Volume-2 Issue-5


Version
Download 31
Total Views 1784
Stock
File Size 4.00 KB
File Type unknown
Create Date August 31, 2017
Last Updated December 5, 2018
Download

Download Abstract Book

S. No

Volume-2 Issue-5, June 2013, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page No.

1.

Authors:

Thanneru Raghu Krishna Prasad, Goutham Solasa, Nariganani SD Satyadeep, G.Suresh Babu

Paper Title:

Static Analysis and Optimisation of Chassis and Suspension of an All-Terrain Vehicle

Abstract: The project was aimed to design the frame & suspension of the Society of Automotive Engineers (SAE) Baja car which is a single-seated all-terrain vehicle and is used for off road usage and endurance on a rough terrain. In many aspects it is similar to an All-Terrain Vehicle (ATV) except that it is much smaller in size and has safer rollover capabilities. The modeling of the frame and suspension is done by using pro-e software. This design is checked by Finite Element Analysis after estimating the load and the weight of the frame optimized.

Keywords:
(SAE), (ATV)


References:

1. SAE, 2011, “Mini Baja 2011 Rules”, (http://sae.org/students/minibaja.htm).
2. http://www.matweb.com
3. Fundamentals of vehicle-dynamics, Thomas.D.Gillespie
4. Bill and Doug Milliken; Race Car Vehicle Dynamics
5. (RCVD) (http://www.millikenresearch.com/rcvd.html)
6. Butterworth-Heinemann Ltd; 2Rev Ed edition (May 23, 2001); The Automotive Chassis
7. Reza N. Jazar; March 2008; Vehicle Dynamics, Theory and application

1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.


Authors:

B.K.Kolhapure

Paper Title:

Study on Shear Behaviour of High Strength Concrete (HSC) Slender Beams

Abstract: In this paper an experimental investigation is carried out on Twelve HSC beams with constant width (125 mm) and effective depth (100 mm) by varying (i) shear span to depth ratio, (ii) the longitudinal reinforcement ratio and (iii) the minimum web reinforcement ratio were casted and tested to understand the shear behavior of the beams with minimum web reinforcement as per IS CODE and ACI CODE and maximum web reinforcement as per IS CODE. The load-deflection behavior and the failure pattern of the beams, ultimate shear strength and reserve shear strength are studied with varying a/d ratio and longitudinal reinforcement. The results obtained are compared with the different codal equations. Based on these observations, it can be concluded that, there are many parameters influencing the shear behavior of RC beams such as shear span to depth ratio (a/d ratio>2), concrete grade, depth of the beam and the percentage of the longitudinal reinforcement The results obtained were compared with the different codal equations. The British code model is proposed for the present work.

Keywords:
High strength concrete, shear span to depth ratio. Reserve strength, failure pattern, ultimate shear capacity, codal provisions.


References:

1. Raghu S.Pendyala and Priyan Mendis, “Experiment Studies on Shear Strength of High Strength Concrete Beams,” ACI Structural Journal/july-august 2000, pp 564 – 571.
2. Mark k. Johnson and Julio A. Ramirez, “Minimum Shear Reinforcement in Beams with Higher Strength Concrete,” ACI Structural Journal/July-Aug 1989 pp 376-382.

3. Theodor Krauthammer, “Minimum Shear Reinforcement Based on Interface Shear Transfer,” ACI Structural Journal/Jan-Feb 1992 pp 99-105

4. Michael P. Collins and Daniel Kuchma, “How Safe Are Our Large, Lightly Reinforced Concrete Beams, Slabs, and Footings”. ACI Structural Journal/July-August 1999 pp 482-490

5. Young-soo Yoon, William D. Cook and Denis Nitchell, “Minimum Shear Reinforcement in Normal, Medium, and High-Strength Concrete Beams,” ACI Structural
Journal/Sept-Oct 1996 pp 576-584.

