Volume-2 Issue-4

  • Version
  • Download 190
  • File Size 4.00 KB
  • Create Date August 31, 2017
  • Download

 Download Abstract Book

S. No

Volume-2 Issue-4, April 2013, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Asmeeta Mali

Paper Title:

Investigation and Analysis of Efficient Pattern Discovery Method for Text Mining

Abstract:    The concept of text mining is nothing but the mechanism of extracting non-trivial and interesting data from the unstructured text dataset. Text mining is consisting of many computer science disciplines with highly oriented towards the artificial intelligence in general such as the applications like information retrieval, pattern recognition, machine learning, natural language processing, and neural networks. The main difference between the search and text mining is that, search needs users attentions means based users requirement search action will perform whereas text mining is the internal process which attempts to find out information in the pattern which is not known before. To do the text mining, there are many methods presented still to the date those are having their own advantages and disadvantages. The major problems related to such techniques are efficient use and update of discovered patterns, problems related to the synonymy and polysemy etc. In this paper we are investigating the one such method which is presented to overcome above said problems related to the text mining’s. The method presented here is based on innovative as well as effective pattern discovery technique and this consisting of processes like  pattern deploying and pattern evolving in order to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information.

  Pattern recognition, text mining, knowledge discover, KDD.


1.        K. Aas and L. Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999.
2.        R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94), pp. 478-499, 1994.

3.        H. Ahonen, O. Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Mining Techniques for Descriptive Phrase Extraction in Digital Document Collections,” Proc. IEEE Int’lForum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11, 1998.

4.        R. Baeza-Yates and B. Ribeiro-Neto, Modern Information Retrieval.Addison Wesley, 1999.

5.        N. Cancedda, N. Cesa-Bianchi, A. Conconi, and C. Gentile,“Kernel Methods for Document Filtering,” TREC, trec.nist.gov/ pubs/trec11/papers/kermit.ps.gz, 2002.

6.        N. Cancedda, E. Gaussier, C. Goutte, and J.-M. Renders, “Word-Sequence Kernels,” J. Machine Learning Research, vol. 3, pp. 1059- 1082, 2003.

7.        M.F. Caropreso, S. Matwin, and F. Sebastiani, “Statistical Phrasesin Automated Text Categorization,” Technical Report IEI-B4-07- 2000, Instituto di Elaborazione dell’Informazione, 2000.

8.        C. Cortes and V. Vapnik, “Support-Vector Networks,” MachineLearning, vol. 20, no. 3, pp. 273-297, 1995.

9.        S.T. Dumais, “Improving the Retrieval of Information fromExternal Sources,” Behavior Research Methods, Instruments, and Computers, vol. 23, no. 2, pp. 229-236, 1991.

10.     J. Han and K.C.-C. Chang, “Data Mining for Web Intelligence,”Computer, vol. 35, no. 11, pp. 64-70, Nov. 2002.

11.     J. Han, J. Pei, and Y. Yin, “Mining Frequent Patterns withoutCandidate Generation,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’00), pp. 1-12, 2000.

12.     Y. Huang and S. Lin, “Mining Sequential Patterns Using GraphSearch Techniques,” Proc. 27th Ann. Int’l Computer Software and Applications Conf., pp. 4-9, 2003.

13.     N. Jindal and B. Liu, “Identifying Comparative Sentences in TextDocuments,” Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006.

14.     T. Joachims, “A Probabilistic Analysis of the Rocchio Algorithm with tfidf for Text Categorization,” Proc. 14th Int’l Conf. Machine Learning (ICML ’97), pp. 143-151, 1997.

15.     T. Joachims, “Text Categorization with Support Vector Machines:Learning with Many Relevant Features,” Proc. European Conf. Machine Learning (ICML ’98),, pp. 137-142, 1998.

16.     T. Joachims, “Transductive Inference for Text Classification Using Support Vector Machines,” Proc. 16th Int’l Conf. Machine Learning(ICML ’99), pp. 200-209, 1999.

17.     W. Lam, M.E. Ruiz, and P. Srinivasan, “Automatic Text Categorization and Its Application to Text Retrieval,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 6, pp.865-879, Nov./Dec. 1999. IEEE Trans. Knowledgeand Data Eng., vol. 11, no. 6, pp. 865-879, Nov./Dec. 1999.

18.     D.D. Lewis, “An Evaluation of Phrasal and Clustered Representations on a Text Categorization Task,” Proc. 15th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’92), pp. 37-50, 1992.





Shashi Kant Dargar, Himanshu Purohit, S C Mahajan

Paper Title:

An Iterative Pruning Approach of Neural Network for Proficient Noise Cancellation

Abstract:    For Active Noise Cancellations various algorithms run and result in standard output and better performance. Technique to pruning is related to prune nonfunctional neuron’s (algorithm) from ANC network, which makes only best neurons responsible for noise cancellation. Neurons are classified as different algorithms. Performance of neurons depends upon instantaneous surrounding conditions. So a proficient novel approach for ANC has been proposed. The wiener filter based on least means squared (LMS) algorithm family is most sought after solution of ANC. This family includes LMS, NLMS, VSLMS, VSNLMS, VFXLMS, FX- sLMS and many more. Some of these are nonlinear algorithm, which provides better solution for non linear noisy environment. The components of the ANC systems like microphones and loudspeaker exhibit nonlinearities themselves. The non linear transfer function create worse situation. For example, FX-sLMS algorithm behaves well than the second order VFXLMS algorithm in conditions of non-minimum phase and most important is the mean square error. The classical approach to RBF implementation is to fix the number of hidden neurons based on some property of the input data, and estimate the weights connecting the hidden and output neurons using linear least square method.

   Least Mean Square; RBF neural network; Artificial neural Network, Filter bank design, ANC


1.       S.M. Kuo and D.R.Morgan, Active Noise Control –Algorithms and DSP Implementations. New York: Wiley, 1996.
2.       Lu Yingwei, N.Sundararajan, P.Saratchandran “Adaptive Nonlinear Systems Identification Using Minimal Radial Basis Function Neural Networks “in IEEE 1996.

3.       Shoji  Makino,  Member, IEEE, Yutaka  Kaneda, Member,  IEEE  and  Nobuo Koizumi, “Exponentially weighted step size NLMS adaptive filter based on the statistics  of  a  room  impulse  response”,  IEEE  Trans.  on speech and audio Processing, vol. 1, No.1, pp.101-108, Jan 1993.

4.       S. Qureshi, “Adaptive Equalization,” Proceedings of the IEEE, vol.73, No.9, pp.1349-1387, Sept. 1985.

5.       S. Haykins, “Adaptive Filter Theory”, Prentice Hall, New Jersey, 1996.

6.       Raymond H.  Kwong and Edward W. Johnston, “A Variable Step Size LMS Algorithm”, IEEE Transactions on Signal Processing vol. 40, No.7, pp. 1633-1642,   July, 1992.

7.       Tyseer Aboulnasr, Member, IEEE, and K.Mayyas, “A robust variable step size LMS   type   algorithm:  Analysis and Simulations”, IEEE Trans.  On Signal Processing vol. 45, No.3, pp. 631-639, March 1997.

8.       Debi Prasad Das ,”Filtered –s LMS Algorithm for Multichannel Active control Of Nonlinear Noise Processes” in IEEE Transactions on Speech And Audio Processing , vol 14 ,no.5 September 2006.

9.       Debi Das and Ganpati Panda, “Active Mitigation of Nonlinear Noise Processes Using A Novel Filtered-s LMS Algorithm” in IEEE Transactions of Speech and Audio Processing, vol. 12, No.3, May 2004





Surjan Singh, Dinesh Kumar, K. N. Rai

Paper Title:

Wavelet Collocation Solution for Convective Radiative Continuously Moving Fin with Temperature-Dependent Thermal Conductivity

Abstract:    In this paper, the temperature distribution in convective radiative continuously moving fin with variable thermal conductivity, which is loosing heat by simultaneous convection radiation to surroundings, is studied. We consider three particular cases, namely thermal conductivity is (I) constant (II) a linear function of temperature and (III) an exponential function of temperature. Wavelet Collocation Method is used to solve this nonlinear heat transfer problem. The exact solution obtained in absence of radiation- conduction fin parameter are compared with Wavelet Collocation solution are same. The fin efficiency is computed in absence of radiation- conduction fin parameter. The whole analysis is presented in dimensionless form and effect of different parameters such as thermal conductivity parameter ‘a’, Peclet number ‘Pe’, convection-conduction parameter ‘Nc’, radiation-conduction parameter ‘Nr’, dimensionless convection sink temperature ‘θa’ and dimensionless radiation sink temperature ‘θs’ on the fin temperature is discussed in detail.

   Wavelet, Collocation, Convection, Radiation, heat transfer, fin, Conductivity.


1.        D. Kraus, A. Aziz, J.R. welty, Extended Surface Heat Transfer (Wiley, New York, 2002)  
2.        M.V. Karwe, Y. Jaluria, Thermal transport from a heated moving surface, ASME Journal of  Heat Transfer 108       (1986)728-733.

3.        Y. Jaluria, A.P. Singh , Temperature distribution in a moving material subjected to surface   energy transfer, Computer Methods in Applied Mechanics and Engineering. 41 (1983) 145-156

4.        S. R. Choudhury, y. Jaluria, Analytical solution for the transient temperature distribution  in a moving rod or plate of finite length with surface heat transfer, International Journal of Heat and Mass Transfer 37(1994) 1193-1205.

5.        Mohsen Torabi,Hessameddin Yaghoobi and A. Aziz Analytical Solution for Convective-Radiative  Continuously Moving Fin with Temperature-Dependent Thermal Conductivity  Int. J. Thermophysics (2012) 33: 924-941.          

6.        A. Aziz, Robert J. Lopez , Convection-radiation from a continuously moving, variable thermal conductivity sheet or rod  undergoing thermal processing, I. J. of Thermal  Sciences 50 (2011) 1523-1531.                                                                       

7.        Abdul Aziz, F. Khani,  Convection-radiation from a continuously moving fin of variable thermal conductivity, J. of Franklin Institute 348 (2011) 640-651.                                                                                                                   

8.        M. Razzaghi and S. Yosefi,  the Legendre wavelets operational matrix of integration,  Int. J.  of Systems Science, (2001), vol.32, No.4, p- 495-502.





B.Gopinath, S.Suresh Kumar, Juvan Michael

Paper Title:

Unified Power Flow Controller (UPFC) for Dynamic Stability in Power System using Modern Control Techniques

Abstract:    Flexible AC Transmission System (FACTS) technology was introduced to overcome the operational difficulties with conventional method of power compensation. Unified Power Flow Controller (UPFC) is a sort of multi-function controller that can influence the transmission parameters individually or simultaneously. UPFC allows precise control of both real and reactive power flow in transmission line. This paper deals with the advanced control technique for UPFC to provide effective real and reactive power compensation. Adaptive Neuro Fuzzy Inference Controller (ANFIC) concept is introduced to control the system under different operating conditions. The system is tested on a 5-bus system. The computer simulations are done by MATLAB/SIMULINK.

   Adaptive Neuro Fuzzy Inference Controller, Flexible AC Transmission System, Fuzzy based PSO, Fuzzy-PI Controller, Particle swarm optimization algorithm.


1.       N. G. Hingorani and L. Gyugyi,“Understanding FACTS”, IEEE Press, 1999.
2.       Kalyan K. Sen, Member, IEEE Eric J. Stacey UPFC - Unified Power Flow Controller: Theory, Modeling, and Applications, IEEE Transactions on Power Delivery, Vol. 13, No. 4, October 1998

3.       Q. Yu, L. Norum, T. Undeland, and S. Round, “Investigation of dynamic controllers for a unified power flow controller,” in Proc. IEEE 22nd Int. Conf. Ind. Electron., Control Instrum., Taiwan, Aug. 1996,pp. 1764–1769.

4.       P. Papic, D. Povh, and M. Weinhold, “Basic control of unified power flow controller,” IEEE Trans. Power Syst., vol. 12, no. 4, pp. 1734–1739, Nov. 1997.

5.       H. Fujita, Y. Watanabe, and H. Akagi, “Control and analysis of a unified power flow controller,”IEEE Trans. Power Electron., vol. 14, no. 6, pp.  1021–1127, 1999.

6.       S. Mishra, P. K. Dash, and G. Panda, “TS-fuzzy controller for UPFC in a multimachine power system,” Proc. Inst. Elect. Eng., Gen. Transm. Distrib., vol. 147, no. 1, pp. 15–22, 2000.

7.       R. Orizondo, and R. Alves, Member, IEEE. UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs, 2006 IEEE PES Transmission and Distribution Conference and Exposition Latin America, Venezuela

8.       A. Edris, A. S. Mehraban, M. Rahman, L. Gyugyi, S. Arabi, and T. Reitman, “Controlling the flow of real and reactive power,” IEEE Comput. Appl. Power, vol. 11, no. 1, pp. 20–25, Jan. 1998.

9.       J. Shing and R. Jang, “ANFIS: Adaptive network-based fuzzy inference system,” IEEE Trans. Syst., Man Cybern., vol. 23, no. 3, pp. 665–685,May/Jun. 1993.

10.     Tamer S. Kamel M. A. Moustafa Hassan,Adaptive Neuro Fuzzy Inference System (ANFIS) For Fault Classification in the Transmission Lines, The Online Journal on Electronics and Electrical Engineering (OJEEE) Vol. (2) – No. (1)

11.     Sudath R. Munasinghe, Adaptive Neurofuzzy Controller to Regulate UTSG Water Level in Nuclear Power Plants, IEEE transactions on nuclear science, vol. 52, no. 1, 2005

12.     H.Shayeghi, H.A Shayanfar, A.Safari, “A PSO based unified power flow controller for damping of   power system oscillations”Elsevier,2009.





Neeraj Kumar, Amit Sharma

Paper Title:

A review on BPR and RSCM in an Auto Ancillary Industry: A Combined Thought

Abstract:    Ecological and fiscal issues have significant impacts on Reverse Supply Chain Management (RSCM) and are consideration to shape one of the developmental keystones of sustainable supply chain. Business Process Reengineering is a subterfuge- determined organizational inventiveness, basically reexamine and redesign business practice with the intention of accomplishing competitive step forward in quality, receptiveness, expenditure, customer fulfillment and other critical process performance measures. In this research paper we offer an appraisal of BPR vision focusing upon the use of informational techniques to facilitate a shift way from linear sequential work organization towards parallel work and multidisciplinary team work.

   Introduction, Review on Methodology, Product Development Cycle, Frame of Work, Results & Conclusion, References


1.        Lee, D-H. and Dong, M. (2008) „heuristic approaches to logistics network design for end-of-lease computer products recovery‟, Transportation Research Part E: Logistics and Transportation Review, Vol. 44, No. 3, pp.455–474.
2.        Fleischmann M, Bloemhof-Ruwaard JM, Dekker R, van der Laan E, van Nunen JAEE, van Wassenhove LN. Quantitative models for reverse logistics: a review. European Journal of Operational Research 1997; 103(1):1–17.

3.        Feldmann Clarence.G, (1998),The Practical Guide to Business Process Reengineering using IDEF0., Dorset House Publishing, New York.

4.        Chouinard Marc, 2005, “Integration of reverse logistics activities within a supply chain information system”, Computers Industry, Vol.56, pp.105-124.

5.        Gonzalez-Torre, 2004, “Environmental and reverse logistics polices in European bottling and packaging firms”, International Journal Production Economics, Vol.88, pp.95-104.

6.        Grover Varun, 1994, “Exploring the Seven of Information Technology Enable Business Process Re-engineering”, IEEE transactions on Engineering Management, Vol.41, No.3, pp.276-283.

7.        Manganelli, Raymond.L., Klein, Mark.M., (1994), The Reengineering Handbook: A Step-by-Step Guide to Business Transformation. American Management Association, New York.

8.        Subramanian Muthu, Larry Whitman, and S. Hossein Cheraghi (1999) the 4th Annual International Conference on Industrial Engineering Theory, Applications and Practice November 17-20, 1999, San Antonio, Texas, USA

9.        Mayer, Richard.J., Dewitte, Paula.S., (1998), Delivering Results: Evolving BPR from art to engineering.

10.     Kumar Sanjay, 2007, “Optimization of Material”, Industrial Engineering Journal, Vol.36, No.8, pp.32-34.

11.     Jeremy F. Shapiro, 2004, “Challenges of strategic supply chain planning and modeling”, Computers and Chemical Engineering, Vol.28, pp. 855–861.

12.     Korpela Jukka, 2001, “An analytic approach to supply chain development”, International Journal Production Economics, Vol.71, pp.145-155.

13.     Grover Varun, 1994, “Exploring the Seven of Information Technology Enable Business Process Re-engineering”, IEEE transactions on Engineering Management, Vol.41, No.3, pp.276-283.

14.     “Going Backwards: Reverse Logistics Trends and Practice” by |Dr dale S. Rogers and Dr Ronald s  Tribben- Lembke ( University of Nevada Reno, Centre for Logistic Management)

15.     “Perspectives in Reverse Supply Chain Management(R-SCM): A State of the Art Literature Review” by Arvind Jayant, P. Gupta, S.K.Garg





Prabhishek Singh, R S Chadha

Paper Title:

Review to Digital Watermarking and a Novel Approach to Position the Watermark in the Digital Image

Abstract:    Digital watermarking technology is a frontier research field and it mainly focuses on the intellectual property rights, identification and authentication of the digital media to protect the important documents. According to the basic analysis of digital image watermarking the digital watermarking model consists of two modules, which are watermark embedding module and watermark extraction and detection module Since it is known that digital image transmitted and spread over the network so there is a chance of being polluted by the noise or it may be attacked by the malicious users. The watermark embedded in the digital image may be incorrectly detected due to shortage of algorithms, so to precisely position the watermark is the main issue. A review to Digital watermarking is being presented in the paper and a novel watermark positioning approach is proposed in this paper which uses the statistical characteristics of the pixels to embed the watermark into brightness values of the pixels using image segmentation on the Windows platform using Matlab programming language.

   Digital Watermarking, Image segmentation, Matlab functions, Otsu’s method thresholding, Patchwork algorithm.


1.       Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”, 2010 International Conference on Intelligent Computation Technology and Automation.
2.       Ersin ELBAŞI, “Survey on Transformation Based Algorithms in Digital Image Watermarking”, 3rd Information Security & Cryptology Conference with International participation.

3.       Manpreet kaur, Sonia Jindal, Sunny behal, “A Study of Digital image watermarking”, Volume2, Issue 2, Feb 2012.

4.       Vidyasagar M. Potdar, Song Han, Elizabeth Chang, “A Survey of Digital Image Watermarking Techniques”, 2005 3rd IEEE International Conference on Industrial Informatics (INDIN).

5.       Zhu, W., Xiong, Z., and Zhang, Y.-Q., "Multiresolution Watermarking for Images and Video", in IEEE Trans. on circuit and System for Video Technology, vol. 9, no. 4, pp. 545-550, June, 1999.

6.       Pereira, S., Pun, T., "Robust Template Matching for Affine Resistant Image Watermarks," in IEEE Transactions on Inage Processing, vol.9, no. 6, pp. 1123-1129, June 2000

7.       “Techniques for data hiding”, by W. Bender, D. Gruhl, N. Morimoto, A. Lu

8.       www.networkworld.com

9.       www.digitalwatermarkingalliance.org

10.     www.wikipedia.org

11.     www.scisstudyguides.addr.com





Ramandeep Singh Chaudhary, Santosh Deshmukh, Sanjay Waykar

Paper Title:

Adaptive Transmission of Data over the Internet

Abstract:    Internet is a heterogeneous network environment and the network resources that are available to real time applications can be modified very quickly. Today, the underlying infrastructure of the Internet does not sufficiently support quality of service (QoS) guarantees. The new technologies, which are used for the implementation of networks, provide capabilities to support QoS in one network domain but it is not easy to implement QoS among various network domains, in order to provide end-to-end QoS to the user. In addition, some researchers believe that the cost for providing end-to-end QoS is too big, and it is better to invest on careful network design and careful network monitoring, in order to identify and upgrade the congested network links [4] Real time applications must have the capability to adapt their operation to network changes. In order to add adaptation characteristics to real time applications, we can use techniques both at the network and application layers



1.        Bouras, C., & Gkamas, A. (2003). Multimedia transmission with adaptive QoS based on real time protocols. International Journal of Communications Systems, Wiley InterScience, 16(2), 225-248
2.        Byers, J., Frumin, M., Horn, G., Luby, M., Mitzenmacher, M., Roetter, A., & Shaver, W. (2000). FLID-DL: Congestion control for layered multicast. In Proceedings of NGC (pp. 71-81).

3.        Cheung, S. Y., Ammar, M., & Xue, L. (1996). On the use of destination set grouping to improve fariness inmulticast video distribution. In Proceedings of INFOCOM 96, San Francisco.

4.        Diot, C. (2001, January 25-26). On QoS & traffic engineering and SLS-related work by Sprint. Workshop on Internet Design for SLS Delivery, Tulip Inn Tropen, Amsterdam, The Netherlands.

5.        Floyd, S., & Fall, K. (1998, August). Promoting the use of end-to-end congestion control in the Internet.In IEEE/ACM Transactions on Networking. Li, X., Ammar, M. H., & Paul, S. (1999, April). Video multicast over the Internet. IEEE Network Magazine.

6.        Parry, M., & Gangatharan, N. (2005). Adaptive data transmission in multimedia networks. American Journal of Applied Sciences, 2(3), 730-733.

7.        Ramanujan, R., Newhouse, J., Kaddoura, M., Ahamad, A., Chartier, E., & Thurber, K. (1997). Adaptive streaming of MPEG video over IP networks. In Proceedings of the 22nd IEEE Conference on Computer Networks,398-409.

8.        Vandalore, B., Feng, W., Jain, R., & Fahmy, S., (1999). A survey of application layer techniques for adaptive streaming of multimedia. Journal of Real Time Systems (Special Issue on Adaptive Multimedia).

9.        Vickers, B. J., Albuquerque, C. V. N., & Suda, T. (1998). Adaptive multicast of multi-layered video: Rate-based and credit-based approaches. In Proceedings of IEEE Infocom, 1073-1083.

10.     Rizzo, L. (2000) pgmcc: A TCP-friendly single-rate multicast congestion control scheme. In Proceedings of SIGCOMM 2000, Stockholm.





Maheswari G, Akiladevi R

Paper Title:

Real-Time Group Editors 

Abstract:    Group editors allow a cluster of dispersed human users to edit a communal multimedia document at the same time in excess of a computer network. In this study a standard process transformation framework is developed to professionally split the text and graphical data to the diverse users or an exacting user associated in the network. The basic idea of operation transformation is to execute any restricted operation as soon as it is produced for high local receptiveness. Remote operations are transformed against simultaneous operations that have been executed locally before its execution Operation transformation has been well conventional in group editors for achieve high local receptiveness and unconstrained collaboration. It is also well recognized method for optimistic consistency control. Operation transformation framework is recognized which formalizes two reliability criteria, causality conservation and convergence. The Operational transformation framework is developed in the projects and the weaknesses of the existing system are conquering based on the concept called operation effects relation.

   Group editor, Server, Transformation, Object Model technique, Class Responsibility, Collaborator.


1.        Professional Java Network Programming
2.        Java Complete Reference

3.        E. Altman, T. Boulogne, R. E. Azouzi, and T. Jimenez,   “A Survey on networking games,” Telecomm. Syst., Nov. 2000.

4.        D. O. Awduche, “MPLS and traffic engineering in IP networks,” IEEE Comm. Mag., vol. 37, no. 12, pp. 42–47, Dec. 1999.                                      

5.        I. Castineyra, N. Chiappa, and M. Steenstrup, “The Nimrod Routing Architecture,” RFC 1992, 1996.





S.Sunil Kumar Reddy, V. Pandurangadu, S.P.Akbar Hussain¬

Paper Title:

The Effect of Turbulence on the Emissions of an Insulated DI Diesel Engine With Insulted Combustion Chamber

Abstract:   The available petroleum fossil fuels are rapidly depleting and also creating much pollution. As our country is producing sugar cane more, this leads to the recognition of alcohols as an alternative fuels to diesel in diesel engines because these are derived from indigenous sources and are renewable. However due to alcohols lower cetane number and high latent heat of vaporization, it won’t vaporize in the existing diesel engines ; it requires higher temperatures in the combustion chambers for the combustion. So in the present work a thermally insulated engine (IE) is developed which reduces the ignition delay and aids combustion. In an insulated engine, the energy loss is avoided by applying a layer of insulating material over the components (air gap piston and ceramic coated cylinder head, valve and cylinder liner) of the combustion chamber. This improved the efficiency of the engine and further reduces the emissions. Tests are conducted on a single cylinder 4-stroke water cooled 3.68 KW diesel engine with alcohol as a fuel. Due to lower viscosity of alcohol the fuel injection pressure is reduced to165 bar for the experimentation. Further the efficiency of the engine can be improved by providing turbulence in the combustion chamber. So in the present work the turbulence is provided in the combustion chamber with grooves on the piston insert. So during the experimentation brass piston with various numbers of grooves is used on the test engine with an objective to find the best one in terms of performance, emissions and other combustion parameters with alcohol as fuel. For comparison the engine is also operated with brass piston. Out of all these pistons tested, one of them (brass Piston with 9 grooves) is found to be best in terms of efficiency and emissions. 

   air-gap insulation, alcohol, ceramics, grooves and Insulated engine


1.        Myers P.S. and Uyehava O.A., “Efficiency, Heat transfer and   pre-ignition in I.C. engines”, SAE 960130, Vol 75
2.        Pradeepram, O., et al, Development and Testing of a Semi-Adiabatic Engine, 8th  National Conference on  I.C. Engines and combustion, Trivandrum, 1983

3.        Miyari, Y., Matsnnisa, T., Ozawa, T., Oikawa: “Selective heat insulation of   combustion chamber wall, for a DI diesel engine with Monolithic Ceramics”, SAE Paper No.2010141,2001.

4.        Domingo, N. and Graves R.L“A study of Adiabatic Engine Performance”, on National Laboratory report under preparation (2003).

5.        W. Bryzik and R.Kamo,‟‟ TACOM/Cummins adiabatic engine program „‟ SAE 830314.

6.        R.KAMO and W. BRYZIK,‟‟Cummins / TACOM advanced adiabatic engine program‟,  SAE 840428.

7.        F.J. Wallance, T.K. kao, M. Tarabad, W.D. alexander, and A. Cole, “Thermally insulated diesel engine” proc. Of the institution of Mech.Engg., Vol 198, No.:5,97-105

8.        T. Morel, E.F Fort and P.M Blumberg “Effect of insulation strategy and design parameter of diesel engine heat rejection and performance”, SEA 850506

9.        C.C.J. French, “ceramics on reciprocating internal combustion engine” SEA 841135

10.     M. Arunachalam, “investigations on the performance of a diesel engine with ceramic  thermal barrier coating on parts of the combustion chamber surface”,proc. Of the QIP short term Course on recent developments in I.C, engines, IIT, madras, 1988.

11.     C.M.Varaprasad, M.V.S.Muralikrishna , K.Sudhakarareddy and C.Prabhakara Reddy : ”Third Asian- Pacific International Symposium on Combustion and Energy Utilization ,Hongkong”,December 2000.





Zareen J. Tamboli, S.R.Khot

Paper Title:

Estimated Analysis of Radial Basis Function Neural Network for Induction Motor Fault Detection

Abstract:    Faults in induction motors may cause a system to fail. Hence it is necessary to detect and correct them before the complete motor failure. In the paper, induction motors faults are studied and detected with the use of Radial basis function neural network. Radial Basis Function is trained and tested in this paper. Simple parameters like set of currents are taken as an input and fed to a Radial basis Function Neural Network. The comparison of different Radial Basis Functions is shown in this paper.

   Currents,  Faults,  Induction Motors, Radial Basis Function, Neural Network


1.       Ching Cheng Lee, Pau-Choo Chung, Jea-Rong Tsai and Chein-I-Chang, “Robust Radial Basis Function Neural Networks”,IEEE, Cybernetics, vol 29, No.6, December 1999
2.       Vilas N. Ghate and Sanjay V. Dudul, “Cascade Neural-Network-Based Fault Classifier for Three-Phase Induction Motor”, vol. 58, no. 5, May 2011

3.       Sitao Wu and Tommy W. S. Chow “Induction  Machine Fault Detection Using SOM-Based RBF Neural Networks”  vol. 51, no. 1, February 2004

4.       K. Gulez, B. Karlik, S. Vakkas Ustun, “Designing Artificial Neural Networks for Fault Detection in Induction Motors with the TMS320C30 DSP”, ESIEE, Paris   September 1996 SPRA333.

5.       Giovanni Betta, Consolatina Liguori, and Antonio Pietrosanto, “An Advanced Neural-Network-Based Instrument Fault Detection and Isolation Scheme” vol. 47, no. 2, April 1998

6.       Hao Yu,”Advantages of Eadial Basis Function Networks for Dynamic System Design”, IEEE, vol 58, no. 12, December 2011

7.       Hyun Cheol Cho, Jeremy Knowles, M. Sami Fadali and Kwon Soon Lee, “Fault Detection and isolation of Induction Motors using Recurrent Neural Networks and
Dynamic Bayesian Modeling” vol 18, no.2, march 2010

8.       Pablo Serrano, Antonio Zamarró, Arturo Hernandez, Alberto Ochoa, “Artificial Neural Networks for Diagnosing Stator Induction Motor Faults”, Mexico 

9.       Jarmo Lehtonen Heikki N. Koivo  “Fault Diagnosis of Induction Motors with Dynamical Neural Networks”  Helsinki University of Technology Espoo, Finland

10.     Matlab Artificial Neural Network toolbox

11.     Matlab Radial basis function toolbox

12.     Rudra Narayan Dash, “Fault diagnosis in induction motor using soft computing techniques”,National Institute of technology, Rourkela





Lamia Bouchhima, Mohamed Jamel Rouis, Mohamed Choura  

Paper Title:

Engineering Properties of Wade Sand-Lime-Cement-Phosphogypsum Building Brick Grade MW

Abstract:    This study concerns the analysis of wade sand -natural hydraulic lime-cement-phosphogypsum (WS-NHL-C-PG) solid bricks grade MW. In Tunisia, for several years, a set of phosphoric acid production factories have produced a waste product such as phosphogypsum (PG) in large quantities (approximately 10 million tons per year). Currently, in Sfax (Center-East of Tunisia), the PG is stored into piles in the vicinity of the factory, by dry or wet process. The storage of PG, even though presenting a low radioactivity, causes pollution to the water table and to the soil (due to the infiltration of acid and heavy metals). After treatment, the Tunisian PG was presented in the full bricks with different mass percentages of 60, 70 and 80%. The study involved physical, chemical, mechanical and environmental tests on the obtained bricks.The obtained results showed that WS-NHL-C-PG bricks successfully satisfied the standard requirements of bricks grade MW. Notwithstanding the techno-economic virtues, phosphogypsum-based bricks comply with the criteria for environmentally friendly products manufactured with industrial by-product and the manufacturing process is totally energy conservative.

   hosphogypsum; Full brick grade MW; strength; Durability


1.       Rutherford PM, Dudas MI, Samek RA. Envir nmental impacts of phosphogypum. Sci Total Environ. 149 199(4).pp.1–38.
2.       Sfar Felfoul H, Clastres P, Carles GA, Ben Ouezdou M. Proprietes et perspectives d’utilisation du phosphogypse l’exemple de la Tunisie. In: Proceeding of the international symposium on environmental pollution control and waste management ‘‘EPCOWM”, Hammamet, Tunisia, vol. I, (2002),  pp. 510–20, [in French].

3.       Singh M. Treating waste phosphogypsum for cement and plaster manufacture. Cem Concr Res. 32/7, (2002), pp. 1033–8,

4.       Singh M. Effect of phosphatic and fluoride impurities of phosphogypsum on the properties of selenite plaster. Cem Concr Res. 33/9, (2003), pp. 1363–9.

5.       Singh M. Role of phosphogypsum impurities on strength and microstructure of serenity plaster. Constr Build Mater 19/6, (2005), pp. 480–6.

6.       Mullins GL, Mitchell CC. Wheat forage response to tillage and sulfur applied as PG. In: Proceedings of the third international symposium on PG, Orlando, USA, vol. I. Publication FIPR no. 01-060-083; (1990). pp. 362–75.

7.       Potgieter JH, Potgieter SS, McCrindle RI, Strydom CA. An investigation into the effect of various chemical and physical treatments of a South African phosphogypsum to render it suitable as a set retarder for cement. Cem Concr Res. 33 (2003), pp. 1223–7.

8.       Altun IA, Sert Y. Utilization of weathered phosphogypsum as set retarder in Portland cement. Cem Concr Res. 34, (2004), pp. 677–80.

9.       Kacimi L, Simon-Masseron A, Ghomari A, Derriche Z. Reduction of clinkerization temperature by using phosphogypsum. J Hazard Mater.  B137, (2006). pp. 129–37.

10.     Degirmenci N, Okucu A, Turabi A. Application of phosphogypsum in soil stabilization. Build Environ. 42, (2007).pp. 3393–8.

11.     Sunil K. Fly ash-lime-phosphogypsum hollow blocks for walls and partitions. Building and Environment; 38, (2003). pp. 291-295.

12.     Abalı YK, Yurdusev MA, Zeybek MS, Kumanlıog˘lu AA. Using PGe and boron concentrator wastes in light brick production. Constr Build Mater. 21, (2007). pp. 52–6.

13.     Karray MA, Mensi R. Etude de la Deformabilite des Poutrelles en Beton Arme a base du Ciment Ultimax. Ann Batiment Travaux Publics 2, (2000),  pp. 5–14 [in French].

14.     Charfi FF, Bouaziz J, Belayouni H. Valorisation du phosphogypse de Tunisie en vue de son utilisation comme substituant au gypse naturel dans la fabrication du ciment. Dechets Sci Tech. 20, (2000)  pp. 24–32, [in French].

15.     Moussa D, Crispel JJ, Legrand CL, Thenoz B. Laboratory study of the structure and compactibility of Tunisian phosphogypsum (Sfax) for use in embankment construction. Resour Conserv. 11/2, (1984)  pp. 95–116, [in French].

16.     Kuryatnyk T, Angulski da Luz C, Ambroise J, Pera J. Valorization of phosphogypsum as hydraulic binder. J Hazard Mater. 160/2–3, (2008), pp. 681–7.

17.     Sfar Felfoul H. Etude du phosphogypse de Sfax (Tunisie) en vue  d’une valorisation en technique routiere. PhD thesis, Department of Civil Engineering, National Engineering School of Tunis/INSA Toulouse; 2004.

18.     Sfar Felfoul H, Clastres P, Carles GA, Ben Ouezdou M. Amelioration des caracteristiques du phosphogypse en vue de son utilisation en technique routiere. Dechets Sci Tec 28, (2002), pp. 21–5 [in French].

19.     Marcelo CT, Alexandre BP. The use of cement stabilized phosphogypsum mixes in road construction. In: Proceedings of the international geotechnical and geological engineering. GeoEng 2000, Mellourne, Australia; November (2000), pp.19–21.

20.     Degirmenci N. Utilization of phosphogypsum as raw and calcined material in manufacturing of building products. Constr Build Mater. 22/18, (2008), pp. 57–62.

21.     Ahmadi BH. Use of high strength by product gypsum bricks in masonry construction. PhD dissertation, University of Miami, Coral Gables, Florida, USA. (1989) 245p.

22.     AFNOR. Lixiviation – Essai de conformite pour Lixiviation des dechets fragmentes et des boues. NF EN 12457-3; 2002 [in French].

23.     Deboucha S, Hashim R, Aziz AA. Engineering properties of cemented peat bricks Scientific Research and Essays Vol. 6/8, (2011), pp. 1732-1739.

24.     ASTM international: C62-08, Standard specification for building brick: Solid Masonry Units Made from Clay (2008) 4p





V. V.Govind Kumar, K. Venkata Reddy, Deva Pratap

Paper Title:

Updation of Cadastral Maps Using High Resolution Remotely Sensed Data

Abstract:    A cadastral map shows the boundaries of all land parcels on large scale maps together with the village registers which contains the ownership,land use andarea details.Updating the cadastral information is very essential so that transformations/changes of ownership of parcels etc. can be recorded in an orderly manner for documentation and further use. Presently, the cadastral maps are being updated with high resolution remotely sensed imageries using Geographical Information Systems (GIS) and Global Positioning System (GPS).Present paper discusses the updation of the geospatial information and quantification of the accuracy of the geo-referenced cadastral map of Venkatapuram village of Thorrour mandal, Warangal District, Andhra Pradesh, India. After mosaicing the Google Earth downloaded imageries of the study area, rectification of has been carried out using SOI toposheets. Vectorised cadastral map is prepared in the GIS environment using the scanned cadastral map of the study area and registered using Ground Control Points (GCPs) collected from GPS instrument.The features of cadastral map are updated by superimposing the vectorised cadastral map on the rectified imagery of the study area.  The accuracy assessment of the vectorised cadastral map has been carried out. From the observation of mean percentage deviation, standard percentage deviation and parcel area deviation, it is seen that large area parcels have more accurate and less distortion than small area parcels. The methodology presented in this paper is useful to update the cadastral maps with low to medium accuracy.

   GIS, GPS, Google Earth High Resolution Imageries, Cadastral Map Updation.


1.       Masahiro, Y., Murai, S. 2000 Accuracy Assessment an improvement for level survey using Real Time Kinematic(RTK) GPS. Indian Society of Geomatics.
2.       Murthy, K.Y.V.N., Rao, S.S., Srinivasan, D.S. and Adiga, S. 2000a. Land information System (LIS) for rural development. Technical proceedings, Geomatics.

3.       Murthy, K.Y.V.N., Rao, S.S., and Adiga, S. 2003. Digital Basemap generation using High Resolution Satellite Data and GPS. Indian Society of Geomatics News Letter, March 2003.

4.       Rao, D.P., Navalgund, R.R. and Murthy, K.Y.V.N.1996. Cadastral Applications using IRS 1C data.Indian society of geomatics, 70, pp. 624-628.

5.       Rao, S.S., Murthy, K.Y.V.N., Pandit, D.S. and Rajender, C.K. 2003“Precision product generation using satellite data and GPS based ground control points, Indian society of Geomatics.

6.       Raju, K.N.P., Kumar, S., and Mohan, K 2008 Urban cadastral mapping using very high resolution remote sensing data.journal of the Indian Society of Remote Sensing, vol36, pp.283-288.

7.       Raghavendran, S.2002. Cadastral mapping and land information system, Geospatial application paper

8.       Singh, R. B. 1998. Land Records Application of Modern Techniques in Preparation of Land Records. Shiva Publishers, Udaipur, pp. 42-57.





S.Govindaradjane, T.Sundararajan

Paper Title:

Performance and Kinetics of a Huasb Reactor for Treating Tapioca-Based Starch Industrial Waste Stream

Abstract:   In this paper, performance of a HUASB reactor for treating a tapioca-based starch industrial waste stream has been studied under six influent COD concentrations (ranging from about 1700-5800 mg/l) and five hydraulic retention times (HRTs) (ranging from 8 to 24 hours). The performance of HUASB reactor was evaluated based on COD removal (%) and bio-gas yield. Salient kinetic co-efficient of the HUASB reactor was determined by a modified-Monod based model and the dominant species in the sludge granules of the reactor was also identified. From an overall assessment, the better performance of HUASB reactor over the UASB reactor, for treating the above waste stream has been highlighted.

   HUASB and UASB reactors; Tapioca-based starch industrial waste stream; COD removal (%); Bio-gas yield; kinetic co-efficients and Performance evaluation.


1.       Annachhatre,A.P., Amatya,P.L., UASB treatment of tapioca starch wastewater, Jl. of Environmental Engg., ASCE, 126(12) : 1149 – 1152, Dec.2000
2.       APHA.2005. Standard Methods for the examination of water and wastewater, 21th Edition, APHA, USA.

3.       Aspasia.A, Chatzipaschali and Anastassios G. Stamatis, Biotechnological Utilization with a Focus on Anaerobic Treatment of Cheese Whey: Current Status and Prospects, 5: 3492-3525, 2012.

4.       Balasubramanian and Muthukumar, Performance of HUASB reactor for treating paper & Pulp wastewater using Effective Microorganism(EM), International Journal of Engineering Science and Technology, 4(6): June 2012.

5.       Cook, E.E., Kinecannon, D.F., Organic concentration and hydraulic loading versus total organic loading in evaluation of tricking filter performance, Water Sewage Works, 118(4)

6.       Coskun.T, H.A. Kabuk, K.B. Varinca, E. Debik, I. Durak, C. Kavurt, Antibiotic Fermentation Broth Treatment by a pilot upflow anaerobic sludge bed reactor and kinetic modeling, Bioresource Technology 121, 31–35, 2012.

7.       Fang,H.H.P., Kwong,T.S., Degradation of starch particulates in a hybrid reactor, Wat. Sci. Tech., 30(4) : 97-104, 1994

8.       Fang,H.H.P., Li,Y.Y., Chui,H.K., UASB treatment of wastewater with concentrated mixed VFA, Jl. of Environmental Engg., ASCE, 121(2) : 153 – 160, Feb,1995.

9.       Govindarajane, S.2006. Studies on Performance and Kinetics of UASB and HUASB Reactors for Treating Tapioca – based Starch Industrial Wastes Stream, Ph.D. Thesis submitted to Pondicherry University, Puducherry, India, pp, 164.

10.     Govindarajane. S, Sundrarajan.T, Sivasankaran.M.A and Nehru kumar.V .2010. Performance study of a HUASB Reactor for Treating Tapioca-Based Starch Industrial Waste Stream, Jl. pollution research 29 (1)

11.     Grady,C.P.L., Jr. and Willaims,D.R., Effect of influent substrate concentration on the kinetics of natural microbial populations in continuous culture, Water Research, 9 : 171 – 180, 1975.

12.     Ghangrekar,M.M., Asolekar,S.R., Ranganathan,K.R., and Joshi,S.G., Experience with UASB reactor start-up under different operating conditions, Water Science and Technology, 34(5-6) : 421 - 428, 1996.

13.     Guiot,S.R., and Van den Berg,L., Performance of an upflow anaerobic reactor combining a sludge blanket and a filter treating sugar waste, Biotechnol.Bioengg., 27 : 800-806,1984.

14.     Hampannavar, U.S, Shivayogimath C.B, Anaerobic treatment of sugar industry wastewater by upflow anaerobic sludge blanket reactor at ambient temperature, 1(4): 631-639, 2010.

15.     Hung, Y.T., Batch reactor activated sludge treatment of milk processing wastewaters, Process Biochem., 19 : 25 – 28, 1984.

16.     Hwang,S.H., Hansen,C.L., and Stevens,D.K., Biokinetics of an upflow anaerobic sludge blanket reactor treating whey permeate, Bioresource Technology, 41 : 223-230, 1992.

17.     Hwang,J.S., Jih,C.G., Lui,S.D., Ting,W.H., Process kinetics of UASB reactors, Jl. Of Chemical Technology & Biotechnology, 78(7): 762 – 772, July, 2003.

18.     Jayantha, K.S. and Ramnujam, T.K 1995. Applicability of upflow anaerobic sludge blanket (UASED) reactor for treatment of distillery spent wash, Indian J. Environ. Prot, 15(2):106-11.

19.     John Leju Celestino LADU, Xiwu LU, Martin K. LOBOKA, Experimental  Assessment on the Effect of OLR and HRT on the efficiency of  Anaerobic Filter Treating Abattoir, 2(11): 415-420, 2012.

20.     Karthikeyan,C., Sabarathinam,P.L., Biodegradation of cassava starch wastewater using UASB reactor, Journal of Industrial Pollution Control, 18(1) : 33-40, 2002.

21.     Kincannon,D.F., Stover, E.L., Biological treatability data analysis of industrial wastewaters, Proc. of the 39th Industrial Waste Conference, Purdue University, 637 – 643, 1984.

22.     Lettinga,G. and Hulshoff Pol.,L.W., UASB process design for various types of wastewaters, Water Science Technology, 24 : 87-107, 1991.

23.     Liu Chunshuang, Zhao Dongfeng; Guo Yadong; Zhao Chaocheng,  Performance and Modeling of an Up-flow Anaerobic Sludge Blanket (UASB) Reactor for Treating High Salinity Wastewater from Heavy Oil Production,14(3): pp 90-95, 2012.

24.     Rajesh,G., Bandyopadhyay,M., and Das,D., Some studies on UASB bioreactor for the stabilisation of low strength industrial effluents, Bioproc.Engg., 21 : 113-116, 1999.

25.     Routh,T., Anaerobic treatment of vegetable tannery wastewater by UASB process, Indian Jl. of Environmental Protection, 20(2) : 115 – 123, Feb. 2000

26.     Selvamurugan, M. Doraisamy, P. , Maheswari, M. and Nandakumar, N. B, Comparative Study on Startup Performance of UAHR and UASB Reactors in Anaerobic Treatment of Distillery Spentwash, International Journal of Environmental Research, 6(1): 235-244, 2012

27.     Shivayogimath.C.B, Ramanujam, T.K., Treatment of distillery spent-wash by hybrid UASB reactor, Bioprocess and Biosystems Engineering, 21(3) : 255 – 259, 1999.

28.     Suschka, J., Bio-oxidation in a continuous activated sludge process, Water Research, 14 : 197 – 205, 1980.

29.     Suneeth Kumar,S.M., Studies on the operation and performance of UASB reactor for the treatment of distillery spentwash, Ph.D. thesis, University of Roorkee, Roorkee, 1998.





B. Nagu,  M. Sydulu,   P.V. Ramana Rao

Paper Title:

Improvement of A C System Stability using Fuzzy Logic based HVDC Controls

Abstract:    In this paper, investigation is carried out for the improvement of power system stability by utilizing auxiliary controls for controlling HVDC power flow. The current controller model and the line dynamics are considered in the stability analysis. Transient stability analysis is done on a multi-machine system, where, a fuzzy logic controller is developed to improve the stability of the power system. The results show the application of the fuzzy controller in AC-DC power systems and case studied at different fault locations.

   HVDC, Power System Stability, Multi – Machine Stability, Fuzzy Logic controller


1.  P. Kundur, “Power System Stability and Control”, McGraw- Hill, Inc., 1994
2.  Garng M. Huang, Vikram Krishnaswamy, “HVDC Controls for Power System Stability”, IEEE Power Engineering Society, pp 597- 602, 2002.
3.  T. Smed, G. Anderson, “A New Approach to AC/DC Power Flow”, IEEE Trans. on Power Systems., Vol. 6, No. 3, pp 1238- 1244, Aug. 1991.
4.   K. R. Padiyar, “HVDC Power Transmission Systems”, New Age International (P) Ltd., 2004.
5.   Stagg and El- Abiad, “Computer Methods in Power System Analysis”, International Student Edition, McGraw- Hill, Book Company, 1968.
6.    P.M.Anderson and A.A.Fouad, Power System Control and Stability, 1st ed.,Iowa State University Press, 1977.
7.    V.S. Reddy, P.V.R Rao, “ Supplementary HVDC Controls for Multi-machine System Stability Improvement? IEEE (India) June 2008 vol.89
8.    Y.-Y. Hsu, C.-H. Cheng, “Design of fuzzy power system stabilizers for multi-machine power systems”, IEE Proceedings, Vol. 137, Pt. C, No. 3, May 1990





Omprakash Gawali, Ketan Pandurang Kale, Mahesh Sanjay Gund, Ganesh Balasaheb Gaware

Paper Title:

Communication In USB’S For Data Transfer

Abstract:    The system enables data sharing between mobile and pen drive directly without using computer or laptop. An arm processor is interfaced USB and USB host controller. Latest mobile phones have got memory capacities GB’s and can be connected computers. These mobile phones have capability to get connected to the internet. The mobile phones have the additional features like camera, mp3, multimedia A/V, etc. A large amount of data is handled through mobiles. The system will enable data sharing between mobile, pen drive, digital camera and the device having USB interface. This will eliminate need of an intermediate computer and thus save time and power.

