|
Download Abstract Book
S. No
|
Volume-6 Issue-3, February 2017, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
|
Page No.
|
1.
|
Authors:
|
Lerdlekha Sriratana, Sawatdee Poochong, Kridsda Bisalyaputra
|
Paper Title:
|
A Study on Thailand Solar Energy Business Opportunity in Very Small Power Producer (VSPP) Sector Contributed by Feed-in Tariff
|
Abstract: In recent Thailand energy business, solar power plants have high potential due to a clean and renewable energy of solar power. However, the information about solar energy business opportunity is also essential for private sector investment. Since 2013, Feed-in Tariff (FiT) has been announced to replace the Adder measure that also results in the difference of electricity cost structures. This study presents the review of solar energy business opportunity contributed by FiT focusing on Very Small Power Producer (VSPP) sector. The analysis of Adder and FiT measures in terms of business promotion was performed. Also, an 8 MW VSPP solar farm project was selected as a case study for investment analysis contributed by FiT. From analysis, it can be noted that the benefit from electricity purchase rate contributed by FiT would be lower than that of the Adder due to the high costs of PV system recently which is also included in the initial investment. However, if the technology and other related costs of PV system decrease, the solar power projects subsidized by the FiT would be more worthwhile for investment in the future.
Keywords: Solar Energy, Policy, Subsidy, Measure, Investment
References:
1. Department of Alternative Energy Development and Efficiency (DEDE), The Solar Map. Bangkok: Ministry of Energy, 2002.
2. Open Energy Information. (2016). Solar Resources by Class per Country [Online]. Available http://en.openei.org/datasets/node/498
3. Energy Policy and Planning Office (EPPO), Power Development Plan 2015–2036 (PDP2015). Bangkok: Ministry of Energy, 2015.
4. M. Chimres and S. Wongwises, “Critical review of the current status of solar energy in Thailand,” Renewable and Sustainable Energy reviews, vol. 58, 2016, pp. 198-207.
5. Energy Policy and Planning Office (EPPO), Policy and Plan. Bangkok: Ministry of Energy, 2016.
6. Energy Regulatory Commission (ERC). (2016). SPP/VSPP database [Online]. Available http://www.erc.or.th/ERCSPP/Default.aspx
|
1-4

|
2.
|
Authors:
|
M. Shoukath Ali, R. P. Singh
|
Paper Title:
|
A Study on Game Theory Approaches for Wireless Sensor Networks
|
Abstract: Game Theory approaches and their application in improving the performance of Wireless sensor networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality and etc, however Game Theory is a field, which can efficiently used to analyze the WSNs. Game theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of Complex interactions among rational entities can be predicted by a set of analytical tools, however the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing and etc.
Keywords: Wireless sensor network; Game Theory; Cooperative game theory; Non-cooperative game theory; Wireless communications.
References:
1. Renita Machado, Sirin Tekinay, “A surve of game theoretic approaches in wireless sensor networks”-computer networks 52 (2008), pp 3047-3061.
2. Erik Pertovt, Tomax javornik, Michael Mohorcic, “Game theory application for performance optimization in wireless networks”-pp287-292, 2011.
3. Gengzhong zheng,” Study on the power control of wireless sensor networks based on Game theory”-Journal of information and computational science 7:4(2010) 957-964.
4. Pedro O.S.Vaz De Melo, Cesar Fernandes, Raquel A.F.Mini, Aotonio. A.F.Loureiro and Virigilio.A.F.Almeda,”Game theory in wireless sensor networks”.
5. R.J.Aumann and M.Maschler,”Game theoretic analysis of a bankruptcy problem from the Talmud” J.Econ. Theory, vol 36, pp 195-213, 1985.
6. Ali, M. Shoukath. “Priority Based Packet Scheduling Scheme in Wireless Sensor Networks.”, IJARF, Volume 3, Issue 8, August 2016.
7. P.Walker, “An outline of his history of game theory”, Available at: http://William – king.www.drekel.edu/top/class /histf.html April 1995.
8. A.B.Mackenzie and Stephen B.Wicker, “Game theory and the design of self-configuring, Adaptive wireless networks”-IEEE communication, Nov 2001.
9. S.Metha and K.S.Kwak, “Application of game theory to wireless sensor networks”- Inha university, Korea.
10. Garth.V.Crosby, Niki Pissinou, “Evolution of cooperation in multi-class wireless sensor networks”-32nd IEEE conferences on local computer networks.
11. J.F.Nash, “Equilibrium points in n-person game” Proc.Natl. Acad.Sci. U.S.A. vol.36, no.1, pp.48-49, January 1950.
12. J.John F.Nash, “The bargaining problem”, Econometrica, vol.18, no.2, pp.155-162, April 1950.
|
5-7

|
3.
|
Authors:
|
Ahammad Vazim K. A., Jesin T. A., Anil Raj B., Midhun A. R., Sreekutten K.
|
Paper Title:
|
Design and Fabrication of a Novel Low Cost Food Waste Composting System with Accelerating Process Technology
|
Abstract: Waste disposal is one of the biggest problems faced by the most countries. Unless and otherwise a proper methodology is met to treat the domestic and industrial effluents the public health and environment will face serious problems. Our project finds its application in the safe treatment of food waste aerobically with the help of mechanical agitation to reduce the risk of contamination in our households. Composting can be defined as the biological decomposition of organic matter under controlled, aerobic conditions into a stable product that may be used to improve soil quality or as a potting medium. Composting also disinfects organic wastes so that they may be beneficially used in a safe matter. The purpose of the project was to design and fabricate a low cost food waste composting system which ultimately accelerate the composting process. Experimentally it was found that the composting of normal vegetable residues take about 60 days with the help of a bacterial composter, like any biochemical reaction time duration required for the completion of composting was contributed by many factors which includes particle size, water content, temperature, air circulation. The device fabricated was fully functional in controlling the major factors among the above stated and can accelerate the overall process by 50%.
Keywords: food waste, composting system, accelerating process technology
References:
1. Ajinkya S Hande and Vivek Padole, International Journal of Innovative Research in Science and Technology, Volume 2, Issue 03, 2015.
2. Tom L Richard, Tom L Richard, Biomass and Bioenergy Vol. 3, Nos 34, pp. 163-I 80. Pergamon Press Ltd, Great Britain Received 22 May 1992; accepted 7 July 1992.
3. Delia Teresa Sponza and Osman Nuri Agdag, Microbial Technology 36(2005)25-3-Journal of Environmental Engg., 2004.
4. M. de Bertoldi, G. Vallini and A. Pera, Notes, International Solid Waste Management Association.
|
8-11

|
4.
|
Authors:
|
Amiya Ranjan Malik, Bibhuti Bhusan Pani, Sushant Kumar Badjena
|
Paper Title:
|
Powder Metallurgy Processed Ferrous Composites: A Review
|
Abstract: This paper reviews processing and synthesis of particulate reinforced ferrous based Metal Matrix Composites (MMC) and Nanocomposites through Powder Metallurgy (P/M) method. By this route it is possible to manufacture MMCs with wide range of compositions and density. As a result there is improvement of wear resistance, abrasion resistance, corrosion resistance, mechanical properties and high temperature friction properties. The reinforcing particles commonly adopted were carbides, oxides, borides, nitrides, carbonitrides, complex carbides, intermetallics, synthetic materials etc. Apart from this it also reviews how several factors affect properties of MMCs.
Keywords: Ferrous Matrix Composites, Nanocomposites, Particle reinforcement, Powder Metallurgy.
References:
1. O. N. Dogan, J. A. Hawk, J. H. Tylczak, R. D. Wilson, R. D. Govier, Wear of titanium carbide reinforced metal matrix composites. Wear, Volumes 225–229, Part 2, April 1999, Pages 758-769.
2. E. Pagounis, E. Haimi, J. Pietikainen, M. Talvitie, S. Vahvaselka, V. K. Lindroos, Effect of Thermal expansion coefficients on the martensitic transformation in a steel matrix composite. Scripta Materialia, vol. 34, No.3, pp.407-413, 1996.
3. E. Pagounis, M. Talvitie, V. K. Lindroos, Influence of metal ceramic interface on the microstructure and mechanical properties of HIPed iron-based composites. Composites Science and Technology 56 (1996) 1329-1337.
4. T. Ram Prabhu, V. K. Varma, Srikanth Vedantam, Effect of reinforcement type ,size and volume fraction on the tribological behaviour of Fe matrix composites at high sliding speed condition. Wear 309 (2014) 247-255.
5. T. Ram Prabhu, V. K. Varma, Srikanth Vedantam, Effect of SiC volume fraction and size on dry sliding wear of Fe/Sic/Graphite hybrid composites for high sliding wear application. Wear 309 (2004) 1-10.
6. Sainatee Chakthin, Monnapas Morakotjinda, Thanyaporn yodkaew, Nattaya Torsangtum, Rungtip Krataithong, Pisarn Siriphol, Ornmanee Coovattanachai, Bhanu Vetayanugul, Nandh Thavarungkul, Nuchthana Poolthong, Ruangdaj Tongsri, Influence of carbides on properties of sintered Fe-based composites. Journals of Metals, Materials and Minerals, Vol.18 No.2 pp.67-70, 2008.
7. Danqing Yi, Pengchao Yu, Bin Hu, Huiqun Liu, Bin Wang, Yong Jiang, Preparation of nickel-coated titanium carbide particulates and their use in the production of reinforced iron matrix composites. Materials and Design Volume 52, December 2013, page 572-579.
8. XIAO Zhi-Yu, FANG Liang, ZHANG Wen, SHAO Ming, LI Yuan-Yuan, Fabrication of NbCp-reinforced iron matrix composites by PM techniques and its warm compaction. Journal of Iron and Steel Research, International, Volume 14, Issue 5, Supplement 1, September 2007, Pages 66-69.
9. B. Sustarsic, M. Jenko, M. Godec, L. Kosec, Microstructural investigation of NbC-doped vacuum-sintered tool-steel-based-composites. Vacuum, Volume 71, Issues 1–2, 9 May 2003, Pages 77-82.
10. E. Gordo, F. Velasco, N. Anton, J. M. Torralba, Wear mechanism in high speed steel reinforced with (NbC)p and (TaC)p MMCs. Wear volume 239, issue 2, April 2000, page 251-259.
11. H. Fallahdoost, H. Khorsand, R. Eslami-Farsani, E. Ganjeh, On the tribological behaviour of nanoalumina reinforced low alloy sintered steel. Materials and Design 57 (2014) 60-66.
12. Pallav Gupta, Devendra Kumar, M. A. Quraishi, Om Parkash, Corrosion behaviour of Al2O3 reinforced Fe metal matrix nanocomposites produced by powder metallurgy technique. Advanced Science, engineering and medicine, volume 5, Number 4, April 2013, page.366-370(5).
13. C. Parswajinan, B. Vijaya Ramnath, C. Elanchezhian, S. V. Pragadeesh, P. R. Ramkishore, V. Sabarish, Investigation on Mechanical Properties of Nano Ferrous Composite. Procedia engineering 97 (2014) 513-521.
14. T. J. Goodwin, S. H. Yoo, P. Matteazzi, J. R. Groza, Cementite Iron Nanocomposite. Nanostructured materials volume 8, issue 5, August 1997 page 559-566.
15. Eugene E. Feldshtein, Larisa N. Dyachkova, On the properties and tribological behaviour of P/M composites reinforced with ultrafine particulates. Composites part: B volume 58, march 2014, page 16-24.
16. Ping Han, Fu-ren Xiao, Wen-jun Zou, Bo Liao, Effect of different oxide addition on the thermal expansion coefficients and residual stress of Fe-based diamond composites. Ceramic International 40 (2014) 5007-5013.
17. Katie Jo Sunday, Kristopher K. Darling, Francis G. Hanejko, Babak Anasori, Yan-Chun Li, Mitra L. Taheri, Al2O3 “self coated” iron powder composite via mechanical milling. Journals of Alloys and Compounds 653 (2015) 61-68.
18. F. Velasco, R. Isabel, N. Anton, M. A. Martinez, J. M. Torralba, TiCN-high speed steel composites: sinterability and properties. Composite part A: Applied science and manufacturing volume 33, issue 6, June 2002, 819-827.
19. B. Gomez, A. Jimenez-Suarez, E. Gordo, Oxidation and tribological behaviour of an Fe-based MMC reinforced with TiCN particles. Int. Journal of Refractory metals & hard materials volume 27, issue 2, march 2009, 360-366.
20. G. Herranz, A. Romero, V. De Castro, G. P. Rodriguez, Processing of AISI M2 high speed steel reinforced with vanadium carbide by solar sintering. Material and Design volume 54, February 2014, 934-946.
21. Guangming Zhang, Keqin Feng, Ying Li, Huifang Yue, Effect on sintering process on preparing iron-based friction material directly from vanadium bearing titanomagnetite concentrates. Materials and Design 86 (2015) 616-620.
22. Guangming Zhang, Keqin Feng, Synthesis of iron-based friction material by in situ reactive sintering from Vanadium bearing titanomagnetite. Materials and manufacturing processes volume-31, issue-2, 2015, page 198-205.
23. D. Lou, J. Hellman, D. Luhulima, J. Liimatainen, V. K. Lindroos, Interactions between tungsten carbide (WC) particulates and metal matrix in WC-reinforced composites. Material science and engineering: A volume 340, issue 1-2, January 2003, page 155-162.
24. S. C. Tjong, K. C. Lau, Abrasion resistance of stainless-steel composites reinforced with hard TiB2 particles. Composites science and technology volume 60, issue 8, June 2000, page 1141-1146.
25. J. Abenojar, F. Velasco, J. M. Torralba, J. A. Bas, J. A. Calero, R. Marce, Reinforcing 316L stainless steel with intermetallic and carbide particles. Material science and engineering: A, volume 335, issue 1-2, 25 September 2002, page 1-5.
26. J. Abenojar, F. Velasco, A. Bautista, M. Campos, J. A. Bas, J. M. Torralba, Atmosphere influences in sintering process of stainless steels matrix composites reinforced with hard particles. Composites science and technology, volume 63, issue 1, January 2003, page 69-79.
27. Wang Jing, Wang Yisan, Ding Yichao, Production of (Ti,V)C reinforced Fe matrix composites. Material science and engineering: A volume 454-455, 25 April 2007, page 75-79.
28. Ileana Nicoleta Popescu, Constantin Ghita, Vasile Bratu, Guillermo Palacios Navarro, Tribological behaviour and statistical experimental design of sintered iron-copper based composites. Applied Surface Science 285P (2013) 72-85.
29. Hans Berns, Birgit Wewers, Development of an abrasion steel composite with in situ TiC particles. Wear 251(2001) 1386-1395.
30. P. Mohan Raj, N. Selvakumar, R. Narayanasamy, C. Kailasanathan, Experimental investigation on workability and strain hardening behaviour of Fe-C-Mn sintered composites with different percentage of carbon and manganese content. Materials and Design 49 (2013) 791-801.
31. N. Selvakumar, A. P. Mohan Raj, R. Narayanasamy, Experimental investigation on workability and strain hardening behaviour of Fe-C-0.5Mn sintered composites. Materials and Design 41 (2012) 349-357.
|
12-15

