pa.

Keywords:
 Coco Pith, Lead Screw, Portabl.


References:

1.     Nor Mazlana Main, Rosnita A Taliba,*, Rushdan Ibrahimd, Russly Abdul  Rahman,Ainun Zuriyati Mohamed (2014), “Suitability of Coir Fibers as Pulp and Paper” “ST26943”, 2nd International Conference on Agricultural and Food Engineering, CAFEi2014”.
2.     1K. Krishnamurthy, 2C. Maheswari, 2R. Udayarani and 2V. Gowtham (2009). “Design and Fabrication of Coir Pith Prequetting Machine” IDOSI Publications.

3.     Abhijith R.P (2015), “ Effect of Natural Coir fibres on CBR Strength of Soil Subgrade” , International Journal of Scientific and Research Publications, Volume 5.

4.     Jafferjee Brothers, Hayleys (2003), “Composite Applications using Coir Fibres in Sri Lanka”, Delft University of Technology, the Netherlands.

5.     U.S. Sharma, Central Coir Research Institute; Kalavoor,Keraia-688 522 India “Eco-friendly and Versatile Coir Geotextile”, Geosynthetics Asia’97, 26-29 November, Bangalore, India.

6.     V.B. Bhandari, “A book Design of Machine Elements,” Tata Mcgrav-hill publication, pp.566-604.

 

112-117

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Joseph Zacharias, Vijayakumar Narayanan

Paper Title:

Two-Band QAM Data Transmission using Parallel Mach-Zehnder Modulators in RoF System

Abstract:  A radio over fiber (RoF) system with the transmission of two QAM sidebands by using two parallel Mach-Zehnder modulator is proposed. Optical comb generation at the central station (CS) helps to produce two combs from a single laser diode. This RoF system uses dual parallel Mach-Zehnder modulators (MZM) for the transmission of two QAM modulated sidebands. In one branch of the MZM, 4-QAM data is transmitted while in the other 16-QAM data is transmitted. Finally the downlink performance of the RoF system can be analyzed by using signal constellations and eye diagrams.

Keywords:
Comb generation, Quadrature amplitude modulation (QAM), Radio over fiber (RoF).


References:

1.       J. Wells.  Faster  than  fiber: The future of multi-g/s wireless.  IEEE Microwave Magazine, 10(3):104–112, May 2009.
2.       Ming  Zhu,   Liang  Zhang,   Jing  Wang,   Lin  Cheng,   Cheng   Liu, and  Gee-Kung Chang.    Radio-over-fiber access architecture for integrated broadband wireless   services.     J. Lightwave  Technol., 31(23):3614–3620, Dec 2013.

3.       Zhensheng  Jia,  Jianjun   Yu,  Georgios   Ellinas,   and   Gee-Kung Chang.  Key enabling technologies for optical–wireless networks: Optical millimeter-wave generation, wavelength reuse, and archi- tecture. J. Lightwave Technol., 25(11):3452–3471, Nov 2007.

4.       R. Herschel and  C. G. Schffer.  Radio-over-fiber systems  for next generation wireless   access.    In  2011  International   Students  and Young Scientists Workshop ”Photonics and Microsystems”, pages 54–58, July 2011.

5.       D.  Y.  Kim,  M.  Pelusi,   Z.  Ahmed,   D.  Novak,   H.  F.  Liu,  and Y. Ogawa.   Ultrastable millimetre-wave signal  generation using hybrid modelocking of a monolithic dbr  laser.  Electronics Letters, 31(9):733–734, Apr  1995.

6.       L. A. Johansson and  A. J. Seeds.   Generation and  transmission of millimeter-wave data-modulated optical  signals  using  an  op- tical  injection phase-lock loop.   Journal  of Lightwave  Technology, 21(2):511–520, Feb 2003.

7.       J. Yao.   Microwave   photonics.   Journal  of Lightwave  Technology, 27(3):314–335, Feb 2009.

8.       L. Chen,  H.  Wen,  and  S. Wen.   A radio-over-fiber system  with a novel  scheme  for  millimeter-wave generation and  wavelength reuse  for  up-link connection. IEEE Photonics Technology Letters, 18(19):2056–2058, Oct 2006.

9.       J. Ma, J. Yu, C. Yu, X. Xin, J. Zeng, and  L. Chen.  Fiber dispersion influence on  transmission of  the  optical   millimeter-waves gen- erated using  ln-mzm intensity modulation.  Journal of Lightwave Technology, 25(11):3244–3256, Nov 2007.

10.    Caiqin  Wu  and  Xiupu  Zhang.   Impact of nonlinear distortion in radio  over fiber systems  with  single-sideband and tandem single- sideband subcarrier modulations. Journal of Lightwave Technology, 24(5):2076–2090, May 2006.

11.    Rakesh  Sambaraju, Valent´ın Polo,  Juan  Luis  Corral,   and  Javier Mart´ı.    Ten  gigabits per  second  16-level  quadrature amplitude modulated  millimeter-wave carrier generation using  dual-drive mach–zehnder modulators incorporated photonic-vector modu- lator.  Opt. Lett., 33(16):1833–1835, Aug 2008.

12.    G. M. Macfarlane, A. S. Bell, E. Riis, and  A. I. Ferguson. Optical comb  generator  as  an  efficient short-pulse  source.  Opt.  Lett., 21(7):534–536, Apr 1996.

 

118-121

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Sagar L Belgaonkar, A.Amarnath, Ismail R Garag, Manjunath S Makari, Iliyaskhan A. Desai, Rahul M. Patil

Paper Title:

Critical behavior of STILT columns in RC Framed Structures under the influence of wind

Abstract: Wind is horizontal movement of air due to temperature difference. Wind has significant role to play in design of high rise building because it results in static and dynamic loads. In this paper, effect of wind load on 11 Storey RCC Building having different column heights which may be due to unevenness in the slope of the ground is analyzed. Effect of wind is studied under consideration of IS 875: Part III 1987 Models are prepared and analyzed for wind effect using ETABS 2013. Models with varying slopes are studied.

Keywords:
 Displacement, Stilt Factor, Sloping Ground, Wind


References:

1.       Shaikh Mufassir and l.G.Kalurkar, “Comparative study on Wind Analysis of Multy story RCC and composite structurefor different plan configuration ”,IOSR Journal of Mechanical and Civil Engineering.
2.       Umakant Arya and Waseem Khan , “Wind Analysis of building frame on sloping ground”, International Journal of Scientific and Research Publications, Volume 4, Issue5, May 2014. ISSN 2250-3153.

3.       S.Vijaya Bhaskar Reddy and etal, “Effect of wind forces on mutistoreyed  structures”, International Journal of  Innovative Research in Advanced Engineering (IJIRAE) ISSN 2349-2163 Issue 6, Volume 2 (June 2015).

4.       Sayed Gousepak and Prof. Vishwanath B Patil, “A review on Stability Analysis of A Multi Storey Building With Underneath Satellite Bus Stop Having Top Soft Storey And Floating Columns”, International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 03 (March – 2016).

5.       Baldev D.Prajapati  & D.R.Panchal, “Study of seismic and wind effect on multi storey R.C.C., Steel and composite building ”, International Journal of Advances in Engineering & Technology (IJAET), Vol. 6, Issue 4, pp. 1836-1847 ,Sept. 2013.

6.       Shivanand C Gule and et al., “Study of an irregular plan with different orientation of shear wall in a high rise strucutre ” The  International Journal of Science and Technology (IJST), Vol. 3, Issue 5, ISSN (2321-919X) ,May. 2015.

7.       Nilesh B Mevawala  & D.R.Atul K Desai, “Free Vibrating Analysis of Building resting on sloping ground with different modes of shape”, International Journal of Civil and Structural Engineering Research (IJCSER), Vol. 4, Issue 1, pp.(26-31)ISSN 2348-7607 ,September 2016.

8.       (IOSR-JMCE), Vol. 13, Issue 4, pp. 42-49, ISSN:2320-334X, August. 2016 Syed Rehan and S H Mahure, “Study of seismic and wind effect on multi storey R.C.C., Steel and composite building ”, International Journal of  Engineering and Innovative Technology (IJAEIT), Vol. 3, Issue 12, IISN 2277-3754, June. 2014.

9.       B.C.Punmia, Ashok Kumar Jain, J Arun Kumar,Laxmi   

10.    Publication, New Delhi-110002, 1988.

11.    IS 875 (part-II), “Code of practice for designloads for buildingsand structures”.

12.    IS: 456(2000), “Indian Standard Code of Practicefor Plan and Reinforcement Concrete (Fourth Revision)” , Bureau of Indian Standards (BIS), New Delhi.

13.    IS:875(Part-3):1987, “Code of Practise for Design Loads( other than earthquake loads) for Buildings and Structures” Part 3 Wind Loads,Second Revision, Bureauof Indian Standards, New Delhi 1989.

14.    B.C.Punmia, Ashok Kumar Jain, J Arun Kumar,Laxmi   

15.    Publication, New Delhi-110002, 1988.

 

122-127

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Diaa Eldein Mustafa Ahmed, Othman O. Khalifa

Paper Title:

An Overview of MANETs: Applications, Characteristics, Challenges and Recent Issues

Abstract: In recent years, due to emerging technologies in the field of wireless networks, ad hoc networks have attracted much attention from the research community and industry since has important technical advances have arisen as a consequence. Mobile ad-hoc Networks (MANETs) is a group of self-organized and self-configured wireless mobile nodes (MNs)  such as mobile devices, laptops ,and PDAs , able to communicate with each other without the need of any neither fixed network infrastructure nor centralized administrative support. MANET is a network that exchanges information among the entities that are potentially mobile without any pre-defined infrastructure based communication support. These networks are of practical importance in applications like environmental monitoring, health care, military, location tracking, disaster recovery and many more. This paper provides a comprehensive study of MANETs applications scenarios, main features and characteristics, challenges facing the deployment of MANET, current issues and latest research issues.

Keywords:
MANET applications, Characteristics, Challenges, recent issues


References:

1.       S. PK, “Routing in Mobile Ad hoc Network: A Review,” International Journal of Advances in Computing and Information Technology, 2012.
2.       L. P. K. Haohong Wang, Ajay Luthra and Song Ci. (2009). 4G WIRELESS VIDEO COMMUNICATIONS.

3.       H. J. Alqaysi and G. A. Qas Marrogy, “Performance Analysis of Video Streaming Application Over MANETS Routing Protocols,” International Journal Of Research In Computer APPLICATIONS AND ROBOTICS, vol. 3, pp. 22-28, 2015.

4.       C. HERNÁNDEZ and W. EDUARDO, “Quality of service routing and mechanisms for improving video streaming over mobile wireless ad hoc networks,” Editorial Universitat Politècnica de València, 2015.

5.       K. S. Ali and U. Kulkarni, “Characteristics, Applications and Challenges in Mobile Ad-Hoc Networks (MANET): Overview,” Wireless Networks, vol. 3, 2015.

6.       P. Arce Vila, “Hierarchical routing and cross-layer mechanisms for improving video streaming quality of service over mobile wireless ad hoc networks,” Editorial Universitat Politècnica de València, 2014.

7.       H. Al-Bahadili, Simulation in Computer Network Design and Modeling: Use and Analysis: : IGI Global, 2012.

8.       D. Taniar, Mobile Computing: Concepts, Methodologies, Tools, and Applications: vol. 1: IGI Global, 2008.

9.       S. Dhar, “MANET: Applications, Issues, and Challenges for the Future,” International Journal of Business Data Communications and Networking (IJBDCN), vol. 1, pp. 66-92, 2005.

10.    N. Kaur and T. Singh, “A Review on Different Routing Protocols in MANETS,” (IJCSIT) International Journal  of Computer Science and Information Technologies, vol. 6, pp. 101-104, 2015.

11.    H. k. Paramjit singh, “Review of Various MANET Protocols,” International Journal of Electrical and Electronics Engineers( IJEEE), vol. 7, pp. 318 – 329, 2015.

12.    O. Bang and P. L. Ramteke, “MANET: history, challenges and applications,” International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 2, pp. 249-251, 2013.

13.    K. BR, L. C. Reddy, and P. S. Hiremath, “Mobile Ad Hoc Networks: Issues, Research Trends And Experiments,” 2008.

14.    M. L. Raja and C. D. S. S. Baboo, “An Overview of MANET: Applications, Attacks and Challenges,” International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 3, pp. 408 – 417, 2014.

15.    S. J. Shivi Sharma, “Mobile Ad Hoc Network: Issues, Research Trend and Challenges,” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, pp. 1625 – 1630, 2015.

16.    T. Qiu, N. Chen, K. Li, D. Qiao, and Z. Fu, “Heterogeneous ad hoc networks: Architectures, advances and challenges,” Ad Hoc Networks, vol. 55, pp. 143-152, 2017.

17.    S. K. Chaturvedi and N. Padmavathy, “Mobile Ad Hoc Network Reliability: An Imperative Research Challenge,” in Advances in Reliability and System Engineering, ed: Springer, 2017, pp. 87-119.

18.    G. V. Kumar, Y. V. Reddyr, and D. M. Nagendra, “Current research work on routing protocols for MANET: a literature survey,” international Journal on computer Science and Engineering, vol. 2, pp. 706-713, 2010.

 

128-133

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Ramya R.

Paper Title:

Acquatic Rare Species Habitat Detection and Tracking

Abstract:  Computer vision has gained paramount significance in recent times due to the increased use of cameras as portable devices and their incorporation in standard PC hardware, mobile devices, machines etc. Computer vision techniques such as detection, tracking, segmentation, recognition and so on, aim to mimic the human vision system. Humans hardly realize the complexities involved in vision, but in fact, our eye is more powerful than it seems. It processes around 60 images per second, with each image consisting of millions of points. Computer vision is still a long away from its goal of replicating the human eye, but in the meantime various computer vision techniques are being applied to complex applications. The proposed algorithm is resistant to small illumination changes and also involves a module that reduces effects of camera movement. . In this system four static cameras are used to capture the moving objects. Background subtraction method subtracts the moving object from static underwater place. This procedure is done by pixel by pixel. Area of the species is also main consideration. Once the species are detected from static underwater place, using background subtraction method tracking is done on each of the four sides. Gaussian mixture model (GMM. and BLOB analysis method is applied for counting the rare species. Gaussian mixture model gives the better segmentation to the original images. BLOB analysis produces the bounding boxes to    the species.

Keywords:
 Blob analysis, Gaussian Mixture Model, MATLAB.

References:
1.    F. C. De Leo, C. R. Smith, A. A. Rowden, D. A. Bowden, and M. R. Clark, “Submarine canyons: hotspots of benthic biomass and productivity in the deep sea,” Proceedings of the Royal Society B: Biological Sciences, p. rspb20100462, 2010.
2.    L. J. Grange and C. R. Smith, “Megafaunal communities in rapidly warming fjords along the West Antarctic Peninsula: hotspots of abundance and beta diversity,“ PloS one, vol. 8, p. e77917, 2013.

3.    Di Gesu, F. Isgrò, D. Tegolo, and E. Trucco, “Finding essential features for tracking starfish in a video sequence,” in Image Analysis and Processing, 2003. Proceedings. 12th International Conference on, 2003, pp. 504-509.

4.    Spampinato, D. Giordano, R. Di Salvo, Y.-H. J. Chen- Burger, R. B. Fisher, and G. Nadarajan, “Automatic fish classification for underwater species behavior understanding,” in Proceedings of the first ACM international workshop on Analysis and retrieval of tracked events and motion in imagery streams, 2010, pp. 45-50.

5.    R. Edgington, D. E. Cline, D. Davis, I. Kerkez, and J. Mariette, “Detecting, tracking and classifying animals in underwater video,” in OCEANS 2006, 2006, pp. 1-5.

6.    D. Smith and M. Dunbabin, “Automated Counting of the Northern Pacific Sea Star in the Derwent Using Shape Recognition”, DICTA 2007, Digital Image Computing: Techniques and Applications, pp. 500-507, 2008.

7.    X. Hou and L. Zhang, “Saliency detection: A spectral residual approach,” in Computer Vision and Pattern Recognition, 2007. CVPR’07. IEEE Conference on, 2007, pp. 1-8.

8.    S. Goferman, L. Zelnik-Manor, and A. Tal, “Context-aware saliency detection,” Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 34, pp. 1915-1926, 2012.

9.    Yin, D. Makris, and S. A. Velastin, “Performance Evaluation of Object Tracking Algorithms,” in Proc. IEEE Int. Workshop Perform. Eval. Tracking Surveillance, 2007, pp. 733736.

 

134-137

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

A. Elizabeth, Bavanirajan, Kannabiran, Surendiran

Paper Title:

BLDC Motor Driven Solar PV Array Fed Water Pumping System Employing Zeta Converter

Abstract: This paper proposes a simple, cost effective and efficient brushless DC (BLDC) motor drive for solar photovoltaic (SPV) array fed water pumping system. A zeta converter is utilized in order to extract the maximum available power from the SPV array. The proposed control algorithm eliminates phase current sensors and adapts a fundamental frequency switching of the voltage source inverter (VSI), thus avoiding the power losses due to high frequency switching. No additional control or circuitry is used for speed control of the BLDC motor. The speed is controlled through a variable DC link voltage of VSI. The proposed water pumping system is designed and modeled such that the performance is not affected under dynamic conditions. The suitability of proposed system at practical operating conditions is demonstrated through simulation results using MATLAB/Simulink followed by an experimental validation.

Keywords:
BLDC motor, SPV array, Zeta converter, INC-MPPT.


References:

1.       M. Uno and A. Kukita, “Single-Switch Voltage Equalizer Using Multi-Stacked Buck-Boost Converters for Partially-Shaded Photovoltaic Modules,” IEEE Transactions on Power Electronics, no. 99, 2014.
2.       R. Arulmurugan and N. Suthanthiravanitha, “Model and Design of A Fuzzy-Based Hopfield NN Tracking Controller for Standalone PV Applications,”  Electr. Power Syst. Res.(2014).

3.       S. Satapathy, K.M. Dash and B.C. Babu, “Variable Step Size MPPT Algorithm for Photo Voltaic Array Using Zeta Converter – A Comparative Analysis,” Students Conference on Engineering and Systems (SCES), pp.1-6, 12-14 April 2013.

4.       Trejos, C.A. Ramos-Paja and S. Serna, “Compensation of DC-Link  Voltage Oscillations in Grid-Connected PV Systems Based on High Order DC/DC Converters,” IEEE International Symposium on Alternative Energies and Energy Quality (SIFAE), pp.1-6, 25-26 Oct. 2012.

5.       G. K. Dubey, Fundamentals of Electrical Drives, 2nd ed. New Delhi, India: Narosa Publishing House Pvt. Ltd., 2009.

6.       Singh and V. Bist, “A Single Sensor Based PFC Zeta Converter Fed BLDC Motor Drive for Fan Applications,” Fifth IEEE Power India Conference, pp.1-6, 19-22 Dec. 2012.

7.       R.F. Coelho, W.M. dos Santos and D.C. Martins, “Influence of Power Converters on PV Maximum Power Point Tracking Efficiency,” 10th IEEE/IAS International Conference on Industry Applications (INDUSCON),pp.1-8, 5-7 Nov. 2012.

8.       Dylan D.C. Lu and Quang Ngoc Nguyen, “A Photovoltaic Panel Emulator Using A Buck-Boost DC/DC Converter and A Low Cost Micro-Controller,” Solar Energy, vol. 86, issue 5, pp. 1477-1484, May 2012.

9.       Zhou Xuesong, Song Daichun, Ma Youjie and Cheng Deshu, “The Simulation and Design for MPPT of PV System Based on Incremental Conductance Method,” WASE International Conference on Information Engineering (ICIE), vol.2, pp.314-317, 14-15 Aug. 2010.

10.    Ali Reza Reisi, Mohammad Hassan Moradi and Shahriar Jamasb, “Classification and Comparison of Maximum Power Point Tracking Techniques for Photovoltaic System: A review,” Renewable and Sustainable Energy Reviews, vol. 19, pp. 433-443, March 2013.

11.    Shahin, A. Payman, J.-P. Martin, S. Pierfederici and F. Meibody-Tabar, “Approximate Novel Loss Formulae Estimation for Optimization of Power Controller of DC/DC Converter,” 36th Annual Conference on IEEE Industrial Electronics Society, pp.373-378, 7-10 Nov. 2010.

12.    Sunmodule® Plus SW 280 mono, Performance Under Standard Test Conditions [Online]. Available: http://www.sfe-solar.com/wp-content/uploads/2013/07/SunFields-SolarWorld_SW265-270-275-280_Mono_EN.pdf

13.    K.H. Ahmed, M. S. Hamad, S.J. Finney and B.W. Williams, “DC-Side Shunt Active Power Filter for Line Commutated Rectifiers to Mitigate the Output Voltage Harmonics,” IEEE Energy Conversion Congress and Exposition (ECCE), pp.151-157, 12-16 Sept. 2010.  W.V. Jones, “Motor Selection Made Easy: Choosing the Right Motor for Centrifugal Pump Applications,” IEEE Industry Applications Magazine, vol.19, no.6, pp.36-45, Nov.-Dec. 2013.

14.    TETRA 142TR12, Brushless Servomotors [Online]. Available: http://www.eltrexmotion.com/fileadmin/user_upload/PDF/product/Catalogue_TETRA_TR_ENG.pdf

 

138-144

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

28.

Authors:

Alkhatab Khalafalla Muslim Abdelhadi, Hala Eldaw Idris, Abdalla Abdalrahman Mohamed

Paper Title:

A QoS Analysis of UGS and ERTPS Scheduling Service Flows in video Conference over Worldwide Interoperability for Microwave Access (Wi-MAX)

Abstract: The IEEE 802.16e (published 2005) defined five different Quality of Service (QoS) classes including UGS, ertPS, rtPS, nrtPS and BE. It is well known that UGS and ertPS are designated to support QoS for voice applications with silence suppression. The other three classes have different applications. In this paper, we investigate the performance of UGS and ertPS QoS classes in terms of multimedia applications such as video conferencing over WiMAX network scenarios. The OPNET modeler 14.5 simulator is employed for simulation purposes in order to evaluate the performance of UGS and ertPS with a focus on video conferencing streaming and voice applications. The simulations show that the user with UGS QoS could provide higher throughput and lower delay, lower jitter, and lower queuing delay compared to the ertPS case. Consequently, we also evaluated the video conferencing/streaming application for the ertPS QoS case.  Simulation results in this case show that for a defined two scenarios of network and a certain combination of users that are allocated a QoS and a selected application e.g., voice or video conferencing, UGS offers  higher performance than ertPS.

Keywords:
 QoS, UGS, ertPS, throughput, delay, jitter, queuing delay.

References:

1.     Mark C. Wood, accessed May 24, 2016, “An Analysis of the Design and Implementation of QoS over IEEE 802.16”, http://repository.mdp.ac.id/ebook/library-ref-eng/ref-eng-3/physical/wimax/wimax-qos/wimax_qos.pdf.
2.     Qiang Ni, A. Vinel, Yang Xiao, A. Turlikov, Tao Jiang, 2007, IEEE Communications Magazine, “Wireless broadband access: WiMax and beyond- investigation of bandwidth request mechanisms under point-to-multipoint mode of WiMax networks1”.

3.     Genc, S. Murphy, Yang Yu, J. Murphy, 2008, IEEE Wireless Communications Magazine “IEEE 802.16J relay-based wireless access networks: an overview”.

4.     http://www.wimaxforum.org, Accessed May 24, 2016, WiMAX Forum.

5.     IEEE Std 802.16-2009, May 2009, “IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems, ” (Revision of IEEE Std 802.16-2004), IEEE Wireless Communications Magazine.

6.     Bo Li, Yang Qin, Chor Ping Low, Choon Lim Gwee, December 2007, “A Survey on Mobile WiMAX”, IEEE Communications Magazine.

7.     Avni Khatkar, Yudhvir Singh, Vikas Nandal, July 2013,” A QoS Oriented Analysis of ertPS, rtPS and nrtPS flows in WiMAX”, International Journal of Advanced Research in Computer Science and Software Engineering, http://www.ijarcsse.com/docs/papers/Volume_3/7_July2013/V3I6-0680.pdf

8.     ITU-T recommendation. (2001). Communications quality of service: A framework and definitions. G.1000, I.-T. R. (2001).  ITU.

 

145-150

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Sunil Kumar Singh, Mahaveer Prasad Sharma

Paper Title:

A Y-Shaped Planar Monopole Antenna for Wide Band Applications

Abstract:  A Y shaped monopole utilizing a modified notch in the ground is presented. The monopole is developed from a triangular monopole and has increased the impedance bandwidth from ~550MHz to ~6GHz for reflection coefficient less than -10dB. Since the antenna shows a bandwidth ratio of 3.9:1, it can be considered as an Ultra Wide Band antenna. Use of stepped notch under feed line provides here the better impedance matching and increased bandwidth. We use ANSOFT High Frequency Structure Simulator (ANSOFT HFSS 13.0) which uses Finite Element Method (FEM) for its processing. The monopole is fabricated on FR4 epoxy dielectric substrate and both simulated and measured results are found to be in agreement.

Keywords:
Impedance Bandwidth, Monopole Antenna, Reflection Coefficient, Ultra Wideband.


References:

1.    First Report and Order, Revision of Part 15 of the commission’s Rules Regarding Ultra-Wideband Transmission Systems FCC, 2002, FCC02-48.
2.    M. J. Ammann, “Control of the impedance bandwidth of wideband planar monopole antennas using a beveling technique,” Microw. Opt. Technol. Lett., vol. 30,no. 40, pp. 229-232, Aug 2001.

3.    N. P. Agrawall, G. Kumar, and K. P. Ray, “Wide-band planar monopole antennas,” IEEE Trans. Antennas Propag., vol. 46, no. 2, pp. 294-295, Feb. 1998.

4.    K. L. Wong and Y. F. Lin, “Stripline-fed printed triangular monopole,” Electron. Lett., vol. 33, pp. 1428-1429, Aug. 1997.

5.    J. M. Johnson and Y. Rahamt-Samii, “The tab monopole,” IEEE Trans. Antennas Propag., vol. 45, no. 1, pp. 187-188, Jan. 1997.

6.    Ramesh Garg, Prakash Bharatia, Inder Bahl, and Apisak Ittipiboon, “Microstrip Antenaa Design Handbook,” Artech House, Boston, London, 2001.

7.    K. P. Ray, “Design aspects of printed monopole antennas for ultra-wide band applications,” International Jour. Of Antennas AndPropag., Hindawi Publishing corporation, vol. 2008, doi:10.1155/2008/713858, 8 pages.

8.    Brian C. Wadell, “Transmission Line Design Handbook,” Artech House, Boston, 1991.

 

151-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Tejaswini Bhandarkar, G.Rajesh Babu

Paper Title:

Enhancing Security of Android Phones

Abstract: Use  of  mobile  commerce  for  commerce  for  conducting  commercial  transactions  online  is  increasing  rapidly. A  wide  range  of  wireless  devices  which  includes  mobile   phones,  tablets  provide  an  easier  way  for  mobile  payments  and M-commerce. Risk  associated  with  such  devices  such  as  loss  of  private  information  is  also  increasing.  The  basic  requirement  for  using  secure  M-Commerce  application  is  a  secure  mobile  operating  system.  Without  a  security  feature  or  secure  application  on  the  device,  it  is  not  possible  to  have  secure  Mobile-transaction. Among  many operating   system  used  for  mobile  devices,  android  operating  systems  are  widely  used.  Though  Android  Systems  are  good  in  memory  management  they  are  also  vulnerable  to  security  attacks.  Such  security  attacks  make  the  phone  unusable,  cause  unwanted  SMS/MMS  (short  message  service/ multimedia  messaging  service)  billing,  or  expose  private  information.  There  are  two  doors  for  attacker  to  attack  a  smart  phone.  The  first  is  to  get  users  to  download,  install,  and  run  software  that  contain  unethical  codes  such  as virus,  worms  etc.  and  the other  is  to  attack  device  directly  by  using  software  vulnerabillties.  This  paper  presents  security  assessment  for  Android  with  an  overview  of  security  architecture  for  android.  The  Paper  also  list  various  threats  to  android  devices  and  there  countermeasures. 

Keywords:
 Android Systems, mobile payments, software vulnerabilities.


References:

1.    An Insight into the Security Issues and Their Solutions for Android Phones.[2015]
2.    “Mobile  Attacks  and  Defense”,  white  paper  copublished  by  the  IEEE  computer  and  Reliabilty  Societies,  2014.

3.    Countering the Advance Persistent Threat challenge with deep discovery, white paper, copublished by Trend Micro white paper April 2013.

4.    Sheran A.Gunasekera, “Android Architecture”, in Android Apps Security, Ed.New York: Apress, 2012.

5.    Mobile Aattacks and Defense , white paper copublished  by the IEEE  computer and Reliability  Societies,July/August 2011.

6.    Google Android: A Comprehensive Security Assessment, copublished by the IEEE computer And Reliabilty Societies, March/April 2010

 

154-156

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Ch. Sankara Rao, K. Soujanya, T. Sudhakar Reddy

Paper Title:

A Simplified Version of Multilevel Inverter with Minimal Number of Switches

Abstract: Multilevel inverters have created a new wave of interest in industry and research. These multilevel inverters are generally used in medium voltage high power application. In this paper a eleven level inverter is proposed which has less number of switches compared to the conventional inverter. This inverter topology reduces the size and complexity of the system. The effectiveness of the proposed topology has been demonstrated and the results are validated by simulating the proposed topology in MATLAB.