   USB, GB’s, MP3, A/V.


1.  USBFlashDrive.org [site], “USB Flash Drives, USB Memory and Portable Computer Hard DriveInformation,” [online] Available: http://www.usbflashdrive.org/usbfd_overview.html, July 1, 2009.
2.       J. Axelson, “USB COMPLETE Second Edition,” Madison, WI: Lakeview Research LLC.

3.       D. Anderson, D. Dzatko, “Universal Serial Bus System Architecture,” MindShare, Inc.

4.       Mazidi Muhammad “8051 Microcontroller and Embedded Systems Third Edition”.

5.       www.ftdichip.com.

6.       www.vinculum.com/documents/datasheet/DS_VNC1L_V2.01(FT_00030).pdf

7.       www.vinculum.com/documents/AEI_0807_PP23.24B.pdf.

8.       www.alldatasheet.com.

9.       www.rhydolabz.com.





C. Rajakannan, S. Govindaradjane, T. Sundararajan

Paper Title:

Bio – Medical Waste Management in Pondicherry Region: A Case Study

Abstract:    Health Care Establishments (HCEs) generate biomedical waste (BMW), 15 – 35% of which are ‘hazardous and toxic’. In spite of existence of regulatory mechanisms for handling etc., the ground reality is far from satisfactory, in India. There is a need to assess the actual practices that are followed in HCEs in all major cities and towns. In this study BMW handling and management in HCEs located in Pondicherry, India has been investigated. It was found that the importance of ‘segregation’ of waste has been realized by hospital staff. Further, HCEs in the region has been practicing one of the three methods (i.e. autoclaving, incineration and microwave irradiation) of treatment of BMW. A novel and low cost treatment of BMW has been proposed and implemented in private hospitals, Pondicherry as a case study. The results are very encouraging and cost effective.

   BMW, low cost treatment method, assessment of quantity, neem and tobacco extract, management of BMW

1.       Gautam V, Thapar R, Sharma M (2010) Biomedical waste management: Incineration Vs environmental safety, Indian Jl of Medical Microbiology, 28: 191-192.
2.       Goddu V K, Duvvuri K and Bakki V K (2007) A critical analysis of healthcare waste management in developing countries: Case studies from India and England. Proc. of the Intl. Conference on Sustainable Solid Waste Management, Chennai, India, Sep. 5-7, pp. 134-141.

3.       Government of India (GoI), Ministry of Environment and Forests (MoEF), Bio-Medical Waste (Management and Handling) Rules, 1998 and Bio-Medical waste (Management and Handling) (Amendment) Rules, 2003.

4.       Government of India (GoI), National Guidelines on Hospital Waste Management Based upon the Bio-Medical Waste (Management & Handling) Rules.

5.       Jayanthi S and Sarojini E (2010) Destruction of pathogens in infectious BMW using lime and neem (Azadirchta indica).

6.       Katoch S S (2007) Biomedical waste classification and prevailing management strategies, Intl Conference on Sustainable Solid Waste Management, Chennai, India, Sep. 5-7, pp 169-175.

7.       Mohanasundram V (2003) The environmental implications and economic issues in biomedical waste management in urban Coimbatore Tamil Nadu, India, Proc. of the Third Intl. Conference on Environment and Health, Chennai, India, Dec.15-17, pp 270-275.

8.       Pandey A and Gundevia H S (2008) Role of the fungus-Periconiella sp. in destruction of biomedical waste. Journal of Environ,Science & Engg., 50(3): 239-240.

9.       Patil G V and Pokhrel K (2005) Biomedical solid waste management in Indian hospital: A case study, Waste Management (25): 592-599.

10.     Pandit N A, Tabish S A, Qadri G J and Ajaz Mustafa (2007) Biomedical waste management in local teaching hospital, JK- Practitioner, 14(1): 57-59 (Jan-Mar.).

11.     Pondicherry Pollution Control Committee (PPCC) 2006, ENVINS, Project Report, 2(3): 1-13 (July - Sep).

12.     Rao S K M, Ranyal, R K Bhatia S S and Sharma V R (2004) Biomedical waste management: An infrastructural survey of hospitals, Medical Journal of Armed Forces of India (MJAFI), 60(4): 379-382.

13.     Radha K V, Kalaivani K, Lavanaya R (2009) A case study of biomedical waste management in hospitals, Global Journal of Health Science, 1(1): 82-88 (April)

14.     Rasmussen C D and Charowsky (2009) Treatment of biomedical waste with Ozone.

15.     Sarojini E, Jayanthi S, Jothi Venkatraman S and Prashanthini K (2007) Performance study on common biomedical waste treatment facility, Chettipalayam, Coimbatore. Proceedings of the International Conference on Sustainable Solid Waste Management, Chennai, India. pp 182-188.

16.     Shah H K and Ganguli S K (2010) Hospital waste management – A Review, Indian Jl of Community Medicine, 25(3): 136-137 (July – Sep.).

17.     Sharma S and Chauhan SVS (2008) Assessment of bio-medical waste management in three apex Government hospital of Agra, Jl. of Environmental Biology, 29(2): 159-162 (Mar.).

18.     Sheth K N and Desai P H (2006) Characterization and management of bio – medical waste in SAE hospital, Anand – A Case study, Electronic Jl. of Environmental Agricultural and Food Chemistry (ISSN: 1579-4377). 5(6): 1583-1589.

19.     Sreegiri S and Kirshnababu G (2009) Biomedical waste management in a tertiary level hospital in Visakhapatnam. Jl. of Community Medicine, 5(2): 1-6 (Jul-Dec.)

20.     Yadavannavar M C, Berad A S and Jagirdar P B (2010) Biomedical waste management: A study of knowledge, attitude and practices in a Tertiary Health care institution in Bijapur, Indian Jl. of Community Medicine, 35(1): 170-171 (Jan.).





Amritpal Kaur, Sandeep Singh

Paper Title:

Classification and Selection of Best Saving Service for Potential Investors using Decision Tree – Data Mining Algorithms

Abstract:    This research delineates a comprehensive and successful application of decision tree induction to large banking data set of different banking services obtained by numbers of customers. Complex interaction effects among banking services that lead to increased policy variability have been detected. The extracted information has been confirmed by the database managers, and used to improve the decision process. The research suggests that decision tree induction may be particularly useful when data is multidimensional, and the various process parameters and highly complex interactions. In order to classify and identify effective and beneficial saving service and design the appropriate criteria for selecting the right scheme for different persons having different taste, this study developed a data mining framework for analyzing banks and post office data, in which suitable[1] technique is employed to extract rules between present saving schemes. In other words, the objectives of this thesis are
•      To classify the available saving services of banks and post office to good, medium and bad level.

•      To select the best saving service according the investor’s choice and its preference.

•      To guide the potential investor to invest his money in the particular scheme so as to get more benefits.

•      To help to take the right decision for investment.

•      To reduce the time to take particular decision as there will be no need to analyze each and every available investment scheme thoroughly.

   CHAID, C4.5, cluster, data mining, decision tree induction, ID3.


1.       Alex Berson, Data Warehousing, Data Mining & OLAP, pp. 351.
2.       Gu Xiang, A Synthesized Data Mining Algorithm Based on Clustering and Decision Tree. New York: Springer-Verlag, 1985, ch. 4.

3.       B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

4.       E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

5.       J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

6.       C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

7.       Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

8.       M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

9.       (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).    Available: http://www.(URL)

10.     J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available: http://www.atm.com

11.     (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.           Available: http://www.(URL)

12.     R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3).





Santosh Kumar Bharti, Shashi Kant Dargar, Abha Nyati

Paper Title:

Energy-Aware Performance Evaluation of WSNs using Fuzzy Logic

Abstract:    Wireless Sensor Networks (WSNs) are being used to form large, dense networks for the purpose of long term environmental sensing and data collection. Unfortunately, these networks are typically deployed in remote environment where energy source are limited.  WSN’s, present a new generation of real-time embedded systems with limited computation, energy and memory resources that are being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. Appropriate cluster-head node election can drastically reduce the energy consumption and enhance the lifetime of the network. In this paper, a fuzzy based energy-aware sensor network communication protocol is developed based on three descriptors - energy, concentration and centrality. Further we have to compared fuzzy based approach with other popular protocol LEACH and improved hierarchy scheme DBS. Simulation shows that depending upon network configuration, a substantial increase in network lifetime can be accomplished as compared to probabilistically selecting the nodes as cluster-heads using only local information.

   Wireless Microsensor networks, LEACH, cluster head election, distance based Segmentation, Fuzzy C-Mean Algorithms.


1.       W. Heinzelman, A. Chandrakasan and H.Balakrishnan, “Energy-efficient comm. protocol for wireless micro sensor networks,” in Proc. of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), Maui, HI, Jan. 2000, pp. 3005 – 3014.
2.       W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “An application-specific protocol architecture for wireless micro sensor networks,” in IEEE Transactions on Wireless Communications, Oct. 2002, pp. 660 -670.

3.       N. Amini, M. Fazeli, S.G. Miremadi, M.T. Manzuri, “Distance Based Segmentation: An Energy-efficient clustering Hierarchy for wireless sensor networks” IEEE fifth Annual conference on Communication Networks and Service Research (CNSR’07),2007

4.       Q. Liang, “Cluster head election for mobile ad hoc wireless network,” in Proc. 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Comm. (PIMRC), Sept. 2003, pp. 1623 -1628.

5.       S. Hammadi and C. Tahon, “Special issue on intelligent techniques in flexible manufacturing systems,” in IEEE Transactions on Systems, Man and Cybernetics, May 2003, pp. 157 - 158.

6.       B. Warneke, M. Last, B. Liebowitz and K.S.J. Pister, “Smart Dust: communicating with a cubic-millimeter computer,” IEEE Computer, Jan. 2001, pp. 44 - 51.

7.       E. Cayirci, “Data aggregation and dilution by modulus addressing in wireless sensor networks,” IEEE Comm. Letters, Aug. 2003, pp. 355 – 357.

8.       C. Chee-Yee and S.P. Kumar, “Sensor networks: evolution, opportunities, and challenges,” in Proc of the IEEE, Aug. 2003, pp.1247 - 1256.

9.       M. Negnevitsky, Artificial intelligence: A guide to intelligent systems, Addison-Wesley, Reading, MA, 2001.

10.     M.J. Handy, M. Haase and D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in Proc. 4th International Workshop on Mobile and Wireless Communications Network, Sept. 2002, pp. 368 - 372.





Chinar Regundwar, Navnath Rahinj, Priti Rayrikar, Shashikant Bhosale, Navnath D. Kale

Paper Title:

Call Log, Message and Camera Monitoring System over Android

Abstract:    There are limitations on storage of call and message logs as well as images in mobile phone memory. Android usually keeps a history of the 500 latest calls and any calls older than that are automatically deleted from the phone. We cannot see the records of deleted messages and cannot restore them same in case of images. If your data is corrupted then all of your messages may get lost so there is need of an application that could keep records of all call logs, messages and camera images at storage other than phone here we propose to develop a mobile application for android phones. This application Server will store information for further use. So user can save unlimited call logs, messages telephony activities in phone (E.g. Calls, Messaging & Camera). On occurrence of such activity it will collect information about activity (e.g. caller, call date, time, message content or image) and send it to server. And camera images and can see anytime, from anywhere by login remotely from his mobile.

   Android, data is corrupted, call logs, Messages, Camera Images, Application Server, telephony activity.


1.        en.wikipedia.org/wiki/Android_software_development
2.        A.Chervenak, V. Vellanki, and Z.kurmas, Protecting File Systems: A Survey of Backup Techniques. Proceeding Joint NASA and IEEE Mass Storage 1998.

3.        BELL, T. C., CLEARY, J. G., AND WITTEN, I. H. Text Compression. Prentice Hall, Upper Sadle River, NJ, 1990.

4.        SAYOOD, K. Introduction to Data Compression. Academic Press, San Diego, CA, 1996, 2000.

5.        http://developer.android.com/guide/topics/data/backup.htm

6.        http://developer.android.com/guide/topics/providers/content providers.html

7.        http://en.wikipedia.org/wiki/ZIP_%28file_format%29.

8.        Professional Android 4 Application Development –Reto Meier

9.        PROF. R. C. Dharmik, Sangharsha B. Lanjewar, New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform-IOSR Journal of Engineering Mar. 2012, Vol. 2(3) pp: 433-436





Kuldeep B. Shukla, Hetal N. Rao, Arjun H. Joshi

Paper Title:

Implementation of ATM Algorithm through VHDL

Abstract:    ATM (automatic teller machine) is a very essential tool required for the society in order to facilitate the need of safe transaction of money. Using this facility one can easily perform the various functions such as balance inquiry, withdrawn, money transfer etc. As this machine operation rely on bank cards, proper password, enough amount of money in one’s account, certain verification and identification methods etc. It needs to be secure and having integrity of fine level right to its coding stage for optimum utilization of the service. In order to meet such requirements the coding languages used for it are modified here. The conventional coding styles using ‘C’ and/or ‘C++’ are replaced by the VHDL code language so that the attacker cannot easily crack the security levels. In this article, the code composed of VHDL language is suggested for this purpose of security.

   Automatic Teller Machine (ATM), VHDL, Krypton Board, Integrity, Security Level.


1.       Yingxu Wang and Yanan Zhang, “The Formal Design Model of an Automatic Teller Machine (ATM)” University of Calgary, Canada, International Journal of Software Science and Computational Intelligence, 2(1), 102-131, January-March 2010.
2.       Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson, “Chip and Skim: cloning EMV cards with the pre-play attack”. Computer Laboratory, University of Cambridge, UK.

3.       Beginner’s Guide to Xilinx Spartan-3E FPGA Starter Kit Board (Revision 2), By Nick Desaulniers and Cody Cziesler, RIT Department of Computer Engineering, 5/5/11.

4.       Pong P. Chu "RTL Hardware Design Using VHDL, Coding For Efficiency, portability and Scalability", Willy Interscience a john wilay & sons, inc., Publication, pp no:23-160.

5.       Avenet Avenue, user’s guide, Xilinx® Spartan™-3 Development Kit.

6.       Stanley MAZOR and Patricia LINGSTRAAT, "A guide to VHDL (2nd Edition)", copyright 1993, Kluwer Achedamic Publishers, pp no: 1-1 to 7-16.

7.       Peter J. Ashenden and Jim Lewis, "The Designer's Guide to VHDL (3rd Edition)" copyright 2008, Morgan KJaufmann Publication, pp no: 207-225.

8.       http://communities.mentor.com/mgcx/servlet/JiveServlet/previewBody/2324-102-2-5693/HDL-Standards-UG-CAST.rev1b.pdf.

9.       http://www.fpga.com.cn/hdl/training/Vhdl_Golden_Reference_Guide.pdf





Priyanka Korde, Vijay Panwar, Sneha Kalse

Paper Title:

Securing Personal Health Records in Cloud using Attribute Based Encryption

Abstract:    This paper presents the design and implementation of Personal Health Records and providing security to them while they are stored at third party such as cloud. Personal Health Record is web based application that allows people to access and co-ordinate their lifelong health information. The patient have control over access to their own PHR. To achieve security of personal health records we use the attribute based encryption to encrypt the data before outsourcing it. Here we focus on multiple types of PHR owner scenario and division of personal health records users into multiple security domains which reduce key management complexity for owners and users. A high degree of patient’s privacy is guaranteed. Our scheme gives personal health record owner full control of his/her data. Extensive security and performance analysis shows that the proposed scheme is highly efficient.

Keywords:   personal health records, attribute based encryption, cloud computing, secure sharing


1.        M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept.2010, pp. 89–106.
2.        H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.

3.        M. Chase and S. S. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in CCS ’09, 2009, pp.121–130.

4.        S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASSIACCS’10, 2010.

5.        S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.

6.        A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008, pp.417–426.

7.        J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2010.

8.        S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,” in 10th IEEE TrustCom, 2011.

9.        J. Bethencourt, A. Sahai, and B. Waters,“Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.

10.     Melissa Chase “Multi-authority Attribute based Encryption,” Computer Science Department Brown University Providence, RI 02912





Ali Trabelsi, Mohamed-Ali Rezgui And Smain Bezzina

Paper Title:

Assessment of the Tensile Elongation (E %) And Hardening Capacity (Hc) Of Joints Produced In Friction Stir Welded 2017 Aa (Enaw-Alcu 4mgsi) Plates

Abstract:    The study has aimed at investigating the leverage of three Friction Steer Welding (FSW) factors, namely, the tool rotation speed N(rpm), the tool traverse rate F(mm.mn-1) and the tool pin/shoulder diameters ratio r (%) on two FSW process responses: the joint tensile elongation (E%) and hardening capacity (Hc). For the experiment appraisal, 18 tested coupons have been cut in 6mm thick rolled plates of 2017 A alloys. Variation in the responses estimates has been assessed by conducting a Face-Centered Central Composite Design (FCCD) strategy and Anova Technique. Then, a second-order RSM model has been considered to describe the predictive formulation of the responses (E%) and (Hc), appropriately. Thereby, the multi-regression models pertaining to (E%) and (Hc) were built and analyzed for factors leverage and sensitivity. Lastly, a simultaneous optimization procedure based on the desirability function was employed to find out the levels setting of factors N, F and r% which guarantees maximum (E%) and (Hc), concurrently. At 95% of C.I., the research findings have pointed out the leverage of the tool geometry factor (r %) as well as the rotation speed (N) on the FSW process responses (E%) and (Hc). However, the process was found robust with respect to the tool traverse rate parameter (F).

   F.S.W., R.S.M., Taguchi, ANN, Genetic Algorithms, Ductility, Tensile elongation, Hardening capacity, 2017 AA.


1.        W. M. Thomas, E. D. Nicholas, J. C. Needham, M. G. Murch, S. P. Temple, C. J. Dawes, "Improvements relating to friction welding," G. B. Patent No. 9125978. 8, 1991.
2.        M. P. Milles, B. J. Decker, T. W. Nelson, "Formability and strength of friction-stir-welded aluminum sheets," Metallurgical And Materials Transactions, Vol. 35A, pp. 3461-3468, 2004.

3.        D. M. Rodrigues, A. Loureiro, C. Leitao, R. M. Leal, B. M. Chaparro, P. Vilaça "Influence of friction stir welding parameters on the microstructural and mechanical properties of AA6016-T4 thin welds", Materials and Design, Vol. 30, pp. 1913-1921, 2009.

4.        R. S. Mishra, Z. Y. Ma, "Friction stir welding and processing", Mater. Sci. Engr., R 50, pp. 1-78, 2005.

5.        R. Rai, A. De, H. K. D. H. Bhadeshia, T. DebRoy, "Review: friction stir welding tools", Science and Technology of Welding and Joining,Vol 16, pp. 325-342, 2011

6.        R. Nandan, T. DebRoy, H. K. D. H. Bhadeshia, "Recent advances in friction-stir welding–Process, weldment structure and properties," Progress in Materials Science, Vol.53,pp. 1913-1921, 2008.

7.        T. P. Chen, W.-B. Lin, "Optimal FSW process parameters for interface and welded zone toughness of dissimilar aluminum–steel joint", Science and Technology of Welding and Joining, Vol. 15, pp. 279-285, 2010.

8.        G. H. Payganeh, N. B. Mostafa Arab, Y. Dadgar Asl, F. A. Ghasemi, M. S. Boroujeni, "Effects of friction stir welding process parameters on appearance and strength of polypropylene composite welds", International Journal of the Physical Sciences, Vol. 6, pp. 4595-4601, 2011.

9.        J. Q. Li, H. J. Liu, "Effects of tool rotation speed on microstructures and mechanical properties of AA2219-T6 welded by the external non-rotational shoulder assisted friction stir welding", Materials and Design, Vol. 43, pp. 299-306, 2013.

10.     A. Razal, K. Manisekar, V. Balasubramanian, "Influences of welding speed on tensile properties of friction stir welded AZ61A magnesium alloy", Journal of Materials Engineering and Performance, Vol. 21, pp. 257-265, 2012.

11.     S. Lim, S. Kim, C. Lee, S. Kim, "Tensile behavior of friction-stir-welded Al6061-T651", Metallurgical and Materials Transactions, Vol. 35A, pp. 2829-2835, 2004.

12.     K. Elangovan, V. Balasubramanian, "Influences of pin profile and rotational speed of the tool on the formation of friction stir processing zone in AA2219 aluminum alloy, "Materials Science and Engineering A, Vol. 459, pp. 7-18, 2007.

13.     S. Rajakumar, C. Muralidharan, V. Balasubramanian, "Influence of friction stir welding process and tool parameters on strength properties of AA7075-T6 aluminum alloy joints, "Materials and Design, Vol. 32, pp. 535-549, 2011.

14.     B. Parida, M. Mohapatra, P. Biswas, N. R. Mandal, "Study of mechanical and micro-structural properties of friction stir welded Al-alloy", International Journal of Emerging Technology and Advanced Engineering, Vol. 2, pp. 307-312,  2012.

15.     C. Bitondo, U. Prisco, A. Squilace, P. Buonadonna, G. Dionoro, "Friction-stir welding of AA 2198 butt joints: mechanical characterization of the process and of the welds through DOE analysis", Int. J. Adv. Manuf. Technol., Vol. 53, pp. 505-516, 2011

16.     H. K. Mohanty, D. Venkateswarlu, M. Mahapatra, N. R. Kumar, "Modeling the effects of tool probe geometries and process parameters on friction stirred aluminium welds", Journal of Mechanical Engineering and Automation, Vol. 2, pp. 74-79, 2012.

17.     S. Rajakumar, C. Muralidharan, V. Balasubramanian, "Establishing empirical relationships to predict grain size and tensile strength of friction stir welded AA 6061-T6 aluminum alloy joints", Trans. Nonferrous Met. Soc. China, Vol.20, pp. 1863-1872, 2010.

18.     S. Rajakumar, V. Balasubramanian, "Multi-response optimization of friction-stir-welded AA1100 aluminum alloy joints", Journal of Materials Engineering and Performance, Vol. 21, pp. 809-822, 2012.

19.     R. Palanivel, P. K. Mathews, N. Murugan, "Development of mathematical model to predict the mechanical properties of friction stir welded AA6351 aluminum alloy", Journal of Engineering Science and Technology Review, Vol. 4, pp. 25-31, 2011.

20.     A. K. Lakshminarayanan, V. Balasubranian, "Process parameters optimization for friction stir welding of RDE-40 aluminum alloy using Taguchi technique", Transaction of non-ferrous alloys of china, Vol. 18, pp. 548-554, 2008.

21.     S. Vagh, S. N. Pandya, " Influence of process parameters on the mechanical properties of friction stir welded AA2014-T6 Alloy using Taguchi orthogonal array", International Journal of Engineering Sciences & Emerging Technologies, Vol. 2, pp. 51-58, 2012.

22.     K. Brahma Raju, N. Harsha, V. K. Viswanadha Raju, "Prediction of tensile strength of friction steer welded joints using artificial neural networks", International Journal of Engineering Research & Technology, Vol. 1 pp. 1-5, 2012.

23.     N. Tansel, M. Demetgul, H. Okuyucu, A. Yapici, "Optimizations of friction stir welding of aluminum alloy by using genetically optimized neural network", Int. J. Adv. Manuf. Technol., Vol. 48, pp. 95-101, 2010.

24.     H. J. Liu, H. Fujii, M. Maedaa, K. Nogi, "Tensile properties and fracture locations of friction-stir-welded joints of 2017-T351 aluminum alloy", Journal of Materials Processing Technology, Vol. 142, pp. 692-6996, 2003.

25.     A. Mirjalil, H. J. Aval, S. Serajzadeh, A.H. Kokabi, "Microstructural evolution and mechanical properties of FSWed 2017 AA with different initial microstructures", Proceedings of Institution of Mechanical Engineers, Part L: Journal of Material Design and Applications, February 2013.

26.     M. Rezgui, A. Trabelsi, M. Ayadi, and H. Bouzaiene, "RSM Modeling for Predicting Ultimate Tensile Stress and Yield Stress in Friction Steer Welded Aluminum 2017 A", submitted to Trans. Nonferrous Mat. Soc. China, 2013.

27.     Douglas, C. Montgomery, "Design and Analysis of Experiments", Sixth Edition, John Wiley and Sons, Inc. 2005.

28.     G. Derringer, R. Suich, "Simultaneous optimization of several response variables", J. of Quality Technology, Vol. 5, pp. 469-479, 1980.





Abhinav Bhargava, Samrat Ghosh, Savan Kumar Oad

Paper Title:

A  Multi (U) Slotted Rectangular Micro-strip Multiband Patch Antenna

Abstract:    In this paper we present a proposed design for Rectangular micro-strip patch antenna by cutting U shaped slots in the Rectangular patch which operates at two central frequencies 1.8, 2.7GHz. Which is a new dual frequency microstrip antenna? By micro strip feeding technique proposed antenna design we find the resultant return loss, VSWR and bandwidth. For the design of the microstrip antenna we have used FR-4 substrates which have permittivity of 4.4 and thickness 3.2, loss tangent is 0.02. We are using FEKO simulation software for designing and analysis. We have observed that using slotted patch antenna and using micro strip at proper location we can get better return loss, VSWR bandwidth and multiband.

   Slotted Rectangular micro-strip patch antenna, return loss, VSWR, radiation pattern.


1.       G.Papitha, V. Thyagarajan and Ayshathul Fouzia,”Design and Simulation of Stacked Fractal Patch Antenna using IE3D” . International Conference on Computing and Control Engineering (ICCCE), 12 and 13 April 2012.
2.       John D Kraus, Ronald J Marhefka, Ahmed S Khan,” Antennas and Wave Propagation”. Tata McGraw Hill Education Private Limited New Delhi 2010.

3.       R. Garg and P. Bhartia, “Micro-strip Antenna handbook”. Boston Artech House 2001

4.       R.Q. Lee, K.F. Lee and J.Bobinchak,”Characterstics of a two layer electromagnetically coupled rectangular patch antenna”, Electron Lett. Vol. 23 no 20, pp 1070-1072, 1987

5.       Binu Paul, S. Mridula, C.K. Aanandan and P. Mohan. Microwave and optical technology letters/ vol33, no4, 4 may2002. 

6.       Constantine A. Balanis”Antenna Theory: Analysis Design” Third edition John Wiley & Sons, Inc 2005





E. Mohan, K.B. Jayarraman, U. Maheswaran, D. Sathiyaraj. G.Dhakshanamoorthi

Paper Title:

A Novel Approach for Satellite Image Resolution Enhancement

Abstract:    Image resolution is an important issue in satellite imaging. Wavelets play a significant role in multi resolution analysis. In this paper, a new resolution enhancement technique is proposed. This method is based on interpolation of the high frequency sub-bands which are obtained by performing Discrete Wavelet Transform (DWT) on input image. DWT separates the image in to different sub-band images namely, low-low (LL), low-high (LH), high-low (HL) and high-high (HH). Interpolation can be applied to these four sub-band images. In the wavelet domain, the low-resolution image is obtained by low-pass filtering of the high-resolution image. The low-resolution image (LL sub-band) is used as input for the proposed resolution enhancement process. The high frequency sub-bands contain the high frequency components of image .Interpolation is carried out using Adjacent pixel algorithm and Inverse Discrete Wavelet Transform(IDWT) has been applied to combine all these images to generate the final super-resolved image. This approach generates sharper and clearer image. The proposed technique has shown superiority over the conventional image resolution enhancement techniques.

   Adjacent Pixel algorithm, DWT (discrete wavelet transform), Image Enhancement, Interpolation, Adjacent Pixel algorithm.


1.        H. Demireland G. Anbarjafari, “Satellite image resolution enhancement using complex wavelet transform,” IEEE Geosci. Remote Sens. Lett, vol. 7, no. 1, pp. 123–126, Jan. 2010.
2.        Y. Piao, L. Shin, and H. W. Park, “Image resolution enhancement using Inter-sub-band correlation in wavelet domain,” in Proc. IEEE ICIP, 2007, vol. 1, pp. I-445–I-448.

3.        X. Li and M. T. Orchard, “New edge-directed interpolation,” IEEE Trans.Image Process., vol. 10, no. 10, pp. 1521–1527, Oct. 2001.

4.        C. B. Atkins, C. A. Bouman, and J. P. Allebach, “Optimal image scaling using pixel classification,” in Proc. ICIP, Oct. 7–10, 2001, vol. 3, pp. 864–867.

5.        G. Anbarjafari and H. Demirel, “Image super resolution based on interpolation of wavelet domain high frequency sub-bands and the spatial domain input image,” ETRI J., vol. 32, no. 3, pp. 390–394, Jun. 2010.

6.        H. Demirel, G. Anbarjafari, and S. Izadpanahi, “Improved motion-based localized super resolution technique using discrete wavelet transform for resolution video enhancement,” in Proc. 17th EUSIPCO, Edinburgh, U.K., Aug. 2009, pp. 1097–1101.

7.        A. Temizel and T. Vlachos, “Wavelet domain image resolution enhancement using cycle-spinning,” Electron. Lett, vol. 41, no. 3, pp. 119–121, Feb. 3, 2005.

8.        A. Temizel, “Image resolution enhancement using wavelet domain hidden Markov tree and coefficient sign estimation,” in Proc. ICIP, 2007, vol. 5, pp. V-381–V-384.





Afsana Nadia, S. K. Aditya

Paper Title:

Performance Analysis of GSM Coverage considering Spectral Efficiency, Interference and Cell Sectoring

Abstract:    In this work, the capacity and coverage area of GSM system have been studied. This paper presents the importance of using link budget calculations, determining the path loss and cell range for RF coverage planning and improving capacity using cell-sectoring. The major contribution is to estimate the coverage of GSM system which depends on BS antenna height, transmitting antenna gain, output power of BS for propagation environment such as rural, sub-urban and urban case. MATLAB has been used for simulation and performance evaluation of capacity and coverage in GSM system. Path loss for uplink and downlink has been calculated using Link Calculator software considering 3-sector antenna. Analysis reveals that coverage area improves significantly considering spectral efficiency, interference and cell sectoring. As an example, Google Earth and Radio Works software have been used to estimate the coverage area for a particular area. A 3D coverage map has been formulated using this result.

   Cell Sectoring, GSM Coverage, Interference, Spectral Efficiency.


1.       T. S.Rappaport, “Wireless Communications”, 2nd Edition, Prentice Hall, 2002, Ch. 1, pp. 1-9.
2.       T. S.Rappaport, “Wireless Communications”, 2nd Edition, Prentice Hall, 2002, Ch. 3, pp. 67-74.

3.       Haykin, S., “Communication Systems”, 4th Edition, Willey, Inc., Newyork, 2001.

4.       Steele, R., Lee, C.C., Gould, P., “GSM, cdma One and 3G Systems”, John Wiley & Sons Ltd, Baffins Lane, Chichester, 2001.

5.       Dr. Wajih A. Abu-Al-Saud, “Improving Coverage and Capacity in Cellular Systems”, Lecture 10, EE 499: Wireless & Mobile Communications(082).Available:http://faculty.kfupm.edu.sa/EE/wajih/files/EE%20499,%20Lecture%2010.pdf

6.       Garg, V. K., and J. E. Wilkes, “Wireless and Personal Communications Systems”, Prentice Hall, 1996, ISBN 0-13-234626-5.

7.       Stutzman, W. L. and G. A. Thiele, “Antenna Theory and Design”, Wiley, 1998, ISBN 0-471-02590-9.

8.       A.R. Mishra, “Fundamentals of Cellular Network Planning & Optimisation”, John Wiley & Sons, 2004, Ch. 2, pp. 29-33.

9.       J. Lempiäinen-M. Manninen, "Radio Interface System Planning for GSM/GPRS/UMTS", Kluwer Academic Publishers, 2002.

10.     Ali Hakan IŞIK, İnan Gular, “Novel Approach for Optimization of Cell Planning and Capacity”, International Journal Of Communications, Issue 1, Volume 3, 2009.

11.     Dr. S. A. Mawjoud, “Evaluation of Power Budget and Cell Coverage Range in Cellular GSM System”, Al-Rafidain Engineering, Vol.16 No.1 2008.

12.     B. H. Walke, Mobile Radio Networks, John Wiley and Sons, 2002, pp. 44-46.

13.     K. Pahlavan and A. H. Levesque, Wireless Information Networks, John Wiley and Sons, 1995, pp.74-82.





Nirvesh S. Mehta, Nilesh J. Parekh, Ravi K. Dayatar

Paper Title:

Improve the Thermal Efficiency of Gearbox Using Different Type of Gear Oils

Abstract:    Gear box performance is dependent on viscosity of lubricant oil and due to the thermal effect of heat generated in side of an oil span of gear box. Thus if we change properties of an oil, the performance of gear box does change. The effect on gear box performance will be studied by CFD Analysis. CFD analysis of gear box is carried out for different viscosity oils. For the analysis purpose design of Maruti Omni’s gear box is used. Compression of thermal analysis is done for different viscosity oils are SAE 85W 140 (High Grade), SAE 85W 140 (Commercial), SAE 80W 90 (High Grade),SAE 80W 90 (Commercial), SAE 75W 90 (High Grade),SAE 75W 90 (Commercial),SAE EDIB (Suggested Oil). So it is proved that suggested oil SAE EDIB is better than available market oils.

   About four key words or phrases in alphabetical order, separated by commas.


1.       Seetharaman, S., Kahraman, A., Bednarek, G. and Rosander, P., 2008, “A Model to Predict Mechanical Power Losses of Manual Transmissions,” Automobiltechnische Zeitschrift, April 2008, Issue4, pp. 346-357.
2.       Seetharaman, S., Kahraman, A., 2008, “Load Independent Spin Power Losses of a Spur Gear Pair: Model Formulation,” (in review) Journal of Tribology.

3.       Seetharaman, S., Kahraman, A., Moorhead, M. D., and Petri-Johnson, T. T., 2008, “Load Independent Spin Power Losses of a Spur Gear Pair: Experiments and Model Validation,” (in review) Journal of Tribology.

4.       Martin, K. F., 1978, “A Review of Friction Predictions in Gear Teeth,” Wear, 49, pp. 201-238.

5.       Yada, T., 1997, “Review of Gear Efficiency Equation and Force Treatment,” JSME Int. J., Ser. C, 40, pp. 1-8.

6.       Li, Y., and Seireg, A. A., “Predicting the Coefficient of Friction in Sliding-Rolling Contacts,” Tribology Conference, K18

7.       Heingartner, P, and Mba, D., 2003, “Determining Power Losses in the Helical Gear Mesh,” Gear Technology, September/October 2005, pp. 32-37.

8.       Changenet, C., Oviedo-Marlot, X., and Velex, P., 2006, “Power Loss Predictions in Geared Transmissions Using Thermal Networks-Applications to a Six-Speed Manual Gearbox,” Transactions of the ASME, Vol. 128, pp. 61

9.       Prakash D. Patel, “An Experimental investigation of power losses in manual transmission gear box”.

10.     Carlo Gorla, Franco Concli, Karsten Stahl, Bernd-Robert   Hohnet, Michaelis Klaus, Hansjorg Schultheiß, and Johann-Paul Stemplinger, “CFD Simulations of Splash Losses of a Gearbox”.

11.     B. R. Hohnet F. Concli & C. Gorla, “Oil squeezing power losses in gears: a CFD analysis”,

12.     V. Chernoray & M. Jahanmiri, “Experimental study of multiphase flow in a model gearbox”.

13.     Solidworks software.

14.     ANSYS V 12.1

15.     Pro-E Wild Fire

16.     www.peakantifreeze.com

17.     Wikipedia “Gearbox”.





B. Veeramallu, M.Aparna

Paper Title:

Navigate In India

Abstract:    Indian Railways is one of the world's largest railway networks comprising 115,000 km (71,000 mi) of track over a route of 65,000 km (40,000 mi) and 7,500 stations. IR carries about 7,500 million passengers annually or more than 20 million passengers daily (more than a half of which are suburban passengers) and 2.8 million tons of freight daily. Railways are divided into Zones Indian railways has 17 zones (SC, WCR, WR, NFR...). Zones are divided into divisions [Vijayawada division, Bhopal division Varanasi division, Moradabad division, Lucknow division etc.] Divisions are headed by a DRM [Divisional Railway Manager]. Under DRM each department has one officer as in-charge for maintenance of their equipment. Indian Railways has 68 divisions 17 zones. IR NAVIGATION is a web based application which is developed for the purpose of easy identification of trains in different aspects. It is going to provide more useful information to the user regarding the journey (between a source station and a destination station) like connecting trains, type of the trains, fare and time of the journey reducing time complexity. This is the project gathering information of Indian railways i.e., tracks routes, trains, stations, facilities in the station and trains to provide the information to the user effectively.

   DRM-Divisional Railway Manager, SC-Secunderabad, NFR-Northeast Frontier Railway, WCR-West Central Railway, WR-Western Railway


1.        Different division books available
2.        Indian railway atlas

3.        ‘Trains at a glance’ book by Indian railways

4.        Different Zone division books.

5.        http://www.Indianrail.gov.in (Indianrailgov.in) is a government web site.

6.        http://www.Indiarailinfo.com (private  website).

7.        http://www.Erail.in (private web site).

8.        http://www.railradar.trainenquiry.com (private web site).

9.        http://www.irctc.co.in

10.     http://www.ireps.gov.in
11.     http://www..trainweb.org

12.     http://www.yatra.com

13.     http://www.Samit.org

14.     http://www.tripadvisor.in





Supiah Shamsudin, Azmi Ab Rahman, Zaiton Binti Haron, Lat Da A/P Ai Nam

Paper Title:

Water Level Evaluation at Southern Malaysia Reservoir using Fuzzy Composite Programming

Abstract:    Ranking and evaluation of properreservoir water level outflowing into downstream river system under multi-criterion environment was presented using multi-criteria decision approach specifically Fuzzy Composite Programming (FCP). The optimum water level evaluation is vital to take into consideration the various environmental, water quantity and economical aspects of the overall systems. This multicriteria analysis will optimize water release, ensuring water quality, providing economical benefits and maintaining high quality of the natural landscape. The study mainly focuses on optimizing outflowing water level by identifying and grouping the basic indicators into its particular composite structure. The basic indicators include various water quality parameters, flowrates, rainfall, scenery etc. The composite structure of the overall reservoir water use system was presented. Five(5) alternatives based on reservoir water level was adopted which include 20.6m (Alternative 1), 22.2m(Alternative 2), 23.8m(Alternative 3), 25.4m (Alternative 4) and 27.0m(Alternative 5) respectively. Sensitivity analysis using three (3) set of different weights was performed for analyzing the robustness of the optimum water level obtained. The FCP structure consists of 15 first level indicators, 5 second level indicators, 2 third level indicators and the final indicators. The optimum value was determined based on the shortest distance between the fuzzy box and an ideal point. The optimum answer was also obtained from the highest ordered sequence value. The highest ranking order indicated by highest ordered sequence value obtained was Alternative 3 (0.660), followed by Alternative 4 (0.596), Alternative 2 (0.555), Alternative 5 (0.515) and lastly Alternative 1(0.500). The highest ranking order indicated the most optimum, advisable and appropriate water level for Layang reservoir.

   Fuzzy Composite Programming, MCDM, Optimum water level, Reservoir


1.        Christofides A.et al., (2005). Resolving Conflicting Objectives in the management of the Plastiras Lake: can we quantify beauty? ,Hydrology and Earth System Science9,507-515.
2.        Markel D., U.Shamir, (2002) Monitoring Lake Kinneret and Its Watershed: Forming the Basis for Management of a Water Supply Lake: H.Rubin, et. al .Water Resources Quality .Springer-Verlag Berlin Heidelberg New York, 2002. 177-214

3.        Supiah S., (2003) Non-point Phosphorus Loadings and Reduction in Layang Reservoir Systems. Universiti Teknologi Malaysia: PhD. Thesis.

4.        Supiah S., Dan’azumi, S. Aris A.(2010). “Effect of Storm Separation Time on Rainfall Characteristics-ACase Study of Johor”.  European Journal of Scientific Research.  45(2), 62-167.

5.        Dan’azumi, S., Supiah S. and Aris A. (2010) “ Modeling the Distribution of Rainfall Intensity using Hourly Data” American Jour. of Env. Sciences, 6 (3), 238-243.

6.        Zadeh L. (1965). Fuzzy sets, Inf. Control 8, 338-353,Bogardi I. (1992)  Environmental risk analysis, water, development and the environment. J. Williams et. al. eds. Boca Raton Publishing, Boca Raton, Fla. 147-175

7.        Chameau, J.L. and Santamaria, J.C.. (1987). Membership function I: Comparing methods and measurement.  International Journal of Approximate Reasoning, 1: 287-301.

8.        Chen, S.H. (1985) Ranking fuzzy numbers with maximizing set and minimizing set, Fuzzy Sets and Systems, 17: 113–129.

9.        Raj, P.A. (2002) Ranking Multicriteria River Basin Planning and Development Alternatives Using Electre and Ranfuw. Krishna River Basin Planning Report. Department of Civil Engineering, Indian Institute of Technology.

10.     Stanbury, J.S., Bogardi, I., Lee,Y.W.,Wayna E.W. (1991) Multiobjective decision under uncertainty. IX-th International Conference on Multiple Criteria Decision Making, Fairfax. Virginia.

11.     Zeleny, M. (1982), Compromise programming, In: J.L. Cochrane, M. Zeleny (Eds.), Multiple Criteria Decision Making, University of South Carolina Press, Columbia, SC, pp. 263–301.





Neethu T. Sunil, V. Tharmalingam

Paper Title:

Distributing Confidentiality to a Visual Secret Sharing Scheme

Abstract:    A Visual Secret Sharing (VSS) scheme is one realization of secret sharing schemes without using computation which distinguishes VSS from ordinary cryptography. In a typical VSS scheme (normally called a (k, n) –threshold VSS scheme), a dealer encodes a secret image in to ‘n’ shares each of which reveals no information regarding the secret image. In this system, the secret image can be reproduced only by stacking n number of shares in the correct order. The reproduced images will be clearer (larger contrast) and with small pixel expansion compared to Unconditional security VSS scheme. This security notion is effective when attackers cannot use computers since it may take much time to analyze combinations of sub pixels exhaustively.

   Visual secret sharing, Weaker security sharing, halftone technique, visual cryptography.


1.        Shamir, “How to share a secret”              
2.        Mitsugu Iwamoto, “General Construction Methods of Secret Sharing   Schemes and Visual Secret Sharing Schemes”

3.        M. Naor and A. Shamir, “Visual cryptography”

4.        www.wikipedia.com

5.        G. Ateniese, C. Blundo , A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures”

6.        Blundo, P. D’Arco, A. D. Santis, and D. R. Stinson, “On the contrast in visual cryptography schemes”.

7.        Pei-Fang Tsai and Ming-Shi Wang, “An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data”.

8.        Integer programming.

9.        Velmurugan and Vijayaraj, “Visual Pixel Expansion of Secret Image”.





Rajas Hegiste, Aditya Sawant, Mangesh Kshirsagar, Devendra Kahane

Paper Title:

Secured Administrative Information Management System Using Radio Frequency Identification

Abstract:    Secured Administrative Information Management System using RFID is a system through which we aspire to make a computerized campus of our college. The system will help the students solve all possible problems they face. Also it will help the teaching faculty as well as the administrative staff  to understand the student’s problems and queries. Student’s work of going to office and searching every notice board for the particular notices will be reduced. The system uses Radio Frequency Identification for handling all information. Applications based on RFID are rising as there can be many new technologies that can be bound to it and can be used to develop further complex systems. This paper proposes a system that will handle information of students for an institute using the RFID and contains another feature of One Time Password as well as making all the possible work online and effortless.

   RFID, Tags, Information Management System.


1.       Mobile Platform for Networked RFID Applications , Lee, Donggeon ; Kim, Seongyun ; Kim, Ho-Won Won ; Park, Namje Information Technology: New Generations (ITNG), 2010 Seventh International Conference  Publication Year: 2010.
2.       A Survey Paper on Radio Frequency IDentification (RFID) Trends, Christoph Jechlitschek.Publication year :2006

3.       Authentication and lightweight cryptography in low cost RFID  ,Mobahat, Hoopad Software Technology and Engineering (ICSTE), 2010 2nd International Conference  Volume: 2 Publication Year: 2010

4.       Personal Navigator for a Public Transport System using RFID Ticketing, Ana Aguiar and Francisco Nunes and Manuel Silva and Dirk Elias, Fraunhofer Portugal Research Centre AICOS,Porto, Portugal.Email: {ana.aguiar, francisco.nunes, manuel.silva, dirk.elias}@fraunhofer.pt.

5.       Impact of RFID technology on economic order quantity models Bhadrachalam, Lakshmi ; Chalasani, Suresh ; Boppana, Rajendra V. Systems Conference, 2009 3rd Annual IEEE Publication Year:2009

6.       The Use of RFID for Human Identification A DRAFT REPORT from DHS Emerging Applications and Technology Subcommittee to the Full Data Privacy and Integrity Advisory Committee Version 1.0

7.       Design of an Intelligent Web-Based Help Desk System David A. Thurman, Jeffrey S. Tracy, and Christine M. Mitchell Center for Human-Machine Systems Research School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205[dave, jtracy, cm]@chmsr.isye.gatech.edu.

8.       RFID infrastructure management based on event correlation analysis Lee, Ho Sung ; Oh, Sewon Won  Advanced Communication Technology (ICACT), 2012 14th International Conference on Publication Year: 2012 ,






Paper Title:

Navigation Tool for Visually Challenged using Microcontroller

Abstract:    This paper describes the development of a navigation aid in order to assist blind and visually impaired people to navigate easily, safely and to detect any obstacles. The system is based on a microcontroller with synthetic speech output. In addition, it consists of two vibrators, two ultrasonic sensors mounted on the user’s shoulders and another one integrated into the cane. This aid is able to give information to the blind about urban walking routes and to provide real-time information on the distance of over-hanging obstacles within six meters along the travel path ahead of the user. The suggested system consists then in sensing the surrounding environment via sonar sensors and sending vibro-tactile feedback to the user of the position of the closest obstacles in range. For the ultrasonic cane, it is used to detect any obstacle on the ground.

   Sensors, Microcontroller, Vibrator, Navigation


1.        Yuan, D.; Manduchi, R.; “Dynamic environment exploration using a virtual white cane”, in Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference.
2.        Tahat, A.A., “A wireless ranging system for the blind long-cane utilizing a smart-phone”, in Telecommunications, 2009. ConTEL 2009.

3.        Bolgiano, D. Meeks; “A Laser Cane for the Blind”, in Quantum Electronics, IEEE Journal (2003).

4.        Zhang, J.; Lip, C.W.; Ong,

5.        M, Bousbia Salah A.larbi and M.Bedda “An approach for the measurement of impaired people” in proc 10th IEEE International Conference on Electronic Circuits and Systems





E.Mohan, R.Kangayen, R.Lavanya, N.Deepa

Paper Title:

Evolution of Open Spectrum Sharing Technology- A Survey

Abstract:    The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to the spectrum. The main potential advantages introduced by cognitive radio are improving spectrum utilization and increasing communication quality. These appealing features match the unique requirements and challenges of resource-constrained multi-hop wireless sensor networks (WSN). Furthermore, dynamic spectrum access stands as very promising and spectrum-efficient communication paradigm for WSN due to its event-driven communication nature, which generally yields bursty traffic depending on the event characteristics. In addition, opportunistic spectrum access may also help eliminate collision and excessive contention delay incurred by dense deployment of sensor nodes. Clearly, it is conceivable to adopt cognitive radio capability in sensor networks, which, in turn yields a new sensor networking paradigm, i.e.,cognitive radio sensor networks (CRSN). In this paper, the main design principles, potential advantages and application areas and network architectures of CRSN are introduced. The existing sensing methods adopted in WSN are discussed along with the open research avenues for the realization of CRSN.