6. Guney Ozcebe, Ugur Ersoy, and Tugrul Tankut et al, “Evaluation of Minimum Shear Reinforcement Requirements for Higher Strength Concrete,” ACI Structural Journal/May-June 1999 pp 361-368.

7. Robert J. Frosch, “Behaviour of Large-Scale Reinforced Concrete Beams with Minimum Shear Reinforcement,” ACI Structural Journal/Nov-Dec 2000 pp 814-820.

8. Dino Angelakos, Evan C. Bentz and Michael P. Collins, “Effect of Concrete Strength and Minimum Stirrups on Shear Strength of Large Members,” ACI Structural Journal/May-June 2001 pp 290-300

9. Prodromos D. Zararis, “ Shear Strength and Minimum Shear Reinforcement of Reinforced Concrete Slender Beams,” ACI Structural Journal/March-April 2003 pp 203-214

10. Khaldoun N.Rahal and Khaled s. Al-Shaleh, “Minimum Transverse Reinforcement in 65 MPa Concrete Beams,” ACI Structural Journal/Nov-Dec 2004 pp 872-878

11. A.Cladera and A.R.Mari, “Experimental study on high- strength concrete beams failing in shear,” Engineering Structures/May-2005 pp 1519-1527.

12. Patrick Paultre and Denis Mitchell, “Code Provisions for High-Strength Concrete an International Perspective,” Concrete International MAY 2003, pp 76-90

13. Jin-Keun Kim andYyon-Dong Park, “Prediction of Shear Strength of Reinforced Concrete Beams without Web Reinforcement”, ACI Structural Journal, V 93,
No.3, May-Jun 1996, pp.213-222.

14. Michael .P.Collins and Daniel Kuchama, “How safe are our large, lightly reinforced concrete beams, slabs and footings?,” ACI Structural Journal, V 96, No 4, Jul-Aug 1999, pp 482-490.

15. S.Sarkar, O.Adwan, B.Bose, “Shear stress distribution and failure mechanics of high-strength reinforced concrete beams,” Materials and Structures, V32, No.216, March 1999, pp 112-116.

16. Satish.B.DesaI, “Influence of constituents of concrete on its tensile strength and shear strength,” ACI Structural Journal, January-February 2004, Pg 29-38.

17. M. Khuntia and B. Stojadinovic (2001). “Shear Strength of Reinforced Concrete Beams without Transverse Reinforcement,” ACI Structural Journal, V 98, No.5, Sep-Oct 2001, pp.648-656.

18. A.Koray Tureyen and Robert J. Frosch, “Concrete shear strength: Another Perspective,” ACI Structural Journal, September-October 2003, pp 609-615.

19. N.Subramanian, “Shear strength of high strength concrete beams: Review of codal provisions,” The Indian Concrete Journal, May 2003, pp 1090-1094.

20. Indian Standard, “PLAIN AND REINFORCED CONCRETE CODE OF PRACTICE (Fourth Revision)”, IS456:2000, Clause 26.5.1.6, pp 48.

21. Songkram Piyamahant and H1roshi Shima, “Shear Behaviour Of Reinforced Concrete Beams With A Small Amount Of Web Reinforcement,” ME Thesis, Kochi University of Technology Kochi, Japan, Jan 2002.

22. Y.A.Daou and H.A.GhaneM, “Experimental Study of the Minimum Shear Reinforcement in High Strength Concrete Beams,” IACT-Journal-V1-N2-(10)-(pp103-118).

23. American Concrete Institute. ACI Building Code Requirements for Reinforced Concrete, ACI 318-02; 2002.

7-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Suvra Sarkar, Sandeepa Sarkar, Bishnu Charan Sarkar

Paper Title:

Nonlinear Dynamics of a BJT Based Colpitts Oscillator with Tunable Bias Current

Abstract: The effect of bias current variation in the dynamics of a conventional BJT based Colpitts Oscillator (CO) has been thoroughly examined in this paper. After formulating a suitable ac equivalent model of the CO taking care of the dc bias current, the dynamics of the system has been numerically studied. It is observed that in a CO circuit with given design parameter, a periodic oscillation starts for a critical bias current and with the variation of the bias current to a higher value chaotic oscillations are observed through a period doubling root. A prototype hardware experiment in the low RF band CO supports the observations obtained by the numerical simulations. The change in chaoticity with the variation of the operating bias current is observed by finding Maximum Lyapunov exponent (MLE) from numerically and experimentally obtained time series of the CO output data. The technique of bias current variation could be applicable in any frequency range including Microwave band, in principle and it has important application potential in chaos based communication systems for encoding information bits into chaotic signals.