Keywords:
Multilevel Inverters, circuit topology, reduced device count.


References:

1.       Abdul Halim Mohamed Yatim, and Ehsan Najafi, “Design and Implementation of a New Multilevel Inverter Topology” IEEE transactions on industrial electronics, vol. 59, no. 11, November 2012.
2.       A.Kirubakaran, Jacob James Nedumgatt, Vijayakumar D. Umashankar S, “A Multilevel Inverter with Reduced Number of Switches”2012, IEEE Students Conference on Electrical, Electronics and Computer Science.

3.       Mariusz Malinowski,K. Gopakumar Jose Rodriguez, and Marcelo A. Pérez―A Survey on Cascaded Multilevel Inverters‖ IEEE Transactions On Industrial Electronics, Vol. 57, No. 7, July 2010.

4.       José Rodríguez, Jih-Sheng Lai,, And Fang Zheng Peng, “ Multilevel Inverters: A Survey Of Topologies, Controls, And Applications” IEEE Transactions On Industrial Electronics, Vol. 49, No. 4, August 2002.

5.       Oscar Lopez, Remus Teodoreescu, “Multilevel transformerless topologies for single phase grid-connected converter”, IEEE conference, 2006.

6.       Johnson Uthayakumar R.1, Natarajan S.P.2, Bensraj R, “A Carrier Overlapping PWM Technique for Seven Level Asymmetrical Multilevel Inverter with various References” IOSR Journal of Engineering June. 2012.

7.       N Booma, Nagisetty Sridhar, “Simulation of nine level cascaded H- bridge multilevel inverter DC-link inverter” IEEE Students Conference on Electrical, Electronics and Computer Science.2011.

8.       Valsan K, Joseph K.D”A Reduced Switch Multilevel Inverter for Harmonic Reduction” IEEE Conference.2012.

9.       Ahmed, R.A.; Mekhilef, S.; Hew Wooi Ping,”New multilevel inverter topology with minimum number of switches,” 2010 IEEERegion 10 Conference (TENCON 2010),vol. no.2, pp.1862-1867, Nov. 2010.

10.    Hulusi Karaca “A Novel Topology for Multilevel Inverter with Reduced Number of Switches”, World Congress on Engineering and Computer Science, WCECS, 2013, SanFrancisco, USA, vol I, 23-25 October, 2013.

11.    Ceglia, G., Guzman, V.; Sanchez, C.; Ibanez,F.; Walter, J.; Gimenez, M.I. “A New Simplified Multilevel Inverter Topology for DC & AC Conversion”, IEEE Transactions on Power Electronics, vol.21, no.5, pp.1311-1319, Sept. 2006.

12.    Arjun J. Jariwala, Nilesh V. Shah “A new Multilevel Inverter Topology with reduced number of switches” International Journal of Current Engineering and scientific Research (IJCESR) ISSN (PRINT): 2393-8374, (Online): 2394-0697, Volume-2, Issue-7, 2015

13.    Ebrahim Babaei. “A Cascade Multilevel Converter Topology with Reduced Number of Switches”. IEEE Trans. On Power electronics. 2008; 23(6): 2657-2664.

14.    R Naveen Kumar. “Energy Management system for Hybrid RES with Hybrid Cascaded Multilevel inverter”. International Journal of Electrical and Computer Engineering (IJECE). 2014; 4(1): 24~30.

15.    Gnana Prakash M, Balamurugan M, Umashankar S“A New Multilevel Inverter with Reduced Number of Switches”International Journal of Power Electronics and Drive System (IJPEDS)Vol. 5, No. 1, July 2014, pp. 63~70ISSN: 2088-8694

16.    Aditya Parasha “International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 International Conference on Emerging Trends in Mechanical and Electrical Engineering” (ICETMEE- 13th-14th March 2014)

 

157-160

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Ajit Kumar Senapati, Shantanu Kumar Sahoo, Saylesh Singh, Sudhakar Sah, Pratyush Ranjan Padhi, Nitesh Satapathy

Paper Title:

A Comparative Investigation on Physical and Mechanical Properties of MMC Reinforced With Waste Materials

Abstract: Aluminium alloy based metal matrix composites (MMC) are  produced with agro waste Rice Husk Ash (RHA) and industrial waste Fly Ash as reinforcement. By the continuous stir casting method the MMCs were fabricated in a bottom pouring furnace at 7000C. A rectangular  metal mould was used to prepare the casting having dimension 300x50x20 mm3. The effect of adding the different reinforcement were realized through various mechanical behaviour tests. Based upon the standards in the mechanical workshop samples were prepared  for  measuring  mechanical  properties  such as  Impact strength,  Compression strength, Tensile strength, Brinell hardness and Density test of both the MMCs. The Fly Ash and Rice Husk distributions in the MMCs were confirmed through the examinations conducted of the microstructure  on image analyzer and scanning electron micrographs. Results thus found revealed that there is a great effect of reinforcing  Flyash and Rice Husk in aluminium alloy matrix composites. Fly ash gave more enhanced mechanical properties as compared to Rice Husk.   Thus selection of waste material from industry based and agro based for reinforcement was found one of the most important criteria  for fabricating aluminium matrix composites where as during  machining process is the average surface roughness (Ra) and the cutting force required to carry an operation on it., and it is mostly caused by many machining parameters such as speed, feed , depth of cut.

Keywords:
 Metal Matrix Composites (MMCs), Flyash, Rice Husk Ash (RHA), Mechanical Properties, Physical properties, Surface Roughness, Speed, Feed, Depth of Cut.


References:

1.       S.A. Kori, T.M. Chandrashekharaiah (2007), Studies on the dry sliding wear behavior of hypoeutectic and eutectic Al–Si alloys, Wear, vol-263, pp.745–755.
2.       J.  Bienia,  M.  Walczak,  B.  Surowska,  J.  Sobczak (2003), MICROSTRUCTURE AND CORROSION BEHAVIOUR OF ALUMINUM FLY ASH COMPOSITES, Journal of Optoelectronics and Advanced Materials Vol. 5, No. 2, June 2003, p. 493 –502

3.       Y. H. Seo, and C. G. Kang (1995), “The effect of applied pressure on particle dispersion characteristics and mechanical properties in melt-stirring squeeze-cast SiC/Al composites,” J. Mater. Process. Technol., vol.55, pp. 370–379.

4.       K. Purazrang, K. U. Kainer, and B. L. Mordike (1991), “Fracture toughness behavior of a magnesium alloy metal-matrix composite produced by the  infiltration technique,” Composites, vol. 22 (6), pp. 456–462.

5.       D. B. Miracle (2005), “Metal Matrix composites-From science to technological significance,” Composites Science and Technology, vol. 65, pp. 2526-2540.

6.       S. Long.OBeffort, C. Cayron and C. Bonjour (1999), Microstructure and  mechanical properties of a  high volume fraction SiC particle reinforced AlCu4MgAg squeeze casting, Materials Science and Engineering, A269, pp.175-185.

7.       Jung-Moo Lee, Sang-Kwan Lee, Sung-Jin Hong and Yong-Nam Kwon.(2012),Microstructures and thermal properties of A356/SiCp composites fabricated by liquid pressing method, Materials & Design, Volume 37, pp.313-316.

8.       G. N. Lokesh, M. Ramachandra, K. V. Mahendra and T.  Sreenith.(2013),  Characterization of  Al-Cu  alloy reinforced fly ash metal matrix composites by squeeze casting method, International Journal of Engineering, Science and Technology, Vol. 5, No. 4, pp.71-79.

9.       S.D.Saravanan and M.Senthil Kumar.(2013), Effect of Mechanical Properties on Rice Husk Ash Reinforced Aluminum alloy (AlSi10Mg) Matrix Composites, International Conference On Design And Manufacturing, pp-1505 – 1513.l

10.    Chittaranjan.v, Mr. F.AnandRaju and Dr. M.L.S.Deva Kumar (2014), “Thermal Properties of Aluminium-Fly Ash Composite”, International Journal of Innovative Research  in  Science,  Engineering  and  Technology, Vol 3(11), pp.17217-17220.

11.    AnkushSachdeva,  Ram   Narayan  and   R.B.   Gupta (2013), “Evaluation & Comparison of Mechanical Properties of Aluminium Alloy 5052 reinforced with SiC, Graphite and Fly Ash Hybrid Metal Matrix Composites”, International Journal of Engineering Science and Technology, Vol-5(10), pp.1780-1787.

12.    Dr  .Selvi.S,  Dr.  Rajasekar.E,    Sathishkumar.M and Ramkumar. B (2013), “Theoretical and Experimental Investigations of Mechanical Properties of Aluminum based Metal Matrix Composite”, IRACST – Engineering Science and Technology, Vol-3(2), pp.353-358.

13.    BasavarajMathpathi and   Bharat S Kodli (2014), “A Study on Mechanical Properties of Aluminum, Rice Husk and Silicon Carbide Matrix Composites”, International Journal for Scientific Research & Development| Vol. 2, Issue 08, pp.13-14.

14.    PallaviDeshmukh,   Jatin   Bhatt,   DilipPeshwe   and Shailkumar Pathak (2012), “Development and Characterization of Al based MMC by Using RHA and  Metallurgical  Grade  SiO2  with  Varying Percentage of Mg”, Nano Trends: A Journal of Nanotechnology and Its Applications, Vol-12(2), pp.01- 10.

15.    Deepak Singla, S.R. Mediratta(2013) Evaluation of mechanical properties of Al 7075-fly ash composite material, International Journal of Innovative Research in Science, Engineering and Technology,Vol. 2, Issue 4, pp.951-959.

16.    Sandeep Kumar Singh,R J  Immanuel, S Babu, (2016) Influence of multi pass friction stir processing on wear behaviour and machinability of an AlSi hypoeutectic A356 alloy Journal of materials processing technology 236(2016)252 22

17.    J.Jenix Rino, D.Chandramohan, K.S.Sucitharan An Overview on Development of Aluminium Metal Matrix Composites with Hybrid Reinforcement, International Journal of Science and Research (IJSR), India Online ISSN: 2319 7064

18.    J Samuel, A Dikshit , R E DeVor , SG Kapoor(2009) Effect of carbon nano tube (CNT) loading on the thermo mechanical properties and the machinability of CNT-reinforced polymer composite , journal of manufacturing science and engineering by ASME  P.P 131/031008-1

19.    D palanisamy ,P senthil , V Senthi Kumar (2015) The effect of aging on machinability of 15Cr-5Ni precipitation harden stainless steel ,PP 1653-63

 

161-169

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

33.

Authors:

Kaushik Das, Rajkishur Mudoi

Paper Title:

Detection of Epileptic Seizure using Radius Measurement and Higher Order Moments in The EMD Domain

Abstract:  This paper presents a method for the detection of epileptic seizure from EEG signal using empirical mode decomposition (EMD). The intrinsic mode functions (IMFs) which is generated by the EMD method can be considered as a set of amplitude and frequency modulated (AM-FM) signals. The Hilbert transformations of these IMFs which is circular form in the complex plane can be used as a feature for radius calculation and the higher order moments like variance, skewness and kurtosis are applied on the output values of  Short-time Fourier transform (STFT) of the IMFs, the proposed method  shows better classification result than simply applying higher order moments.  The effectiveness of the proposed method is tested using the dataset which is available online. It is found that the result obtained from radius measurement and higher order statistical moments provide good discrimination performance for the detection of epileptic seizure.

Keywords: Electroencephalogram (EEG), intrinsic mode functions (IMFs), empirical mode decomposition (EMD), Epileptic Seizure.

References:

1. P. C. Petrantonakis and L. J. Hadjileontiadis, “Emotion recognition from EEG using higher order  crossings,” IEEE Trans. Inf. Technol. Biomed., vol. 14, no. 2, pp. 186–197, Mar. 2010.
2. Y. Li et al., “An EEG-based BCI system for 2-D cursor control by combining mu/beta rhythm and p300 potential,” IEEE Trans. Biomed. Eng., vol. 57, no. 10, pp. 2495–2505, Oct. 2010.
3. R. Tetzlaff and V. Senger, “The seizure prediction problem in epilepsy: Cellular nonlinear networks,” IEEE Circuits Syst. Mag., vol. 12, no. 4,pp. 8–20, 2012.
4. Semah et al., “Is the underlying cause of epilepsy a major prognostic factor for recurrence?,” Neurology, vol. 51, no. 5, pp. 1256–1262, 1998.
5. H. Mohseni, A. Maghsoudi, and M. Shamsollahi, “Seizure detection in EEG signals: A comparison of different approaches,” in Proc. 28th Annu. Int. Conf. IEEE EMBS, 2006, pp. 6724–6727.
6. Adeli, H., Zhou, Z., Dadmehr, N., “Analysis of EEG records in an  epileptic patient using wavelet transform,” J. Neurosci. Methods,vol . 123, pp.69-87, 2003.
7. Srinivasan, V., Eswaran, C., Sriraam, N., “Artificial neural  network based epileptic detection using time-domain and  frequency-domain features,”  J. Med. Syst., vol. 29, pp. 647-660, 2005.
8. Accardo, A., Affinito, M., Carrozzi, M., Bouquet, F., “ Use of the fractal  dimension for the analysis of electroencephalographic time series,”  Biol.  Cybern, vol. 77, pp. 339-350, 1997.
9. Casdagli, M.C., Iasemidis, L.D., et. al., “ Non-linearity in invasive EEG recordings from patients with temporal lobe epilepsy,” Electroencephalogr. Clin. Neurophysiol., vol. 102, pp. 98-105, 1997.
10. P. Flandrin, G. Rilling, and P. Goncalves, “Empirical mode   decomposition as a filter bank,” IEEE Signal Process. Lett., vol. 11, no. 2, pp. 112–114, Feb. 2004.
11. R. J. Oweis and E. W. Abdulhay, “Seizure classification in EEG signals utilizing Hilbert-Huang transform,” Biomed. Eng. Online, vol. 10, no.1, p. 38, 2011.
12. EEG Time Series Download Page 2012 [Online]. Available: http://epileptologie-bonn.de/cms/front_content.php?idcat=193&lang3
13. N. E. Huang, Z. Shen, S. R. Long, M. C. Wu, H. H. Shih, Q. Zheng, N. C.Yen, C. C.Tung, andH.H.Liu, “The empirical mode decomposition and Hilbert spectrum for nonlinear and non-stationary time series analysis,” Proc. R. Soc. Lond. A, vol. 454, pp. 903–995, 1998.
14. M.E. Cohen, D.L. Hudson, P. Deedwania, “Applying  continuous  chaotic modeling to cardic signal analysis,”  IEEE  Eng. Med. Biol.Mag. Vol. 15, pp. 97–102. , 1996
15. Alexandros T. Tzallas,  Markos G. Tsipouras, and Dimitrios I. Fotiadis, “Epileptic Seizure Detection in EEGs Using Time–Frequency Analysis,” IEEE Tran. Inf. Tech. in Bio. vol. 13, pp. 703-710, 2009
16. Mohamed Bedeeuzzaman.V, Omar Farooq, Yusuf Uzzaman Khan, “Automatic Seizure Detection Using Higher Order Moments,” IEEE Int. Conf. on Recent Trends in Information, Telecommunication and Computing, pp. 159-163, 201

 

170-174

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Ashish Bandekar, George G. Chase

Paper Title:

Performance of an Electrowet-Coalescer

Abstract: Water in diesel fuel can cause corrosion and reduce engine performance.  Mechanical separators are most effective when water in the fuel is in the form of drops larger than about 100 microns but often fuels contain emulsified drops smaller than 100 microns.  Pre-coalescence of the emulsified drops to larger drops can improve separation performance of mechanical separators such as coalescing and membrane filters. In this work, a thin-slit radial-flow electrowet-coalescer device was experimentally tested and statistically analyzed to evaluate the performance.  The effects of the slit gap distance, the diesel fuel flow rate, and the applied electric potential were evaluated. Application of a full quadratic statistical model and the response optimizer method in Minitab™ shows the applied potential and the gap distance had greater impacts on the average drop size exiting the device than did the flow rate. The analysis determined the best performance occurred with the applied potential of 380V, gap distance of 0.0007m and flow rate of 2ml/s. At these conditions the average drop size increased from 33 microns in the inlet stream to 120 microns in the exit stream.  The electric power required to operate the device was less than 1 milliwatt.

Keywords:
 Electro wetting, Coalescence, Oil-water separation.


References:

1.       French, C. C. (1969). Problems arising from the water cooling of engine components. ARCHIVE: Proceedings of the Institution of Mechanical Engineers, 184(1969), 507-542.
2.       Rakopoulos, C., Rakopoulos, D., Hountalas, D., Giakoumis, E., & Andritsakis, E. (2008). Performance and emissions of bus engine using blends of diesel fuel with bio-diesel of sunflower or cottonseed oils derived from Greek feedstock. Fuel, 87(2), 147-157

3.       Shin, C., & Chase, G. G. (2004). Water-in-oil coalescence in micro-nanofiber composite filters. AIChE Journal, 50(2), 343-350.

4.       Stanfel, C. (2009). Fuel filtration: Protecting the diesel engine. Filtration & Separation, 46(3), 22-25.

5.       Lee, J. S., Ray, R. I., & Little, B. J. (2010). An assessment of alternative diesel fuels: microbiological contamination and corrosion under storage conditions. Biofouling, 26(6), 623-635.

6.       Stone, W., Bessee, G., & Stanfel, C. (2009). Diesel Fuel/Water Separation Test Methods—Where We Are and Where We Are Going. SAE Int. J. Fuels Lubr, 2(1), 317-323.

7.       Lee, T., Wang, F., & Newell, R. (2006). Advances in distributed parameter approach to the dynamics and control of activated sludge processes for wastewater treatment. Water Research, 40(5), 853-869.

8.       Hutten, I. M. (2016). Handbook of nonwoven filter media (2nd ed.). Oxford: Butterworth-Heinemann.

9.       Vladisavljević, G. T., Tesch, S., & Schubert, H. (2002). Preparation of water-in-oil emulsions using microporous polypropylene hollow fibers: influence of some operating parameters on droplet size distribution. Chemical Engineering and Processing: Process Intensification, 41(3), 231-238.

10.    Liu, M., Li, J., & Guo, Z. (2016). Polyaniline coated membranes for effective separation of oil-in-water emulsions. Journal of Colloid and Interface Science, 467, 261-270.

11.    Patel, S. U., & Chase, G. G. (2014). Separation of water droplets from water-in-diesel dispersion using superhydrophobic polypropylene fibrous membranes. Separation and Purification Technology, 126, 62-68.

12.    Liu, M., Li, J., Shi, L., & Guo, Z. (2015). Stable underwater superoleophobic conductive polymer coated meshes for high-efficiency oil–water separation. RSC Adv, 5(42), 33077-33082.

13.    Chase, G. G., & Bandekar, A. (2016). Coalescence of Water Drops in Water-ULSD Dispersions via Electrowetting. Journal of Coating Science and Technology, 3(1),
41-49.

14.    Gil, C. I., López, J. R., García, Z. J., Leguizamón, R. A., & Rodríguez, N. G. (2016). Process analysis and simulation in chemical engineering. Springer.

15.    Panchenkov, G. M., & Vinogradov, V. M. (1970). Water-in-oil emulsion in a constant homogeneous electric field. Chemistry and Technology of Fuels and Oils, 6(6), 438-441.

16.    Eow, J. S., Ghadiri, M., Sharif, A. O., & Williams, T. J. (2001). Electrostatic enhancement of coalescence of water droplets in oil: a review of the current understanding. Chemical Engineering Journal, 84(3), 173-192.

17.    Eow, J. S., & Ghadiri, M. (2003). Drop–drop coalescence in an electric field: the effects of applied electric field and electrode geometry. Colloids and Surfaces A: Physicochemical and Engineering Aspects, 219(1-3), 253-279.

18.    Taylor, S. E. (1988). Investigations into the electrical and coalescence behaviour of water-in-crude oil emulsions in high voltage gradients. Colloids and Surfaces, 29(1), 29-51.

19.    Sample, S. B., Raghupathy, B., & Hendricks, C. D. (1970). Quiescent distortion and resonant oscillations of a liquid drop in an electric field. International Journal of Engineering Science, 8(1), 97-109.

20.    Zhang, Y., Liu, Y., Ji, R., Wang, F., Cai, B., & Li, H. (2011). Application of variable frequency technique on electrical dehydration of water-in-oil emulsion. Colloids and Surfaces A: Physicochemical and Engineering Aspects, 386(1-3), 185-190.

21.    Hafskjold, B., Morrow, T. B., Celius, H. K., & Johnson, D. R. (1994). Drop-Drop Coalescence In Oil/Water Separation. SPE Annual Technical Conference and Exhibition, 2(1), 203-213.

22.    Tcholakova, S., Politova, N., & Denkov, N. (2016). Kinetics of Drop Breakage and Drop-Drop Coalescence in Turbulent Flow. Biomath Communications, 3(1).

23.    Hase, M., Watanabe, S. N., & Yoshikawa, K. (2006). Rhythmic motion of a droplet under a dc electric field. Physical Review E, 74(4).

24.    Liang, W., Chen, Q., Song, C., Zheng, T., & Wei, X. (2015). Motion characteristics of water droplet under AC and DC electric field. Electronic Engineering and Information Science, 99-103.

25.    Chase, G. G., & Aljuhani, A. S. (2013). Electro-coalescence of Water Droplets in Air Medium by Electrowetting. SPE Eastern Regional Meeting. doi:10.2118/165674-ms.

 

175-181

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Modi Milan, Kutwal Musarraf, Varia Akash, Goswami Parth, N. J. Parmar

Paper Title:

Study of 6s Concept and its Effect on Small Scale Industry

Abstract: The search for quality is never ending which involves continuous improvement process to find a way to restrict the reasons creating problems. These can be accomplished by going through stages instead of implementing a large improvement .The various concepts such as Kaizen, PDCA cycle, Quality circle, JIT, 5S, etc. Can be proven helpful in this type of improvement. Among all   Kaizen have high level of difficulty as it requires huge potential steps. Due to this, as a foundation of “Kaizen” we study 6S concept. It is derived from concept of 5S. 6S concept have one more “S” which stands for safety with organization, surrounding and health. The merits of 6s concept are reduce in wastage, reduction in defects, soaring of productivity, morale of worker goes high, etc. This all combine resulted in gradual improvement of industry with reduction in environmental problems. Furthermore, it also reduced the cost of production and high product services.

Keywords:
6S, continuous improvement process, kaizen, 5S, productivity, EHS.


References:

1.    J. Michalska, D. Szewieczek, The 5S methodology as a tool for improving the organisation, Journal of Achievements in Materials and Manufacturing Engineering, Volume 24(2), October 2007, 211- 214.
2.    Gheorghe DULHAI, The 5S strategy for continuous improvement of the manufacturing process in autocar exhaust, Journal of Management & Marketing, Vol.3 (4), 2008, 115-120.

3.    R.T. Salunkhe, G.S. Kamble, Prasad Malage, Inventory Control and Spare Part Management through 5S, KANBAN and Kaizen at ABC Industry, Journal of Mechanical and Civil Engineering (IOSR- JMCE), 43-47

4.    Kaushik Kumar, SanjeevKuma, Step for implementation of 5S, Volume 2(6), June 2012, 402-416.

5.    P. M. Rojasra, M. N. Qureshi, Performance Improvement through 5S in Small Scale Industry: A case study, International Journal of Modern Engineering Research (IJMER) . Vol.3 (3) May – June 2013, 1654-1660.

6.    M. Mahajan, Statistical Quality Control, Dhanpat Rai & Co., 2012.

 

182-186

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

A. Rahil, Alwitaishi M., Kamel M. A., N. M. W. Al-Bustami

Paper Title:

Comparative Analysis of Two Different Adjustment Techniques as Applied to The Least Squares Processing of The Direct Linear Transformation (DLT)

Abstract: A simple method for close range photogrammetric data reduction with non- metric cameras developed by Abdel Aziz and Karara [ ], it establishes the direct linear transformation (DLT) between coordinates of image points, and the corresponding object- space coordinates. This paper concentrates on the method of least squares as a method for adjusting the non-linear transformation equations. Hence, there are two different adjustment techniques that can be used to the processing of the non-linear transformation equations; namely: mixed and parametric least square adjustment techniques. The two different adjustment techniques are applied for two different geometry; namely double station geometry and multi-station geometry. In this study, two different iterative least – squares adjustment techniques are developed to solve the nonlinear transformation equations incorporated with distortion corrections. The results from the two different adjustment techniques will be discussed and analyzed. The obtained results showed the superiority of the mixed adjustment technique especially in the multi- station geometry. Therefore, the least squares mixed adjustment technique is recommended to be used for solving the non-linear transformations incorporated with distortion corrections.

Keywords:
About four key words or phrases in alphabetical order, separated by commas.


References:

1.       Abdel Aziz and Karara, “Photogrammetric potentials of non-metric cameras” Civil Engineering studies, Photogrammetry series No.36, University of Illinois at Urbana-Champaign, 1973.
2.       Abdel Aziz and Karara, “Direct Linear Transformation from comparator coordinates into object space coordinates in Closer –Range photogrammetry ” proceedings of the Asp/ui symposium on Closer –Range photogrammetry, Urbana, Illinois,1974

3.       Doma, M.I., “Application of optimization theory to geodetic networks using different orders design problems”, M. Sc. thesis, Faculty of Engineering, Shebin El-Kom, Minufia University, Egypt, 2004.

4.       Hottier ” Accuracy of close -Range Analytical Restitutions: Practical Experiments and Prediction” Photogrammetric Engineering and Remote sensing, Vol.42, No.3, March.1976, pp. 345-375.

5.       Hirvonen,R.A , “Adjustment by least squares in geodesy and photogrammetry” Ungar, publishers, U.S.A, 1971.

6.       Kenefick, “Ultra-precise Analysis”, Photogrammetric Engineering, Vol.37, No.11, Nov.1971.

7.       Mikhail, E.M. and F. Ackermann (1976)” Observations and Least-Squares” Harper and Row, Inc. New York, U.S.A, 1976.

8.       Nour El deen W.M., ” Use of terrestrial photogrammetry in the Documentation of Egyptian Monuments”, M.Sc., Faculty of Engineering, Ain Shams University, Cairo Egypt.

 

187-192

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Ajit Kumar Senapati, Subham Choudhury, Snehansu Sekhar Mishra, Ravi Roushan, Subhashis Nanda, Amit Kumar Mohanta

Paper Title:

Mechanical and Tribological Analysis of Polymer Matrix Composites

Abstract: Polymer matrix composites are very popular in the applications of lightweight aircraft, marine and automobile structures. Particularly, epoxy resin based reinforced composites are the prepared choice because of the superior physical, thermal, electrical and mechanical properties, ease of processing, excellent wettability with various reinforcements, less moisture pick up, low density, and ductile nature of the epoxy resin. In accordance with that, the present work is aimed to study the mechanical and tribological properties of pariculate filled fibre reinforced glass Epoxy resin polymer matrix composite.  At first glass Epoxy resin polymer matrix composite was prepared by filling varying wt% of Fly Ash(240 mesh size) and Carbon Powder(240 mesh size) using hand lay up technique. While preparation of the polymer matrix composite a brief study on the process of preparation and composition was studied. After that tests for mechanical and tribological properties was carried out. The mechanical property tests such as density and hardness was investigated in accordance with ASTM standards. Tribological properties i.e. two body abrasive wear study was carried out using a pin-on-disc wear tester. According to the observations the concentration of filler material best suited for different purposes was determined. Finally we have compared the properties of Fly Ash and Carbon Powder filled fibre reinforced glass Epoxy resin polymer matrix composite with each other and other polymer matrix composites. It also highlights the current application and future potential of particulate filled glass fiber reinforced polymer matrix composites in aerospace, automotive, marine and other construction industries.

Keywords:
 Polymer Matrix Composites (PMCs), Fly ash, Carbon Powder, Abrasive wear, Micro Hardness, Density.


References:

1.       Xian, Jheng. 2003. A study on the effect of the type and content of filler in epoxy–glass composite system.
2.       Dr. K.A. Rameshkumar. Investigation of Mechanical Properties on Epoxy, Fly Ash and E -Glass Fiber Reinforcement Composite Material

3.       B. Suresha, G. Chandramohan, J. N. Prakash, V. Balusamy and K. Sankaranarayanasamy .2006. The role of Fillers on Friction and Slide Wear Characteristics in Glass-Epoxy Composite Systems.

4.       Suresha, Kishore A, P. Sampathkumaran P. Seetharamu .2007. The role of SiC fillers in glassepoxy (G-E) composites on mechanical and dry sliding wear behavior.

5.       Biswas, Satapathy.2010.Tribological and mechanical investigation on alumina filled glass-epoxy composites.

6.       Basavarajappa , C.M. Manjunatha, Ramesh Bojja, N. Jagannathan .2010. Effect of SiC filler material on three-body abrasive wear behavior of glass-epoxy composites.

7.       Sudarshan Rao K , Y.S Varadarajan  and N Rajendra.2011. The abrasive wear behaviour of  graphite filled carbon fabric reinforcement epoxy composite.