   Cognitive radio, sensor networks, opportunistic spectrum access, efficient spectrum sensing.


1.        Linda Doyle, “Essentials of cognitive radios”,Cambridge wireless essentials series, Cambridge university press, pp. 96-105, 2009.
2.        Yucek and Arsalan, “A survey of spectrum sensing algorithms for cognitive radio applications”, IEEE Communication Surveys & Tutorials, vol. 11, no. 1, pp. 117-122, first quarter, 2009.

3.        Simon Haykin, “Cognitive radio: Brain-empowered wireless communications”, IEEE J. Selected Areas Communications, vol. 23, no. 2, pp. 201-220, Feb. 2005.

4.        Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey”, IEEE J. of Selected Topics In Signal Processing, Vol. 5, NO. 1, February 2011.

5.        L. Stabellini, J. Zander, “Interference Aware Self-Organization for Wireless Sensor Networks: a Reinforcement Learning Approach“, in Proceedings of the 4th annual IEEE Conference on Automation Science and Engineering (CASE 2008), 2008.

6.        S. Geirhofer, L. Tong, B. M. Sadler, “Dynamic  Spectrum Access in the Time Domain: Modeling and Exploiting White Space“, in IEEE Communication Magazine, Vol. 45, No. 5, May 2007.

7.        A. Ghasemi, E. S. Sousa, “Spectrum Sensing in Cognitive Radio Networks: Requirements, Challenges and Design Trade-offs“, in IEEE Communications Magazine, Vol. 46, No. 4, April 2008.

8.        G. Ganesan, Y. G. Li, “Cooperative Spectrum Sensing in Cognitive Radio Networks”, in Proceedings of IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005.

9.        R. Chen, J.-M. Park, K. Bian, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks“, in Proceedings of 27th IEEE Conference on Computer Communications (INFOCOM), 2008.

10.     S. Byun, I. Balasingham, X. Liang, “Dynamic Spectrum Allocation in Wireless Cognitive Sensor Networks: Improving Fairness and Energy Efficiency”, in Proc. IEEE VTC 2008, pp. 1-5, Sep. 2008.

11.     Mahmood A. Abdulsattar and Zahir A. Hussein “Energy detect technique for spectrum sensing in cognitive radio:  a survey”   . International Journal of Computer Networks & Communications (IJCNC)  Vol.4, No.5, September 2012.

12.     Luca Stabellini and Jens Zander   “Energy-Aware Spectrum Sensing     in     Cognitive  Wireless Sensor Networks: a Cross Layer Approach”. IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.   

13.     Farrukh Javel,Imran Shafi and Asad Mahmood   “ Novel  Radio Mode Identification Approach for Spectrum Sensing  in  Cognitive Radios”. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4, No. 2, August 2012.





Vikas P. Jadhao, Prakash S. Pajgade

Paper Title:

Influence of Masonry Infill Walls on Seismic Performance of RC Framed Structures a Comparision of AAC and Conventional Brick Infill

Abstract:    The construction of reinforced concrete buildings with unreinforced infill is common practice in India. Infill panels have traditionally been made of heavy rigid materials, such as clay bricks or concrete blocks. However, more lightweight and flexible infill options Such as AAC (aerated light weight concrete) blocks are now available in India to be used as masonry infill (MI) material in reinforced concrete (RC) framed buildings. The behavior of in-filled reinforced concrete (R/C) frames has been studied experimentally and analytically by a number of researchers. It has been recognized that infill materials give significant effect to the performance of the resulting in-filled frame structures. Most of the researches carried out in this area are focused on parameters such as the distribution of MI, variation of geometry, the strength of infill materials and the relative stiffness of infill to frame elements. The study of the effect of types of infill materials used (lightweight versus conventional brick masonry) on the behavior of in-filled R/C frames is however still limited. Previous experimental study has concluded that the R/C frame in-filled with AAC blocks exhibited better performance under lateral loads than that in-filled with conventional clay bricks. In the present paper an investigation has been made to study the behaviour of RC frames with both AAC block and conventional clay bricks infill when subjected to seismic loads.

   AAC (autoclaved aerated light weight concrete blocks), FEMA 273, FEMA 356, in-filled frames.


1.       Momin Mohmedaki et. Al.˝ Seismic Assessment of Rc Frame MasonrInfill With ALC Block ״ International Journal of Advanced Engineering Research and Studies”, Vol. I Issue III April-June, 2012, pages 148-149;
2.       Hemant B. Kaushik et. Al.,˝Code Approaches to Seismic Design of Masonry-Infilled Reinforced Concrete Frames: A State-of-the-Art Review”, Earthquake Engineering Research Institute, Earthquake Spectra, Volume 22, November 2006,pages 961–983;

3.       Diptesh Das et. Al.,˝ Brick Masonry Infills in Seismic Design of RC Framed Buildings; part 1- Cost Implication”, The Indian Concrete Journal, July 2004, pages 39-44

4.       Mulgund G. V et. al.,˝Seismic Assesement of  RC Frame Buildings With Brick Masonry Infills”, IJAEST, VOL2, ISSUE NO 2, PAGES 140-147;

5.       Kasım Armağan KORKMAZ, et. Al.,˝ Assessment of RC Structures with Masonry ”, International Journal of Science & Technology Volume 2, No 2, 2007,PAGES 155-164;

6.       Sharany Haque et. Al.,˝Seismic Vulnerability of Columns of RC;

7.       P. G. Asteris,˝ Lateral Stiffness of Brick Masonry Infilled Plane Frames, Journal Of Structural Engineering © ASCE / AUGUST 2003 ;





P. R. Badadapure

Paper Title:

Content-Based Image Retrieval by Combining Structural and Content Based Features

Abstract:    Many different approaches for content-based image retrieval have been proposed in the literature. Successful approaches consider not only simple fea-tures like color, but also take the structural relationship between objects into account. In this paper we describe two models for image representation which integrate structural features and content features in a tree or a graph structure. The effectiveness of this two approaches is evaluated with real world data, using clustering as means for evaluation. Furthermore, we show that combining those two models can further enhance the retrieval accuracy.

 Successful approaches consider not only simple fea-tures like color, but also take the structural relationship between objects into account.


1.        Flickner, M., Swahney, H., Niblack, W., Ashley, J., Huang, Q., Dom, B., Gorkani, M., Hafner, J., Lee, D., Petkovic, D., Steele, D., Yanker, P.: Query by image and video content: The QBIC system. IEEE Computer (1995)
2.        Mehtre, B., Kankanhalli, M., Lee, W.: Shape measures for content based image retrieval: A comparison. Information Processing Management 33 (1997) 319-337

3.        Cullen, J., Hull, J., Hart, P.: Document image database retrieval and browsing using texture analysis. In: Proc. 4th Int. Conf. Document Analysis and Recognition. (1997) 718-721

4.        Fuh, C.S., Cho, S.W., Essig, K.:  Hierarchical color image region segmentation and shape extraction. IEEE Transactions on Image Processing 9 (200) 156-163

5.        Tagare, H., Vos, F., Jaffe, C., Duncan, J.: Arrangement - a spatial realtion between parts for evaluating similarity of tomographic section. IEEE Trans. PAMI 17 (1995) 880-893

6.        Smeulders, A.W.M., Worring, M., Santini, Simone Gupta, A., Jain, R.: Content-based image retrieval at the end of the early years. IEEE Trans. PAMI 22 (2000) 1349-1380

7.        Levenshtein, V.: Binary codes capable of correcting deletions, insertions and reversals. So-viet Physics-Doklady 10 (1966) 707-710

8.        Wagner, R.A., Fisher, M.J.: The string-to-string correction problem. Journal of the ACM 21(1974)168-173

9.        Zhang, K., Statman, R., Shasha, D.: On the editing distance between unordered labeled trees. Information Processing Letters 42 (1992) 133-139

10.     Zhang, K., Wang, J., Shasha, D.: On the editing distance between undirected acyclic graphs. International Journal of Foundations of Computer Science 7 (1996) 43-57

11.     Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding approximate patterns in undirected acyclic graphs. Pattern Recognition 35 (2002) 473-483

12.     Nierman, A., Jagadish, H.V.: Evaluating structural similarity in XML documents. In: Proc. 5th Int. Workshop on the Web and Databases (WebDB 2002), Madison, Wisconsin, USA. (2002)61-66

13.     Sebastian, T.B., Klein, P.N., Kimia, B.B.:  Recognition of shapes by editing shock graphs. In: Proc. 8th Int. Conf. on Computer Vision (ICCV’01), Vancouver, BC, Canada. Volume 1. (2001)755-762

14.     Kailing, K., Kriegel, H.P., Schönauer, S., Seidl, T.: Efficient similarity search for hierachical data in large databases. In: Proc. 9th Int. Conf. on Extending Database Technology (EDBT 2004). (2004) 676-693

15.     Huet, B., Cross, A., Hancock, E.: Shape retrieval by inexact graph matching. In: Proc. IEEE Int. Conf. on Multimedia Computing Systems. Volume 2. (1999) 40-44

16.     Kubicka, E., Kubicki, G., Vakalis, I.: Using graph distance in object recognition. In: Proc. ACM Computer Science Conference. (1990) 43-48.

17.     Wiskott, L., Fellous, J.M., Krüger, N., von der Malsburg, C.:  Face recognition by elastic bunch graph matching. IEEE Trans. PAMI 19 (1997) 775-779

18.     Kriegel, H.P., Schönauer, S.:  Similarity search in structured data.  In: Proc. 5th Int. Conf. DaWaK 2003. Volume 2737 of LNCS. (2003) 309-319

19.     Kriegel, H.P., Kröger, P., Mashael, Z., Pfeifle, M., Pötke, M., Seidl, T.: ”Effective Similar-ity Search on Voxelized CAD Objects”.  In: Proc. 8th Int. Conf. on Database Systems for Advanced Applications (DASFAA’03), Kyoto, Japan. (2003)

20.     Kailing, K., Kriegel, H.P., Pryakhin, A., Schubert, M.: Clustering multi-represented objects with noise. In: to appear in: Proc. 8th Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD’04), Sydney, Australia. (2004)

21.     Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clus-ters in large spatial databases with noise. In: 2nd Int. Conf. KDD. (1996) 226-231





Neelesh Kumar, Sanjeev Gupta, S.P.Phulambrikar

Paper Title:

A Novel Three-Phase Multilevel Inverter Using Less Number of Switches

Abstract:    A novel three phase multilevel inverter with a small number of switching devices is proposed. Large electrical drives and utility application require advanced power electronics converter to meet the high power demands. As a result, multilevel power converter structure has been introduced as an alternative in high power and medium voltage situations. A multilevel converter not only achieves high power rating but also improves the performance of the whole system in terms of harmonics. In this paper the proposed inverter can output more numbers of voltage levels with reduced number of switches as compared to cascade H-bridge inverter, which results in reduction of installation cost and have simplicity of control system. Finally, the simulation and experimental results validate the concept of this new topology.

   PWM, SPWM, Cascade H-bridge(CHB), matlab simulation, multilevel inverter.


1.       Murugesan.G, Jagabar Sathik.M and Praveen.M, “A new multilevel inverter topology using less number of switches”, IJEST, Vol. 3 No.2 feb 2012.
2.       Ebrahim Babaei, 2008, “A Cascade Multilevel Converter Topology With Reduced Number of Switches” IEEE Transactions on power electronics, Vol 23, No. 6.

3.       J. Rodríguez, J. S. Lai, and F. Z. Peng, “Multilevel inverters: A survey of topologies, controls, and applications,” IEEE Transaction on Industrial electronics, vol. 49, no. 4, pp. 724–738, Aug. 2002

4.       D.Mohan, Sreejith B.Kurub, “A Comparative Analysis of Multi Carrier SPWM Control Strategies using Fifteen Level Cascaded H–bridge Multilevel Inverter”,  International Journal of Computer Applications (0975 – 8887), Vol 41– No.21, March 2012

5.       B.P.Mcgrath  and  D.G  Holmes  “reduced  n  PWM harmonic  distortion  for  multi  level  inverters operating  over  a  wide  modulation  range”  IEEE Transactions  on  power  electronics  vol  21  no  4 pp941-949, july 2006

6.       Rashid, M.H, 2004. “Power Electronics:Circuits, devices and applications. Third Edition, Prentice Hall

7.       Leon  M.Tolbert  and  Thomas  G.  Habetler  “Novel multilevel  inverter  carrier  based  PWM  method” IEEE Transaction  On  Industry  Application  Vol  35 No 5 Sep 1999 pp 1098-1107

8.       L. M. Tolbert, F. Z. Peng, T. G. Habetler, “Multilevel PWM methods at low modulation indices,” IEEE Transactions on power electronics, vol. 15, no. 4, July 2000, pp. 719-725

9.       Martha Calais, Lawrence J.Borlel Vassilios,  G. Agelidis “Analysis of Multi carrier PWM Methods for  a  single  phase  five  level  inverter”  IEEE

10.     D.G. Holmes,  T.A.Lipo, “Modern  Pulse  Width Modulation Techniques for Power Converter”, IEEE Press, 2003

11.     E. Babaei, M.T. haque and S.H. Hosseini, “A novel structure for multilevel converter” in Proc. ICEMS, 2005, Vol. 2, pp. 1278-1283

12.     B. Axelrod, Y. Berkovich, and A. Ioinovici, “A cascade boost-switched capacitor-converter–two level inverter with an optimized multilevel output waveform,” IEEE Trans. Circuits Syst., vol. 52, no. 12, pp. 2763–2770, Dec. 2005.

13.     P. Lezana, J. Rodriguez, and D. A. Oyarzun, “Cascaded multilevel inverter with regeneration capability and reduced number of switches,” IEEE Trans. Ind. Electron., vol. 55, no. 3, pp. 1059–1066, Mar. 2008.

14.     T. Teratani, M. Amano, and M. Fujiwara, “Roadmap of next generation automotive electric power systems,” IEEJ Abstract Contents of Tech. Rep.,no. 1049, Mar. 2006, (in Japanese)

15.     F.  S.  Kang,  S.  J.  Park,  S.  E.  Cho,  C.  U.  Kim,  and  T.  Ise,“Multilevel PWM inverters suitable for the use of stand-alone photovoltaic power systems,” IEEE Trans. Energy Converts., vol. 20, no. 4, pp. 906–915, Dec. 2005.





Tourkia Lajnef, Slim Abid, Anis Ammous

Paper Title:

Design and Simulation of Photovoltaic Water Pumping System

Abstract:    The power source for pumping water is one of the most promising areas in photovoltaic applications. This paper presents the performance of the photovoltaic plant especially in the case of climatic and load fluctuations. The studied system consists of the PV array, the ACmotor, the centrifugal pump and using an MPPT algorithm to improve the efficiency of the PV system. This methodology allows an optimal control and monitoring of inverters by calculating the duty cycle of the DC-DC converter and the voltage/frequency control. Each subsystem is modeled in order to simulate the whole system in MATLAB/SIMULINK.  The non linear averaged modeling technique of the converters is used in order to picture accurately the PV system behavior during a low simulations time.

   Photovoltaic pumping system, MPPT, inverters, simulation model, control.


1.     Appelbaum J, Bany J. “ Analysis of a direct coupled DC motor and a photovoltaic converter,” In: 1st commission of European Community conference on photovoltaic    solar energy, Luxembourg, September 27–30, Reidel, Dordrecht, The Netherlands, 1979.
2.     Appelbaum J, Bany J. Performance analysis of DC motor photovoltaic converter system—I. Solar Energy 1979; 122:439–45. .

3.     Singer S, Appelbaum J. Starting characteristics of direct current motors powered by solar cells. IEEE Trans Energy Convers 1993;8(1):47–53.

4.     M. JRAIDI, Contribution à la caractérisation et à la modélisation des systèmes photovoltaïques, DEA, ENIT, Tunis, 1993.

5.     G. SEGUIER, Les convertisseurs de l’électronique de puissance, la conversion continu-alternatif,  T4, Technique et Documentation (Lavoisier), France, 1987.

6.     Caro, J.M., Bonal, J., 1997. Entra ^ inements Electriques  a Vitesse Variable, vol. 1. Lavoisier.

7.     S. R. Sanders et al., “Generalized averaging method for power conversion circuits,” IEEETrans. Power Electron. vol.6, pp. 251-258, Apr.1991.
8.     A.AMMOUS and al,”An advanced PWM-Switch Model including semiconductor device. IEEE Trans. Power Electron. vol.18, No5.September 2003 pp. 1230-1237.
9.     S.Abid and al,” Advanced Averaged Model of PWM-Switch operating in CCM and DCM conduction modes”, International Review of Electrical Engineering (I.R.E.E.), Vol. 2, n. 4July-August 2007.

10.   Sun J. et al, “Averaged Modeling of PWM converters operating in Discontinuous conduction Mode”, IEEE Transactions on Power Electronics. vol. 16, N°.4, July 2001, p.482-492.





Sule, Samuel

Paper Title:

Structural Models for the Prediction of Compressive Strength of Coconut Fibre-reinforced Concrete

Abstract:    The quality of concrete used in any construction work is a function of its compressive strength. In this paper, structural models are formulated to predict the compressive strength of coconut fibre-reinforced concrete mix 1:2:4 at water-cement ratios of 0.55 and 0.60 using three-dimensional elasticity equations. The results obtained using the formulated models were compared with the measured values and were found to be very close (correlation coefficient = 0.9011). For both the measured and predicted values, the compressive strength of concrete mix (1:2:4) were found to decrease as the coconut fibre contents increased.

   structural models, compressive strength, coconut fibre, three-dimensional elasticity equations, fibre contents.


1.        Slate, F.O. (1978). “Coconut fibres in concrete”. Eng. J. Singapore,(1).
2.        Balaguru P.N. and Shah, S.P., (1992). “Fibre-Reinforced composites, McGraw-Hill, New York.

3.        Hannant, D.J., (2001). “Fibre cement and fibre concrete, John Wiley and Sons Inc, Chistester.

4.        Fadhadli, Z., (1989). Properties of cement sheets reinforced with coconut fibres. University of Technology, Malaysia: Master of Civil Engineering Thesis.

5.        Okafor, F.O. and Sule, S. (2008). “Models for prediction of structural properties of palmnut fibre-reinforced cement mortar composites. Nig. Journal of Technology, Vol. 27, No.2, pp. 13-20.

6.        Pakotiprapha et al (1974). Mechanical properties of cement mortar with randomly oriented short steel wires.” Mag. Conor. Res. Vol. 26, No. 86, pp. 3-15.

7.        Okafor F.O. and Sule S. (2010. “Improved Analytical models for prediction of structural properties of palmnut fibre - reinforced cement based composites. Journal of Engineering Science and Applications (JESA), Vol.7, No.1, pp. 1-7.

8.        Okafor, F.O. (1992). “Span Optimization of palm-nut fibre-reinforced Mortar Roofing Sheets,” Ph.D Thesis, Department of Civil Engineering, University of Nigeria, Nsukka.

9.        Neville, A.M. (1996). “Properties of Concrete, Longman Ltd., England.

10.     Egbuluese, E.O. (2010). “The effect of coconut fibre addition on the compressive strength of concrete”. Unpublished undergraduate thesis subjected to the Department of Civil and Environmental Engineering.

11.     Sule, S. and Nwofor, T.C. (2011). “Analytical models for prediction of mechanical properties of Rice HUSK Ash Concrete”. International Journal of Current Research, vol.3, Issue 11, pp. 368 – 370.





Zuhair Hasnain, Naila Rozi

Paper Title:

To Analyze Sequence against the Rice Repeat Database VIA Known Repeats & Transposes DNA

Abstract:    Rice ESTs and FL-cDNAs and transcript assemblies (PUTs) from the Plant GDB were aligned to the pseudomolecules using gmap. Only the FL-cDNA and PUTs alignments are shown in the browser. Only the EST and FL-cDNA alignments were used for gene model improvement by PASA. We search sequence against a rice repeat database to identify known repeats and transpose’s (DNA transposes’, retroelements, MITEs, etc). To analyze the growth and yield response of rice under different sowing dates and split nitrogen application, a field study was conducted at farmer’s field Punjab Pakistan during Kharif season 2011. The study revealed that N in split form had no significant effect on yield the yield components of rice while early-sowing is considered suitable for farmers under agro-ecological conditions of Punjab Pakistan.                            

   Rice repeat DNA sequences, transplanting time, Nitrogen, Yield and yield components


1.       Andrade, W.D.B., G.M.B. Fernandes and N.S. Amorim. 1995. Effect of sowing date on quality of rice grains. Comunicadotechnicoempresa de pesquisaagropecuaria do estado do Rio de Janeiro, No. 231. 5pp.
2.       Anonymous. 2001. Rice in Pakistan. Website: http: // www .riceweb. org/countries/pakis.htm.

3.       Budhar, M.N. and S.P. Palaniappan. 1993. Nitrogen management in aged rice seedlings. Madras Agric. J. 80(2): 24-25 (Rice Absts., 18(1): 230; 1995).
4.       Economic Survey of Pakistan. 2011. Ministry of Finance, Government of Pakistan.
5.       Gallagher, N.J. and P.V. Biscoe. 1978. Radiation absorption, growth and yield of cereals. J. Agric., Sci. Camb., 19: 47-60.

6.       Hiria.A.T.Ishibashi.A.Morikami.N.Iwatsuki.Shinozakiand M.Sugiura 1985, Rice chloroplast DNA Appl Genet.70:117-122.

7.       IRRI. 1976. Root zone placement of nitrogen. Int.Rice Res. Inst., Manila Reporter.

8.       Jha, K.P., C.Gangadharan and G.B.Manna. 1991. On-farm evaluation of promising lowland rice varieties & their response to date of sowing & nitrogen level under flood prone rainfedlowland.Ind. J. Agri. Sci., 61:4,237-242.

9.       Khan, M.R. and B.S. Vargara. 1981. Response of traditional deep water to nitrogen application. IRRI. Newsletter 6(3): 10-11 (Field Crop Absts., 35(8): 6554; 1983).

10.     Murali, B. and T.M.M. Reddy. 1995. Response of rice cultivars to levels and times of nitrogen application. J. Res. APAU, 23(2): 43-44 (Rice Absts., 20(4): 2488; 1997).

11.     Nossa, I.E. and Z.J.P. Vergas. 1980. Response of rice (Oryza sativa L.) cv. Cica-8 to split application of nitrogen under field conditions. ActaAgronomica Colombia, 30(1/4): 49-60 (Field Crop Absts., 36(4): 2938; 1983).

12.     Oh, Y.B., J.K. Ahn, R.K. Park, and S.H. Park. 1990. Effect of nitrogen fertilizer application method on the growth and grain yield of rice plant. Research reports of the Rural Development. Ad., Rice, 32(1): 16-20 (CAB Absts., 1990-1991).

13.     Rao, N.K. and M.T. Jackson. 1997. Effect of sowing dates and harvest time on longevity of rice seeds. Seed Sci. Res., 70: 1, 13-20.

14.     Singh V.P. and V.K. Singh. 2000. Effect of sowing date and nitrogen level on the productivity of spring sown rice. Ind. J. Agron., 45: 3, 560-563.

15.     Steel, R.G.D. and J.H. Torrie. 1984. Principles and Procedures of Statistics. 2nd ed. McGraw Hill, Int. Book Co. Inc. Singapore.

16.     Tisdale, S.L., W.L.Nelson and J.D. Beaton.1990.Soil fertility and fertilizers.Mc-Milan Pub.Co., NY, USA: 60-62.

17.     Voss, M.A. and E. Zini. 1993. Forms and dates of application of urea to irrigated rice, 1992-93. Pelotas, Brazil; Centro de PesquisaAgropecuaria de ClimaTemperado, EMBRAPA 163-164 (Field Crop Absts., 48(1): 181; 1995).

18.     Williams, R.L., S. Fukai, M. Cooper and J. Salisbury. 1997. Effect of growth, nitrogen and sowing date on grain yield of Australian Rice, a modeling approach. Breeding Strategies for rainfed low land rice in drought prone environments: Proc. Int. Workshop, UbonRatchathani, Thailand, 5-8 Nov. 1996, 239-244, ACIAR Proc. No. 77.

19.     Xie, G.H., B.L. Su, L. Shi and A.Y. Tian. 1996. Study on growth and dry matter production of rice. J. China Agric. Univ., 1:1, 89-94.





Anisaara Nadaph, Vikas Maral

Paper Title:

Query-Log Aware Data Replicated Declustering

Abstract:    Query-Log is general record of what mysqld is doing, the server writes information to this log when client connect or disconnect. Declustering parallelizes the query retrieval process by distributing the data items requested by queries among several disks. Replication enables alternative disk choices for individual disk items and thus provides better query parallelism options. existing replicated declustering schemes do not consider query log information and try to optimize all possible queries for a specificquery type, such as range or spatial queries. In such schemes, it is assumed that two or more copies of all data items are to be generated and these data items are copied to disks by different algorithm. However, It  is not feasible in some applications for  generation of even two copies of all of the data items, since data items tend to have very large sizes. In this work we assume that there is a given limit on disk capacities and thus on replication amounts. We utilize existing query-log information to propose a selective replicated declustering scheme, in which we select the data items to be replicated and decide on their scheduling onto disks. We suggest an iterative algorithm to get a two-way replicated decluster and by making use of this algorithm recursively to generate a multiway replicated declustering. Later by makiing use of efficient heuristics we improve the multi-way replicated declustering. The survey show that the suggested  work gives bettter performance result over the existing replicated declustering schemes.

   Declustering, replication, parallel disk architectures, iterative improvement heuristics.


1.       Query-Log Aware Replicated Declustering Ata Turk, K. Yasin Oktay and Cevdet Aykanat.
2.       D. R. Liu and S. Shekhar, “Partitioning similarity graphs: a frame- work for declustering problems,” Information Systems, vol. 21, pp. 475–496, 1996.

3.       D. R. Liu and M. Y. Wu, “A hypergraph based approach to declus- ering problems,” Distributed and Parallel Databases, vol. 10(3),pp. 269–288, 2001..

4.       A. S. Tosun, “Threshold-based declustering,” Information Sciences, vol. 177(5), pp. 1309–1331, 2007

5.       M. Koyuturk and C. Aykanat, “Iterative-improvement-based declustering heuristics for multi-disk databases,” Information Systems, vol. 30, pp. 47–70, 2005.

6.       J. Gray, P. Helland, P. O’Neil, and D. Shasha, “The dangers of replication and a solution,” in Proc. ACM SIGMOD International Conference on Management of Data, pp. 173–182, 1996J.

7.       S. Ghemawat, H. Gobio, and S. T. Leung, “The google file system,” ACM SIGOPS Operating Systems Review, vol. 37(5), pp. 29–43, 2003.

8.       A. S. Tosun, “Multi-site retrieval of declustered data,” in Proc. 28th Int’l Conf. Distributed Computing Systems, pp. 486–493, 2008.

9.       “National transportation atlas databases.” CD-ROM, 1999. Bureau of Transportation Statistics.





Kushal J Masarkar, Lilesh P Wankhade, Rita Dhage

Paper Title:

A Memetically Optimized Weighted x^2 Based Approach for Matching Sketches with the Digital Face Images

Abstract:    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an algorithm that extracts discriminating information from local regions of both sketches and digital face images. All details information present in local facial regions are encoded using multi-scale circular Weber’s local descriptor. We propose a novel discriminative descriptor modified WLD i.e. multi-scale circular Weber Local Descriptor.. It is inspired by Weber’s Law, We organize MWLD features to compute a histogram by encoding both differential excitations and orientations at certain locations of an sketch and digital face image. Further, an evolutionary memetic optimization approach is proposed to assign optimal weights to every local facial region for identification purpose. Foreign sketches drawn by sketch artist is of poor quality,  a pre-processing technique is used to enhance the quality of images and improve the identification performance. Comprehensive experimental evaluation on different sketch databases show that MCWLD proposed algorithm yields better identification performance compared with the existing face recognition algorithms.



1.        X. Tang and X. Wang, “Face photo recognition using sketch”, in Proceedings of International Conference on Image Processing, 2002, vol. 1, pp. 257–260.
2.        X. Tang and X. Wang, “Face sketch synthesis and recognition”, in Proceedings of International Conference on Computer Vision, 2003, vol. 1, pp. 687–694.

3.        Q. Liu, X. Tang, H. Jin, H. Lu, and Songde Ma, “A nonlinear approach for face sketch synthesis and recognition”, in Proceedings of International Conference on Computer Vision and Pattern Recognition, 2005, vol. 1, pp. 1005–1010.

4.        L. Yung-hui, M. Savvides, and V. Bhagavatula, “Illumination tolerant face recognition using a novel face from sketch synthesis approach and advanced correlation filters”, in Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2006, vol. 2.

5.        X. Gao, J. Zhong, J. Li, and C. Tian, “Face sketch synthesis algorithm based on E-HMM and selective ensemble”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 4, pp. 487–496, 2008.

6.        X. Wang and X. Tang, “Face photo-sketch synthesis and recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 11, pp. 1955–1967, 2009.

7.        W. Zhang, X. Wang, and X. Tang, “Lighting and pose robust face sketch synthesis”, in Proceedings of European Conference on Computer Vision, 2010, pp. 420–433.

8.        R. Uhl and N. Lobo, “A framework for recognizing a facial image from a police sketch”, in Proceedings of International Conference on Computer Vision and Pattern Recognition, 1996, pp. 586–593.

9.        P. Yuen and C. Man, “Human face image searching system using sketches”, IEEE Transactions on Systems, Man and Cybernetics - A, vol. 37, no. 4, pp. 493–504, 2007.

10.     Y. Zhang, C. McCullough, J. Sullins, and C. Ross, “Hand-drawn face sketch recognition by humans and a PCA-based algorithm for forensic applications”, IEEE Transactions on Systems, Man and Cybernetics - A, vol. 40, no. 3, pp. 475–485, 2010.

11.     H. Nizami, Adkins-Hill, P. Jeremy, Y. Zhang, J. Sullins, C. McCullough, S. Canavan, and L. Yin, “A biometric database with rotating head videos and hand-drawn face sketches”, in Proceedings of International Conference on Biometrics: Theory, applications and systems, 2009, pp. 38–43.

12.     B. Klare and A. Jain, “Sketch-to-photo matching: A feature-based approach”, in Proceedings of Society of Photo-Optical Instrumentation Engineers Conference Series, 2010, vol. 7667.

13.     H. Bhatt, S. Bharadwaj, R. Singh, and M. Vatsa, “On matching sketches with digital face images”, in Proceedings of International Conference on Biometrics: Theory Applications and Systems, 2010.

14.     B. Klare, L. Zhifeng, and A. Jain, “Matching forensic sketches to mug shot photos”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, pp. 639–646, 2011.

15.     B. Klare and A. Jain, “Heterogeneous face recognition using kernel prototype similarities”, Tech. Rep., Michigan State.s.





R. T. Saudagar, U. S. Wankhede

Paper Title:

Experimental Analysis of Vapour Compression Refrigeration System with Diffuser at Condenser Inlet

Abstract:    This paper discusses design and testing of diffuser at condenser inlet in vapour compression refrigeration system. Four diffusers with divergence angle 10, 15, 20 and 30 were designed for same inlet and outlet diameters. The diffusers used were with inlet diameter equal to discharge tube diameter of compressor and outlet diameter equal to condenser inlet diameter. The system was analysed using the first and second laws of thermodynamics to determine the refrigerating effect, the compressor work input, coefficient of performance (COP) and the rate of heat rejected from the system. During the test, the COPs of the system without diffuser and with optimized diffuser at condenser inlet were found out. With diffuser at condenser inlet, amount of heat rejected from condenser is also increased. To remove the same amount of heat, less heat transfer area required. This concept reduces size of condenser to achieve the same system efficiency.

  Condenser, Diffuser, Experimental analysis, Vapour compression refrigeration system.


1.         M Yari and M Sirousazar, Performance analysis of the ejector-vapour compression refrigeration cycle, Part A: Journal of Power and Energy, Vol. 221, No. 8, December 2007, pp. 1089-1098.
2.         A. Selvaraju, A. Mani, Analysis of an ejector with environment friendly refrigerants, Applied Thermal Engineering, 2004, pp. 1-12.

3.         Mark J. Bergander, New Regenerative Cycle for Vapour Compression Refrigeration, Final Scientific Report, DOE Award Number: DE-FG36-04GO14327, 30th Sept. 2004 to 30th Sept.  2005.

4.         M. A. Akintunde, Validation of vapour compression refrigeration system design model, American Journal of Scientific and Industrial Research, Vol. 2, No. 4, 2011, pp. 504-510.

5.         M. A. Akintunde, Theoretical design model for vapour compression refrigeration systems, A.S.M.E., Vol. 73, No. 5, 2004, pp. 1-14.

6.         P N Ananthanarayanan. Basic Refrigeration and Air Conditioning. Tata McGraw-Hill, 2005.

7.         R. J. Dossat and T. J. Horan. Principles of Refrigeration, Prentice-Hall International Inc., New Jersey, USA, 2002.

8.         Yunus A. Cengel and Michael A. Boles. Thermodynamics An Engineering Approach. Tata McGraw-Hill, 2003.

9.         C. O. Adegoke and M. A. Akintunde, An Experimental Study of Hunting in Evapourators, A.U. J.T., Vol. 10,  No. 1, Jul.-2006,  pp. 45-51.

10.       Bukola Olalekan Bolaji, Effects of Sub-Cooling on the Performance of R12 Alternatives in a Domestic Refrigeration System, Thammasat International Journal Science and Technology, Vol. 15, No. 1, January-March 2010, pp. 12-19.





J.T Liberty, A.U Dzivama

Paper Title:

Design, Construction and Performance Evaluation of Cassava Chips Dryer Using Fuel Wood

Abstract:    The design, construction and performance evaluation of a cassava chips dryer using fuel wood as source of heat was undertaken with a view to help small scale farmers’ process cassava chips. The dryer consists of a frame, drying chamber, a tray, fuel wood housing, perforated air space and a chimney. The dryer was evaluated in terms of final moisture content, drying capacity, time taken to dry the chips and the quality of the chips. Results showed that the moisture content of 65.03% (wb) was reduced to 13.11%, the drying capacity was 6kg per loading and the drying time which was supposed to be 3 hrs was increased to 4hrs due to difficulty in regulating the heat produced by the fuel wood. Compared to other types of dryers (solar dryer, platform dryer, flat – bed dryer, continuous dryer e.t.c), the batch type dryer is preferred due to its ability to be used during rainy season and in the absence of electricity. The quality of the chips was found to be good. The dryer has an efficiency of 80%. The evaluation of the dryer shows that it can be used for small scale drying of cassava. chips.

   batch type dryer, cassava chips, fuel wood, performance evaluation.


1.       Adeluyi .T, Abowel M.F., Achinehu S.C., Fabra T.E (2006). Effect of variety on drying and Engineering Properties of Cassava. Vol(1): 80-96
2.       Anikwe M.A., Onyia V.N.(2005). Ecophysiology and cultivation Practices of Arable crops. New Generation Publications, Enugu, Nigeria. 184-195

3.       Berry S.S.(1993). Socio-economic Aspect of cassava cultivation and use in Africa. Implication for the development of appropriate Technology. COSCA working Paper No.8. Collaboratory study of cassava in Africa. 11TA Ibadan. 17

4.       Dahniya m.t., Akoroda M.O., Alvarez M.N., Kandera P.M, Okeke J.E., Jalloh A. (1994). Development and Dissemination of appropriate Root crops Packages to farmers in Africa. 2-9

5.       Enwere N.J.(1998). Foods of Plant Origin. Afro-orbis Publishers. 1st edition. 137-249

6.       FAO, (1999). Production Year Book. FAOSTAT Database.http://appls.fao.org/agr-ben/nph--pl/ (consulted August, 2009).

7.       FAO, (2003). Better farming Series for Processing of cassava and sweet Potatoes for animal feeding.

8.       FAO, (2006). Production Year Book. FAOSTATDatabase.http://appls.fao.org/agr-ben/nph--pl/ (consulted August, 2009).

9.       Grace M. (1997). Cassava Processing Agricultural Services Division, FAO,Rome.10

10.     Hahn N.D. (1999). The Africa Farmer and her Husband. Roots, Tubers and Legumes. Report of the Expert meeting. 71-93.

11.     Njie D.N., Rumesy T.R., Singh R.P.(1998). Thermal properties of Cassava, Yam and Plantain. J. Food Eng. 57,63-76

12.     Osuntokun B.O.(1981). Cassava diet, chronic Cyanide Intoxication and Neuropathy in Nigeria. World Review of Nutrition and Dietics. 36,141-173.

13.     Ugwu B.O., Agobo O., Orkwor G.C. (1998). Cassava Research, Production and Utilization in Nigeria.

14.     Ugwu B.O., Ukpai U.J.(2002). Potential of Cassava Flour Processing to Sustain Increasing Cassava Production in Nigeria. Outlook on Nigeria Agriculture, 31 (2): 129-133

15.     Ukpabi U.J., Ejiofor M.A.N.(1997). Utilization of leaves and Peels of Cassava as Livestock feed supplement S. 120-128





Mohsen Darabian, Bahram Khorram, Mehdi Azari

Paper Title:

Improvement of Power System Transient Stability Using an Intelligent Control Method

Abstract:    Shunt Flexible AC Transmission System (FACTS) devices, when placed at the mid-point of a long transmission line, play an important role in controlling the reactive power flow to the power network and hence both the system voltage fluctuations and transient stability. In this paper, a new intelligent controller used to control the output of an SVC to damp power system oscillations is developed. This controller is an online trained wavelet neural network controller (OTWNNC) with adaptive learning rates derived by the Lyapunov stability. Effectiveness of the proposed technique is robustness to different operating conditions and disturbances. The effectiveness of the proposed controllers is demonstrated on an 2-machine system. Results obtained show improvement in the overall system damping characteristics using the proposed method (OTWNNC).

   Wavelet neural network (WNN), Particle Swarm Optimization (PSO), SVC Design, Transient stability.


1.       P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, N. Hatziargyiou, D. Hill, A. Stankovic, C. Taylor, T. Cutsem, and V. Vittal, “Definition and classification of power system stability,” IEEE Trans. Power Syst., vol. 19, no. 2, pp. 1387–1401, May 2004.
2.       J. J. Sanchez-Gasca, “Coordinated control of two FACTS devices for damping interarea oscillations,” IEEE Trans. Power Syst., vol. 13, no. 2, pp. 428–434, May 1997.

3.       R. Mohan. Mathur and R. K. Varma, Thyristor-Based FACTS Controller For Electrical Transmission System. Piscataway, NJ: IEEE Press/Wiley Interscience, 2002.

4.       K. Clark, B. Fradanesh, and R. Adapa, “Thyristor-controlled series compensation application study—Control interaction considerations,” IEEE Trans. Power Del., vol. 10, no. 2, pp. 1031–1037, Apr. 1995.

5.       D. P. He, C. Y. Chung, and Y. Xue, “An eigenstructure-based performance index and its application to control design for damping interarea oscillations in power systems,” IEEE Trans. Power Syst., vol. 26, no. 4, pp. 2371–2380, Nov. 2011.

6.       Y. C. Chang, R. F. Chang, T. Y. Hsiao, and C. N. Lu, “Transmission system locability enhancement study by ordinal optimization method,” IEEE Trans. Power Syst., vol. 26, no. 1, pp. 451–459, Feb. 2011.

7.       X. Tan, N. Zhang, L. Tong, and Z. Wang, “Fuzzy control of thyristorcontrollered series compensator in power system transients,” Fuzzy Sets Syst., vol. 110, pp. 429–436, 2000.

8.       X. Lei, E. N. Lerch, and D. Povh, “Optimization and coordination of damping controls for improving system dynamic performance,” IEEE Trans. Power Syst., vol. 16, no. 3, pp. 473–480, Aug. 2001.

9.       N. Mithulananthan, C. A. Canizares, J. Reeve, and G. J. Rogers, “Comparison of PSS, SVC, and STATCOM controllers for damping power system oscillations,” IEEE Trans. Power Syst., vol. 18, no. 2, pp. 786–792, May 2003.

10.     M. E. Aboul-Ela, A. A. Sallam, J. D. McCalley, and A. A. Fouad, “Damping controller design for power system oscillations using global signals,” IEEE Trans. Power Syst., vol. 11, no. 2, pp. 767–773, May1996.

11.     U. P. Mhaskar and A. M. Kulkarni, “Power oscillation damping using FACTS devices: Model controllabiliby, observability in local signals, and location of transfer function zeros,” IEEE Trans. Power Syst., vol.21, no. 1, pp. 285–294, Feb. 2006.

12.     A. M. Simões, D. C. Savelli, P. C. Pellanda, N. Martins, and P. Apkarian, “Robust design of a TCSC oscillation damping controller in a week 200-kv interconnection considering multiple power flow scenarios and external disturbances,” IEEE Trans. Power Syst., vol. 24, no. 1, pp. 226–236, Feb. 2009.

13.     B. Chaudhuri, S. Ray, and R. Majumder, “Robust low-order controller design for multi-modal power oscillation damping using flexible AC transmission system devices,” IET Gener. Transm. Distrib., vol. 3, no. 5, pp. 448–459, 2009.

14.     J. M. González, C. A. Cañizares, and J. M. Ramoírez, “Stability modelingand comparative study of series vectorial compensators,” IEEETrans. Power Del., vol. 25, no. 2, pp. 1093–1103, Apr. 2010.

15.     P. K. Dash, S. Morris, and S. Mishra, “Design of a nonlinear variablegain fuzzy controller for FACTS devices,” IEEE Trans. Control Syst. Technol., vol. 12, no. 3, pp. 428–438, May 2004.

16.     C. F. Lu and C. F. Juang, “Evolutionary fuzzy control of flexible AC transmission system,” Proc. Inst. Elect. Eng., Gener., Transm., Distrib, vol. 152, no. 4, pp. 441–448, Jul. 2005.

17.     Y.L. Abdel-Magid, M.A. Abido, “Optimal Multi objective Design of Robust Power System Stabilizers using Genetic Algorithms”, IEEE Trans. On Power Systems, Vol. 18, pp. 1125-1132, 2003.

18.     K. Sebaa, M. Boudour, “Optimal Locations andTuning of Robust Power System Stabilizer Using Genetic Algorithms”, Electric Power Systems Research, Vol. 79, pp. 406-416, 2006.

19.     S. Mishra, M. Tripathy, J. Nanda, “Multi-Machine Power System Stabilizer by Rule Based Bacteria Foraging”, Electric Power Systems Research, Vol. 77, pp. 1595-1607, 2007.

20.     H. Shayeghi, H.A. Shayanfar and A. Ghasemi, “A Robust ABC Based PSS Design for a SMIB Power System”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 8, Vol. 3, No. 3, pp. 86-92, September 2011.

21.     M.A. Abido, “A Novel Approach to Conventional Power System Stabilizer Design Using Tabu Search”, Electrical Power and Energy Systems, Vol. 21, pp443- 454, 1999.

22.     A.M. El-Zonkoly, A.A. Khalil, N.M. Ahmied, “Optimal Tuning of Lead-Lag and Fuzzy Logic Power System Stabilizers using Particle Swarm Optimization”, Expert Systems with Applications, Vol. 36, pp. 2097- 2106, 2009.

23.     H.M. Soliman, E.H.E. Bayoumi, M.F. Hassan, “PSO-Based Power System Stabilizer for Minimal Overshoot and Control Constraints”, Journal ofElectrical Engineering, Vol. 59, No. 3, pp. 153-159, 2008.

24.     A. Safari, H. Shayeghi, H.A. Shayanfar, “Optimization Based Control Coordination of STATCOM and PSS Output Feedback Damping Controller Using PSO Technique”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 5, Vol. 2, No. 4, pp. 6-12, December 2010.

25.     H. Shayeghi, A. Ghasemi, “Application of PSO TVto Improve Low Frequency Oscillations” , International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 9, Vol. 3, No. 4, pp. 36-44, December 2011.

26.     A. Alfi, M. Khosravi, “Optimal power system stabilizer design TO reduce low frequency oscillation via an improved swarm optimization algorithm ”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue11, Vol. 4, No. 2, pp. 24-33, June 2012.

27.     M. J. Lautenberg,  M. A. Pai, and K. R. Padiyar, “Hopf  Bifurcation Control in Power System with Static Var Compensators,” Int. J. Electric Power and Energy Systems, Vol. 19, No. 5, pp. 339–347, 1997.

28.     N. Mithulananthan, C. A. Ca˜nizares, and John Reeve, “Hopf Bifurcation Control in Power System Using Power System Stabilizers and Static Var Compensators,” Proc. of NAPS’99, pp. 155–163, San Luis Obispo, California, Oct. 1999.

29.     S. Haykin, Neural Networks: A Comprehensive Foundation. New York: Macmillan, 1994.

30.     G.D. Magoulas, M.N. Vrahatis, G.S. Androulakis, Improving the convergence of the backpropagation algorithm using learning rate adaptation methods, Neural Computation 11 (1999) 1769–1796.

31.     C.C. Ku, K.Y. Lee, Diagonal recurrent neural networks for dynamics systems control, IEEE Trans. Neural Networks 6 (1) (1995) 144–156.

32.     C.H. Lee, C.C. Teng, Identification and control of dynamic systems using recurrent fuzzy neural network, IEEE Trans. Fuzzy Systems 8 (4) (2000) 349–366.

33.     J. Yoo, J.B. Park, Y.H. Choi, Direct adaptive control using self recurrent wavelet neural network via adaptive learning rates for stable path tracking of mobile robots, in: Proc. American Control Conference, 2005, pp. 288–293.

34.     Panda, Sidhartha, 2009. Multi-objective evolutionary algorithm for SSSC-based controller design. Electr. Power Syst. Res. 79 (6), 937–944.

35.     Kundur P. Power system stability and control. McGraw-Hill; 1994.

36.     Y. Shi and R. Eberhart, “A modified particle swarm optimizer, ” Proc. Int. Conf. on Evolutionary Computation, Anchorage, pp. 69-73, 1998, AK, USA.





K. M. Sivakumar, R. Gandhinathan

Paper Title:

Establishing Optimum Process Parameters for Machining Titanium Alloys (Ti6Al4V) In Spark Electric Discharge Machining

Abstract:   In this study, the spark electric discharge machining(SEDM) of titanium alloys with different electrode materials namely electrolytic copper, beryllium copper, tungsten copper, graphite, aluminium, steel(EN24) and copper impregnated graphite, were conducted to find the suitable electrode material. Therefore the design of experiments were conducted using Taguchi method to find the optimum machining parameters with process parameters such as current, spark on time, spark off time to explore the influence of various SEDM parameters on various requirements such as material removal rate, electrode wear and over cut. The experimental results reveal that the suitable electrode material for machining titanium alloys is copper impregnated graphite. It is found that material removal rate is mainly influenced by discharge on time (Ton) and discharge current (I), whereas discharge off time (Toff) has least effect on material removal rate. Electrode wear is mainly influenced by discharge on time (Ton) and discharge off time (Toff), whereas discharges current (I) has least effect on electrode wear. Over cut is mainly influenced by discharge current (I) and discharge on time (Ton), whereas discharge off time have a very least effect on over cut.  