|
5.
|
Authors:
|
Ashok R Mundhada, Arun D Pofale
|
Paper Title:
|
Concrete’s Odyssey Through Heat: A Review
|
Abstract: Fire is a catastrophic event to which any building can fall victim during its lifetime. Not only does it pose a direct threat to the occupants through the release of harmful gases and devastating heat, but the elevated temperatures themselves also have seriously adverse effects on the structural integrity of entire building. Though undesired, fire is an exigency that cannot be avoided altogether. Therefore, impact of fire on concrete/ RCC deserves minute scrutiny. In this study, a review is carried out based on the experimental studies on the performance of concrete/RCC when exposed to FIRE/ higher temperatures. The compiled test data revealed distinct difference in mechanical properties of normal, high strength, self compacting & improvised concrete. Shape & size of specimens, concrete grade, admixtures, temperature level, applied load, exposure time to heat, rate of heating, rate of cooling, specimen type (stressed/unstressed member), type of cooling etc were the parameters that influenced the test results. Exposure time, exposure temperature & concrete cover were observed to be the principal factors. The outcome of the review helped in identifying the main problem areas, dubious claims & gaps/ lacunae in the research works.
Keywords: Concrete, Fire, RCC, Spalling
References:
1. P.D. Morley, R. Royles, “The influence of high temperature on the bond in reinforced concrete”, Fire Safety Journal, Volume 2, Issue 4, 1980, pp. 243-255
2. Chandra S & Baerntsson L, “Some effects of polymer addition on the fire resistance of concrete”, Cement and Concrete Research, Vol.10, 1980, pp. 367-375
3. H. Gustaferro, T. D. Lin, “Rational design of reinforced concrete members for fire resistance”, Fire Safety Journal, Volume 11, Issues 1-2, 1986, pp. 85-98
4. Gabriel A. Khoury, Patrick J. E. Sullivan, “Research at Imperial College on the effect of elevated temperatures on concrete”, Fire Safety Journal, Volume 13, Issue 1, 1988, pp. 69-72
5. Bruce Ellingwood and T. D. Lin, “Flexure and shear behavior of concrete beams during fires”, Journal of Structural Engineering, Vol. 117, No. 2, ©ASCE, ISSN 0733-9445/91, Paper No. 25549, 1991, pp. 440-458
6. Bruce R. Ellingwood, “Impact of fire exposure on heat transmission in concrete slabs”, Journal of Structural Engineering, ASCE, Vol 117, 1991
7. S. C. Chakrabari, K. N. Sharma, Abha Mittal, “Residual strength in concrete after exposure to elevated temperature”, The Indian Concrete Journal, 1994, pp. 713-717
8. Sunil Kumar & Rao Kameswara, “Fire Load in Residential Buildings”, Elsevier Building and Environment, Vol. 30, No. 2, 1995, pp. 299-305
9. M. M. El-Hawary, A. M. Ragab, K. M. Osman and M. M. Abd El-Razak, “Behavior investigation of concrete slabs subjected to high temperatures”, Elsevier, Computers & Structures, Vol. 61, No. 2, 1996, pp. 345-360
10. M. M. El-Hawary, A. M. Ragab, A. Abd El-Azim and S. Elibiari, “Effect of fire on shear behaviour of R.C. beams”, Elsevier, Computers & Structures, Vol. 65, No. 2,
1997, pp. 281-287
11. James A. Milke, “Analytical methods to evaluate fire resistance of structural members”, Journal of Structural Engineering, ASCE, 25 (10), 1999, pp. 1179-1187
12. Y. N. Chan, G. F. Peng, M. Anson, “Residual strength and pore structure of high-strength concrete and normal strength concrete after exposure to high temperatures”, Elsevier Cement and Concrete Composites 21, 1999, pp. 23-27
13. Long T. Phan & Nicholas J. Carino, “Fire performance of high strength concrete: Research Needs”, Proceedings of ASCE/SEI Structures Congress, Philadelphia, USA, 2000
14. V. K. R. Kodur, “Spalling in High Strength Concrete Exposed to Fire — Concerns, Causes, Critical Parameters and Cures”, Proceedings of ASCE/SEI Structures Congress, Philadelphia, USA, 2000, pp. 1-8
15. Jean-Marc Franssen and Venkatesh Kodur, “Residual Load Bearing Capacity of Structures Exposed to Fire”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings 109, 89 2001
16. Beth Tubbs, “ICC Performance Code for Buildings and Facilities — Structural Fire Protection Provisions”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings 109, 80, 2001
17. George Faller, “Fire Resistance Requirements for Buildings: A Performance Based Approach”, Structures-A Structural Engg Odyssey, ASCE Conference Proceedings, Section: 37, 2001, pp. 1-12
18. D. Bennetts, C. C. Goh, “Fire behaviour of steel members penetrating concrete walls”, Electronic Journal of Structural Engineering, 1, 2001, pp. 38-51
19. R. Sri Ravindrarajah, R. Lopez and H. Reslan, “Effect of Elevated Temperature on the Properties of High-Strength Concrete containing Cement Supplementary Materials”, 9th International Conference on Durability of Building Materials and Components, Rotterdam, Netherlands, Paper 081, 2002, 8 pages
20. Colin Bailey, “Holistic behaviour of concrete buildings in fire”, Proceedings of the Institution of Civil Engineers, Structures and Buildings 152, Issue 3, 2002, pp. 199-212
21. W. K. Chow, “Proposed Fire Safety Ranking System EB-FSRS for Existing High-Rise Nonresidential Buildings in Hong Kong”, Journal of Architectural Engineering, ASCE, vol. 8, No. 4, 2002
22. Dr. A Kumar, V Kumar, “Behaviour of RCC Beams after Exposure to Elevated Temperatures”, Journal of the Institution of Engineers (I), Vol. 84, 2003, pp. 165-170
23. K.D. Hertz, “Limits of spalling of fire-exposed concrete”, Elsevier Fire Safety Journal 38, 2003, pp. 103–116
24. Faris Ali, Ali Nadjai, Gordon Silcock, Abid Abu-Tair, “Outcomes of a major research on fire resistance of concrete columns”, Elsevier Fire Safety Journal, 39, 2004, pp. 433–445
25. Fu-Ping Cheng; V. K. R. Kodur and Tien-Chih Wang, “Stress-Strain Curves for High Strength Concrete at Elevated Temperatures”, Journal of Materials in Civil Engineering © ASCE, 2004, pp. 84-90
26. Bonnie E. Manley, “Rehabilitation of Existing Structures in the NFPA C3 Code Set”, Structures — Building on the Past: Securing the Future, ASCE Proceedings of Structures Congress, 2004
27. Xudong Shi; Teng-Hooi Tan; Kang-Hai Tan; and Zhenhai Guo, “Influence of Concrete Cover on Fire Resistance of Reinforced Concrete Flexural Members”, ASCE Journal of Structural Engineering, Vol. 130, No. 8, ISSN 0733-9445, 2004, pp. 1225-1232
28. V. K. R. Kodur and L. A. Bisby, “Evaluation of Fire Endurance of Concrete Slabs Reinforced with Fiber-Reinforced Polymer Bars”, Journal of structural engineering © ASCE, January 2005, pp. 34-43
29. B. Georgali, P.E. Tsakiridis 2005, “Microstructure of fire-damaged concrete: A case study”, Cement & Concrete Composites 27 © Elsevier, 2005, pp. 255-259
30. Michael L. Tholen, Amy Reineke Trygestad, “New engineers under fire”, Concrete International, Volume 1, Issue 07, USA, July 2005, pp. 45-48
31. Z. Huang, Ian W. Burgess & Rojer J. Plank, “Behaviour of Reinforced Concrete Structures in Fire”, Structures in Fire Workshop, 2006
32. B Stawiski, “Attempt to estimate fire damage to concrete building structure”, Archives of Civil & Mechanical Engineering, Vol 6, No 4, 2006, pp. 23-28
33. Richard Barnes and James Fidell, “Performance in Fire of Small-Scale CFRP Strengthened Concrete Beams”, Journal of composites for construction © ASCE / December 2006, pp. 503-508
34. Xin Yan; Hui Li and Yuk-Lung Wong, “Assessment and Repair of Fire-Damaged HSC: Strength and Durability”, Journal of materials in civil engineering © ASCE, June 2007, pp. 462-469
35. Ufuk Dilek, “Assessment of Fire Damage to a Reinforced Concrete Structure during Construction”, Journal of performance of constructed facilities © ASCE, 2007, pp. 257-263
36. Ian A. Fletcher, Stephen Welch, Jose L. Torero, Richard O. Karvel, “The behaviour of concrete structures in fire”, BRE Research Publications, The University of Edinburgh, UK , 2007
37. Ilker Bekir Topcu and Cenk Karakurt, “Properties of reinforced concrete steel rebars exposed to high temperatures”, Research Letters in Materials Science, Article ID 814137, 2008
38. David N. Bilow, Mahmoud E. Kamara, “Fire and Concrete Structures”, Part of ASCE Structures Congress, Crossing Borders, 2008, pp. 1-10
39. Colin Gurley, “Structural Design for Fire in Tall Buildings”, Practice Periodical on Structural Design and Construction, ASCE, Vol. 13(2), 2008, pp. 93–97
40. Kodur V. K. R. and Dwaikat M. B., “Effect of Fire Induced Spalling on the Response of Reinforced Concrete Beams”, International Journal of Concrete Structures and Materials, V 2, No 2, 2008, pp. 71-81
41. Javadian Alireza, Teng Susanto, Tan Teng Hooi, “High temperature effect on flexural strength of steel-fibre concrete”, Proceedings of the 3rd International Conference ACF/VCA, 2008, pp. 1160-1167
42. V.K.R. Kodur, “Enhancing resilience of urban structures to withstand fire hazard”, Resilience of Cities to Terrorist and other Threats, Book published by Springer, 2008, pp. 189-216
43. Prabir Kumar Chaulia; Reeta Das, “Process parameter optimization for fly ash brick by Taguchi method”, Materials Research, Print version ISSN 1516-1439, Vol. 11, No.2, 2008
44. V. K. R. Kodur, N. K. Raut, “Design equation for predicting fire resistance of reinforced concrete columns”, Structural Concrete, Vol. 10, no. 2, Michigan State University, USA, 2009
45. A Ferhat Bingol & Rustam Gul, “Residual bond strength between steel bars and concrete after elevated temperatures”, Elsevier Fire Safety Journal 44, 2009, pp. 854–859
46. Ahmed Chérif Megri, “Integration of Different Fire Protection/Life Safety Elements into the Building Design Process”, Practice periodical on structural design and
construction © ASCE, 2009, pp. 181 to 189
47. Masoud Ghandehari; Ali Behnood and Mostafa Khanzadi, “Residual Mechanical Properties of High-Strength Concretes”, Journal of materials in civil engineering © ASCE, January 2010, pp. 59-64
48. John L. Gross and Long T. Phan, “Summary of Best Practice Guidelines for Structural Fire Resistance Design of Concrete and Steel, ASCE Proceedings of the Structures Congress, 2010, pp. 2369-2379
49. Zhaohui Huang,“The behaviour of reinforced concrete slabs in fire”, Elsevier Fire Safety Journal 45, 2010, pp. 271–282
50. V. K. R. Kodur, M. B. Dwaikat, “Design equation for predicting fire resistance of reinforced concrete beams”, Enginering Structures (Elsevier), Vol. 33, Issue 2, 2011, pp. 602–614
51. Kulkarni D. B. & Patil S. N., “Comparative Study of Effect of Sustained High Temperature on strength Properties of Self Compacting Concrete and Ordinary Conventional Concrete”, International Journal of Engineering and Technology, ISSN: 0975-4024, Vol.3 (2), 2011, pp. 106-118
52. N. K. Raut, V. K. R. Kodur, “Response of High-Strength Concrete Columns under Design Fire Exposure”, ASCE Journal of Structural Engineering, Vol. 137, No.1, 2011, pp. 69-79
53. Peskava S & Prochazka P.P., “Impact of high temperature on different combinations of fiber reinforced concrete”, 36th Conference on Our World in Concrete & Structures Singapore, 2011
54. Kiang Hwee Tan and Yuqian Zhou, “Performance of FRP Strengthened Beams Subjected to high Temperatures”, Journal of composites for construction © ASCE, June 2011, pp. 304-311
55. M. Kanéma, P. Pliya, A. Noumowé, and J-L. Gallias, “Spalling, Thermal, and Hydrous Behavior of Ordinary and High-Strength Concrete Subjected to Elevated Temperature”, Journal of materials in civil engineering © ASCE, July 2011, pp. 921-930
56. M. Bastami, A. Chaboki-Khiabani, M. Baghbadrani, M. Kordi, “Performance of high strength concretes at elevated temperatures, Elsevier Scientia Iranica A, 18 (5),
2011, pp. 1028–1036
57. Venkatesh Kodur and Wasim Khaliq, “Effect of temperature on thermal properties of different types of high-strength concrete”, Journal of Materials in Civil Engineering © ASCE, June 2011, pp. 793-801
58. M.V. Krishna Rao, M. Shobha and N. R. Dakshina, “Effect of elevated temperature on strength of differently cured concretes-a study”, Asian Journal of Civil Engineering, Vol. 12, No 1, 2011, pp. 73-85
59. Rahim, U. K. Sharma, K. Murugesan & A. Sharma, “Optimization of Post-Fire Residual Compressive Strength of Concrete by Taguchi Method”, Journal of Structural Fire Engineering, June 2012, pp169-179
60. Samir Shihada and Mohammed Arafa, “Mechanical Properties of RC Beams with Polypropylene Fibers under High Temperature”, International Journal of Engineering and Advanced Technology (ijbsac) ISSN: 2249 – 8958, Volume-1, Issue-3, 2012, pp. 194-199
61. Siddesh Pai & Kaushik Chandra, “Analysis of polyester fibre reinforced concrete subjected to elevated temperatures”, International Journal of Civil, Structural, Environmental and Infrastructure Engineering Research and Development (IJCSEIERD), ISSN 2249-6866, Vol. 3, Issue 1, 2013, pp. 1-10
62. K. Srinivasa Rao, S. Rakesh kumar, A. Laxmi Narayana, “Comparison of performance of standard concrete and fibre reinforced concrete exposed to elevated temperatures”, American Journal of Engineering Research (AJER), e-ISSN: 2320-0847 p-ISSN: 2320-0936, Volume-02, Issue-03, 2013, pp. 20-26
63. Ashok R. Mundhada & Dr Arun D. Pofale, “Behavioural study of concrete at high temperatures”, Proceedings of International conference on ‘Recent trends in engineering & technology’, published by ELSEVIER, 2014, pp 243-248
64. Gai-Fei Peng, Xu-Jing Niu, “Fire resistance of normal concrete, high performance concrete and ultra-high performance concrete: A review”, Proceedings of UKIERI Concrete Congress, India, ISBN: 978-93-84869-83-0, 2015, pp. 1354-1371
65. Ashok R. Mundhada & Dr Arun D. Pofale, “Effect of elevated temperatures on strength and quality of concrete”, Proceedings of UKIERI Concrete Congress, India, ISBN: 978-93-84869-83-0, 2015, pp. 1402-1410
66. Anand N & Prince Arulraj G, “The effect of elevated temperature on concrete materials A Literature review”, International Journal of Civil and Structural Engineering, Volume 1, No 4, 2011, pp. 928-938
67. Malhotra H L, “Design of Fire Resisting Structures”, Surrey University Press, U.K., 1982
68. Kodur V. K. R. et al., “Structures in Fire: State-of-the-Art, Research and Training Needs”, NIST Workshop Report, NIST GCR 07-915, Dec 2007
69. Robin P. Nicolai & Rommert Dekker, “Automated Response Surface Methodology for Stochastic Optimization Models with Unknown Variance”, Tinbergen Institute Discussion Paper, The Netherlands, TI 2005-042/4, 2005
|
16-33