8.       Mohan.N, S. Natarajana, S. Kumaresh Babu .2011. effects of silicon carbide fillers on two-body abrasive wear behavior of glass fabric-epoxy (G-E) composites.

9.       Sujesh, Ganeshan .2012. Tensile behavior of bidirectional woven Glass Fiber Reinforced Epoxy Polymer (GFRP) composites filled with nano silica.

10.    K. Devendra and T. Rangaswamy.2012. Mechanical behaviour of E-Glass Fiber reinforced Epoxy composite filled with varying concentration of AL2O3, Mg(OH)2 and SiC.

11.    R.Satheesh Raja, K.Manisekar, V.Manikanda .2013. Effect of fly ash filler size on mechanical properties of polymer matrix composites.

12.    Weikang Li, Anthony Dichiara, Junwei Zha, Zhongqing Su, Jinbo Bai .2014.  A study on  improvement of mechanical and thermo-mechanical properties of glass fabric/epoxy composites by incorporating CNT–Al2O3 hybrids.

13.    Md Nadeem M, K Chandrashekaran,Yathisha N , Rudramurthy .2014. Effects of Carbon and glass fibre reinforcement and other fillers on elevated temperature resistant properties of ER matrix composites.

14.    Aditi Kaul Shah & Sandeep K. Sodhi .2015. Effect of epoxy modifiers (Al2O3/SiC/TiO2) on the Tensile Strength of epoxy/glass fibre hybrid composites.

15.    Vijay D. Karande, Prof. P.R.Kale .2015. Effect of Fly Ash as Filler on Glass Fiber Reinforced Epoxy Composite.

16.    Iskender Ozsoy, Askin Demirkol, Abdullah Mimaroglu, Huseyin Unal, Zafer Demir.2015. Influence of Micro- and Nano-Filler Content on the Mechanical Properties of Epoxy Composites.

17.    Prasad Galande, S. E. Zarekar(2016) Effect of Various Fillers on Mechanical Properties of Glass Fiber Reinforced Polymer Composites.

18.    Mr.Chavan V.B. , Prof. Gaikwad M.U. A review on development of Glass Fiber/Epoxy Composite Material.

19.    T RAM PRABHU, S BASAVARAJAPPA,R B SANTHOSH and S M ASHWINI.2016. Study on tribological and mechanical behaviour of dual-particle (nanoclay and CaSiO3)-reinforced E-glass-reinforced epoxy nano-composites.

20.    Halil Burak, Kaybal1, Hasan Ulus1, Ahmet Avci .2016. Characterization of Tensile Properties And Toughness Mechanisms on Nano-Al2O3 Epoxy Nano-composites.

 

193-203

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Kajal Sejpal

Paper Title:

Improving The Assembly Process of Down lighter by using Two Hand Process Chart

Abstract: The objective of this research is to improve the productivity by optimizing certain operations of the manual assembly process of a product in a manufacturing industry. By creating a standard process in manual assembly line time is saved as well as energy of the worker is also saved. This leads to increased units of production and lesser fatigue. In this paper, flow process chart of assembly line of a particular product is studied. The two hand process chart of selective time consuming operations is carried out. The time saved and improvement to the operations is noted thus improving the assembly process.

Keywords:
Work flow, Two hand process, Downlighter


References:

1.    Mr. Gurunath V. Shinde, Prof.V.S.Jadhav,” A Computer based novel approach of ergonomic study and analysis of a workstation in a manual process”, International Journal of Engineering Research & Technology,  Vol.1 – Issue 6 (August- 2012),e-ISSN:   2278-0181
2.    Durward K. Sobek, II Dept. of Mechanical and Industrial Engineering Montana State University, Cindy Jimmerson Community Medical Center,”Tool for Process Improvement “

3.    George Kanawaty. Introduction to work study: International Labour Office, Geneva. 4th (revised) edition. 2000;17-108

4.    Dr Ashish Jain,Dr Punit Yadav,”Application of Method Study to Improve Work Flow Process in a Dietary Facility of a Medical College”,Volume 6, Issue 3, March 2016,ISSN – 2249-555X,  IF : 3.919,  IC Value : 74.50

5.    Chapin N. 1970. Flowcharting with the ANSI Standard: A Tutorial. Computing Surveys 1970; 2(2):119-146.

6.    Md. Shakil, Md. Rahamat Ullah, and Mostafa Lutfi,”Process Flow Chart and Factor Analysis in Production of a Jute Mills”,Journal of Industrial and Intelligent Information Vol. 1, No. 4, December 2013

 

204-209

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

39.

Authors:

Mayuri Vaijanath Atre, K. Chandra Obula Reddy

Paper Title:

A Novel Hybrid Power Conditioner for Mitigation of Harmonics and Neutral Line Current in Three Phase Four Wire Distribution System

Abstract:  In this paper, a novel hybrid power conditioner is proposed for suppressing harmonic currents and neutral-line current in three-phase four-wire distribution power systems. The proposed hybrid power conditioner is composed of a neutral-line current attenuator and a hybrid power filter. The hybrid power filter, configured by a three-phase power converter and a three-phase tuned power filter, is utilized to filter the nonzero-sequence harmonic currents in the three-phase four-wire distribution power system. The three-phase power converter is connected to the inductors of the three-phase tuned power filter in parallel, and its power rating can thus be reduced effectively. The tuned frequency of the three-phase tuned power filter is set at the fifth harmonic frequency. The neutral-line current suppressor is connected between the power capacitors of the three-phase tuned power filter and the neutral line to suppress the neutral-line current in the three-phase four-wire distribution power system. With the major fundamental voltage of the utility dropping across the power capacitors of the three-phase tuned power filter, the power rating of the neutral-line current suppressor can thus be reduced. Hence, the proposed hybrid power conditioner can effectively reduce the power rating of passive and active elements. A hardware prototype is developed to verify the performance of the proposed hybrid power conditioner. Experimental results show that the proposed hybrid power conditioner achieves expected performance.

Keywords:
 Harmonic, neutral-line current, power converter


References:

1.       B. Singh, P. Jayaprakash, T. R. Somayajulu, and D. P. Kothari, “Reduced rating VSC with a zig-zag transformer for current compensation in a three-phase four-wire distribution system,” IEEE Trans. Power Del., vol. 24, no. 1, pp. 249–259, Jan. 2009.
2.       R. M. Ciric, L. F. Ochoa, A. Padilla-Feltrin, and H. Nouri, “Fault analysis in four-wire distribution networks,” Proc. Inst. Elect. Eng., Gen., Transm. Distrib., vol. 152, no. 6, pp. 977–982, 2005.

3.       J. C. Meza and A. H. Samra, “Zero-sequence harmonics current minimization using zero-blocking reactor and zig-zag transformer,” in Proc. IEEE DRPT, 2008, pp. 1758–1764.

4.       H. L. Jou, J. C.Wu,K.D.Wu,W. J. Chiang, andY. H. Chen, “Analysis of zig-zag transformer applying in the three-phase four-wire distribution power system,” IEEE Trans. Power Del., vol. 20, no. 2, pt. 1, pp.1168–1178, Apr. 2005.

5.       S. Choi and M. Jang, “Analysis and control of a single-phase-inverter zigzag-transformer hybrid neutral-current suppressor in three-phase four-wire systems,” IEEE Trans. Ind. Electron., vol. 54, no. 4, pp. 2201–2208, Aug. 2007.

6.       J. C. Wu, H. L. Jou, K. D. Wu, and S. T. Xiao, “Single-phase inverter- based neutral-current suppressor for attenuating neutral current of three-phase four-wire distribution power system,” IET Gen., Transm. Distrib., vol. 6, no. 6, pp. 577–583, 2012, 2012.

7.       B. Singh, P. Jayaprakash, and D. P. Kothari, “Three-phase four-wire dstatcom with H-bridge VSC and star/delta transformer for power quality improvement,” Proc. IEEE INDICON, vol. 2, pp. 412–417, 2008.

8.       S. Inoue, T. Shimizu, and K. Wada, “Control methods and compensation characteristics of a series active filter for a neutral conductor,” IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 433–440, Feb. 2007.

9.       B. Nassif,W. Xu, andW. Freitas, “An investigation on the selection of filter topologies for passive filter applications,” IEEE Trans. Power Del., vol. 24, no. 3, pp. 1710–1718, Jul. 2009.

10.    G. W. Chang, H. L.Wang, G. S. Chuang, and S. Y. Chu, “Passive harmonic filter planning in a power system with considering probabilistic constraints,” IEEE Trans. Power Del., vol. 24, no. 1, pp. 208–218, Jan. 2009.

11.    J. Miret, M. Castilla, J. Matas, J. M. Guerrero, and J. C. Vasquez, “Selective harmonic-compensation control for single-phase active power filter with high harmonic rejection,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 3117–3127, Aug. 2009.

12.    B. Singh and J. Solanki, “An implementation of an adaptive control algorithm for a three-phase shunt active filter,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 2811–2820, Aug. 2009.

13.    O. Vodyakho and C. C. Mi, “Three-level inverter-based shunt active power filter in three-phase three-wire and four-wire systems,” IEEE Trans. Power Electron., vol. 24, no. 5, pp. 1350–1363, May 2009.

14.    M. Aredes, H. Akagi, E. H.Watanabe, E. V. Salgado, and L. F. Encarnacao, “Comparisons between the p-q and p-q-r theories in three-phase four-wire systems,” IEEE Trans. Power Electron., vol. 24, no. 4, pp. 924–933, Apr. 2009.

15.    P. Salmeron and S. P. Litran, “Improvement of the electric power quality using series active and shunt passive filters,” IEEE Trans. Power Del., vol. 25, no. 2, pp. 1058–1067, Apr. 2010.

16.    P. Salmeron and S. P. Litrán, “A control strategy for hybrid power filter to compensate four-wires three-phase systems,” IEEE Trans. Power Electron., vol. 25, no. 7, pp. 1923–1931, Jul. 2010.

17.    S. P. Litrán and P. Salmeron, “Analysis and design of different control strategies of hybrid active power filter based on the state model,” IET Power Electron., vol. 5, no. 8, pp. 1341–1350, 2012.

18.    S. Rahmani, A. Hamadi, N. Mendalek, K. Al-Haddad, and K. , “A new control technique for three-phase shunt hybrid power filter,” IEEE Trans. Ind. Electron., vol. 56, no. 8, pp. 2904–2915, Aug. 2009.

19.    H. Akagi and T. Hatada, “Voltage balancing control for a three-level diode-clamped converter in a medium-voltage transformer less hybrid active filter,” IEEE Trans. Power Electron., vol. 24, no. 3, pp. 571–579, Mar. 2009.

20.    H. L. Jou,K.D.Wu, J. C.Wu, C. H. Li, and M. S. Huang, “Novel power converter topology for three-phase four-wire hybrid power filter,” IET Power Electron., vol. 1, no. 1, pp. 164–173, Mar. 2008.

21.    S. H. Hosseini, T. Nouri, and M. Sabahi, “A novel hybrid active filter for power quality improvement and neutral current cancellation,” in Proc. Int. Conf. Elect. Electron. Eng., 2009, pp. I-244–I-248.

22.    L. Asiminoaei, W. Wiechowski, F. Blaabjerg, T. Krzeszowiak, and B. Kedra, “A new control structure for hybrid power filter to reduce the inverter power rating,” in Proc. IEEE IECON, 2006, pp. 2712–2717.

23.    S. Rahmani, K. AI-Haddad, and F. Fnaiech, “A three phase shunt hybrid power filter adopted a general algorithm to compensate harmonics, reactive power and unbalanced load under nonideal mains voltages,” in Proc. IEEE ICIT, 2004, vol. 2, pp. 651–656.

24.    Hamadi, S. Rahmani, W. Santana, and K. Al-Haddad, “Study on a novel hybrid active power filter applied to a high-voltage grid,” IEEE Trans. Power Del., vol. 24, no. 4, pp. 2344–2352, Oct. 2009.

25.    J. C.Wu, H. L. Jou, K. D.Wu, and H. H. Hsiao, “Three-phase four-wire hybrid power filter using a small power converter,” Elect. Power Syst. Res., vol. 87, pp. 13–21, 2012.

210-214

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

40.

Authors:

Alkhatab Khalafalla Muslim Abdelhadi, Hala Eldaw Idris

Paper Title:

Performance Evaluation of ARQ Mechanism in Wimax Networks

Abstract: WiMAX (Worldwide Interoperability for Microwave Access) is the IEEE 802.16 standards-based wireless technology, provides Broadband Wireless Access (BWA) for Metropolitan Area Networks (MAN). The Automatic Repeat request (ARQ) mechanism in WiMAX uses a feedback channel for the confirmation of error-free packet delivery or for packet retransmission request. This method can increase network throughput when radio channel condition is worse. In this paper attempt has been made to study the effect of implementation of ARQ on the performance of WiMAX network through simulation. Simulation study has been carried out for WiMAX network with and without enabling ARQ. The performance is been compared by considering the performance metrics like throughput, delay and jitter.

Keywords:
WiMAX, ARQ, Base station, Subscriber Stations, Simulation.


References:

1.       IEEE802.16e: IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems, 2005.
2.       IEEE802.16e: IEEE Standard for Local and metropolitan area networks Part 16: Air Interface for Broadband Wireless Access Systems, 2009.

3.       Jeffrey G. Andrews, Anurabha Ghosh and Rias Muhamed, “Fundamentals of WiMAX”, Prentice Hall Communications.

4.       Klaus Sambale, Zdeneck Becvar and Ardian Ulvan,(2008), “Identification of the MAC/PHY key reconfiguration parameters”, ICT ROCKET project milestone 5M2, ICT-215282 STP.

5.       Byeong Gi Lee and Sunghyun Choi, (2008), “Broadband Wireless Access and Local Networks: Mobile WiMAX and WiFi”. Artech House.

6.       Min-Seok Kang and Jaeshin Jang, (2006). “Performance evaluation of IEEE 802.16d ARQ algorithms with NS-2 simulator”, Asia-Pacific Conference on Communications, pp 1 – 5

7.       Vitaliy Tykhomyrov, Alexander Sayenko, Henrik Martikainen, Olli Alanen1and Timo Hamalainen, (2007). “Performance Evaluation of the IEEE 802.16 ARQ Mechanism”, In Proceedings of 7th International Conference Next Generation Teletraffic and Wired/Wireless Advanced Networking, NEW2AN 2007, pp. 148-161

8.       Alexander Sayenko, Henrik Martikainen and Alexander Puchko, (2008). “Performance comparison of HARQ and ARQ mechanisms in IEEE 802.16 networks”, In Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems MSWiM ’08.

215-217

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Saleh S. AlTayyar, Ahmed E. Negm

Paper Title:

Foot Classification and Influence of Pattern Recognition

Abstract:  The article presents the application of neural network and decision tree techniques to investigating barometric data got with instruments measuring the weight of the human plantar onto contact surface while strolling. The examination was completed on a gathering of plantar foot photo taken while the subject remained on the reflected photograph box. We gather 35 understanding, 30 of them are male and 5 female with various ages. Numerical qualities for foot examination for every patient foot part get measuring 12 property. Some foot plant pathologies, similar to buckle and level foot, are ordinarily identified by a human master by method for impression pictures. All things considered, the absence of prepared individual to finish such huge first screening discovery endeavors blocks the routinely analytic of the previously mentioned pathologies. In this work an imaginative programmed framework for foot plant pathologies in view of neural systems (NN) and Decision Tree (DT) are introduced. The outcomes accomplished with this framework confirm the attainability of setting up programmed conclusion frameworks in light of the impression and example acknowledgment. The order settled on by the resultant choice tree was right for all the more than 94% steps. This permits to point the parameters which are the best discriminators between the explored sorts of human walk.

Keywords: 
Foot Deformities, Photography, Pattern Recognition, Neural Network, Decision Trees.

References:

1.       M. C. J. D. S. a. L. P. Marco Mora, “Automatic Diagnosis of Foot Plant Pathologies: A Neural Networks Approach,” in International Symposium on Neural Networks, 2007.
2.       M. Derlatka and M. Ihnatouski, “Decision tree approach to rules extraction for human gait analysis,” in International Conference on Artificial Intelligence and Soft Computing, 2010.

3.       T. Chau, “A review of analytical techniques for gait data. Part 1: fuzzy, statistical and fractal methods,” Gait & posture, vol. 13, no. 1, pp. 49-66, 2001.

4.       R. Begg and J. Kamruzzaman, “A machine learning approach for automated recognition of movement patterns using basic, kinetic and kinematic gait data,” Journal of biomechanics, vol. 38, no. 3, pp. 401-408, 2005.

5.       M. Derlatka, “Application of Kernel principal component analysis in human gait,” Journal of Vibroengineering , vol. 7, no. 3, pp. 27-30, 2005.

6.       M. Derlatka and J. Pauk, “Data Mining in Analysis of Biomechanical Signals,” in Solid State Phenomena, 2009.

7.       S. Ghoussayni, C. Stevens, S. Durham and D. Ewins, “Assessment and validation of a simple automated method for the detection of gait events and intervals,” Gait & Posture, vol. 20, no. 3, pp. 266-272, 2004.

8.       S. Wolf, T. Loose, M. Schablowski, L. Döderlein, R. Rupp, H. J. Gerner, G. Bretthauer and R. Mikut, “Automated feature assessment in instrumented gait analysis,” Gait & posture, vol. 23, no. 3, pp. 331-338, 2006.

9.       J. Wu, J. Wang and L. Liu, “Kernel-based method for automated walking patterns recognition using kinematics data,” in International Conference on Natural Computation, 2006.

10.    Yardimci, “Fuzzy logic based gait classification for hemiplegic patients,” in International Symposium on Intelligent Data Analysis, 2007.

11.    S. J. Olney, M. P. Griffin and I. D. McBride, “Multivariate examination of data from gait analysis of persons with stroke,” Physical Therapy, American Physical Therapy Association, vol. 78, no. 8, pp. 814-828, 1998.

12.    T. Chau, “A review of analytical techniques for gait data. Part 2: neural network and wavelet methods,” Gait & Posture, vol. 13, no. 2, pp. 102-120, 2001.

13.    H. Liu and H. Motoda, Feature selection for knowledge discovery and data mining, vol. 454, Springer Science & Business Media, 2012.
14.    L. Wang and T. S. Buchanan, “Prediction of joint moments using a neural network model of muscle activations from EMG signals,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 10, no. 1, pp. 30-37, 2002.
15.    S. Haykin, “Neural networks: MacMillan College Publ,” Co., New York, 1994.

16.    S. Armand, E. Watelain, E. Roux, M. Mercier and F.-X. Lepoutre, “Linking clinical measurements and kinematic gait patterns of toe-walking using fuzzy decision trees,” Gait & posture, vol. 25, no. 3, pp. 475-484, 2007.

17.    R. Mikut, J. Jäkel and L. Gröll, “Interpretability issues in data-based learning of fuzzy systems,” Fuzzy Sets and Systems, vol. 150, no. 2, pp. 179-197, 2005.

18.    W. Pretkiewicz-Abacjew and W. Erdmann, “Kinematics of walking of 6 year old children,” Journal of Human Kinetics, vol. 3, pp. 115-130, 2000.

19.    Valenti, “Orthotic Treatment of Walk Alterations,” Panamerican Medicine,(in spanish), 1979.

20.    Morsy and A. Hosny, “A new system for the assessment of diabetic foot planter pressure,” Engineering in Medicine and Biology Society, 2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 1, no. IEEE, pp. 1376-1379, 2004.

21.    K. Nakajima, Y. Mizukami, K. Tanaka and T. Tamura, “Footprint-based personal recognition,” IEEE Transactions on Biomedical Engineering, vol. 47, no. 11, pp. 1534-1537, 2000.

22.    S. R. Shah and K. Patil, “Processing of foot pressure images and display of an advanced clinical parameter PR in diabetic neuropathy,” in Conference Proceedings. 2nd International IEEE EMBS Conference on Neural Engineering, 2005., 2005.

23.    M. Mora and D. Sbarbaro, “A robust footprint detection using color images and neural networks,” in Iberoamerican Congress on Pattern Recognition, 2005.

24.    N. J. I. Q. R. Chuckpaiwong B, “Correlation between static foot type measurements and clinical assessments.,” Foot Ankle Int., vol. 30, no. 3, pp. 205-212, 2009.

25.    M. Razeghi M, “Foot type classification: a critical review of current methods.,” Gait Posture., vol. 15, no. 3, p. 282–91, 2002.

26.    M. A. E. J. Leung AK, “Biomedical gait evaluation of the immediate effect of orthotic treatment for flexible flat foot.,” Prosthet Orthot Int. , vol. 22, no. 1, pp. 25-34, 1998.

27.    M. S. Menz HB, “Validity of 3 clinical techniques for the measurement of static foot posture in older people.,” J Orthop Sports Phys Ther. , vol. 35, no. 8, p. 479–86, 2005.

28.    E. J. T. C. e. a. Villarroya MA, “Foot structure in overweight and obese children.,” Int J Pediatr Obes., vol. 3, no. 1, pp. 39-45, 2008.

29.    H. W. N. J. e. a. Mall NA, “The reliability and reproducibility of foot type measurements using a mirrored foot photo box and digital photography compared to caliper measurements.,” J Biomech., vol. 40, no. 5, pp. 1171-6, 2007.

30.    M. McPoil TG, “Use of plantar contact area to predict medial longitudinal arch height during walking.,” J Am Podiatr Med Assoc, vol. 96, no. 6, pp. 489-94, 2006.

31.    S. J. M. B. Mickle KJ, “The feet of overweight and obese young children: are they flat or fat?,” Obesity (Silver Spring)., vol. 14, no. 11, pp. 1949-53, 2006.

32.    G. J. R. D. Bosch K, “Development of healthy children’s feet–nine-year results of a longitudinal investigation of plantar loading patterns.,” Gait Posture., vol. 32,
no. 4, p. 564–71, 2010.

33.    M. B. S. M. Igbigbi PS, “Arch index as a predictor of pes planus: a comparative study of indigenous Kenyans and Tanzanians.,” J Am Podiatr Med Assoc. , vol. 95, no. 3, p. 273–6, 2005.

34.    G. R. W. C. e. a. Xiong S, “Foot arch characterization: a review, a new metric, and a comparison.,” J Am Podiatr Med Assoc., vol. 100, no. 1, pp. 14-24, 2010.

35.    G. R. A. J. e. a. Faria A, “The relationship of body mass index, age and triceps-surae musculotendinous stiffness with the foot arch structure of postmenopausal women.,” Clin Biomech (Bristol, Avon). , vol. 25, no. 6, p. 588–93., 2010;.

36.    W. C. Chu, S. H. Lee, W. Chu, T.-J. Wang and M.-C. Lee, “The use of arch index to characterize arch height: a digital image processing approach,” IEEE Transactions on Biomedical Engineering, vol. 42, no. 11, pp. 1088-1093, 1995.

37.    J. L. McClelland, D. E. Rumelhart and G. E. Hinton, “The appeal of parallel distributed processing,” MIT Press, Cambridge MA, pp. 3-44, 1986.

38.    F. D. Foresee and M. T. Hagan, “Gauss-Newton approximation to Bayesian learning,” in Neural Networks, 1997. International Conference on, 1997.

39.    J. MacKay, “Bayesian interpolation,” Neural computation, vol. 4, no. 3, pp. 415-447, 1992.

40.    J. Pauk and K. Jaworek, “Parametric identification of lower limbs during walking of a man,” WIT Transactions on Ecology and the Environment, vol. 57, 2002.

41.    M. Romei, M. Galli, F. Motta, M. Schwartz and M. Crivellini, “Use of the normalcy index for the evaluation of gait pathology,” Gait & posture, vol. 19, no. 1, pp. 85-90, 2004.

 

218-225

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Saleh S. Altayyar

Paper Title:

A Comparative Study of Medical Equipment Maintenance Cost and Performance for Selected Saudi Hospitals

Abstract:    Healthcare technology administrators are always held responsible for the poor performance of the medical equipment maintenance team, delay in response to service requests, and long down time. Customer satisfaction are just part of the challenges they are facing. The objective of this study is to analyze and compare the cost of medical equipment maintenance, performance of medical equipment maintenance team in three major hospitals in Saudi Arabia (academic, military, and public). The annual cost of maintenance per medical equipment, work load  per 1 FTE (technical employee), down time, turnaround time, cost of service ratio (COSR), hourly cost of maintenance, and acquisition cost per 1 FTE (technical employee) are used in the assessment and analytical comparison. When comparing the cost of service (COSR), turnaround time, and the down time in the three hospitals, it can be seen that the academic hospital has the lowest COSR (3.7%), the lowest down time (1.2 days) and the lowest turnaround time (1.5 days). The other two hospitals (military and public) have relatively higher COSR (6.7 and 5.8 %) respectively and high down time (29 and 10.7) days respectively.  it is clear from this study that hospital that uses a combination of in house, Original Equipment Manufacturer (OEM), and independent service provider (third party) contract tend to have redundancy in technical staff which results in under worked technical staff and consequently unnecessary increased spending on maintenance, and poor maintenance performance, when measured by the annual cost of maintenance of medical equipment, down time, and turnaround time. This can be seen in the public hospital which has the highest cost of medical equipment maintenance among the three hospitals ($570).

Keywords:
 Acquisition Cost per technician, Cost of Service (COSR), Medical equipment maintenance, Methods of Maintenance.


References:

1.       Information document concerning the definition of the term “medical device”. Global Harmonization Task Force, 2005 (http://www.ghtf.org/documents/sg1/sg1n29r162005. pdf, accessed March 2011).
2.       Medical equipment maintenance programme overview. WHO Medical device technical series, 2011.

3.       Emily Kulenkamp   what do donuts and equipment service contracts have in common?. October 03, 2015.

4.       Blumberg DF. New strategic directions in acquiring and outsourcing high-tech services by hospitals and implications for clinical engineering organizations and ISOs. In: Dyro JF. Clinical engineering handbook. San Diego (United States): Elsevier Academic Press; 2004. P 137–46.

5.  Global Industry Analysts, Inc. Medical devices outsourcing: a global strategic business report. 2010. Available from: www.strategyr. Com/Medical_Device_Outsourcing_Market_ Report.asp Accessed 8 March 2012.

6.       Smithson P, Dickey D.Outsourcing clinical engineering service.n: Dyro JF.Clinical engineering handbook. San Diego (United States): Elsevier Academic Press; 2004.Pp135–7.

7.       Ministry of Health Annual Report, Saudi Arabia (2015).

8.       Direct communication with the Equipping Directorate – Ministry of Health, Saudi Arabia 2017).

9.       Antonio Miguel-C; Adriana Rios-Rincón; Gregory L. Haugan.   Outsourcing versus in-house maintenance of medical devices: a longitudinal, empirical study. Rev Panam Salud Publica vol.35 n.3 Washington Mar. 2014.

10.    Patricia McLoughlin. OEM Mairuzntenance Contracts vs. Third Party Maintenance. Managed Maintenance. Feb 07,2012

11.    Lawrence Martin. “How to compare costs between in-house and contracted services.”  Executive Summary. How – to – guide #4. March 1993.

12.    Larry Nguyen. Five ways hospitals can cut equipment maintenance costs. May 21, 2015.

13.    Patrick E. Lynch. Measuring the cost of service. TechNation, July 2013. P46-48.

14.    Michelle Bush, Matt Baretich, Frank Painter. Benchmarking solutions Healthcare technology management. A resources for clinical engineering departments. AAMI, May, 10, 2016.

15.    Doug Dreps, Dave Dickey. Cost of Service Ratio Comparison: A tale of two health care systems. Mercy clinical engineering services. P 1 – 25.

 

226-231

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

Cong-Trang Nguyen, Yao-Wen Tsai

Paper Title:

A Decentralized Finite-Time Sliding Mode Controller for Large-Scale Systems: a Moore-Penrose Inverse Approach

Abstract: In this paper, a class of uncertain large-scale systems with mismatched uncertainties and unknown disturbances of state variables is considered. First, a novel reduced-order observer (ROO) is designed to estimate un- measurable variables. A novel decentralized finite-time sliding mode controller (DFTSMC) based on measured variables is then established to drive state trajectory of systems to a sliding surface  and main a sliding motion on it thereafter in finite time.  In addition, a newly appropriate linear matrix inequality (LMI) condition is given such that the system in sliding mode is asymptotically stable. Finally, a numerical simulation is performed which shows the effectiveness and advantages of proposed method.

Keywords:
Decentralized Finite Time Sliding Mode Controller (DFTSMC), Reduced-Order Observer (ROO), finite-time convergence, large-scale systems.


References:

1.          J. Y. Hung, W. Gao, and J. C. Hung, “Variable structure control: A survey,” IEEE Transactions on Industrial Electronics, vol. 40, no. 1, pp. 2–22, 1993.
2.          S. H. Zak, Systems and Control, Novel York: Oxford Univ. Press, 2003.

3.          K. Y. Chang and W. J. Wang, “H∞ norm constraint and variance control for stochastic uncertain large-scale systems via the sliding mode concept,” IEEE Trans. Circuits Syst. I, vol. 46, no. 10, pp. 1275–1280, Oct. 1999.

4.          S. J. Shigemaru and H. S. Wu, “Decentralized adaptive sliding mode controllers for a class of large scale interconnected systems with uncertainties, ” International Conf on Control and Automation, Budapest, Hungary, 293-298, 2005.