   EDM, Titanium alloys, electrode material, nontraditional machining.


1.       Ahmet hascalik, Ulas Caydas,”Electric discharge machining of titanium alloys (Ti6Al4V)”, Int Journal of applied surface science, 253(2007) 9007-9016.
2.       ASM handbook, properties and selection: Non ferrous alloys and special purpose materials, Vol 2, 1993

3.       Roger kern, “Sinker electrode material selection”, EDMToday magazine July/August 2008 issue.

4.       “EDM electrode materials information on Global spec”, www.globalspec.com.

5.       BalaMurugan gopalsamy, Biswanath mondal and Sukamal ghosh, “Taguchi method and ANOVA: An approach for the process parameters optimization of hard machining while machining hardened steel”, Journal of scientific and industrial research, Vol 68, August 2009, pp 686-695.

6.       Philip J Ross, “Taguchi techniques for quality engineering”, McGraw Hill, Newyork 1995.

7.       Pravin R Kubade, V. S. Jadhav,”An experimental investigation of electrode wear rate, material removal rate and  radial over cut in EDM of high carbon-high chromium steel(AISI D3)”, Int Journal of engineering and advanced technology, ISSN: 2249-8958, Vol 1, Issue 5, June 2012.

8.       Bhola Jha, K. Ram and  Mohan Rao,“An overview of technology and  research in electrode design and manufacturing in sinking electric discharge machining ”, Journal of engineering science and  review, review 4(2) (2011) 118-130.

9.       M. A. Norliana, D. G. Solomon and F. Bahari, ”A review on current research trends in electrical discharge machining(EDM)”, Int Journal of machine tools manufacturing, 47 (2007)  1214-1228.

10.     K. R. Thangadurai,  A. Asha,”Mathematical modeling of electrical discharge machining process of AA 6061-10% B4Cp MMC through Response surface methodology”, European Journal of scientific research ISSN 1450-216X, Vol 81, No 4 (2012), pp 476-492.

11.     Mohd Amri Lajis, H. C. D. Mohd Rdzi and A. K. M. Nurul Amin”The implementation of taguchi method on EDM process of tungsten carbide”, European Journal of scientific research, ISSN 1450-216X Vol 26 No 4 (2009), pp 609-617.

12.     T. C. Bhagat and H. S. Payal,”Optimization of EDM process parameters for minimum surface roughness of die steel with copper and copper tungsten electrodes”, Int Journal of advanced scientific and technical research, Issue 2, Vol 5, ISSN 2249-9954, October 2012.





Ajay K. Singh, A. Rehman

Paper Title:

The Influence of Engine Speed on Exhaust Emission of Four Stroke Spark Ignition Multi Cylinder Engine

Abstract:    An experimental study is carried out to investigate engine performance parameters and methods of reducing emissions from spark ignition engine. Fuel efficiency is one of the major concerns for the users, the designers and the manufacturers of internal combustion (IC) engines, The effect of increasing the temperature of cylinder liner has the advantage of reducing the specific fuel consumption but it increases thermal stresses on piston head, challenges material properties such as high temperature yield strength, creep and high temperature fatigue, increases chances of knocking and pre ignition and decreases the volumetric efficiency. Coolants with specified fluid properties are circulated through inner channels in the cylinder blocks to maintain an optimum temperature. The present investigation reports the experimental study carried out by using three cylinders, four stroke petrol carburetor of Maruti 800 engine. The engine is connected to eddy current type dynamometer to provide suitable loading with provisions for measuring and control of fuel flow to maintain fuel –air mixture ratio. It is found that exhaust emission is a dependent parameter on decrease even at higher loads which confirming that engine perform better upon optimal load condition rather than part load condition.

   Exhaust emission, spark ignition engine, optimization, and engine speed.


1.       Robinson K, N., Campbell, J., Hawley. (1999) and D. Tilley (1999),"A Review of  Precision Engine Cooling". SAE paper 1999-01-0578.
2.       Borman, G. and K. Nishiwaki (1987), "International Combustion Engine Heat Transfer," Proceedings of Energy Combustion Sci., 13, p. 1 - 46.

3.       LI, (1982),"Piston Thermal Deformation and Friction Considerations," SAE paper no 820086.

4.       Bruckner, M. Gruenbacher, E. Aberer, D. RE, L.D., Tschreiter, F, (Oct 2006), "Predictive Thermal Management of Combustion Engine," page 2778-2783,

5.       Kirlosker, C.S., Chanderasekher, S.B and Narayan Rao, N.N., The av-1 series 3 differentially cooled semi-adiabatic diesel engine below 10kw.SAE paper no.790644. 1979.

6.       Kobayashi, H., Yoshimura, K. and Hirayama, T.:- A study on dual circuit cooling or higher compression ratio, I MechE, 427.84 ,SAE paper, no. 841294,1984.

7.       Willumeit, H.P, Steinberg, P., Scheibner, B and Lee, W. New:- “Temperature control criteria for more efficient  gasoline engine”, SAE paper no. 841292,1984.

8.       Finlay, I.C. Tugwell, W., Biddulp, T.W. and Marshell, R.A.:- “The influence of Coolant Temperature on the Performance of a Four Cylinder 1100cc engine.

9.       Kubozuka, T., Ogava, N., Hirano, Y .and Yayashi, Y: - The development of engine evaporative cooling system .SAE paper no. 870033, (1987).

10.     Employing dual circuit cooling, SAE paper, no. 8802631

11.     Clough ,M.J.: Precision cooling of a four valve per cylinder engine .SAE paper, no. 931123.(1993)

12.     Guillemot, P., Gatellier, B. and Rouveirolles, P. :-The influence of coolant temperature on unburnt hydrocarbon emission from spark ignition engine SAE paper no 941962, (1994).

13.     Pang ,H.H., Brace ,C.J. and Akehurst, S. “Potential of controllable engine cooling system to  reduce nox emission in diesel engine” SAE paper no.(2004)

14.     Nishano, T., Seneba, H. and Murakami, N. “Study of engine cooling technology for knock suppression in spark ignition engines”. Mitsuhibishi Motor Technology Review 2004, no.16.

15.     Finlay, I.C., Gallacher, G.R., Biddulph, T.W. and Marshell, R.A.:- The application of precision cooling to the cylinder head of a small automotive petrol engine, SAE paper no. 880263.(1988)

16.     Fattic, G. T. and Walters, J.E: Cold starting performance of a 42 volt integrated starter generator system, SAE paper no. 2002-01-0523, 2002.

17.     Taylor, C.F. (1985), "The Internal Combustion Engine in Theory and Practice," MIT Press, Cambridge, Massachusetts.

18.     Caton, J.A. and J.B.Heywood (1981),"An Experimental and Analytical Study of Heat Transfer in An Engine Exhaust Port", hit. J. Heat Mass Transfer, 24(4), p. 581-595.

19.     Whitehouse, N.D. (1970-1971), "Heat Transfer in a Quiescent Chamber Diesel Engine," Proc. instn. Mech. Engrs., 185, p. 963-975.

20.     LI WEI, Wang Ying, Zhou Longbao, Su ling, (10 April 2007), "Study On Improvement of Fuel Economy.

21.     LI Jafari, Siamak Kazemzadeh Hannani, (January 2006),"Effect of Fuel and Engine Operational Characteristics on The Heat Loss From Combustion Chamber Surfaces of SI Engines", International Communications in Heat and Mass Transfer, Volume 33, Issue 1, Pages 122-134.During Engine Warm-up," American Journal of Applied Sciences 4 (3), 106-111, ISSN 1546-9239.

22.     Willard W. Pulkrabek (2003) “Engineering fundamental of internal combustion engine” page no. 229-230

23.     A. Rehman, R.M. Sarviya, Savita Dixit, Rajesh Kumar Pandey (2010) “The influence of coolant temperature on the performance of a four stroke S.I. engine employing dual circuit cooling system” CIGR Journal, Vol. XII, Januray, 2010.





N.Pandeeswari, P.Ganesh Kumar, P.C.Rubini

Paper Title:

A Serial Based Encryption for Enhanced Access Control in Cloud Computing

Abstract:    Cloud storage allows us to enjoy the on demand cloud application without any hardware implementation. Cloud provides the service a required by the cloud user in a rental basis. Even though the cloud issues the cloud application without any physical implementation results in a security risk since the cloud data can be accessed by everyone. To avoid security issue in the outsourced data a prevention measure is needed to secure the data from unauthenticated users or intruders. A flexible distributed storage integrity mechanism utilising homomorphic tokens and  is proposed in this paper to provide security in the outsourced cloud data. This mechanism include the techniques such In order to address security for outsourced data and secure cloud storage, we propose in this paper a flexible distributed storage integrity checking mechanism, utilizing the homomorphism token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very low computation cost and lightweight communication. The auditing result not only guarantees strong cloud storage correctness, but also simultaneously identifies fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack.

 The auditing result not only guarantees strong cloud storage correctness, but also simultaneously identifies fast data error localization, i.e.,


1.        Zhiguo Wan, Jun’e Liu, and Robert H. Deng, Senior Member, IEEE, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing” ieee transactions on information forensics and security, vol. 7, no. 2, april 2012.
2.        Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available: http://aws.amazon.com/ec2/

3.        Amazon Web Services (AWS) [Online]. Available: https://s3.amazonaws. com/

4.        Google App Engine [Online]. Available: http://code.google.com/appengine/

5.        K. Barlow and J. Lane, “Like technology from an advanced alien culture: Google apps for education at ASU,” in Proc. ACM SIGUCCS User Services Conf., Orlando, FL, 2007.

6.        B. Barbara, “Salesforce.com: Raising the level of networking,” Inf. Today, vol. 27, pp. 45–45, 2010.

7.        T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE Symp. Security and Privacy, Berkeley, CA, 2003.

8.        V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attibute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.

9.        J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2007.

10.     R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc. ESORICS, Saint Malo, France, 2009.

11.     G.Wang, Q. Liu, and J.Wu, “Hierachical attibute-based encryption forfine-grained access control in cloud storage services,” in Proc. ACMConf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010.





Himanshu Agarwal, Kaushalendra Kr. Dubey, Subhash Kamal

Paper Title:

Development of Mechanical Fuel Injector Cleaning Machine in Cost Effective Manner

Abstract:    When fuel injectors get polluted, it create obstruction in fuel flow and unable to allow spray pattern for proper combustion. In the present market Fuel Injector cleaning machine is used to clean the injectors with the help of controlled gasoline spray system. We have designed and developed for the most cost effective Rs 20,500 this is 10 times less than the existing fuel injector cleaning machine. The development of this work explaining conversion of electrical fuel injection system into mechanical type fuel injection system is cost effective, manually operated, multiple flow, single man powered and equally efficient with electrical system.

   Injector, Air cylinder, Fuel cylinder.


1.        Automobile fuel system History.htm
2.        Circle Track, 9/84, pp.82-3

3.        Heywood, John B.1988 Internal Combustion Engine Fundamenta  ls. New York City: McGraw-Hill Book Co. Inc

4.        http://oldfuelinjection.com/images/injector.jpg

5.        http://2.imimg.com/data2/PK/XQ/MY-4797429/pet-bottles-air co m pressor-250x250.gif

6.        http://www.bidgeepumps.co m.au/ store/imag es/ Br ass%20Gcat e%20Valves%20Non%20Tested.jpg

7.        http://ne wimg.globa lmarket.com /PicLib /789 /2026 789/prod/ 0_ 1314172839656_l.jpg

8.        http://i21.geccdn.net/site/images/n-picgr oup/ WIK_ 9694255.jpg

9.        http://i21.geccdn.net/site/images/n-picgroup/W I K_9 296255.jpg

10.     http://i21.geccdn.net/site/images/n-picgroup/W I K_ 9894455.jpg

11.     http://picasaweb.google.com/1169 72255 8619279 51169 /Fuel In j ectorCleaner?gsessionid =audog WxUOz x ScK9FO wQGCA #5 195700749907998018

12.     http://image.made-in-china.com /4f0 j00SeEQlOGF bhoz/Fuel-Filter-16400-03J00-.jpg

13.     Sowell, Edward F,1976, Fuel Injector Testing.

14.     Stinson, Karl W. 1981, Diesel Engineering Handbook, 12th Editi on, Norwalk, Connecticut: Business Journals.

15.     Walton, Harry,March 1957. "How Good is Fuel Inject ion?" . Pop ular Science 170 (3): 88–93. Retrieved 2012-03-24.

16.     Wynn’s Spitfire, April 2008, Injector Cleaner, , P.P 1-3.

17.     www.asnu.com





Vikash Sharma, Jayant Kumar

Paper Title:

Energy Efficient Partitioning Of Last Level Cache Memory with Cooling Management for Memory and CPU Subsystems

Abstract:    This paper presents a technique to improve the over- all performance of the multiprocessor chip.  Efficient partitioning of last- level cache memory in a multi-processor chip can increase the performance significantly. The concept is to first allocate the fixed number of ways for a core and then forced the cache data to be way aligned so that a particular way is owned by a core at a particular time. At the time of access, cores cooperate with each other to migrate the ways between them so that a core has to consult only those ways which it has owns to find its data from which dynamic energy can be saved and unused ways can be power-gated for saving the static energy. This paper also presents a cooling management strategy for memory and CPU subsystems. It manages the temperature of memory and CPU subsystems by activating the memory and CPU actuators which does the required action in the subsystems of memory and CPU. It considers the thermal and power states of CPU and memory, thermal coupling between them and fan speed to arrive at energy efficient decisions.

   last level cache memory (LLC), CPU actuator, Memory actuator, RAP, WAP


1.        D. H. Albonesi. Selective cache ways: On-demand cache resource allocation. In MICRO, 1999R. Bitirgen, E. Ipek, and J. F. Martinez. Coordinated management of multiple interacting resources in chip multiprocessors:A machine learning approach. In MICRO, 2008
2.        Karthik T. Sundararajan, Vasileios Porpodas, Timothy M. Jones. Cooperative Partitioning: Energy-Efficient Cache Partitioning for High-Performance CMPs HPCA 2011

3.        Ajami, K. Banerjee, and M. Pedram. Modeling and analysis of nonuniform substrate temperature effects on global interconnects. IEEE Trans. on CAD, pages 849–861, 2005

4.        R. Ayoub, K. R. Indukuri, and T. S. Rosing. Temperature aware dynamic workload scheduling in multisocket cpu servers. TCAD, 30(9):1359–1372, 2011.

5.        Raid Ayoub Rajib Nath Tajana Rosing. JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers HPCA 2011

6.        K. Flautner,  N. S. Kim,  S. M. Martin,  D. Blaauw,  and T. Mudge. Drowsy caches: Simple techniques for reducing leakage power. In ISCA, 2002.

7.        M. Ghosh, E. Ozer, S. Ford, S. Biles, and H.-H. S. Lee. Way guard: a segmented counting bloom filter approach to reduc- ing energy for set-associative caches. In ISLPED, 2009.

8.        F. Guo, Y. Solihin, L. Zhao, and R. Iyer.  A framework for providing quality of service in chip multi-processors. In MI- CRO, 2007.

9.        L. R. Hsu, S. K. Reinhardt, R. Iyer, and S. Makineni. Com- munist, utilitarian, and capitalist cache policies on CMPs: Caches as a shared resource. In PACT, 2006.

10.     R. Iyer.  CQoS: A framework for enabling QoS in shared caches of CMP platforms. In ICS, 2004.





U.Jyostna Sai Prasanna, M.V.D.Prasad

Paper Title:

Automatic Fire Sensing and Extinguishig Robot Embedded With GSM Modem

Abstract:    Our goal is to develop an intelligent multi sensor based fire fighting robot in our daily life. We design the fire detection system using four flame sensors in the fire fighting robot, and program the fire detection and fighting procedure using sensor based method. The fire fighting robot is equipped with four thermistors/flame sensors that continuously monitor the temperature. If the temperature increases beyond the predetermined threshold value, buzzer sounds to intimate the occurrence of fire accident and a warning message will be sent to the respective personnel in the industry and to nearby fire station with the GSM module provided to it. Fire Fighting Robot continuously monitors the temperature at four sensors and if fire accident is true, the robot moves to the direction to which the temperature is recorded to be the relatively maximum among the four sensors and extinguishes the fire with water pump provided to it. After extinguishing the fire it comes back to its initial position. It is more advantageous than a smoke detector as it can extinguish the fire at the inception than waiting for an object to burn and produce smoke. When a smoke detector detects fire it, sprays water all over the place, instead of that particular point of source. It voluntarily detects and extinguishes fire without human aid.

   Extinguisher, Fire Sensors, GSM, Microcontroller


1.       Muhammad Ali Mazidi, the 8051 Microcontroller and Embedded Systems.
2.       Verner, I.; and Betzer, N. 2001. Machine Control - A Design and Technology Discipline in Israel's Senior High Schools. International Journal of Technology, In press.

3.       Jones, J.; Seiger, B.; and Flynn, A. 1999. Mobile Robots, Inspiration to Implementation, 2nd ed. Natick, Mass: A. K. Peters.

4.       Wireless communication technologies: new multimedia Systems By Norihiko Morinaga

5.       Encyclopedia of Fire fighter surveillance robot





Shivam Pandey, Mohan Rao Mamdikar, Bhudev Kumar Mahato

Paper Title:

An Energy-Efficient Slotted MAC (SL-MAC) Protocol for Wireless Sensor Networks

Abstract:    The efficient use of energy is an important performance target to magnify the lifetime of wireless sensor networks (WSNs). The idle listening of sensor nodes is one of the primary causes of energy waste; so many typical MAC protocols are designed to rescue power by placing the radio in the low-power sleep mode.  In this paper, a new energy-efficient Slotted MAC (SL-MAC) protocol is proposed for wireless sensor networks. It is designed with three main features: 1) reducing energy consumption 2) minimizing the number of collisions 3) reducing average packet delay. Sensor nodes in SL-MAC have a very short listen time period which would reduce the energy required to communicate with other nodes. Also, the number of collisions is minimized by using Back-off algorithm in SL-MAC. This saves the energy required to re-send the corrupted packets. Simulation results show much better performance of the energy consumption compared with the existing MAC Protocols.

   Energy management, medium access control (MAC), wireless sensor networks (WSN).


1.       W. Ye, J. Heidemann, and D. Estrin, "An energy-efficient MAC protocol  for wireless sensor networks," Proceedings of the 21st Intemational Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), vol. 3, New York, NY, USA, June 2002, pp. 1567-1576.
2.       W. Ye, J. Heidemann, D. Estrin “Medium Access Control with Coordinated, Dynamic Sleeping for Wireless Sensor Networks”, IEEE/ACM Transactions on Networking, Vol. 12, No.3, 2004, pp. 493-506.

3.       P. Koutsakis, “On Increasing Energy Conservation for Wireless Sensor Networks,” International Conference on Wireless and Mobile Communications, 2006, ICWMC’06, 29-31 July 2006, Bucharest, pp 4-4. T. van Dam and K. Langendoen, "Energy-efficient MAC: An Dynamic energy-efficient MAC protocol for wireless sensor networks," in Proceedings of the jrst internationalconference on embedded networked sensor systems (SenSys), Los Angeles, California,USA, Nov. 2003.

4.       Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification,IEEE Std. 802.11, 1997.

5.       C. Raghavendra and S. Singh, "PAMAS: Power aware multi-access protocol with signaling for ad hoc networks," ACM SIGCOMM Computer Communication Review, vol. 28, Issue 3, pp. 5-26, July 1998.

6.       T. van Dam and K. Langendoen, "Energy-efficient MAC: An Dynamic energy-efficient MAC protocol for wireless sensor networks," in Proceedings of the first international conference on embedded networked sensor systems (SenSys), Los Angeles, California,USA, Nov. 2003.

7.       K. Sohrabi and G. J. Pottie, "Performance of a novel self-organization protocol for wireless ad hoc sensor networks,” Proc. of the IEEE 50th Vehicular Technology Conference,  vol 2, pp. 1222-1226, 1999.

8.       L. Bao and J. J. Garcia-Luna-Aceves, "A new approach to channel access scheduling for ad hoc networks," Proceedings of the 7th  annual international conference on mobile computing and networking, pp. 210-221. July 2001.

9.       V. Rajendran, K. Obraczka , and J.J. Garcia-Luna-Aceves, “Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks,” Journal: Wireless Networks, Publisher: Springer Netherlands, vol. 12, No 1, pp. 63-78, 17th February 2006.

10.     Raja Jurdak, Cristina Videira Lopes, and Pierre Baldi, A Survey, Classification and Comparative Analysis of Medium Access Control Protocols for Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, First Quarter 2004. pp. 2-16,

11.     www.comsoc.org/pubs/surveys.





Gaurang A. Parmar, Yogesh D. Rathod, Sunil H. Kukadiya, Sarthi B. Bhavsar, Jigar K. Sevalia

Paper Title:

Study on Remedial Measures to Control Machine Induced Vibration of Factory Building

Abstract:    A comprehensive understanding of structural dynamics is essential to the design and development of new structures, and to solving the vibration problems on existing structures. A broad range of complex vibration problems can occur in the Looms Industry. A successful analysis and resolution of machine vibration problem requires a thorough understanding of the equipment, and the ability to apply various diagnostic techniques. Due to heavy machine operations the building is subjected to vibration effect. This paper aims at understanding the behaviour of Looms factory building, subjected to dynamic loading and provision of certain remedies to such buildings which can overcome resonance condition.

   Cross Bracing, Cross Tie-Beam, Haunch, Jacketing, Looms Industry, Time History.


1.       Barkan D. D., “Dynamics of Bases and Foundations”, Mcgraw-Hill Book Company, Inc.
2.       Bhatia K. G., “Foundations For Industrial Machines And Earthquake Effects”, 28th ISET Annual Lecture.

3.       Gopal L. Rai “Different Strengthening Techniques for RC Columns” R&M International Pvt. Ltd.

4.       Hjelmstad Keith D. and Foutch Douglas A. “Forced Vibration Studies of an RC Building Retrofit with steel bracing”, Proceedings of ninth world conference on earthquake engineering August 2-9, 1988, Tokyo-Kyoto, Japan (vol.VII).

5.       Lachal A. and Aribert J. M. " Static Design and Cyclic Behaviour of end- plate steel and composite joints strengthed by haunches”, Advances in Steel structures, Vol. – II.

6.       Rathish Kumar P. and Oshima T., “Studies On R.C and Ferro-cement Jacketed Columns Subjected To Simulated Seismic Loading”, ASIAN JOURNAL OF CIVIL ENGINEERING (BUILDING AND HOUSING) VOL. 8, NO. 2 (2007).

7.       Srinivasulu P. and Vaidyanathan C.V, 2003, “Handbook of Machine Foundations”, Tata Mcgraw –Hill Publishing Company, New Delhi.

8.       Uang Chia-Ming And Noel Shane “Cyclic Testing Of Steel Moment Connections Rehabilitated With Reduced Beam Section (RBS) Or Welded Haunch”, Journal Of Structural Engineering January 2000.

9.       Ungermann D and Strohmann I. “Stability of I-shaped members with haunches under bending – Design aids for individual member checks”, NSCC2009.

10.     Waghmare Pravin B. “Materials And Jacketing Technique For Retrofitting Of Structures”, International Journal Of Advanced Engineering Research And Studies E-Issn2249 – 8974.





Deepanshu Sharma, Banwari, Deepak Upadhyay

Paper Title:

Software Project Health Analysis: Prediction of Outcome at Initial Stage

Abstract:    The paper proposes an approach for analyzing the health of a software project. The approach aims at the prediction of software project outcome as Success or Failure at the Initial stage. The approach involves the collection of historical projects data in a defined format. The collected data is in the form of Risk Factors and their corresponding values of Impact and Probability. The collected data is then performed with some pre-processing so as to generate information (rule set) from them. The generated rule set or information can then be applied to future projects so as to predict their outcome based on the values of the Impact and Probability for existing Risk Factors. Here we have used Decision Tree Rule Induction for the generation of the rule set from the pre-processed data.              

   Decision Tree, Project Health Analysis, Risk Factors and Dimensions, Rule Set 


1.       Gray, C. F. and Larsen, E.W., “Project Management: The Managerial Process”, 4th edition, McGraw-Hill Educations, Singapore, 2008.
2.       Abdullah Al Murad Chowdhury and Shamsul Arefeen, “Software Risk Management: Importance and Practices”, IJCIT vol. 02, issue 01, 2011.

3.       B. Hughes and M. Cotterell, Software Project Management 4th edition, pp.147, 1996, McGraw Hill (UK).

4.       Tharwon Arnuphaptrairong, “Top Ten Lists of Software Project Risks: Evidence from Literature Survey”, IMECS vol. 1, Hong Kong, 2011.

5.       W.M. Han and S.J. Huang, “An Empirical analysis of Risk Components and Performance of Software Projects”, The Journal of Systems and Software vol. 80 number 1, pp.42-50, 2007.

6.       L. Wallace and M. Keil, “Software Project Risk and their Effect on Outcomes”, Communication of the ACM, vol. 47 number 4, pp. 68-73, 2004.

7.       Clancy, T. The Standish Group Report, Retrieved Feb 20, 2008 from http://www.projectsmart.co.uk/reports.html, Chaos report, 1995.

8.       Wasileski, J.S., “Learning Organization Principles & Project Management”, SIGUCCS’05, November 6-9, 2005, Monterey, California, USA.

9.       Salvatore Alessandro Sarcia, Giovanni Cantone and Victor R. Basili, “A Statistical Neural Network Framework For Risk Management Process”, from the proposal to its Preliminary Validation for Efficiency.

10.     Linyu Yang, Dwi H. Widyantoro, Thomas Ioerger, John Yen, “An Entropy based Adaptive Genetic Algorithm for Learning Classification Rules”.

11.     Xiaohong Shan, GuoRui Jiang and Tiyan Huang, “A Framework of estimating software project success potential based on association rule mining”, IEEE, 2009.

12.     Lior Rokach and Oded Maimon, “Decision Trees”, Chapter 9, pp. 165-192.

13.     Ding-An Chiang, Wei Chen, Yi-Fan Wang and Lain-Jinn Hwang, “Rules Generation from the Decision Tree”, Short paper, Journal of Information Science and Engineering, pp. 325-339, 2001.





Er.Qasim kamil Mohsin, Jyoti  Shrivastava

Paper Title:

Ac Power Flow Control of Grid by Series D-Fact

Abstract:    The power interconnection is getting increasingly congested so to control power flow of transmission grid, to limit loop flows, and also the capacity of transmission line can be increased by use of flexible ac transmission systems (FACT) devices. But high cost and reliability concerns have limited the FACT solutions.  This paper introduces the concept of Distributed SERIES FACTS (D-FACTS) as an alternative approach to realizing cost-effective power flow control by way of distributed series impedance (DSI) and a distributed static series compensator (DSSC). D-FACTS can be clipped on power line and it can dynamically and statically change the impedance of the line so as to control and increase capacity of power flow. D-FACTS provides  higher performance and lower cost method for enhancing T&D system reliability and controllability, improving asset utilization and end-user power quality, while minimizing system cost and environmental impact.              

   Power flow control, FACTS device system, Distributed flexible AC transmission systems


1.        Deepak Divan and Harjeet Johal "Distributed FACTS-A New Concept for Realizing Grid Power Flow Control", IEEE transactions on power electronics, vol. 22, no. 6, November 2007.
2.        N. Hingorani, "Flexible ac transmission" , IEEE Spectrum, vol. 30, no. 4, pp. 40–45, Apr. 1993.

3.        L. Gyugyi, C. D. Schauder, and K. K. Sen, "Static series compensator A solid-state approach to the series compensation of transmission lines". IEEE Trans. Power Del., vol. 12, no. 1, pp. 406–407, Jan. 1997.

4.        S. Bhattacharya, B. Fardanesh, B. Shperling, and S.Zelingher, "Convertible static compensator: Voltage source converter based facts application in the new york 345 KV transmission system", Int. Power  Electron Conf. Records, pp. 2286–2294, Apr. 2005.

5.        constants  for 132KV&400KV overhead line for Iraq network .

6.        D. Divan, W. Brumsickle, R. Schneider, B. Kranz, R. Gascoigne, D. Bradshaw, M. Ingram, and I. Grant, "A distributed static series compensator system for realizing active power flow control on existing power lines" , in IEEE PSCE Conf. Records, Oct. 2004.

7.        H. Johal and D. M. Divan, "Current limiting conductors: A distributed approach for increasing system capacity and reliability", in Proc. Transmission Distribution Conf. Exposition 2005 IEEE PES, New Orleans, LA.

8.        P.-T. Cheng, S. Bhattacharya, and D. Divan, "Operations of the dominant harmonic active filter (DHAF) under realistic utility conditions" , IEEE Trans. Ind. Appl., vol. 37, no. 4, pp. 1037–1044, Jul. 2001.

9.        Prof Deepak Divan Georgia Institute of Technology Atlanta, "Distributed Intelligent Power Networks – A New Concept for Improving T&D System Utilization and Performance " . GA 30332





S. Saravanan, A. Sureshkumar, S. Thangavel

Paper Title:

A New Topology of Multiple-Input Converter with Embedded Controller Based Power Management

Abstract:    This paper presents a new power conditioner topology that integrates multiple renewable energy sources to make best use of their operating characteristics and obtain better reliability than that could be obtained by single renewable energy based power supply. The proposed power conditioner uses three sources, one storage device and isolated load outputs. The proposed multiple-input converter uses intelligent closed loop control for efficient power control. The proposed power conditioner uses very limited number of switches and promises significant savings in component count and reduced losses in renewable energy power-harvesting system by reducing the on-state conduction loss and switching loss in comparison to topology like H-Bridge converters. The power conditioner houses a battery bank which is suitably connected by the controller to sink or source the input power based on the load requirement..

   Fuel cell, Multiple - Input Converter, PV panel, Power Conditioner, Renewable Energy Integration, Wind Turbine Generator.


1.        Z.Qian, O.Abdel-rahman and I.Batarse “An Integrated Four-Port DC/DC Converter for Renewable Energy Applications,”IEEE Trans. Power Electron., vol. 25, no.7, pp 1877 - 1887, july 2010,
2.        Yaow-Ming Chen, Yuan-Chuan Liu, and Feng-Yu Wu, “Multi-Input DC/DC Converter Based on the Multi winding Transformer for Renewable Energy Applications” IEEE Trans on Industry Applns, Vol. 38, No. 4,pp 1096 - 1104, 2002.

3.        Al-Atrash.H and Batarseh.I, “Boost-Integrated Phase-Shift Full-Bridge Converters for Three-Port Interface”, in Proc. IEEE Power Electron. Spec. Conf., pp. 2313–2321, 2007

4.        Jorge L. Duarte, Marcel Hendrix, and Marcelo Godoy Simões ,“Three-Port Bidirectional Converter for Hybrid Fuel Cell Systems”, IEEE Trans.  Power Electron, Vol. 22, no. 2, pp 480-487, 2007

5.        Chen.Y.M, Liu.Y.C, and Wu.F.Y , “Multi-Input DC/DC Converter Based on the Multi Winding Transformer for Renewable Energy applications”, IEEE Trans. Ind. Appl., vol. 38, no. 4, pp. 1096–1104, 2002.

6.        Chuanhong Zhao, Simon D. Round, and Johann W. Kolar, “An Isolated Three-Port Bidirectional DC-DC Converter With Decoupled Power Flow Management ” IEEE Trans.  Power Electron., Vol. 23, No. 5,pp 2443 – 2453, 2008.

7.        Khaligh. A, Cao. J, and Lee. Y , “A Multiple-Input DC–DC Converter  Topology”, IEEE Trans. Power Electron., vol. 24, no. 3, pp. 862–868, 2009.

8.        Tao. H, Duarte. J. L, and Hendrix. M. A. M , “Three-Port Triple Half-Bridge Bidirectional Converter with Zero-Voltage Switching”, IEEE Trans. Power Electron., vol. 23, no. 2, pp. 782–792,2008.

9.        Duarte. J. L, Hendrix. M, and Simoes. M. G, “Three-Port Bidirectional Converter for Hybrid Fuel cell Systems”, IEEE Trans. Power Electron., vol. 22, no. 2, pp. 480–487, 2007.

10.     H.Tao, A. Kotsopoulos, J.L Duarte and M.A.M Hendrix, “ Family of multiport bidirectional DC –DC  Converters”, IEEE Proc. Electr. Power Appl. Vol. 153,  no. 3, pp 451 – 458, May 2006

11.     Ramos Hernanz, J.A., Campayo Martín, J.J.,  Zamora Belver, I., LarrañagaLesaka, J., Zulueta Guerrero .E.,Puelles Pérez, E., “Modelling of Photovoltaic Module”, International Conference on Renewable Energies and Power Quality (ICREPQ’10), 23th to 25th March, 2010, Granada (Spain).





Nadia Adnan Shiltagh, Lana Dalawr Jalal

Paper Title:

Optimal Path Planning For Intelligent Mobile Robot Navigation Using Modified Particle Swarm Optimization

Abstract:    This study investigates the application of Modified Particle Swarm Optimization (MPSO) to the problem of mobile robot navigation to determine the shortest feasible path with the minimum time required to move from a starting position to a target position in working environment with obstacles. In this study, MPSO is developed to increase the capability of the optimized algorithms for a global path planning. The proposed algorithms read the map of the environment which expressed by grid model and then creates an optimal or near optimal collision free path. The effectiveness of the proposed optimized algorithm for mobile robot path planning is demonstrated by simulation studies. The programs are written in MATLAB R2012a and run on a computer with 2.5 GHz Intel Core i5 and 6 GB RAM. Improvements presented in MPSO are mainly trying to address the problem of premature convergence associated with the original PSO. In the MPSO an error factor is modelled to ensure the PSO converges.  MPSO try to address another problem which is the population may contain many infeasible paths; a modified procedure is carrying out in the MPSO to solve the infeasible path problem. The results demonstrate that this algorithm have a great potential to solve the path planning with satisfactory results in terms of minimizing distance and execution time.

   Modified Particle Swarm Optimization, Global Path Planning, Robot Navigation, Intelligent Mobile Robot.


1.       Yun, S.C., Ganapathy, V., Chong, L.O. (2010), “Improved genetic algorithms based optimum path planning for mobile robot”, International Conference on Control, Automation, Robotics and Vision, ICARCV, pp. 1565-1570. 
2.       Han, K. M., (2007), “Collision free path planning algorithms for robot navigation problem”, Master Thesis, University of Missouri-Columbia.

3.       Mohanty, P. K., and Parhi D. R. (2013), “Controlling the Motion of an Autonomous Mobile Robot Using Various Techniques: a Review”, Journal of Advance Mechanical Engineering, 1: 24-39.

4.       Raja, P., Pugazhenthi, S. (2012), “Optimal path planning of mobile robots: A review”, International Journal of Physical Sciences, 7(9): pp. 1314 - 1320

5.       Zhao, Y.,Zu, W. (2009),” Real-Time Obstacle Avoidance Method for Mobile Robots Based on a Modified Particle Swarm Optimization”, International Joint Conference on Computational Sciences and Optimization, pp.269-272.

6.       Ahmadzadeh,S., Ghanavati, M. (2012),” Navigation of Mobile Robot Using the PSO Particle Swarm Optimization”, Journal of Academic and Applied Studies (JAAS), 2(1): pp. 32-38.

7.       Yu-qin, W., Xiao-peng, Y. (2012), “Research for the Robot Path Planning Control Strategy Based on the Immune Particle Swarm Optimization Algorithm”, 2nd International Conference on Intelligent System Design and Engineering Application, pp. 724-727.

8.       Konar, A. (2000), “Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain”, CRC Press LLC.

9.       Atyabi, A., Phon-Amnuaisuk, S., C.K. Ho, (2010), “Navigating a robotic swarm in an uncharted 2D landscape”, Applied Soft Computing, 10(1):149-169.

10.     Dutta, S., (2010), “Obstacle Avoidance of Mobile Robot using PSO-based Neuro Fuzzy Technique”, International Journal of Computer Science and Engineering, 2(2): 301-304.

11.     Saska, M., Macas, M., Preucil, L., and Lhotska, L. (2006), “Robot Path Planning using Particle Swarm Optimization of Ferguson Splines”, In Proceedings 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2006), Prague, Czech Republic, pp. 833-839.

12.     Raja, P.,  Pugazhenthi, S. (2009), “Path Planning for Mobile Robots in Dynamic Environments using Particle Swarm Optimization”, International Conference on Advances in Recent Technologies in Communication and Computing, pp. 401-405.

13.     Sariff, N., and Buniyamin, N., (2006), “An overview of autonomous mobile robot path planning algorithms”, 4th Student Conference on Research and Development, Scored 2006, pp. 183-188

14.     Al-Taharwa, I., Sheta, A., Al-Weshah, and M. (2008), “A Mobile Robot Path Planning Using Genetic Algorithm in Static Environment”, Journal of Computer Science, 4 (4): 341-344.

15.     Li, P., Huang, X., Wang, M., (2010), “A New Hybrid Method for Mobile Robot Dynamic Local Path Planning in Unknown Environment”, Journal of Computers, North America, 5(5): 773-781.

16.     Velagic, J., Lacevic, B., ans Osmic, N., (2006), “Efficient path planning algorithm for mobile robot navigation with a local minima problem solving”, In Proceedings of IEEE International Conference on Industrial Technology, IEEE, Mumbai, pp. 2325–2330.

17.     Jatmiko, W., Sekiyama K., and Fukuda, T. (2006), “Modified Particle Swarm Robotic for Odor Source Localization in Dynamic Environment, the International Journal of Intelligent Control and Systems: Special Issue on Swarm Robotic, 11(3): 176-184.

18.     Eberhart, R., and Shi, Y. (1998), “Comparison between Genetic Algorithms and Particle Swarm Optimization”. In Proceedings of the Seventh Annual Conference on Evolutionary Programming, Springer-Verlag, pp. 611-619.





Y. T. Prabhu, K. Venkateswara Rao, V. Sesha Sai Kumar, B. Siva Kumari

Paper Title:

X-ray Analysis of Fe doped ZnO Nanoparticles by Williamson-Hall and Size-Strain Plot Methods

Abstract:    In the preparation of Fe doped ZnO a novel process is used with different doping concentrations from 2% to 10% by surfactant assisted combustion synthesis. The synthesized samples were characterized with X-ray diffraction particle analyzer and TEM. From X-ray diffraction, it was observed Fe-doped ZnO nanoparticles (NPs) have hexagonal wurtzite structure and further crystallite sizes were decreased with increasing doping concentrations. Transmission electron microscopy (TEM) showed that powder was polycrystalline in nature with random distribution of nano grained Fe doped ZnO. Using X-ray broadening crystalline development in the Fe doped ZnO-NPs was investigated. The crystallite sizes and lattice strain on the peak broadening of Fe doped ZnO-NPs were studied using Williamson- Hall (W-H) analysis and size- strain plot. Strain, stress and energy density parameters were calculated for the XRD peaks of all the samples using (UDM), uniform stress deformation model (USDM), uniform deformation energy density model (UDEDM) and by the size-strain plot method (SSP). The results of mean particle size of Fe doped ZnO-NPs showed an inter correlation with W-H analysis, SSP, and TEM results.

   Fe Doped ZnO, Surfactant Assisted Combustion Synthesis, XRD, TEM.


1.       V. R. Shinde, T. P. Gujar, C. D. Lokhande, R. S. Mane, and S. H. Han, “Mn doped and undoped ZnO films: A comparative structural, optical and electrical properties study” Mater. Chem. Phys. Vol 96, 2006, pp 326-330.
2.       S. Y. Yang, A. B. Pakhomov, S. T. Hund, and C. Y. Wong, “Room temperature magnetism in sputtered (Zn,Co)O films” IEEE Trans. Magn. Vol 38, 2002, pp 2877 – 2879.

3.       C. J. Cong, J. H. Hong, Q. Y. Liu, L. Liao, and K. L. Zhang, “Synthesis, structure and ferromagnetic properties of Ni-doped ZnO nanoparticles” Solid State commun. Vol.138, 2006, pp 511-515.

4.       T. Dietl, H. Ohno, F. Matsukura, J. Cibert, and D. Ferrand, Science Vol 287, 2000, pp 1019.

5.       K. Ramakanth, Basic of Diffraction and Its Application. I.K. International Publishing House Pvt. Ltd, New Dehli, 2007.

6.       Jian-Min Zhang, Yan Zhang, Ke-Wei Xu, Vincent Ji,” General compliance transformation relation and applications for anisotropic hexagonal metals” Solid State Commun. Vol 139, 2006 pp 87- 91.

7.       C. Suranarayana, M.G. Norton, X-ray Diffraction: A Practical Approach New York 1998.

8.       A. Khorsand Zak, M. Ebrahimizadeh Abrishami, W.H. Abd. Majid, Ramin Yousefi, S.M. Hosseini”, Ceram. Inter. Vol. 37, pp 393-398, 2011.

9.       N. Padmavathy and R. Vijayaraghavan, “Enhanced bioactivity of ZnO nanoparticles—an antimicrobial study” Sci. Technol. Adv. Mater. 9, 2008. doi:10.1088/1468-6996/9/3/035004

10.     Linhua Xu, Xiangyin Li, “Influence of Fe-doping on the structural and optical properties of ZnO thin films prepared by sol–gel method” J. Cryst. Growth, Vol. 312, 2010, pp 851-855.

11.     R. Yogamalar, R. Srinivasan, A. Vinu, K. Ariga, A.C. Bose, “X-ray peak broadening analysis in ZnO nanoparticles” Solid State Commun. Vol. 149 2009, pp. 1919-1923.

12.     K.D. Rogers, P. Daniels, “An X-ray diffraction study of the effects of heat treatment on bone mineral microstructure” Biomaterials, Vol.23, 2002, pp 2577-2585

13.     Jian-Min Zhang, Yan Zhang, Ke-Wei Xu, Vincent Ji, “General compliance transformation relation and applications for anisotropic hexagonal metals” Solid State Commun. Vol.139, 2006, pp 87-.

14.     J.F. Nye, Physical Properties of Crystals: Their Representation by Tensors and Matrices. Oxford, New York, 1985.

15.     M.A. Tagliente, M.Massaro, “Strain-driven (0 0 2) preferred orientation of ZnO nanoparticles in ion-implanted silica” Nucl. Instrum Methods Phys. Res. B. Vol. 266, 2008, pp.1055 -1061.





Mamta Juneja, Parvinder Singh Sandhu

Paper Title:

Information Hiding using Improved LSB Steganography and Feature Detection Technique

Abstract:    This paper proposes an improved Least Significant bit(LSB) based Steganography technique for images imparting better information hiding .It presents an embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges and smooth areas of images. It first encrypts the secret message, and detects edges as well as smooth areas  in the cover-image using improved feature  detection filter. Message bits are then, embedded in the least significant byte of randomly selected edge area pixels and 1-3-4 LSBs of red, green, blue components respectively across randomly selected pixels across smooth area of image. It ensures that the eavesdroppers will not have any suspicion that message bits are hidden in the image and standard steganography detection methods can not estimate the length of the secret message correctly. The Proposed approach is better in PSNR value and Capacity as shown experimentally than existing techniques.

   Canny filter, Feature detection, Hough transform, Image Steganography, Information hiding, LSB based Insertion.


1.       Neil F. Johnson, Sushil Jajodia, “Exploring Steganography, Seeing the Unseen,” IEEEComputer Magazine, pp. 26-34, February1998.
2.       Kevin Curran, Karen Bailey, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence, Vol.2 no. 2, pp. 1-40,Fall 2003.

3.       Niel F. Johnson, Zoran Duric, Sushil Jajodia, “Information Hiding, and Watermarking - Attacks & Countermeasures,” Kluwer Academic Publisher, 2000.

4.       Chun Shien Lu, "Steganography and Digital Watermarking Techniques for Protection of Intellectual Property" in Multimedia Security, Idea Group Publishing, Singapore, 2005, pp. 75-157.

5.       R.H.Alwan, F.J.Kadhim, A.T.Al-Taani. “Data Embedding Based on Better Use of Bits in Image Pixels”. International Journal of Signal Processing. Vol. 2, no.1,pp:104-107,2005.

6.       N. Wu, M. Hwang,"Data hiding: Current status and key issues", International Journal of Network Security,vol.4,no.1,pp.1-9, 2007.

7.       Lisa M. Marvel, Charles T. Retter, "The Use of Side Information in Image Steganography", Proceedings of IEEE International Symposium on Information Theory
and Its Applications, Honolulu, Hawaii, USA, November 5-8, 2000.

8.       W. Luo, “Object-Related Illustration Watermarks in Cartoon Images”,Masters Thesis, Department of Simulation and Graphics, Otto-vonGuericke University Magdeburg, Germany, February 2004.

9.       Jessica Fridrich , Miroslav Goljan , Rui Du, "Detecting LSB Steganography in Color and Gray-Scale Images", IEEE MultiMedia, vol.8 no.4, pp.22-28, October 2001.

10.     Mamta Juneja, Parvinder Singh Sandhu, "Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain", International Journal of Computer Theory and Engineering, Vol. 1, No. 5,pp 614-621,December,2009.

11.     V.F. F. Leavers, Shape Detection in Computer Vision Using the Hough Transform, Springer-Verlag New York, Inc., Secaucus, NJ, 1992.

12.     D.Ioannou,W.Huda,F.Laine,"Circle recognition though a 2-D Hough transform and radius histogramming", Image Vision Computing ,Vol 17,no. 1,pp. 15-26,1999.

13.     Chi-Kwong Chan, l. M. Cheng,” Hiding data in images by simple LSB substitution”,Pattern Recognition,vol. 37, pp.469-474, 2004.

14.     Mamta Juneja , Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, Proceedings of the International Conference on Advances in Recent Technologies in Communication and Computing(ARTCOM-2009), Kerala,India,October 27-28, 2009.

15.     Data Encryption Standard (DES), National Bureau of Standards (US).Federal Information Processing Standards Publication National Technical information Service. Springfield VA. April 1997.





Yazdan Khan, Ashish Kumar, Aakash Dhiman

Paper Title:

Bandwidth Improvement of the Rectangular Microstrip Antenna by Using Single Dipole Stub

Abstract:   In the most recent days microstrip antennas are mostly used in the wireless communication due to the salient features like low cost, less weight, small size. But these antennas are having some drawbacks like narrow bandwidth, low gain etc. In this paper a microstrip antenna with wide bandwidth is presented. For this purpose we took two dierent radiating elements which are connected together through a matched section and these elements are embedded on a single layer structure. This new introduced structure offers a dual-band microstrip antenna. By controlling the resonant frequency of these two elements, means by keeping constant value of resonant frequency of one element and varying the resonant frequency of other element, then a much more improved bandwidth approximately 21 % has been obtained. Representation, calculation and measurement for this new antenna has been done with the help of software MATLAB and also from EM-TALK online antenna calculator.

   Bandwidth Improvement; Microstrip Antenna; Radiating elements; Resonant Frequency.


1.       Bahl, J. and P. Bhartia, Microstrip Antennas, Artech House, Inc., London, 1980.
2.       J Constantine A. Balanis; Antenna Theory, Analysis and Design, John Wiley & Sons Inc. 2nd edition. 1997.

3.       Garg, R and Ittipiboon, A; “Micro strip Antenna Design Handbook”, Artech House, 2001.

4.       Lechtreck, L. W., “Effects of coupling accumulation in antenna arrays,” IEEE Trans. Ant. Prop., Vol. AP-16, No. 1, 1968.