|
6.
|
Authors:
|
Neha Chouhan, Rohit Gupta
|
Paper Title:
|
Experimental Investigation for Tool Life by Optimizing Cutting Parameters in Plain Turning Operation by Statistical Methods
|
Abstract: Rate of production and tool material cost plays a significant role other than the material cost of the part to be made in a production run from economic point of view. The maximum production rate can be achieved if the total time required per piece is reduced to a minimum [1]. The paper presents an optimization technique to achieve minimum tool wear which would lead to reduced tool changing time and tooling cost. The experimental layout is designed based on the Taguchi`s L9 orthogonal array technique and analysis of variance (ANOVA) is performed to identify the effect of the cutting parameters on the response variables. Two different set of response variables are used, first, variation of cutting speed with feed and depth of cut, second, variation of rake angle with feed and depth of cut. The calculation is performed using Minitab-17 software.
Keywords: Optimization Technique, Taguchi`s L9 orthogonal array, analysis of variance (ANOVA), Minitab-17
References:
1. A.Ghosh, A K Mallik, Manufacturing Science
2. https://www.ee.iitb.ac.in/~apte/CV_PRA_TAGUCHI_L9MAN.htm
3. S. R. Das, R. P. Nayak, & D. Dhupal, “Optimization of the cutting parameters on tool wear and workpiece surface temperature in turning of AISI D2 steel”, International Journal of Lean Thinking, 2012.
4. K Dhameliya, J Desai, M Gandhi, D Dave, “Experimental investigation of process parameters on MRR and Surface roughness in turning operation on CNC Lathe machine for Mild Steel – E250: IS 2062”
5. Gunay M., Korkut I., Aslan E. and Eker U., Experimental investigation of the effect of cutting tool rake angle on main cutting force, Journal of materials processing technology,166, pp 44-49, 2005
|
34-39

|
7.
|
Authors:
|
Muhammad Abdus Samad
|
Paper Title:
|
Ergonomics and the Prevention of Musculoskeletal Strain and Back Injuries
|
Abstract: As technology becomes more complex, so ergonomics is undoubtedly destined to play an increasingly important role in industrial production and industrial health and safety. At the workplace, ergonomics places equal emphasis upon greater system efficiency and improved health of the individual. Ergonomics must be involved in fitting the tool and machine to the worker by design, fitting the worker to the machine by selection and training, and the optimization of the ambient environment to suit the man or the adaptation of the man to tough environmental conditions. Ergonomics aims to promote efficiency, safety and comfort at work situation in industry through better relationship between man, his tools and the work environment. This paper deals about the injuries such as backaches, neck aches, and other muscular strains due to bad seating and incorrect working posture and how to prevent them by designing of workstation that will be very comfortable and convenient to work at. This paper also discusses the optimal conditions for the workers, reduction of physical workload, improvement of working postures and facilitating psycho-sensorial functions in instrument handling, and so on.
Keywords: Back injury, Workstation design, Human factor, Productivity and Anthropometry.
References:
1. Helander, Martin (1943). A Guide to the Ergonomics of Manufacturing.
2. Kroemer, K. (1994). Egonomics: How to Design for Ease and Efficiency. Englewood Cliffs,NJ: Prentice Hall
3. Eklund, J. (1997). Ergonomics, quality and continuous improvement— conceptual and empirical relationships in an industrial context, Ergonomics, Vol. 40, 982–1001
4. Bunning, T. (1998). Designing ergonomically sound assembly workstations, Occupational Hazards, Vol. 60, No. 8, 63–65
5. Bullinger, H. J. (1986). Systematische montageplanung , Hanser, Munich (in German)
6. Pheasant, S. and Haslegrave, C.M. (2005). Bodyspace: Anthropometry, Ergonomics and the Design of Work. Taylory & Francis group, LLC.
|
40-43

|
8.
|
Authors:
|
Pakinam Ashraf, Hany Ayad, Dina Saadallah
|
Paper Title:
|
Sense of Community and Built Environment: How Can Built Environment, Social Economic Conditions and History of Place Shape Our Sense of Community?
|
Abstract: Sense of community is a concept in community and social psychology and has been investigated in several researches. The sense of community level changes towards many independent variables and it is related to the quality of the built form. This research aims at investigating the relationship between the sense of community and some determinants such as; the physical environment, the historical background and the socio economic conditions in selected neighborhoods. Furthermore, this research examines the social interaction as it has an important role in measuring the sense of community. To achieve that, the authors propose a methodology composed mainly of two major tools; the first, a survey formed of sense of community indices, as well as other social and psychological factors according to Kim and Kaplan theory. The second tool is based on the observation of physical attributes of the neighborhood. The adopted methodology is applied on two neighborhoods in Alexandria city, Egypt. By analyzing the survey results and the researcher’s observation of physical attributes in the selected neighborhood, it was found that there is a strong correlation between the sense of community and several independent variables such as the built environment, the socio economic conditions, some demographic factors like age, monthly income, length of residence and the importance of pedestrian factors on measuring sense of community.
Keywords: Sense of community, Built environment, Statistical analysis, Social Interaction, Alexandria neighborhoods.
References:
1. Abdo, M. M., 2013. The “Open Cities” Approach: A Prospect for Improving the Quality of Life in the City of Alexandria, Egypt, Alexandria, Egypt: Unpublished master thesis.
2. Alkalash, M. M. F. E., 2014. RETRIEVE THE WATERFRONT ALEXANDRIA: Strategies & Guidelines Framework Towards a Democratic Corniche, MILANO: Unpublished Master’s Thesis.
3. Berkowitz, L., 1956. Group norms under bomber crews: Patterns of perceived crew attitudes, and crew liking related to air crew effectiveness of Far Eastern combat. Sociometry, Volume 19, pp. 141-153.
4. Buckner, J., 1988. The Development of an Instrument to Measure Neighbourhood Cohesion. American Journal of community psychology, 16(6), pp. 771-791.
5. CAPMAS, 2013. Statistical year book, Cairo: Central Agency For Public Mobilization and Statistics.
6. Chavis, D., J. Hogge, D. McMillan and A. Wandersman, 1986. Sense of Community Through Brunswik’s Lens: A First Look. Journal of Community Psychology, Issue Theory, pp. 14: 24 -40.
7. Giles-Corti, L. W. &. L. D. F. &. B., 2010. Sense of community and its relationship with walking and neighborhood design2. Social Science & Medicine Elsevier Ltd., Volume 70, pp. 1381-1390.
8. Hussein, A., 2014. contemporary city | descriptions and projects. [Online]
9. Available at: http://contemporarycity.org/2014/05/alexandria/[Accessed 10 7 2016].
10. MARANS, D. O. &. A. R. &. R. W., 2009. Neighborhood satisfaction, sense of community, and attachment: Initial findings from Famagusta quality of urban life study. ITU A|Z, 6(1), pp. 6-20.
11. Schweitzer, J., 1996. A desription of sense of Community in Lansing Neighbourhoods’ Project. University of Michigan: presented at the “Defining Community, Reinforcing Society” conference.
12. Seymour Sarason, 1974. The psychological sense of community: Prospects for a community psychology, San Francisco: Jossey-Bass.
13. The Sense of Commmunity Partners, 2004. Exploring Sense of Community An Annotated Bibliography. Calgary, Canada: the Sense of Community Partners, c/o The City of Calgary Community Strategies.
14. UNDP, GOPP, MHUUD & CIDA, 2010. State of the built environment and housing indicators of seven Egyptian cities, Cairo, Egypt: comprihensive report.
15. Strategic Leisure Pty Ltd t/a the Strategic Leisure Group, 2010. Cycling &Walking Strategy Review, Cairns, Australia: McCormick Rankin Cagney.
16. The members of the City of Austin Design Commission, 2009. Urban Design Guidelines for Austin, City of Austin: City of Austin PECSD.
17. Holdsworth, L & Hartman, YA, 2009. Indicators of community cohesion in an Australian country town. Commonwealth Journal of Local Governance, Volume 2, pp.76-97.
18. Michael Quartuch, J. D. A. W. B. V. C. S. J. L. J. C.-G. K. B., 2012. Using Sense of Place and Sense of Community to Understand Landscape Change Behaviors, University of Maine, Orono, USA: Unpublished work.
|
44-55