5.          C. C. Cheng, C. C. Wen, and W. T. Lee, “Design of decentralized sliding surfaces for a class of large-scale systems with mismatched perturbations,” Int. J. Control, vol. 82, no. 11, pp. 2013-2025, 2009.

6.          K. K. Shyu, W. Liu, and K. C. Hsu, “Decentralized variable structure control of uncertain large-scale systems containing a dead-zone,” IEE Proc. Control Theory Appl., vol. 150, no. 5, pp. 467–475, Sep. 2003.

7.          C. H. Chou and C. C. Cheng, “A decentralized model reference adaptive variable structure controller for large-scale time-varying delay systems,” IEEE Trans. Automat. Control, vol. 48, no. 7, pp. 1213–1217, Jul. 2003.

8.          Y. W. Tsai, K. K. Shyu, and K. C. Chang, “Decentralized variable structure control for mismatched uncertain large-scale systems: A new approach,” Syst. Control Letter, vol. 43, no. 2, pp. 117–125, 2005.

9.          Zamani, N. Sadati, and M. H. Zarif, “On the stability issues for fuzzy large-scale systems,” Fuzzy Sets Syst., vol. 174, no. 1, pp. 31–49, Jul. 2011.

10.       B. C. Zheng and G. H. Yang, “Decentralized sliding mode quantized feedback control for a class of uncertain large-scale systems with dead-zone input,” Nonlinear Dynamics, vol. 71, no. 3, pp. 417–427, 2013.

11.       X. G. Yan, S. K. Spurgeon, and C. Edwards, “Decentralized output feedback sliding mode control of nonlinear large-scale systems with uncertainties,” Journal of Optimization Theory and Applications, vol. 119, no. 3, pp. 597–614, 2003.

12.       K. Kalsi, J. Lian, and S. Zak, “Decentralized dynamic output feedback control of nonlinear interconnected systems,” IEEE Transactions on Automatic Control, vol. 55, no. 8, pp. 1964–1970, 2010.

13.       X. G. Yan, C. Edwards, and S. K. Spurgeon, “Dynamic sliding mode control for a class of systems with mismatched uncertainty,” Eur. J. Control, vol. 11, pp. 1–10, 2005.

14.       K. Kalsi, J. Lian, and S. H. Zak, “Reduced-order observer-based decentralized control of non-linear interconnected systems,” International Journal of Control, Vol. 82 No. 6, pp. 1157–1166, 2009.

15.       X. G. Yan, S. K. Spurgeon, and C. Edwards, “Decentralized sliding mode control for non-minimum phase interconnected systems based on a reduced-order compensator,” Automatica, vol. 42, no. 10, pp. 1821–1828, 2006.

16.       H. Li, P. Shi, D. Yao, and L. Wu, “Observer-based adaptive sliding mode control for nonlinear Markovian jump systems,” Automatica, vol. 64, pp. 133–142, Feb. 2016.

17.       Z. Liu, L. Zhao, Y. Kao, and C. Gao, “Robust passive control for a class of uncertain neutral systems based on sliding mode observer,” ISA Transactions, http://dx.doi.org/10.1016/j.isatra.2016.10.013, 2016.

18.       H. H. Choi, “An LMI-based switching surface design method for a class of mismatched uncertain systems,” IEEE Transactions on Automatic Control, vol. 48, no. 9, pp. 1634– 1638, 2003.

19.       K. K. Shyu , Y. W. Tsai, and C. K. Lai, “A dynamic output feedback controllers for mismatched uncertain variable structure systems,” Automatica, Vol. 37, 2001, pp. 775-779, 2001.

20.       J. H. Zhang and Y. Q. Xia, “Design of static output feedback sliding mode control for uncertain linear systems,” IEEE Trans. Ind. Electron., vol. 57, no. 6, pp.
2161–2170, Jun. 2010.

21.       P. Khargonekar, I. Petersen, and K. Zhou,“Robust stabilization of uncertain linear systems: Quadratic stabilizability and control theory,” IEEE Trans. Autom. Control, vol. 35, no. 3, pp. 356–361, Mar. 1990.

22.       S. Boyd, L. El Ghaoui, E. Feron, and V. Balakrishnan: Linear Matrix Inequalities in System and Control Theory. Siam, Philadelphia, PA 1994.

23.       P. Gahinet, A. Nemirovski, A. J. Laub, and M. Chilali: LMI Control Toolbox. The MathWorks, Natick, MA 1995.

24.       J. Lian and J. Zhao, “Output feedback variable structure control for a class of uncertain switched systems,” Asian J. Control, vol. 11, no. 1, pp. 31–39, 2009.

 

232-240

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

B. Sunil, V. R. Rajeev, C. Jaimon, S. Jose

Paper Title:

Numerical Simulation of Dry Reciprocating Wear Loss Characteristics of Al 6061 Alloy

Abstract:  In this paper, attempts were made to develop a numerical wear model. The developed wear model was used to investigate the effect of parameters on the response reciprocating wear loss characteristics of Al 6061 alloy against En 31 hard steel counterface. A Box-Behnken design of experiment was used to investigate the effect of parameters such as normal load (15-45N), reciprocating velocity (0.4-0.6 m/s), and sliding distance (300-500 m) on the response reciprocating wear loss characteristics of Al 6061 alloy. The normal load (Percentage of contribution, P = 34.23%), and reciprocating velocity (P = 43.75%), sliding distance (P = 14.45%) are the controlling factors on the response wear loss behaviour of Al 6061 alloy. The interaction model term between the normal load and reciprocating velocity (P = 3.21%) was the secondary influencing factor on the response wear loss characteristics of Al 6061 alloy within the range of parameters investigated. An optimized sliding condition was identified by the genetic algorithm (GA) approach as load 15N, reciprocating velocity 0.6m/s and sliding distance 300m.

Keywords:
 Wear loss, Percentage of contribution, Reciprocating tribometer, Genetic algorithm.


References:

1.        Ye H. “An overview of the development of Al-Si-alloy based material for engine applications”. Journal of Materials Engineering and Performance, 2003;12:288–97.
2.        Molpeceres C, Porro J, Morales M. “Wear and friction of 6061-T6 aluminum alloy treated by laser shock processing”. Wear, 2006;260:847–54.

3.        Man HC, Zhang S, Cheng FT. “Improving the wear resistance of AA 6061 by laser surface alloying with NiTi”. Materials Letters, 2007;61:4058–61.

4.        Gopalakrishnan S, Murugan N. “Production and wear characterisation of AA 6061 matrix titanium carbide particulate reinforced composite by enhanced stir casting method”. Composites Part B: Engineering. 2012;43:302–8.

5.        Andersson J, Almqvist A, Larsson R. “Numerical simulation of a wear experiment”. Wear, 2011;271:2947–52.

6.        Fernández JE, Roc M, Diaz RV, Navarro RT, “Abrasive wear analysis using factorial experiment design”. Wear, 2003;255:38–43.

7.        Rajeev VR, Dwivedi DK, Jain SC. “Dry reciprocating wear of Al-Si-SiCp composites: A statistical analysis”. Tribology International, 2010;43:1532–41.

8.        Prakash Maran J, Manikandan S, Thirugnanasambandham K, Vigna Nivetha C, Dinesh R. “Box-Behnken design based statistical modeling for ultrasound-assisted extraction of corn silk polysaccharide”. Carbohydrate Polymers ,2013;92:604–11.

9.        Rajeev VR, Dwivedi DK, Jain SC. “A fractional factorial design study of reciprocating wear behavior of Al-Si-SiC p composites at lubricated contacts”. Journal of Materials Engineering and Performance, 2011;20:368–76.

10.     Ramesh CS, Keshavamurthy R, Channabasappa BH, Pramod S. “Friction and wear behavior of Ni–P coated Si3N4 reinforced Al6061 composites”. Tribiology International, 2010;43:623–34.

11.     Shorowordi KM, Haseeb ASMA, Celis JP. “Velocity effects on the wear, friction and tribochemistry of aluminum MMC sliding against phenolic brake pad”. Wear, 2004;256:1176–81.

12.     Meng HC, Ludema KC, “Wear Models and Predictive Equations: Their Form and Content”. Wear, 1995;181–183:443–57.

13.     Ahmed H A  M, El-Midany, Abdel-Khalek N A . “Statistical optimisation of some parameters affecting flocculation of Egyptian iron ore”. Mineral Processing and Extractive Metallurgy : IMM Transactions Section C, 2007;116:239–44.

14.     Torabian H, Pathak JP, Tiwari SN. “Wear characteristics of Al-Si alloys”. Wear, 1994;172:49–58.

15.     Alhawari KS, Omar MZ, Ghazali MJ, Salleh MS, Mohammed MN. “Evaluation of the microstructure and dry sliding wear behaviour of thixoformed A319 aluminium alloy”. Materials and Design, 2015;76:169–80.

16.     Liu Y, Asthana R, Rohatgi P. “A map for wear mechanisms in aluminium alloys”. Journal of Materials Science ,1991;26:99–102.

17.     Sharma SC, Girish BM, Kamath R, Satish BM. “Effect of SiC particle reinforcement on the unlubricated sliding wear behaviour of ZA-27 alloy composites”. Wear, 1997;213:33–40.

18.     Zhang L, He XB, Qu XH, Duan BH, Lu X, Qin ML. “Dry sliding wear properties of high volume fraction SiCp/Cu composites produced by pressureless infiltration”. Wear, 2008;265:1848–56.

19.     Iquebal MA, Ghosh H. “Genetic algorithm optimization technique for linear regression models with heteroscedastic errors”. Indian Journal of Agricultural Sciences, 2012;82:422–5.

 

241-246

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Shruti S. Sonone, R. M. Autee

Paper Title:

Prepaid Multifunction Controlled Metering System using MATLAB GUI

Abstract: The system of Prepaid Multifunction Controlled Metering System using MATLAB GUI is developed for monitoring Electricity, Water & Gas consumption. Accurate billing is an important factor to manage household finances especially in difficult times. It is a tool that records amount of energy, water & gas used by a residence or Organizations. This system consists of Energy Metering IC module, Water flow sensor and Gas Detector at customer side. Prepaid services are concept of “First Pay & then use it” done using GSM module which sent SMS of low Balance Energy Meter, Water meter and Gas alert. Similarly using MATLAB GUI, real time readings of Energy Meter, Water meter and Gas alert are displayed on Graphical User Interface and LCD. This reduces wastage of Energy, Water & Gas and helps to keep a track on average domestic & commercial usage.

Keywords:
Energy Metering IC, Water Flow Sensor, Gas sensor, ARM7, GSM, MATLAB GUI.


References:

1. H. G. Rodney Tan, C. H. Lee & V. H. Mok, “Automatic Power Meter Reading System using GSM Network”, IEEE-The 8th International Power Engineering Conference (IPEC 2007)
2. Ashish Shrivastava, RatneshPrabhaker, Rajeev Kumar and Rahul Verma, “Gsm Based Gas Leakage Detection System” International Journal of Technical Research and Applications e-ISSN: 2320-8163, www.ijtra.com Volume 1, Issue 2 (may-june 2013), PP. 42-45
3. Manisha V Shinde, Pradip W Kulkarni, “New Development In Energy Meter Reading System” International Journal of Scientific Research and Management Studies (IJSRMS) ISSN: 2349-3771 Volume 1 Issue 4, pg: 124-129
4. HarshadaNavale, Prof.B.V.Pawar, “ARM based Gas Monitoring System”, International Journal of Scientific & Technology Research ,Vol 3, Issue 6 June 2014
5. Md. MejbaulHaque, Md. Kamal Hossain, Md. Mortuza Ali, Md. Rafiqul Islam Sheikh, “Microcontroller Based Single Phase Digital Prepaid Energy Meter for Improved Metering and Billing System”, International Journal of Power Electronics and Drive System (IJPEDS) Vol.1, No.2, December 2011, pp. 139~147 ISSN: 2088-8694 
6. Yogendra P Joshi, M. B. Tadwalkar, “Automatic Water Meter Reading System Based On GSM Network”, VIII IRF International Conference 4th May-2014, Pune, India, ISBN: 978-93-84209-12-4
7. Ria Sood, Manjit Kaur, Hemant Lenka, “Design & Development of Automatic Water Flow Meter”, International Journal of Computer Science, Engineering and Applications (IJCSEA) , Vol3 , No.3 June 2013
8. Abhinandan Jain,“Smart and Intelligent GSM based Automatic Meter Reading System”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181/ Vol. 1 Issue 3, May – 2012
9. V.Ramya,”Embedded system for Hazardous Gas detection and Alerting” International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.3, May 2012
10. Priya S.Kamble “A New Approach For Design And Implementation Of AMR In Smart Meter” (IJAEST) International Journal Of Advanced Engineering Sciences And Technologies Vol No. 2, Issue No. 1, 056 – 060
11. Yusnita Rahayu “Design and Development of Gas Leakage Monitoring System “, 30 Sep 2013
12. Harsh Rajesh Mistry, “Design and Implementation of Controller-Based Multifunction Energy Meter with Seven Segment Display”, International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 / Vol. 4 Issue 05, May-2015
13. Bourdillon.O.Omijeh “Design and Simulation of Single Phase Intelligent Prepaid Energy Meter”, Innovative Systems Design and Engineering ISSN 2222-1727 (Paper)  ISSN 2222-2871 (Online) Vol.4, No.1, 2013.

247-249

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

46.

Authors:

Sehba Shahabuddin Siddiqui, Varsha Nagpurkar

Paper Title:

Testing Approaches for Mobile Applications using M-TaaS

Abstract: Due to high popularization and rapid development of cloud services along with advancement in mobile computing technology and wireless services, a new software testing service has come up called testing as a service (TaaS). Usage of wide scale mobile devices with heterogeneous environment and platform, testing as a service utilizes cloud infrastructure to provide on demand testing services for customers all time. With increase in utility of mobile applications (apps) due to ease of internet access along with rise in demand of critical applications like mobile banking, mobile social alerts for reporting accidents, apps for monitoring traffic etc. testing of mobile apps plays a vital role. M-TaaS over cloud provides a new business standard for diversified mobile applications software validation service employing pay-as-you-test model in order to attain cost sharing and reduction in mobile computing resources, networks, cloud computing and storage. Paper addresses different testing approaches for mobile applications like emulation based testing, device based testing, cloud testing, crowd-based testing in order to cope up with frequent up gradation of mobile devices and technologies, hence  developers need a reusable and cost-effective environment for validating mobile applications and flexible infrastructure for supporting large scale test automation.

Keywords:
 mobile testing; mobile app testing; mobile TaaS; TaaS.


References:

1.       Oleksii Starov,Sergiy Vilkomir,Anatoliy Gorbenko,Vyacheslav Kharchenko, “Testing-as-a-Service for Mobile Applications: State-of-the-Art Survey.” In Advances in Intelligent Systems and Computing, ISBN: 978-3-319-08964-5, vol. 307, pp. 55-71, Springer International Publishing, 2015.
2.       Isabel Karina Villanes, Erick Alexandre Bezerra Costa, Arilo Claudio Dias-Neto, “Automated Mobile Testing as a Service (AM-TaaS),” in World Congress on Services, ISBN: 978-1-4673-7274-9,  pp. 79-86, IEEE July 20,2015.           

3.       Jerry Gao, Wei-Tek Tsai, Ray Paul, Xiaoying Bai, Tadahiro Uehara, “Mobile Testing-As-A-Service(MTaaS)-Infrastructures, Issues, Solution and Needs,”in 15th
International Symposium on High-Assurance Systems Engineering,  ISBN: 978-1-4799-3466-9, IEE March 06, 2014.

4.       $ 200 Million Mobile Application Testing Market Boosted by Growing Deman for Automation.[Online] Available: https://www.abiresearch.com/press/200-million-mobile-application-testing-market-boos/[Accessed on October 20,2016].

5.       Jerry Gao, Xiaoying Bai, W. T. Tsai, and Tadhiro Uhere, “Cloud-Testing – Issues, Challenges, Needs and Practice”, Software Engineering: An International Journal (SEIJ), Vol. 1, no. 1, pp. 9-23, September, 2011.

6.       Jerry Gao, Xiaoying Bai, W. T. Tsai, Tadahiro Uehara, “Testing as a Service (TaaS) on Clouds,” Proceedings of IEEE Seventh International Symposium on Service-Oriented System Engineering, San Francisco Bay, March 25-28, 2013, ISBN: 978-0-7695-4944-6, pp. 212-222, IEEE June 10,2013.

7.       J. Gao, X. Bai, W.-T. Tsai, and T. Uehara, “Mobile Application Testing: A Tutorial,” Computer (Long. Beach. Calif)., vol. 47, no. 2, pp. 46–55, 2014.

8.       O. Starov and S. Vilkomir, “Integrated TaaS platform for mobile development: Architecture solutions,” in 2013 8th International Workshop on Automation of Software Test (AST), 2013, pp. 1–7.

9.       Wasserman, “A: Software engineering issues for mobile application development,” In Workshop on Future of Software Engineering Research at the 18th Int. Symposium on Foundations of Software Engineering (ACM SIGSOFT), Santa Fe, USA, pp. 397–400,2010.

10.    Wang Jun, Fanpeng Men, “Software Testing Based on Cloud Computing,” in International Conference on Internet Computing and Information Services, pp. 176-178,
IEEE, 2011.

11.    “Google Play Store.” [Online]. Available: https://play.google.com/store. [Accessed on October 24, 2016].

 

250-253

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Monisha Mohan, Preetha V. H

Paper Title:

A Review on Block-Key Point Based Copy Move Forgery Detection

Abstract:  in which a part of a digital image is copied and pasted within the same image. Many algorithms have been developed for detecting the copy move forgery. Copy move forgery is mainly classified  into two types which is block based and keypoint based. The block based method includes PCA, DCT, DWT etc and key point based method  includes  SIFT and SURF. This paper will include a detail study of different image forgery detection techniques, different tampering techniques and a detailed study of different block based and keypoint based method.

Keywords:
  Copy move forgery, DCT, DWT, SIFT, SURF


References:

1.       Snigdha K. Mankar, Prof. Dr. Ajay A. Gurjar, ‘ Image Forgery Types and Their Detection: A Review’,  International Journal of Advanced Research in Computer Science and Software Engineering, Volume 5, Issue 4, April 2015
2.       Nishtha Parashar and Nirupama Tiwari, ‘A Survey Of Digital Image Tampering Techniques’, International Journal of Signal Processing, Image Processing and Pattern RecognitionVol.8, No.10 (2015), pp.91-96

3.       Ardizzone E, Bruno A, Mazzola G. Detecting multiple copies in tampered images. In: Image Processing (ICIP), 2010 17th IEEE International Conference on. IEEE; 2010. p. 2117–20.

4.       R. Singh, A. Oberoi, and N. Goel, “Copymove forgery detection on digital images,”International  Journal of Computer Applications, vol. 98,  no. 9, pp. 17–22, 2014.

5.       Y. Cao, T. Gao, L. Fan, and Q. Yang, “A robust detection algorithm for copy-move forgery in digital images,” Forensic science international, vol. 214, no. 1, pp. 33–43, 2012.

6.       J. Zhao and J. Guo, “Passive forensics for copy move image forgery using a method based on DCT and SVD,” Forensic science international, vol. 233, no. 1, pp. 158–166, 2013.

7.       S. Kumar, J. Desai, and S. Mukherjee, “Copy move forgery detection in contrast variant environment using binary DCT vectors,” International Journal of Image, Graphics and Signal Processing, vol. 7, no. 6, pp. 38–44, 2015.

8.       Preeti Yadav, Yogesh Rathore, “Detection of Copy-Move Forgery of ImagesUsing Discrete Wavelet Transform”, International Journal on Computer Science and Engineering (IJCSE), Vol. 4 No. 04 ,pp. 565-570, April 2012

9.       C. Popescu and H. Far id, “Exposing Digital Forgeries by  Detecting Duplicated  Image Regions,” Technical Report, TR2004-515, Department of  Computer Science, Dartmouth College, 2004

10.    Swapnil HK, Gawande A. Copy-Move Attack Forgery Detection by Using SIFT. International Journal for Innovative Technology and  Engineering IJITEE. 2013;2(5).

11.    Chihaoui T, Bourouis S, Hamrouni K. Copy-move image forgery detection based on SIFT descriptors and  SVD-matching. In: Advanced Technologies for Signal and Image Processing (ATSIP), 2014 1st International Conference on. IEEE; 2014. p. 125–9.

12.    Shivakumar B, Baboo LDSS. Detection of region duplication forgery in digital images using SURF. IJCSI International  Journal  Computer Science  Issues. 2011;8(4).

13.    Hashmi MF, Anand V, Keskar AG. A copy-move image forgery detection based on speeded up robust feature transform and Wavelet Transforms. In: Computer and Communication Technology (ICCCT), 2014 International Conference on. IEEE; 2014. p. 147–52.

 

254-257

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Gayathri S P, Sajeer M

Paper Title:

Biometric Information Security System Based On Nonlinear Encryption Scheme

Abstract: With the growth of multimedia and digital technology the transmission over public channel become more common and also the issues with the confidentiality and  integrity of data increases in an alarming rate. Biometric characteristics such as fingerprint , iris , palm print, gestures, handwritten signature and hand geometry have to be considered as an efficient tool for establishing the identity of an individual. Because they contain the unique characteristics of a person. So we proposed a method, to protect the biometric information from any of the unauthorized access. Which utilizes an orthogonal coding and  multiplexing technique, direct LSB replacement steganography technique and finally a chaotic encryption method. Multiple biometric signatures are encoded and then multiplexed together in the form of a single image using orthogonal encoding and multiplexing.The encoded image is embedded in to the colour cover image ,which is decomposed in to three plane namely red ,green ,blue respectively. In steganography technique, the  multiplexed  image pixel is used to replace the LSB of corresponding colour cover image pixel for information hiding purpose. Finally, the stego image is encrypted  using a non linear encryption  technique.The objective of  this paper is to develop a novel and efficient technique to  protect the Biometric Information from any unauthorized access and also reduces the vulnerability of an intruder to retrieving any information through any steganalysis attack .In addition to this technique can  also accommodate a number of different biometric information in the same cover image while maintaining the negligible amount of distortion when compared with original colour cover image. The encrypted images are random, non repeated and unpredictable. Chaotic encryption have excellent diffusion and confusion properties and can resist the any plaintext attack. The Performance of the proposed technique was investigated through matlab simulation using various biometric signatures and colour cover images.

Keywords:
 orthogonal transform, steganography, nonlinear encryption , chaotic system


References:

1.    M.N. Islam, “Encryption and multiplexing of fingerprints for enhanced  security”,in: Proceedings of IEEE  Long Island Systems, Applications and Technology Conference (LISAT), 2011.
2.    M.N. Islam,” Color image encryption using multiple reference joint transform correlation”, in:Proceedings of IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2012.

3.    M.F. Islam, M.N. Islam, “A secure approach for encrypting and compressing biometric information employing orthogonal code and steganography,” in: SPIE Proceedings in Optical Pattern Recognition XXIII, 2012.

4.    Yicong Zhou n, Long Bao, C.L. Philip Chen ,” A new 1D chaotic system for image encryption “ in: SignalProcessing,97(172–182 ), 2014.

5.    Khan Muhammad, Jamil Ahmad, Haleem Farman, Muhammad Zubair , “A Novel Image Steganographic Approach for Hiding Text in Color Images using HSI Color Model”,in: International Journal of Advanced Science & Technology, vol. 54, 2013.

6.    Abbas Cheddad, Joan Condell, Kevin Curran and Paul McKevitt, “Biometric Inspired Digital Image Steganography”,in: 15th Annual IEEE International Conference and Workshop on the Engineering of Computer Based Systems ,2008.

7.    SunitaBarve, Uma  Nagaraj and RohitGulabani ,” Efficient and Secure Biometric Image Stegnography using Discrete Wavelet Transform” in:  International Journal of Computer Science & Communication Networks,Vol 1(1),September-October, 2011.

8.    Mohammed abdulmajeed and Rossilawatisulaiman , “An improved lsb image steganography Technique using bit-inverse in 24 bit colourImage”,in: Journal of Theoretical and Applied Information Technology,. Vol.80. No.2 , 20th-October 2015

 

258-262

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Manjith Shukur, U. S. P. Shet

Paper Title:

Experimental Investigations on the Performance and Efficiency of a Typical Domestic LPG Gas Stove

Abstract:  Industrial, commercial and domestic gas appliances cover an extremely wide range of requirements with regard to flame stability, flame temperature, shape, size and aeration which need to be satisfied for optimum performance. With the wide spread use of LPG in industrial, commercial and domestic appliances, it should be our endeavor to design efficient burner systems not only to conserve fuel but also to keep our environment clean and green. In atmospheric burner primary air is entrained by momentum sharing between the gas and the surrounding air. The amount of air induced in this way is generally about 50 to 70 % of the stoichiometric air requirement. Two types of atmospheric burners may be distinguished, those in which the gas issues at normal supply pressure and those in which the gas is supplied from a compressor or high pressure supply. The importance of the former type, e.g., the Bunsen burner type heralded a new phase in gas utilization development when it was first introduced. Low-pressure atmospheric burners are restricted to industrial appliances, however they have been adopted on a limited scale. The present experiment consist of measuring the thermal efficiency of a LPG gas stove without wire mesh with varying heights of the vessel above the stove head: the height at which the thermal efficiency is maximum is noted for two burners i.e. BIG BURNER and SMALL BURNER for two gas input rates, i.e., the SIM (LOW) Flame and HIGH Flame position.

Keywords:
Domestic Lpg Gas Stove, burner, flame.


References:

1.    H. R. N. Jones, Domestic Gs Burner Design, E & FN. Spon, British Gas 1989.
2.    T.N. Singh, Effect of Flame Ring Design on Thermal Efficiencies of the Pressure Stoves, Narosa, Delhi 2000.

3.    T.N. Singh, K.N. Dobhal, A.L. Arora and K.K.Gandhi, Effect of Design Parameters on Thermal Efficiency of Pressure Stove, Narosa, Delhi 2000.

4.    K.N.Dobhal and S.K.Khanna, Thermal Efficiency with Respect to Clearance in Domestic Heating Appliances, Narosa, Delhi 2000.

5.    Dougworth, M.R. and Melvin, A, The proceeding of the16th Symposium (International) on Combustion, 255 (1977).

 

263-265

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

Manjith Shukur, U. S. P. Shet

Paper Title:

Experimental Investigations on the Efficacy Augmentation of a Domestic LPG Gas Stove using an Add-on Wire Mesh

Abstract: There have been several attempts to improve thermal efficiency of gas stoves by improving various parameters like flame stability, flame temperature, shape, size and aeration  etc. including the burner heads. The spacing of ports, inclination of the flame cones, port geometry are also important parameters which govern the flow pattern of hot gases impinging on the heat exchanger vessel. Several gadgets are displayed on the market, claiming that they can improve thermal efficiency of the gas stove. One such gadget is the wire mesh disc, which placed over the burner head is claimed to improve thermal efficiency of the stove. The mesh is made of durable special compound metal alloy to withstand vigorous LPG heat. Interwoven wires enable concentrated high flame. Also, the utensils do not get blackened as no unburned hydrocarbons are produced. This work aims at quantifying the effect of add-on disc holding wire-mesh above the burner head on the thermal efficiency of the gas stove and to determine its optimum location to further improve the thermal efficiency. The experiments suggest that the use of wire mesh on burner head improves gas stove thermal efficiency. Use of this gadget will be beneficial, as it leads to saving of LPG, however small, and on a global scale, it will be a major step towards energy conservation as millions of stove operate globally.

Keywords:
 Efficacy Augmentation, Domestic LPG Gas Stove, Add-on Wire Mesh


References:

1.    H.R.N.Jones, Domestic Gs Burner Design, E & FN. Spon, British Gas 1989.
2.    T.N. Singh, Effect of Flame Ring Design on Thermal Efficiencies of the Pressure Stoves, Narosa, Delhi 2000.

3.    T.N. Singh, K.N. Dobhal, A.L. Arora and K.K.Gandhi, Effect of Design Parameters on Thermal Efficiency of Pressure Stove, Narosa, Delhi 2000.

4.    K.N.Dobhal and S.K.Khanna, Thermal Efficiency with Respect to Clearance in Domestic Heating Appliances, Narosa, Delhi 2000.

5.    Dougworth, M.R. and Melvin, A, The proceeding of the16th Symposium (International) on Combustion, 255 (1977).

 

266-268

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

Issue-6 August 2017

Volume-6 Issue-6 Published on August 30, 2017
 Download Abstract Book (It will be upload on August 30, 2017)

S. No

Volume-6 Issue-6, August 2017, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Joseph Zacharias, Vijayakumar Narayanan

Paper Title:

Full Duplex Radio over Fiber System with Carrier Recovery and Reuse in Base Station and in Mobile Unit

Abstract:  A novel full duplex Radio over Fiber (RoF) system extending from the central office (CO) to the mobile unit using a single continuous wave laser in the central station is proposed. Mobile unit is designed without a high frequency local oscillator. An optical frequency comb is generated in which one frequency is used as carrier for modulating data. The frequency for uplink is obtained from other comb signal. A large number of comb lines can be utilized along with the data comb line. Thus the frequency of operation of the base station can be selected by switching to different comb lines. The modulation scheme QAM accounts for greater spectral efficiency for the system. The proposed system is viable for high bandwidth communication and cost effective. 