5.       Pozar, D. M. and D. H. Schaubert, “Scan blindness in infinite phased arrays of printed dipoles,” IEEE Trans. Ant. Prop., Vol. AP-32, No. 6, 1984.

6.       Long, S. A. and M. D. Walton, “Mutual coupling between stacked square microstrip antennas fed on their diagonal,” IEEE Trans. Ant. Prop., Vol. 39, No. 7, 1049–1051, 1991.

7.       Neeraj Rao,‖Gain and Bandwidth Enhancement of a Microstrip Antenna using Partial substrate removal in multiple layer dielectric substrate‖, PIER proceedings, Suzhou, China, Sept.12-16, 2011

8.       www.wikipedia.org

9.       http://www.emtalk.com/mpacalc.php





Mangesh Powar, Tejas Vichare, Rashmi Udeg,Yojana Namdas, Swati Joshi

Paper Title:

Swammis: Sinhgads’wide Area Multiuser and Multitasking Intranet System (Educational ERP)

Abstract:    Ineducational system at different departments, all the administrative jobs are being carried out manually. It not only consumes a lot of time but also reduces output efficiency. For every single job, faculties need to manually approach colleagues, carry out sumptuous hand written documentation, attendances, leave applications etc. If such jobs are automated by an Intranet application and a common communication platform, by making use of different technologies such as remote installation, VOIP with video conferencing, PDF data extraction in LAN etc. This paper begins by explaining the background to education ERP systems and goes on to discuss specific systems and their capabilities. Enterprise Resource Planning (ERP) Systems are powerful software packages that enable educational system to integrate a variety of disparate functions.

   ERP, video conferencing, RTMFP, VOIP, PDFand data extraction.


1.        “Understanding RTMFP Handshake” byKundan Singh, [Online] Available at URLhttp://p2p-sip.blogspot.in/2011/12/understanding-rtmfp-handshake.html
2.        “RTCF – Real Time Component Framework” by Brian Lesser, [Online] Available at URLhttp://broadcast.oreilly.com/2011/08/real-time-component framework.html

3.        “Understanding Voice over Internet Protocol (VoIP)”, Matthew Desantis, US-CERT

4.        “Voice Over Internet Protocol (VoIP)” , Invited Paper, Bur Goode, SENIOR MEMBER, IEEE

5.        “Application Middleware for convergence of IP Multimedia system and Web Services”, Ivan Budiselic, Ivan Zuzak, Ivan Benc, MIPRO, 2010 Proceedings of the 33rd International Convention.

6.        “Dynamic code selection Algorithm for Voip” by Maja Sulovic, Mesud Hadzialic, Darijo Raca, Nasuf Hadziahmetovic, The Sixth International Conference on Digital Telecommunications, ICDT 2011

7.        “Application Middleware for convergence of IP Multimedia system and Web Services”, Ivan Budiselic, Ivan Zuzak, Ivan Benc.

8.        Real Time Media Flow Protocol by Adobe Systems, [WWW] Available online at URLhttp://labs.adobe.com/technologies/cirrus

9.        “XPDF and Open Source” by Glyph and Cog, [WWW] Available online at URL http://www.glyphandcog.com/Xpdf.html





M. Velan

Paper Title:

Environmental Sustainability and Cleaner Perspectives - A Challenging Experience from Lignite Mining Industry in India

Abstract:    Mining of lignite causes pollution of Environment and ecological damage if unattended. Being conscious that environmental regeneration is the foundation on which Productivity has to be built, N.L.C. started investing on Eco Care long back and it continues.  Early investment in Environment protection has resulted in steady growth. N.L.C.’s futuristic vision is to be in the vanguard among the contributors to the community, environment and the Nation by developing and utilizing industrial and human resources to the optimum. Untiring efforts are being put in Mines (NLC as a whole) to maintain and sustain the ecological balance arising due to the continuous mining activity. The Neyveli’s Environmental Management System is becoming a symbolic role model for any of the opencast mines in the South-East Asia.

   Lignite, mining, Sustainability, Environmental, protection.





Amit Kumar, Harish Chandra Maurya, Rahul Misra

Paper Title:

A Research Paper on Hybrid Intrusion Detection System

Abstract:    An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization. Different methods can be used to detect intrusions which make a number of assumptions that are specific only to the particular method. Hence, in addition to the definition of the security policy and the access patterns which are used in the learning phase of the detector, the attack detection capability of an intrusion detection system also depends upon the assumptions made by individual methods for intrusion detection. The purpose of an intrusion detection system is to detect attacks. However, it is equally important to detect attacks at an early stage in order to minimize their impact. I have used Dataset and Classifier to refine Intruders in Networks.

  (IDS), (IDPS), IDPSes.


1.       Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey. Technical Report 98-17, Department of Computer Engineering, Chalmers University of Technology, 1998.
2.       SANS Institute - Intrusion Detection FAQ. Last accessed: August 30, 2012. http://www.sans.org/resources/idfaq/.

3.       Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, and Christopher Leckie. The Curse of Ease of Access to the Internet. In Proceedings of the 3 rd International Conference on Information Systems Security (ICISS), pages 234–249. Lecture Notes in Computer Science, Springer Verlag, Vol (4812), 2008.

4.       Overview of Attack Trends, 2002. Last accessed: November 30, 2008. http://www. cert.org/archive/pdf/attack_trends.pdf.

5.       Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, and Ashraf Kazi. Attacking Confidentiality: An Agent Based Approach. In Proceedings of IEEE International Conference on Intelligence and Security Informatics, pages 285–296. Lecture Notes in Computer Science, Springer Verlag, Vol (3975), 2006.

6.       The ISC Domain Survey. Last accessed: Novmeber 30, 2008. https://www.isc. org/solutions/survey/.

7.       Peter Lyman, Hal R. Varian, Peter Charles, Nathan Good, Laheem Lamar Jordan, Joyojeet Pal, and Kirsten Swearingen. How much Information. Last accessed: Novmeber 30, 2008. http://www2.sims.berkeley.edu/research/projects/how-much-info-2003.

8.       Animesh Patcha and Jung-Min Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448–3470, 2007.

9.       CERT/CC Statistics. Last accessed: Novmeber 30, 2008. http://www.cert.org/stats/.

10.     Thomas A. Longstaff, James T. Ellis, Shawn V. Hernan, Howard F. Lipson, Robert D. Mcmillan,  Linda Hutz Pesante, and Derek Simmel. Security of the Internet. Technical Report The Froehlich/Kent Encyclopedia of Telecommunications Vol (15), CERT Coordination Center 1997. Last accessed: Novmeber 30, 2008. http://www.cert.org/encyc_article/tocencyc.html.

11.     KDD Cup 1999 Intrusion Detection Data. Last accessed: Novmeber 30, 2008. http:   //kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.

12.     Kapil Kumar Gupta, Baikunth Nath, and Kotagiri Ramamohanarao. Applicatio base Intrusion Detection Dataset. Last accessed: Novmeber 30, 2008. http://www.csseunimelb.edu.au/˜kgupta.

13.     Stefan Axelsson. Intrusion Detection Systems: A Taxomomy and Survey. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, 2000.

14.     Anita K. Jones and Robert S. Sielken. Computer System Intrusion Detection: A Survey. Technical report, Department of Computer Science, University of Virginia, 1999. Last accessed:Novmeber 30, 2008. http://www.cs.virginia.edu/˜jones/IDS-research/Documents/jones-sielken-survey-v11.pdf.

15.     Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 1(2):84–102, 2005.

16.     Joseph S. Sherif and Tommy G. Dearmond. Intrusion Detection: Systems and Models. In Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE, pages 115–133. IEEE, 2002.

17.     Mikko T. Siponen and Harri Oinas-Kukkonen. A Review of Information Security Issues  and Respective Research Contributions. SIGMIS Database, 38(1):60–80, 2007. ACM.

18.     Teresa F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12(4):405–418, 1993. Elsevier Advanced Technology Publications.

19.     Emilie Lundin and Erland Jonsson. Survey of Intrusion Detection Research. Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, 2002.

20.     James P. Anderson. Computer Security Threat Monitoring and Surveillance, 1980. Last accessed: Novmeber 30, 2011. http://csrc.nist.gov/publications/ history/ande80.pdf.

21.     Dorothy E. Denning. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, 13(2):222–232, 1987. IEEE.

22.     H. S. Javitz and A. Valdes. The SRI IDES Statistical Anomaly Detector. In Proceedings of

23.     the IEEE Symposium on Security and Privacy, pages 316–326. IEEE, 1991.

24.     S.E.Smaha. Haystack: An Intrusion Detection System. In Proceedings of the 4th Aerospace Computer Security Applications Conference, pages 37–44. IEEE, 1988.

25.     Paul Innella. The Evolution of Intrusion Detection Systems, 2001. Last accessed: Novmeber 30, 2008. http://www.securityfocus.com/infocus/1514.





Ashish Bodanwar, Rahul Mudpalliwar, Vikrant Pawar, Kaustubh Gaikwad

Paper Title:

Drowsy Driving Detection System

Abstract:    In this paper, we propose a drowsy driving detection system in which sensors like alcohol sensor, accelerometer, IR sensors are used for detection of drowsiness and alcohol consumption by driver. In addition to that we have used GPS receiver and GSM modem, for communication with the remote control station. The system used in the vehicle will continuously sends the readings obtained from various sensors and current position of the vehicle which will obtain from GPS receiver to the control station. As a result we get immediate information related to the driver’s condition. Detail design criteria with respect to various sensor and system are given. The proposed system will accurately derive the various parameters and inform control room.

   Alcohol consumption, control room, drowsiness, position.


1.        Ueno H., Kanda, M. and Tsukino, M. “Development of Drowsiness Detection System”, IEEE Vehicle Navigation and Information Systems Conference Proceedings,(1994), ppA1-3,15-20.
2.        Sean Enright, Electronics Engineering Student, 506-650-3611, May 26-2011, Alcohol Gas Detector “Breathalyzer”.

3.        Weirwille, W.W. (1994). “Overview of Research on Driver Drowsiness Definition and Driver Drowsiness Detection,” 14th International Technical Conference on Enhanced Safety of Vehicles, pp 23-26.

4.        Arpit Agarwal, “Driver Drowsiness Detection System”, portfolio of projects on human computer interaction, December,2010.

5.        Paul Stephen Rau, National Highway Traffic Safety Administration, United States, Paper Number 05-0192 Drowsy Driver Detection and Warning System for Commercial Vehicle Drivers: Field Operational Test Design, Data Analyses and progress.

6.        Mallis, M.M., et al., Bio Behavioral Responses to Drowsy Driving Alarms and Alerting Stimuli, DOT HS 809 202,February 2000.

7.        Embedded system design book- Raj Kamal

8.        www.keil.com/arm/

9.        www.embedded arm.com

10.     Mikro Elektronika Easy ARM v7 user manual

11.     C Programming for Embedded Systems by Kirk Zurell

12.     http://en.wikipedia.org/wiki/Braille





S.Saravanan, R.Vidhya, S.Thangavel

Paper Title:

Online SOC estimation and Intelligent Battery Charger for Solar PV System

Abstract:    In this paper, the state of charge of the battery is determined and the battery is allowed to charge or discharge by standard reference current, since the overcharging and undercharging would affect the battery performance. So a battery should not be fully charged or discharged, because overcharging of a battery will affect the life time of the battery and undercharging of a battery will increase the initial charging time. Online estimation to determine SOC of battery is attempted in the proposed work with the electrical parameters which is developed using an intelligent controller.

   So a battery should not be fully charged or discharged


1.        Indu Rani, G.Saravana Ilango, C.Nagamani, "Control Strategy for power flow management in a PV system supplying DC loads", IEEE,2011
2.        Yazdani, and Prajna Paramita Dash, "A control methodology and characterization of dynamics for a photovoltaic system interfaced with a distribution network," IEEE., vol.24(3), 2009, pp.1538-1551.

3.        Mukhtiar Singh, Vinod Khadkikar, Ambrish Chandra, and Rajiv K. Varma, "Grid interconnection of renewable energy sources at the distribution level with power-quality improvement features", IEEE.,vol.26(1),  2011, pp.307-315.

4.        Benjamin Kroposki, Christopher Pink, Richard DeBlasio, Holly Thomas, Marcelo Sim˜oes, and Pankaj K. Sen, "Benefits of power electronic interfaces for distributed energy sources", IEEE.,vol.25(3), 2010, pp.901-908.

5.        Enrique Romero-Cadaval, María Isabel Milanés-Montero, Eva González-Romera, and Fermín Barrero-González, "Power injection system for grid-connected photovoltaic generation systems based on two collaborative voltage source inverters", IEEE,vol.56(11), 2009,pp. 4389-4398

6.        Y.K. Lo, H.J.Chiu, T.P.Lee, I. Purnama, and J.M. Wang, "Analysis and design of a photovoltaic system connected to the utility with a power factor corrector", IEEE.,vol.56(11), 2009, pp.4354-4362.

7.        Jung-Min Kwon, Bong-Hwan Kwon, and Kwang-Hee Nam,  "Grid-connected photovoltaic multistring pcs with pv current variation reduction control", IEEE., Vol.56(11), 2009, pp.4381-4388.





Kalaiselvan C, Arun Prakash R

Paper Title:

Accelerated Life Testing of Ceramic Capacitors and Integration of its Reliability Test Data with PLM Solutions

Abstract:    As the market for an electronic device continues to grow and expand, it has become evident that product reliability must remain a top priority for electronic device manufacturers. The Electronic Device manufacturing industry is now under increasing pressure to maintain their places in the market. To improve their ability to innovate, get products to market faster, and reduce errors, the manufacturers have been continuing to improve their product reliability and product development. time. Product reliability is considered as a prime contributor to quality and competitiveness. The reliability of the product is usually determined by testing the product to failure and collection of time to failure (TTF) data. For some products the test time to evaluate reliability is usually very longer, if it is tested under actual working condition of the products. Hence the accelerated and highly accelerated life testing (HALT) testing method is employed to accelerate to stress condition on the product to quicken the degradation of products performance. The obtained performance data when analyzed,  yields its reasonable estimates of products life under actual conditions. In this study, the ceramic capacitor are evaluated for it reliability using HALT. The capacitors are considered to be failed when its insulation resistance dropped. The product lifecycle management (PLM) integration methodology adopted in this study is based on 3-tier client server architecture. The software tool like Java, HTML (HyperText Markup Language) and SQL (Structured query language) are used to create the front and back end 3-tier architecture. 

   Highly Accelerated life Testing, Time to Failure (TTF), Product Lifecycle Management (PLM), Server Architecture.


1.       Ireson WG, Coombs CF, Moss RY. Handbook of reliability engineering and management. 2nd ed. New York: McGraw-Hill; 1996.
2.       Pecht M. Product reliability. Maintainability and supportability handbook. Boca Raton: CRC Press; 1995.

3.       Nelson W. Accelerated testing statistical models test plans and data analysis. New Jersey (USA): John Wiley & Sons. Inc.; 2004. 601p.

4.       H. Kishi, Y. Mizuno, and H. Chazono, Jpn.J.Appl.Phys. 42, 1 (2003).

5.       A. S. Gurav, X. Xu, P. Pinceloup, M. Sato, A. Tajuddin, C. Randall and G. Yang, 13th US-Japan Seminar on Dielectric and Piezoelectric       Ceramics, Nov. 2-5, 2007, Awaji Island, Japan.

6.       A. S. Gurav, X. Xu, P. Pinceloup, M. Sato, A. Tajuddin, C. Randall and G. Yang, 13th US-Japan Seminar on   Dielectric and Piezoelectric Ceramics, Nov. 2-5, 2007, Awaji Island, Japan.

7.       T. Prokopowicz and A. Vaskas, “Research and Development, Intrinsic Reliability, Subminiature Ceramic Capacitors,” Final Report, ECOM-9705-F, 1969 NTIS AD-864068.

8.       G. Maher, “Highly Accelerated Life Testing of K-4500 Low Fired X7R Dielectric,” Proceedings of the Passive Components for Power Electronics Workshop. April 26-27, 2000, Penn State University.

9.       Yongjae Shin, Soon-Hung Han, Doo-Hwan Bae Integration of heterogeneous CAD databases using STEP and the Internet.

10.     Soumil D. Deshmukh Manoj D. Patil “PDM Requirements for Large Scale Engineering”, presented at Product Data Technology Europe 2002 At Centro Ricerche Fiat, Turin, Italy 7th - 9th May 2002.





Aayush Agarwal, Rekha Saraswat

Paper Title:

Modified Group Signature in Online Auction System

Abstract:    Group Signature scheme allows members of a group to sign messages on behalf of the group, such that the resulting signature does not reveal the identity of the signer. Signatures can be verified with respect to a single group public key. In case of dispute, only a designated group manager, because of their special property, is able to open signatures, and thus reveal the signer’s identity. Its applications are widespread used, especially in e-commerce such as e-cash, e-voting and e-auction. On the other hand, Internet is an open environment, and the unsecured environment can obstruct the development of e-commerce. Therefore, Internet must have some protocol to prevent the important message from impersonating and modifying. Recently, online auction has been receiving more and more attention in the world of electronic commerce, hence, the security and efficiency of online auction is more and more important. This paper proposes a new scheme for conducting secure and anonymous online auctions using a modified type of group signature. Our scheme solves the problems of the existing auction schemes and has following characteristics: unforgeability, anonymity, unlinkability, exculpability, coalition-resistance, verifiability, robustness, traceability, revocation, one-off registration, unskewability and unblockability. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.

   anonymity, authenticated encryption, E-auction, group signature.


1.        D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In V. Atluri, B. Pfitz-mann, and P. D. McDaniel, editors, ACM Conference on Computer and Communications Security,  ACM, 2004.
2.        G.Ateniese, J.Camenisch, M.Joye, and G.Tsudik, “A Pracical and provably secure coalition-resistant group signature”, in Advances in Cryptology 2000. 

3.        Q.L.Xu . A Modified Threshold RSA Digital Signature Scheme. Chinese Journal of Computer, 2000.

4.        J. Camenisch, “Efficient and generalized group signatures”, in Advances in Cryptology, EuroCrypto 1997.

5.        Sun Huihui, Chen Shaozhen. An Efficient Forward Secure Group Signature Scheme With Revocation. JOURNAL OF ELECTRONICS, 2008

6.        J. Camenisch and M.Stadler, “Efficient group signature scheme for large groups”, in Advances in Cryptology, Crypto 1997.

7.        J. Camenisch and M. Michels, “Separability and efficiency for generic group signature schemes”. In M. Wiener, editor, Advances in Cryptology, CRYPTO 1999.

8.        D. Chaum and E. Heyst, “Group Signatures”, in Advances in Cryptology, Eurocrypt, 1991.

9.        L. Chen and T.P. Pedersen, “New Group Signatures”, in Advances in Cryptology, Eurocrypt 1994.

10.     R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of rsa functions. In Advances in Cryptology, 1996.

11.     Yuh-Min Tseng and Jinn-Ke Jan, “Improved Group Signature scheme based on discrete logarithm problem,” IEE Electronics Letters, vol. 35, no. 1, pp. 37-38, 1999.

12.     M.K. Franklin and M.K. Reiter, “The design and implementation of a secure auction service”, IEEE Transactions on Software Engineering, 1996.

13.     G. Tsudik, G. Ateniese, “Some open issues and new directions in group signatures”, in Advances in Cryptology Crypto 1999.

14.     G. Tsudik and G. Ateniese, “Quasi-efficient revocation of group  signatures”, in To Appear in Financial Cryptography, 2002.

15.     www.ebay.com

16.     www.ubid.com

17.     Jarrod Trevathan and Wayne Read, “SECURE ONLINE ENGLISH AUCTIONS”, School of Mathematical and Physical Sciences James Cook University.

18.     M. Harkavy, H. Kikuch and J.D. Tygar, “Electronic auction with private commerce”, in Proceedings of the 3rd USENLX Workshop on Electronic Commerce, August 1998.

19.     Fangguo Zhang and Kwangjo Kim, “Security of A New Group Signature Scheme”, IEEE TENCON'02

20.     E. Petrank J. Kilian, “Identity Escrow”, in Advances in Cryptology Crypto 1998.

21.     Zulfikar Amin Ramzan, “Group Blind Digital Signatures:   Theory and Applications” in Advances in Cryptology 1999.

22.     Trevathan, J., Ghodosi, H. and Read, W.  “Design Issues for Electronic Auctions”, in 2nd International Conference on E-Business and Telecommunication Networks, 2005.





Amruta Deshpande, Apurva Bhoite, Ashish Kalbhor, Sandeep Mane, Prema Desai

Paper Title:

KinoSense: Framework for Tasking Applications on Smartphones using Sensing and Co-ordination

Abstract:    A growing class of smartphones use tasking applications  that run continuously, process data from sensors to  determine the user’s context (such as location),  and fire certain actions when the right conditions occur. We propose a framework which enables smartphones to use device sensors to perform some actions by defining a rule. The idea is to develop primitives that would simplify the use of device sensors and services for both developers as well as users.We hereby overcome the issues in current approaches by creating broader and more meaningful definitions to be used on smartphones.  KinoSense provides a task execution framework to automatically distribute and coordinate tasks, energy-efficient modules to infer user activities and compose them.These applications combine sensing from the device and the coordination between all sensors.

   Framework, Triggers, Actions, Sensors, Events


1.       Blackberry location-based reminder http://whenimclose.com/
2.       OnX. http://www.onx.ms/

3.       Lenin R., Arvind T., Hari B., Samuel M.;”Code In the Air”, MIT CSAIL, USA Jan 2012.

4.       Won-Jae Yi, Weidi J., Saniie J; “Mobile Sensor Data Collector using Android Smartphones”, IEEE August 2012

5.       Yong-Hua Cheng, Wen-Kuang Kuo, Szu-Lin Su; “An Android system design and implementation for telematics services”, IEEE ICIS 2010

6.       Sean J., Miguel A., Philip L, Nevine L.; “A General Architecture in Support of Interactive, Multimedia, Location-Based Mobile Applications”, IEEE Communications Magazine Nov 2006





N.Nandhini, SU.Suganthi

Paper Title:

Wireless Control of a Robotic Arm Using Inertial Sensor

Abstract:    The development of wireless sensing control unit operation is base on wearable inertial sensors. Inertial sensors are of tri axial accelerometer and MEMS. It extends to the control of an anthropomorphic robotic arm. Accelerometers used to measure the orientation and angular velocity of the lower arm. The data processing has been carried out on low cost micro controllers. The movement of the user arm was mimicked by the anthropomorphic robotic arm. The orientation of the control unit is tracked and displayed using MATLAB. Applications include industrial operation, remote operation in hazardous area, medicine and undersea recovery.

   accelerometer, inertial sensors, MEMS, motion sensing, robotic arm.


1.        Huiyu Zhou, Huosheng Hu, Reducing drifts in the inertial measurements of wrist and elbow positions. IEEE Trans vol.59,no.3 (2010)
2.        Tao Liu *, Yoshio Inoue, Kyoko Shibata, "Development of a wearable sensor system for quantitative gait analysis". Journal (2009) 978-988

3.        KunLiu,TaoLiu,KyokoShibata,YoshioInoue,RenchengZheng, "Novel approach to ambulatory assessment of human segmental orientation on a wearable sensor system". Journal (2009) 2747-2752 

4.        Huiyu Zhou, Thomas Stone, Huosheng Huc,, Nigel Harris "Use of multiple wearable inertial sensors in upper limb motion tracking", IPEM (2008) 123-133

5.        Shumei Zhang Æ Huosheng Hu Æ Huiyu Zhou "An interactive Internet-based system for tracking upper limb motion in home-based rehabilitation", Med Biol Eng Comput (2008) 46:241-249

6.        Liu, Kun, Liu, Tao, Shibata, K., Inoue, Y., Zheng, Rencheng, 2008. Novel approach for lower limb segment orientation in gait analysis using triaxial accelerometers. IEEE/ASME International Conference on Advanced Intelligent Mechatronics 2008, 488-492.

7.        Huiyu Zhou and Huosheng Hu, "Inertial sensors for motion detection of human upper limbs," Sensor Review, vol. 27, no. 2, pp. 151-158, 2007.

8.        Zhou H, Hu H, Harris ND (2006a) Applications of wearable inertial sensors in estimation of upper limb movements. J Biomed Signal Process Control 1:22-32

9.        Zhou H, Hu H, Tao Y (2006b) Inertial measurements of upper limb motion. J Med Biol Eng Comput 44(6):479-487

10.     George S. Doukas, Kleanthis C. Thramboulidis,  Yannis C. Koveos"Using the Function Block Model for Robotic Arm Motion Control", IEEE 2006

11.     Dejnabadi, H., Jolles, B.M., Casanova, E. and Fua, P. (2006), "Estimation and visualization of sagittal kinematics of lower limbs orientation using body-fixed sensors", IEEE Transactions of Biomedical Engineering, Vol. 53 No. 7, pp. 1385-93.

12.     Tao, Y., Hu, H. and Zhou, H. (2007), "Integration of vision and inertial sensors for home-based rehabilitation", International Journal of Robotics Research, Accepted subject to revision.

13.     Zhou, H., Hu, H. and Harris, N. (2006a), "Wearable inertial sensors for arm motion tracking in home-based rehabilitation", Proceedings of the 9th International Conference on Intelligent Autonomous Systems, Tokyo, Japan, March, pp. 930-7.

14.     Chai, L., Hoff, W.A. and Vincent, T. (2002), "Threedimensional motion and structure estimation using inertial sensors and computer vision for augments reality", Journal of Presence, Vol. 11 No. 5, pp. 474-92.

15.     Luinge H. Inertial sensing of human movement. PhD thesis. The Netherlands: Twente University; 2002.

16.     Barbour N, Schmidt G. Inertial sensor technology trends. IEEE Sensors J 2001;1:332-9.





Vilas S. Gaikwad, Suyog.V.Patil, Rohan.G.Patil, Vaibhav.D. Darwadkar Sandip.M. Ambulkar, Ranjit.R.More

Paper Title:

GSM Based Server Control System (SCS) For Better Security of Computer Automation

Abstract:    Server Control System (SCS) provides remotely controlling approach that allows computer user to control operation on computer from remote location provided the user is authenticated. User does this by carrying out computer operations through GSM modem and SMS technology. This paper also demonstrates on operations related to network and prevent unauthorized access using attention commands (AT). Hence this application will help user to operate his computer remotely and also get SMS alert to prevent unauthorized access to computer.

   Mobile phone, Short message service (SMS), Global system for mobile phone (GSM).


1.        Awodele Oludele,Adamo David, Kadiri Kamal-Deen,Orekoya Morolake,"SMS Based Microcomputer Control System for Computer Automation and   Security" International Journal of Information Sciences and Computer Engineering, Vol. 1, No. 2, (2010) 15–20.
2.        Amit Chauhan,Reecha Ranjan Singh, Sangeeta Agrawal , Saurabh Kapoor, S. Sharma, “SMS based Remote Control System” International Journal of Information Sciences and Computer Engineering,Vol. 11, Issue 02, Aug 2011.

3.        Chaitali Navasare, Deepa Nagdev  and Jai Shree, “PocketDroid - A PC Remote Control” 2012 InternationalConference onInformation and Network Technology (ICINT 2012,)IPCSIT vol. 37 (2012).

4.        Dr. Khanna SamratVivekanand Omprakash, “Concept of Web based SMS messaging server with mobile”international Journal of Advanced Research in Computer Science and Software Engineering Volume1,Issue-1,Dec-2011

5.        E. R. Adagunodo, O. Awodele, and O. B. Ajayi, “Sms user interface result checking system,” Issues Informing Science and InformingTechnology,vol.6,2009.
6.  Amir Rajabzadeh, Ali Reza Manashty, and Zahra Forootan Jahromi “A Mobile Application for Smart House Remote Control System ”World Academy of Science, Engineering and Technology 62 2010.





Lamyaa Moulad, Hicham Belhadaoui, Mounir Rifi, Reda Filali hilali

Paper Title:

Towards An Improvement of the Security of A WSN Based On Power Management as Part of the QOS

Abstract:    Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, security flexibility, power dissipation, and scalability. The goal of this research is to develop a scheme to control the flow through the components of the WSN. This allows to improving the security of WSN by the good management of energy resources, as well as the local management of communications. In this sense, we proposed an improvement of the reactive AODV Routing Protocol [11] under the NS2 Simulator for the security support always as part of Quality of Service.

   WSN, energy management, security, NS2 Simulator.


1.        Houngbadji, Thérence (2009) Réseaux ad hoc : système d'adressage et méthodes d'accessibilité aux données. Thèse de doctorat.
2.        I. F. Akyildiz et al, “Wireless Sensor Networks: a survey, ” Computer Networks, Vol. 38, pp. 393-422, March 2002.

3.        H. Karl and A. Willig, “A short survey of wireless sensor networks” Technical Report TKN-03-018, Telecommunication Networks (2004).

4.        andrien Van Den Bossche (2007),proposition d’une nouvelle méthode d’accès déterministe por un reseau personnel sans fil a forte contraintes temporelles.

5.        D.mohammadi & H.jadidoleslamy ‘comparison of the attacks on the link layer in wsn ’ 2011

6.        JA Stankovic ‘DOS in WSN ’ .

7.        W. Stallings ‘Cryptography and network security’ 2003.

8.        Wassim Masri ( 2009), Dérivation d'exigences de Qualité de Service dans les Réseaux de Capteurs Sans Fil basés sur TDMA.

9.        Cobo Campo, Luis (2011) Gestion de la qualité de service et planification optimale de réseaux de capteurs multimédia sans fil.

10.     Rahim KACIMI ,(Septembre 2009) Techniques de conservation d'énergie pour les réseaux de capteurs sans fil l'Institut National Polytechnique de Toulouse.

11.     Teresa Albero-Albero,(2007) AODV Performance Evaluation and Proposal of Parameters Modification for Multimedia Traffic on Wireless Ad hoc Networks, Universidad Politécnica de Valencia .

12.     Haodong Wang; Bo Sheng; Tan, C.C.; Qun Li; “Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control”; Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference;Year: 2008 , pp: 11 – 18.

13.     Man Wah Chiang; Zilic, Z.; Radecka, K.; Chenard, J.-S.; ”Architectures of increased availability wireless sensor network nodes”; Test Conference, 2004. Proceedings. ITC 2005. International, year 2005, pp: 1232 – 1241.

14.     Jing Deng, Richard Han, Shivakant Mishra; “Defending against path-based DoS attacks in wireless sensor networks”; 3rd ACM workshop on Security of ad-hoc and sensor network”, Year: 2005.

15.     Meadows, Catherine; “A Cost-Based Framework for Analysis of Denial of Service in Networks”, NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS (CHACS), Year:2005.

16.     Baig, Z.A.; Khan, S.A.; “Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks “; Future Networks, 2010. ICFN '10. Second International Conference;Year: 2010 , Page(s): 185 - 189.

17.     Z.A.Baig, M. Bager, A.I.Khan;, “A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks”. ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03, Year: 2006.

18.     Agah, A.; Basu, K.; Das, S.K.; “Preventing DoS attack in Sensor Networks: A Game Theoretic Approach”; Communications, 2005. ICC 2005. 2005 IEEE International Conference; Year: May 2005 page(s): 3218 - 3222 Vol. 5.

19.     Mihui Kim; Inshil Doh; Kijoon Chae; “Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks”; Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference; Volume: 3; Year: 2006 , Page(s): 5 pp. – 1566.

20.     Jun Xu; Xuehai Zhou; Feng Yang; “Edge-based Trace back in Sensor Networks”; Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference;Year: 2010 , Page(s): 1 – 4.

21.     Xi Luo; Yi-Ying Zhang; Wen-Cheng Yang; Myong-Soon Park; “Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks”; Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference; Volume: 1; Year: 2008 , Page(s): 309 - 312 .

22.     P.Suraksha bhushan,A.Pandey,R.C Triphati “A Scheme for prevention of flooding attach in wireless sensor network”, Sience academy publisher,United kingdom, (IJRRWSN) .





Y.Madhuri,  B.Suresh

Paper Title:

Design aspects of Phased Array Antenna at L-Band

Abstract:    The multiple object tracking is done using Phased Array Radar. Phased array antenna, Digital receiver, Data processing system is the major systems of the Phased Array Radars. Phased array antenna consists of an array of radiating elements and each element is connected to a phase shifter. The phase shifters control the phase of the radiated signals at each element to form a beam at the desired direction.This paper deals with design aspects of Phased array antenna and to study its properties. Based on the study, simulations are carried out on 1X4 array and the same is fabricated for testing to analysis the results.

   phased array antenna, phase shifter,1X4 array


1.       Liu, Y., D. Fu, and S. Gong, "A novel model for    analyzing the radar cross section of microstrip antenna," Journal of Electromagnetic Waves and Application, Vol. 17, No. 9, 1301-1310, 2003.
2.       Cui, G., Y. Liu, and S. Gong, "A novel fractal patch antenna with low RCS," Journal of Electromagnetic Waves and Application, Vol. 21, No. 15, 2403-2411, 2007.

3.       Yuan, H.-W., S.-X. Gong, X. Wang, and W.-T. Wang, "Scattering analysis of a printed dipole antenna using PBG structures," Progress In Electromagnetics Research B, Vol. 1, 189-195, 2008.

4.       Wu, T., Y. Li, S. -X. Gong, and Y. Liu, "A novel low RCS microstrip antenna using aperture coupled microstrip dipoles," Journal of Electromagnetic Waves and Application, Vol. 22, 953-963, 2008.

5.       Jazi, M. N., Z. H. Firouzeh, H. Mirmohammad-Sadeghi, and G. Askari, "Design and implementation of aperture coupled microstrip IFF antenna," PIERS Online, Vol. 4, No. 1, 1-5, 2008.

6.       C. A. Balanis, “Antenna Theory, Analysis and Design”, JOHN WILEY & SONS, INC, New York 1997.

7.       I. J. Bahl and P. Bhartia, “Microstrip Antennas,” Artech House, Massachusetts,1980.

8.       Pozar, D. M., ‘’Microstrip Antennas’’, Proc. IEEE, Vol. 80, 1992, pp. 7991. 9)S. Silver, “Microwave Antenna Theory and Design”, McGraw-HILL BOOKCOMPANY, INC, New York 1949.10)IFS Tool for Fractal Microstrip Patch Antenna Analysis azdra, P.;   Capek, M.;   Dept. of Electromagn. Field, Czech Tech. Univ., Prague





J.Prathyusha, B.Suresh

Paper Title:

Radiation Pattern Analysis of a Fractal Micro-Strip Patch Antenna

Abstract:   There are number of methods that can be used to reduce the size of the antenna especially when it is too be used at lower operating frequencies. Fractal is one of the ways which can be used to miniaturize antennas due to their space filling ability. It helps in fitting large electrical lengths into small volume. In this paper the the radiation pattern of 1X4 array of micro-strip patch antenna over fractal geometry can be observed

   Fractal antenna, micro-strip patch antenna, ADS software, returns loss

1.       C. A. Balanis, “Antenna Theory, Analysis and Design”, JOHN WILEY & SONS, INC, New York 1997.
2.       J. Bahl and P. Bhartia, “Microstrip Antennas,” Artech House, Massachusetts, 1980.

3.       Pozar, D. M., ‘’Microstrip Antennas’’, Proc. IEEE, Vol. 80, 1992, pp. 7991.

4.       S. Silver, “Microwave Antenna Theory and Design”, McGraw-HILL BOOKCOMPANY, INC, New York 1949.

5.       IFS Tool for Fractal Microstrip Patch Antenna Analysis azdra, P.;   Capek, M.;   Dept. of Electromagn. Field, Czech Tech. Univ., Prague

6.       A Wideband Aperture-Coupled Microstrip Patch Antenna Employing Spaced Dielectric Cover for Enhanced Gain Performance Meagher, C.J.;   Sharma, S.K.;    Electr. & Comput. Eng. Dept., San Diego State Univ., San Diego, CA, USA





Manish Rai, Sandeep Kumar, Jayanta Ghosh

Paper Title:

Design & Analysis of Microstrip Antenna with Multi-frequency Operations

Abstract:    In this paper the theoretical and simulated results of rectangular microstrip are presented which can be utilized for multi-frequency operation. For this purpose, two rectangular microstrip antennas are designed with center frequencies 9 GHz and 5.67 GHz. Various parameter such as width, dielectric constant & effective length are calculated. Then the antenna impedance is matched to 50 ohm of coaxial fed for maximum power transfer. Now the designed structure is rearranged for multi-frequency operation by connecting two microstrip antennas at corner with corner excitation. The operating frequency, return loss and radiation pattern of the proposed structure are investigated. We observe a drastic reduction in resonant frequency. The radiation pattern for each resonating frequencies is nearly same. The frequency ratio (the ratio of second or higher resonating frequency to the first resonating frequency) of the proposed antenna is observed to be increased. The entire simulation work is done on IE3D software

   Microstrip Antenna, Rectangular, Multi-frequency, Return loss, Frequency Ratio.


1.       R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna Design Handbook. Norwood, MA: Artech House, 2001.
2.       C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.

3.       J. S. Roy, N. Chattoraj, N. Swain, “New Dual-Frequency Microstrip Antennas for Wireless Communication.”Proc. Romanian Journal of Information Science and Tech ,vol. 10, no. 1, 2007, 113-119.

4.       Roy, J. S. Ghosh, J.ROY, J. S., GHOSH, “A MultifrequencyMicrostrip Antenna, Microwave and Optical Technology Letters,Proc. Romanian Journal of Information Science and Tech, vol. 46, no. 1, pp. 63-65, 2005.

5.       X. H. Yang, L. Shafai, “Multifrequency Operation Technique for Aperture Coupled Microstrip Antennas”Proc. Inst. Elect. Eng., 1994.

6.       K.P.Ray, G. Kumar, “Multi-frequency and broadband hybrid-coupled circular microstrip antennas”, Electronics Letters, vol. 33, no. 6, 1997.





K. Mathevan Pillai, G.Selvam, P.K.Kumaresan

Paper Title:

Continuous Time Markov Chains–An Optimization on Used Vehicle Sales

Abstract:    Using the basic properties involving the sojourn time and the transition rate between two states and the first passage time for a Continuous Time Markov Chain (CMTC) the applicability for optimizing the second sales used two wheelers in a showroom. Only the basic properties of the CTMC and the properties of rate matrix we are able to obtain a solution for maximum profit.

   Sojourn time, rate matrix, generator matrix, first passage time.


1.       D. Kennedy, Stochastic Financial models, CRC Press, Boca Rator, FL, 2010.
2.       V.G. Kulkarni, Modeling and Analysis of Stochastic Systems, CRC Press, London 2010.

3.       H.M. Taylor and S. Karlin, An introduction to Stochastic modeling, Academic Press, London, 1984.

4.       E.Parzer, Modern Probability Theory and its Applications, Wiley, New York, 1960.

5.       Afrait, S.N, Efficiency of production functions. International Economic Review, 1972

6.       Waldman, D.M, Properties of technical efficiency estimators in the stochastic      frontier model, Journal of Econometrics, 1984,

7.       Rajiv D. Banker, C.Hsihui and N.Ram, Estimating Data envelopment analysis technical and allocative inefficiency using aggregate cost or revenue data, Journal of Productivity Analysis, 2007,

8.       Kalirajan, K.P. and R.T. Shand, A generalized Measure of Technical Efficiency, Applied economics, 1985

9.       John Doyle and G.Rodney, Efficiency and Cross-efficiency in DEA: Derivations, Meanings and Uses, Journal of Operations Research Society, 1994

10.     Greene, W.H, A Gamma-distributed stochastic Frontier Model, Journal of Econometrics, 1990





Tejal Chauhan, Shraddha Singh, Sameena Zafar

Paper Title:

A New Technique for Artificial Bandwidth Extension of Speech Signal and its Performance Analysis

Abstract:    In current scenario of wireless communication system, quality of voice output is degraded due to its limited bandwidth (300-3400 Hz) and power constraints which in turn offers speech sounding muffled and thin. Recent wireless systems involved in transmission of speech demands evolution of efficient and effective methods for maintaining quality of speech, especially at the receiving end. In order to obtain toll quality of speech and high intelligibility cum naturalness in wireless systems, NB speech coders should be upgraded to its counterpart WB coders (50-7000Hz). For the effective utilization of WB speech communication in wireless media, it is indeed necessary to upgrade both end devices and network to be WB compatible which is costly and time consuming affairs. In the meantime some techniques have been developed to artificially extend bandwidth of NB speech to WB at receiver which leads to improvement in the quality of recovered speech. Amongst all elements of the communication system (channel, transmitter and receiver), quality and intelligibility of voice at receiver side majorly depend upon channel condition. Many techniques are adopted to mitigate the effect of the channel. In order to maintain quality and naturalness of voice at receiver side in various unpredictable channel conditions, AMR (Adaptive Multi Rate) NB is considered to be one of the obvious potential candidates. AMR NB is operated on various modes of bitrate between 4.75 and 12.2 kbps.  Depending upon the channel conditions, specific mode of operation is selected dynamically. For example, Low bit rate mode of operation is selected in bed channel conditions, that allows more error protection bits for channel coding and vice versa. Since inception, many speech coding techniques like CELP, ACELP and RPE-LTP are adopted in different applications in 2G and 3G. In this paper, implementation of ABWE algorithm is developed on CELP based GSM AMR 06.90 NB Coder using MATLAB simulation; further Subjective (MOS) and Objective (PESQ) analysis are carried out to judge the overall performance of developed coder. The evaluated results for both analyses clearly advocate that BWE coder offers significant improvement in recovered speech quality in comparison with legacy GSM AMR NB decoder.

   ABWE, AMR, CELP, GSM, Speech coding, Steganography, Subjective Analysis, Objective Analysis.


1.       P. Jax and P. Vary, ―Bandwidth extension of speech signals: A catalyst for the introduction of wideband speech coding?, IEEE Commun.Mag., vol. 44, no. 5, pp. 106–111, 2006.
2.       P. Jax and P. Vary, ―On artificial bandwidth extension of telephone speech, Signal Process., vol. 83, no. 8, pp. 1707–1719, 2003.

3.       Peter jax and Peter vary, ―An upper bound on the quality of artificial bandwidth extension of narrowband speech signals, in Proc. of ICASSP, vol. 1, Orlando, FL, USA, 2002, pp. 237–240.

4.       Eko Pryadi, Kuniwati Gandi, Herman Kanalebe. “Speech Compression Using CELP Speech Coding Technique In GSM AMR”, IEEE Conference, 2008A.

5.       Xiao Jianming, Li Xun, Wan Lei, “Software Simulation in GSM Environment of Federal Standard 1016 CELP Vocoder”, International Conference on Communication Technology, Oct. 22-24, 1998, Beijing, China

6.       ETSI, Channel coding (GSM 05.03 version 8.9.0 (2005-01), release 1999), pp. 12-19 & 98.

7.       D. Malkovic, ―Speech Coding Methods in Mobile Radio Communication Systems, 17th International Conference on Applied Electromagnetics and Communications, Oct-2003, Croatia.

8.       ITU-T 2000, ―Perceptual evaluation of speech quality (PESQ), and objective method for end-to-end speech quality assessment of narrowband telephone networks and speech codecs, ITU-T Rec. P. 862, 2001.

9.       K.Jarvinen “Standardization Of the Adaptive Multi Rate Codec”, IEEE     Conference 2000.

10.     Bernd Geiser and Peter Vary, ―Backward Compatible Telephony in Mobile Networks: CELP Watermarking & Bandwidth Extension, International Conference on Audio and Speech Signal Processing, 2007.

11.     Hannu Pulakka and Paavo Alku, “Bandwidth Extension of Telephone Speech Using a Neural Network and a Filter Bank Implementation for Highband Mel Spectrum” , IEEE traransactions on audio, speech, and language processing, vol. 19, no. 7, september 2011

12.     http://www.repository.voxforge1.org/downloads/SpeechCorpus/Trunk/ Audio/Original/16kHz_16bit/





Gaurav Govind Keswani

Paper Title:

Artificial Intelligence- Is Our Future Bright or Bleak

Abstract:    The paper reviews the meaning of artificial intelligence and its various advantages and disadvantages. It also considers the current progress of this technology in the real world and discusses the applications of AI in the fields of heavy industries, gaming, aviation, weather forecasting, expert systems and heuristic classification, with the focus being on expert systems. This is because Expert Systems are primarily being used for cyber defense as information stored in computers and in transit is facing increasing threats. It focuses on the concept, architecture and working of Expert Systems while also considering its work in other fields. The paper concludes by analyzing the future potential of Artificial Intelligence.

   Artificial Intelligence, Expert Systems, Heuristic Classifications.


1.      Song Ning and Ma Yan “Discussion on Research and Development of Artificial Intelligence”, Chongqing Normal University, China.
2.      Harpreet Kaur, “Artificial Intelligence: Bringing expert knowledge to computers”, Discovery Journal

3.      Mark Stamp “Information Security- Principles and Practise” pp 197-198

4.      Heuristic Classifications

5.      http:// www.formal.stanford.edu/jmc/whatisai/node3.html





Gajula RajyaLakshmi, CH.Phani Krishna,Vemu Samson Deva Kumar

Paper Title:

Commercial Statistics Management System

Abstract:    To maintain the statistical information of earnings, counters and parcel goods of different stations in Vijayawada division. It is also used to know the variance between different types of earnings during the particular time period by auto remainders”,  using J2EE technology.The project is used to maintain the minimum and desired amenity availability status and requirement according to station wise. It is also used to find the status of the work, work in progress through online using indicators.The project is used to enter the complaints from the passengers of different stations and to know the status of the complaints whether it is rectified or not through online according to station wise. It is also used to know the other stations list.The project is also used to know the commercial contracts information like parking publicity, pay and use, ATMs, retiring rooms and catering units according to station wise. It is also used to know the status of the contract. It is used to know the upward and downward trains details and timings in different stations particularly Vijayawada division. used to know the earnings of different categories like earnings , counters and parcel goods according to different stations. It is also used to know the variations between different time periods.This includes knowing the contracts information like parking, publicity, retiring rooms, catering units, etc according to station wise. It is used to know the progress of the work and schedule of the work through online. It is also used to know the catering details and performance in catering technology.

   commercial statistics, Sr. DCM, Amenities, work contracts, Earnings.


1.        Core Java™ 2 Volume I – Fundamentals 7th Edition-Cay S. Hortsman
2.        Pearson Education – Sun Microsystems Gary Cornell

3.        Core Java™ 2 Volume II – Advanced  - Cay S. Hortsman

4.        Pearson Education – Sun Microsystems Gary Cornell

5.        Head First Servlets & JSP               - Eric Freeman

6.        O’Reilly – SPD Elisabeth Freeman

7.        The Book of JavaScript 2nd Edition-Thau

8.        SPD               

9.        Effective Java – Programming Language Guide-Joshua Bloch
10.     Pearson Education – Sun Microsystems       

11.     Java Database Best Practices-George Reese

12.     O’Reilly – SPD              

13.     JBoss – A Developers Notebook-Norman Richards

14.     O’Reilly – SPD-Sam Griffith





Sasi. C, G.Mohan

Paper Title:

Performance Analysis of Grid Connected Wind Energy Conversion System with a PMSG during Fault Conditions

Abstract:    Wind energy, among all of the renewable energy sources, has made rapid developments and significant inroads in electrical power systems. With the increased use of wind energy conversion systems (WECSs), several technologies have been developed. Since WECSs are more cost competitive, the comparison of dierent wind generator systems is the need of the hour. Permanent magnet generators employing these technologies have some significant advantages over conventional generators, such as no need of excitation, low volume and weight, high precision, and deletion of the gearbox. The aim of the paper is to analyse the performance of grid connected wind energy conversion system with a permanent magnet synchronous generator during fault conditions. The model includes a PMSG model, a pitch-angled controlled wind turbine model, power electronic converters and a power system model. A phase to phase fault is simulated on 132 KV bus of power system model and the measured results obtained from grid connection of the permanent magnet synchronous generator are presented followed by some conclusions.