|
9.
|
Authors:
|
Sarah M. Sabry, Hany M. Ayad, Dina M. Saadallah
|
Paper Title:
|
Assessing the Factors Associated with Urban Mobility Behaviour: Case studies from Alexandrian Neighborhoods, Egypt
|
Abstract: With the rapid spread of urbanization, cities started to witness challenges related to its streets. It is becoming imperative that the mobility should be managed appropriately to minimize its negative impacts on urban areas. Unfortunately, city leaders in many developing countries like Egypt are following the same Car-Oriented development patterns made by cities in developed countries. Ironically, the developed countries are trying to recover from a car dominated development era by re-allocating road space for public and non-motorized transport. In this respect, this research aims at exploring the key aspects and factors that affect individuals’ mobility choices in Egypt. It focuses on the socio-demographic, attitudinal and physical factors that are associated with commuters’ mobility behaviour and their choice of mode for daily trips. Two neighborhoods in Alexandria are selected for comparative and analytical analyses. First, a survey is carried out in the two selected areas. Second, Pearson’s Chi-square χ2 test is performed to explore the significant differences of commuter’s attitudinal, personal and built environment factors between the two areas. Finally, cross-tabulation distribution of categorical variables are presented in terms of absolute frequencies, p-values from Pearson’s Chi-square χ2 test and t-test so as to look for the association of the urban form and non-urban form factors to mobility choices.
Keywords: Sustainable Urban Mobility (SUM) – Travel Behaviour – Mode choice –Non-urban form factors – Built environment factors – TOD development – Sustainable neighborhoods.
References:
1. Paulley, N., et al. (2006). “The demand for public transport: The effects of fares, quality of service, income and car ownership.” Transport Policy 13(4): 295-306.
2. Ortuzar J.D. & Willumsen L.G. (1999). Modelling Transport. England: John Wiley & Sons ltd.
3. Dewi.A. (2010). “Research on factors affecting travel behaviour on choice of transportation means for working activity”. Yogyakarta, Indonesia: Faculty of Economic Sciences, Communication and IT.
4. Aoun, C. (2014). Urban Mobility in the Smart City Age. London: ARUP, the climate group.
5. Buis, J. (2009). A new Paradigm for Urban Transport Planning: Cyclin g Inclusive Planning at the Pre-event Training Workshop on Non-Motorized Transport in Urban Areas, 4th Regional EST Forum in Asia, 23 February 2009, Seoul, Republic of Korea.
6. Rudolf, P. (2004). Sustainable Transport: A Sourcebook for policy-makers in developing cities module 2a (Environment and Infrastructure ed., Vol. Division 44). (D. G. für, Ed.) Deutsche Gesellschaft für (Technische Zusammenarbeit (GTZ) GmbH).
7. Jacques, C. & Ahmed M. El-Geneidy (2010). Does travel behaviour matter in defining urban form? A quantitative analysis characterizing distinct areas within a region, The journal of transport and land-use, http://jtlu.org , Vol. 7 no. 1 [2014] pp. 1-14 doi: 10.5198/jtlu.v7i1.377
8. Global urban development magazine GUD, 2005. Overview of our vision and purpose. [Online] Available at: http://www.globalurban.org/Vision%20and%20Purpose.htm
9. Zegras, C. (September, 2005). Sustainable Urban Mobility: Exploring the Role of the Built Environment. Massachusetts: Massachusetts Institute of Technology.
10. Jorge Gil. (2016). urban modality: Modelling and evaluating the sustainable mobility of urban areas in the city-region. Delft University of Technology, Faculty of Architecture and the Built Environment, Department of Urbanism.
11. UN-Habitat. (2013). Planning and design for sustainable urban mobility. USA and Canada: Routledge.
12. Cervero, R. and Kockelman, K. (1997). Travel demand and the 3Ds: Density, diversity, and design, Transportation Research Part D: Transport and Environment.
13. Cervero, R., Sarmiento, Olga L., Jacoby, Enrique, Gomez, Luis Fernando & Neiman, Andrea (2009). Influences of Built Environments on Walking and Cycling: Lessons from Bogotá’, International Journal of Sustainable Transportation, 3:4,203 — 226, DOI: 10.1080/15568310802178314
14. Handy, S. L. (2002). “Travel Behaviour–Land Use Interactions: An Overview and Assessment of the Research. In: In Perceptual Motion: Travel behaviour Research Opportunities and Application Challenges ” Pergamon, Amsterdam: pp. 223-236.
15. Hanson, S. and M. Schwab. (1986). Describing disaggregate flows: individual and household activity patterns. The geography of urban transportation.
16. Hanson, S. (1982). “The determinants of daily travel-activity patterns: relative location and sociodemographic factors.” Urban Geography 3(3): 179-202.
17. Shaoli Wang & Carey Curtis. (2015).The Function of Individual Factors on Travel Behaviour: Comparative Studies on Perth and Shanghai. State of Australian Cities national Conference 2015. Queensland: Urban Research Program at Griffith University on behalf of the Australian Cities Research Network.
18. Domencich, T. (1975). Urban travel demand: a behavioral analysis: a Charles River Associates research study / Thomas A. Domencich and Daniel McFadden.
19. Olsson. A. (2003). Factors that influence choice of travel mode in major urban areas: The attractiveness of Park & Ride. Stockholm: Division of Transportation and Logistics.
20. Ajzen, I. (1991). “The theory of planned behavior.” Organizational Behaviour and Human Decision Processes 50(2): 179-211.
21. Anable, J. (2005). “‘Complacent car addicts’ or ‘aspiring environmentalists’? Identifying travel behaviour segments using attitude theory.” Transport Policy 12(1): 65-78.
22. Ewing, R. and Cervero, R. (2010). Travel and the Built Environment. Journal of the American Planning Association, Vol. 76, No. 3, (265-94). Doi: 10.1080/01944361003766766.
23. Brundtland, G. Harlem. (1987). Report of the World Commission on Environment and Development: Our Common Future. World Commission on Environment and Development.
24. Jensen, M. (1999). “Passion and heart in transport: a sociological analysis on transport behavior.” Transport Policy 6(1): 19-33.
25. The New York City Departments of Design and Construction (DDC), Health and Mental Hygiene, Transportation (DOT), and City Planning. (2010). Active Design Guidelines: Promoting physical activity and health in design. New York.
26. OECD, (2002). OECD guidelines towards environmentally Sustainable Transport. (OECD) Organization for Economic Co-operation and Development publication.
|
56-69

|
10.
|
Authors:
|
Nor Azlina Abd Rahman, Vinothini Kasinathan, Rajasvaran Logeswaran, Nurwahida Faradila Taharim
|
Paper Title:
|
QR IT Seek: A Conceptual Model for Teaching and Learning by Digital Natives via Edutainment Game
|
Abstract: The goal of teaching and learning activities is to for the target recipient to achieve the learning outcomes. As the Digital Natives generation is being brought up in a much more sophisticated technologically advanced world, the aptitude and requirements in their studies have changed. More interactive and fun learning, out of the classroom setting, is desired. This paper proposes a conceptual framework for edutainment and reports on a primary study on a developed QR IT Seek game. The primary study, results and analysis would aid in further improvements and adaptation of such activities to improve the teaching and learning performance of the Digital Natives.
Keywords: edutainment, QR-Code, QR IT Seek competition, Digital Natives, pedagogy.
References:
1. N.F. Taharim, A. Mohd Lokman, W.A.R. Wan Mohd Isa and N. L. Md Noor (2014) “Investigating Feasibility of Mobile Learning for History Lesson,” International Colloquium of Art and Design Education Research (i-CADER), Springer, pp. 51-55.
2. GS1 Japan (2009) “QR Code Overview & Progress of QR Code Application,”. Available at: http://www.gs1jp.org/pdf/001.pdf. [Accessed on 27th March 2016]
3. EDUCASE (2009) “7 Things You Should Know about QR Codes,” EDUCASE Learning Initiative. Available at: https://net.educause.edu/ir/library/pdf/ELI7046.pdf [Accessed on 27th March 2016].
4. Goh, Lay Huah & Jarrett, Barry W. (2014) “Integrating QR Codes And Mobile Technology In Developing Listening And Speaking Skills In The Teaching Of English Language,” International Journal on E-Learning Practices (IJELP), Volume 1, Issue 1.
5. Sari Wallden, Anne Soronen (2004) “Edutainment from Television and computers to Digital Television” . Available at: http://www.sis.uta.fi/infim/infim_2011/julkaisut/hyper/b/fitv03b.pdf [Accessed 25th June 2016]
6. Andrew Miller (2011) “Twelve Ideas for Teaching with QR Codes”. Available at: http://www.edutopia.org/blog/QR-codes-teaching-andrew-miller [Accessed on 22th June 2016]
7. HubPages (2013) “QR Code secrets. Dynamic vs. Static what’s the difference?”. Available at : https://qrcode.trustthisproduct.com/what-is-a-qr-code-en.html [Accessed on 28th June 2016]
8. Ben Van Sas, Joroen Steeman (2012) “QR Codes – Linking the real world with the digital world.” Available at: http://blog.qr4.nl/Documents/Presentation-QR-Codes.pdf [Accessed on 28th June 2016]
9. C. H. Lai, S. A. Chen, F. S. Hsiao, S. Chen, (2013) “Scan & Learn: Exploring Application of Dynamic Quick Response Codes in Digital Classrooms”. Bulletin of the Technical Committee on Learning Technology, Volume 15, Issue 3, pp. 2-5, July 2013.
|
70-75

|
11.
|
Authors:
|
B. M. Mustapha, V. C. Ikpo, A. B. Bababe
|
Paper Title:
|
Intelligent Control for Laboratory DC Motor
|
Abstract: This paper presents the design of a fuzzy PD controller for laboratory DC motor (MS 150 Kit) to minimize the tracking error in applications. The Fuzzy PD controller was simulated and the responses obtained when compared with a conventional PD controller revealed better performance.
Keywords: Control, Direct-Current, Fuzzy, Motor
References:
1. T. Nishiyama, S. Suzuki, M. Sato, and K. Masui, “Simple Adaptive Control with PID for MIMO Fault Tolerant Flight Control Design,” in AIAA Infotech@ Aerospace, ed, 2016, p. 0132.
2. G.-J. Su and J. W. McKeever, “Low-cost sensorless control of brushless DC motors with improved speed range,” Power Electronics, IEEE Transactions on, vol. 19, pp. 296-302, 2004.
3. R. Saidur, S. Mekhilef, M. Ali, A. Safari, and H. Mohammed, “Applications of variable speed drive (VSD) in electrical motors energy savings,” Renewable and Sustainable Energy Reviews, vol. 16, pp. 543-550, 2012.
4. R. Krishnan, Electric motor drives: modeling, analysis, and control: Prentice Hall, 2001.
5. N. Hemati, J. S. Thorp, and M. C. Leu, “Robust nonlinear control of brushless DC motors for direct-drive robotic applications,” Industrial Electronics, IEEE Transactions on, vol. 37, pp. 460-468, 1990.
6. G.-R. Yu and R.-C. Hwang, “Optimal PID speed control of brush less DC motors using LQR approach,” in Systems, Man and Cybernetics, 2004 IEEE International Conference on, 2004, pp. 473-478.
7. V. Vossos, K. Garbesi, and H. Shen, “Energy savings from direct-DC in US residential buildings,” Energy and Buildings, vol. 68, pp. 223-231, 2014.
8. H. O. Ahmed, “Speed Sensorless Vector Control of Induction Motors Using Rotor Flux based Model Reference Adaptive System,” Journal of Engineering and Computer Science, vol. 17, 2016.
9. W. Borutzky, Bond Graph Methodology. New York: Springer, 2010.
10. B. O. B. Arun K. Samantaray, A Bond Graph Approach, Model-based Process Supervision. Scotland, UK, 2008.
|
76-79

|
12.
|
Authors:
|
Sanjay S. Bhagwat, S. D. Pohekar
|
Paper Title:
|
Performance Assessment of CHP Cycle in Sugar Industry
|
Abstract: A huge potential for power generation from waste fuels exists within the sugar cane industry. This paper presents the findings of the energy and exergy analysis of cogeneration i.e. CHP cycle in sugar industry. The study was aimed at assessing the operational performance of the bagasse based cogeneration power plant in sugar industry by evaluating both the energy and exergy efficiency.
Keywords: Energy, Exergy, Entropy, CHP.
References:
1. A.Cihan, O.Hacıhafızoglu, & K. Kahveci,, “Energy–exergy analysis and modernization suggestions for a combined‐cycle power plant” International Journal of Energy Research, 30(2), 2006,pp.115-126.
2. M.Ameri, P. Ahmadi & A.Hamidi, “Energy, exergy and exergoeconomic analysis of a steam power plant: A case study”, International Journal of Energy Research, 33(5), 2009, pp. 499-512.
3. O.Can, N. Celik and I. Dagtekin, “Energetic–exergetic-economic analyses of a cogeneration thermic power plant in Turkey”, International Communications in Heat and Mass Transfer, 36(10),2009, pp. 1044-1049.
4. F.Jurado, O. Can., & J. Carpio, “ Modelling of combined cycle power plants using biomass”,. Renewable Energy, 28(5), 2003, pp. 743-753.
|
80-82

|
13.
|
Authors:
|
Raja Rao.Chella
|
Paper Title:
|
A Qualitative Review on Image Processing Algorithms to Detect Early Stage Lung Cancer
|
Abstract: Nowa days, the image processing algorithms are being usedwidely in medical systems for detection of lung cancer. It is observed that the life span rate of lung cancer patients increases from 15 to 50% if they were detected at early stages. Detection of cancer cells is the most important issue for medical researchers as it becomes more complex in the treatment process. The detection steps of presence of cancerous cells include image pre-processing, segmentation, feature extraction and classification. In this paper, algorithms for enhancement, segmentation and feature extractionto detect the cancerous tumors which are small and large in size from the lung CT scan images are reviewed. Finally thealgorithms are compared with one another using three parameters called accuracy, sensitivity and specificity.
Keywords: CT Images, Image Preprocessing, Segmentation, Enhancement, Feature Extraction and Classification.
References:
1. Ada, Rajneet Kaur “Early Detection and Prediction of Lung Cancer Survival using Neural Network Classifier”IJAIAM. Volume 2, Issue 6, June 2013
2. Avinash. S, Dr. K. Manjunth, Dr. S. Senthil Kumar,” An Improved Image Processing Analysis for the Detection of Lung Cancer using Gabor Filters and Watershed Segmentation Technique”,IEEE,2016.
3. P.B. Sangamithraa, S. Govindaraju.,” Lung Tumour Detection and Classification using EK-Mean Clustering”, IEEE –WiSPNET conference,2016.
4. Md. Badrul Alam Miah, Mohammad Abu Yousuf,” Detection of Lung Cancer from CT Image Using Image Processing and Neural Network”, Electrical Engineering and Information &Communication Technology (ICEEICT) 2015.
5. Taruna Aggarwal, Asna Furqan, Kunal Kalra,” Feature Extraction and LDA based Classification of Lung Nodules in Chest CT scan Images”,IEEE,2015.
6. Elmar Rendon-Gonzalez and Volodymyr Ponomaryov,”Automatic Lung
7. Nodule Segmentation and Classification in CT Images Based on SVM”,IEEE-2016.
8. T. Messay, R. Hardie and S. Rogers, “A new computationally efficient CAD system for pulmonary nodule detection in CT imagery,”Med Image Anal, vol. 14, pp. 390–406, 2010.
9. D. Cascio, R. Magro, F. Fauci, M. Iacomi, and G. Raso, “Automatic detection of lung nodules in CT datasets based on stable 3D mass-spring models,” Computers in Biology and Medicine, vol. 42, no. 11, pp. 1098– 1109, 2012
10. Saleem Iqbal et al,”Potential Lung Nodules Identification for Characterization by Variable Multistep Threshold and Shape Indices from CT Images”, Computational and Mathematical Methods in Medicine Volume 2014 .
11. M. Alilou, V. Kovalev, E. Snezhko, and V. Taimouri, “A comprehensive framework for automatic detection of pulmonary nodules in lung CTimages,” Image Anal Stereol, vol. 33, pp. 13-27, 2014.
12. Dasari Hemalatha, Raja Rao.Ch, S.J.Sugumar,” Detection of Lung Cancer Using Marker-Controlled Watershed Transform”, International Journal & Magazine Engineering, technology, management Research,Volume 3,Isuue no.10,2016.
13. Vicky Ambule, Minal Ghute, Kanchan Kamble, Shilpa Katre,” Adaptive Median Filter for Image Enhancement”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.
14. Raajan.P, Muthuselvi.S, Agnes Saleema. A,” An Adaptive Image Enhancement using Wiener Filtering with Compression and Segmentation”, International Journal of Computer Applications, 2015
|
83-87