Keywords:
Bias current tuning, Chaotic Colpitts oscillator, Maximum Lyapunov exponent Nonlinear trans-conductance model of BJT, period doubling route to chaos.


References:

1. M P Kennedy, R Rovatti, G Setti, Chaotic Electronics in Telecommunications, Taylor and Francis, 2000.
2. L Elarson, L S Tsimring, J M Litt, Digital Communications using Chaos and nonlinear dynamics, Springer, 2006.

3. T Jiang, S Qiao, Z Shi, L Peng, J Huangtu, W Z Cui, W Ma and L Ran, "Simulation and Experimental evaluation of the Radar Signal performance of chaotic signals generated from a Microwave Colpitts oscillators”, Progress in Electromagnetic Research, PIER,2009, vol. 90, pp. 15-30.

4. Sarkar, B. C., C. Koley, A. K. Guin, and S. Sarkar, “Some numerical and experimental observations on the growth of oscillations in an X-band Gunn oscillator”, Progress In Electromagnetics Research B, 2012 vol. 40, pp. 325–341.

5. M P Kennedy, “Chaos in the Colpitts oscillator”, IEEE Trans on Circuits and Systems I: Fundamental Theory and Applications, vol. 41, no. 11, 1994 pp. 771-774.

6. G. M. Maggio, O. D. Feo, M.P. Kennedy, “Nonlinear Analysis of the Colpitts Oscillator and Applications to Design”, IEEE Trans on Circuits and Systems-I: Fundamental Theory and Applications,September, 1999 vol. 46,no. 9.

7. T Jiang, S Qiao, Z G Shi, L Ran, “Ambiguity Function of Chaotic Radar with Colpitts Oscillator”, PIERS Proceedings, Hangzhou, China, March 24-28, 2008.

8. Z. G. Shi and L X Ran, “Microwave Chaotic Colpitts Oscillator: Design, implementation and Applications” , Journal of Electromagnetic Waves and Applications,
vol. 20, no. 10, 2006 pp. 1335-1349.

9. G Z Shi, S Qiao, K S Chen et al, “Ambiguity functions of direct chaotic radar employing microwave chaotic Colpitts oscillator”, Progress In Electromagnetics Research, PIER vol. 77, 2007 pp. 1-14.

10. A Tamasevicus, G Mykolaitis, S Bumeliene, A Ceenys, A N Anagnostopoulos, E Lindberg, “Two stage chaotic Colpitts oscillator”, Electronics Letters,vol. 37, no. 9, 2001 pp. 549-551.

11. A Tamasevicus, S Bumelieneand E Lindberg, “Improved chaotic Colpitts oscillator for ultra high frequencies”,Electronics Letter, vol. 40, 2004 pp. 25-26,2004.

12. S Bumeliene, A tamasevicious, G Mykolaitis, A Bazaliauskas,E lindberg, “Numerical investigation and experimental demonstration of chaos from two stage Colpitts oscillator in the ultrahigh frequency range”, Nonlinear Dynamics, vol.44, 2006 pp. 167-172.

13. J Y Effa, B Z Essimbi, J M Ngudam, “Synchronization of improved chaotic Colpitts oscillators using nonlinear feedback control”, Nonlinear Dynamics, vol. 58, 2009 pp. 39-47.