   Permanent Magnet Synchronous Generator, Power Electronic Converter.


1.       N. Yamamura, M. Ishida, T. Hori, “A simple wind power generating system with permanent magnet type synchronous generator”, Proceedings of IEEE International Conference on Power Electronics and Drive Systems, Vol. 2, pp.849-854, 1999.
2.       K. Tan, S.Islam, “Optimum Control strategies in energy conversion of PMSG wind turbine system without mechanical sensors” ,  IEEE Transactions on Energy Conversion, Vol. 19, pp. 392-399, 2004.

3.       B.S.Borowy, Z.M.Salameh, “Dynamic response of a stand-alone wind energy conversion system with battery energy storage to a wind gust”, IEEE Transactions on Energy Conversion, Vol. 12, pp. 73-78, 1997.

4.       A.B.Raju, K.Chatterjee, B.G.Fernandes, “A simple maximum power point tracker for grid connected variable speed wind energy conversion system with reduced switch count power converter”, IEEE Power Electronics Specialist Conference, Vol. 2, pp. 748-753, 2003.

5.       M.Chinchilla, S.Arnaltes, J.C.Burgos, “Control of permanent-magnet generators applied to variable-speed windenergy systems connected to the grid”, IEEE Transactions on Energy Conversion, Vol. 21, pp. 130-135, 2006.

6.       S.M.Barakati, M.Kazerani, J.D.Aplevich, “Maximum power tracking control for a wind turbine system including a matrix converter”, IEEE Transactions on Energy Conversion, Vol. 24, pp. 705-713, 2009.

7.       N.Yamamura, M.Ishida, T.Hori, “A simple wind power generating system with permanent magnet type synchronous generator”, IEEE International Conference on Power Electronics and Drive Systems, Vol. 2, pp. 849-854,1999.

8.       H.Polinder, F.F.A. Vander Pijl, G.J.Devilder, P.Tavner, “Comparison of direct-drive and geared generator concepts for wind turbines”, IEEE Transactions on Energy Conversion, Vol. 21, pp. 725-733, 2006.

9.       J.G. Slootweg, S. W. H. de Haan, H. Polinder, and W. L. Kling, “Aggregated Modelling of Wind Parks with Variable Speed Wind Turbines in Power System Dynamics Silulations”, in Proc. 14th Power Sys. Comp. Conf., Sevilla, Spain, Jun. 2002.

10.     Z. Ren, Z. Yin, W. Bao, “Control Strategy and Simulation of Permanent Magnet Synchronous Wind Power Generator”, International Conference on Energy and Environment Technology, Guilin, China, October 16-October 18, 2009, vol. 1, pp.568-571.

11.     Perdana, O.Carlson, and J.Persson, “Dynamic Response of Grid Connected Wind Turbine with Doubly Fed Induction Generator during Disturbances”, Nordic Workshop on Power Industrial Electron, Trondhemin,pp 1-7,2004.

12.     M.A.Mayosky, and G.I.E. Cancelo, “Adaptive Control o of Wind Energy Conversion System Using Radial Basis Neural Network”, Neural Network Proceeding, IEEE World Conference on Computational Intelligence, Vol. 2, 4-9,May 1998.

13.     Sasi.c and G.Mohan, “Power quality improvement of grid connected wind energy conversion system during transient fault”, International Journal on Energy Conversion, Vol. 1, No. 1, pp. 28-34, Jan 2013





Vishal R. Naik, V.K. Matawala

Paper Title:

Experimental Investigation of single phase Chevron Type Gasket Plate Heat Exchanger

Abstract:    corrugated plate heat exchangers have larger heat transfer surface area and increased turbulence level due to the corrugations. In this study, experimental heat transfer data will obtain for single phase flow (oil-to-water) configurations in a corrugated plate heat exchanger for different chevron angle plates. The effect of variation of chevron angles with other geometric parameter on the heat transfer coefficient will be study. Reynolds number ranging from 50 to 10000 and Prandtl number ranging from 3 to 75 will be taken for given experiment. Based on the experimental data, a correlation will estimate for Nusselt number as a function of Reynolds number, Prandtl number and chevron angle.

   Chevron angle, Corrugated plate heat exchangers, Heat transfer coefficient, Nusselt number, Prandtl number, Reynolds number, Single phase flow


1.       Ramesh K.Shah, D. P. (2003). “Fundamental of Heat Exchanger Design”. New Jersey: John Wiley& Sons.
2.       S. Kakac, H. Liu, “Heat Exchanger Selection, Rating and Thermal Design”. Second Edition, United State of America, CRC press, 2002.

3.       L.Wang, B. Sunden, R.M.Manglik.“ Plate heat exchangers Design, Application and Performance”. Billerica: United State of America, WIT Press, 2007.

4.       T. Kuppan. (2000), “Heat Exchanger Design Handbook”. New York: United State of America.

5.       Anthony Cooper and J. Dennis Usher,“ Heat Exchanger Design Handbook”. Hemisphere Publishing Corporation, 1983.Washington: United State of America.

6.       F. Akturk, G. Gulben, S. Aradag, N. Sezer Uzol, S. Kakac,  “Experimental investigation of the characteristics of a chevron type Gasketed plate heat exchanger”, 6th International Advanced Technologies Symposium (IATS’11), 16-18May2011, Elazıg, Turkey.pp.172-178.

7.       Masoud Asadi, Dr Ramin Haghighi Khoshkho, “Thermodynamical optimization a plate and frame heat exchanger for microturbine applications”, Journal of American Science 2012;8(9) (ISSN: 1545-1003).pp. 716-723.

8.       Prabhakara Rao Bobbili , Bengt Sunden, Sarit K. Das,“An experimental investigation of the port flow maldistribution in small and large plate package heat exchangers”, Applied Thermal Engineering 26 (2006).pp. 1919–1926.

9.       F.S.K.Warnakulasuriya, W.M. Worek, “Heat transfer and pressure drop properties of high viscous solutions in plate heat exchangers”, International Journal of Heat and Mass Transfer 51 (2008).pp.52–67.

10.     A Bhanu Prakash, B Sridhara Rao and Prof. R.C. Sastry, “Heat Recovery Studies of Process Fluids in Corrugated Plate Heat Exchangers”, International Conference on Chemical, Biological and Environment Sciences (ICCEBS'2011) Bangkok Dec., 2011.pp.324-328.

11.     Lieke Wang, Bengt Sunden, “Optimal design of plate heat exchangers with and without pressure drop specifications”, Applied Thermal Engineering 23 (2003).pp. 295–311.

12.     Mohammad S. Khan, Tariq S. Khan, Ming-C. Chyu, Zahid H. Ayub, “Experimental investigation of evaporation heat transfer and pressure drop of ammonia in a 30o chevron plate heat exchanger”, International Journal of refrigeration 35(2012).pp. 1757-1765.

13.     P.Naratarukasa, R.Ponpai,“ Thermal design Algorithm of three-stream plate and frame heat exchanger with two thermal communications”, The Journal of KMITNB.,vol.13,No.3,Jul-sep,2003.

14.     A.A. Fahmy, M.M. EL Fawal and B.M. Taher, “Prediction of Thickness and Fouling Rate in Plate Heat Exchanger of MTR Reactor”, Journal of American Science, 2012; 8(3) (ISSN: 1545-1003).pp. 377-383.

15.     Jorge A.W. Gut, J. M. Pinto, “Optimal configuration design for plate heat exchangers”, International Journal of Heat and Mass Transfer 47 (2004).pp. 4833–4848.

16.     Khan T.S., Khan M.S., Chyu Ming-C., Ayub Z.H.,(2010)“ Experimental investigation of single phase convective heat transfer coefficient in a corrugated plate heat exchanger for multiple plate configurations”, Applied Thermal Engineering 30 ,pp1058–1065.

17.     Lin J.H., Huang C.Y., Su C.C., 2007 Dimensional analysis for the heat transfer characteristics in the corrugated channels of plate heat exchangers, International Communications in Heat and Mass Transfer 34 ,pp 304–312.





G.Nagarjuna Reddy, MahendraVucha

Paper Title:

Design of Two Level DWT Architecture for Multimedia Applications

Abstract:    Images are to be transmitted without loss of information.  That can be achieved by transforming using Discrete Wavelet Transform (DWT). The discrete wavelet transform (DWT) is being increasingly used for image coding. This is due to the fact that DWT supports features like progressive image transmission (by quality, by resolution), ease of transformed image manipulation, region of interest coding, etc. Hence, there is a need of design efficient & fast architecture for DWT. This paper is introducing an efficient architecture to enhance speed of DWT Computation. The Discrete Wavelet Transform (DWT) is based on time-scale representation, which provides efficient multi-resolution. The introduced architecture increases levels of DWT architecture to achieve lower computational complexity and reduced memory. As the DWT traditionally been implemented by convolution which demands both a large number of computations and a large storage features that are not desirable for either high-speed or low-power applications. This paper describes Lossless 2-D DWT (Discrete Wavelet Transform) using Lifting Scheme Architecture to reduce computational overheads. The behavior of designed DWT architecture is modeled using the Verilog HDL and functionality could be verified using the Modelsim simulation tool.

   Discrete wavelet transform, very-large-scale integration (VLSI), folded architecture, single-input/single-output


1.       C. Christopoulos, A. Skodras, and T. Ebrahimi, “TheJPEG2000 Still Image Coding System: An Overview”IEEE Trans. Consumer Electronics, vol. 46,no. 4, pp.1103-1127, Nov. 2000.
2.       C. Chrysafis and A. Ortega, “Line-Based, Reduced Memory, Wavelet Image Compression,” IEEE Trans. Image  Processing., vol. 9, no. 3, pp. 378-389, Mar.2000.

3.       P. Wu and L. Chen, “An Efficient Architecture for Two-Dimensional Discrete Wavelet Transform,” IEEE Trans. Circuits and Systems for Video Technology, vol. 11, no. 4, pp. 536-545, Apr. 2001.

4.       Daubechies and W. Sweldens, “Factoring Wavelet Transforms intoLifting Steps,” J. Fourier Analysis and Applications, vol. 4, no. 3, pp. 247-269,1998.

5.       M. Grangetto, E. Magli, M. Martina, and G. Olmo, “Optimization and Implementation of the Integer Wavelet Transform for Image Coding,” IEEE Trans. Image Processing, vol. 11, no. 6, pp. 596-604, June 2002.

6.       H. Liao, M.K. Mandal, and B.F. Cockburn, “Efficient Architectures for 1Dand 2D Lifting-Based Wavelet Transform,” IEEE Trans. Signal Processing, vol. 52, no. 5, pp. 1315-1326, May 2004.

7.       C.T. Huang, P.C. Tseng, and L.G. Chen, “Flipping Structure: An Efficient VLSI Architecture for Lifting Based Discrete Wavelet Transform,” IEEE Trans. Signal Pr C.T. Huang, P.C. Tseng, and L.G. Chen, “Flipping Structure: An Efficient VLSI Architecture for Lifting Based Discrete Wavelet Transform,” IEEE Trans. Signal Processing, vol. 52, no. 4, pp. 1080-1089, Apr. 2004.

8.       T. Acharya and C. Chakrabarti, “A survey on lifting-based discrete wavelet transform architectures,” J. VLSI Signal Process., vol. 42, no. 3,pp. 321–339, Mar. 2006.

9.       C. Chakrabarti and M. Vishwanath, “Efficient realizations of discrete and continuous wavelet transforms: From single chip implementations to mapping on SIMD array computers,” IEEE Trans. Signal Process., vol. 43, no. 3, pp. 759–771, Mar. 1995.

10.     M. Vishwanath, R.M. Owens, and M. J. Irwin, “VLSI architectures for the discrete wavelet transform,”IEEE Trans. Circuits Syst. II, Analog Digit. Signal Process, vol.42, no. 5, pp. 305–316, May 1995.

11.     W. Jiang and A. Ortega,  “Lifting factorization-based discrete wavelet transform architecture design,”IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 5,pp. 651–657, May 2001.

12.     T. Acharya and C. Chakrabarti,   “A survey on lifting - based discrete wavelet transform architectures,” VLSI Signal Process., vol. 42, no. 3,pp. 321–339,  Mar 2006.

13.     Mahendra Vucha and Arvind Rajawat. “Design and FPGA Implementation of Systolic Array Architecture for Matrix Multiplication.”  International Journal of  Applications 26(3):18-22, July 2011.

14.     Prashant Gurjar, Rashmi Solanki, Pooja Kansliwal and Mahendra Vucha."VLSI implementation of adders for high speed ALU,"  India onference (INDICON),2011  Annual IEEE , vol., no., pp.1,6, 16-18 Dec. 2011





Vedgupt Saraf, D.S. Rao

Paper Title:

Devnagari Script Character Recognition Using Genetic Algorithm for Get Better Efficiency

Abstract:    Character recognition is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text. In India, more than 300 million people use Devanagari script for documentation. There has been a significant improvement in the research related to the recognition of printed as well as handwritten Devanagari text in the past few years. The problem arises in Devnagari script character recognition using quadratic classifier provides less correctness and less efficiency. For the answer of the above problem and for get better efficiency we use the genetic algorithm. It will give the better results from the above methods. The idea of genetic algorithm comes from the fact that it can be used as an outstanding means of combining various styles of writing a character and generates new styles. Closely observing the ability of human mind in the recognition of handwriting, we find that humans are able to recognize characters even though they might be seeing that style for the first time. This is possible because of their power to visualize parts of the known styles into the unknown character. We try to represent the same power into the machines.

   Handwritten Character Recognition, On-line and Off-line Character Recognition, Genetic Algorithms, Segmentation.


1.       Shabana Mehfuz1, Gauri Katiyar2, ”Intelligent Systems for Off-Line Handwritten Character Recognition: A Review  ”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 4, April 2012.
2.       Shabana Mehfuz1, Gauri Katiyar2, ”Intelligent Systems for Off-Line Handwritten Character Recognition: A Review  ”, International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 4, April 2012.

3.       Prof. Swapna Borde, Ms. Ekta Shah, Ms. Priti Rawat, MsVinaya Patil, “Fuzzy based handwritten character recognition system” , National Conference on
Emerging Trends in Engineering & Technology (VNCET-30 Mar’12)

4.       U. Pal1, N. Sharma1, T. Wakabayashi2 and F. Kimura2, “Off-Line Handwritten Character Recognition of Devnagari Script”, Ninth International Conference on Document Analysis and Recognition (ICDAR 2007).

5.       Rahul KALA1, Harsh VAZIRANI2, Anupam SHUKLA3 and Ritu TIWARI4,  “Offline Handwriting Recognition using Genetic Algorithm”, IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 2, No 1, March 2010.

6.       Nafiz Arica, Student Member, IEEE and Fatos T. Yarman-Vural, Senior Member, IEEE, “An Overview Of Character Recognition Focused On Off-line Handwriting”, Computer Engineering Department, Middle East Technical University, Ankara, Turkey, Manuscript received June21,1999.





A.Umarani, A.Asha, M.V.Vandhana, P.Nandhini, B.Dhivya

Paper Title:

Denoising of Medical Images Using Virtual Instrumentation

Abstract:    The medical image (CT angiographic images) we obtained from various devices is corrupted with noise. The obtained image needs processing before it can be used for any diagnosis. Low contrast and poor quality are the main problems in the production of medical images. Denoising is the process with which we reconstruct a signal from a noisy one.  Image denoising involves the manipulation of the image data to produce a visually high quality image. Good quality image should have a less CNR value when compared to SNR. Developing Image denoising algorithms is a difficult operation because fine details in a medical image embedding diagnostic information should not be destroyed during noise removal. In this paper a comparative study of different types of noises at different level are done. We have determined qualitative and quantitative analysis using Laboratory Virtual Instrumentation Engineering Workbench.

   Noises, Angiography, LabVIEW


1.        Denoising thesis by Saritha Dangeti.
2.        Multiple view image Denoising by Li Zhang, Sundeep Vaddadi , Hailin Jin and Shree K. Nayar.

3.        denoising of medical images using total Variational method by V N Prudhvi Raj1 and Dr T Venkateswarlu

4.        A comparison of the multiscale Retinex with other Image Enhancement Techniques by Zia- ur Rahman, Glenn A. Woodell and Daniel J. Jobson.

5.        An intelligent approach to image denoising by Tanzila Saba, Amjad Rehman and Ghazali Sulong

6.        A non-local algorithm for image denoising by Antoni Buades, Bartomeu Coll, Jean-Michel Morel





Thumil Vannan .P.S, S. Uvaraj

Paper Title:

Effective Data Retrieval System with Bloom in a Unstructured p2p Network

Abstract:    Bloomcast, an efficient and effective full-text retrieval scheme, in unstructured P2P networks. Bloomcast is effective because it guarantees perfect recall rate with high probability. It is efficient because the overall communication cost of full-text search is reduced below a formal bound. Furthermore casting bloom filters instead of raw data across the network. Bloomcast reduces the communication cost and storage cost for replication. Bloomcast replicates the items uniformly at random across the P2P networks, achieving a guaranteed recall at a communication cost of O(√N), where N is the size of the network. The main contribution of this proposal of Bloomcast design through both mathematical proof and comprehensive simulations.

   P2P O(√N),


1.        E. Cohen and S. Shenker, "Replication Strategies in Unstructured Peer-to-Peer Networks," Proc. ACM SIGCOMM '02. pp. 177-190, 2002.
2.        H. Shen, Y. Shu, and B. Yu, "Efficient Semantic-Based Content Search in P2P Network," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 813-826, July 2004

3.        R.A. Ferreira, M.K. Ramanathan, A. Awan, A. Grama, and S.Jagannathan, "Search with Probabilistic Guarantees in Unstructured Peer-to-Peer Networks," Proc. IEEE Fifth Int'l Conf. Peer to Peer Computing (P2P '05), pp. 165-172, 2005.

4.        S. Robertson, "Understanding Inverse Document Frequency: On Theoretical Arguments for IDF," J. Documentation, vol. 60, pp. 503- 520, 2004.

5.        P. Reynolds and A. Vahdat, "Efficient Peer-to-Peer Keyword Searching," Proc. ACM/IFIP/USENIX 2003 Int'l Conf. Middleware (Middleware '03), pp. 21-40, 2003.

6.        D. Li, J. Cao, X. Lu, and K. Chen, "Efficient Range Query Processing in Peer-to-Peer Systems," IEEE Trans. Knowledge and Data Eng., vol. 21, no. 1, pp. 78-91, Jan. 2008.

7.        I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H.Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. ACM SIGCOMM '01, pp. 149-160, 2001.

8.        J.P.C. Jie Lu, "Content-Based Retrieval in Hybrid Peer-to-Peer Networks," Proc. 12th Int'l Conf. Information and Knowledge Management (CIKM), pp. 199-206, 2003.

9.        E.M. Voorhees, "Overview of Trec-2009," Proc. 16th Text Retrieval Conf. (TREC-11), 2009.

10.     A. Broder and M. Mitzenmacher, "Network Applications of Bloom Filters: A Survey," Internet Math., vol. 1, no. 4, pp. 485-509, 2004.





Shrikrishan Yadav, Shailendra Singh, Dharmendra Dubey

Paper Title:

A To Z Applications of a Robot: A Study

Abstract:    Technology has been used to make nearly every aspect of our lives easier. In the future robot will play vital role in our daily life. There are many fields where a robot is ahead than the human in every manner. Robots are mainly used in industries as compare to other field. Factory mechanization is at present expected to improve productivity, quality and safety in the production industry, especially for functions depending on workers. By using robots in different types of technology such as sensing, measurement technology, control technology, mechanics technology, and to automate operations, the efficiency, reliability and performance can be increased of the system. Industry is one area where robots have typically been used over the years. Robots are the backbone of modern industries. Small companies are presently increasing their automation level to stay competitive. Typically, the service life of a robot is 15 years. Thus, making a onetime investment may help a firm to increase productivity as compare to human workers. In this paper we have discuss the different applications of a robot in different field of life.

   Assembling, Education, Entertainment, High Power Lines, Highways, Industry, Railways.


1.       www.wikipedia.org

2.       Handbook of Industrial Robotics, 2nd Edition, edited by Shimon Nof, 1998

3.       Idustrial robots by Sanjib Pohit

4.       Ravani, B., and West, T. (1991). Applications of Robotics and Automation in Highway Maintenance Operations. In Proceedings of 2nd International Conference on Applications of Advanced Technologies in Transportation Engineering (pp. 61-65)

5.       Anonymous (1986). Toward the ‘smart’ rail maintenance system. Railway Tract. Struct., 82 (11), pp 21-24.

6.       Ali, M., Puffer, R., and Roman, H. (1994). Evaluation of a multifingered robot hand for nuclear power plant operations and maintenance tasks (pp. MS94-217-1-10). Proceedings of the 5th World Conference on Robotics Research. Dearborn, MI: Robotics International of the Society of Manufacturing Engineers.

7.       Aracil, R., Penin, L., Ferre, M., Jimenez, L., Barrientos, A., Santamaria, A., Martinez, P., and Tudun, A. (1995). ROBTET: A New Teleoperated System for Live-Line Maintenance. Proceedings of the 7th International Conference on Transmission and Distribution Construction and Live Line Maintenance, Columbus, Ohio, pp 205-211.

8.       Birch, S. and Trego, L. E. (1995). Aircraft stripping and painting. Aerospace Engineering, 15, pp. 21-23.

9.       Dunlap, J. (1986). Robotic Maintenance of Overhead Transmission Lines. IEEE Transactions on Power Delivery, PWRD-1 (3), pp 280-284.

10.     Edahiro, K. (1985). Development of "underwater robot" cleaner for marine live growth in power station. In Teleoperated Robotics in Hostile Environments, by H. L. Martin and D. P. Kuban (eds.), (Robotics International of the Society of Manufacturing Engineers, Dearborn, MI), pp. 108-118.

11.     Najafi, F. T., and Naik, S.m. (1989). Potential Applications of Robotics in Transportation Engineering. Transportation Research Record, 1234, 64-73.





Das S.S., Bhanuse V.R., Dombale A.B.

Paper Title:

Abdominal Organ Segmentation Using Sparse Representation and Further Combining Graph Cuts an Oriented Active Appearance Models

Abstract:    Segmentation of abdominal 3-D organ segmentation (e.g.Liver) from volumetric images forms the basis for surgical planning required for living donor transplantations and tumor resections surgeries. This paper introduces a novel idea of using sparse representations of organ shapes in a learned structured dictionary to produce an accurate preliminary segmentation, which is further evolved based on a strategic combination of the active appearance model ,live wire, and graph cuts  for abdominal 3-D organ segmentation. The increased accuracy of the preliminary segmentation translates into faster convergence of the evolution step and highly accurate final segmentations.

   Segmentation, sparse representation, AAM, Graph cut.


1.       Medical Image Segmentation by Combining Graph Cuts and Oriented Active Appearance Models Xinjian Chen, Jayaram K. Udupa, Ulas Bagci, Ying Zhuge, and Jianhua Yao in IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 21, NO. 4, APRIL 2012.
2.       LIVER SEGMENTATION USING STRUCTURED SPARSE REPRESENTATIONS Vimal Singh† Dan Wang† Ahmed H. Tewfik† Bradley J. Erickson_† University of Texas, Austin, Texas, USA_ Mayo Clinic, Rochester, Minnesota, USA in 978-1-4673-0046-9/12/$26.00 ©2012 IEEE.

3.       ACM-Based Automatic Liver Segmentation from 3D CT Images by Combining Multiple Atlases and Improved Mean Shift Techniques by  Hongwei Ji*, Jiangping He, Xin Yang, Rudi Deklerck, and Jan Cornelis in IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE

4.       Automatic Segmentation of the Pulmonary Lobes From Chest CT Scans Based on   Fissures, Vessels, and Bronchi by  Bianca Lassen*, Eva M. van Rikxoort, Michael Schmidt, Sjoerd Kerkstra, Bram van Ginneken, and Jan-Martin Kuhnigk by  IEEE TRANSACTIONS ON MEDICAL IMAGING, VOL. 32, NO. 2, FEBRUARY 2013.

5.       Interactive Organ Segmentation using Graph Cuts by  Yuri Boykov and Marie-Pierre Jolly Imaging and Visualization Department Siemens Corporate Research 755 College Road East, Princeton, NJ 08540, USA yuri@csd.uwo.ca, jolly@scr.siemens.com in Proceedings of “MICCAI”-2000, LNCS 1935, pp.276-286.

6.       A 3D Live-Wire Segmentation Method for Volume Images Using Haptic Interaction by Filip Malmberg1, Erik Vidholm2, and Ingela Nystr¨om21 Centre for Image Analysis, Swedish University of Agricultural Sciences, Uppsala,Sweden 2 Centre for Image Analysis, Uppsala University, Uppsala, Sweden {filip, erik, ingela}@cb.uu.se by A. Kuba, L.G. Ny´ul, and K. Pal´agyi (Eds.): DGCI 2006, LNCS 4245, pp. 663–673, 2006. c_Springer-Verlag Berlin Heidelberg 2006

7.       Efficient interactive 3D Livewire segmentation of complex objects with arbitrary topology by Computerized Medical Imaging and Graphics 32 (2008) 639–650.

8.       Automatic Segmentation of the Pulmonary Lobes From Chest CT Scans Based on Fissures, Vessels, and Bronchi IEEE TRANSACTIONS ON MEDICAL IMAGING,VOL. 32, NO. 2, FEBRUARY 2013.

9.       Evaluating performance of image segmentation criteria and techniques by Received: 16 April 2012 / Accepted: 17 October 2012 © Springer-Verlag Berlin Heidelberg and EURO - The Association of European Operational Research Societies 2012.

10.     B. Gowreesunker and A. H. Tewfik, “A Novel Subspace Clustering Method for Dictionary Design,” in Independent Component Analysis and Signal Separation, vol. 5441 of Lecture Notes in Computer Science, pp. 34–41. Springer Berlin / Heidelberg, 2009.

11.     H. Ling, S.K. Zhou, Y. Zheng, B. Georgescu, M. Suehling, and D. Comaniciu, “Hierarchical, learning-based automatic liver segmentation,” in Computer Vision and Pattern Recognition, 2008. CVPR 2008. IEEE Conference on, June 2008, pp. 1 –8.

12.     J. M. Liu and J. K. Udupa, “Oriented active shape models,” IEEE Trans. Med. Imag., vol. 28, no. 4, pp. 571–584, Apr. 2009.

13.     S. C. Mitchell, J. G. Bosch, B. P. F. Lelieveldt, R. J. van der Geest, J. H. C. Reiber, and M. Sonka, “3-D active appearance models: Segmentation of cardiac MR and ultrasound images,” IEEE Trans. Med. Imag., vol. 21, no. 9, pp. 1167–1178, Sep. 2002.

14.     R. Susomboon, D. S. Raicu, and J. Furst, “A hybrid approach for liver segmentation,” in Proc. MICCAI Workshop 3-D Segmentation Clinic: A Grand Challenge, 2007, pp. 151–160.

15.     D. Tsai and N. Tanahashi, “Neural-network-based boundary detection of liver structure in CT images for 3D visualization,” in Proc. IEEE International Conference on Neural Networks, vol. 6, no. 1, 1994, pp. 3484–3489





Kilaru Kalyan, Shaik Avaes Mohsin, Angadi Suresh

Paper Title:

Transmission of Power through Wireless Systems

Abstract:    We cannot imagine the world without electric power. Generally the power is transmitted through wires. This paper describes an original idea to eradicate the hazardous usage of electrical wires which involve lot of confusion in particularly organizing them. Imagine a future in which wireless power transfer is feasible: cell phones, household robots, mp3 players, laptop computers and other portable electronics capable of charging themselves without ever being plugged in, freeing us from that final, ubiquitous power wire. Some of these devices might not even need their bulky batteries to operate. This paper includes the techniques of transmitting power without using wires with an efficiency of about 95% with non radiative methods. Due to which it does not affect the environment surrounding. These techniques Includes resonating inductive coupling in sustainable moderate range. The coupling consists of an inductor along with a capacitor with its own resonating frequency. In any system of coupled resonators there often exists a so-called “strongly coupled” regime of operation. If one ensures to operate in that regime in a given system, the energy transfer can be very efficient. Another technique includes transfer of power through microwaves using rectenna. This is particularly suitable for long range distances ranging kilometers. With this we can avoid the confusion and danger of having long, hazardous and tangled wiring. This paper as a whole gives an effective, high performance techniques which can efficiently transmit the power to the required area vary in given distances for the power transmission through induction.

   Induction, Power, Receiver, Short distance, Transmitter, Transmission, Wireless, Wires.


1.        B. Thomas W., "Wireless Transmission of Power now Possible”.
2.        U.S.Patent 787,412, "Art of Transmitting Electrical Energy through the Natural Mediums".

3.        Dombi J., (1982): Basic concepts for a theory of evaluation: The aggregative operator. European Jr. Operation Research 10, 282-293.

4.        Tesla, N., “The transmission of electric energy without wires”, Electrical World, March 5, 1904

5.        P. Vessen, “wireless Power transmission,” Leonardo energy; briefingpaper.

6.        A. Bomber, “Wireless Power Transmission: An Obscure History, Possibly a Bright Future”.

7.        “Wireless energy transfer” Wikimedia Foundation, Inc

8.        T21 World Global Trends (Accessed March 23, 2006) http://www.t21.ca/energy/index.html.





Prathamesh Dinkar, Abhishek Gulavani, Sourabh Ketkale, Pratik Kadam, Sheetal Dabhade

Paper Title:

Remote Health Monitoring using Wireless Body Area Network

Abstract:    A body area network is a wireless network of biomedical sensors that are attached to a human body. The aim of wireless body area network (WBAN) is to facilitate continuously recording and monitoring of a person’s health condition and transfer it over a long-distance communication network. A sensing system is to be worn by the individuals for a long duration. This limits the size of the battery. These factors have made energy the most critical resource in WBAN. The parameters sensed by the individual devices are to be transferred onto a mobile phone or a tablet via wireless network. This data is then gathered, stored and then sent to the doctor for continuous monitoring of the patient’s health condition. The doctor can thus access the patient’s health status on the go and this will help the patient to get immediate attention in life-threatening situations.

   Healthcare, Medical Server, Body Area Network (BAN), Remote Monitoring.


1.        Juric & A. Weaver, "Remote Medical Monitoring", IEEE Computer, PP96-99 April 2008
2.        R. Ashok and D. Agrawal, "Next Generation Wearable Networks", IEEE Computer, Vol. 36, PP31-9, Nov. 2003
3.        I.F.Akyildiz, W.Su, Y.Sankarsubramaniyam and E.Cargici, "Wireless Sensor Networks: A Survey", Computer Networks, Vol. 38, No. 4, PP393-422, 2002.
4.        K. Bilstrmp, "A Preliminary Study of Wireless Body Area Network", Tech. Report, IDE0854, University of Halmstad, Sweden, PP1-36, Aug. 2008
5.        D. Lewis, "Application in Body Area Network", Doc: IEEE P802.15-08-0407-00-0006-TG6, Nov. 2008
6.        World-Health-Organization
7.        International Diabetes Federation (IDF) [Online] http://www.idf.org/.





P.B. Alappanavar, Dhiraj Patil, Radhika Grover, Srishti Hunjan, Yuvraj Girnar

Paper Title:

An Ameliorated Approach towards Automating the Relational Database Normalization Process

Abstract:    In the field of database systems in general and relational systems in particular, database design problem is of utmost importance as it helps to decide on a suitable logical structure for a given data to be represented in a database and concentrates on the fact that which relations are needed and what their attributes should be. Designing a database is a complex task and the normalization theory is a useful aid in the design process. In this paper, a tool is presented which aims to handle the normalization process up to third normal form(3NF) and even imparts the normalized relations to its users in different formats. The objective of the system is to provide an effective and efficient e-Learning system to individuals to learn normalization in an easy and quick manner and an impeccable solution for organizations dealing with excessive data.

   Database, Database Management System, Functional Dependencies, Normalization, Relations, Relational Model.


1.       http://elm.eeng.dcu.ie/~ee221/EE221-DB-5.pdf
2.       http:///bccampus.pressbooks.com/dbdesign/chapter/chapter-11-functional-dependencies

3.       http://en.wikibooks.org/wiki/Relational_Database_Design/Normalization

4.       http://www.aliencoders.com/sites/default/files/normalization_resolved.pdf

5.       A Web Based Relational Database Design  Tool  to Perform  Normalization- Radhakrishna Vangipuram(Associate Professor of CSE), Raju velpula (Department  of  CSE),V.Sravya (Department  of CSE)-International Journal of Wisdom Based Computing, Vol.1(3), December 2011

6.       http://mytechnicalarticles.files.wordpress.com/2010/09/functional-dependencies-and-normalization-for-relation-databases.pdf

7.       An Introduction to Database Systems, Seventh Edition, C.J. Date

8.       http://toyhouse.cc/profiles/blogs/relational-database-design

9.       http://rdbms.opengrass.net/2_Database%20Design/2.1_TermsOfReference/2.1.2_Keys.html

10.     http://www.cs.miami.edu/~burt/learning/Csc598.073/notes/reldb.html

11.     http://www.cs.otago.ac.nz/cosc344/lectures/344-2012lect09.pdf

12.     Database Design and Relational Theory: Normal Forms and All That Jazz,  By Chris Date

13.     http://www2.yk.psu.edu/~lxn/IST_210/normal_form_definitions.html

14.     http://msdn.microsoft.com/en-us/library/vstudio/w0x726c2.aspx

15.     http://en.csharp-online.net/CSharp_Overview

16.     http://msdn.microsoft.com/en-us/library/vstudio/kx37x362.aspx

17.     http://www.codeproject.com/Articles/200028/Introduction-to-Microsoft-Silverlight

18.     http://www.businessdictionary.com/definition/methodology.html

19.     An integrated approach to software engineering, third edition, By P. Jalote

20.     http://www.upedu.org/references/bestprac/im_bp1.htm

21.     RDBNorma: - A semi-automated tool for relational database schema normalization up to third normal formby Y. V. Dongare, P. S. Dhabe and S. V. Deshmukh- International Journal of Database Management Systems (IJDMS), Vol.3, No.1, February 2011

22.     Thomas C and Carolyn B (2005), “Database Systems", Pearson, third edition.

23.     O’nell P and O’nell E (2001), “Database Principles Programming and Performance", Harcourt, second edition.

24.     Teorey T. J.(2002), Database Modeling and Design", Harcourt, third edition.

25.     http://coronet.iicm.tugraz.at/Dbase1/scripts/rdbh04.htm

26.     http://www.saprock.com/saas_cloud_computing.html





Jigar K. Sevalia, Nirav B. Siddhpura, Deep B. Shah, Jai V. Kapadia, Chetan S. Agrawal

Paper Title:

Performance Evaluation of Axially Loaded Element Using Bamboo as Reinforcement 

Abstract:    There is a long-standing tradition of Bamboo Construction, dating back many hundreds of years. Different cultures have found in this material an economical system of building, offering sound yet light and easily replaceable forms of shelter. Bamboo can be used to make all the components of small buildings, both structural and non-structural. It is, however, often used in conjunction with other materials, cost and availability permitting. This study represents the use of Bamboo as reinforcement in axially loaded cement concrete members. In this study, various surface treatments on bamboo have been used before using as reinforcement in axially loaded element. The various chemicals used are Araldite, Epoxy and Bitumen. The cage of Bamboo using Bamboo stirrups was prepared for reinforcing in cement concrete column element.

   Bamboo strips, Column, Compression Test, Cracks, Tensile test.


1.       Fikremariam Mengistu Assaminew, Investigation Of The Flexural And Bond Strengths Of Bamboo Using Different Splits (Forms) In Concrete Members, Addis Ababa University School Of Graduate Studies, 2010
2.       Khosrow Ghavami, Bamboo as Reinforcement In Structural Concrete Elements, Cement & Concrete Composites 27, 2005, 637–649.

3.       M.A.Salu and A.S. Sharu, Behaviour of Laterised concrete Columns Reinforce With Bamboo Strips, West Indian Journal of Engineering, Vol. 27, No 1, July 2004, pp 38-49.

4.       Musbau Ajibade Salau (2012), Characteristic Strength Of Concrete Column Reinforced With Bamboo Strips, Journal Of Sustainable Development Vol. 5, No. 1, 2012, 133-143.

5.       Md. Ashan Sabbir, Md. Shahid, Saiada Fuadi Fancy, Performance Evaluation Of Bamboo Twig As A Potential Reinforcement In Concrete Considering Tensile Property, International Journal of Engineering Research and Applications, Vol. 2, Issue 3, May-Jun 2012, pp.3205-3209

6.       Satjapan Leelatanon, Suthon Srivaro And Nirundorn Matan , Compressive Strength And Ductility Of Short Concrete Columns Reinforced By Bamboo, Songklanakarin J. Sci. Technol. 32 (4), 2010, 419-424.

7.       Youngsi Jung, Investigation of Bamboo as Reinforcement in Concrete, the University Of Texas, Arlington, 2006.





V.Umachitra, N.Chandrasekaran

Paper Title:

A  Fuzzy Logic Control Based Novel Fast Charging Scheme for Electric Vehicle with Hybrid Energy Storage System

Abstract:    Recently electric vehicles are gaining more attention. The major factor to be noted in the development of electric vehicle is the battery technology. Concerned with the battery, a fast charging scheme should be used. In this paper a novel fast charging scheme for the electric vehicle is proposed. Hybrid energy storage system which is a combination of battery and Super capacitor is used, and also online fuzzy logic controller is used for real time evaluation. Hybrid electric vehicles have a major focus in recent years and they have been made leaps and bounds in development. The major benefit of using Hybrid energy Storage System is that the life span of the batteries are extended also the charging time of the battery is greatly reduced. The Fuzzy Logic Controller keeps the State Of Charge within limits which also enhances the life time of the battery.

   Electric Vehicle (EV), Fuzzy Logic Controller (FLC), Hybrid Energy Storage System (HESS), State Of Charge (SOC)

1.        Fangcheng Liu, Jinjun Liu, Bin Zhang, Haodong Zhang (2012) "Fast Charging of Electric Vehicle (EV) Based on Hybrid Energy Storage System", Page(s):2115-2120.
2.        Fangcheng Liu?Jinjun Liu?Linyuan Zhou, "A Novel Control Strategy for Hybrid Energy Storage to relieve battery stress," Power Electronics for Distributed Generation Systems (PEDG), 2010 2nd IEEE International Symposium on, 2010, Page(s): 929 - 934.

3.        Garcia, F.S. Ferreira, A.A. Pomilio, J.A, "Control Strategy for Battery Super capacitor Hybrid Energy Storage System," Applied Power Electronics Conference and Exposition, 2009. APEC 2009. Twenty-Fourth Annual IEEE, 15-19 Feb. 2009, page(s): 826 - 832.

4.        Yu Zhang, Zhenhua Jiang, Xunwei Yu, "Control Strategies for Battery Super capacitor Hybrid Energy Storage Systems," Energy 2030 Conference, 2008. ENERGY 2008. IEEE, 17-18 Nov. 2008, page(s): 1-6.

5.        M. van Voorden, Laura M.Ramirez.Elizondo, Gerard.C.Paap, Jody.Verboomen and Lou.van.der.Sluis, "The Application of Super capacitors to relieve Battery-storage systems in Autonomous Renewable Energy Systems," Power Tech, 2007 IEEE Lausanne, 1-5 July 2007, page(s): 479 - 484.

6.        Divya. K.C, Ostergaard.Jacob, "Battery energy storage technology for power systems-an overview," Electric Power Systems Research, 2009, 79 (4) page(s): 511-520

7.        Khaligh, A, Zhihao Li, "Battery, Super capacitor, Fuel Cell, and Hybrid Energy Storage Systems for Electric, Hybrid Electric, Fuel Cell, and Plug-In Hybrid Electric Vehicles: State of the Art," Vehicular Technology, IEEE Transactions on Volume: 59 , 2010 , Page(s): 2806 - 2814

8.        Eric C. Darcy, "Investigation of the Response of NiMH Cells to Burp Charging," A Dissertation Presented to the Faculty of the Chemical Engineering - University of Houston, December 1998.

9.        C. C. Hua and M. Y. Lin, "A Study of Charging Control of Lead-Acid Battery for Electric Vehicles," International Symposium on Industrial Electmnies, lSlE 2000, pp.135-140.

10.     Y. C. Hsieh, C. S. Moo, C. K. Wu, J. C. cheng,"A non-dissipative reflex charging circuit," 25th IEEE International Telecommunications Energy Conference, INTELEC'03,Oct 2003, pp. 679 - 683.

11.     K. C. Tseng, T. J. Liang, J. F. Chen, M. T. Chang, "High Frequency Positive/Negative Pulse Charger with Power Factor Correction," Power Electronics Specialists Conference, IEEE, June 2002.

12.     Cheng P.H, and Chen C.L, "High efficiency and nondissippative fast charging strategy", IEE Proc., Electr. Power Appl., 2003, 150, (5), pp. 539-545.

13.     J.B. Wang, C.Y. Chuang, "Design considerations of microprocessor- controlled multiphase battery charger with fast-charging strategy," IET Electr. Power Appl. March 2007 Volume 1, Issue 2, p.143-152.

14.     Zhihong Yu, Donald Zinger, Anima Bose, "An innovative optimal power allocation strategy for fuel cell, battery and Super capacitor hybrid electric vehicle", Journal of Power Sources, Volume 196, Issue 4, 15 February 2011, Pages 2351-2359

15.     Timmermanns J.-M.; Zadora, P.; Cheng, Y.; Van Mierlo, J.; Lataire, "Modelling and design of super capacitors as peak power unit for hybrid electric  vehicles" Ph. Vehicle Power and Propulsion, 2005 IEEE Conference

16.     Breban, S.; Mollet, F.; Saudemont, C.; Robyns, B.; Radulescu, M.M. "Embedded electric power system with fuzzy-logic supervision for vehicular applications".Publication Year: 2012 , Page(s): 1575 - 1579

17.     Emadi, A. Khaligh and S. S. Williamson(2006), "Powerelectronics intensive solutions for advanced electric,hybrid electric, and fuel cell vehicular power systems,"IEEE Transactions on Power Electronics, vol. 21, no. 3,pp. 567-577.

18.     A. Emadi, K. Rajashekara, S. S. Williamson, and S. M.Lukic,(2005) "Topological overview of hybrid electric and fuel cell vehicular power system architectures and configurations," IEEE Transactions on VehicularTechnology, vol. 54, no. 3, pp. 763-770.

19.     A.Emadi,  F. Rodriguez,  J. Cao,   S. M. Lukic and R. C. Bansaland, (2008) "Energy storage systems for automotive applications," IEEE Transactions on Industrial Electronics, vol. 55, no. 6, pp. 2258-2267.

20.     A. C. Baisden and A. Emadi,(2004) "An ADVISOR based model of a battery and an ultra-capacitor energy source for hybrid electric vehicles," IEEE Transactions on Vehicular Technology, vol. 53, no. 1, pp. 199-205.

21.     Kempton W?Tomic J, "Vehicle-to-grid power implementation?from stabilizing the grid to supporting large-scale renewable energy," Journal of Power Sources?2005?144 (1) ?280-294





Rakhi Bhardwaj, Vikas Maral

Paper Title:

Dynamic Data Storage Auditing Services in  Cloud Computing

Abstract:    Cloud based data storage systems have many complexities regarding critical/confidential/sensitive data of client. The trust required on Cloud storage is so far had been limited by users. The role of the paper is to grow confidence in Users towards Cloud based data storage. The paper handles key questions of the User about how data is uploaded on Cloud, maintained on cloud so that there is no data loss; data is available to only authorized User(s) as per Client/User requirement and advanced concepts like data recovery on disaster is applied. In this paper we look at the various current researches being done to solve these issues, the current trends in securing, ensuring privacy and availability of these data on cloud storage services.General Terms Cloud computing, Security and Reliability.

   Storage, Data Availability, data storage auditing, data owner auditing, Privacy, and Security.


1.       Ayad Barsoum ,Anwar Hasan, Ontario, Canada ”Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems”  Digital Object Indentifier 0.1109/TPDS.2012.337 1045-9219/12/$31.00 © 2012 IEEE
2.       G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson,and D. Song, “Provable data possession at untrusted stores,” in Proceedings of the 14th ACM Conference on Computer and Communications Security, ser. CCS ’07, 2007, pp. 598–609.

3.       F. Seb´e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, “Efficient remote data possession checking in critical information infrastructures,” IEEE Trans. on Knowl. And Data Eng., vol. 20, no. 8, 2008.

4.       G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th International Conference on Security and Privacy in Communication Netowrks, 2008, pp. 1–10.

5.       C. Erway, A. K¨upc¸ ¨ u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009, pp. 213–222.

6.       Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Proceedings of the 14th European Conference on Research in Computer Security, 2009, pp. 355–370.

7.       Francesc Sebe´ , Josep Domingo-Ferrer, Antoni Martı´nez-Balleste, Yves Deswarte, Jean-Jacques Quisquater ‘Efficient Remote Data Possession Checking in Critical Information Infrastructures’, 1041-4347/08/$25.00 _ 2008 IEEE Published by the IEEE Computer Society

8.       Kan Yang • Xiaohua Jia” Data storage auditing service in cloud computing:challenges, methods and opportunities”, WorldWide Web (2012) 15:409–428 DOI 10.1007/s11280-011-0138-0

9.       Ayad F. Barsoum and M. Anwar Hasan “On Verifying Dynamic Multiple Data Copies over Cloud Servers”

10.     Amazon elastic compute cloud (Amazon EC2), http://aws.amazon.com/ec2/.

11.     Reza Curtmola, Osama Khan, Randal Burns, Giuseppe Ateniese” MR-PDP: Multiple-Replica Provable Data Possession”, 1063-6927/08 $25.00 © 2008 IEEE  DOI 10.1109/ICDCS.2008.68

12.     Raghul Mukundan, Sanjay Madria, Mark Linderman” Replicated Data Integrity Verification in Cloud”, IEEEcase number 88ABW-2012-6360

13.     Qian Wang, Student Member, IEEE, Cong Wang, Student Member, IEEE, Kui Ren, Member, IEEE,Wenjing Lou, Senior Member, IEEE, and Jin Li’Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing” 1939-1374/12/$31.00 _ 2012 IEEE Published by the IEEE Computer Society).

14.     Smitha Sundareswaran, Anna C. Squicciarini, Member, IEEE, and Dan Lin” Ensuring Distributed Accountability For Data Sharing in the Cloud”, 1545-5971/12/$31.00 _ 2012 IEEE Published by the IEEE Computer Society

15.     Kan Yang, Student Member, IEEE, Xiaohua Jia, Senior Member, IEEE” An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing “,Digital Object Identifier 10.1109/TPDS.2012.278 1045-9219/12/$31.00 © 2012 IEEE





Debanjan Mukherjee, Asim Kumar Jana, Malay Kumar Pandit

Paper Title:

Detailed Investigation on Power Conditioning Unit (PCU) using Intelligent Signal Processing

Abstract:     Harmonic in power line communication is an important matter now a days. With the extensive usage of non- linear loads in power systems, the harmonic effect becomes more prominent. Fast Fourier Transform (FFT) is one of the most popular computation algorithms for harmonic analysis. In this paper, single phase current waveform is taken from a three phase supply fed to motor through power analyzer interfaced with PC. FFT is done using matlab program on the imported data. After that, same waveform like the current waveform obtained from the hardware setup is designed in SIMULINK window of matlab7.5 version. Those designed waveforms are filtered by Recursive Least Square (RLS) Filter to reduce Total Harmonic Distortion (THD) in the filtered output and the response of Normalised Least Mean Square (NLMS) for same input signal is discussed in detail in author’s previous publication, given as reference. Adaptive signal processing to eliminate harmonics is replicated again in Code Composer Studio (CCS) using TMS320C6713 SIMULATOR .Here comparison is done between the responses of RLS filter with Normalised LMS filter. At last, the conclusion is drawn as NLMS filter is superior than RLS filter in the field of power line harmonic elimination to author’s best knowledge.