|
14.
|
Authors:
|
Bababe Adam B., Ashish Kumar J., Rajiv Kumar
|
Paper Title:
|
Lora Based Intelligent Home Automation System
|
Abstract: The home and Society are surrounded by “things” which are connected to each other, either directly or indirectly via the internet of things. To have access to controlling these devices remotely with precision within the network when required is a key factor in the process of home automation. There are numerous aspects in this automation that needs to be developed so as to enhance it. This research gives a solution to having a precise and direct control and automatic detection of current state of devices with the use of android application. It also gives a practical implementation of home automation using LoRa in comparison to other technologies.
Keywords: Home Automation; Internet of Things; LoRa; Android; Smart
References:
1. Lee, K.M., Teng, W.G. and Hou, T.W., “Point-n-Press: An Intelligent Universal Remote Control System for Home Appliances,” IEEE Transactions on Automation Science and Engineering. 2016, 13(3), pp 1308 – 1317.
2. Qu, Y., Xu, K., Wang, H., Wang, D. and Wu, B., December. “Lifetime maximization in rechargeable wireless sensor networks with charging interference,” In 2015 IEEE 34th International Performance Computing and Communications Conference (IPCCC) 2015, pp. 1-8.
3. Hsieh, C.W., Chi, K.H., Jiang, J.H. and Ho, C.C., 2014. “Adaptive binding of wireless devices for home automation,” IEEE Wireless Communications, 21(5), pp.62-69.
4. Sheng, W., Matsuoka, Y., Ou, Y., Liu, M. and Mastrogiovanni, F.,. “Guest Editorial Special Section on Home Automation,” IEEE Transactions on Automation Science and Engineering, 2015, 12(4), pp.1155-1156.
5. Gill, K., Yang, S.H. and Wang, W.L., “Secure remote access to home automation networks,” IET Information Security, 2013, 7(2), pp.118-125.
6. Langhammer, N. and Kays, R., “Performance evaluation of wireless home automation networks in indoor scenarios,” IEEE Transactions on Smart Grid, 2012, 3(4), pp.2252-2261.
7. Kumar SP, Rao SV. RF Module Based Wireless Secured Home Automation System Using FPGA. Journal of Theoretical and Applied Information Technology. 2015, 77(2)
8. Kumar PM, Sandhya N. “Bluetooth Based Wireless Home Automation System Using FPGA”. Journal of Theoretical and Applied Information Technology. 2015, 77(3)
9. ElShafee A, Hamed KA. “Design and implementation of a WIFI based home automation system”. World academy of science, engineering and Technology. 2012, 2177-80.
10. Tseng SP, Li BR, Pan JL, Lin CJ. “An application of Internet of things with motion sensing on smart house”. InOrange Technologies (ICOT), 2014 IEEE International Conference on 2014 Sep 20 pp. 65-68
11. Teymourzadeh R, Ahmed SA, Chan KW, Hoong MV. “Smart GSM based home automation system”. InSystems, Process & Control (ICSPC), 2013 IEEE Conference on 2013 Dec 13, pp. 306-309.
12. Sivakrishnan J., Esakki Vigneswaran E. and Sakthi Vishnu R. “Home Automation Control and Monitoring System Using BLE Device”. Middle-East Journal of Scientific Research, 2016 pp. 78-82
13. Bor, Martin, John Edward Vidler, and Utz Roedig. “LoRa for the Internet of Things.” (2016): 361-366.
14. Tadimeti, H.C. and Pulipati, M., “Overview of Automation Systems and Home Appliances Control using PC and Microcontroller,” Int. Jr. of Sci. Res, 2013, 2, pp.127-31.
15. Ruçi, L., Karçanaj, L. and Shurdi, O., “Energy efficiency combined SW techniques on mobiles Android OS,” In Computer and Energy Science (SpliTech), International Multidisciplinary Conference on 2016, pp. 1-8.
16. LoRa. https://www.lora-alliance.org. Accessed: 2016-12-23
17. Song, S. and Issac, B., “Analysis Of Wi-fi And Wimax And Wireless Network Coexistence,” International Journal of Computer Networks & Communications, 2014, 6(6), p.63.
18. Chowdary, U.V., Rohith, K., Sandeep, P. and Ramu, M., “Home Automation System Using IR Sensors,” International Journal of Electrical and Electronics Engineering, 2015, 4(6), pp 11-1.
|
88-92

|
15.
|
Authors:
|
Shaik Noor Mohammad
|
Paper Title:
|
Security Attacks in MANETS (Survey Prospective)
|
Abstract: Mobile Adhoc Network (MANET) is a dynamic, foundation less Network comprising of agroup of dynamic nodes which communicate with each other. Such networks find application in real-life environment as communication in Battlefields and communication among rescue personnel in disaster affected areas. Recently, mobile ad-hoc networks (MANETs) have gained the attention of research community due to increased adoption of its usage in real life applications. Due to fundamental characteristic of being Adhoc and insecure medium the most challenging job in MANETS is security. In this paper we present a brief survey of security attacks and existing prevention techniques.
Keywords: Mobile Adhoc Network (MANET), Security, Attacks, Routing, Mobile nodes, Dynamic Topology
References:
1. Rutvij H. Jhaveri, “MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs “, (254-260)2012 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/12 / 2012 IEEE.
2. Sanjay K. Dhurandher, Isaac Woungang, Raveena Mathur , Prashant Khurana,” GAODV: A Modified AODV against single and collaborative Black Hole attacks in MANETs”,(357-362) 2013 27th International Conference on Advanced Information Networking and Applications Workshops, 978-0-7695-4952-1/13/2013 IEEE.
3. Yudhvir Singh, Avni Khatkar, Prabha Rani, Deepika, Dheer Dhwaj Barak ,“Wormhole Attack Avoidance Technique in Mobile Adhoc Networks”,(283-287) 2013 Third International Conference on Advanced Computing & Communication Technologies, 978-0-7695-4941-5/13/ 2013 IEEE.
4. Indirani, Dr. K. Selvakumar, V. Sivagamasundari, “Intrusion Detection and Defense Mechanism for Packet Replication Attack over MANET Using Swarm Intelligence”, (152-156) Pattern Recognition, Informatics and Mobile Engineering (PRIME) February 21-22, 978- 1-4673-5845-3/13/2013 IEEE.
5. P.Karthikkannan, K.P.Lavanya Priya,” Reduction of Delays in Reactive Routing Protocol for Unobservable Mobile Ad-Hoc Networks”, 2013 IEEE.
6. Sapna Gambhir and Saurabh Sharma,” PPN: Prime Product Number based Malicious Node Detection Scheme for MANETs”, (335-340) 2012 3rd IEEE International Advance Computing Conference (IACC), 978-1-4673-4529-3/12/ 2012 IEEE.
7. Hizbullah Khattak, Nizamuddin, Fahad Khurshid, Noor ul Amin, ” Preventing Black and Gray Hole Attacks in AODV using Optimal Path Routing and Hash”,(645-648) 978-1-4673-5200-0/13/2013 IEEE.
8. Roopal Lakhwani , Vikram Jain , Anand Motwani , “ Detection and Prevention of Black Hole Attack in Mobile Ad-Hoc Networks”, International Journal of Computer Applications (0975 – 8887) Volume 59– No.8, December 2012.
9. Htoo Maung Nyo, Piboonlit Viriyaphol, ” Detecting and Eliminating Black Hole in AODV Routing”, 2011 IEEE, 978-1-4244-6252-0/11
10. Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks”, in Proc. ACM Southeast Regional Conference, pp. 96-97, 2004.
11. Pramod Kumar Singh, Govind Sharma,” An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET”,(902-906) 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 978-0-7695-4745- 9/12/ 2012 IEEE.
12. Zhou L, Chao H-C, “Multimedia Traffic Security Architecture for the Internet of Things” IEEE Network 25(3):29–34. IEEE 2011.
13. Yang H, Lou H, Ye F, Lu S, Zhang L (2004) Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11(1):38–47.
14. S.Nithya, S.Prema, G.Sindhu, ” Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks “, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 01 , P.P 1083-1087, Jan-2016
15. Wu B, Chen J, Wu J, Cardei M, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks” In: Xiao Y,Shen X, Du D-Z (eds) Wireless Network Security.
on Signals and Communication Technology. Springer, New York 2007.
16. Marti S, Giuli TJ, Lai K, Baker M, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks” 6th annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, August 2000.
17. Hu Y-C, Perrig A, Survey of Secure Wireless Ad Hoc Routing. IEEE Security & Privacy 2(3):28–39, IEEE 2004.
|
93-96

|
16.
|
Authors:
|
Sandeep P.
|
Paper Title:
|
A Comparative Analysis of Optimization Techniques in Cognitive Radio (QoS)
|
Abstract: Wireless Technology has seen a tremendous advancement in recent times. There has been a huge growth in multimedia applications over the wireless networks. The requirement of significant bandwidth for multimedia services has increased the demand for radio spectrum. The scarcity of radio spectrum has become a challenge for the conventional fixed spectrum assignment policy. Thus, Cognitive Radio (CR) has emerged as a new exclusive choice to address the spectrum underutilization problem by enabling users to opportunistically access unused spectrum bands. It offers a promising solution to meet this demand by fully utilizing available spectrum resources. It improves the utilization of the wireless spectrum by allowing the secondary users to access the primary channels in an opportunistic manner. Efficient utilization of frequency spectrum is possible using dynamic spectrum allocation. Optimization techniques like Genetic Algorithm (GA), Ant Colony Optimization (ACO) and Mutated Ant Colony Optimization (MACO) are discussed here to meet the users QoS needs in the Cognitive Radio. The transmission and environmental parameters along with performance objectives of cognitive radio are studied and compared in the paper using different optimization techniques. In this paper, the results of various optimization techniques in Cognitive Radio System along with CR objectives are analysed to meet users QoS.
Keywords: Cognitive Radio Genetic Algorithm, Ant Colony Optimization, Mutated Ant Colony Optimization, QoS Provisioning.
References:
1. Akyildiz, I. F., Lee, W. Y., Vuran, M. C., & Mohanty, S. (2006). Next generation dynamic spectrum access cognitive radio wireless networks: A survey. Computer Networks, 50, 2127–2159.
2. Haykin, S. (2005). Cognitive radio: Brain-empowered wireless communications. IEEE Journal on Selected Areas in Communications, 23(2), 201–220.
3. Gandetto, M., & Regazzoni, C.. Spectrum sensing: A distributed approach for cognitive terminals. IEEE Journal on Selected Areas in Communications, 25(3),2007,546–557.
4. Federal communication commission, “spectrum policy task force”, Report of ET Docket 02-135, 2002.
5. J. Mitola III, “cognitive radio: An integrated Agent Architecture for Software Radio”, PhD thesis, Royal institute of Technology (KTH), 2000.
6. C. Rieser “Biologically inspired cognitive radio engine model utilizing distributed genetic algorithms for secure and robust wireless communications and networking”, PhD thesis, Virginia Tech, 2004.
7. J Mitola III and G. Q. Maguire, Jr” Cognitive radio: making software radios more personal,” IEEE Personal Communications Magazine,vol.6,nr 4, pp.13–18, Aug.1999
8. Tim R. Newman, Brett A. Barker, AlexanderM. Wyglinski, Arvin Agah, Joseph B.Evans and Gary J Minden “Cognitive engine implementation for wireless multicarrier transceivers”, Wiley Wireless communications and mobile computing, 7(9), 1129-1142 (2007).
9. Sebastian Herry and Christophe J.Le Martret, “parameter determination of secondary user cognitive radio network using genetic algorithm”, IEEE 2009.
10. Maninder Jeet Kaur, Moin Uddin, Harsh K.Verma, “Performance Evaluation of QoS parameters in cognitive radio using Genetic Algorithms”, In World Academy of Science, Engineering & Technology, vol.4, No.10, pp.830- 835, 2010.
11. Nan Zhao, Shuying Li, Zhilu Wu, “Cognitive radio engine design based on Ant colony optimization”, Wireless pers communication, 2012. pp 15-24
12. Kiranjot kaur, Munish Rattan, Manjeet Singh Patterh, “optimization of cognitive radio system using simulated annealing”, wireless pers communication, 2013.
13. Abdelfatah Elarfaoui, Noureddine Elalami, “optimization of QOS parameters in cognitive radio using combination of two crossover methods in genetic algorithm”, Int. J. Communications, Network and System Sciences, pp. 478-483, November 2013.
14. Stephen A. Adubi, Sanjay Misra “A Comparative Study on the Ant Colony Optimization Algorithms” IEEE, 2014
15. Ismail AlQerm and Basem Shihada, “Adaptive Multi objective optimization scheme for cognitive radio resource management”, Globecom 2014
16. Vinutha.P, Sutha.J, QOS Parameter Optimization For Cognitive Radio Networks, IJARCST, Vol. 2 Issue Special -1 Jan-March 2014, pp 204-208
17. Seshadri Binaya Behera, D.D.Seth, “Resource allocation for cognitive radio network using particle swarm optimization”, IEEE sponsored (ICECS„2015‟).
18. Vibhuti Rana and Dr.P.S.Mundra,” A Review on QOS Parameters in Cognitive Radio Using Optimization Techniques” IJEIT Volume 5, Issue12, June 2016, pp:59
19. Supreet Kaur, Inderdeep Kaur Aulakh” Optimization of Cognitive Radio Sensing Techniques Using Genetic Algorithm” ijircce. Vol 3, Issue 5 May 2015 pp.4131
20. M .Dorigo, M. Birattari and T. Stuetzle, “Ant colony optimization: artificial ants as computational intelligence technique,” IEEE Computational Intelligence, vol.I,no. 4, pp. 28-39, 2006.
21. M. Shoukath Ali, R. P. Singh, “A Study on Game Theory Approaches for Wireless Sensor Networks” ijbsac ISSN: 2249–8958, Volume-6 Issue-3, February 2017, pp:5-7
22. Ramlakhan Singh Jadon, Unmukh Dutta” Modified Ant Colony Optimization Algorithm with Uniform Mutation using Self-Adaptive Approach” IJCA (0975 –8887) Volume 74–No.13, July 2013, pp 5-8
|
97-102