Keywords:
  Full duplex, Optical comb, RoF


References:

1.     M. Sauer, A. Kobyakov, J. George, J.Lightwave   Technology, 25(11), 3301 (2007).
2.     Z. Jia, J. Yu, G. K. Chang, IEEE Photonics Technology Letters 18(16), 1726 (2006).

3.     Kaszubowska, L. Hu, L. Barry, Photonics Technology Letters, IEEE 18(4), 562  (2006).

4.     M. Larrod, A. Koonen,Microwave Theory and Techniques, IEEE Trans. on 56(1), 248 (2008).

5.     L. Chen, Y. Shao, X. Lei, Photonics Technology Letters, IEEE 19(6), 387 (2007).

6.     C. Zhang, T. Ning, J. Li,  Optics Communications 344, 65 (2015).

7.     Y. T. Hsueh, M. F. Huang, S. H. Fan,  G. K. Chang, Photonics Technology Letters, IEEE 23(15), 1085(2011)

8.     Ting Su, Jianyu Zheng, Zhongle Wu, Min Zhang, Xue Chen, Gee-Kung Chang, Opt. Express,8,(2015)

9.     M. A. Hameed, R. Hui, IEEE Photonics Technology Letters 26(17), 1734 (2014).

 

1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

2.

Authors:

Durgam Kumaraswamy, B.V. Sanker Ram

Paper Title:

Appliance of Soft Switching Scheme over Fuel-Cell based Power Conversion Improvement via Fuzzy Nature

Abstract: In PV based Solar and Tele-Communication industries power efficient DC-to-DC converters are required to manage the Fuel Cell Systems. These DC-DC converters should be high in power and efficiency as well as it should have low Electro Magnetic Induction [EMI]. The main motto of this systems are to raise the power by using Step-Up Conversion and improving the soft switching ratio. The usage of Coupled inductor and Isolated Transformers are satisfying the needs of higher voltage supply and soft switching scenario. For transforming the electro chemical energy into electrical energy fuell cells are needed, as well as this fuel cells are used to attain high efficiency, lower emitting ratio and speeder operating power while conversion. Several approaches have been already realized to these kind of DC-to-DC power conversion scenarios but failure free scenario of fuel cell systems needs the elimination of bad voltage switchings, requiring higher inputting power as well as large ranging of outputs with higher energy efficiency. For getting out from these faults we need a special Soft Switching nature of MOSFETs and resulting rectifiers. The proposed methodology combines the scenario of Fuzzy logical controllers [FLC] with Soft Swtching to attain higher efficiency over fuel cells and its performance improvements over anycase of output strategies. This nature will eliminates the losses os power occurred in switching strategies and reducing the back recovering losses and its nature as well as providing the trustworthy conditions in circuit nature and this kind of design eliminates the large circulations over initial stages. The proposed results will be experimentally proven by using MATLAB SIMULINK and Hardware Circuit Scenarios.

Keywords:
 Fuzzy Logic, DC-to-DC, Fuel Cell [FC], Electro Magnetic Induction [EMI], Soft Switching.


References:

1.      J. E. Larminie and A. Dicks, Fuel Cell Systems Explained. Chichester, U.K.: Wiley, 2000.
2.      M. Ordonez, P. Pickup, J. E. Quaicoe, and M. T. Iqbal, “Electrical dynamic response of a direct methanol fuel cell,” IEEE Power Electron. Soc. Newslett., vol. 19, no. 1, pp. 10–15, Jan. 2007.

3.      J. Wang, F. Z. Peng, J. Anderson, A. Joseph, and R. Buffenbarger, “Low cost fuel cell converter system for residential power generation,” IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1315–1322, Sep. 2004.

4.      J. Wang, M. Reinhard, F. Z. Peng, and Z. Qian, “Design guideline of the isolated DC-DC converter in green power applications,” in Proc. IEEE Power Electron. Motion Control Conf., 2004, vol. 3, pp. 1756–1761.

5.      R. Gopinath, S. Kim, J. Hahn, P. N. Enjeti, M. B. Yeary, and J.W. Howze, “Development of a low cost fuel cell inverter system with DSP control,” IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1256–1262, Sep. 2004.

6.      L. Palma and P. N. Enjeti, “A modular fuel cell, modular DC-DC converter concept for high performance and enhanced reliability,” IEEE Trans. Power Electron., vol. 24, no. 6, pp. 1437–1443, Jun. 2009.

7.      G. Holmes, P. Atmur, C. C. Beckett, M. P. Bull,W. Y. Kong,W. J. Luo, D. K. C. Ng, N. Sachchithananthan, P. W. Su, D. P. Ware, and P. Wrzos, “An innovative, efficient current-fed push-pull grid connectable inverter for distributed generation systems,” in Proc. IEEE Power Electron. Spec. Conf., 2006, pp. 1504–1510.

8.      E.-H. Kim and B.-H. Kwon, “High step-up resonant push-pull converter with high efficiency,” IET Power Electron., vol. 2, no. 1, pp. 79–89, 2009.

9.      S. Jung,Y. Bae, S. Choi, and H. Kim, “A lowcost utility interactive inverter for residential fuel cell generation,” IEEE Trans. Power Electron., vol. 22, no. 6, pp. 2293–2298, Nov. 2007.

10.   H. Kim, C. Yoon, and S. Choi, “A three-phase zero-voltage and zerocurrent switching DC-DC converter for fuel cell applications,” IEEE Trans. Power Electron., vol. 25, no. 2, pp. 391–398, Feb. 2010.

11.   J. Mason, D. J. Tschirhart, and P. K. Jain, “New ZVS phase shift modulated full-bridge converter topologies with adaptive energy storage for SOFC application,” IEEE
Trans. Power Electron., vol. 23, no. 1, pp. 332–342, Jan. 2008.

12.   X. Kong and A. M. Khambadkone, “Analysis and implementation of a high efficiency, interleaved current-fed full bridge converter for fuel cell system,” IEEE Trans. Power Electron., vol. 22, no. 2, pp. 543–550, Mar. 2007.

13.   H. Cha and P. Enjeti, “A novel three-phase high power current-fed DC/DC converter with active clamp for fuel cells,” in Proc. IEEE Power Electron. Spec. Conf., 2007, pp. 2485–2489.

14.   Averberg, K. R. Meyer, and A. Mertens, “Current-Fed Full Bridge Converter for Fuel Cell Systems,” in Proc. IEEE Power Electron. Spec. Conf., 2008, pp. 866–872.

15.   M. Nymand and M. A. E. Andersen, “High-efficiency isolated boost DCDC converter for high-power low-voltage fuel-cell applications,” IEEE Trans. Ind. Electron., vol. 57, no. 2, pp. 505–514, Feb. 2010.

16.   J.-M. Kwon, E.-H. Kim, B.-H. Kwon, and K.-H. Nam, “High-efficiency fuel cell power conditioning system with input current ripple reduction,” IEEE Trans. Ind. Electron., vol. 56, no. 3, pp. 826–834, Mar. 2009.

17.   M. H. Todorovic, L. Palma, and P. N. Enjeti, “Design of a wide input range DC-DC converter with a robust power control scheme suitable for fuel cell power conversion,” IEEE Trans. Ind. Electron., vol. 55, no. 3, pp. 1247–1255, Mar. 2008.
18.   R. L. Andersen and I. Barbi, “A three-phase current-fed push-pull DC-DC converter,” IEEE Trans. Power Electron., vol. 24, no. 2, pp. 358–368, Feb. 2009.
19.   J.-M. Kwon and B.-H. Kwon, “High step-up active-clamp converter with input-current doubler and output-voltage doubler for fuel cell power systems,” IEEE Trans. Power Electron., vol. 24, no. 1, pp. 108–115, Jan. 2009.

20.   Y. Lembeye, V. D. Bang, G. Lefevre, and J.-P. Ferrieux, “Novel halfbridge inductive DC-DC isolated converters for fuel cell applications,” IEEE Trans. Energy Convers., vol. 24, no. 1, pp. 203–210, Mar. 2009.

 

6-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

3.

Authors:

Vinay Agrawal, Rajesh Gupta, Manish Goyal

Paper Title:

A Study on Seismic Analysis of High Rise Irregular Floor Plan Building with Different Position of Shear Walls

Abstract:  The primary objective of any structural system is to support various types of loads acting either vertically or Horizontal or acting jointly with adequate safety. Any structural system should be designed in such a way that each and every element of the system should have ample rigidity, stiffness and strength against the anticipated loads. Any structural frame system with a provision of RC shear wall shows a desirable safety and stability up to 30 stories building height in lateral loads resistance. A RC framed shear wall is a combination of beams, columns interacting with reinforced concrete shear wall. Shear wall provide lateral stiffness to the building by cantilever action. In this study a G+19 story unsymmetrical [Floor plans] commercial building [L>3.6 least lateral dimension of building ], H> 3.3 least lateral dimension of building and  is modeled with different position of shear walls and analysis conducted for joint displacement, Storey drift, Storey stiffness and Base shear force. These models are modeled with ETABS for static analysis as per IS 1893 -2002. The analysis results for different models are plotted to compare and to know the behavior of RCC frame structure with different position of shear walls.

Keywords:
  Shear Wall, Core Wall, Bare Structure frame, static analysis, lateral loads.


References:

1.      IS: 875 (Part 1), 1987, “Code of Practice for Design Loads (Other Than Earthquake) for Building and Structures, Dead Loads”, Bureau of Indian Standards, New Delhi.
2.      IS: 875 (Part 2), 1987, “Code of Practice for Design Loads (Other Than Earthquake) for Building and Structures, Dead Loads”, Bureau of Indian Standards, New Delhi 

3.      IS: 1893 (Part 1), 2002, “Criteria for Earthqauke Resistant Design of Structures- General Provisions and Building”, Bureau of Indian Standards, New Delhi.

4.      Arnold C and Reitherman R,- 1982, Building Configuration and Seismic Design , John Wiley-USA

5.      Romy Mohan and C Prabha, “Dynamic Analysis of RCC Building with Shear Wall”-Oct 2011, “International Journal of Earth Sciences and Engineering, Vol-4, No 06 SPL,
Oct 2011

6.      L. Tersa Gauvara-Perez, 2012, Soft Story and Weak Storey in Earthquake Resistant Design: A Multidisciplinary Approach

7.      Bahador Bagheri, Ehsan Salimi Firoozabad and Mohammadreza Yahyaei, 2012, Comparative Study of the Static and Dynamic Analysis of Multi Storey Irregular Building, “International Journal of Civil, Environmental, Structural, construction and Architectural Engineering, VOl-6, No:11,2012

8.      Vikas Govalkar, P.J.Salunke, N.G. Gore, July-2014, Analysis of Bare Frame and Infilled Frame with Different Position of Shear Wall, “International Journal of Recent Technology and Engineering (IRJTE). ISSN:2277-3878, Vol-3, July-2014

9.      S.Uttamraj, K. Mythill,, “Analysis of Soft Storey For Multistory Building in Zone-4”, “International Journal  of Research and Innovation (IJRI), Vol-1, Issue-1, Sep-2014

10.   Ashwinkumsr Balaso Karnale, Dr. D.N. Shinde, Sep-2015, Comparative Seismic Analysis of High and Low Rise Building with Shear Walls. “International Journal of Innovative Research in Science, Engineering and Technology, Vol-4, Issue 9, Sep-2015

11.   Software Package, ETABS

 

13-20

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

M. Nagaraju Naik, P. Raveendrababu

Paper Title:

Low Resolution to High Resolution Image Projection with Spectral, Noise Removal and Edge Preservation Coding Techniques

Abstract: Many technical papers were presented in the improvement of accuracy and visual quality. Image coding is developed over a long period with various enhancement techniques. In the area of digital image processing resources required in optimized methods for better representation of higher resolutions for progressive image processing. More research work required towards high-resolution representation in real time applications and focused more optimization methods for efficient system representation. But available resources are limited due to noise, due to the noisy overall system accuracy and efficiency will decrease. Fourier transform represents less accuracy and visual quality because projecting energy with noise in all the directions. Hence we propose a lower dimensional coding system with higher accuracy with spectral band interpolation; inter-frame correlative for noise removal and finally adaptive edge preservation for smooth representation. The proposed technique gives more accuracy and projected in the higher grid and hence the obtained system is robust.

Keywords:
 Accuracy, Interpolation, Image Coding, Spectral Band, Edge Preserving.


References:

1.        P. Vandewalle, S. Su and  M. Vetterli etal, “A frequency domain approach to registration of aliased images with application to super-resolution”, EURASIP Journal on Advances in Signal Processing, vol.6, 2006.
2.        S. C. Park, M. K. Park, and M. G. Kang, “Super-resolution image reconstruction: a technical overview”, Signal Processing Magazine, IEEE, vol. 20(3), pp. 21–36, 2003.

3.        Deepesh Jain, “Super resolution using Papoulis-Gerchberg Algorithm”.

4.        N. Bharati, A. Khosla and N. Sood, “Image reconstruction using cubic b-spline interpolation”, India Conference(INDICON), Annual IEEE, pp. 1–5, 2011.

5.        Kwok-Wai Hung,Wan-Chi Siu, “Single Image Super Resolution using Iterative Wiener Filter”, ICASSP, IEEE, 2012.

6.        T. Tajbakhsh, “Combined Demosaicing and Adaptive Filtering on CFA Images”, IEEE Tenth International Symposium on Consumer Electronics, ISCE ’06, 2006.

7.        J. Allebach and P. W. Wong, “Edge-Directed Interpolation”, in ICIP, 1996.

8.        YunfeiBai, Jing Hu, YupinLuo, “Self-Adaptive Blind Super-Resolution Image Reconstruction”, 3rd International Congress on Image and Signal Processing (CISP2010), 2010.

9.        S. KumarMaurya, P. KumarMishra, R. KumarSingh and A. Kumar Misra, “Image enhancement by spline interpolation and adaptive power spectrum cut-off of filtered images”, in Advances in Engineering, Science and Management(ICAESM), International Conference on. IEEE, pp.423–428, 2012.

10.     H. A. Aly and E. Dubois, “Specification of the observation model for regularized video up-sampling,” IEEE Trans. Video Processing, vol. 14, pp. 567-576, May 2005.

11.     Y.-M. Zhu, “Generalized sampling theorem”, Circuits and Systems II: Analog and Digital Signal Processing, IEEE Transactions, vol. 39(8),     pp. 587–588, 1992.

12.     M.Irani and S.Peleg, “Motion analysis for image enhancement: resolution, occlusion and transparency”, JVCIP, 1993.

13.     S. Izadpanahi, “Motion based video super resolution using edge directed interpolation and complex wavelet transform”, signal processing, Elsevier, vol. 93(7), pp. 2076-2086, 2013.   

14.     Wong, “Adaptive Bilateral Filtering of Image Signals using Local Phase Characteristics”, Signal Process. (Elsevier), Vol. 88, pp.1615, 2008.

15.     Xiuju Liang, ZongliangGan, “Improved Non-Local Iterative Back Projection Method for Image Super-Resolution”, Sixth International Conference on Image and Graphics, ICIG, 2011.

16.     J. Storkey, “Dynamic structure super-resolution”, Advances in Neural Information Processing Systems, pp.1319–1326, 2003.

17.     T. Mitsunaga and S.K. Nayar, “Radiometric self-calibration”, in Proc. IEEE Int. Conf. Computer Vision and Pattern Recognition, vol.1,  pp. 374–380. 1999.

18.     Rujul R, Makwana Nita and D Mehta, “Single Image Super-Resolution VIA Iterative Back Projection Based Canny Edge Detection and a Gabor Filter Prior”, International Journal of Soft Computing and Engineering, IJSCE, Vol. 3(1), 2013.

19.     H. Engl, M. Hanke, A. Neubauer, “Regularization of Inverse Problems, Dordrecht”, Kluwer Academic Publishers, 1996.

20.     N. Nguyen, G. Golub, P. Milanfar, “Blind Restoration/Super Resolution with Generalized Cross-Validation using Gauss-Type Quadrature Rules”, in Conference Record of the -Third Asilomar Conference on Signals, Systems, and Computers, vol. 2,  pp. 1257–1261, 1999.

21.     Mohamed K, Hardie R, “A Collaborative Adaptive Wiener Filter for Image Restoration using a Spatial Domain Multi-Patch Correlation Model”, Eurasia J Adv Signal Process. 2015.

 

21-28

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Shubhangi D. C, Vijeta V Chature

Paper Title:

Utility of RFID, Virtual Agent for Supervising the Individuals with Dementia

Abstract:  Various update frameworks have been created to help elderly individuals with dementia. The current update frameworks do not have the attention to human setting, the thoughtful human-machine communication, and the adaptability of individual adjustment. To adapt to the constraints, we are as of now concentrate on another update benefit for individuals with dementia. In particular, we misuse a BLE-based indoor situating framework to catch the present area and setting of the patient, instead we use RFID Tags for Indoor position system . We then utilize a virtual operator framework for rich co-operations. we build up a timetable administration framework for customized updates. To coordinate these heterogeneous frameworks, we re-plan and convey the frameworks as three administrations with Web-API: Location Service, Agent Service, and Schedule Service. These administrations are approximately incorporated by Coordinator Service, in view of the administration arranged design, In this paper, we initially show the framework engineering, and after that we talk about the key thought to actualize the administrations. We likewise illustrate “update at the passage” as a handy situation of the proposed administrations.

Keywords:
Dementia, IPS, GPS, Virtual Agent, Wi-Fi, RFID, Android.


References:

1.      M. Prince, A. Wimo. M. Guerchet, Y.T. W. Gemma-Claire Ali, and M. Prina, “World Alzheimer report 2015”, Alzheimer’s Disease International, August 2015.
2.      World Alzheimer Report 2016, “Improving healthcare for people living with dementia”, Alzheimer’s Disease International.

3.      Yuki Kashio, Shinsuke Matsumoto, Seiki Tokunaga, Sachio Saiki    and Masahide Nakamura, ” Design and Implementation of Service Framework for Presence Sensing in Home Network System”,  Proceedings of the Third International Conference on Digital Information, Networking, and Wireless Communications, Moscow, Russia 2015.

4.      F.J.M. Meiland , A. Reinersmann , B. Bergvall Kareborn, D. Craig , F. Moelaert, M.D. Mulvenna, ” Development and evaluation of an ICT device for people with mild dementia “, COGKNOW.

5.      Ricardo Castellot Lou, Angele Giuliano, and Maurice D. Mulvenna,” State of the Art in Electronic Assistive Technologies for People with Dementia “.

6.      Josef Hallberg, Basel Kikhia, Johan E. Bengtsson, Stefan Sävenstedt, Kåre Synnes, ” Reminiscence Processes Using Life-Log Entities for Persons with Mild Dementia “

7.      Masahide Nakamura, Akihiro Tanaka, Hiroshi Igaki, Haruaki Tamada, Ken-ichi Matsumoto, “Constructing Home Network Systems and Integrated Services Using Legacy Home Appliances and Web Services “, International Journal of Web Services Research, 5(1), 81-97, January-March 2008.

8.      Jaewoo Chung, Matt Donahoe, Chris Schmandt, Ig-Jae Kim, Pedram Razavai, Micaela Wiseman,” Indoor Location Sensing Using Geo-Magnetism “, MIT Media Laborator.

9.      Frank Sposaro, Justin Danielson, Gary Tyson, “iWander: An Android Application for Dementia Patients”, Florida State University Tallahassee, Florida.

 

29-33

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Prahlad Kumar Rahul, Garima Tiwari

Paper Title:

Extraction of Material Parameters of Z-Shaped Split Resonator Metamaterial Atom

Abstract: In today’s scenario an artificially constructed meta-materials have become the topic of significant interest, because these material shows the electromagnetic characteristics. In order to achieve negative electrical permittivity and negative magnetic permeability NRW method is presented. The propagation of electromagnetic waves is determined by a two fundamental characteristic quantities such as the electrical permittivity ε and the magnetic permeability μ. In this paper, by the use of CST simulator which is based on Finite element method, S parameters are extracted. By the use of MATLAB script, the permittivity and permeability curves are calculated. Perfect electric and perfect magnetic (PE-PM) boundary conditions methods are employed in CST to extract the S parameters. To excite the structure, wave ports are used.

Keywords:
 permeability, permittivity, S11 parameter, S21 parameter.


References:

1.      V. G. Veselago, “The electrodynamics of substances with simultaneously negative values of _ and μ,” Sov. Phys.—Usp, vol. 10, no. 4, pp. 509–514, 1968.
2.      S. Awasthi, A. Biswas and M. J. Akhtar, “Compact Bandstop Filter Using Triangular Metamaterial Mushroom Resonators,” Asia-Pacific Microwave Conference Proceedings (APMC), December 2012, pp. 217-219.

3.      Z. M. Thomas, T. M. Grzegorczyk, B. Wu and J. A. Kong, “Enhanced Microstrip Stopband Filter Using a Metamaterial Substrate,” Microwave  and Optical Technology Letters, 48, 8, February 2006, pp. 1522-1525.

4.      Tseng and C. Chang, “Improvement of Return Loss Bandwidth of Balanced Amplifier Using Metamaterial-Based Quadrature Power Splitters,” IEEE Microwave and Wireless Components Letters, 18, 4, April 2008, pp. 269-271.

5.      K. W. Eccleston, “Planar N-way Metamaterial Power Divider,” Asia Pac ifi c Microwave Conference (APMC), December 2009, pp. 1024-1027.

6.      H. Kim and C. Seo, “Inverse Class-F Power Amplifier Using the M metamaterial Structure on the Harmonic Control Circuit,” Microwave and Optical Technology Letters, 50, 11, February 2008, pp. 2881-2884.

7.      Tseng and C. Chang, “Microwave Push-Pull Power Amplifier Using Metamaterial-Based Baluns,” Asia-Pacific Microwave Conference (APMC), December 2008, pp.1-4.

8.      R. O. Ouedraogo and E. J. Rothwell, “Metamaterial Inspired Patch Antenna Miniaturization Technique,” IEEE Antennas and Propagation Society International Symposium, July 2010, pp. 1-4.

9.      B. Brito,A. G. d’Assuncao, R. H. C. Maniçoba, X. Begaud, “Metamaterial Inspired Fabry-Pérot Antenna with Cascaded Frequency  Selective Surfaces,” Microwave and Optical Technology Letters, 55, 5,

10.   May 2013, pp. 981-985.

11.   M. S. Sharawi, A. B. Numan, and D. N. Aloi, “Isolation Improvement in a  Dual-Band Dual-Element MIMO Antenna System Using Capacitively  Loaded Loops,” Progress In Electromagnetic Research, 134, 2013, pp. 247-266.

12.   C. R. Simovski, Belov, A. P. Bavel and S. He, “Backward Wave Region and Negative Material Parameters of a Structure Formed by Lattices of Wires and Split-Ring Resonators,” IEEE Transactions on Antennas and Propagation, AP-51, 10, October 2003, pp. 2582-2591.

13.   20.   D.   R.   Smith,   D.   C.   Vier,   Th.   Koschny   and   C.  M. Soukoulis,“Electromagnetic Parameter Retrieval from Inho mogeneous Metamaterials,” Physics Review E, 71, 3, 2005, 036617.

14.   Ahmad B. Numan and Mohammad S. Sharawi, “Extraction of Material Parameters for Metamaterials Using a Full-Wave Simulator”, IEEE Antennas and Propagation Magazine, Vol. 55, No. 5, October 2013.

15.   Monika Dhillon and Pradeep Dimri, “Design of Metamaterials in HFSS and Extraction of Permittivity and Permeability using NRW Method”,  International Journal of Electronics, Electrical and Computational System IJEECS ISSN 2348-117X Volume 4, Special Issue May 2015.

 

34-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Ajinkya B. Kashmire, H. V. Shete, N. D. Jadhav

Paper Title:

A Study of Surface Roughness in Drilling of EN-9 Steel using Taguchi Approach

Abstract:  Drilling is one of the most common and fundamental machining processes. In machining, Carbide twist drills with diameter of 10 mm are used. Most of automotive components are manufactured using a conventional machining process, such as turning, drilling, milling, shaping and planning, etc.. These focus on producing high quality products in time at minimum cost. The surface roughness is considered to be a measure of the quality of a product. The aim of the present work is to optimize cutting conditions (Cutting speed, feed and cutting fluid pressure) parameters for minimum Surface Roughness in drilling of EN-9 using Taguchi Approach. Experiments were conducted based on the design of experiments (DOE) and followed by optimization of the results using Analysis of Variance (ANOVA) to find the minimum surface roughness.

Keywords:
Surface Roughness, Analysis of Variance (ANOVA), Design of Experiments (DOE), Taguchi.


References:

1.      Anil Jindal. “Analysis of Tool Wear Rate in Drilling Operation using Scanning Electron Microscope (SEM),” Journal of Minerals & Materials Characterization & Engineering, Vol. 11, No.1(2012), pp.43-54.
2.      C. Manikandan, B. Rajeswari, “Study of Cutting Parameters on Drilling EN24 Using Taguchi Method,” International Journal of Engineering Research & Technology (IJERT) IJERTV2IS70094, Vol. 2 Issue 7, July – 2013 ISSN: 2278-0181.

3.      N. G. Patil, Ameer Asem, R. S. Pawade, D.G. Thakur, P.K. Brahmankar, “Comparative study of high speed machining of Inconel 718 in dry condition and by using compressed cold carbon dioxide gas as coolant,” New Production Technologies in Aerospace Industry – 5th Machining Innovations Conference (MIC 2014), Procedia CIRP 24 ( 2014 ) 86 – 91.

4.      I. Sultana, M. M. H. Chowdhury and N. R. Dhar, “Optimization of flow rate and pressure of high pressure coolant in turning AISI-4320 steel: temperature, chip reduction coefficient and surface roughness,” proceedings of the 4th BSME-ASME international conference on thermal engineering 27-29 December, 2008, Dhaka, Bangladesh.

5.      Anselmo Eduardo Diniz, Ricardo Micaroni,,“Influence of the direction and flow rate of the cutting fluid on tool life in turning process of AISI 1045 steel,” International Journal of Machine Tools & Manufacture 47 (2007) 247–254.

6.      Sudesh Garg, Ravi Kumar Goyal, “A Study of Surface Roughness in Drilling of AII H11 Die Steel using Face Centered Design,” IJIRST Volume 1, Issue 12, (May 2015), ISSN: 2349-6010.

 

38-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

8.

Authors:

Simma Ranjitha, Pasumarthy Srikanth

Paper Title:

Design of Decoders using Mixed Logic for Various Applications

Abstract: In this paper, a mixed-logic design of decoders, combining modified GDI logic, transmission gate logic, and pass transistor logic has been proposed. A novel topology is presented for the 2-4 decoders: a 15- transistor topology on the intension of achieving low power and low delay. Further, three decoders 3-8, 4-16 and 5-32 are implemented by using mixed-logic 2-4 decoders. MGDI technique uses same number of transistors present in CMOS the main difference is the providing input signals to the source and gate terminals. These all proposed decoders reduce the power and delay compared to conventional CMOS decoders. The proposed 2×4 decoder is implemented to decrease power; increase the performance is used in full adder and 4×4 bit SRAM array. Finally simulations are done by using CMOS 130nm mentor graphics tool to give a significant improvement in power and delay.

Keywords:
 Decoders; sense amplifier; SRAM cell; high speed; mixed logic; MGDI logic.


References:

1.      Dimitrios  Balobas   and   Nikos   Konofaos, “Design of Low-Power High-Performance 2–4 and 4–16 Mixed-Logic Line Decoders”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS, vol.64, no.2, February 2017.
2.      V. Bhatnagar, A. Chandani, and S. Pandey, “Optimization of row decoder for 128 × 128 6T SRAMs,” in Proc. IEEE Int. Conf. VLSI-SATA, 2015, pp. 1–4.

3.      K. Mishra, D. P. Acharya, and P. K. Patra, “Novel design technique of address decoder for SRAM,” Proc. IEEE ICACCCT, 2014, pp. 1032–1035.

4.      N. Lotze and Y. Manoli, “A 62 mV 0.13 μm CMOS standard-cell based design technique using Schmitt-trigger logic,” IEEE J. Solid State Circuits, vol. 47, no. 1, pp. 47–60, Jan. 2012.

5.      N. H. E. Weste and D. M. Harris, CMOS VLSI Design, a Circuits and Systems Perspective, 4th ed. Boston, MA, USA: Addison-Wesley, 2011.

6.      M. A. Turi and J. G. Delgado-Frias,  Decreasing energy consumption in address decoders by means of selective pre-charge schemes,” Microelectron. J., vol. 40, no. 11, pp 1590–1600, 2009.

7.      D. Markovi´c, B.  Nikoli´c, and V.     G.Oklobdžija, “A general method in synthesis of pass-transistor circuits,” Microelectron. J., vol. 31, pp. 991–998, 2000.

8.      R. Zimmermann and W. Fichtner, “Low-power logic styles: CMOS versus pass-transistor logic,” IEEE J. Solid State Circuits, vol. 32, no. 7, pp. 1079– 1090, Jul. 1997.

9.      V.  G.  Oklobdzija and B.  Duchene, “Pass-transistor dual value logic for low-power CMOS,” in Proc. Int. Symp. VLSI Technol., 1995, pp. 341–344.

10.   M. Suzuki et al., “A 1.5 ns 32b CMOS ALU in double pass-transistor logic,” in Proc. IEEE Int. Solid-State Circuits Conf., 1993, pp.90–91.