   RLS Filter NLMS Filter, FFT, SIMULINK, Total Harmonic Distortion (THD), TMS320C6713 SIMULATOR, CCS.


1.        TMS320C6713 DSK Technical Reference, 506735-0001 Rev.A, May,2003.
2.        S.Kumar,V.Joshi and V.Hiremath,”Real Time Harmonic Analysis Of Single Phase Supply Using TMS320C6713”in IEEE conference 2011 ,pp. 173-176.

3.        N. Gupta1, S. P. Singh, S. P. Dubey” DSP based adaptive hysteresis-band current controlled active filter for power quality conditioning under non-sinusoidal supply voltages” in International Journal of Engineering, Science and Technology Vol. 3, No. 4, 2011, pp. 236-252.

4.        Singh B. N., Singh, B., Chandra, A., Rastgoufard, P., and Al-Hadded, K., 2007. An improved control algorithm for active filters. IEEE Trans. on Power Delivery, Vol. 22, No. 2, pp. 1009-1020.

5.        V.K.Gupta, M.Chandra, S.N.Sharan, “Real Time Implementation Of Adaptive Noise Canceller”,International Conference On Sysmetics,Cybernetics and Informatics,pp.24-27.

6.        Simon Haykin , “Adaptive Filter Theory”, 4th ed., Pearson Education, Delhi, 2002.

7.        Ucar M., and Ozdemir, E., 2008. Control of a 3-phase 4-leg active power filter under non-ideal mains voltage condition. Electric Power System Research, Vol. 78, pp. 58-73.

8.        E. Acha and M. Madrigal, Power Systems Harmonics. West Sussex: John Wiley & Songs, Ltd, 2001.

9.        J. Arrillaga and N. R. Watson, Power System Harmonics. 2nd ed. Christchurch: John Wiley & Sons Ltd, 2003.

10.     A. Mehorai and B. Porat, “Adaptive comb filtering for harmonic signal enhancement,” IEEE Trans. Acoust. Speech Signal Processing, vol. ASSP-34, no. 5, pp. 1124–1138, Oct. 1986.

11.     G. Takata, et al., “The time-frequency analysis of the harmonics with wavelet transform for the power electronics systems,” in Proc. Power Conversion Conf., vol. 2, Apr. 2002, pp. 733–737.

12.     Y. Z. Liu and S. Chen, “A wavelet based model for on-line tracking of power system harmonics using Kalman filtering,” in Proc. IEEE Power Engineering Society Summer Meet., vol. 2, Jul. 2001, pp. 1237–1242.

13.     H. Xue and R. Yang, “A novel algorithm for harmonic measurement in power system,” in Proc. Int. Conf. PowerCon, vol. 1, Oct. 2002, pp. 438–442.

14.     M. Meunier and F. Brouaye, “Fourier transform, wavelets, Prony analysis: tools for harmonics and quality of power,” in Proc. 8th Int. Conf. Harmonics Quality Power, vol. 1, Oct. 1998, pp. 71–76.

15.     A.A. Girgis, The Fast Fourier Transform and Its Applications. Upper Saddle River, NJ: Prentice-Hall, 1990.

16.     A. N. Mortensen and G. L. Johnson, “A power system digital harmonic analyzer,” IEEE Trans. Instrum. Meas., vol. 37, no. 4, pp. 537–540, Dec. 1988.

17.     Ramesh Babu ,C. Durai ,“Digital Signal Processing”, Laxmi Publications, 2005.

18.     Proakis, “ Digital Signal Processing: Principles, Algorithms, And Applications”, 4/E.  Edition, 4, reprints, Pearson Education, 2007.

19.     Debanjan Mukherjee, Asim Kumar Jana, Malay Kumar Pandit ,” A Novel Power Conditioning Unit (PCU) using Adaptive Signal Processing for Low THD”, Volume-2, Issue-1, 62-68.,Oct-2012.





N. Abdul Rahim, Paulraj M P, A.H. Adom

Paper Title:

Heterogeneous Multi-Classifiers for Moving Vehicle Noise Classification using Bootstrap Method

Abstract:   In this paper, a simple system has been proposed to identify the type and distance of a moving vehicle using multi-classifier system (MCS). One-third octave filter bank approach has been used for extracting the significant feature from the noise emanated by the moving vehicle. The extracted features were associated with the type and distance of the moving vehicle and the heterogeneous multi-classifier system (HTMCS) based on multilayer Perceptron (MLP), K-nearest neighbor (KNN) and support vector machines (SVM) has been developed. Bootstrap sampling method based HTMCS was developed and the developed model has yielded a higher classification accuracy when compared to the individual base classifier models.

   Bootstrap, Heterogeneous, Moving Vehicle, Multi-Classifier System, One-Third-Octave


1.     W. Huadong, M. Siegel, and P. Khosla, "Vehicle sound signature recognition by frequency vector principal component analysis," in Instrumentation and Measurement Technology Conference, 1998. IMTC/98. Conference Proceedings. IEEE, 1998, pp. 429-434 vol.1.
2.     H. Maciejewski, J. Mazurkiewicz, K. Skowron, and T. Walkowiak, "Neural Networks for Vehicle Recognition," in Proceeding of the 6th International Conference on Microelectronics for Neural Networks, Evolutionary and Fuzzy Systems, 1997, p. 5.

3.     A. Averbuch, E. Hulata, V. Zheludev, and I. Kozlov, "A Wavelet Packet Algorithm for Classification and Detection of Moving Vehicles," Multidimensional Systems and Signal Processing, vol. 12, pp. 9-31, 2001.

4.     A. Averbuch, V. A. Zheludev, N. Rabin, and A. Schclar, "Wavelet-based acoustic detection of moving vehicles," Multidimensional Systems and Signal Processing, vol. 20, pp. 55-80, 2009.

5.     K. B. Eom, "Analysis of Acoustic Signatures from Moving Vehicles Using Time-Varying Autoregressive Models," Multidimensional Systems and Signal Processing, vol. 10, pp. 357-378, 1999.

6.     M. E. Munich, "Bayesian Subspace Methods for Acoustic Signature Recognition of Vehicles," in Proceeding of the 12th European Signal Processing Conference, 2004, pp. 1-4.

7.     L. Bing, A. Dibazar, and T. W. Berger, "Nonlinear Hebbian Learning for noise-independent vehicle sound recognition," in Neural Networks, 2008. IJCNN 2008. (IEEE World Congress on Computational Intelligence). IEEE International Joint Conference on, 2008, pp. 1336-1343.

8.     X. Hanguang, C. Congzhong, Y. Qianfei, L. Xinghua, and W. Yufeng, "A comparative study of feature extraction and classification methods for military vehicle type recognition using acoustic and seismic signals," in Proceedings of the intelligent computing 3rd international conference on Advanced intelligent computing theories and applications Qingdao, China: Springer-Verlag, 2007.

9.     N. A. Rahim, M. P. Paulraj, A. H. Adom, and S. S. Kumar, "Moving vehicle noise classification using multiple classifiers," in Research and Development (SCOReD), 2011 IEEE Student Conference on, pp. 105-110.

10.   N. A. Rahim, M. P. Paulraj, A. H. Adom, and S. Sundararaj, "Moving Vehicle Noise Classification using Backpropagation Algorithm," in 2010 6th International Colloquium on Signal Processing & Its Applications, 2010, p. 6.

11.   C. Couvreur, "Implementation of a One-Third-Octave Filter Bank in MATLAB," 1997, pp. 1-12.

12.   L. Kuncheva, Combining Pattern Classifiers: Methods and Algorithms: Wiley-Interscience, 2004.

13.   R. Romesh and P. Vasile, "Multi-Classifier Systems: Review and a roadmap for developers," Int. J. Hybrid Intell. Syst., vol. 3, pp. 35-61, 2006.

14.   I. Bonet, A. Rodríguez, R. Grau, M. García, Y. Saez, A. Nowé, A. Gelbukh, and E. Morales, "Comparing Distance Measures with Visual Methods MICAI 2008: Advances in Artificial Intelligence." vol. 5317: Springer Berlin / Heidelberg, 2008, pp. 90-99.

15.   D. S. Guru, Y. H. Sharath, and S. Manjunath, "Texture Features and KNN in Classification of Flower Images," IJCA,Special Issue on RTIPPR, vol. 1, pp. 21-29, 2010.

16.   C. Chih-Chung and L. Chih-Jen, "LIBSVM: A library for support vector machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, pp. 1-27, 2011.

17.   C.-W. Hsu, C.-C. Chang, and C.-J. Lin, "A Practical Guide to Support Vector Classification," 2010, pp. 1-16.

18.   R. S. Lodhi and S. K. Shrivastava, "Evaluation of Support Vector Machines Using Kernels for object detection in images," International Journal of Engineering Research and Applications (IJERA), vol. 2, pp. 269-273, 2012.

19.   H. Chih-Wei and L. Chih-Jen, "A comparison of methods for multiclass support vector machines," Neural Networks, IEEE Transactions on, vol. 13, pp. 415-425, 2002.

20.   C. Cortes and V. Vapnik, "Support-vector networks," Machine Learning, vol. 20, pp. 273-297, 1995.

21.   N. A. Rahim, M. N. Taib, A. H. Adom, and M. Y. Mashor, "The NARMAX Model for a DC Motor using MLP Neural Network," in Proceeding of the First International Conference 0n MAN-MACHINE SYSTEMS (ICoMMS), 2006, pp. 61-65.

22.   B. Efron and R. Tibshirani, An introduction to the bootstrap: Chapman & Hall/CRC, 1993.

23.   R. Polikar, "Ensemble based systems in decision making," Circuits and Systems Magazine, IEEE, vol. 6, pp. 21-45, 2006.

24.   L. Kuncheva, J. Bezdek, and R. Duin, "Decision templates for multiple classifier fusion: an experimental comparison," 2001.





Tarun Kumar Gautam, Neha Bajpai

Paper Title:

Reduction of Test Cases and Prioritization by using Weight Concept

Abstract:    Length and complexity of the software are rising day by day. So software testing is particularly difficult for development of high assurance software such as software that is produced commercial airborne system. Modified condition/Decision Condition (MC/DC) is an effective verification technique and can help to remove safety faults. This paper present new approach for test case reduction and prioritization that effectively use MC/DC criteria. In this approach we used weight concept for discarding weak test case and set priority.

   Test case reduction, Truth vector, Prioritization, Modified condition/Decision condition, coverage


1.       http://en.wikipedia.org/wiki/Modified_condition/decision_coverage
2.       Kelly J. Hayhurst, Dan S. Veerhusen, John J. Chilenski, Leanna K. Rierson, “A Practical Tutorial on Modified Condition Decision Coverage”.

3.       James A. Jones and Mary Jean Harrold, Member, IEEE Computer Society,” Test-Suite Reduction and Prioritization for Modified Condition/Decision Coverage”, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 29, NO. 3, MARCH 2003.
4.       Venezia Elodie,” White Box Coverage and Control Flow Graphs”, June 21, 2011

5.       Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, Fifth Edition, McGraw-Hill International Edition, New Delhi, 2001.

6.       Boris Beizer, “Black-Box Testing – Techniques for Functional Testing of Software and Systems”, John Wiley & Sons Inc., New York, 1995.

7.       http://www.bullseye.com/download.html

8.       “An Investigation of Three Forms of the Modified Condition Decision Coverage (MCDC) Criterion”, April 2001 Final Report, U.S. Department of Transportation Federal Aviation Administration





Taslim Shaikh, Ninad Sikchi, Seema Rajput

Paper Title:

TEST-JIG Card for Signal Conditioning Using DSPIC Microcontroller

Abstract:    In this paper we have presented an automated multichannel Data Acquisition System, which is used to provide a high resolution system and provides data regarding temperature, pressure, RPM and RTD calculation of system used for diesel engine. Test-Jig Card is used for this purpose. Test-Jig Card includes a microcontroller instead of a computer which work on very small voltage can even work on battery. It is very useful for all the application which is risky for humans to measure. It maintains high resolution and accurate measurement within the system. The DsPIC30F3013 microcontroller uses RS-485 communication protocol to dialog with other devices and other peripheral for remote application. The measurement for remote application is stored in controller or communicated to the communication protocol. The data is digitized with the help of RS485 communication protocol which is interfaced to microcontroller. The microcontroller takes the data verifies it, stores it, processes and displays it on LCD (Liquid Crystal Display). Here the user need not go to the place always at different time intervals. He does not always require a computer with him; this small system does a lot of job.

   DSPIC30F3013, Pressure, RPM, RTD, RS-485.


1.        Robert W. Lowdermilk,” Signal conditioning and Data collection in Synthetic    Instruments”, BAE SYSTEM- Mission solutions 1090 Technology.
2.        Najidah Humbali, Shahrizal Saat,” Automatic Detection Computer-based (ADCob) System for Temperature Measurement Calibration of RTD”,   26600 Pecan, Pahang, Malaysia

3.        Paul Horowitz, Winfield Hill “The art of electronics, second edition”

4.        www.microchip.com

5.        Microchip, “DSPIC30F3013 Datasheet”

6.        Analog Sensor Conditioning Circuits, Kumen Blake.

7.        PIC Assembly Language Programming for Complete Beginner,  Michael A. Covington, Artificial Intelligence Center, The University of Georgia Athens, Georgia





R. Naveeth Kumar, S.L.Hemanth Chakkaravarthy, K.B.Pradeep, C.J.Nirmal Kumar     

Paper Title:

Image Fusion Techniques and Fuzzy Logic Methods Using Virtual Instrumentation

Abstract:    The fundamentals of image process were laid over fifty years past, vital development  occurred principally within the last twenty five years with the entrance of personal computers and today's issues area unit already very subtle and fast. This paper deals with the study of the employment of fuzzy logic ways and image fusion for image processing in LabVIEW.In this we developed a fuzzy edge detector and image fusion using various transformation.The tools for quality management is applicable in biomedical image processing field, jewelry field,satellite field.

   DWT, Image Denoising, fuzzy logic, labVIEW.


1.        Laure J Chipman & Timothy M Orr, (1995) “Wavelets And Image Fusion”, Proceedings Of   SPIE, Vol. 2569, No. 208, Pp248-251.
2.        CANNY, J.A.Computational Approach To Edge Detection. IEEE Transactions On Pattern Analysis And Machine Intelligence. 1986, P. 679-698, [Cit. 2011-11-05]. ISSN 0162-8828

3.        SONKA, M., V. HLAVAC And R. BOYLE. Image Processing, Analysis, And Machine Vision. Toronto: Thomson Learning, 2008 [Cit. 2011-11-05].

4.        Krista Amolins & Yun Zhang, Peter Dare, (2007) “Wavelet Based Image Fusion Techniques – An Introduction, Review And Comparison”, ISPRS Journal Of Photogrammetry & Remote Sensing, Vol. 62, No. 4, Pp249–263.

5.        CINTULA, P. From Fuzzy Logic To Fuzzy Mathematics. FJFI CVUT Praha, 2004 [Cit. 2011-11-05].

6.        Gonzales C. Rafael, Woods E. Richard, “Digital Image Processing”, 1998, Second Edition, Prentice Hall Publications, Pp.519-560


8.        Maruthi R & Sankarasubramanian K, (2008) “Pixel Level Multifocus Image Fusion Based On Fuzzy Logic Approach”, Asian Journal Of Information Technology, Vol 7, No.4, Pp168-171..





Janakinandan Nookala, Prudhvi Gogineni, Suresh Babu G

Paper Title:

Kinematic Analysis of 3 D.O.F of Robot

Abstract:    The study of motion can be divided into kinematics and dynamics. Direct kinematics refers to the calculation of end effectors position, orientation, velocity, and acceleration when the corresponding joint values are known. Inverse refers to the opposite case in which required joint values are calculated for given end effector values, as done in path planning. Some special aspects of kinematics include handling of redundancy collision avoidance, and singularity avoidance. Once all relevant positions, velocities, and accelerations have been calculated using kinematics, this information can be used to improve the control algorithms of a robot. Most of the industrial robots are described geometrically by their Denavit-Hartenberg (DH) parameters, which are also difficult to perceive for students. Students will find the subject easier to learn if they are able to visualize in 3 dimensions. Tools that aid its learning have been developed by universities across the world as referred elsewhere. This project proposes RoboAnalyzer, a 3D model based software that can be used to teach robotics subjects to undergraduate and postgraduate courses in engineering colleges in India and elsewhere. In the present implementation, it can be used to learn DH parameters, forward kinematics of serial robots with revolute joints and allows 3D animation and graph plots as outputs.

   (DH), 3D.


1.       Angles, J, 2003, Fundamentals of Robotics Mechanical Systems, Springer-verlag, NY.
2.       Introduction to Robotics, S K Saha, 2009.

3.       Denavit and Hartenberg, R.S,1995, A Kinematic Notations for lower pair mechanisms based on matrices

4.       Robo Analyzer,(http://www.roboanlyzer.com)

5.       Mat Works,(http://www.mathworks.com)

6.       International Conference of Multibody Dynamics ICMBD-2011, Vijayawada,India

7.       Peter I.corke, Dec.2008, Robotics tool box for matlab.

8.       RRR-robot: design of an industrial like test facility for nonlinear robot control, A.M. Van Beek Eindhoven University of Technology(TUE)

9.       ROBOT KINEMATICS- Vaclav Hlavac, Czech Technical University, Faculty of Electrical Engineering Department of Cybernetics.





Priyanka, Vijay Kumar Bohat

Paper Title:

Detection of SQL Injection Attack and Various Prevention Strategies

Abstract:    The internet is a demanding technology which is working its way into all aspects of our civilization. So security is the main critical part in our daily life. The requirements of information security and website security within an organization have undergone several changes in the last several decades. Security is a broad topic and covers a multitude of sins. This paper is written with the basic programmer and information security expert, explaining the concepts which are needed to read through the hype in the market place and understand the risks and how to deal with them. We go on to consider risk management, network threats, firewalls, protection from SQL Injection. SQL Injection is a web attack mechanisms which is being used by hackers to misuse the data of that website. It is hoped that this paper will help the reader to provide a wider perspective on security and better understand how to handle and manage risk related to security issues of website personally at client–end and at server-end.

   SQL Injection; SQL Injection prevention; SQL Injection detection; website security.


1.       A Tajpour, A., Masrom, M., Heydari, M.Z., and Ibrahim, S., SQL injection detection and prevention tools assessment. Proc. 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT’10) 9-11 July (2010), 518-522
2.       Khaleel Ahmad, Jayant Shekharand, K.P. Yadav(2010),” Classification of SQL Injection Attacks” VSRD technical and non-technical journal

3.       Shubham Shrivastava, Rajeev Ranjan Kumar Tripathi, Attacks Due to SQL injection & their Prevention Method for Web-Application, International Journal of Computer Sciecne and information technologies, Vol 3 (2), pp.3615-3618, 2012.

4.       Chad Dougherty (2012) “Practical Identification of SQL Injection Vulnerabilities” United States Computer Emergency Readiness Team (US-CERT October 25, 2012)

5.       Parveen Kumar (2013)  “The Multi-Tier Architecture for Developing Secure Website with Detection and Prevention of SQL-Injection Attacks”  International Journal of Computer Applications (0975 – 8887)Volume 62– No.9, January 2013

6.       https://www.owasp.org/index.php/SQL_Injection

7.       http://www.imperva.com/docs/hii_monitoring_hacker_forums_2012.pdf

8.       http://www.acunetix.com/websitesecurity/sql-injection/

9.       http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2012-ebk_en_xg.pdf

10.     http://www.imperva.com/docs/hii_monitoring_hacker_forums_2012.pdf





T.R. Mohod, R.T. Saudagar, P.R. Ingole, A.M. Choube

Paper Title:

Design Parameters of Pulsating/Oscillating Heat Pipe: A Review

Abstract:    Closed loop pulsating heat pipe is a small heat transfer device especially suited for thermal management of electronic application .The unique feature of CLPHP compared with conventional heat pipe is that, there is no wick structure to return the condensate to the evaporator section, thus there is no counter flow between the liquid and the vapour .This paper reviews an influence of various design parameter and operational orientation on a PHP/OHP. This paper attempt theoretical and experimental investigation and scrutinized that internal diameter of tube and orientation numbers of turn’s evaporator length, adiabatic length affect the performance of PHP/OHP. A filling ratio of 50% of its total volume is optimum.



1.        Moore.g, 1965, Cramming More components onto Integerated Circuits, Electronics, 1965 38(8).
2.        G.Smyrnov, US Patent number 6672373B2 ,2004

3.        H. Akachi, US Patent, Patent Number 4921041, 1990.

4.        S.khandekar, Manfred. Groll and Vivak Luckchoura,"An introduction to pulsating heat pipes" Electronic cooling volume 9, no2 May 2003.

5.        S.Khandekar and Manfred .G, "Pullsating heat pipe:Attractive entrants in the family of closed passive two- phase systems"Journal of Energy and MassTransfer,Vol.26, , March-December 2004  pp99-115.

6.        Manfred Groll, S.Khandekar, "Pulsating heat pipe:A chllanged and still unsolved problem in het pipe science" The third international conference on transport Phenomena in multiphase system 2002.

7.        S.Khandekar, M.Schneider, P.Schafer, R.Klenovic & M.Groll "Thermofluid Dynamic Study of Flat-Plate Closed Loop Pulsating Heat Pipe".Microscale thermophysical engineering, 2002 66:303-317.

8.        P. Charoensawan, S. Khandekar, Manfred Groll, and Pradit Terdtoon "Closed loop pulsating heat pipes Part A: parametric experimental investigations". Applied Thermal Engineering 23 (2003) 2009-2020.

9.        Honghai Yang, S. Khandekar, M. Groll, "Operational limit of closed loop pulsating heat pipes", Applied Thermal Engineering 28 (2008) 49-59          

10.     P. Meena, S. Rittidech and P. Tammasaeng "Effect of Inner Diameter and Inclination Angles on Operation Limit of Closed-Loop Oscillating Heat-Pipes with Check Valves" American J. of Engineering and Applied Sciences 2008 1 (2): 100-103.

11.     S. Rittidech P. Meena and P. Terdtoon, "Effect of Evaporator Lengths and Ratio of Check Valves to Number of Turns on Internal Flow Patterns of a Closed-Loop Oscillating Heat-Pipe With Check Valves" American Journal of Applied Sciences 5 (3): 184-188, 2008 ISSN 1546-9239.

12.     P. Meena, S. Rittidech and P. Tammasaeng, "Effect of Evaporator Section Lengths and Working Fluids on Operational Limit of Closed Loop Oscillating Heat Pipes with Check Valves (CLOHP/CV)" American Journal of Applied Sciences , 2009 6 (1): 133-136 ISSN 1546-9239

13.     Stéphane Lips Ahlem Bensalem, Yves Bertin, Vincent Ayel, Cyril Romestant, Jocelyn Bonjour "Experimental evidences of distinct heat transfer regimes in pulsating heat pipes (PHP)" Applied Thermal Engineering 30 (2010) 900-907. 

14.     N. Panyoyai, P. Terdtoon and P. Sakulchangsatjatai, "Effects of Aspect Ratios and Number of Meandering Turns on Performance Limit of an Inclined Closed-Loop Oscillating Heat Pipe" Energy Research Journal 2010 1 (2): 91-95.

15.     P. Sakulchangsatjatai, P. Pathike and P. Terdtoon, "Effect of Length Ratios on Heat Transfer Characteristics of Closed-Loop Oscillating Heat Pipe with Non-Uniform Diameter" Energy Research Journal 1 (2): 2010, 171-175, ISSN 1949-0151.





P.Maruthurkarasi (alias) Rohini, C.Jayaprakash, R.Balaji Ganesh

Paper Title:

Reliability Enhancement from http Log Files In Composite Web Services

Abstract:    A Hybrid Reliability Model based on log analyzer is designed to evaluate the Reliability of Composite Web Services. Based on Dependability, Atomic Web Services are composed with a Central Co-ordination Function (Broker). Real Time Server Log Files are fed as input to the system. Log Analyzer reads the log entries and separates the individual response of the server along with the time stamps. Base on the Frequency of the service response are classified and the Error Rate is calculated by the difference in the Uptime and Downtime Stamps. The Broker designs and decides the acceptance of the service based on Error Rate (MTBF, MTTF, MTTR) and Fault Tolerance. As, the Error Rate and Service Reliability are inversely proportional, the server with low error rate provides high reliability. Our Experimental Results with their groupings prove that the reliability can be evaluated using the Web Log File analysis.

   Composite Web Services, Error log, HTTP Status Error, Reliability, Web error.


1.       H. Elfawal Mansour, Member, IEEE, and T. Dillon,Member, IEEE,  “Dependability and Rollback Recovery For Composite Web Services”.IEEE Transaction On Services Computing, VOL.4, No.4.3, October-December 2011.
2.       Hirokazu Ozaki, Member, IEEE, and Atsushi Kara, Member, IEEE, “Reliability Analysis of  M -for-N Shared Protection System With General Repair-Time Distributions”.IEEE Transaction On Reliability, VOL. 60, NO. 3, September  2011.

3.       Miao Jiang, Member, IEEE, Mohammad A. Munawar, Member, IEEE, Thomas Reidemeister, Member, IEEE, And Paul A.S. Ward, Member, IEEE.” System Monitoring with Metric Correlation Models.” IEEE Transaction on Network and Service Management”, VOL. 8, NO. 4, December 2011.

4.       Fatemeh Borran, Martin Hutle, Nuno Santos, and Andre Schiper, Member, IEEE, “Quantitative Analysis of Consensus Algorithms”, IEEE  Transaction On Dependable And  Secure Computing VOL. 9, NO. 2, March/April[ 2012.

5.       Zheng Z, Lyu MR (2010) Collaborative reliability prediction of service-oriented systems. ICSE c610, May 2–8 2010, Cape Town, South Africa Copyright 2010 ACM 978-1-60558-719-6/10/05.





Ritesh Jain, Suraiya Parveen

Paper Title:

Analysis of Different Wavelets by Correlation

Abstract:    In today’s world, speech is an integral part of digital communication. The removal of noise in analog and digital communication has been a daunting task for many years. Noise is an unwanted signal that hinders communication. There are various methods to help restore a speech from noisy distortions. Wavelets have by now established themselves to be an invaluable accumulation to the analyst’s compilation of tools and go on to enjoy a rapidly increasing recognition in their brief account of the signal processing field. Wavelet analysis is competent of enlightening aspects of data that other signal study techniques miss. In addition, it affords a diverse view of data than those obtainable by conventional techniques. Wavelet analysis can often compress or de-noise a signal without appreciable degradation. Study in the field of Wavelets has shown that Wavelet decomposition is a capable method as other methods of denoising. In this paper, the author compares the performances of Daubechies, Coiflet and Symlet Wavelets for different values of their order for an audio signal. Further, the variation of threshold values with correlation has been investigated.

   Noise, Daubechies


1.       Amara Graps. An introduction to Wavelets. IEEE Computational Science and Engineering, Summer 1995,vol. 2, num. 2, published by the IEEE Computer Society, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720, USA.
2.       R.J.E. Merry, Prof. Dr. Ir. M. Steinbuch, Dr. Ir. M.J.G. van de Molengraft. Wavelet Theory and Applications -A literature study, DCT 2005.53.

3.       Florian Luisiera, Thierry Blua, Brigitte Forsterb and Michael Unsera a Biomedical Imaging Group (BIG), Ecole Polytechnique F´ed´erale de Lausanne (EPFL), Lausanne, Switzerland Centre for Mathematical Sciences, Munich University of Technology (TUM), Munich,Germany. Which Wavelet bases are the best for image denoising ?

4.       A. K. Verma, Neema Verma. A Comparative Performance Analysis of Wavelets in Denoising of Speech Signals, National Conference on Advancement of Technologies – Information Systems & Computer Networks (ISCON – 2012) Proceedings published in International Journal of Computer Applications® (IJCA).

5.       Nathaniel A. Whitmal, Janet C.Rutledge, and Jonathan Cohen2.Reducing Correlated Noise in Digital Hearing Aids.

6.       Adrian E. Villanueva- Luna1, Alberto Jaramillo-Nuñez1,Daniel Sanchez-Lucero1, Carlos M. Ortiz-Lima1,J. Gabriel Aguilar-Soto1, Aaron Flores-Gil2 and Manuel May-Alarcon2.. De-Noising Audio Signals Using MATLAB Wavelets Toolbox

7.       Dr. Parvinder Singh, Dinesh Singh, Deepak Seth. Reduction of Noise from Speech Signal using Haar and Biorthogonal Wavelet, ISSN: 2230-7109(,IJECT Vol. 2, ISSN : 2230-7109(Online) | ISSN : 2230-9543(Print) Issue 3, Sept. 2011.
8.       Sofia Ben Jebara, Research Unit TECHTRA Ecole Sup´erieure des Communications de Tunis Route de Raoued 3.5 Km, Cit´e El Ghazala, 2083, Ariana, Tunisia. Peridoc/Aperiodic Decomposition And Wavelet Transform for Noise Reduction Is Oesophageal Speech.M. Young, The Techincal Writers Handbook. Mill Valley, CA: University Science, 1989.

9.       Michel Misiti, Yves Misiti, Georges Oppenheim, Jean-Michel Poggi. Wavelet Toolbox for use with matlab.

10.     Rajeev Aggarwal, Sanjay Rathore, Jai Karan Singh, Mukesh Tiwari, Vijay Kumar Gupta, Dr. Anubhuti Khare. Noise Reduction of Speech Signal using Wavelet Transform with Modified Universal Threshold, International Journal of Computer Applications (0975 – 8887) Volume 20– No.5, April 2011

11.     Bahoura M & Rouat J, (2006). Wavelet speech enhancement based on time–scaleadaptatio,SpeechCommunicationVol.48,No.12,pp:1620-16 37. ISSN: 0167-6393.

12.     Rajeev Aggarwal, Jay Karan Singh, Vijay Kr. Gupta and Dr. Anubhuti Khare. Elimination of White Noise from Speech Signal Using Wavelet TransformBy Soft and Hard Thresholding, VSRD-IJEECE, Vol. 1 (2), 2011, 62-71.

13.     Davis, G, M, (2002). „Noise Reduction in Speech Applications, CRC Press LLC, ISBN 0-8493-0949-2, USA.

14.     Dong E & Pu X. (2008). Speech denoising based on perceptual weighting filter, Proceedings of 9th IEE International Conference on Signal Processing, pp: 705-708, October 26-29, Beijing. Print ISBN: 978-1-4244-2178-7.

15.     Gold, B. & Morgan, N. (1999) Speech and audio signal processing: processing and perception of speech, and music, John Wiley & Sons, INC., ISBN: 0-471-35154-7, New York, USA.

16.     Johnson M. T, Yuan X and Ren Y, (2007). Speech Signal Enhancement through Adaptive Wavelet Thresholding, Speech Communications, Vol. 49, No. 2, pp: 123-133, ISSN: 0167-6393.

17.     Képesia M & Weruaga L. (2006). Adaptive chirp-based time–frequency analysis of speech signals, Speech Communication, Vol. 48, No. 5, pp: 474-492. ISSN: 0167-6393

18.     Li N & Zhou M. (2008). Audio Denoising Algorithm Based on Adaptive Wavelet Soft-Threshold of Gain Factor and Teager Energy Operator, Proceedings of IEEE International Conference on Computer Science and Software Engineering, Vol. 1,pp: 787-790. Print ISBN: 978-0-7695-3336-0.

19.     Ioana Adam, Alexandru Isar, Jean-Marc Boucher. Complex Wavelet Transform: Application to denoising, Thesis, Politehnica University of Timisoara Universite DE RENNES 1, PhD thesis.

20.     McLaughlin I (2009). Applied Speech and Audio Processing With MATLAB Examples, Cambridge University Press, ISBN-13 978-0-521-51954-0, UK.

21.     Minkoff, J. (2002). Signal Processing Fundamentals and Applications for Communications and Sensing Systems, ARTECH HOUSE, INC., ISBN 1-58053-360-4, USA.

22.     Roopali Goel,Ritesh Jain.Speech Signal Noise Reduction by Wavelets. International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN-2278-3075, Volume-2, Issue-4, March 2013.





Vikas Pardesi, N. S. Raghava

Paper Title:

A Two Layer Approach to Image Authentication and Encryption through ECC & Voice Features (MFCC, Pitch Value)

Abstract:    Speech Processing is an area in which we can find such unique features (Mel Frequency Cepstrum Coefficients, Pitch value, zero crossing rates etc.) in voice segment for recognition of any individual and pre-processing for further synthesis. In this paper we are presenting a simplified approach to image authentication with MFCC (Mel Frequency Cepstrum Coefficients) and Pitch Value and image Encryption through Elliptic Curve Cryptography. Because of ECC great advantages (small key size, no solution to discrete logarithmic problem, less time consuming encryption,  infinite time taken for brute force attack) for handheld,  portable devices. Applying MFCC and Pitch information with various methods on various encrypted images which is encrypted by Elliptic Curve Cryptography and at the receiver side we do reverse process of this approach for authentication and decryption of image .With this approach we can authenticate an image through voice segment which is advantageous because speech is a natural way to interact with people, Not required to sit and work with a keyboard and finally no specific training is required for end users.

   Elliptic curve cryptography, MFCC, Pitch value, public key cryptography, Speech Processing


1.        William Stallings,”Cryptography & Network Security”, Printce Hall, 5th Edition.
2.        Alessandro Cilardo, Luigi coppolino,  Nicola Mazocca, and Luigi Roman, “Elliptical Curve Cryptography Engineering”, Proceedings of the IEEE, vol. 94, no 9, pp. 395-406, Feb. 2006 .

3.        “SpeechProcessing”,dea.brunel.ac.uk/cmsp/home…/chapter13-speech%20processing.pdf.

4.        en.wikipedia.org/wiki/Speech_processing.

5.        G. Khare, M. Kulkarni,  “Generation of excitation signal in voice excited linear predictive coding using discrete cosine transform”, TENCON 2005, IEEE region 10, page 1-4.

6.        S.S. Upadhyay , “Pitch detection in time and frequency domain”, ICCICT 2012,IEEE, page 1-5.

7.        Adam J. Albirt, “Understanding & Applied Cryptography and Data Security” CRC press, Pearson

8.        G. Malherpe, O. Mesde and H. Riz, “Acoustic synthesis and methodology for improving cochlear implant speech processing techniques”, Proc. Of the 25th annual international conference of IEEE EMBS, 2003

9.        H.Nagahama, Y.Miyanaga and N.Ohtsuki, ”An adaptive speech analysis for speech recognition system”, Proc. Of IEEE ISPACS 1999, pp.745-748, Dec. 1999.

10.     N. Kolbitz, Elliptic Curve Cryptosystems, Mathematics of Computation, vol.48, 1987, pp.203-209.

11.     Certicom website http://www.certicom.com/index.php? action =ecc_tutorial, home.

12.     Rafael C. Gonzalez, “Digital Image Processing”, Third Edition.

13.     http://en.wikipedia.org/wiki/Mel_scale

14.     http://en.wikipedia.org/wiki/FFT

15.     H. Teffahi, “Relationship between control parameters and outputs in the two massmodel of vocal cords”, ICMCS , 2011 IEEE page 1-5.

16.     H.Hoge “A parametric representation of short time power spectrum based on the acoustic properties of the ear”, ICASSP 1984, speech and signal processing page 49-51.





Asma Fatma Arif, Jyoti Shrivastava

Paper Title:

Performance Analysis of three phases three wire Series Active Power Filter

Abstract:    The aim of this paper is to investigate and study the performance analysis of the three phase three wire series active power filter. Auto-tuned filters give a better performance for harmonic mitigation, reactive power compensation and power factor correction as compared to the classic filters. This paper presents the simulation analysis to reduce the harmonic in the output voltage to improve the power quality.             

   Active power filter, Harmonics, Hysteresis current control, Simulink


1.       Bhim Singh, kamal al-Haddad and Ambrish Chandra, A Review of Active Power Filters for Power Quality Improvement, IEEE Trans on Industrial Electronics, Vol.46, No.5, october 1999, pp.960-970
2.       Afonso, J., and et,al, “Active Filters with Control Based on the p-q Theory” IEEE Industrial Electronics Society Newsletter, Vol.47, No.3, pp.5.11, 2000

3.       V.B.Bhavaraju and P.Enjeti, “A Novel active line conditioner for a three-phase system”, in Conf.Rec. IEEE-IAS Annu. Meeting, 1993, pp.979-985

4.       Y.S.Kim, S.H.Ko, “Three-phase three-wire series active power filter, which compensates for harmonics and reactive power”, IEE Proc.-Electr. Power Appl., Vol.151, No.3, May 2004, pages 276-282

5.       Roger C.Dugan, Mark F. McGranaghan, Surya Santoso and H.Wayne Beaty, Electrical Power System Quality, McGraw Hill.

6.       M.Kazmierkoswi, L.Malesani, “Current Control Techniques for Three Phase Voltage Source PWM Converters: A Survey”, IEEE Trans on Industrial Electronics, Vol.45, No.5, pp.722-720, Oct1998

7.       M.H.Rashid, Power Electronics, Circuits,Devices and Applications 2nd ed., Prentice Hall 1993 “An exploration of the state of the art in power conversion techniques and power semiconductor devices”.

8.       Y.Sato, T.Kawase, M.Akiyama and T.Kataoka, A control Strategy for general purpose active filters based on voltage detection” IEEE Trans Appl, Vol.36, no.5, pp 1405-1412, Sep/Oct 2000

9.       Agaki. H., Kannazawa., and Nabae,A., “Instantaneous reactive power compensators comprising switching devices without energy storage components”, IEEE Transactions on Industrial Applications, VOl.20, pp.625-630, 1984.

10.     J.W.Dixon, J.J.Gracia and L.Moran, “Control System for three-phase active power filter which simultaneously compensates power factor, unbalanced loads”, IEEE Trans. Ind. Electron., vol.42, pp.636-641, 1995

11.     L.Malesani, P.Mattavelli, and P.Tamasin, “High performance hysteresis modulation technique for active filters”, in Proc. IEEE Apec’96, 1996, pp.482-490

12.     S.Bhattacharya and D.Divan, “Synchronous frame based controller implementation for a hybrid series active filter system”, in Conf. Rec. IEEE-IAS Annu. Meeting, 1995, pp-639-644





P.Manivannan, P.Karunanidhi, S.Bharathiraja, K.Ramesh

Paper Title:

A Review on Routing Protocols in MANET based on Routing Information Update Mechanism

Abstract:    Mobile ad hoc networks (MANET’s) are autonomously self-organized networks without infrastructure support. In a mobile ad hoc network, nodes move arbitrarily; therefore the network may experience rapid and unpredictable topology changes. Because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Hence, routing paths in mobile ad hoc networks potentially contain multiple hops, and every node in mobile ad hoc networks has the responsibility to act as a router. In recent years, several routing protocols have been proposed for mobile ad hoc networks such as proactive routing protocols, reactive routing protocols and hybrid routing protocols. This survey paper provides an overview of routing protocols in MANET based on their routing information update mechanism by presenting their characteristics, functionality, benefits and limitations. The objective is to make observations about how the performance of these protocols can be improved.

   MANET, Proactive, Reactive and Hybrid Routing Protocols.


1.       V. Kanakaris, D. Ndzi and D. Azzi., Ad-hoc Networks Energy Consumption: A review of the Ad-hoc Routing Protocols, Journal of Engineering Science and Technology Review 3 (1) (July 2010).
2.       W. Su and M. Gerla, .IPv6 Flow Handoff in Ad-Hoc Wireless Networks Using Mobility Prediction, Proceedings of IEEE GLOBECOM' 99, Rio de Janeiro, Brazil, Dec. 1999, pp. 271-275.

3.       Chiang C-C, Wu H-K, Liu W, Gerla M (1997) Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel. Proceedings of IEEE SICON:197–21.

4.       Ching-Chuan Chiang, Hsiao-Kuang Wu, Winston Liu, Mario Gerla, “Routing In Clustered Multi-hop, Mobile Wireless networks with fading channel”. IEEE 1997.

5.       C. Siva Ram Murthy and B.S. Manoj. Ad Hoc Wireless Networks: Architectures and Protocols.

6.       Shree Murthy and J.J. Garcia-Luna-Aceves, “An Efficient Routing Protocol for Wireless Networks”. ACM 1999.

7.       L. Kleinrock and K. Stevens, “Fisheye: A Lenslike Computer Display Transformation,” Technical report, UCLA, Computer Science Department, 1971.

8.       C.E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers,” In Proceedings of ACM SIGCOMM’94, London, UK, Sep. 1994, pp. 234-244.

9.       David B. Johnson, David A. Maltz, Josh Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad-Hoc Networks, Computer Science Department, Carnegie Mellon University, Pittsburgh, http://www.monarch.cs.cmu.edu/.

10.     C. Perkins, E. B. Royer, S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing – Internet Draft”, RFC 3561, IETF Network Working Group, July 2003.

11.     C. E. Perkins and E. M. Royer, “Ad-Hoc On Demand Distance Vector Routing”, Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA,1999, pp. 90-100.

12.     CHAI-KEONG TOH “Associativity - Based Routing for Ad-Hoc Mobile Networks” at University of Cambridge.

13.     Rohit Dube, Cynthia D. Rais , Kuang-Yeh-Wang , and Satish K. Tripathi “Signal stability-based adaptive routing for ad-hoc mobile network” at University of Maryland.

14.     Haas ZJ, Pearlman MR, Samar P (2002) The Zone Routing Protocol (ZRP) for Ad Hoc Networks. IETF draft, July 2002, available at http://tools.ietf.org/id/draft-ietf-manetzone-zrp-4.txt. Accessed 21 February 2008 94 A.-S.K. Pathan and C.S. Hong.

15.     Haas ZJ, Pearlman MR, Samar P (2002) Intra-zone Routing Protocol (IARP). IETF Internet Draft, July 2002, available at http://tools.ietf.org/wg/manet/draft-ietf-manetzone-ierp/draft-ietf-manetzone-ierp-02-from-01.diff.txt. Accessed 21 February 2008.

16.     Pei G, Gerla M, Hong X (2000) LANMAR: Landmark Routing for Large Scale Wireless Ad Hoc Network with Group Mobility. First Annual Workshop on Mobile and Ad Hoc Networking and Computing 2000 (MobiHoc 2000):11–18.

17.     G. Pei, M. Gerla, X. Hong, C. Chiang, A wireless hierarchical routing protocol with group mobility, in: Proceedings of Wireless Communications and Networking, New Orleans, 1999.





Mahsa Pournia, Morteza Fathipour

Paper Title:

A Post Processing Procedure for Surface Acoustic Wave RFID Using COMSOL

Abstract:    In recent years, much attention has been paid to SAW RFID research and its applications. Many methods have been proposed for coding the SAW RFID tags [1]-[4]. Among this, best provided methods for coding these devices is time position and phase encoding. The data capacity of the tags is significantly enhanced by extracting additional phase information from the tag responses [5].However post processing of the tag in simulation and extraction of the phase from Interrogated signals of the tag is complicate and time consuming. In this work, we have proposed a simple post processing method using COMSOL Multiphysics to find the exact phase of the Interrogated signals of the tag.

   Surface acoustic wave, SAW RFID tag, Piezoelectric, IDT. 


1.       A-long KANG, Tao HAN, and Yong-an SHUI, “A Novel approach of maximizing code capacity in SAW-Based RFID systems,” IEEE 978-1-4244-9821-5/10, 2010.
2.       Dasong Peng and Fengqi Yu, “An Experimental Method for Obtaining Device Parameters of SAW RFID Tags,” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 57, no. 6, June 2010.

3.       Victor P. Plessky, and Leonhard M. Reindl, “Review on SAW RFID Tags,” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 57, no. 3, March 2010.

4.       Gustavo Cerda-Villafa.na, Yuriy S. Shmaliy,“Thresholds for the Identi_cation of Wireless SAW RFID-Tags with ASK,” IEEE 978-1-4244-5795-3/10/$26.00, 2010.

5.       Sanna Harma, Wesley G. Arthur, , Clinton S. Hartmann, Roman G. Maev, and Victor P. Plessky, “Inline SAW RFID Tag Using Time Position and Phase Encoding,” IEEE Transactions on Ultrasonics, Ferroelectrics, and Frequency Control, vol. 55, no. 8, august 2008.

6.       Amal Zaki, Hsu-Cheng Ou, Mona Zaghloul, Hamed Elsimary, “Implementation of MEMS-SAW device on RF Circuits for Wireless Applications,”IEEE 1-4244-1176-9/07,2007.

7.       Lin Wei, Han Tao, Shui Yongan "Surface Acoustic Wave Based Radio Frequency Identification Tags" IEEE International Conference on e-Business Engineering, 978-0-7695-3395-7/08, 2008.





H. B. Kekre, Kavita Sonawane

Paper Title:

Partitioning of Modified Histograms to Generate 27 Bins Feature Vector to Improve Performance of CBIR

Abstract:    Content Based Image Retrieval is motivating the researchers to devise new techniques as the rate of retrieval is definitely gaining importance as multimedia databases are increasing day by day. In order to improve the retrieval accuracy of content-based image retrieval systems, research focus is on generating new efficient algorithms to extract image features and also to achieve the dimension reduction in order to reduce the processing time. In this paper, new algorithms are proposed to extract different types of image features based on the color contents of the RGB image. The feature extraction mainly deals with the original and the modified histograms of R, G and B planes. Four different modification functions namely Equalization (EQH), Logarithmic (LOG), Polynomial expression (POLY) and Linear equations 1, 2 and 3 (LINEQ 1, 2 and 3) are proposed to modify the histogram and their performance is compared in this paper. To implement the dimensionality reduction, this paper proposes two partitioning techniques namely Linear Partitioning (LP) and Centre of Gravity (CG)partitioning  to partition the R, G and B histograms in three parts so that 27 bins can be generated from it.  It directly reduces the size of the feature vector based on histogram from 256 bins to 27 bins only. Experimentation for the proposed methods is carried out using 2000 BMP images of 20 different categories.  Comparison of query and database image feature vectors is worked out using three similarity measures namely Euclidean distance (ED), Absolute distance (AD) and Cosine Correlation distance (CD). To compare and evaluate the performances of all the proposed approaches along with different similarity measures  three performance evaluation parameters are used namely  Precision Recall Cross over Point , Longest String  and Length of string to Retrieve all Relevant

   About four key   CBIR, Centre of Gravity, Equalization (EQH), Logarithmic (LOG), Polynomial expression(POLY), Linear Equations(LINEQ), Euclidean distance (ED),Linear Partitioning(LP), Centre of gravity(CG), Absolute distance (AD), Cosine Correlation Distance (CD), Precision Recall Cross over Point (PRCP), Longest String (LS), Length of String to retrieve all Relevant (LSRR). 


1.       Yong Rui and Thomas S. Huang, Shih-Fu Chang, “Image Retrieval: Current Techniques, Promising Directions, and Open Issues”, Journal of Visual Communication and Image Representation 10, 39–62 (1999).
2.       J. Hafner, H. S. Sawhney, W. Equitz, M. Flickner, and W. Niblack. “Efficient color histogram indexing for quadratic form distance functions”, IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), 17(7):729–736, 1995.