|
17.
|
Authors:
|
Francis Yao Anyan
|
Paper Title:
|
Assessment of Indigenous Knowledge usage Among Small Scale Farmers in Kpando Municipality, Ghana
|
Abstract: The study assessed the indigenous knowledge (IK)usage among small scale farmers. The study was conducted in the Kpando Municipality with a sample size of 140 respondents. Simple random sampling technique was used to collect data from respondents. Data collected were analyzed using descriptive tools such as frequencies, percentages, mean and standard deviation. The study reveal that majority of small scale farmers in the municipality are female. Also farmers in the municipality frequently use indigenous knowledge such as Organic manure, Mulching, Bush fallowing, Harvesting with hand and Rain water harvesting.
Keywords: Mulching, Harvesting, Indigenous, Knowledge, Bush fallowing, standard deviation.
References:
1. Alavi, Maryam, and Dorothy E. Leidner. “Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues.” MIS Quarterly 25, no. 1 (2001): pp.107–136.
2. Flavier, J.M. et al. (1995)””The regional program for the promotion of indigenous knowledge in Asia”, pp. 479-487 in Warren, D.M., L.J. Slikkerveer and D. Brokensha (eds) The cultural dimension of development: Indigenous knowledge systems. London: Intermediate Technology Publications.
3. Johnson, M., 1992. Lore: capturing traditional environmental knowledge. Ottawa: Dene Cultural Institute and the International Development Research Centre Langhill, S., 1999. Indigenous knowledge: a resource kit for sustainable development researchers in dryland Africa. Ottawa: IDRC
4. Mugabe, F.T., et al., 2010. Use of indigenous knowledge systems and scientific methods for climate forecasting in southern Zambia and north western Zimbabwe. Zimbabwe Journal of Technological Sciences, 1 (1).
5. Steiner, A., 2008. Indigenous knowledge in disaster management in Africa. United Nations Environment Programme (UNEP). Available from: http://www.unep.org/IK/PDF/IndigenousBooklet.pdf
6. Sundamari, M and Ranganathan, T.T. (2003). Indigenous agricultural practices for sustainable farming. Agrobios (India). Jodhpur, India.
7. Warren, D. M. 1991 “Using Indigenous Knowledge in Agricultural Development”; World Bank Discussion Paper No.127. Washington, D.C.: The World Bank.
|
103-108

|
18.
|
Authors:
|
N. Nachammai, R. Kayalvizhi
|
Paper Title:
|
Moth Flame Optimisation Algorithm for Control of LUO Converter
|
Abstract: Because of the effects of the parasitic elements, the output voltage and power transfer efficiency of all DC-DC converters are restricted. In order to eliminate the limitations caused by parasitic elements, the voltage lift technique is successfully applied to DC-DC converters resulting in a new series called Luo converters. Linear control methods ensure stability and good control only in small vicinity around the operating point. These classical controllers are designed using mathematical models by linearising non-linearities around the nominal operating point. Since these controllers are also sensitive to the operating points and parameters variations, a high degree of accuracy cannot be guaranteed from them. To ensure that the controllers work well in large signal conditions and to enhance their dynamic responses, intelligent method using fuzzy technique is suggested.The performance of a fuzzy logic controller depends on its control rules and membership functions. Hence, it is very important to adjust these parameters to the process to be controlled. A method is presented for tuning fuzzy control rules by Moth Flame Optimization(MFO) algorithm to make the fuzzy logic control systems behave as closely as possible to the operator or expert behavior in a control process. The tuning method fits the membership functions of the fuzzy rules given by the experts with the inference system and the defuzzification strategy selected, obtaining high-performance membership functions by minimizing an error function. Moth-flame Optimization (MFO) algorithm is one of the newest bio inspired optimization techniques in which the main inspiration of this optimizer is the navigation method of moths in nature called transverse orientation.MFO has a fast convergence rate due to use of roulette wheel selection method. Moth-Flame Optimizer (MFO) is used to control the LUO converter. MFO-Fuzzy is used to search the fuzzy rules and membership values to achieve minimum ISE, ITAE, settling time and peak overshoot. The proposed method is compared with fuzzy controller. Simulation results prove that the MFO algorithm is very competitive and achieves a high accuracy.
Keywords: Moth Flame Optimisation Algorithm, Fuzzy Logic Controller, Positive Output Elementary LUO Converter.
References:
1. F.L.Luo and Hong Ye, Advanced DC/DC Converters, CRC Press, LLC, 2004.
2. S. Mirjalili, “Moth-flame optimization algorithm: A novel nature inspired heuristic paradigm”, Knowledge-Based Systems, Elsevier, Vol . 89, 2015, pp. 228-249.
3. Narottam Jangir, Indrajit N.Trivedi, Mahesh H. Pandya, R.H.Bhesdadiya, Pradeep Jangir and Arvind Kumar, “Moth-Flame Optimization Algorithm for Solving Real Challenging Constrained Engineering Optimization Problems”, Proceedings of IEEE Students Conference on Electrical, Electronics and Computer Science, Bhopal, 2016, pp. 1–5.
4. Ghada M. A. Soliman, Motaz M. H. Khorshid and Tarek H. M. Abou-El-Enien “Modified Moth-Flame Optimization Algorithms For Terrorism Prediction”, International Journal of Application on Innovation in Engineering & Management, Vol. 5,Issue 7, 2016,pp. 47-58.
5. Deepak Kumar Lal, Kiran Kumar Bhoi and Ajit Kumar Barisal, “Performance evaluation of MFO algorithm for AGC of a multi area power system”, proceedings of International conference on Signal Processing, Communication, Power and Embedded System, odisha, India, Oct. 2016,pp.1-6.
6. Siddharth A. Parmar, Indrajit N. Trivedi, M. H. Pandya, Pradeep Jangir, Motilal Bhoye and Dilip Ladumor, “Optimal Active and Reactive Power Dispatch Problem Solution using Moth-Flame Optimizer Algorithm”, Proceedings on international conference on energy efficient technologies for sustainability, Oct. 2016,Nagercoil,Tamilnadu. pp. 491-496.
7. N. Trivedi, Avani H. Ranpariya, Arvind Kumar and Pradeep Jangir, “Economic Load Dispatch Problem with Ramp Rate Limits and Prohibited Operating Zones Solve using Levy Flight Moth-Flame Optimizer”, proceedings of international conference on energy efficient technologies for sustainality, Nagercoil ,2016, pp. 442-447.
8. Waleed Yamanya, Mohammed Fawzy, Alaa Tharwat and Aboul Ella Hassanien, “Moth-Flame Optimization for Training Multi-layer Perceptrons”, proceedings of eleventh international conference on computer Engineering, Cairo, Egypt, 2015.pp. 267-272.
9. Pertik Garg and Ashu Gupta,“Optimised open shortest path first algorithm based on Moth flame optimization”,Indian Journal of Science and Technology,Vol.9,Issue-6,2016,pp.1-9.
10. Bachir Bentouati and Lakhdar Chaib and Saliha Chettih, “Optimal power flow using moth flame optimizer” A case study of Algerian power system, Indonesian Journal of Electrical Engineering and Computer Science Engineering,Vol.1,Issue-3,2016, pp. 431-445.
11. S.Gomariz, F.Guinjoan, E.Vidal, L.Martinz and A.Poreda, ‘On the use of the describing function in fuzzy controller design for switching DC-DC regulators’, in Proc. IEEE International Symposium on Circuits and Systems, Geneva, Switzerland, 2000, pp. 247-250.
|
109-114

|
19.
|
Authors:
|
Vipanjot Kaur Sidhu, Vijay Kumar Joshi
|
Paper Title:
|
A Novel Technique for Fault Recovery in Mobile Cloud Computing
|
Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. Task allocation is one of the issue of the cloud computing. Load imbalance occurs due to limited resources available and leads to the fault occurrence situation. In this paper, a novel technique has been proposed based on weights to overcome faults occurrence problem. In this work improvement will be proposed in agent base load balancing algorithm for task reallocation and reduced fault detection time in cloud architecture.
Keywords: Cloud computing, deployment models, load balancing, fault tolerance
References:
1. SanjoliSingla, Jasmeet Singh, 2013 “Cloud Data Security using Authentication and Encryption Technique” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, Issue 7, July 2013, pp 2232-2235
2. Soumya Ray and Ajanta De Sarkar, “Execution Analysis of Load Balancing Algorithm in Cloud computing Environment”, International Journal on Cloud Computing: Services and Architecture (IJCCSA), Vol.2, No.5, October 2012
3. Sean Carlin, Kevin Curran “Cloud Computing Security” International Journal of Ambient Computing and Intelligence, pp 14-19, 2011
4. Barau M, Liang X, Lu R, Shen X. “ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing”, International Journal of Security and Networks; 2011; 6(2),p.67-76
5. Sahai A, Waters B. “Fuzzy identity-based encryption. Advances in cryptology- EUROCRYPT” 2005,pp.557
6. Deyan Chen, Hong Zhao, “ Data Security and Privacy Protection Issues in Cloud Computing” International Conference on Computer Science and Electronics Engineering, pp 647-65, 20127. M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing” April 2010.
8. Kuyoro S. O., Ibikunle F. &Awodele O, “Cloud Computing Security Issues and Challenges”, International Journal of Computer Networks (IJCN), Volume 3, Issue 5, pp 247-255, 2011.
9. BhushanLalSahu, Rajesh Tiwari, “A Comprehensive study on cloud computing”, Internatioinal Journal Of Advanced Research in Computer Science and Software Engineering,Volume 2,Issue 9,September 2012 .
10. Ertaul L, Singhal S, Gokay S, “Security challenges in Cloud Computing”, International conference on Security andManagement SAM’10. CSREA Press, Las Vegas, US, pp 36–42,2010.
11. Grobauer B, Walloschek T, Stocker E, “ Understanding Cloud Computing vulnerabilities”, IEEE Security Privacy, 2011.
12. Ajay Jangra, RenuBala “Spectrum of Cloud Computing Architecture: Adoption and Avoidance Issues”, International Journal of Computing and Business Research, Volume 2, Issue 2, May 2011.
13. C. Braun, M. Kunze, J. Nimis, and S. Tai, “Web-based Dynamic IT-Services”,SpringerVerlag, Berlin, Heidelberg, 2010.
|
115-118

|
20.
|
Authors:
|
Sathya Jose. S. L , K. Sivaraman
|
Paper Title:
|
Modified SDROM Filter
|
Abstract: Noise is any unwanted component in an image. It is important to eliminate noise in the images before some subsequent processing, such as edge detection, image segmentation and object recognition. This work mainly concentrates on automatic detection and efficient removal of impulse (salt and pepper) noise. For automatic detection of impulse noise, a method based on probability density function is proposed. The basic idea of automatic detection is that the difference between the probabilities of black and white pixels will be small. After detecting the presence of impulse noise in an image, we have to remove that noise. For the removal of impulse noise a new efficient impulse noise removal method (Modified SDROM filter) is proposed. The Modified SDROM consists of two parts 1) Impulse detector and 2) Filter. The results show that this method has higher performance than other methods in terms of PSNR values and SSIM-Index values.
Keywords: impulse noise, probability density function, PSM Filter, SDROM Filter, PWMAD Filter, Modified SDROM, PSNR, SSIM Index.
References:
1. Keiko Kondo, Miki Haseyama and Hideo Kitajima”An Accurate Noise Detector for Image Restoration”, Proc. of 2002 IEEE International Conference On Image Processing, , Vol.1, pp.321-324, 2002.
2. Z.Wang and D.Zhang,”Progressive switching median filter for the removal of impulsenoise from highly corrupted images”, IEEE Trans. Circuits and Syst.II, Analog and Digital Signal Processing,vol.46,pp.78-80,January 1999.
3. E. Ahreu and S. K. Mitra, “A signal-dependent rank ordered mean (SDROM) filter-A new approach for removal of impulses from highly corrupted images,” in Proc. Int. Conf Acoust. Speech Signal Processing, Detroit, MI, vol. 4, May 1995, pp. 2371-2374.
4. Vladimir Crnojevic´, Vojin ˇSenk , Željen Trpovski,,”Advanced impulse detection based on Pixel-Wise MAD (PWMAD)”, IEEE Signal Processing Letters, Vol. 11, No. 7, July 2004,pp.589-592.
5. Handbook of Image & Video Processing, Academic Press Series in Communications, Networking, and Multimedia, Editor AL Bovik.
6. Digital Image Processing, Second Edition, Rafael .C. Gonzalez, Richard .E. Woods, Pearson Education, inc., 2002.
7. Fundamentals of Digital Image Processing, A.K.Jain, Prentice Hall of India Private Limited, New Delhi, 2002.
8. Digital Image Processing, Third Edition, William .K. Pratt, John Wiley & Sons (Asia), INC 2004.
|
119-122