11.   X.  Wu, “Theory of transmission switches and its application to design of CMOS digital circuits,” Int. J. Circuit Theory Appl., vol. 20, no. 4, pp. 349–356, 1992.

12.   K. Yano et al., “A 3.8-ns CMOS 16 × 16-b Multiplier using complementary pass-transistor logic,” IEEE J. Solid-State Circuits, vol. 25, no. 2, pp. 388–393, Apr. 1990.

 

43-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

9.

Authors:

K. Kiran Kumar, S. Suresh Kumar

Paper Title:

Effect of Friction on Extrusion of Non-Ferrous Alloys- Modelling and Simulation

Abstract:  Extrusion is a process used to create jobs of a fixed cross sectional profile. A material is pushed or drawn through a die of the desired cross section in this particular problem the radius of an Aluminum cylindrical bar is reduced 33% by an extrusion process. The generation of heat due to plastic dissipation in side the bar and the frictional heart generation at the work piece/die inter face are considered. This analysis has been performed in ABACUS/standard. A fully coupled temperature- displacement analysis is performed with the die kept at a constant temperature. In ABAQUS/standard the die is modeled with CAX4T elements made into an iso thermal rigid body using the *RIGID BODY, ISO THERMAL option are made with an analytical rigid surface. The results obtained with ABAQUS/standard. After analyzing and simulating on two different materials ALUMINIUM & COPPER it is observed that copper offers better extrusion capabilities as compared to aluminum.

Keywords:
 ABAQUS, CAX4T, ISO, RIGID BODY, ISO THERMAL, ALUMINIUM & COPPER, ABAQUS


References:

1.      Fuh-Kuo Chena, Wen-Chan Chuang, Shan Torng “Finite element analysis of multi-hole extrusion of aluminum-alloy tubes” Journal of Materials Processing Technology 201, Volume 150–155, 2008.
2.      Lontos.A.E, Soukatzidi.F.A, Demosthenou.D.A, Baldoukas.D.K, “Effect Of Extrusion Parameters And Die Geometry On The Produced Billet Quality Using Finite Element Method” Greece Manufacturing Engineering (ICMEN), Volume 1-3, 2008.

3.      Tiernan.P, Hillery.P.T, Draganescu.M and Gheorghe.M, “Modelling of cold extrusion with experimental verification” Journal of Materials Processing Technology,Volume 168, Issue 360–366, 2008.                       

4.      Flitta.I and Sheppard.T, “Nature of friction in extrusion process and its effect on material fiow” Volume 139, Issues 331972-344969

5.      Alexander.J.M, “Hydrostaticextrusion”. ISBN10: 0263517098 / 0-263-51709-8 ISBN13: 9780263517095, Publication Date: 1971.

6.      Betzalel Avitzur, “Metal forming processing analysis, McGraw-Hill education, ISBN:007002510X,  EAN:9780070025103

7.      Bridge man.P.W, “Physics of high pressure”. Dover Publications, 1970 – 398 pages

8.      Carmai.S.J.J, Pitakthapanaphong.S, Sechjarern.S, “3DFinite element analysis of metal flow in hot aluminium extrusion of T-shaped profile with various offset pockets”. Volume 31, ISSUE 2, 2008.

9.      Drozda et.al., “Tool and Manufacturing Engineers Handbook: Forming”, Volume 2, 1984, SME, ISBN 0872631354.

10.   Fuchs, “Hydrostatic pressure and its role in metal forming”,Mechanical Engineering. Conover Mast Publications., 1967

11.   Gosh.A and Mallik, “Manufacturing Science”. Ellis Horwood, 1986- 433 pages

12.   Lambert and other “A theory on the mechanical of axisysmmetric exit through conical die”. Volume 91, Issues 10696-24063, 1988.

13.   Oberg et.al., “Machinery’s Handbook”, New York: Industrial Press, ISBN 0-8311-2635- Volume 3, 2008.

14.   Pugh “Redundant work and friction in the Hydrostatic Extrusion”,Mech.Engg. Science,1964.

15.   Sortais.H.C and kobtyshi, “An optimum die profile for axisymmertric extrusion.” Publisher Society of Manufacturing Engineers, 2003.

16.   Yenger and Rice “Fluid flow Lubricating in the Hydrostatic Extrusion” Mechanical Engineering. Publisher Mc Graw-Hill book company, inc., 1935.

 

48-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

S. Mohan Kumar, K. Kiran Kumar

Paper Title:

Optimization Techniques in Turning Operation by using Taguchi Method

Abstract: Manufacturing of any product requires different machining processes to get desired finished component. This project refers to the optimization of process parameters in turning process using Taguchi method (L9) in order to obtain efficient Material Removal Rate (MRR). EN 24 is used as work-piece for carrying out experiment to optimize Material Removal Rate which is influenced by three machining parameters namely spindle speed, feed rate and depth of cut.  Different experiments are done by varying one parameter and keeping other two fixed so that optimized value of each parameter can be obtained. In this project dry turning operation of EN 24 graded steel is performed using HSS tool. The range of cutting parameters at three levels are spindle speed (200, 350 and 500 rpm), feed rate (0.1, 0.15 and 0.2 mm/rev), depth of cut (1.0, 1.5 and 2.0 mm) respectively. Taguchi method is a good method for optimization of various machining parameters as it reduces number of experiments. Taguchi orthogonal array is designed with three levels of process parameters and ANOVA is applied to know the influence of each parameter on Material Removal Rate. For the given set of conditions, spindle speed influences more on Material Removal Rate followed by feed rate and depth of cut.

Keywords:
(L9), (MRR), (1.0, 1.5 and 2.0 mm), ANOVA, (200, 350 and 500 rpm), rate (0.1, 0.15 and 0.2 mm/rev),


References:

1.      Singh H. and Kumar P., (2006), “Optimizing Feed Force for Turned Parts through the Taguchi Technique”, Sadhana, Volume 31, Number 6, pp. 671–681.
2.      Ahmed S. G., (2006), “Development of a Prediction Model for Surface Roughness in Finish Turning of Aluminium”, Sudan Engineering Society Journal, Volume 52, Number 45, pp. 1-5.

3.      Mahmoud E. A. E. and Abdelkarim H. A., (2006), “Optimum Cutting Parameters in Turning Operations using HSS Cutting Tool with 450 Approach Angle”, Sudan Engineering Scoeiety Journal, Volume 53, Number 48, pp. 25-30.

4.      Bala Murugan Gopalsamy, Biswanath Mondal and Sukamal Ghosh , (2009), “Taguchi method and ANOVA: An approach for process parameters optimization of hard
machining while machining hardened steel”, Journal of Scientific & Industrial Research Vol. 68, pp. 686-695

5.      Rama Rao S, Padmanabhan. G, (2012), “Application of Taguchi methods and ANOVA in optimization of process parameters for metal removal rate in electrochemical machining of Al/5%SiC composites”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, pp.192-197

6.      Ashish Yadav, Ajay Bangar, Rajan Sharma, Deepak Pal,(2012), “ Optimization of Turning Process Parameters for Their Effect on En 8 Material Work piece Hardness by Using Taguchi Parametric Optimization Method” International Journal of Mechanical and Industrial Engineering (IJMIE),  Volume-1, Issue-3, 2012

7.      M. Kaladhar, K. Venkata Subbaiah, Ch. Srinivasa Rao ,(2012), “ Determination of Optimum Process Parameters during turning of AISI 304 Austenitic Stainless Steels using Taguchi method and ANOVA”, International Journal of Lean Thinking Volume 3, Issue 1

8.      Ranganath M S, Vipin, (2013), “Optimization of Process Parameters in Turning Operation Using Taguchi Method and Anova: A Review”, International Journal of Advance Research and Innovation Volume 1 (2013) 31-45

9.      T. Sreenivasa Murthy, R.K.Suresh, G. Krishnaiah, V. Diwakar Reddy, (2013), “Optimization of process parameters in dry turning operation of EN41B alloy steels with Cermet tool based on the Taguchi method”, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 Vol. 3, Issue , pp.1144-1148

10.   Vikas B. Magdum, Vinayak R. Naik, (2013), “Evaluation and Optimization of Machining Parameter for turning of EN 8 steel”, International Journal of Engineering Trends and Technology (IJETT) Volume4, Issue5

11.   Taquiuddin Quazi, Pratik gajanan more, (2014), “Optimization of Turning Parameters Such as Speed Rate, Feed Rate, Depth of Cut for Surface Roughness by Taguchi Method”, Asian Journal of Engineering and Technology Innovation 02 (02) 2014 (05-24)

12.   Anand S.Shivade, Shivraj Bhagat, Suraj Jagdale, Amit Nikam, Pramod londhe, (2014), “Optimization of Machining Parameters for Turning using Taguchi Approach”, International Journal of Recent Technology and Engineering (ijbsac)ISSN:2277-3878,Volume-3, Issue-1

57-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Lalita Gupta

Paper Title:

Microwave Based Moisture Measurement System for Granular Materials: A Review

Abstract: In the recent years, development of a non-destructive and non-contacting type moisture measurement system has attracted considerable interest. Because of their inherent nature of being nondestructive, non-conductive medium and having deep penetrative properties, Microwaves have been the traditional choice in this kind of research. This paper is a comprehensive review of Microwave Based Measurement System used for grains and pulses. In this paper, moisture measurement and calibration techniques for the system are presented. The objective of the paper is to provide the readers a broad perspective of microwave based techniques for measurement of moisture in bulk in silos or in sacks.

Keywords:
 Bulk density, Complex Permittivity, Moisture Measurement, Temperature Compensation


References:

1.      ASAE S352.2 Moisture Measurement-Unground grain and seeds, ASAE, St. Joseph, MI, ASAE, 1995, ASAE Standards 1995
2.      T. J. Kelleners, D. A. Robinson, P. J. Shouse, J. E. Ayars, and T. H. Skaggs, Frequency Dependence of the Complex Permittivity and Its Impact on Dielectric Sensor Calibration in Soils, Soil Sci. Soc. Am. J., Vol. 69, pp 67-76, January– February2005

3.      Samir Trabelsi, Andrzej W. Krazsewski and Stuart O. Nelson, New Density-Independent Calibration Function for Microwave Sensing of Moisture Content in Particulate Materials, IEEE , IEEE Transactions On Instrumentation And Measurement, Vol. 47, No. 3, June 199, pp 613-622

4.      Samir Trabelsi and Stuart O. Nelson, Microwave Moisture Meter for Granular and Particulate Materials, Instrumentation and Measurement Technology Conference (I2MTC), 2010 IEEE, pp 1304-1308

5.      El Sabbagh, Richard B. Russell, Ramahi, O.M. ; Trabelsi, S. ; Nelson, S.O. ; Khan, L, Use of Microstrip Patch Antennas in Grain and Pulverized Materials Permittivity Measurement, Antennas and Propagation Society International Symposium, 2003, IEEE, Vol 4, pp 42-45

6.      Stuart O. Nelson, Samir Trabelsi, and Andrzej W. Kraszewski, Principles of Microwave Moisture Measurement in Grain,

7.      Instrumentation and Measurement Technology Conference, 2002. IMTC/2002. Proceedings of the 19th IEEE, Vol 1, pp 99-102

8.      A.W. Kraszewski, S. Trabelsi, S.O. Nelson, Simple Grain and Moisture Content Determination from Microwave Measurements, Transactions of the ASAE, 1998 American Society of Agricultural Engineers, Vol. 41, pp 129-134

9.      Ki-Bok Kim, Jong-Heon Kim, Seung Seok Lee, and Sang Ha Noh, Measurement of Grain Moisture Content Using Microwave Attenuation at 10.5 GHz and Moisture Density, IEEE Transactions On Instrumentation And Measurement, Vol. 51, No. 1, February2002

10.   Yangjun Zhang and Seichi Okamura, A Density-Independent Method For High Moisture Content Measurement using a Microstrip Transmission Line, International Microwave Power Institute, Journal of Microwave Power & Electromagnetic EnergyVol. 40, No.2, 2006

11.   A.R. von Hippel, Dielectrics and Waves. New York: Wiley, 1954, p. 26

 

65-67

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Manish Shrivastava

Paper Title:

Glimpses of Smart Cities using Internet of Things

Abstract:  IoT will solve main problems faced by the people living in cities like pollution, traffic congestion and shortage of energy supplies etc. Products like cellular communication enabled Smart Belly trash will send alerts to municipal services when a bin needs to be emptied. Smart city is another powerful application of IoT generating curiosity among world’s population. Smart surveillance, automated transportation, smarter energy management systems, water distribution, urban security and environmental monitoring all are examples of internet of things applications for smart cities. We know IoT applications cover wide range of domain but in this paper we cover IoT application related to smart city like Smart Parking, Smart Lighting, Smart Roads, Structural Health Monitoring etc.

Keywords:
  About four key words or phrases in alphabetical order, separated by commas.


References:

1.   https://www.elprocus.com/architecture-of-wireless-sensor-network-and-applications/
2.   http://in.pcmag.com/networking-communications-software/38970/feature/what-is-cloud-computing

3.   http://searchcloudcomputing.techtarget.com/definition/cloud-computing

4.   www.tutorialspoint.com/embedded_systems/es_overview.htm

5.   https://www.analyticsvidhya.com/blog/2016/08/10-youtube-videos-explaining-the-real-world-applications-of-internet-of-things-iot/

6.   https://www.ibm.com/blogs/internet-of-things/smart-lighting-solutions-india/
7.   https://techcrunch.com/2016/07/13/how-iot-and-machine-learning-can-make-our-roads-safer/
8.   A Bahga and V Madisetti, “Internet of Things: A Hands-On Approach,” University Press India Private Limited.

 

68-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Allam Srivani, M. Lakshmi Prasanna Rani

Paper Title:

Low Power and High Performance ALU using Dual Mode Transmission Gate Diffusion Input (DMTGDI)

Abstract: Using Dual Mode Transmission Gate Diffusion Input Logic (DMTGDI), a four bit ALU has been designed. The ALU can perform four arithmetic and four logical operations. Dual Mode Transmission Gate Diffusion Input (DMTGDI) logic has been promising in realizing increased functionality on a chip. The main advantage of this new logic called DMTGDI is low power and high performance. For low power applications there are so many conventional techniques are available. For reducing power consumption, sub-threshold circuit design is the one of the most important techniques. But the circuit in sub-threshold region operates with so many sensitivities and constraints. Mostly the performance of the circuit which is operated in sub-threshold region is degraded. To increase the performance of the circuit in sub-threshold region one of the most effective logic used is called as Dual Mode Logic (DML). So DML is the one of the techniques used for high speed. Another important technique is established for reducing power consumption is called Transmission Gate Diffusion Input (TGDI). In the next step, we propose to use Transmission Gate Diffusion Input (TGDI) as a foundation for new Dual Mode logic called “DMTGDI or Dual Mode Transmission Gate Diffusion Input” logic. So DMTGDI combines the advantages of both DML and TGDI. Simulations have been performed in mentor graphics tool using 130nm. Pre-layout simulation results reveal that ALU design using DMTGDI logic is more advantageous than ALU design using conventional CMOS logic.

Keywords:
 ALU, TGDI, DML, DMTGDI, CMOS.


References:

1.      Chandra Srinivasan, A Thesis “arithmetic logic unit (alu)” design using reconfigurable CMOS logic” Bachelor of Engineering, Mysore University, 1997.
2.       A. Srivastava and D. Govindarajan, “A fast ALU design in CMOS for low voltage operation”, J. of VLSI Design, vol. 14, no. 4, pp. 315- 327, 2002.

3.       A. Srivastava and C. Srinivasan, “ ALU Design using Reconfigurable CMOS Logic”,  Proc. of the 45th IEEE 2002 Midwest Symposium on Circuits and Systems ,
vol.2, pp. 663- 666, Aug. 2002.

4.      S. Kumar Gupta, A. Ray chowdhury, K. Roy, Digital computation in subthreshold region for ultra-low power operation: a device circuit architecture co-design perspective, Proc. IEEE 98 (2) (2010) 160–190.

5.      I. Levi, A. Kaizer man, A.Fish, Low voltage dual mode logic: model analysis and parameter extraction, Micro electron. J. 44(2013)553–560.

6.      A. Kaizerman, S. Fisher, A. Fish, Subthreshold dual mode logic, IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 21 (5) (2013) 979–983.

7.      Elahe  Rastegar  Pashaki, M.Shalchian Electrical Engineering Department, Amirkabir University of  Technology, 424 Hafez Ave., Tehran, Iran “Design and simulation of an ultra-low power high performance CMOS logic: DMTGDI” Integration, the VLSI journal 55(2016)194–201.

8.        R. J. Baker, H.W. Li and D.E. Boyce, CMOS Circuit Design, Layout and Simulation, IEEE Press, 1998.

9.       D. Radhakrishnan, “Low – voltage low – power CMOS full adder” , IEE Proceedings -Circuits, Devices and Systems, vol.148, pp. 19  – 24, Feb. 2001

10.   A.M. Shams and M.A. Bayoumi, “A novel high-  performance CMOS 1 – bit full- adder cell”,  IEEE Trans. on Circuits and Systems II: Analog and Digital Signal Processing, vol. 47, pp. 478 –481, May 2000.  

 

72-77

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

P. Manimekalai, P. Selvarajan

Paper Title:

Studies of Unodped Glycine, Cesium Chloride Doped Glycine and Rubidium Chloride Doped Glycine Crystals  

Abstract:  Glycine is one of the simplest amino acid that has no asymmetric carbon atom and is optically inactive. It is mixed with other organic or inorganic salts and acids to obtain new complexes and these complexes have improved chemical stability, thermal, optical, mechanical, electrical, linear and nonlinear optical properties. Many glycine based crystals are known to be having interesting properties and in this work, cesium chloride and rubidium chloride are separately added in small amounts into the lattice of glycine crystals to get the doped samples for the research work. Single crystals of undoped, cesium chloride doped and rubidium chloride doped glycine were grown by solution method and grown crystals were analyzed by various characterization techniques. Solubility was measured for the samples. XRD study was carried out to find the crystal structure and hardness study was done on the crystals to find the mechanical strength. Second harmonic generation studies were carried out to find SHG efficiency. Density and structural characterization was performed for the samples. Photoconductivity studies were carried out for the samples and the results are discussed.

Keywords:
  Doping, glycine, crystal growth, characterization, XRD, hardness


References:

1.      D. Eimert, S. Velsko, L. Davis, F.Wang, G. Loiaceono, G. Kennedy, IEEE    J. Quantum Electron. 25 (1989) 179.
2.      M.D. Aggarwal, J. Choi,W.S.Wang, K. Bhat, R.B. Lal, A.D. Shield, B.G. Penn, D.O. Frazier, J. Crystal Growth 204 (1999) 179.

3.      P.Selvarajan,  J.Glorium ArulRaj, S.Perumal  J. Crystal Growth 311 (2009) 3835.

4.      D. Rajan Babu, D. Jayaraman, R. Mohan Kumar, R. Jayavel, J. Crystal Growth (2002) 121.

5.      Ramesh Kumar, S. Gokul Raj, R. Sankar, R. Mohan, S. Pandi, R. Jayavel, J. Crystal Growth 7 (2004) 213.

6.      S.Hoshino, T.Mitsui, F.Jona, R.Pepinsky, Phys.Rev.115 (1959) 323.

7.      Hung-Wen Li, Gu-Shen Yu, Herbert L. Strauss, J. Phys. Chem. B102 (1998) 298.

8.      S. Natarajan, K. Ravikumar, S.S. Rajan, Z. Kristallogr. 168 (1984) 75.

9.      Tapati Mallik, Tanusree Kar, Cryst. Res. Technol. 40 (2005) 778.

10.   R. Muralidharan, R. Mohankumar, P.M. Ushasree, R. Jayavel,P. Ramasamy, J. Crystal Growth 234 (2002) 545.

11.   J.K. Mohan Rao and M.A. Vishwamitra, Acta Crystallogr. B 28 (1972)1484.

12.   S.A. Martin Britto and S. Natarajan, Mater. Lett.,  62 (2008) 2633-2636.

13.   R. Shanmugavadivu, G. Ravi and A. Nixon Azariah, J. Phys. and Chem.      Solids, 67(2006)1858-1861.

14.   M.R. Suresh Kumar, H.J. Ravindra and S.M. Dharmaprakash, J. Cryst.  Growth,  306 (2007)361-365.

15.   C.S.Towler, R.J. Davey, R.W. Lancaster, C.J. Price, J. Am. Chem. Soc. 126 (2004) 13347.

16.   G.D. Profio, S. Tucci, E. Curcio, E. Drioli, Cryst. Growth Des. 7 (2007) 526.

17.   P.Yasotha, R.Thiagarajan, P.Sagunthala, Int. J. Chem. Phys. Sci. 4(2015)99.

18.   P.Manimekalai and P.Selvarajan, J. Chem.Pharma. Res. 7(2015)691-696.

19.   A. Siva Dhas, P. Selvarajan, and T. H. Freeda,   Materials and Manufacturing Processes, 24 (2009) 584.

20.   Richard E.Marsh, Acta Cryst. 11(1958)654.

21.   S.K. Kurtz, T.T. Perry, J. Appl. Phys. 39 (1968) 3798.

22.   B.W. Mott, Micro Indentation Hardness Testing, Butterworths, London (1956).

23.   R. H. Bube, Photoconductivity of solids, Wiley, New York (1981).

 

78-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

15.

Authors:

Ngoc-Hien Tran, Van-Cuong Nguyen, Van-Nghia Nguyen

Paper Title:

Study on Design and Manufacture of 3D Printer based on Fused Deposition Modeling Technique

Abstract:   Additive manufacturing (AM) known as 3D printing has been applied for applications in different fields such as aerospace, automotive, biomedical, and energy industries. Currently, with the rapid growth of this technology, there are a large number of 3D printing methods in the market. Each method has its own advantages, applications, and limitations. Materials used for printing also are classified into groups such as polymers, metals, ceramics, and cermets. Along with research on new materials, new printing technologies, 3D printers are more widely applied. For education field in universities, rapid prototyping from 3D printing enables to build 3D models for graphic design and rapid prototyping courses. On the basis of inheriting the available research for training in universities, the authors propose the design and manufacture of 3D printers using FDM printing method. This paper presents the results of design and fabricating 3D printer. The printing test results have demonstrated the functionalities of the designed machine.

Keywords:
3D printer, FDM, additive manufacturing, rapid prototyping, ABS, PLA.


References:

1.        Vinesh Raja and Kiran J. Fernandes, Reverse Engineering, Springer, 2008.
2.        G. Baronio, S. Harran, and A. Signoroni, “A critical analysis of a hand orthotics reverse engineering and 3D printing process,” Applied Bionics and Biomechanics, vol. 2016, pp. 1-7, 2016.

3.        Ali Kamrani and Emad Abouel Nar, Rapid prototyping: Theory and Practice, Springer, 2006.

4.        Grzegorz Budzik, “The use of the rapid prototyping method for the manufacture and examination of gear wheels,” in Advanced Applications of Rapid Prototyping Technology in Modern Engineering, InTech publisher, 2011.
5.        Gideon N. Levy, Ralf Schindel, and J.P. Kruth, “Rapid manufacturing and rapid tooling with layer manufacturing (LM) technologies: State of the art and future perspectives,” CIRP Annals – Manufacturing Technology, vol. 52, no.2, pp.589-609, 2003.
6.        C.P. de Sampaio, R.M. de O. Spinosa, J. Vicentin, D.Y. Tsukahara, J.C. da Silva, S.L.S. Borghi, and F. Rostirolla, “3D printing in graphic design education: Educational experiences using fused deposition modeling (FDM) in a Brazilian university,” In High Value Manufacturing – Bártolo et al. (eds.), pp.25-30, 2014.

7.        R.M. Raymond, T.B. Joseph and M.D. Aaron, “Hybrid deposition manufacturing: design strategies for multimaterial mechanisms via three- dimensional printing and material deposition,” Journal of Mechanisms and Robotics, vol. 7, pp. 1-10, 2015.

8.        http://web.stratasys.com, July, 2017.

9.        http://www.3dsystems.com, July, 2017.
10.     http://www.zcorp.com, July, 2017.
11.     http://www.materialstoday.com, July, 2017.

12.     http://www.cardiff.ac.uk, July, 2017.

13.     H.S. Park and N.H. Tran, “A decision support system for selecting additive manufacturing technologies,” Proceedings of the 2017 International Conference on Information System and Data Mining,  pp. 151-155.

14.     H. Chen, X. Yang, L. Chen, Y. Wang, and Y. Sun, “Application of FDM three-dimensional printing technology in the digital manufacture of custom edentulous mandible trays,” Scientific Reports, pp. 1-6, 2016.

15.     http://www.reprap.org, July, 2017.

16.     L. M. Galantucci, I. Bodi, J. Kacani, and F. Lavecchia, “Analysis of dimensional performance for a 3D open-source printer based on fused deposition modeling technique,” Procedia CIRP, vol. 28, pp. 82 – 87, 2015.

17.     S.H. Kochesfahani, “Improving PLA-based material for FDM 3D-printers using minerals (principles and method development),” In SPE ANTEC, Indianapolis, pp. 1598–1614, May 2016.

18.     H.S. Park and N.H. Tran, “Computer aided process planning for 3D printing,” Journal of the Korean Society of Manufacturing Technology Engineers, vol. 24, no. 2, pp.148-154, 2015.

 

83-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Ehsan Amini, Setareh Oruji

Paper Title:

Assess and Challenges of Vehicle Parking Scenario in the Central Core of Mysore City

Abstract: Transportation is the engine of growth and the bedrock to the rapid development of every country or economy. In Mysore automobile has various impacts on people’s lifestyle, on the other hands motor vehicles are cause to many problems in city like spaces for parking requirement and road traffic congestion. Lack of enough space in urban area has caused urban planners face challenges for vehicular problems management. While local government in Mysore has made efforts to solve vehicle parking problem in the old core of city, the absence of appropriate vehicle parking facilities has stroked up unexpected levels of parking demand. This paper highlights the parking problems in the central business district and proposes justified measures and strategies for meeting the traffic congestion challenges in central business district of Mysore city.

Keywords:
 Central Core of City, Mysore city, Vehicle Parking, Vehicle Traffic Congestion.


References:

1.      Dr Wen Long Yue, 2004, Parking management in Saudi Arabia: Is there any solution?, 27th Australasian Transport Research Forum, Adelaide, 29 September – 1 October 2004, Transport Systems Centre, University of South Australia,
2.      Anumita Roychowdhury, 2012, Parking: Multi-level dilemma, Lessons from Multi-Level Parking in Delhi, right to clean air campaign, Centre for science and environment, New Delhi, http://www.cseindia.org/userfiles/Sarojini_Nagar_Parking_Report.pdf,

3.      Nidhi Mehta, Khatri Pallavi V and Prof. Jayesh Juremalani, 2015, Review of Parking Problems in CBD Area of Urban Cities in Developing Countries, IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 12 | May 2015,

4.      Urban Form of Mysore, http://shodhganga.inflibnet.ac.in/bitstream/10603/38438/10/chapter%204.pdf,

5.      Mysore  city Corporation, Dec 17, 2009, Action Plan for Solid Waste Management, Published by: kbb84

6.      Mysore Urban Development Authority (MUDA)

7.      Mysore Regional Traffic Office (RTO)

 

89-94

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

A. Ranichitra, D. Seethalakshmi

Paper Title:

A Comparative Analysis of Segmentation Techniques to Extract Skin Lesion Regions

Abstract:  Skin diseases are the most common health problems in worldwide. Diagnosis of the skin disease depends on the extraction of the abnormal skin region. In this paper, Segmentation techniques to extract the skin lesion regions are proposed and their results are compared based on the statistical and texture properties. The acquired skin images are preprocessed by median filter and segmented by Edge-based segmentation, Morphological segmentation and K-means clustering techniques. The statistical features mean and standard deviation and the texture features contrast and energy are calculated for all the segmented skin lesion images. The performance of the three segmentation techniques are compared and found that the K-Means algorithm yields better results without any over and under segmentation.

Keywords:
Edge Based Segmentation, energy, contrast, K-Means Clustering, Morphological segmentation, mean, standard deviation, skin lesion,


References:

1.      http://www.wisegeek.com/what-is-video-processing.htm
2.      https://www.dermcoll.edu.au/about-the-college/what-is-a-dermtologist/

3.      Moureen Ahmed, Anita Raghavendra, Dr.Mahesh Rao,”  An    Image Segmentation comparison approach for Lesion Detection and Area calculation in Mangoes”Vol 02 Issue 05 | Aug-2015

4.      Miss.Priyanka s. Biradar, Mr.S.N.Patil,” Psoriasis Detection   Using Color And Texture Feature” ISSN(PRINT):2394-3408,(ONLINE):2394-3416,VOLUME-2,ISSUE
4,2015

5.      Ashwini C. Bolkote, M. B. Tadwalkar,” Analysis of Different Psoriasis Skin Images” IJETT ISSN: 2350 – 0808 | April 2015 | Volume 2 | Issue 1 | 215.

6.      Nishadevi.R, Gunavathi.C,” Segmentation and Risk Identification of Melanoma Skin Lesions Using Boundary Tracing Algorithm”Volume 3 Issue IV, April 2015.