3.       Ju Han and Kai-Kuang Ma, Senior Member, IEEE “Fuzzy Color Histogram and Its Use in Color Image Retrieval” IEEE Transactions On Image Processing, Vol. 11, No. 8, August 2002

4.       R.VijayaArjunan, Dr.V.Vijaya Kumar, “Image Classification InCBIR Systems With Colour Histogram Features” 978-0-7695-3845-7/09 © 2009 IEEE DOI 10.1109/ARTCom.2009.233.

5.       Arnold W.M. Smeulders, Senior Member, IEEE, Marcel Worring, Simone Santini, , Amarnath Gupta, , and Ramesh Jain, “Content-Based Image Retrieval at the End of the Early Years” IEEE xplore.ieee.org/iel5/34/19391/00895972.pdf

6.       Kien A. Hua, Danzhou Liu, Member “Fast Query Point Movement Techniques for Large CBIR Systems”, IEEE Transactions On Knowledge And Data Engineering, VOL. 21, NO. 5, MAY 2009

7.       Michele Saad, “ContentBased Image Retrieval Literature Survey”, IEEE 381K: Multi Dimensional Digital Signal Processing, March 18, 2008.

8.       Dong Kwon Park, Yoon Seok Jeon, Chee Sun Won, Seong-Joon Yoo “A Composite Histogram for Image Retrieval”, Multimedia and Expo, 2000. ICME 2000. 2000 IEEE International Conference on July 30 2000-Aug. 2 2000.

9.       M. Gabbouj, S. Kiranyaz, K. Caglar, B. Cramariuc, F. Alaya Cheikh, O.Guldogan, and E. Karaoglu., “MUVIS: A Multimedia Browsing, Indexing and Retrieval System”, In Proc. of the IWDC 2002 Conference on Advanced Methods for Multimedia Signal Processing, Capri, Italy, September 2002.

10.     Faouzi Alaya Cheikh, “MUVIS: A System for Content-Based Image Retrieval”, Signal Processing Institute of Tampere University of Technology, Finland March 2004.

11.     Wang Database: http://wang.ist.psu.edu/docs/related/

12.     Gerald Schaefer, “Content-Based Image Retrieval – Some Basics”, Department of Computer Science Loughborough University Loughborough, U.K.

13.     Manimala Singha* and K.Hemachandran, “Content Based Image Retrieval using Color and Texture”, Signal & Image Processing : An International Journal (SIPIJ) Vol.3, No.1, February 2012.

14.     Jun Yuea,b, Zhenbo Li b,1, Lu Liu b, Zetian Fub ”Content-based image retrieval using color and texture fused features”, Mathematical and Computer Modelling 54 (2011) 1121–1127 , © 2010 Elsevier Ltd. All rights reserved, doi:10.1016/j.mcm.2010.11.044.

15.     Ibrahim S. I. Abuhaiba, Ruba A. A. Salamah, “Efficient Global and Region Content Based Image Retrieval”, I.J. Image, Graphics and Signal Processing, 2012, 5, 38-46 Published Online June 2012 in MECS (http://www.mecs-press.org/).

16.     Xiang Sean Zhou*, Thomas S. Huang, “CBIR: From Low-Level Features to High-Level Semantics” Correspondence: Email: xzhou2@uiuc.edu; WWW: http://www.ifp.uiuc.edu/~xzhou2

17.     Brandeis Marshall, “Discovering Robustness Amongst CBIR Features”, International Journal of Web & Semantic Technology (IJWesT) Vol.3, No.2, April 2012.

18.     Wasim Khan, Shiv Kumar, Neetesh Gupta, “A Proposed Method for Image Retrieval using Histogram values and Texture Descriptor Analysis”, International Journal of Soft Computing and Engineering (IJSCE)ISSN: 2231-2307, Volume-I Issue-II, May 2011.

19.     Debashis Sen, Sankar K. Pal, “Automatic Exact Histogram Specification for Contrast Enhancement and Visual System Based Quantitative Evaluation”, IEEE Transactions On Image Processing, VOL. 20, NO. 5, MAY 2011.

20.     Gi-Hyoung Yoo, Beob Kyun Kim, “Content-Based Image Retrieval

21.     Using Shifted Histogram”, ICCS 2007, Part III, LNCS 4489, pp. 894–897, 2007.Springer-Verlag Berlin Heidelberg 2007

22.     Yi Wan, Member, IEEE, and Dongbin Shi “Joint Exact Histogram Specification and Image Enhancement Through the Wavelet Transform”, IEEE Transactions On Image Processing, Vol. 16, No. 9, September 2007.

23.     V. Vijaya Kumar, N. Gnaneswara Rao, A.L.Narsimha Rao “IHBM: Integrated Histogram Bin Matching For Similarity Measures of Color Image Retrieval”, International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 2, No.3, September 2009

24.     H. J. Zhang, et al, "Image retrieval based on color features: An evaluation study," SPIE Conf. on Archival,  PennSylvania, oct 25-27, 1995.

25.     Sameer Antani, Rangachar Kasturi “A survey on the use of pattern recognition methods for abstraction, indexing and retrieval of images and video”, Pattern Recognition 35 (2002) 945–965, www.elsevier.com/locate/patcog.

26.     T. Gevers, A.W.M. Smeulders“A Comprative Study of Several Color Models for Color Invariant Retrieval”, Dept. of WINS, University of Amsterdam.

28.     Ramadass Sudhir, “An Efficient CBIR Technique with YUV Color Space and Texture Features”,  Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) www.iiste.org Vol 2, No.6, 201.

29.     Wee Kheng Leow,  Rui Li,“The analysis and applications of adaptive-binning color histograms”, Computer Vision and Image Understanding 94 (2004) 67–91. www.elsevier.com.

30.     Sangoh Jeong, Chee Sun,  “Image retrieval using color histograms generated by Gauss mixture vector quantization”, Computer Vision and Image Understanding 94 (2004) 44–66. www.elsevier.com

31.     http://www.kirkbymoorside-camera-club.co.uk/tutorials/understanding%20histograms.pdf

32.     H. B. Kekre, KavitaSonawane,“Bins Approach To Image Retrieval Using Statistical Parameters Based on Histogram Partitioning of R, G, B Planes”, International Journal of Advances in Engineering & Technology, Vol. 2, Issue 1, pp. 649-659Jan 2012. ©IJAET ISSN: 2231-1963.

33.     H. B. Kekre , Kavita Sonawane, “Bins formation using CG based partitioning of histogram modified  using proposed polynomial transform ‘Y=2X-X2’for CBIR, www.ijacsa.thesai.org, Vol. 3, No. 5, 2011.

34.     H. B. Kekre , Kavita Sonawane, “Linear Equation in Parts as Histogram Specification for CBIR Using Bins Approach”, International Journal of Engineering Research and Development e- ISSN: 2278-800X, Volume 4, Issue 4 (October 2012), PP. 73-85.

35.     H. B. Kekre , Kavita Sonawane , “Comparative Performance of Linear and CG Based Partitioning Of Histogram for Bins Formation in CBIR” IJERD, e-ISSN: 2278-067X, Volume 5, Issue 7 (January 2013), PP. 75-83

36.     H. B. Kekre, KavitaSonawane,“Feature Extraction in the form of Statistical Moments Extracted to Bins formed using Partitioned Equalized Histogram for CBIR”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-3, February 2012.

37.     Guocan Fenga , Jianmin Jianga , “JPEG compressed image retrieval via statistical features”,  Pattern Recognition 36 (2003) 977 – 985.

38.     H. B. Kekre, KavitaSonawane , “Performance improvement using average query fired to bins of four statistical moments for CBIR” IEEE Explore, (ICCICT), 2012 International Conference, Mumbai on 19-20 Oct. 2012

39.     H. B. Kekre, KavitaSonawane , “Row, column and fused row-col R, G, B plane's feature vector generation using DCT, DST and Kekre wavelet for CBIR”, IEEE Explore, (ICCICT), 2012 International Conference, Mumbai on 19-20 Oct. 2012

40.     Julia Vogela, Bernt Schieleb, “Performance evaluation and optimization for content-based image retrieval”, Pattern Recognition 39 (2006) 897 – 909.

41.     Yangxi Li, ChaoZhou,BoGeng,ChaoXu,HongLiu “A comprehensive study on learning to rank for content-based image retrieval” Contents listsavailableat SciVerse ScienceDirect journalhomepage: www.elsevier.com/locate/sigpro SignalProcessing

42.     Henning Muller, Wolfgang Muller, “Performance evaluation in Content Based Image retrieval: Overview and Proposals”, Pattern Recognition Letters (2001) 593-601.

43.     Julia Vogela, Bernt Schieleb, “Performance evaluation and optimization for content-based image retrieval”,

44.     Shaila S.G and A.Vadivel , “Content-Based Image Retrieval Using Modified Human Colour Perception Histogram”, ITCS, SIP, JSE-2012, CS & IT 04, pp. 229–237, 2012.





Vijay. G.R, A.Rama Mohan Reddy

Paper Title:

Cloud Data Management Interface based Storage Virtualization Mechanism for Cloud Computing

Abstract:    Cloud computing refers to the use of Internet based computer technology for a variety of services like memory, storage, processing and bandwidth. In internet cloud computing plays a major role to maintain the collection IT resources which are used by the cloud providers. In this paper we have proposed the concept of virtualization, where the Storage Virtualization and CDMI (Cloud Data Management Interface) are discussed.The CDMI gives how standard interfaces, coordinated between different organizations can meet the emerging needs for interoperability and portability of data between clouds. The Open Cloud Computing Interface (OCCI) is a free, open, community consensus driven API, targeting cloud infrastructure services.

   Cloud Computing, CDMI, OCCI, Storage Virtualization,.


1.        Test book, “Storage Virtualization For Dummies, Hitachi Data Systems Edition”, by Adrian De Luca and Mandar Bhide Published at Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774
2.        www.techniphila.co.in/research/ Virtualization & Cloud Computing.pdf

3.        Mrs. Dhanamma Jagli, Mr. Ramesh  “Semi Symmetric method of SAN  Storage Virtualization” International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.6, December 2012

4.        Introducing the new Cloud Data Management Interface Storage Network Industry Association (SNIA), Storage Developer Conference,2009.

5.        Bill hill- Intro to Virtualization: Hardware, Software, Memory, Storage, Data and Network Virtualization Defined.

6.        A.Venkatraman,“Advantages and disadvantages ofcloudcomputing”,http://searchvirtualdatacentre.techtarget.co.uk/feature/Advantages& disadvantages-of-cloud-computing, 2012.





D. Padma Subramanian, Anly Abraham

Paper Title:

Effect of High Wind Penetration, Grid Strength- ening and Compensation on Steady State Operating Point of DFIG Interfaced Power System

Abstract:    This paper presents the effect of high wind penetration, grid strengthening and compensation on steady state operating point of a power system interfaced with Doubly Fed Induction Generator (DFIG). A model of DFIG to interface with the load flow program is presented. A MATLAB program is developed and effectiveness of developed program is tested in a standard IEEE-9 bus system, interfaced with DFIG at ninth bus. The impact of varying wind velocity in cases of high wind penetration, grid strengthening and compensation on the steady state behavior of the grid connected DFIG system is studied and the results are presented.

   Doubly fed induction generator, High wind penetration, Power flow analysis,


1.       Jadhav H.T and Roy.R, “A Critical Review on the Grid Integration Issues of DFIG Based Wind Farms”, 10th International Conference on Environment and Electrical Engineering, 2011,pp 1-4.
2.       N.P.Padhy and Kiran Jasthi,  “Load Flow Algorithm for Practical Distribution Systems Comprising Wind Generators”, in proceeding of International Conference on energy, automation and signal, 2011,pp 310-315.

3.       S.ChandraHas, Dr.P.Ajay-D-Vimalraj, and G.R.K.D.Satya Prasad, “Power Enhancement of Wind Energy Conversion System Using Hybrid Method’, International Journal Of Advanced Engineering Sciences And Technologies ,vol no. 7, no. 2, pp 248 – 253,2011.

4.       Sunil Kumar., Nitin Goel and P.R.Sharma, “Investigation On Doubly Fed Induction Generator Steady State Parameters”, International Journal of Power System Operation and Energy Management, vol.-1,pp 2231-4407,2012.

5.       S.Engelhardt.,I.Erlich.,CFeltes.,J.Kretschmann.,andF.Shewarega,

6.       “Reactive Power Capability of Wind Turbines Based on Doubly Fed Induction Generators’, IEEE Transactions on Energy Conversion ,vol 26.,no 1,2011.

7.       P M Balaji., B Rami Reddy and R Granadam,“A Study on the Integration of Wind Turbine Coupled Doubly Fed Induction Generator to the Electrical Grid”, The IUP Journal of Electrical & Electronics Engineering, vol. 4, no. 4, pp. 22-35,2011.

8.       Balasubramaniam Babypriya and Rajapalan Anita, “Modelling, Simulation and Analysis of Doubly Fed Induction Generator For Wind Turbines”, Journal Of Electrical Engineering, vol. 60, no. 2, pp79–85,2009.

9.       Sharma Pawan.,Bhatti Tricholen Singh and R.K.Seha Srinivasa,“Doubly Fed Induction Generator: an Overview”, Journal of Electrical and Electronics Engineering,vol.3, pp189-194,2010.

10.     C. Rabelo, W. Hofmann, J. L. da Silva, R. G. de Oliveira, and S. R. Silva,“Reactive Power Control Design in Doubly Fed Induction Generators for Wind Turbines”, IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4154– 4162,2009.

11.     B.Chitti Babu and K.B.Mohanty,“Doubly-Fed Induction Generator for Variable Speed Wind Energy Conversion Systems- Modeling & Simulation”, International Journal of Computer and Electrical Engineering, vol. 2, no. 1, pp-1793-8163,2010.

12.     Ahmad M.Alkandari.,Soliman Abd-Elhady Soliman and Mansour H.Abdel-Rahman,“Steady State Analysis of a Doubly Fed Induction Generator”, Energy and Power Engineering, vol.3, pp 393-400,2011.

13.     Vieira J.P.A and Nunes M.V.A,“Analysis of Steady-State_Operation_of_DFIG-Based Wind Turbines in Power Systems”, IET conference on Renewable Power Generation, pp 1-5,2011.

14.     Satish Choudhury, K.B.Mohanty, and B.Chitti Babu,  “Performance Analysis of Doubly-Fed Induction Generator for Wind Energy Conversion System”, Proc. PSU-UNS International Conference on Engineering and Technology (ICET-2011), Phuket, Thailand, pp.532-536, 2011.

15.     J.Fernando., M.Padron and Andres Elias Feijoo Lorenzo, “Calculating Steady-State Operating Conditions For Doubly-Fed Induction Generator Wind Turbines”, IEEE transactions on power systems, vol.25, no. 2, pp 922-928,2010.

16.     Yan Li., Yulei Luo., Buhan Zang and Chengxong, ,“A Modified Newton Raphson Power Flow Method Considering Wind Power”, in proceedings of Power and Energy Engineering Conference (APPEEC) Asia Pacific, pp. 1-5,2011.

17.     R.Jayashri, “Analysis and performance enhancement of grid connected wind energy conversion system”, PhD thesis, Anna University, Chennai,2007.

18.     S. N. Bhadra, D. Kastha, S. Banerjee,“Wind Electrical Systems”,Oxford University Press, New Delhi,2009.

19.     S.Heier, “ Grid Integration of wind Energy Conversion Systems”, John Wiley and Sons,1998

20.     Chien-Hung Liu and Yuan-Yih Hsu,“Effect Of Rotor Excitation Voltage On Steady State Stability And Maximum Output Power Of A Doubly Fed Induction Generator”, IEEE Transactions on Industrial Electronics, vol. 58, no 4,pp 1096-1109,2011.

21.     Saadat H, “Power System Analysis”, Tata Mc Graw Hill, New Delhi 1999, 2002 edition.





Naveen Choudhary

Paper Title:

Migration of On-Chip Networks from 2 Dimensional Plane to 3 Dimensional Plane

Abstract:    In spite of the higher scalability and parallelism presented by 2D-Network-on-Chip (NoC) over the conventional shared-bus based systems, it is still not an ultimate solution for future large scale Systems-on-Chip (SoCs). Recently, NoC integration in three dimensions is (3D-Network-on-Chip) proposed as a potential solution offering higher speed, low latency, lower dynamic power consumption and high parallelism Advanced integration technologies are making feasible the extension of topology synthesis of on-chip networks from 2 dimension to 3 dimension. Studies have highlighted that 3D NoCs can significantly improve communication efficiency due to reduced communication distances in 3D space. This paper presents a brief journey of research in the domain of  Network on Chip topology synthesis from 2D dimensional plane to 3 dimensional plane and highlights the major challenges and issues faced and addressed by the NoC research community in the design of 2D standard NoCs, irregular & application specific 2D NoCs and 3D NoCs.

Keywords:   Application-Specific-NoC, 3D-NoC, 2D-NoC, On-Chip networks, System-on-Chip.

1.       W. J. Dally and B. Towles, “Route packets, not wires: on-chip interconnection networks,” in Proceedings of the 38th conference on Design automation, June 2001, pp. 684–689.
2.       M. Taylor, W. Lee, S. Amarasinghe, A. Agarwal, ”Scalar Operand Networks ”, in IEEE Transactions on Parallel and Distributed Systems, vol. 16, no. 2, pp. 145-162, Feb 2005.

3.       V. Pavlidis and E. Friedman. “3-D topologies for networks-on-chip”, in IEEE Transactions on Very Large Scale Integration Systems, 15(10), 2007.

4.       The International Technology Roadmap for Semiconductors (ITRS) update, Semiconductor Industry Association, 2008.

5.       G. Philip, B. Christopher, and P. Ramm, Handbook of 3D Integration. Wiley-VCH, 2008.

6.       L. P. Carloni, P. Pande, and Y. Xie, “Networks-on-chip in emerging interconnect paradigms: Advantages and challenges”,  in Proceedings of the 3rd ACM/IEEE International Symposium on Networks-on-Chip (NOCS’09), May 2009.

7.       J. Duato, S. Yalamanchili, L. Ni, Interconnection Networks : An Engineering Approach, Elsevier, 2003.

8.       G. M. Chiu, “The odd-even turn model for adaptive routing,” in IEEE Transactions on Parallel and Distributed Systems, vol. 11, no. 7, pp. 729–738, Jul 2000.

9.       S. Kumar, A. Jantsch, J.P. Soininen, M. Forsell, M. Millberg, J. Öberg, K. Tiensyrjä, A. Hemani,  “A Network on Chip Architecture and Design Methodology”, In IEEE Annual Symposium on VLSI,  April 2002.

10.     e. a. M. D. Schroeder, “Autonet: A High-Speed Self-Configuring Local Area Network Using Point-to-Point Links”, In Journal on Selected Areas in Communications, vol. 9, Oct. 1991.

11.     A. Jouraku, A. Funahashi, H. Amano, M. Koibuchi, “L-turn routing: An Adaptive Routing in Irregular Networks”, In the International Conference on Parallel Processing, pp. 374-383, Sep. 2001.

12.     Y.M. Sun, C.H. Yang, Y.C Chung, T.Y. Hang, “An Efficient Deadlock-Free Tree-Based Routing   Algorithm for Irregular Wormhole-Routed Networks Based on Turn Model”, In International Conference on Parallel Processing, vol. 1, pp. 343-352, Aug. 2004.

13.     J. Wu, L. Sheng, “Deadlock-Free Routing in Irregular Networks Using Prefix Routing”,  DIMACS  Tech. Rep. 99-19, Apr. 1999.

14.     R. S. Patti, “Three-dimensional integrated circuits and the future of system-on-chip designs,” in Proc. of IEEE. vol. 94, pp. 1214 – 1224, June 2006.

15.     W. R. Davis, et al., “Demystifying 3D ICs: the pros and cons of going vertical,” in proc. of IEEE Design and Test of Computers. Vol. 22, pp. 498– 510, November 2005.

16.     J. Kim et al., “A novel dimensionally-decomposed router for on-chip communication in 3D architectures,” in Proc. of International Symposium on Computer Architecture, pp. 138-149, 2007.

17.     A.M. Rahmani, et al., “Congestion aware, fault tolerant and thermally efficient inter-layer communication scheme for Hybrid NoC-Bus 3D architectures,” Networks on Chip (NoCs), Fifth IEEE/ACM International Symposium. Pittsburgh, pp. 65-72, May 2011.

18.     B. S. Feero, and P. P. Pande, “Networks-on-Chip in a three-dimensional environment: a performance evaluation,” IEEE Transactions on Computers. vol. 58, pp. 32-45, January 2009.

19.     P. Guerrier and A. Greiner, “A generic architecture for on-chip packet- switched interconnections,” in Proc. of Design, Automation and Test in Europe Conference. pp. 250-256, 2000.





Ramakrishna Das, Saurabh Dutta

Paper Title:

An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position’s Value of A Plain Text’s Character

Abstract:    Private-key cryptography is a cryptographic system that uses the same secret key to encrypt and decrypt messages. The problem with this method is transmitting the secret key to the person that needs it without it being intercepted Here, we have proposed an idea to increase the security of private-key encryption technique.  We have focused on the secret procedure to retrieve secret value from the private-key rather than securing the actual private-key value. The encryption is done by the secret value derived from the private-key. The secret value is being derived by making arithmetic operation between two decimal values. Those decimal values are derived by taking the binary values from even and odd bit position of a plain text’s character respectively. The operators are supplied by the user. As the formations of ‘0’ and ‘1’ are  different for each distinct character in the plain text file, so we  get different or may be distinct secret private-key value for each of the distinct character in the plain text. Thus the security is increased.

   Even or odd bit position, Nth Even or Odd term,   Private-key Encryption, Stream Cipher.


1.       J. K. Mandal, S. Dutta, “A 256-bit recursive pair parity encoder for encryption ”, Advances D -2004, Vol. 9 nº1, Association for the Advancement of Modeling and Simulation Techniques in Enterprises (AMSE, France), www. AMSE-Modeling.org, pp. 1-14
2.       William Stallings, Cryptography and Network security: Principles and practice (Second Edition), Pearson Education Asia, Sixth Indian Reprint 2002.

3.       Atul Kahate (Manager, i-flex solution limited, Pune, India), Cryptography and Network security, Tata McGraw-Hill Publishing Company Limited.

4.       Mark Nelson, Jean-Loup Gailly, The Data Compression Book. BPB Publication

5.       Saurabh Dutta, “An Approach towards Development of Efficient Encryption Technique”, A thesis submitted to the University of North Bengal for the Degree of Ph.D., 2004.





G.Karthikeyan, M.Ramajayam, A.Pannirselvam

Paper Title:

Design and Fabrication of an Electronic Fuel Injection Kit for a Conventional Small Capacity SI Engine

Abstract:    Port Fuel Injection (PFI) was developed in 1980s for automotive industry in order to improve engine performance and control emission effectively. It is now used widely in modern cars and some kind of sport motorcycles. To take advantage of electronic, the premix of air-fuel and combustion process can be programmed and controlled very precisely. Therefore, the emission and performance of the engine can be improved significantly for different working conditions. One of the main reasons for remote use of PFI technology in motorcycle is its complexity added with high cost. This paper reports on the design, development and fabrication of a new and compact PFI system that can replace an in-used carburetor easily with minimum modifications.

   Automotive; Four stroke; Gasoline; fuel retrofit kit; Spark ignition Engine.

1.       Komuro, K., Yagisawa, K., Akamatsu, S., Hayashi, A., and Ueda, M. (2005). Fuel Injection System of Air-cooled Engines for Small Displacement Motorcycles. SAE Technical Paper, No. 2005-32-0035.
2.       Latey, A. A., Bhatti, T. S., Das, L.M., and Gajendra Babu, M. K. (2005). Gasoline Fuel Injection Investigations on Single Cylinder SI Engine. SAE Technical Paper, No. 2005-26-012.

3.       Ujiie, T., Saito, H., Ueda, M., Akamatsu, S., Hayashi, A., and Nakano, Y. (2005). Development of Fuel Injector and Fuel Pump for a Fuel Injection System to Use in Small Motorcycles. SAE Technical Paper, No. 2005-01-0047.

4.       Karasawa, T., Hashimoto, S., and Ehara, R. (2005). Development of Discharge Pump Type Fuel Injection System for Small Two-wheel Vehicle. SAE Technical Paper, No. 2005-32-0022.

5.       Almkvist, G., Karlsson, T., Gren, S., Bengtsson, J, Andersson, C. And Oskarsson, P. (2001). Fuel Injection System for a High Speed Single Cylinder SI Engine. SAE Technical Paper, No. 2001-01-1863.

6.       Nakamura, M., Sawada, Y., and Hashimoto, S. (2003). Fuel Injection System for Small Motorcycles. SAE Technical Paper, No. 2003-32-0084.

7.       Tamaki, K., Kokubu, S., and Akamatsu, S. (2004). Control Device of Electronically Controlled Fuel Injection System of Air-cooled Engines for Small Motorcycles. SAE Technical Paper, No. 2004-01-0901.

8.       Tsai, G. L., Wu, Y. Y., Chen, B. C., and Chuan, H. F. (2004). Rapid Prototyping ECU of a SI Engine with Fuel Injection and Ignition Control. SAE Technical Paper, No. 2004-01-0419.

9.       M.C. Drake, D.C. Haworth (2007). Advanced Gasoline Engine Development using Optical Diagnostics and Numerical Modelling, Proceedings of the Combustion Institute 31, 99-124.

10.     Heywood J. B., Internal Combustion Engine Fundamentals, Mc-Graw Hill Book Co., New York, 1988.





Nishant Kumar K., Rajul K. Gajjar

Paper Title:

Inelastic Effects of Biaxial Excitation on Geometrically Asymmetric Plan Building with Biaxial Eccentricity

Abstract:    Seismic analysis is generally performed by creating a structural model which is excited with forces in two orthogonal directions separately i.e. they are subjected to uniaxial excitation. But an actual earthquake will have its effect in both the directions simultaneously. Limited research has been carried out on effect of such biaxial excitation on two way geometrically asymmetric plan having biaxial eccentricity. This paper deals with the inelastic effect of biaxial excitation on non-linear performance of geometrically two way asymmetric multi-storey buildings with biaxial eccentricity using various time-histories. The angle of incidence of earthquake forces will be varying   between 0 to 360 degrees. The building, having of L-shaped plan with   eccentricity along each of x and y directions, has been studied. Time history analysis has been carried out using SAP2000 after validating a preliminary model with experimental results available in reference literature.

   Biaixial excitation, Multi-storey building, geometrically asymmetrical plan, inelastic effects.


1.       Lucchini Andrea, Monti Giorgio and Kunnath Sashi. “Non linear response of two way asymmetrical single storey building under bi-axial excitation.” Journal of structural engineering, ASCE (January, 2011), 137(1), pp. 34-40
2.       Julio J HERNÁNDEZ, Oscar A LÓPEZ, “Influence of Bidirectional Seismic Motion on the Response of Asymmetric Building” by 12th World Conference on Earthquake Engineering, 2000, 1813, pp. 1-8

3.       Dorde Ladinovic, “Nonlinear seismic analysis of asymmetric in plan building” by FACTA UNIVERSITATIS: Architecture and Civil Engineering Vol. 6, No 1, pp. 25 – 35, 2008,

4.       Raúl González Herrera1, Consuelo Gómez Soberón, “Influence of Plan Irregularities of Buildings” by 14th World Conference on Earthquake Engineering, 2008,

5.       Andrea Lucchini, Giorgio Monti, Enrico Spacone, “Asymmetric-Plan Building: Irregularity Levels and Nonlinear Seismic Response” by E. Cosenza (ed), Eurocode 8 Perspectives from the Italian Standpoint Workshop, pg 109-117, Doppiavoce, Napoli, Italy, 2000

6.       N. Özhendekci, Z. Polat, “Torsional Irregularity of Buildings”  by 14th World Conference on Earthquake Engineering, 2008,

7.       Rucha S. Banginwar, M. R. Vyawahare, P. O. Modani, “Effect of Plan Configurations on the Seismic Behaviour of the Structure by Response Spectrum Method” by International Journal of Engineering Research and Applications(IJERA), May-June 2012, 2(3), pp. 1439-1443

8.       Christos A. Zeris, Stephen A. Mahin, “Behaviour of Reinforced Concrete Structures Subjected to Biaxial Excitation” by Journal of Structural Engineering (ASCE), Sept 1991, 117(9), pp. 2657-2673

9.       Christos A. Zeris, Stephen A. Mahin, “Behaviour of Reinforced Concrete Beam-Columns under Uniaxial Excitation” by Journal of Structural Engineering (ASCE), April 1998, 114(4), pp. 804-820

10.     H. P. Hong, “Torsional Responses under Bi-Directional Seismic Excitations: Effects of Instantaneous Load Eccentricities” by Journal of Structural Engineering (ASCE), March 2012,

11.     Juan C. De La Llera, Anil K. Chopra, “Estimation of Accidental Torsion Effects for Seismic Design of Buildings” by Journal of Structural Engineering (ASCE), Jan 1995, 121(1), pp. 102-114

12.     Czeslaw Bajer, “Time Integration Methods – Still Questions” by Theoretical Foundations of Civil Engineering, Warsaw, 2002, pp. 45-54

13.     Deierlein, Gregory G., Reinhorn, Andrei M., and Willford, Michael R. (2010). “Nonlinear structural analysis for seismic design,” NEHRP Seismic Design Technical Brief No. 4, produced by the NEHRP Consultants Joint Venture,

14.     “Applicability of Non-linear Multiple-degree-of-freedom modelling for design” by NEHRP joint venture

15.     IS 1893:2002 “Criteria for Earthquake Resistant Design of Structures





M Shanmuga Priya, Reyaz Farooq, Divyashree K, A.K Satheesh Babu, M Lakshmi Prabha, Prasad M.P

Paper Title:

Pilot Scale Production of Azotobacter Biofertilizer and Its Effect on the Growth Parameters of Ocimum Sanctum

Abstract:    Azotobacters are predominant in the rhizosphere of plants and they help in phosphate solubilisation. They belong to the family Azotobacteraceae and they are used as broad spectrum biofertilizers. In the present study four samples were collected from the rhizosphere regions of the plants namely Solanum lycopersicum (tomato), Zingiber officinale (ginger), Solanum melongena (Brinjal) and Allium sativum (Garlic). The collected samples were isolated and identified as isolates 1, 2, 3 and 4. Biochemical tests such as motility test, catalase test, oxidase test, starch hydrolysis, litmus milk and phosphate solubilisation were performed. The effect of culture parameters such as Incubation period, pH, Temperature and carbon source at different concentrations were carried out. Mass production of Azotobacter was carried out using batch fermenter. Further pot experiments were conducted to determine the root length, shoot length and number of leaves in  Ocimum sanctum on 15th , 30th and 45th day. The results showed an increase in root length, shoot length and number of leaves in biofertilizer treated plant when compared with the control and inorganic fertilizer.

   Azotobacter, Biofertlizer, Ocimum sanctum and Rhizosphere


1.       Revillas JJ, Rodelas B, Pozo C, Martinez-Toledo MV and Gonzalez-Lopez J “ Production of B-group Vitamins by two Azotobacter strains with phenolic compounds as sole carbon source under diazotrophic and adiazotrophic conditions,” J. Appl. Microbiol, Vol 89, 2000, pp 486-493.
2.       Vessey JK, “ Plant growth promoting rhizobacteria as biofertilizers,” Plant soil, vol 255, 2003,pp 571-586.

3.       Kumar V, Behl RK and Narula N ,” Establishment of  phosphate solubilising strains of Azotobacter chroococcum in the rhizosphere and their effect on wheat cultivars under greenhouse conditions,”  Microbiol. Res.vol 156, 2001, pp 87-93.

4.       Kumar GP, Yadav SK, Thawale PR, Singh SK and Juwarkar AA, “ Growth of Jatropha curcas on heavy metal contaminated soil amended with industrial wastes and Azotobacter-A greenhouse study,” Bioresour. Technol. vol 99, 2008, pp 2078-2082.                                                              

5.       Behl RK, Sharma H, Kumar V and Narula N,” Interactions amongst mycorhiza, Azotobacter Chroococcum and root characteristics of wheat varieties” J. Argon. Crop Sci. Vol 189, 2003, pp 151-155.

6.       Kannaiyan S, “ Biofertilizers for sustainable crop production In: Kannaiyan. S (ed) Biotechnology and biofertilizers” Kluwer Academic Publishers, Derdrecht, The Netherlands, 2002, pp 9-49.

7.       Yadav K.S and Dadarwal K.R,” Phosphate solubilisation and mobilization through soil microorganisms” In: Biotechnological Approaches in soil Microorganisms for sustainable Crop production (dadarwal R.K., ed):Scientific Publishers, Jodhpur, India,1997, pp. 293-308.

8.       Dey K.B,” Phosphate solubilising organisms in improving fertility status,” In: Biofertilizers: Potentialities and Problems (Sen S.P and Patil P., eds). Plant Physiology Forum, Naya Prokash, Calcutta, 1998, pp 237-248.

9.       Yosef, B.B, Rogers, RD,wolfram, JH and Richman, “ Isolation of Phosphate Solubilizing Microorganism (PSMs) from Soil,”  E.J. Soil Science of America, 1999, pp 1703-1704.
10.     Bisen P.S and Verma, K, “ Handbook of microbiology”, CBS publishers and distrubuters, New delhi, 1996.

11.     Lynch JM,” Microbial matabolites, In: Lynch JM, editor, The Rhizosphere, Chichester, England: John Wiley and sons Ltd, Baffins Lane, Interscience, 1990, pp 177-206.

12.     El-Sawah MMA, Hauka FIA and El-Rafey HH,” Study on some enzymes cleaving phosphorus from organic substrates in soil,” J Agric Sci, vol 157, 1993, pp 238-43.

13.     Bishop ML, Chang AC and Lee RWK,” Enzymatic mineralization of organic phosphorus in a Volcanic soil in chile,” Soil Sci, vol 157, 1994,pp 238-43.

14.     Feller C, Frossard E and Brossard M,” Phosphatase activity in low activity tropical clay soils, Distributuion in the various particle  fractions,” Can J Soil Sci, vol 74, 1994, pp 121-9.

15.     Kremer RJ,” Determination of soil phosphatase activity using a microplate method,” Comun Soil Sci plant Anal, vol 25, 1994, pp 319-25.

16.     Sarapatka B and Kraskova M,” Interactions between phosphatise activity and soil characteristics from some locations in the Czech Republic,” Rostlinna- Vyroba- UZPI vol 43, 1997, pp 415-9.

17.     Richardson  A.E,” soil microorganism and phosphorus availability. In: Soil Biota, Management in sustainable farming Systems (Pankhurst C.E., Double B.M., Grupta V.V.S.R., and Grace  P.R., eds)”: CSIRO  Melbourne, Australia,1994, pp 50-62

18.     Jensen H.L, “ Non- Symbiotic nitrogen fixation, In: Soil nitrogen-Academic Press, New York. 2000, pp 359-371

19.     Dobereiner and F.O Pedrosa,” Nitrogen- fixing Bacteria in Non leguminous Crop Plants,” 1st ed, Science Tech Publishers, Springer Verlag Inc, Berlin, Germany, 1987, pp 239-245.

20.     Don J Brenner, R.N Krieg and JT Staley,” Bergey’s Manual of systemic Bacteriology, 1st ed,Michigan State university publishers, 2005, pp 384-402.

21.     J.M Gonzalez-lopes, V Martinez-Toledo and S Reina V Salmeron, J.Technol And Environ Chem, vol 33,1991, pp 69-78.

22.     Richardson AE, “ Soil microorganisms and phosphorus availability,” In: Pankhurst CE, Double BM, Grupta VVSR, Grace PR, editors, Soil Bista, Management in Sustainable Pharming systems, Melbourne, Australia-CSIRO, 1994, pp 50-62

23.     Krasilnikova M, “ On the role of soil bacteria in plant nutrition,” J Gen Appl Microbiol., vol 7,1961, pp 128-44

24.     Lifshitz R, Kloepper JW, Kozlowski M, Simonson C, Carbon J, Tipping EM and Zalesca I, “ Growth promotion of Canola (rapeseed) seedlings by a strain of Pseudomonas putida under genobiotic conditions,” Can J Microbiol., 1987,vol 33, 1987, pp 390-5.

25.     Chabot R, Antoun H and Ceseas MP, ” Stimulation de la Croissance du mais et de la laitue romaine par desmicrooreganisms dissolvent le phosphate inorganique,” Canadian Journal of Microbiol, vol 39,1993, pp 941-7





Rajesh Kumar Verma, P. K. Singhal

Paper Title:

U - Slot Loaded Broadband Rectangular Microstrip Antenna

Abstract:    To enhance the bandwidth, a new design of rectangular microstrip antenna is presented. The proposed geometry consists of an E – shaped ground plane structure, a truncated radiating patch layer and a U- slot loaded patch layer. The radiating patch layer and U slot loaded patch layer are separated using a thick air substrate (10 mm) to enhance the bandwidth. The two major impedance BWs determined are 40 % at centre frequency 3815 MHz and 29 % at centre frequency 5995 MHz. The microstrip antenna is fed by a coaxial probe. The proposed geometry provides a band of 1530 MHz (3.05 GHz to 4.58 GHz) and of 1750 MHz (5.12 GHz to 6.87 GHz) that is suitable for certain frequencies of S band as well as of C band applications. Also, the proposed geometry provides a peak directivity 6.59 dBi, gain 4.78 dBi, axial ratio 42.46 dB, aperture efficiency 85.7 %, radiation efficiency 89 % for a band (3.05 GHz to 4.58 GHz) whereas for a band of (5.12 GHz to 6.87 GHz) the proposed geometry provides a peak directivity 6.22 dBi, gain 4.32 dBi, axial ratio 70.9 dB, aperture efficiency 68.8 %, radiation efficiency 70 %. All the simulations are carried out using Zeland IE3D simulation software for a dielectric substrate with dielectric constant 4.4 and loss tangent 0.02.

   Broadband, RMSA, Truncated.


1.        Balanis C. A., “Antenna Theory: A Review,” Proc. IEEE, Vol. 80, No. 1,  pp. 7–23, January 1992.
2.        Bahl I. J. and P. Bhartia, Microstrip Antennas, Artech House, Norwood, MA, 1980.

3.        Collin R. E., Antennas and Radio wave Propagation, McGraw-Hill, New York, 1985.

4.        Huynh T. and K. F. Lee, “Single-layer single-patch wideband microstrip  antenna,” Electron. Lett. 31, 1310–1311, Aug. 3, 1995.

5.        James J. R. and P. S. Hall (Eds.), Handbook of Microstrip Antennas, Vols. I and II, Peter Peregrinus, 1989.

6.        Jordan E. and K. Balmain, Electromagnetic Waves and Radiating Systems, Prentice-Hall,New York, 1968.

7.        Kraus J. D., Antennas, McGraw-Hill, New York, 1988.

8.        Kumar G. and K. P. Ray,Broadband Microstrip Antennas, Artech House, 2002. 

9.        Ooi B. L. and Q. Shen, “A novel E-shaped broadband microstrip patch antenna,” Microwave Opt. Technol. Lett. 27, 348–252, Dec. 5, 2000.

10.     Sarkar, S., Majumdar, A. D., Mondal, S.,Biswas, S.,Sarkar, D. Sarkar, P. P., “Miniaturization of rectangular microstrip patch antenna using  optimized single-slotted ground plane”. Microwave and Optical Technology Letters,53,2011: pp.111–115.

11.     Wong K.L.,C.L. Tang, and J.Y. Chiou , “Broad-Band Probe-Fed Patch Antenna With a W-Shaped  Ground Plane”, IEEE Transactions On Antennas And Propagation, Vol. 50, No. 6, June 2002.

12.     Wong K.L and J.Y. Sze , “Slotted rectangular microstrip antenna for  bandwidth enhancement,” IEEE Trans. Antennas Propag., Vol. 48, No. 8, pp.1148-1152, August, 2000.

13.     Wong K. L. and J. S. Kuo, “A compact microstrip antenna with meandering slots in the ground plane,” Microwave Opt. Technol. Lett. 29, 95–97, April 20, 2001.

14.     Wong K. L. and T. W. Chiou, “Designs of compact microstrip antennas with a slotted ground plane,” IEEE Antennas Propagat. Soc. Int. Symp. Dig. pp. 732–735, 2001.

15.     Wong K. L.andW. H. Hsu, “Broadband triangular microstrip antenna with U-shaped slot,” Electron. Lett. 33, 2085–2087, Dec. 4, 1997.

16.     Wong K. L. and W. H. Hsu, “A broadband rectangular patch antenna with a pair of wide slits,” IEEE Trans. Antennas Propagat. 49, 1345– 1347, Sept. 2001.

17.     Wong Kin-Lu-, Compact and Broadband Microstrip Antenas, John Wiley & Sons,INC.





Kunatsa T, Musademba D

Paper Title:

Feasibility of Biomass Energy Conversion Technologies For The Wattle Company’s Vumba Sawmill Wood Waste

Abstract:    A broad range of conversion technologies is currently available for generating a diverse array of energy products from sawmill wood waste. The choice of conversion technology will depend on cost of capital, the volume of wood waste available, access to energy markets, the prices for each renewable energy product and the cost of the wood waste. The purpose of this research project was to investigate the feasibility of the various options of sawmill wood waste conversion technologies at The Wattle Company’s Vumba Sawmill so as to value add sustainably in an environmentally friendly manner. The outcome  favoured  Briquetting as the most feasible conversion technology  for the wood waste. The plant capacity will be 2.25 tonnes having an annual output of 689.04 tonnes with a target market of 9-10% regional. The Investment required was US$ 65 472.92 with Payback Period of 1 year 3 months and the Net Present Value  was US$ 325 429.08. The project’s location is Manicaland Province in the Vumba Eastern Highlands of Zimbabwe.

   Bioenergy, Biofuels, Biomass, Renewable Energy, Sawmill wood waste.


1.       Bridgwater, A.V. (1999). A Guide to Fast Pyrolysis of Biomass for Fuels and Chemicals. Bioenergy Research Group – Aston University, United Kingdom.
2.       Demirbaş, A., A. Şahin-Demirbaş and A. Hilal Demirbaş. 2004. Briquetting properties of biomass waste materials. Energy Sources 26: 83-91.

3.       Jamie Morton, July 2001, Forest and Wood Products Research and Development Corporation (2001) Bioenergy: A future for the Australian Forest Industry.

4.       Li, Y. and H. Liu. 2000. High pressure densification of wood residues to form an upgraded fuel. Biomass and Bioenergy 19: 177-186.

5.       National Environmental Policy, Government of Zimbabwe-Ministry of Environment and Tourism (September 2003)

6.       Ndiema, C.K.W., P.N. Manga and C.R. Ruttoh. 2002. Influence of die pressure on relaxation characteristics of briquetted biomass. Energy Conversion and Management 43: 2157-2161.

7.       Nupur Sengupta, 2002, Use of Wood as a Fuel in Combined Heat and Power

8.       P.D. Grover and S.K.Mishra, FAO 1996Biomass Briquetting: Technology and Practices

9.       Stucley C.R, Schuck S.M, Sims R.E.H, Larsen P.L, Turvey N.D and Marino B.E(2004) Biomass energy production in Australia Status costs and opportunities for major technologies. A report for JVAP in conjunction with the AGO

10.     Sustainable Energy Development Authority (1999) Investigation of Potential for Electricity Generation from Forestry By-products in New South Wales. By Enecon Pty Ltd & CSIRO Australia, June 1999

11.     UNEP Collaborating Centre on Energy and Environment (January 1997), Implementation strategy to reduce environmental impact on energy related activities in Zimbabwe

12.     Wyman, C.E., B.E. Dale, R.T. Elander, M. Holtzapple, M.R. Ladisch and Y.Y. Lee. 2005. Comparative sugar recovery data from laboratory scale application of leading pretreatment technologies to corn stover. Bioresource Technology 96: 2026-2032.

13.     Yaman, S., M. Şahan, H. Haykiri-açma, K. Şeşen and S. Küçükbayrak. 2000. Production of fuel briquettes from olive refuse and paper mill waste. Fuel Processing Technology 68: 23-31.

14.     Zandersons, J., J. Gravitis, A. Zhurinsh, A. Kokorevics, U. Kallavus and C.K. Suzuki. 2004. Carbon materials obtained from self-binding sugar cane bagasse and deciduous wood residues plastics. Biomass and Bioenergy 26: 345-360.





Nimisha C. Chaudhari

Paper Title:

Cluster Based Key Revocation and Key Distribution in Wireless Sensor Network a Survey

Abstract:    Key management has become a challenging issue in the design and deployment of secure wireless sensor networks. key management includes two aspects: key distribution and key revocation. Key distribution refers to the task of distributing secret keys between communicating parties to provide secrecy and authentication. Key revocation refers to the task of securely removing compromised keys. By revoking all of the keys of a compromised sensor node, the node can be removed from the network. Compared to key distribution, Wireless sensor networks consist of sensor nodes with limited computational and communication capabilities. In this paper, the whole network of sensor nodes is divided into clusters based on their physical locations. In addition, efficient ways of key distribution among the nodes within the cluster and among controllers of each cluster are discussed. Also, inter and intra cluster communications are presented in detail. The security of the entire network through efficient key management by taking into consideration the network’s power capabilities is discussed.  In this paper, we have discussed several existing methods for key revocation.

   Key distribution, Key revocation, heterogeneous atmosphere, wireless sensor node, Security Requirements, Sensor Network, clusters, nodes


1.     Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," IEEE Communications Surveys and Tutorials, vol. 8, no. 2, 2006.
2.     X. Du, Y. Xiao, M. Guizani, H.H. Chen, An Effective Key Management Scheme for Heterogeneous Sensor Networks, Ad Hoc Networks, Elsevier, vol. 5, issue 1, January 2007, pp. 24-34.

3.     P. Traynor, R. Kumar, H. B. Saad, G. Cao, and T. L. Porta, "LIGER: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks," in Proc.  MobiSys'06, Uppsala, Sweden, 2006. 

4.     Chee-Yee Chong and S. P. Kumar. Sensor networks: evolution, opportunities, and challenges. Proceedings of the IEEE, 91(8):1247-1256, 2003. 

5.     I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002.    

6.     S. Kroc and V. Delic. Personal wireless sensor network for mobile health care monitoring. In Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003. 6th International Conference on, volume 2, pages 471-474 vol.2, Oct. 2003.  

7.     I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "A survey on sensor networks," IEEE Communication Magazine, Aug. 2002.

8.     Zhang W, Song H, Zhu S, Cao G. Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. In MobiHoc '05: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM Press: New York, NY, USA, 2005; 378-389.

9.     Karp B, Kung HT. GPSR: greedy perimeter stateless routing for wireless networks. In MobiCom '00: Proceedings of the6th Annual International Conference on Mobile Computing and Networking. ACM Press: New York, NY, USA, 2000; 243-254.

10.  Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003, 197-213.

11.  Chan H, Gligor V, Perrig A, Muralidharan G. On the distribution and revocation of cryptographic keys in sensor networks. IEEETransactions on Dependable and Secure Computing 2005; 2(3):233-247. 

12.  O. Kachirski and R. Guha, "Effective intrusion detection uses multiple sensors in wireless ad hoc networks," in System Sciences, 2003. Proceedings of the 36th Annual Hawaii International Conference on, p. 8 pp., 2003.

13.  X. Zou, B. Ramamurthy, and S. S. Magliveras, Secure Group Communications Over Data Networks, Springer, 2005.