|
21.
|
Authors:
|
Jeena R S, Sukesh Kumar A
|
Paper Title:
|
GUI Based Model for Stroke Prediction
|
Abstract: The innovations in the field of artificial intelligence have paved way to the development of tools for assisting physicians in disease diagnosis and prognosis. Stroke is a leading cause of disability in developing countries like India. Early diagnosis of stroke is required for reducing the mortality rate. Research shows that various physiological parameters carry vital information for the prediction of stroke. This research work focuses on the design of a graphical user interface (GUI) for the prediction of stroke using risk parameters. Data collected from International Stroke Trial database was successfully trained and tested using Support vector machine (SVM). The linear kernel of SVM gave an accuracy of 90 %. This work has been implemented in MATLAB which can be used to predict the probability of occurrence of stroke.
Keywords: Stroke, Graphical User Interface (GUI), Support Vector machine (SVM)
References:
1. Subha PP,Pillai Geethakumari SM, Athira M, Nujum ZT, Pattern and risk factors of stroke in the young among stroke parients admitted in medical college hospital, Thiruvananthapuram., Ann indian Acad Neurol 2015;18:20-3.
2. Barry L. Zaret, M.D., Marvin Moser, M.D., Lawrence S. Cohen, Chapter 18 Stroke – Lawrence M. Brass, M.D. (pgs 215-234)
3. MacMahon S, Rodgers A. The epidemiological association between blood pressure and stroke: implications for primary and secondary prevention. Hypertens Res. 1994;17(suppl 1):S23-S32.
4. Shinton R, Beevers G. Meta-analysis of relation between cigarette smoking and stroke. BMJ
5. Benjamin EJ, Levy D, Vaziri SM, D’Agostino RB, Belanger AJ, Wolf PA. Independent risk factors for atrial fibrillation in a population-based cohort: the Framingham Heart Study. JAMA. 1994;271:840-844
6. Saangyong Uhmn, Dong-Hoi Kim, Jin Kim, Sung Won Cho, Jae Youn Cheong, “Chronic Hepatitis Classification Using SNP Data and Data Mining Techniques”, Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007,pp.81 – 86 , 11-13 Oct. 2007B. Smith, “An approach to graphs of linear forms
(Unpublished work style),” unpublished.
7. S. Bhatia, P. Prakash and G.N. Pillai, SVM based Decision Support System for Heart Disease Classification with Integer-coded Genetic Algorithm to select critical features, Proceedings of the World Congress on Engineering and Computer Science, San Francisco, USA, pp.34-38, 2008.
8. Yanwei Xing, Jie Wang and Zhihong Zhao Yonghong Gao 2007 “Combination data mining methods with new medical data to predicting outcome of Coronary Heart Disease” Convergence Information Technology, 2007. International Conference November 2007, pp 868-872.
9. Jianxin Chen, Guangcheng Xi, Yanwei Xing, Jing Chen, and Jie Wang 2007 “Predicting Syndrome by NEI Specifications: A Comparison of Five Data Mining Algorithms in Coronary Heart Disease” Life System Modeling and Simulation Lecture Notes in Computer Science, pp 129-135
10. Alexopoulos, E., Dounias, G.D., and Vemmos, K. (1999). “Medical diagnosis of stroke using inductive machine learning”. In Proceedings of Workshop on Machine Learning in Medical Applications, Advance Course in Artificial Intelligence-ACAI99, Chania, Greece, 20-23.
11. C. Cortes and V. Vapnik, “Support-vector networks,” Machine learning,vol. 20, no. 3, pp. 273–297, 1995..
12. Sandercock, Peter; Niewada, Maciej; Czlonkowska, Anna. (2011). International Stroke Trial database (version 2), University of Edinburgh. Department of Clinical Neurosciences.
13. Jeena R S, Dr Sukesh Kumar A, ’Stroke Prediction using SVM’, Proceedings on International Conf. on Control, Instrumentation, Communication and Computational Technologies, (ICCICCT-2016),Tamil Nadu
|
123-125

|
22.
|
Authors:
|
Neha Mahakalkar, Vaishali Sahare
|
Paper Title:
|
Survey on Privacy Preserving Authentication Protocol in Cloud Computing
|
Abstract: Cloud computing provides facilities of shared computer processing resources and data to computers and other device on demand. System environment will develop by using three key entities trusted third party, data owner and user. The concept of shared authority based privacy preserving authentication protocol i.e., SAPA used to develop system to perform shared access in multiple user. Security and privacy issue as well as shared access authority will be achieve by using access request matching mechanism e.g. authentication, user privacy, user can only access its own data fields. The multiple users want to share data so that purpose re-encryption is used to provide high security for user private data. Universal Composability (UC) model use to prove that design of SAPA correctness. Develop a system with high security and attack free by analysing different attack related to the system. Privacy preserving data access authority sharing is attractive for multi user collaborative cloud applications
Keywords: authentication, security, shared access and cloud computing
References:
1. Hong Liu, Huansheng Ning, Qingxu Xiong, Laurence T. Yang, “Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing”, IEEE transactions on parallel and distributed systems, vol. 26, no. 1, january 2015.
2. Xuefeng Liu, Yuqing Zhang, Boyang Wang, and Jingbo Yan,” Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud, IEEE transactions on parallel and distributed systems, vol. 24, no. 6, june 2013.
3. Mohamed Nabeel, Ning Shang, Elisa Bertino,”Privacy Preserving Policy-Based Content Sharing in Public Clouds , IEEE transactions on knowledge and data engineering, vol. 25, no. 11, november 2013.
4. Smitha Sundareswaran, Anna C. Squicciarini, “Ensuring Distributed Accountability for Data Sharing in the Cloud”, IEEE transactions on dependable and secure computing, vol. 9, no. 4, july/august 2012.
5. Mishra, R. Jain, and A. Durresi, “Cloud Computing: Networking and Communication Challenges,” IEEE Comm. Magazine, vol. 50, no. 9, pp. 24-25, Sept. 2012.
6. R. Moreno-Voz media no, R.S. Montero, and I.M. Llorente, “Key Challenges in Cloud Compute into Enable the Future Internet of Services,” IEEE Internet Computing, vol.17, no.4, pp.1825 July/Au 2013.
7. Privacy-preserving Authentication Protocol in Cloud Computing”,10.1109/TPDS.2014.2308218, IEEE Transactions on Parallel and Distributed Systems,2015
8. Chia-Mu Yu, Chi-Yuan Chen, and Han Chieh Chao “Proof of Ownership in Deduplicated Cloud Storage with Mobile Device Efficiency”, IEEE Network March/April 2015.
|
126-127

|
23.
|
Authors:
|
Jerrin Thomas Panachakel
|
Paper Title:
|
Automatic Eigen Face Method
|
Abstract: Muzzle print recognition is the process of finding any muzzle in the image. It is a two-dimension procedure used for detecting muzzles and analyzing the information contained in the muzzle image. Here the muzzle images are projected to a feature space or face space to encode the variation between the known muzzle images. In this paper Principal Component Analysis (PCA) is used for dimension reduction and the projected feature space is formed using fuzzy algorithm. The above method can be used to recognize a new muzzle in unsupervised manner.
Keywords: Muzzle Print, Principal Component Analysis (PCA), Membership Function.
References:
1. Brendan Barry, Ursula Gonzales Barron, Kevin McDonnell, Shane Ward “The use of muzzle pattern for biometric Identification of cattle”, Biosystems Engineering, University College Dublin, Earlsfort Terrace, Dublin 2, Ireland, 2002
2. J. Marchant, “Secure Animal Identification and Source Verification”, J M Communications 2002, UK
3. Kimura A, Itaya K, “Structural Pattern Recognition of Biological Textures with Growing Deformations:A case of Cattles Muzzle prints”, Electronics and Communications in Japan, part 2, 87(5):54-65, 2004.
4. Turk M, and Pentland A, “Eigenfaces for recognition” Cognitive Neuro Science, 2(1):71-86, 1991.
5. Wahab, S. H. Chin, E. C. Tan, “Novel approach to automated fingerprint recognition”, IEE Trans. Image Signal Process, Vol. 145, No. 3, June 1998.
|
128-130

|
24.
|
Authors:
|
Komati Sathish
|
Paper Title:
|
A Study on Check Pointing Protocols for Mobile Distributed Systems
|
Abstract: A large number of distributed checkpointing protocols have appeared in the literature.a distributed checkpointing protocol could be the best in a specific environment, but not in another environment.Distributed snapshots are an important building block for distributed systems and are useful for constructing checkpointing protocols among other users. Communication-Induced Checkpointing protocols are classified into two categories in the literature: Index-based and Model-based.Recently, more attention has been paid to providing checkpointing protocols for mobile systems. check point is defined as a designated place in a program at which normal processing is interrupted specifically to preserve the status information necessary to allow resumption of processing at a later time. This paper surveys the protocols which have been appeared in the literature for checkpointing in mobile distributed systems.
Keywords: Checkpoint/restart, checkpointing protocols, Distributed systems, rollback recovery, fault tolerant computing
References:
1. Ch.D.V.Subba Rao and MM Naidu : A new efficient coordinated checkpointing protocol combined with selective sender based message logging , IEEE,2008.
2. Acharya and B.R.Badrinath, checkpointing distributed Applications on Mobil computers,proc.3rd Int’l conf.parallel and distributed Information systems, sept.1994.
3. R.Prakash and M.Singhal, “Low-cost checkpointing and failure recovery in mobile computing systems,” IEEE Trans.parallel and distributed systems pp.1035-1048,oct 1996
4. Lalit kumar p.kumar “A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach” Int.Journal of information and computer society 2007.
5. G.H.Forman and J.Zahorjan, The changes of Mobile computing ,computer pp 38-47,Apr-1994
6. Ms.Pooja Sharma and Dr.Ajay khuntala ” A survey of checkpointing Algorithm in Mobile Ad Hoc Network”Globl Journal of Computer Science and Technolgy 2012.
7. Sarmistha Neogy,Anupam siha,pradip k Das ,CCMUL: A Checkpoinying protocol for distributed system processes,IEEE,2004.
8. B.bhargava,S.R.Lian “Independent checkpointing and concurrent rollback for recovery in distributed systems-An Optimistic approach”. proc 7th IEEE Symp.Rliable Distributed syst. pp 3-12 1988 oct.
9. L. Alvisi, E.N. Elnozahy, S. Rao, S. A. Husain and A. Del Mel. “An analysis of communication-induced checkpointing.” In Proceedings of the Twenty Ninth International Symposium on Fault-Tolerant Computing, Jun. 1999.
10. D.B. Johnson. “Distributed system fault tolerance using message logging and checkpointing.” Rice University, Dec. 1989.
11. S. Mishra and D. Wang. Choosing an Appropriate Checkpointing and Rollback Recovery Algorithm for LongRunning Parallel and Distributed Applications. In 11th ISCA International Conference on Computers and their Applications, San Francisco, CA, March 1996
12. J. S. Plank and M. G. Thomason. Processor allocation and checkpoint interval selection in cluster computing systems. Journal of Parallel and Distributed Computing, 61(11):1570–1590, November 2001.
13. K. S. Trivedi. Probability and Statistics with Reliablity, Queuing, and Computer Scince Applications. Prentice-Hall, USA, 1982.
14. Nitin Vaidya. On Checkpoint Latency. In Pacific Rim International Symposium on Fault-Tolerant Systems, Newport Beach, December 1995.
15. Nitin H. Vaidya. Another Two-Level Failure Recovery Scheme: Performance Impact of Checkpoint Placement and Checkpoint Latency. Technical Report TR94-068, Deprt. of Computer Science, Texas A&M University, 1994.
16. Y. M. Wang. Consistent Global Checkpoints that Contain a Given Set ofCheckpoints. IEEETransactions on Computers, 42(4):456–486, April 1997.
17. Ziv and J. Bruck. Analysis of Checkpointing Schemes for Multiprocessor Systems. In Proceeding ofthe 13th Symposium on Reliable Distributed Systems, pages 52–61, 1994.
18. Ziv and J. Bruck. Efficient checkpointing over local area network. In IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, June 1994.
|
131-134

|
25.
|
Authors:
|
Babak Mehravaran, Hossein Ansari, Ali Asghar Beheshti
|
Paper Title:
|
Nozzle Filter Modification for Water Pre-Treatment Technology In Water Treatment Plants (Case Study: Toroq Water Treatment Plant)
|
Abstract: Nozzle filtration can be considered as a major pre-treatment process for water and waste water, since they efficiency separate fine solids particles over prolonged periods without addition of chemicals. Proper nozzle performance can reduce operating costs, reduce maintenance costs, and improve cleaning quality. this review article summarized and evaluates modification to nozzle filtration technology .achieved results in this study shows that nozzle filtration may be considered as efficient pre-treatment process incase surface water is used as water supply. With pass of muddy water sample due to current rainfall in stilling basin of Toroq water treatment plant from nozzle filters in laboratory pilot, Turbidity Removal efficiency and also Suspended solids equal 9.6% and 86% respectively was obtained .And the results of Additional tests represent that Turbidity Removal and also solid suspensions efficiency by nozzle filters due to algae making inlet water to Toroq water treatment plant in warm seasons is 4/6% and 47% respectively The obtained results of the study indicate that use nozzle filters caused Increase the efficiency of the process water treatment, and it is prevents from emergency exits the Toroq water treatment plant.
Keywords: Nozzle filter, Muddy water, Algae water, Suspended solids, turbidity.
References:
1. Herron. A. Hope, & Dabelko, Geoffrey, (2006),“ Introduction: Water Stories”, Water Stories: Expanding Opportunities in Small-Scale Water and Sanitation Projects, pp 1-8, Woodrow Wilson International Center for Scholars
2. P .SanjivKanade, S. Someshwar, Bhattacharya ,(2016),Chapter 1- Introduction to Water World A Guide to Filtration with String Wound Cartridges, 2016, Pages 1-10,
3. Q . Shen, J. Zhu, L .Cheng, J. Zhang, Z. Zhang, X. Xu,(2011), Enhanced algae removal by drinking water treatment of chlorination coupled with coagulation, Desalination, Volume 271, Issues 1–3, 15 April 2011, Pages 236-240
4. R. Srinivasan, G. A. Sorial ,(2011),Treatment of tast and odor causing compounds 2-methyl isoborneol and geosmin in drinking water: A critical review, Journal of Environmental Sciences, Volume 23, Issue 1, January 2011, Pages 1-13
5. A.J. Englande Jr., P. Krenkel, J. Shamas, Reference Module in Earth Systems and Environmental Sciences,
6. T. Sparks, (2012), filter Design, Pages 81-124
7. K.Sutherland,(2008), Types of Filter, Filters and Filtration Handbook (Fifth Edition), 2008, Pages 97-207
8. T. Sparks, G. Chase,(2016),Filters and Filtration Handbook (Sixth Edition), 2016, Pages 55-115
9. Department of the Environment, (1990), Cryptosporidium in Water Supplies: Report of the Group of Experts. Chairman: Sir John Badenoch. HMSO, London.
10. Department of the Environment (1994) Proceedings of Workshop on Cryptosporidium in Water Supplies. Edited by A. Dawson and A Lloyd. HMSO, London.
11. Smethurst, George (1990) Basic Water Treatment. Second Edition, Thomas Telford Ltd., London .
12. American Water works Association. Water Quality and Treatment A Handbook of Community Water Supplies, Fourth Edition . A .W.W.A., 6666 W. Quincy Ave., Denver, CO 80235.
13. C .Twort, Law, F. M., Crowley, F. W., and Ratanayaka , D.D., (1994), Water Supply. 4th Edition. Edward Arnold, London.
14. European Communities (Quality of Water Intended for Human Consumption ) Regulations 1988. (S. I. No 84 of 1988) Stationary Office, Dublin.
15. Code of Practice for the Safety, Health and Welfare at Work (Chemical Agents) Regulations, 1994, (S.I. No. 445 of 1994). Stationery Office, Dublin
16. Peavey, Howard, Rowe, Donald and Tchobanoglous (1986) Environmental Engineering Mc Graw – Hill, New York.
17. Flanagan, P.J., (1992) Parameters of Water Quality –Interpretation and Standards. Second Edition. Environmental Research Unit, Dublin.
18. Engineering School, UCD (1972). Course Notes – Water Quality Management. Department of Civil Engineering, University College, Dublin.
19. Safety, Health and Welfare at Work Act, 1989 (No. 7 of 1989). Stationery Office, Dublin.
20. US EPA (1994) Water Treatment Plant Operation Volume 1: A Field Study Training Program. Third Edition
21. Supplies. Fourth Edition. A. W.W.A., 6666 W. Quincy Ave., Denver, CO 80235. Edward Arnold, London.
22. Department of the Environment (1990). Cryptosporidium in Water Supplies: Report of the Group of Experts. Chairman: Sir John Badenoch. HMSO, London.
23. T.Pujol, G. Arbat, J. Bove, J. Puig-Bargues, M. Duran-Ros, J. Velayos, F. Ramírez de Cartagena ,(2016), Effects of the underdrain design on the pressure drop in sand filters,Biosystems Engineering, Volume 150,Pages 1-9
24. M. Boller (1993), Filter mechanisms in rousing filters;j water Supply Res. Technol. Aqua. 42(3): 174-85.
25. M. Wegelin. (1996). Surface water treatment. A design, construction and operation manual, Swiss Federal Institute for environmental science and Technology (EAWAG) and department water and Sanitation in developing countries (SANDEC)
|
135-140