7.      Nidhal K. A Abbadi, Nizar Saadi Dahir, Muhsin A. AL-   Dhalimi and Hind Restom, “Psoriasis Detection Using Skin Color and Texture Features”Journal of Computer Science 6 

8.      (6): 648-652, 2010 ISSN 1549-3636 © 2010 Science Publications.

9.      Damanpreet Kaur, Prabhneet Sandhu. “Human Skin Texture Analysis using Image Processing Techniques” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.

10.   C.Vinayaga Jagadeesh Raja M.Jeyaprakash, “ Skin Disease Diagnosis Using Texture Analysis”  Volume 4, Issue 1, January 2014  ISSN: 2277 128X  Padmapriya Nammalwar, B. Ovidiu Ghita, and C. Paul F. Whelan “Segmentation of Skin Cancer Images”

11.   H. Muller et al.,A Review of Content-Based Image Retrieval Systems in Medical Applications: Clinical Benefits and Future Directions, Int‟l J. Medical Informatics,vol. 73, no. 1, 2004, pp. 123.

12.   Simona Banu, Gheorghe Toacse, Gabriel Danciu.”Objective Erythema Assessment of PsoriasisLesions for Psoriasis Area and Severity Index (PASI) Evaluation” International Conference and Exposition on Electrical and Power Engineering (EPE 2014), 16-18 October, Iasi, Romania.

13.   Bhavini J.Samajpati and Sheshang D. Degadwala. “Hybrid Approach for Apple Fruit Diseases Detection and Classification Using Random Forest Classifier”. International Conference on Communication and Signal Processing, April 6-8, 2016, India.

14.   Shiv Ram Dubey , Pushkar Dixit , Nishant Singh, Jay Prakash Gupta. ” Infected Fruit Part Detection using K-Means Clustering Segmentation Technique”. International Journal of Artificial Intelligence and Interactive Multimedia, Vol. 2, N0. 2.

15.   SNEHALI D. SABLE. IMPLEMENTATION AND ANALYSIS OF K- MEANS AND FUZZY C MEANS CLUSTERING TECHNIQUES”.  26 th IRF International Conference, 10th May 2015, Pune, India, ISBN: 978-93-85465-09-3

16.   N.S.Nithya , Dr.K.Duraiswamy , P.Gomathy , “A Survey on Clustering Techniques in Medical Diagnosis”. International Journal of Computer Science Trends and Technology (IJCST) – Volume1 Issue2, Nov-Dec 2013.

17.   N.Sivaranjani, Ms.M.Kalaimani, “DIAGNOSIS OF MELANOMA SKIN CANCER USING NEURAL NETWORK” International Journal Of Research & Development Organisation. VOL 2 ISSUE 5 May 2015

18.   Ms. Kiran R. Gavhale, Prof. Ujwalla Gawande, Mr. Kamal O. Hajari. “Unhealthy Region of Citrus Leaf Detection Using Image Processing Techniques”. International Conference for Convergence of Technology – 2014.
19.   Zhiwei Jiang, Min Yao, Wei Jiang. “Skin Detection Using Color, Texture and Space Information”. Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).Vol. 21.
20.   Harpreet Kaur, Aashdeep Singh” A Review on Automatic Diagnosis of Skin Lesion Based on the ABCD Rule & Thresholding Method”. International Journal of Advanced Research in Computer Science and Software Engineering(IJARCSSE). Volume 5, Issue 5, May 2015.

21.   Ridhuna Rajan Nair , Swapnal Subhash Adsul , Namrata Vitthal Khabale , Vrushali Sanjay Kawade” Analysis And Detection of Infected Fruit Part Using Improved k-means Clustering and Segmentation Techniques”. Innovation in engineering science and technology (NCIEST-2015). Jan 1, 2016.

 

95-100

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

A. Mercy Rani, R. Durgadevi

Paper Title:

Image Processing Techniques To Recognize Facial Emotions

Abstract: Recognize the human face emotions by computer is an interesting and challenging problem. Face recognition is used in security system effectively compared to other biometric such as fingerprint or iris recognition systems. Face emotion recognition is one of the crucial roles in face recognition system. It is used to recognize the muscle behaviors of the face. The goal of the proposed work is to build an emotion recognition system. It includes face detection, non-skin region extraction and morphological processing finally, emotion recognition. In this article, it begins with frame based detection. The image quality is analyzed. Face location is detected using viola-jones algorithm. Extract non-skin region, Morphological operations are applied to the extracted image to extract the facial feature for recognition of facial emotions. The experiment has shown that the proposed strategy is effective.

Keywords:
 Image Quality Metrics, Face Detection, Segmentation, Morphological Processing, Emotion Recognition, Mat lab.


References:

1.      Punith Kumar M B And Dr. P.S. Puttaswamy, “Video to Frame Conversion of TV News Video By Using Mat Lab”, International Journal of Advance Research in Science And Engineering, IJARSE, vol. No.3, issue no.3, march 2014 issn-2319-8354(e) 95.
2.      Kanchan Lata Kashyap, Sanjivani Shantaiya “Noise Removal of Facial Expression Images Using Wiener Filter”, National Conference on Emerging Trends in Computer Science and Information Technology (ETCSIT) 2011 proceedings published in International Journal of Computer Applications(IJCA)

3.      Samir K. Bandyopadhyay proposed, “A Method For Face Segmentation, Facial Feature Extraction And Tracking” IJCSET | April 2011 | vol.no:1, issue 3,137-139

4.      Reza Hassanpour, Asadollah Shahbahrami, And Stephan Wong, “Adaptive Gaussian Mixture Model for Skin Color Segmentation”, proceedings of World Academy of Science, Engineering and Technology Volume 31 July 2008 issn 1307-6884

5.      Fattah Alizadeh, Saeed Nalousi, Chiman Savari, “Face Detection in Color Images Using Color Features Of Skin”, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:5, 2011

6.      Prof. D. K Shah, Vishal B. Mokashi, “Face Detection and Recognition are Using Recorded Videos”, International Journal of Emerging Technology and Advanced Engineering website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 certified journal, Volume 5, Issue 2, February 2015)

7.      Prasad M and Ajit Danti, “Classification of Human Facial Expression based on Mouth Feature using SUSAN Edge Operator “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 12, December 2014 ISSN: 2277 128X.

8.      L. Torres, L. Lorente and J. Vilà, “Face Recognition Using Self-Eigenfaces”, Proceedings of the International Syposium on Image/Video Communications Over Fixed and Mobile Networks, Rabat, Morocco, pp. 44-47, April 2000.

9.      Thuseethan.S and Kuhanesan.S, ” Eigenface Based Recognition of Emotion Variant Faces”, Computer Engineering and Intelligent Systems www.iiste.org ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.5, No.7, 2014.

10.   Shwetank Arya, Neeraj Pratap, Karamjit Bhatia, ” Future of Face Recognition: A Review”, ELSVIER, Procedia Computer Science 58 (2015) 578 – 585.  

 

101-106

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

19.

Authors:

Naeem Javed, Muhammad Aamir Shafi, Nasrullah Khan, Mohsin Khan

Paper Title:

Design of a Smart Energy Meter with Overload Trip Facilities

Abstract:  Nowadays for running the domestic electric appliances like lamp, Motor and Air Conditioner, one of the most commonly used energy source is Electric energy. This is the reason that electric energy has become quite important in the daily life of people. In Pakistan, WAPDA (Water and Power Development Authority) is the main company whose sole purpose is the generation and distribution of electrical energy throughout the country and the consumer will have to pay according to the use of electrical energy. There are other companies that also generate electrical energy and distribute it to some of the area like K-electric and IPPS. So, a consumer knows how much energy has been consumed by the domestic electrical appliances when an employee of WAPDA checks the energy meter once a month and charged according to the units consumed in a month. In such a manner, a consumer does not get any information that how much energy has been consumed and he will have to pay a large amount of bill as he is unaware of his energy consumption. This way he is unable to manage his load according to his requirements.  In this project, we are going to design a prototype of Three Phase smart energy meter. In order to make a conventional energy meter smart we are going to interface a microcontroller and GSM module with the energy meter. The purpose of microcontroller is that through this we are going to measure current and voltage for all the three phases and from these readings power will be calculated because we need to know the consumption before its management. For each phase, a user can set a predefined value of load, whenever this limit exceeds the user will get a message for that phase that the “system is overload”. This will inform him about his load and after that he will manage his load accordingly. So, our designed prototype has got two advantages, first one is that user can set a threshold value of energy and the other one is that consumer will be informed whenever the threshold value of energy is exceeded. This will be beneficial for the user and also for the electric energy providing company. The meter will be trip on high usage of energy and WAPDA will be informed whenever there is short circuit. So, this can also provide safety for the domestic users. In the designed project, we have proposed different ways of reclosing the relay for each and every Phase as we have three Phases. User can reclose the first Phase just by pressing a touch button while the second phase will reclose automatically after a delay of one minute. A user can change this delay. The third Phase will reclose after a delay of two minutes in a condition that the user has managed his load otherwise it will remain open. 

Keywords:
Energy Meter, GSM modem, Arduino Microcontroller, Smart Grid. 


References:

1.        Rahman, Masudur, M. Ohidul Islam, and S.Salakin. (2015). “Arduino and GSM Based Smart Energy Meter for Advanced Metering and Billing System.” 2nd Int‟l Conf. on Electrical Engineering and Information & Communication Technology (ICEEICT), Jahangimagar University, Dhaka 1342, Bangladesh, 2015, p-p 1-6.
2.        Bharath, P., N. Ananth, S. Vijetha, and Prakash K V Jyothi. (2008). “Wireless Automated Digital Energy Meter.” IEEE International Conference on Sustainable Energy Technologies, (ICSET), India, 2008, p-p 564–67.

3.        Ashna, K., and Sudhish N. George. (2013). “GSM Based Automatic Energy Meter Reading System with Instant Billing.” Proceedings – 2013 IEEE International Multi Conference on Automation, Computing, Control, Communication and Compressed Sensing, iMac4s, National Institute of Technology, Calicut, India, 2013, p-p 65–71.

4.        Tan, H.G.R., C.H.R. Lee, and V.H. Mok. (2007), “Automatic Power Meter Reading System Using GSM Network.” 2007 International Power Engineering Conference (IPEC), Singapore, 2007, p-p 465–469.

5.        Electricity tariff schedule, Retrieved on February 18, 2016, fromhttps://www.tnb.com.my/assets/files/tariff_rate_final_01.jan.2014.

6.        Arif, A., Al-Hussain, M., Al-Mutairi, N., Al-Ammar, E., Khan, Y., & Malik, N. (2013). “Experimental Study and Design of Smart Energy Meter for the Smart Grid.” 2013 International Renewable and Sustainable Energy Conference (IRSEC), King Saud University, Riyadh, Saudi Arabia, 2013, p-p 515–520.

7.        http://www.watthourmeters.com/history.html.

8.        http://matrix.dte.us.es/grupotais/images/articulos/berhanu _itrevolutions.pdf

9.        J. L. Carr, “Recent developments in electricity meters, with particular reference to those for special purposes,” in Journal of the Institution of Electrical Engineers, vol. 67, no. 391, pp. 859-880, Apr. 1929.

10.     M. R. Hossain, A. M. Thanand A. B. M. Shawkat Ali, “Evolution of Smart grid and some pertinent issues,” in 20th Australasian Universities Power Engineering Conference (AUPEC), 2010, pp.1-6.

11.     http://www.dlms.com/productsandservices/microtech- industriespvtlimited-pakistan.html

12.     L. O. AlAbdulkarim and Z. Lukszo, ―Smart Metering for the future energy systems in the Netherlands, in Fourth International Conference on Critical Infrastructures, 2009, pp. 1–7.

13.     P. K. Bhowmik, A. Paul, “Remote detection of illegal electricity usage employing smart energy meter – A current based technique,” in Innovative Smart Grid Technologies, India, 2011, pp. 391-395.

14.     F. Livgard, “Electricity customers’ attitudes towards Smart Metering,” in IEEE International Symposium on Industrial Electronics (ISIE), July. 2010, pp. 2519-2523.

15.     http://www.Smartgrid.gov/the_Smart_grid#Smart_home

16.     J. Stragier, L. Hauttekeete, L. De Marez, “Introducing Smart grids in residential contexts: Consumers’ perception of Smart household appliances,” in IEEE Conference on Innovative Technologies for an Efficient and Reliable Electricity Supply (CITRES), Sept. 2010, pp.135-142.

17.     Benzi, N. Anglani, E. Bassi, and L. Frosini, ―Electricity Smart Meters Interfacing the Households, IEEE Transactions on Industrial Electronics, vol. 58, no. 10, Oct. 2011, pp. 4487–4494.

18.     J. M. Bohli, C. Sorge, and O. Ugus, ―A Privacy Model for Smart Metering, in IEEE International Conference on Communications Workshops (ICC), 2010, pp. 1–5.

19.     L. O. AlAbdulkarim and Z. Lukszo, ―Smart Metering for the future energy systems in the Netherlands, in Fourth International Conference on Critical Infrastructures, 2009, pp. 1–7.

20.     S. Ahmad, ―Smart Metering and home automation solutions for the next decade, in International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2011, pp. 200–204.

21.     D. Y. R. Nagesh, J. V. V. Krishna and S. S. Tulasiram, ―A Real-Time Architecture for Smart Energy Management, in Innovative Smart Grid Technologies (ISGT), Jan. 2010, pp. 1-4.

22.     Deconinck, B. Delvaux, K. De Craemer, Z. Qiu and R. Belmans, ―Smart Meters from the angles of consumer protection and public service obligations, in Intelligent System Application to Power Systems (ISAP), 2011, pp.1-6.

23.     https://www.elprocus.com

24.     http:// www.electronics-tutorials. ws/waveforms /555_ timer .html

 

107-117

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Arch. Shaimaa Abou Shousha, Tarek Farghaly, Ibrahem Maarof

Paper Title:

Preservation of Historic City Centers

Abstract:   The historic city center is the most important node in the city. It is the place which carries the original character of the city no matter how modern it become. There are many problems that face the heritage of the city center, which cause huge losses in city character. Cairo is one of the most important examples of historic city centers which worldwide organizations like UNISCO has put programs to protect and preserve its heritage. In this paper we discuss how to study the historic center of the city and how to define its characteristics, and factors affecting them. Then we study how to preserve heritage in historic city centers and to stop destroying it.

Keywords:
 UNISCO, Cairo, destroying, city character 


References:

1.      (Sabah Yehiawy, originality of architectural and physical preservation projects and the role of international charters and recommendations, master Thesis, Department of Architecture, Faculty of Engineering, Cairo University, 2003)
2.       (Bernard Feilden, conservation of historic buildings, Butterworth and Co., Ltd., England, 1982)

3.      (J. Strike, architecture in conservation-managing development at historic Sites, Routledge, London, 1994)

4.       Book Architectural Heritage Final, published on the occasion of the first International Conference on urban Heritage in Islamic countries (Riyadh, 1431 H/2010)

5.      Ibn al-Atheer, Diaa-Eldin (1959), the proverbial proverb in the literature of the writer and poet, the presentation and commentary of Ahmad al-Houfi and Badawi Tabana, part one, Dar Nahdet Misr for printing and publishing, Cairo, p. 54

6.      Bernard Feilden, Conservation of Historic Buildings, Butterworth and Co., LTD, England, 1982

7.       Amani Elsaied Abdulrahman Ahmed Al-Rayes, Urban Reconstruction as a Pillar of Sustainability with Special Reference to Urban Heritage Areas, PhD Thesis, Cairo University, 2010.

8.       Foundations and standards for the cultural coordination of the buildings and heritage areas of the high value approved by the Higher Council for Urban Planning and Development in accordance with Act No. 119 and its implementing regulations, 2008.

9.      Anderberg, S. et al. (2000) Old Sins – Industrial metabolism, heavy metal pollution, and environmental transition in central Europe. United Nations University Press, New York

10.   Baeten, G. (2008) The Uses of Deprivation in the Neoliberal City. In BAVO (ed.) Urban Politics Now. Re-Imagining Democracy in the Neoliberal City. NAi Publishers, Rotterdam

11.   Baeten, G. (2000) The Tragedy of the Highway: Empowerment, Disempowerment and the politics of Sustainability Discourses and Practices. European Planning Studies, Vol. 8, No. 10

12.   Banister, D. (2005) Unsustainable Transport – City transport in the new century. Routledge, London

13.   Bhatta, G. (2001) Of Gees and Ganders: Mainstreaming Gender in the Context of Sustainable Human Development. Journal of Gender Studies, Vol. 10

14.   Bell, S. and Morse, S. (2006) Measuring Sustainability: Learning from Doing. Earthscan, London

15.   Blewitt, J. (2008) Understanding Sustainable Development. Earthscan, London

16.   Basiago, A.D. (1999) Economic, social and environmental sustainability in development theory and urban planning practice. The Environmentalist, Vol. 19

17.   Brown, L. (1981) Building a Sustainable Society. Worldwatch Institute, New York

118-124

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Sahil, Naresh Kumar

Paper Title:

Design and Implementation of Topology Adaptive Distributed Clustering Protocol for MANET

Abstract: In this research work, simulation based survey has been made to study the strengths and weaknesses of existing algorithms that motivated for the design of energy efficient clustering in MANET. Neighbour Recognising Protocol (NRP) has been designed to help the nodes to probe their immediate neighbours. Topology adaptive distributed clustering protocol (TADCP) has been proposed, that uses the node mobility and its available battery power for calculating the node weights. A node having the highest weight among its immediate neighbours declares itself as the volunteer cluster head. As the current head consumes its battery power beyond a threshold, non-volunteer cluster heads are selected. The algorithm aims to utilise the battery power in a fairly distributed manner so that the total network life time is enhanced. Validation for the base protocol NRP and algorithm TADCP are made through simulation by using the MATLAB. Each of the proposed work is evaluated separately to analyze their performances and compared with the competent results.

Keywords:
(TADCP), MANET. Neighbour Recognising Protocol (NRP), Each


References:

1.      M. R. Garey and D. S. Johnson. Computers and Intractability: A guide to the theory of NP-completeness. Freeman, San Francisco, CA, 1979.
2.      S Basagni, M Mastrogiovanni, and A Panconesi. Localized protocols for ad hoc clustering and backbone formation: A performance comparison. IEEE Transactions on Parallel and Distributed System, 17(4):292–306, 2006.

3.      B. Bollbas. Random Graphs. Academic Press, 1985.

4.      E. Perkins. Ad Hoc Networking. Addison Wesley, 2000.

5.      C. C. Chiang, H.K. Wu, W.Liu, and M. Gerla. Routing in clustered multihop, mobile wireless networks with fading channel. In Proceedings of IEEE Singapore International Conference on Networks SICON’ 97, pages 197–212, 1997.

6.      L. M. Feeney. An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks. Journal of Mobile Networks and
Applications, 6(3):239–249, 2001.

7.      S. Raguvaran, “Improving QoS in MANET by estimating the available bandwidth,” in

8.      Sixth International Conference on Advanced Computing (ICoAC),DOI:10.1109/ICoAC.2014.7229723, 2014

9.      J. Anju;C. N. Sminesh, “An Improved Clustering-Based Approach for Wormhole Attack Detection in MANET,” in 3rd International Conference on Eco-friendly Computing and Communication Systems,DOI:10.1109/Eco-friendly.2014.105, 2014

10.   Anju Shukla; A. K. Vatsa, “Optimized and secure address allocation scheme in MANET,” in Fourth International Conference on Advances in Recent Technologies in
Communication and Computing (ARTCom2012),DOI:10.1049/cp.2012.2485, 2012

11.   Shabana Habib;Somaila Saleem;Khawaja Muhammad Saqib, “Review on MANET routing protocols and challenges,” in IEEE Student Conference on Research and Development, DOI:10.1109/SCOReD.2013.7002647, 2013

 

125-130

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

22.

Authors:

Sunkari Sridhar, R. P. Singh

Paper Title:

Hybrid Tone Reservation Approach for Reduction of PAPR in MIMO-OFDM System

Abstract:  OFDM is a system in which information stream at high rates are separated into many low information streams for synchronous transmission of information in a channel. It is one of the powerful methods utilized for fast transmission of information over a correspondence channel. It is a modulation method. The primary constraint of OFDM system is high Peak-to-Average Power Ratio (PAPR). So keeping in mind the end goal to accomplish low complexity PAPR, there is a need to apply a successful method on these systems. In this research paper, a hybrid approach is connected for the lessening of PAPR in OFDM systems. The techniques connected are Tone Reservation-clipping based and Partial Transmit Sequence.

Keywords:
Peak-to-Average Power Ratio, Partial Transmit Sequence, OFDM system, Tone Reservation-clipping.


References:

1.         “An Investigation of Peak-to-Average Power Reduction in MIMO-OFDM Systems”. Wang Yi Gulinfeng Belkinge Institute of Technology. October 2009.
2.         Han, Seung Hee, and Jae Hong Lee. “An overview of peak-to-average power ratio reduction techniques for multicarrier transmission.” Wireless Communications, IEEE 12.2 (2005): 56-65.

3.         Hwang, Taewon, et al. 2009. OFDM and its wireless applications: a survey. IEEE Transactions on Vehicular Technology, 58 (4), 1673-1694

4.         Li, Xiaodong, and Leonard J. Cimini Jr. “Effects of clipping and filtering on the performance of OFDM.” Vehicular Technology Conference,1997, IEEE 47th. Vol. 3. IEEE, 1997.

5.         Zhu, Xiaodong, et al. “Simplified approach to optimized iterative clipping and filtering for PAPR reduction of OFDM signals.” Communications, IEEE Transactions on 61.5 (2013): 1891-1901.

6.         Wang, Y. C., and Z. Q. Luo. “Optimized iterative clipping and filtering for PAPR reduction of OFDM signals.” Communications, IEEE Transactions on 59.1 (2011): 33-37.

7.         Cuteanu, Victor, and Alexandru Isar. “PAPR reduction of OFDM signals using selective mapping and clipping hybrid scheme.” Signal Processing Conference (EUSIPCO), 2012 Proceedings of the 20th European. IEEE, 2012.

8.         Cuteanu, Eugen Victor, and Alexandru Isar.’PAPR Reduction of OFDM Signals using Partial Transmit Sequence and Clipping Hybrid Scheme’.AICT 2012, The Eighth Advanced International Conference on Telecommunications.2012.

9.         Lee, Byung Moo, Youngok Kim, and Rui JP de Figueiredo. “Performance analysis of the clipping scheme with SLM technique for PAPR reduction of OFDM signals in fading channels.” Wireless Personal Communications 63.2 (2012): 331-344.

10.      K.Yang and S. Chang, “Peak-to-average power control inOFDM using standard arrays of linear block codes,” IEEE Communications Letters, vol. 7, no. 4, pp. 174–176, Apr. 2003.

11.      T. Jiang and G. X. Zhu, “Complement block coding for reduction in peak-to-average power ratio of OFDMsignals,” IEEE Communications Magazine, vol. 43, no. 9, pp. S17–S22, Sept. 2005.

12.      H. Nikookar and K. S. Lidsheim, “Random phase updating algorithm for OFDM transmission with low PAPR,” IEEE Trans. Broadcasting,vol. 48, no. 2, pp. 123–128, Jun. 2002.

13.      X. B.Wang, T. T. Tjhung, and C. S. Ng, “Reduction of peak-to-average Power ratio of OFDM system using A companding technique,” IEEE Trans. Broadcasting, vol. 45, no. 3, pp. 303–307, Sept. 1999. 13

14.      S. H. Muller and J. B. Huber, “OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences,” IEE Electronics Letters, vol. 33, no. 5, pp. 36–69, Feb. 1997.

15.      J. Tellado, “Peak to Average Power Ratio Reduction for Multicarrier Modulation,” PhD thesis, University of Stanford, Stanford, 1999.

16.      Yong Soo Cho, Jaekwon Kim,Won Young Yang, Chung G.Kang,“MIMOOFDM WIRELESS COMMUNICATIONS WITH MATLAB”, Copyright:2010.

17.      Ramjee Prasad, “OFDM for Wireless Communication System”, Arc    tech House, 2004.

18.      Kangwoo Park and In-Cheol Park, “Low-Complexity Tone Reservation for PAPR Reduction in OFDM Communication Systems”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.20, No.10, October 2012.

19.      S. Janaaththanan, C. Kasparis, and B. Evans, “A gradient based algorithm for PAPR reduction of OFDM using tone reservation technique,” in Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE, May 2008, pp. 2977–2980.

20.      Mohamad Mroué, Amor Nafkha and Jacques Palicot.’’An Innovative Low Complexity PAPR Reduction TR-based Technique for DVB-T2 System’’. International Congress on Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT).2010.

 

131-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

23.

Authors:

Roopesh Kumar Kurmi, Sumit Gupta

Paper Title:

A Review of Lossless and Lossy Based Image Compression Techniques

Abstract: Image compression aims to reduce the data size of images and to store or transmit these images efficiently. Therefore, it offers the promise of image/video transmission under limited bandwidth. The past few decades have witnessed an extensive body of literature on both lossless and lossy image compression. This paper presents a literature review of different number of lossy and lossless based image compression technique that have been developed by researchers to perform various application which are based on the various types of images such as medical images, standard images, or with all digital images. This review helps in analyzing the existing lossy and lossless based image compression technique and it discuss the image quality, image compression ratio, image compression rate, PSNR value etc. 

Keywords:
image compression ratio, image compression rate, PSNR value etc. 


References:

1.      Shruthi K N, Shashank B M, Y.SaiKrishna Saketh, Dr. Prasantha .H.S and Dr. S.Sandya “Comparison Analysis Of A Biomedical Image For Compression Using Various Transform Coding Techniques”, IEEE, 2016, Pp 297-303.
2.      V. Sunil Kumar and M. Indra Sena Reddy “Image Compression Techniques by using Wavelet Transform”, Journal of Information Engineering and Applications, 2012, Pp 35-40.

3.      Maneesha Gupta and Dr.Amit Kumar Garg “Analysis Of Image Compression Algorithm Using DCT”, IJERA, 2012, Pp 515-521.

4.      Kamrul Hasan Talukder and Koichi Harada “Haar Wavelet Based Approach for Image Compression and Quality Assessment of Compressed Image”, AJAM, 2010, Pp 1-8.

5.      Kiran Bindu, Anita Ganpati and Aman Kumar Sharma “A COMPARATIVE STUDY OF IMAGE COMPRESSIONALGORITHMS”, International Journal of Research in Computer Science, 2012, Pp 37-42.

6.      Miguel Hernandez-Cabronero, Victor Sanchez, Michael W. Marcellin, Joan Serra-Sagrista “A distortion metric for the lossy compression of DNA microarray images” 2013 Data Compression Conference.

7.      Seyun Kim, Nam Ik Cho “Hierarchical Prediction and Context Adaptive Coding for Lossless Color Image Compression” I EEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 1, JANUARY 2014. Pp  445-449.

8.      Seyun Kim,  Nam Ik Cho “Lossless Compression of Color Filter Array Images by Hierarchical Prediction and Context Modeling” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 24, NO. 6, JUNE 2014. Pp 1040-1046.

9.      Mai Xu, Shengxi Li, Jianhua Lu, Wenwu Zhu “Compressibility Constrained Sparse Representation With Learnt Dictionary for Low Bit-Rate Image Compression” IEEE Transactions On Circuits And Systems For Video Technology, VOL. 24, NO. 10, OCTOBER 2014. Pp 1743-1757.

10.   Vikrant Singh Thakur, Kavita Thakur “Design And Implementation Of A Highly Efficient Gray Image Compression Codec Using Fuzzy Based Soft Hybrid Jpeg Standard” 2014 International Conference on Electronic Systems, Signal Processing and Computing Technologies. Pp 484-489.

11.   Chandan Singh Rawat and Sukadev Meher “A Hybrid Image Compression Scheme using  DCT and Fractal Image Compression”, International Arab Journal of Information Technology, 2013, Pp 553-562.

12.   Navpreet Saroya and Prabhpreet Kaur “Analysis of IMAGE COMPRESSION Algorithm Using DCT and DWT Transforms”, International Journal of Advanced Research in   Computer Science and Software Engineering, 2014, Pp 897-900.

13.   S.M.Ramesh and Dr.A.Shanmugam “Medical Image Compression using WaveletDecomposition for Prediction Method”, IJCSIS, 2010, Pp 262-265.

14.   Fouzi Douak, Redha Benzid and Nabil Benoudjit “Color image compression algorithm based on the DCT transform combined to an adaptive block scanning”, Elsevier, 2011, Pp 16-26.

15.   Azam Karami, MehranYazdiand Grégoire Mercier “Compression of Hyperspectral Images Using Discerete Wavelet Transform and Tucker Decomposition”, IEEE, 2012, Pp 444-450.

16.   MFerni Ukrit, G.R.Suresh “Effective Lossless Compressionjor Medical Image Sequences Using Composite Algorithm” 2013 International Conference on Circuits, Power and Computing Technologies. Pp 1122-1126.

17.   Krishan Gupta, Dr Mukesh Sharma,  Neha Baweja “THREE DIFFERENT KG VERSION FOR IMAGE COMPRESSION” 2014. Pp 831-837.

 

136-140

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

24.

Authors:

R. B. Khebudkar, D. M. Nangare, M. M. Wagh

Paper Title:

A Review on Energy Efficient Hybrid Distillation/Pervaporation Process for Separation of Isopropyl Alcohol Azeotrope

Abstract: Hybrid separation process which basically pairs two processes together plays an important role in separation of azeotropic or constant boiling mixtures. A hybrid system can be defined as a process system consisting of different unit operations that are interlinked and optimized to achieve a predefined task. Therefore, if distillation is the basic separation system, a hybrid distillation system consists of a distillation column that is interlinked with another unit operation to achieve a better (cheaper, easier, enhanced) separation. A Hybrid separation process basically deeds the advantages of pervaporation and distillation, while the negative aspects are minimized. This also minimizes energy expenses. This review focusing to minimize 50-60 % energy saving in chemical industry. This review  focus on the energy savings in industry using hybrid system (distillation and Pervaporation combination) for separation of isopropyl alcohol and water azeotrope.

Keywords:
distillation, pervaporation, membrane separation process, hybrid separation process, energy efficient.


References:

1.   Maulik Acharya “Separation of IsoPropyl Alcohol – Water By Hybrid Distillation Pervaporation System” published on  IJSR – International  Journal Of  Scientific  Research vol.5 issue.1(Jan2016)
2.  Supaporn Jewprasat, Theerawat Suratago, and Muenduen Phisalaphong, “Pervaporation of Ethanol/Water Mixtures using Bacterial Cellulose-Poly (Vinyl Alcohol) Membrane” published in International Journal of Chemical, Environmental & Biological Sciences (IJCEBS) Volume 3, Issue 2 (2015).

3.   SohailRasool Lone, Syed Akhlaq Ahmad and Vimal Kumar, “Modeling and Simulation of a Hybrid Process (Pervaporation+Distillation) using MATLAB” published in 1000234J Chem Eng Process Technol (2015).

4.   John H. Bermudez Jaimes, Mario E. T. Alvarez, Javier Villarroel Rojas,Rubens Maciel Filho “Pervaporation: Promissory Method for the Bioethanol Separation of Fermentation” publish in The Italian Association of Chemical Engineering VOL. 38, (2014).

5.   Clément Servel, Denis Roizard, Eric Favre, and  Dominique Horbez“Improved “Energy Efficiency of a Hybrid Pervaporation/Distillation Process for Acetic Acid Production: Identification of Target Membrane Performances by Simulation” publish in Industrial & Engineering Chemistry Research  (2014).

6.    Nóra Valentínyi / Péter Mizsey “Comparison of pervaporation models with simulation of hybrid separation processes” publish in research article received 31 May 2013; accepted after revision (17 October 2013).

7.      Nwe Nwe Win1, P. Bösch2, A. Friedl2, “Separarion  Performance Using  Model  Parameters  Derived  From  Experimental  Data” published in May 15, (2012).

8.    Korbinian Kraemer, Andreas Harwardt, Rob Bronneberg, Wolfgang Marquardt, “Separation of butanol from acetone–butanol–ethanol fermentation by a hybrid extraction–distillation process” published in journal of Computers and Chemical Engineering 35 (2011) .

9.     A. K. Frolkova and V. M. Raeva, “Bioethanol Dehydration: State of the Art” published in theoretical foundations of chemical engineering Vol. 44 No. 4 (2010).

10.   V. Udeye, S. Mopoung, A. Vorasingha and P. Amornsakchai “Ethanol heterogeneous azeotropic distillation design and construction” International Journal of Physical Sciences Vol. 4 (3), pp. 101-106, March, (2009)

11.    William L. Luyben “Control of a Column/Pervaporation Process for Separating the Ethanol/Water Azeotrope” publish in  Ind. Eng. Chem. Res. 3484 (2009).

12.   Anett Lovasz, Tivadar Farkas, Peter Mizsey, “Methodology for modelling of pervaporation: step from binary to ternary mixtures” published in Desalination 241 (2009)

13.   Atilla  Evcin, Osman  Tutkun, “Pervaporation  Separation  Of  Ethanol-Water  Mixtures By  Zeolite-Filled  Polymeric  Membranes” published in journal of Ceramics – Silikáty 53 (4) 250-253 (2009).

14.    Shin-LingWee, Ching-Thian Tye, Subhash Bhatia, “Membrane separation process—Pervaporation through zeolite membrane” published on Separation and Purification Technology 63 (2008) .

15.  Carsten Buchaly, Peter Kreis , Andrzej G´orak, “Hybrid separation processes—Combination of reactive distillation with membrane separation” published in journal of  Chemical Engineering and Processing 46 (2007) 790–799.

141-144

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

25.

Authors:

Surbhi Sachdeva, Naresh Kumar

Paper Title:

An Efficient Approach of Deployment and Target Coverage in Wireless Sensor Networks

Abstract: Sensing a given particular zone is one of the main goals of wireless sensor networks. This consists of deploying the sensor nodes in order to detect any event occurring in a particular zone of interest and gives this information to the sink. It should also be energy efficient so as to maximize the network lifetime. The lifetime maximization in sensors network with target coverage can be considered as: To divide the sensors in set covers in such a way that each set cover can cover all the targets at a particular instant of time. We have to find maximal number of set covers which becomes active successively. This arrangement can maximize the lifetime of the network. In this paper, I have proposed an efficient SDSG algorithm that produces maximum number of disjoint sets of the sensors, such that each sensor set is a set-cover. I have also compared proposed algorithm with Simple Greedy and Greedy MSSC algorithm.

Keywords:
 SDSG, Greedy MSSC, Networks


References:

1.      Babacar Diop, Dame Diongue, and Ousmane Thiare, “Managing target coverage lifetime in wireless sensor networks with greedy set cover,” In Multimedia, Computer Graphics and Broadcasting (MulGraB), 2014 6th International Conference on, pages 17–20. IEEE, 2014.
2.      Jun Li, Baihai Zhang, Lingguo Cui, and Senchun Chai, “ An extended virtual forcebased approach to distributed self-deployment in mobile sensor networks,” International Journal of Distributed Sensor Networks, 2012, 2012.

3.      Ines Khoufi, Pascale Minet, Anis Laouiti, and Saoucene Mahfoudh, “Survey of deployment algorithms in wireless sensor networks: coverage and connectivity issues and challenges. International Journal of Autonomous and Adaptive Communications Systems (IJAACS), page 24, 2014.

4.      Milan Erdelj, Tahiry Razafindralambo, and David Simplot-Ryl, “Covering points of interest with mobile sensors,” Parallel and Distributed Systems, IEEE Transactions on, 24(1):32–43, 2013.

5.      K. Shahzad, K. Fazlullah, and S. Afzal, “Delay and throughput performance improvement in wireless sensor and actor networks,” in 5th IEEE symposium on information technology:towards new smart world, pages 1-5,2015.

6.      Milan Erdelj, Valeria Loscri, Enrico Natalizio, and Tahiry Razafindralambo, “Multiple point of interest discovery and coverage with mobile wireless sensors,”Ad Hoc Networks, 11(8):2288–2300, 2013.

7.      Jiming Chen, Shijian Li, and Youxian Sun, “Novel deployment schemes for mobile sensor networks,” Sensors, 7(11):2907–2919, 2007.

8.      Saoucene Mahfoudh, Ines Khoufi, Pascale Minet, and Anis Laouiti, “ Relocation of mobile wireless sensors in the presence of obstacles,” In Telecommunications (ICT), 2013 20th International Conference on, pages 1–5. IEEE, 2013.

9.      Guang Tan, Stephen A Jarvis, and A-M Kermarrec, “Connectivity-guaranteed and obstacle-adaptive deployment schemes for mobile sensor networks,” Mobile Computing, IEEE Transactions on, 8(6):836–848, 2009.

10.   Deying Li and Hai Liu, “Sensor coverage in wireless sensor networks,” International Journal of Sensor Networks, 2, 2009.

 

145-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

I. Lakshmi

Paper Title:

A Study on Cyber Security and the Internet of Things with Intruders and Attacks

Abstract: Internets of Things (IoT) devices are rapidly becoming ubiquitous while IoT services are becoming pervasive. Their success has not gone unnoticed and the number of threats and attacks against IoT devices and services are on the increase as well. Cyber-attacks are not new to IoT, but as IoT will be deeply interwoven in our lives and societies, it is becoming necessary to step up and take cyber defence seriously. Hence, there is a real need to secure IoT, which has consequently resulted in a need to comprehensively understand the threats and attacks on IoT infrastructure. This paper is an attempt to classify threat types, besides analyze and characterize intruders and attacks facing IoT devices and services.

Keywords:
Internet of Things, Cyber-attack, Security threats.


References:

1.      L. Atzori, A. Iera, and G. Morabito, “The internet of things: A survey,” Computer networks, vol. 54, no. 15, pp. 2787–2805, 2010.
2.      S. Andreev and Y. Koucheryavy, “Internet of things, smart spaces, and next generation networking,” Springer, LNCS, vol. 7469, p. 464, 2012.

3.      J. S. Kumar and D. R. Patel, “Asurvey on internet of things: Security and privacy issues,” International Journal of Computer Applications, vol. 90, no. 11, pp. 20–26, March 2014, published by Foundation of Computer Science, New York, USA.

4.      A. Stango, N. R. Prasad, and D. M. Kyriazanos, “A threat analysis methodology for security evaluation and enhancement planning,” in Emerging Security Information, Systems and Technologies, 2009. SECURWARE’09. Third International Conference on. IEEE, 2009, pp. 262–267.

5.      D. Jiang and C. ShiWei, “A study of information security for m2m of iot,” in Advanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on, vol. 3. IEEE, 2010, pp. V3–576.

6.      B. Schneier, Secrets and lies: digital security in a networked world. John Wiley & Sons, 2011.

7.      J. M. Kizza, Guide to Computer Network Security. Springer, 2013.

8.      M. Taneja, “An analytics framework to detect compromised iot devices using mobility behavior,” in ICT Convergence (ICTC), 2013 International Conference on. IEEE, 2013, pp. 38–43.

9.      G. M. Koien and V. A. Oleshchuk, Aspects of Personal Privacy in Communications-Problems, Technology and Solutions. River Publishers, 2013.

10.   N. R. Prasad, “Threat model framework and methodology for personal networks (pns),” in Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on. IEEE, 2007, pp. 1–6.

11.   O. Vermesan, P. Friess, P. Guillemin, S. Gusmeroli, H. Sundmaeker, A. Bassi, I. S. Jubert, M. Mazura, M. Harrison, M. Eisenhauer et al. “Internet of things strategic research roadmap,” Internet of Things-Global Technological and Societal Trends, pp. 9–52, 2011.

12.   S. De, P. Barnaghi, M. Bauer, and S. Meissner, “Service modelling for the internet of things,” in Computer Science and Information Systems (FedCSIS), 2011 Federated Conference on. IEEE, 2011, pp. 949–955.

13.   G. Xiao, J. Guo, L. Xu, and Z. Gong, “User interoperability with heterogeneous iot devices through transformation,” 2014.

14.   J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of things (iot): A vision, architectural elements, and future directions,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1645–1660, 2013.

15.   M. Zorzi, A. Gluhak, S. Lange, and A. Bassi, “From today’s intranet of things to a future internet of things: a wireless-and mobility-related view,” Wireless Communications, IEEE, vol. 17, no. 6, pp. 44–51, 2010.

16.   C. Hongsong, F. Zhongchuan, and Z. Dongyan, “Security and trust research in m2m system,” in Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on. IEEE, 2011, pp. 286–290.

17.   I. Cha, Y. Shah, A. U. Schmidt, A. Leicher, and M. V. Meyerstein, “Trust in m2m communication,” Vehicular Technology Magazine, IEEE, vol. 4, no. 3, pp. 69–75, 2009.

18.   J. Lopez, R. Roman, and C. Alcaraz, “Analysis of security threats, requirements, technologies and standards in wireless sensor networks,” 84 M. Abomhara and G. M. Køien in Foundations of Security Analysis and Design V. Springer, 2009, pp. 289–338.

19.   R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, 2013.

20.   Y. Cheng, M. Naslund, G. Selander, and E. Fogelstrom, “Privacy in machine-to-machine communications a state-of-the-art survey,” in Communication Systems (ICCS), 2012 IEEE International Conference on. IEEE, 2012, pp. 75–79.

21.   M. Rudner, “Cyber-threats to critical national infrastructure: An intelligence challenge,” International Journal of Intelligence and Counter Intelligence, vol. 26, no. 3, pp. 453–481, 2013.

22.   R. Kozik and M. Choras, “Current cyber security threats and challenges in critical infrastructures protection,” in Informatics and Applications (ICIA), 2013 Second International Conference on. IEEE, 2013, pp. 93–97.

23.   P. N. Mahalle, N. R. Prasad, and R. Prasad, “Object classification based context management for identity management in internet of things,” International Journal of Computer Applications, vol. 63, no. 12, pp. 1–6, 2013.

24.   A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, and T. Razafindralambo, “A survey on facilities for experimental internet of things research,” Communications Magazine, IEEE, vol. 49, no. 11, pp. 58–67, 2011.

25.   Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot, and L. Gurgen, “Sharing user iot devices in the cloud,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on. IEEE, 2014, pp. 373–374.

26.   G. M. Køien, “Reflections on trust in devices: an informal survey of human trust in an internet-of-things context,” Wireless Personal Communications, vol. 61, no. 3, pp. 495–510, 2011.

27.   D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, “Internet of things: Vision, applications and research challenges,” Ad Hoc Networks, vol. 10, no. 7, pp. 1497–1516, 2012.

28.   M. Thoma, S. Meyer, K. Sperner, S. Meissner, and T. Braun, “On iot services: Survey, classification and enterprise integration,” in Green Computing and Communications (GreenCom), 2012 IEEE International Conference on. IEEE, 2012, pp. 257–260.

29.   M. Abomhara and G. Koien, “Security and privacy in the internet of things: Current status and open issues,” in PRISMS 2014 The 2nd International Conference on Privacy and Security in Mobile Systems (PRISMS 2014), Aalborg, Denmark, May 2014.

30.   D.Watts, “Security and vulnerability in electric power systems,” in 35thNorth American power symposium, vol. 2, 2003, pp. 559–566.

31.   D. L. Pipkin, Information security. Prentice Hall PTR, 2000.

32.   E. Bertino, L. D. Martino, F. Paci, and A. C. Squicciarini, “Web services threats, vulnerabilities, and countermeasures,” in Securityfor Web Services and Service
Oriented Architectures. Springer, 2010, pp. 25–44.

33.   D. G. Padmavathi, M. Shanmugapriya et al., “A survey of attacks, security mechanisms and challenges in wireless sensor networks,” arXivpreprint arXiv:0909.0576, 2009.

34.   H. G. Brauch, “Concepts of security threats, challenges, vulnerabilities and risks,” in Coping with Global Environmental Change, Disasters and Security. Springer, 2011, pp. 61–106.

35.   K. Dahbur, B. Mohammad, and A. B. Tarakji, “A survey of risks, threats and vulnerabilities in cloud computing,” in Proceedings of the 2011 International conference on intelligent semantic Web-services and applications. ACM, 2011, p. 12.

36.   R. K. Rainer and C. G. Cegielski, Introduction to information systems: Enabling and transforming business. JohnWiley & Sons, 2010.

37.   A. J. Duncan, S. Creese, and M. Goldsmith, “Insider attacks in cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on. IEEE, 2012, pp. 857–862.

38.   P. Baybutt, “Assessing risks from threats to process plants: Threat and vulnerability analysis,” Process Safety Progress, vol. 21, no. 4, pp. 269–275, 2002.

39.   C. Tankard, “Advanced persistent threats and how to monitor and deter them,” Network security, vol. 2011, no. 8, pp. 16–19, 2011.

40.   F. Li, A. Lai, and D. Ddl, “Evidence of advanced persistent threat: Acase study of malware for political espionage,” in Malicious and Unwanted Software (MALWARE), 2011 6th International Conference on. IEEE,2011, pp. 102–109.

41.   S. Ansari, S. Rajeev, and H. Chandrashekar, “Packet sniffing: a brief introduction,” Potentials, IEEE, vol. 21, no. 5, pp. 17–19, 2002.

42.   M. De Vivo, E. Carrasco, G. Isern, and G. O. de Vivo, “A review of port scanning techniques,” ACM SIGCOMM Computer Communication Review, vol. 29, no. 2, pp. 41–48, 1999.

43.   I. Naumann and G. Hogben, “Privacy features of european eid card specifications,” Network Security, vol. 2008, no. 8, pp. 9–13, 2008.

44.   C.Wilson, “Botnets, cybercrime, and cyberterrorism:Vulnerabilities and policy issues for congress.” DTIC Document, 2008.

45.   A. Daneels and W. Salter, “What is scada,” in International Conference on Accelerator and Large Experimental Physics Control Systems, 1999, pp. 339–343.

46.   A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, “Scada security in the light of cyber-warfare,” Computers & Security, vol. 31, no. 4, pp. 418–436, 2012.

47.   V. M. Igure, S. A. Laughter, and R. D.Williams, “Security issues in scada networks,” Computers & Security, vol. 25, no. 7, pp. 498–506, 2006.

48.   M. Kelleye, “Business Insider. The Stuxnet attack on Irans Nuclear Plant was Far more Dangerous Than Previously Thought,” http://www.businessinsider.com/stuxnet-was-far-more-dangerous-thanprevious- thought-2013-11/,2013, [Online; accessed 03-Sep-2014].

49.   B. Jung, I. Han, and S. Lee, “Security threats to internet: a Korean multi-industry investigation,” Information & Management, vol. 38, no. 8, pp. 487–498, 2001.

50.   C. P. Mayer, “Security and privacy challenges in the internet of things,” Electronic Communications of the EASST, vol. 17, 2009.

51.   A. R. Beresford, “Location privacy in ubiquitous computing,” Computer Laboratory, University of Cambridge, Tech. Rep, vol. 612,2005.

52.   S. Pramanik, “Threat motivation,” in Emerging Technologies for a Smarter World (CEWIT), 2013 10th International Conference and Expo on. IEEE, 2013, pp. 1–5.

53.   D. Dolev and A. C. Yao, “On the security of public key protocols,” Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198–208,1983.

54.   I. Cervesato, “The dolev-yao intruder is the most powerful attacker,” in 16th Annual Symposium on Logic in Computer ScienceLICS, vol. 1. Citeseer, 2001.

55.   J. Sheldon, “State of the art: Attackers and targets in cyberspace,” Journal of Military and Strategic Studies, vol. 14, no. 2, 2012.

56.   E. M. Archer, “Crossing the rubicon: Understanding cyber terrorism in the european context,” The European Legacy, no. ahead-of-print, pp. 1–16, 2014.

57.   A. K. Al-Rawi, “Cyber warriors in the middle east: The case of the Syrian electronic army,” Public Relations Review, 2014.

58.   D. Ball, “Chinas cyber warfare capabilities,” Security Challenges, vol. 7, no. 2, pp. 81–103, 2011.

 

150-157

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Dipan Deb, Sajag Poudel

Paper Title:

Investigation of Heat Transfer Enhancement in Laminar Flow through Circular Tube by using Combined Wire Coil and Wavy Strip with Central Clearance

Abstract: The experimental friction factor and Nusselt number data for a laminar flow in a circular pipe having wire coil and wavy strip insertion are presented. Thermal boundary layer is the primary hindrance to the heat transfer. That is why to destroy it or at least to disturb it the insertions are used. The thermohydraulic phenomenon has been analyzed. The objective of this work is to find out the combined effect of wire coil and wavy strip on the heat transfer and whether it can enhance it. Nusselt number and friction factor are measured for different Prandtl number and Reynolds number. The findings of this work are useful in automobile and air-conditioning industries to reduce the size of the heat exchanger.

Keywords:
 friction factor, heat transfer, Nusselt number, wavy strip, wire coil


References:

1.      Zimparov ,V. ,2001 , Enhancement of heat transfer by a combination of three-start spirally corrugated tubes with a twisted tape, International Journal of Heat and Mass Transfer,Vol.44,pp.551-574
2.      J.P. Solano, A. García, P.G. Vicente, A. Viedma, Flow field and heat transfer investigation in tubes of heat exchangers with motionless scrapers, Applied Thermal Engineering 31 (2011) 2013e2024.

3.      Sarma,P.K, Subramanyam, T., Kishore,P.S., Dharma Rao,V., Kakac, S.,2002, Laminar convective heat transfer with twisted tape inserts in a tube, International Journal of Thermal Sciences,vol.42,pp. 821–828

4.      S. Rainieri , G. Pagliarini, Convective heat transfer to temperature dependent property fluids in the entry region of corrugated tubes, International Journal of Heat and Mass Transfer, 45 (2002) 4525–4536

5.      Patil, A.G, 2000 “Laminar Flow Heat Transfer and Pressure Drop Characteristics of Power-Law Fluids Inside Tubes With Varying Width Twisted Tape Inserts”,Journal of Heat Transfer by ASME, Vol 122 pp.143-149.

6.      Suriyan Laohalertdecha , Somchai Wongwises, Condensation heat transfer and flow characteristics of R-134a flowing through corrugated tubes, International Journal of Heat and Mass Transfer, 54 (2011) 2673–2682

7.      M.A. Ahmed, N.H. Shuaib , M.Z. Yusoff, A.H. Al-Falahi, Numerical investigations of flow and heat transfer enhancement in a corrugated channel using nanofluid, International Communications in Heat and Mass Transfer 38 (2011) 1368–1375

8.      Agarwal, S.K., Raja Rao, M., 1996, Heat transfer augmentation for the flow of a viscous liquid in circular tubes using twisted tape inserts, International Journal of Heat and Mass Transfer, Volume 39,No. 17, pp. 3547-3557.

 

158-164

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Mohit Kumar Mishra, Arun Kumar Shukla

Paper Title:

A Survey Paper on Gender Identification System using Speech Signal

Abstract:  Gender is a critical statistic characteristic of individuals. This paper provides a survey of automatic human gender identification using speech signal characteristics and classifiers. A review of approaches exploiting information from human speech presented. Here, highlights of selection of speech features, their processing and different classifiers used for this purpose are discussed. Based on the results discussed in the papers it can be stated as, accuracy of automatic gender identification system with any classifiers is better if speech dataset used for training and testing is taken/ recorded in the same environments. Pitch is the basic feature of speech which distinguishes between adult man and woman. Other features like MFCC, LPC, RASTA-PLP also used for automatic gender identification. Neural Network, Support Vector Machine (SVM), Random Forest etc. are used for automatic gender identification through speech signal. Till now, many challenges are still available here to identify gender with acceptable accuracy in real life environmental speech where noise is acoustically added with human speech.

Keywords:
  Gender identification, MFCC, SVM.


References:

1.      M. Li, K. Han, and S. Narayanan, “Automatic speaker age and gender recognition using acoustic and prosodic level information fusion,” Computer speech and language, Vol. 27, No. 1, pp. 151-167, Jan. 2013
2.      H Meinedo and I Trancoso, “Age and Gender Classification Using Fusion of Acoustic and Prosodic Features”, Proc. INTERSPEECH, pp. 2818-2821, 2010

3.      R. Nisimura, A. Lee, H. Saruwatari, and K. Shikano, “Public speech-oriented guidance system with adult and child discrimination capability,” Proc. ICASSP2004, vol.
1, pp. 433-436, 2004.

4.      H. Kim, K. Bae, H. Yoon, “Age and gender classification for a home-robot service” Proc. 16th IEEE International Symposium on Robot and Human Interactive Communication, pp. 122–126, 2007.

5.      W. Li, D. J. Kim, C. H. Kim, and K. S. Hong, “Voice-Based Recognition System for Non-Semantics Information by Language and Gender” Electronic Commerce and Security (ISECS), 2010.

6.      P. Nguyen, D. Tran, X. Huang, and D. Sharma, “Automatic classification of speaker characteristics” Communications and Electronics (ICCE), 2010.

7.      G. Dobry, R. M. Hecht, M. Avigal, and Y. Zigel, “Supervector dimension reduction for efficient speaker age estimation based on the acoustic speech signal.” Audio,
Speech, and Language Processing, 2011

8.      M. H. Bahari, and H. V. Hamme, “Speaker age estimation and gender detection based on supervised non-negative matrix factorization” Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2011.

9.      M. H. Sedaaghi, “A comparative study of gender and age classification in speech signals” Iranian Journal of Electrical & Electronic Engineering, 2009.

10.   T. Bocklet, G. Stemmer, V. Zeissler, and E. Nöth, “Age and gender recognition based on multiple systems-early vs. late fusion” INTERSPEECH, 2010.

11.   M. Feld, F. Burkhardt, and C. A. Müller, “Automatic speaker age and gender recognition in the car for tailoring dialog and mobile services” INTERSPEECH, 2010.

12.   F. Metze, J. Ajmera, R. Englert, and U. Bub, “Comparison of four approaches to age and gender recognition for telephone applications” Acoustics, Speech and Signal Processing, 2007.

13.   C. A. Müller, F. Wittig, and J. Baus, “Exploiting speech for recognizing elderly users to respond to their special needs” INTERSPEECH, 2003.

14.   M. W. Lee, and K. C. Kwak. “Performance Comparison of Gender and Age Group Recognition for Human-Robot Interaction” International Journal of Advanced Computer Science & Applications, 2012.

15.   F. Wittig, and C. Müller, “Implicit Feedback for User-Adaptive Systems by Analyzing the Users’ Speech.”, 2003.

16.   T. Bocklet, A. Maier, and E. Nöth, “Age determination of children in preschool and primary school age with GMM-based supervectors and support vector machines/regression” Text, Speech and Dialogue, 2008.

17.   M. H. Bahari, and H. V. Hamme, “Speaker age estimation using Hidden Markov Model weight supervectors” Information Science, Signal Processing and their Applications (ISSPA), 2012.

18.   S. Khanum and M. Sora, “Speech based Gender Identification using Feed Forward Neural Networks”, International Journal of Computer Applications (0975 – 8887), 201.

19.   S. Sharma, A. Shukla and P. Mishra, “Speaker and Gender Identification on Indian Languages using Multilingual Speech ”, IJISET – International Journal of Innovative Science, Engineering & Technology, Vol. 1 Issue 4, June 2014.

20.   G.S. Archana, M. Malleswari and N. Islam, “Gender Identification and Performance Analysis of Speech Signals”, Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015).

21.   Md. S. Ali1, Md. S. Islam and Md. A. Hossain, “GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL”, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012.

22.   L. Feng, “Speaker Recognition, Informatics and Mathematical Modelling”, Technical University of Denmark, 2004.

 

165-167

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Tarun George Maddila, Swetha Santhossi.C, Abhishek Muthukrishnan

Paper Title:

Interfacing of Ammonia Gas Sensors using IoT Technology

Abstract: There is high-risk factors involved in industries which use hazardous gases in large quantities for their various processes. People may not identify or monitor the leakage of these gases at a regular basis before it goes out of hand. There is a need for sensors to continuously monitor the leakages and alert the users on the possible hazard. This project gives the solution to reduce the risk factors in isolated areas having large gas installations by detecting and displaying the leakages on a continuous basis. Leakage of gas can occur at multiple points in the same installation. Hence, multiple sensors are interfaced to detect the leakage and transmit the signals to the base station located far away. Using microprocessors, multiple sensor values are received and processed. The processed data is encoded and transmitted to the base (using wired or wireless protocols) where another microprocessor decodes it and shows the respective sensor status. The system also gives an audio and visual warning when leakages are detected and the as the time taken to detect is very low due to high speed processing, the leakage situations are brought under control with minimum or no damage. This project gives an economical and efficient method to reduce leakage risk by using   latest IoT technologies and monitoring anywhere in the web.

Keywords:
Gas leakage, microcontroller, sensors, wireless. IoT (Internet of Things),


References:

1.   www.health.ny.gov/environmental/emergency/chemical_terrorism/ammonia_tech.htm
2.   http://playground.arduino.cc/Main/MQGasSensors

3.   http://www.maskau.dk/WP/wp-content/uploads/2014/08/MQ137.pdf

4.   http://www.atmel.com/dyn/resources/prod_documents/doc2549.pdf\ (data sheet AT Mega)

 

168-171

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

Volume-2 Issue-1, September 2016

Volume-2 Issue-1, September 2016, ISSN: 2394-367X (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

Module Allocation for Maximizing Reliability of Distributed Computing Systems using Dynamic Greedy Heuristic
Surinder Kumar


Microscopic Features of Dominant Bladderworts of Northeast India
Kshetrimayum Raseshowri Devi1, Nagulan Venugopal2, Lal Bihari Singha3


Status of Biogas Technology in Swaziland: Challenges and Opportunities
Shiri T1, Makota T2


Characterization Physicochemical of Emulsion Solid Cooking Oil from Coconut Oil
Jusman1, Bambang Setiaji2, Triyono3, Akhmad Syoufian4


 

Volume-1 Issue-12, February 2016

Volume-1 Issue-12, February 2016, ISSN: 2394-367X (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication

A Goal Programming Model for Facility Location Planning
Albina Basholli1, Vasillaq Kedhi2, Alisa Cangonji3


Fuzzy Logic based Model to Calculate the Economic Level of any Country
S. Kumar1, Rashmi Singh2, Manish K. Srivastava3, Ashish K. Srivastava4


Analytical Characteristics Study of Glass Electrode based pH Measurement System in Respect of mV Output and Internal Resistance
M.L. Dongare1, M. N. Awatade2, A. D. Shaligram3, A.S. Burungale4