|
26.
|
Authors:
|
Yao-Wen Tsai, Cong-Trang Nguyen
|
Paper Title:
|
Finite Time Sliding Mode Controller based on Reduced-Order Observer for the Mismatched Uncertain Systems with a Time Delay
|
Abstract: This paper presents the design of the finite time sliding mode controller based on reduced order observer for time-delay systems with mismatched uncertainties. The main achievements of work are: (1) a suitable reduced order observer (ROO) is constructed to estimate the unmeasurable state variables, (2) a finite time sliding mode controller (FTSMC) is designed by employing the estimated variables, and (3) by the application of the Lyapunov stability theory and the linear matrix inequality (LMI) technique, the stability of the overall closed-loop mismatched uncertain systems with a time delay is guaranteed in sliding mode under sufficient condition. Finally, the design procedure is given to summarize the proposed method.
Keywords: Variable Structure Control (VSC), reduced- order observer (ROO), finite-time convergence, mismatched uncertainty, time-varying delay.
References:
1. J . Y. Hung, W. Gao, and J. C. Hung, “Variable structure control: A survey,” IEEE Trans. on Indus. Electro., vol. 40, 1993, pp. 2–22.
2. S. H. Zak, Systems and Control, New York: Oxford Univ. Press, 2003.
3. Z. He, X. Wang, Z. Gao, and J. Bai, “Sliding mode control based on observer for a class of state-delayed switched systems with uncertain perturbation,” Mathematical Problems in Engineering, vol. 2013, Article ID 614878, 2013, 9 pages.
4. S.-H. Tsai, and Y.-H. Chang,“Sliding Mode Control for A Class of Uncertain Time-Delay System,”Ap. Mathematics and Infor. Sci., 2015, pp. 267-273.
5. H. Li, P. Shi, D. Yao, and L. Wu, “Observer-based adaptive sliding mode control for nonlinear Markovian jump systems,” Automatica, vol. 64, Feb. 2016, pp. 133–142.
6. Z. Liu, L. Zhao, Y. Kao, and C. Gao, “Robust passive control for a class of uncertain neutral systems based on sliding mode observer,” ISA Transactions, http://dx.doi.org/10.1016/j.isatra.2016.10.013, 2016.
7. Boulaabi, A. Sellami, and F.B. Hmida, “A robust sensor fault reconstruction based on a new sliding mode observer design method for uncertain delayed systems: A satellite system application,” J. of Con. Engineering and Ap. Informatics, vol. 17, 2015, pp. 88–97.
8. C.T. Chen and S. T. Peng, “A sliding mode control scheme for non-minimum phase non-linear uncertain input-delay chemical processes,” J. of Process Control, vol. 16, 2006, pp. 37–51.
9. Rezoug, B. Tondu, M. Hamerlain, and M. Tadjine, “RBFNN-HOMS Non-singular Terminal Sliding Control of n-DOF Robotic Manipulator,” J. of Control Engineering and Ap. Infor., vol. 18, 2016, pp. 52–62.
10. S. C. Garcia, M. C. M. Teixeira, J. P. F. Garcia, U. N. L. T. Alves, and J. M. S. Ribeiro, “Discrete-Time Sliding Mode Control for Uncertain Networked System Subject to Time Delay,” Mathematical Problems in Engineering, vol. 2015, Article ID 195120, 2015, 10 pages.
11. Q. Zhang, “Adaptive observers for multiple–input–multiple–output (MIMO) linear time-varying systems,” IEEE Trans. Autom. Control, vol. 47, Mar. 2002, pp. 525–529.
12. J. Koshkouei, K. J. Burnham,“Discontinuous Observers for Nonlinear Time-Delay Systems,”Int. J. Systems Science, vol. 40, 2009.
13. F. J. Bejarano and A. Pisano, “Switched observers for switched linear systems with unknown inputs,” IEEE Trans. Automat. Control, vol. 56, Mar. 2011, pp. 681–686.
14. F. Zhu, “State estimation and unknown input reconstruction via both reduced-order and high-order sliding mode observers,” J. Process Control, vol. 22, 2012, pp. 296-302.
15. L. Wu and J. Lam, “Sliding mode control of switched hybrid systems with time-varying delay,” Int. J. Adapt. Control Signal Process., vol. 22, 2008, pp. 909–931.
16. J. Lian, J. Zhao, and G. M. Dimirovski, “Robust H∞ sliding mode control for a class of uncertain switched delay systems,” Int. J. Syst. Sci., vol. 40, 2009, pp. 855–866.
17. M. Pai,“Observer-based adaptive sliding mode control for nonlinear uncertain state-delayed systems,”International J. of Control, Auto., and Sys., vol. 7, 2009, pp.
536-544.
18. L. Liu, Z. Han, and W. Li, “H∞ non-fragile observer-based sliding mode control for uncertain time-delay systems,” J. Franklin Inst., vol. 347, 2010, pp. 567–576.
19. S. Boyd, L. El. Ghaoui, E. Feron, and V. Balakrishnan, Linear Matrix Inequalities in Systems and Control Theory, Philadelphia, PA: SIAM, 1994.
20. P. Gahinet, A. Nemirovskii, A. J. Laub, and M. Chilali, LMI Control Toolbox, Natick, MA: The MathWorks, Inc, 1994.
21. Y. W. Tsai and V. V. Huynh, “Output Feedback and Single-Phase Sliding Mode Control for Complex Interconnected Systems,” Mathematical Problems in Engineering, vol. 2013, Article ID 946385, 2015, 16 pages.
22. S. Sayyaddelshad and T. Gustafsson, “H∞ observer design for uncertain nonlinear discrete-time systems with time-delay: LMI optimization approach,” Inter. J. of Robust and Nonlinear Control, vol. 25, 2015, pp. 1514–1527.
23. O. M. E. El-Ghezawi, A. S. I. Zinober, and S. A. Billings, “Analysis and design of variable structure systems using a geometric approach,” International J. of Control, vol 38, 1983, pp. 657-671.
24. S. H. Zak and S. Hui, “On variable structure output feedback controllers,” IEEE Trans. Autom. Control, vol. 38, 1993, pp. 1509–1512.
25. K. Gu, V. L. Kharitonov, and J. Chen, Stability of Time-delay Systems, Birkh¨auser: Boston, 2003.
26. X. G. Yan, S. K. Spurgeon, and C. Edwards, “Static output feedback sliding mode control for time-varying delay systems with time-delayed nonlinear disturbances,” Inter. J. Robust Nonlinear Control, vol. 20, 2010, pp. 777–788.
|
141-148

|
27.
|
Authors:
|
Krishna Samalla
|
Paper Title:
|
A Novel Algorithm for Multiple Data Sharing Via Cloud Storage
|
Abstract: As the way that computing concepts gives the cloud computing, which permits once needed and low maintenance usage of resources, but the information is shares to some cloud servers and numerous privacy connected considerations emerge from it .Various schemes like primary based on the attribute based encoding are developed to secure the cloud storage. Most of the work looking at the information privacy and therefore the access management, while less attention is given to the privilege management and the privacy. An economical scientific discipline approach for information sharing wherever information is shared among a bunch of users as information. How to firmly and with efficiency share a group of information associated with any subject areas with others in cloud storage. Development of new novel concept of Key Aggregate Searchable cryptography (KASE). This concept is enforced through development of a concrete key-aggregate searchable cryptography framework theme. This scheme is delineate as wherever knowledge an information owner solely has to generate and distribute one mixture key to a data user for sharing an outsized variety of documents and on the opposite aspect user solely has to submit one mixture trapdoor to the cloud server, so that he/she will question over the shared documents by the assistance of generated single mixture trapdoor. Advanced Key sharing system based on hint text methodology is created to share the information safely. Once the data sharing is completed then the key combination differs from its actual kind. So the user cannot guess the key combination cryptosystem and this method provides economical answer than the prevailing ones.
Keywords: Data Security, Cloud, Integrity, Bulk Request, Bulk Response, Dynamic Keys.
References:
1. Cloud-Storage,http://www.thetop10bestonlinebackup.com/cloudstorage.
2. Amazon Web Services (AWS), http://aws.amazon.com.
3. Google App Enginehttp://code.google.com/appengine/.
4. S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing”, Proc. IEEE INFOCOM, pp. 534-542, 2010..
5. X. Liu, Y. Zhang, B. Wang, and J. Yan. “Mona: secure multi-owner data sharing for dynamic groups in the cloud”, IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191.
6. C. Chu, S. Chow, W. Tzeng, et al. “Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage”, IEEE Transactions on Parallel and Distributed Systems, 2014, 25(2): 468- 477.
7. X. Song, D. Wagner, A. Perrig. “Practical techniques for searches on encrypted data”, IEEE Symposium on Security and Privacy, IEEE Press, pp. 44C55, 2000.
8. R. Curtmola, J. Garay, S. Kamara, R. Ostrovsky. “Searchable symmetric encryption: improved definitions and efficient constructions”, In: Proceedings of the 13th ACM conference on Computer and Communications Security, ACM Press, pp. 79- 88, 2006.
9. P. Van,S. Sedghi, JM. Doumen. “Computationally efficient searchable symmetric encryption”, Secure Data Management, pp. 87-100, 2010.
10. S. Kamara, C. Papamanthou, T. Roeder. “Dynamic searchable symmetric encryption”, Proceedings of the 2012 ACM conference on Computer and communications security (CCS), ACM, pp. 965-976, 2012.
11. D. Boneh, C. G, R. Ostrovsky, G. Persiano. “Public Key Encryption with Keyword Search”, EUROCRYPT 2004, pp. 506C522, 2004.
12. Y. Hwang, P. Lee. “Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System”, In: Pairing-Based Cryptography C Pairing 2007, LNCS, pp. 2-22, 2007.
13. J. Li, Q. Wang, C. Wang. “Fuzzy keyword search over encrypt-ed data in cloud computing”, Proc. IEEE INFOCOM, pp. 1-5, 2010.
14. C. Bosch, R. Brinkma, P. Hartel. “Conjunctive wildcard search over encrypted data”, Secure Data Management. LNCS, pp. 114-127, 2011
15. C. Dong, G. Russello, N. Dulay. “Shared and searchable encrypted data for untrusted servers”, Journal of Computer Security, pp. 367-397, 2011.
16. F. Zhao, T. Nishide, K. Sakurai. “Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control”. Information Security and Cryptology, LNCS, pp. 406-418, 2012.
17. J. W. Li, J. Li, X. F. Chen, et al. “Efficient Keyword Search over Encrypted Data with Fine-Grained Access Control in Hybrid Cloud”, In: Network and System Security 2012, LNCS, pp. 490-502, 2012.
18. J. Li, K. Kim. “Hidden attribute-based signatures without anonymity revocation”, Information Sciences, 180(9): 1681- 1689, Elsevier, 2010.
19. X.F. Chen, J. Li, X.Y. Huang, J.W. Li, Y. Xiang. “Secure Outsourced Attribute-based Signatures”, IEEE Trans. on Parallel and Distributed Systems,
DOI.ieeecomputersociety.org/10.1109/TPDS.2013.180, 2013.
20. J.Li, X.F. Chen, M.Q. Li, J.W. Li, P. Lee, Wenjing Lou. “Secure Deduplication with Efficient and Reliable Convergent Key Management”, IEEE Transactions on Parallel and Distributed Systems, 25(6): 1615-1625, 2014. [22] Z. Liu, Z. Wang, X. Cheng, et al. “Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud”, Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), IEEE, pp. 249- 255, 2013.
21. C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing”, Proc. IEEE INFOCOM, pp. 525-533, 2010.
22. B. Wang, B. Li, and H. Li, “Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud”, Proc. 10th Intl Conf. Applied Cryptography and Network Security, pp. 507-525, 2012.
23. D. Boneh, C. Gentry, B. Waters. “Collusion resistant broadcast encryption with short ciphertexts and private keys”, Advances in Cryptology CCRYPTO 2005, pp. 258-275, 2005.
|
149-153

|
28.
|
Authors:
|
Ahmed Shany Khusheef, Abdulkareem Shaheed Sabr
|
Paper Title:
|
| | |