14. Sprott, J. C., Chaos Data Analyzer Package, Web address: http://sport.physics.wise.edu/cda.htm

15. Jacob Millman, Microelectronics: Digital and Analog Circuits and Systems, Mc Grawhill International Student Edition, 1981.pp. 537-539

16. A S Sedra and K C Smith, Microelectronic Circuits, Oxford University Press, 2004. p470

17. M E Valkenberg, Network Analysis, 3rd edition, Prentice Hall of India, 2007.pp. 307-310.

12-18

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

M. Mohan Babu, G.K. Viswanadh

Paper Title:

Hydrochemical Studies along Coastal Areas of Nellore District, Andhra Pradesh

Abstract: The groundwater quality in coastal parts of Nellore district, Andhra Pradesh is discussed with emphasis on their utility to drinking and agricultural purposes. Soils in the study area are sandy and clayey soils. The quality of groundwater is in general potable with pH showing a trend towards alkalinity. The hydro geochemical facies found in the area is Na-Cl.

Keywords:
Agricultural Purpose, Coastal Aquifers, Drinking, Groundwater Quality, Nellore district


References:

1. Brown E, Shougated M.W and Fishman M. J.1974. Methods for collection and analysis of water samples for Dissolved Minerals and Gases. U. S. Dept. of Interior Book 5, 160 p.
2. Hem J.D., 1991. Study and interpretation of the Chemical characteristics of Natural Waters. U. S. Geol. Surv. Water Supply paper – 2254, Scientific Publ. Jodhpur, India, 264 p.

3. Robinove G.J., R. H. Longford and J.W. Broohart. 1958. Saline Water Resources of North Dakota, U.S. Geol. Surv. Water Supply Paper 1428, p. 72.

4. Twort A.C., R.C. Hoather and F.M. Law., 1974. Water Supply, Edward Arnold Pub. Ltd. London.

5. World Health Organization (WHO). 1971. International Standards for Drinking Water (3rd) edn.

6. ICMR. 1975. Manual of Standards of Quality for Drinking Water Supplies, Indian Council of Medical Research Spc. Rep. Ser. No. 44, p.27

7. ISI. 1983. Indian Standard Specifications for Drinking Water, ISI, 10500.

8. Crawford M.D., 1972. Hardness of drinking and cardiovascular disease, Proc. Natr. Sco., Vol. 31, pp. 347-353.

9. Davis S.N. and R. J. M. Dewiest., 1966. Hydrogeology, John Wiley and Sons Inc., New York., p. 463.

10. Todd D.K., 1980. Groundwater Hydrology, 2nd edn., John Wiley and Sons, New York, p. 535.

19-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ghazala Y.Hermiz, Mahdi H. Suhail,Suzan M.Shakouli

Paper Title:

Comparison of High Pressure DC-sputtering and Pulsed Laser Deposition of Superconducting Bi1.6Pb0.4Sr2Ca2Cu3O10+δ

Abstract: Superconducting Bi1.6Pb0.4Sr2Ca2Cu3O10+δ thin films were deposited on Si(111) substrates using two different techniques: dc-sputtering at high oxygen pressure and pulsed laser deposition. The structure and electrical properties of the obtained films were compared. The transition temperature Tc for bulk and films deposited by PLD is 102 K and 97 K respectively, while Tc of films prepared by dc sputtering is 90 K. The structural analysis was carried out by XRD on pellet sample and its annealed and as deposited films .The surface morphology of the films have been studied by using AFM.

Keywords:
DC-sputtering; PLD; Thin film superconductors


References:

1. K. Ishii” High-rate low kinetic energy gas-flow-sputtering system “.J. vac. Sci. Technol.A ,vol.7,pp.256-258, 1989.
2. T. Jung and A. West phal “Zirconia thin film deposition on silicon by reactive gas flow sputtering: the influence of low energy particle bombardment “-mat-Sc.Eng.A vol.140,pp.528-533,1991.
3. Kula, Witold, Roman Sobolewski, Joanna Gorecka and Stanislaw J. Lewandoski.Formation of the 110-K superconducting phase in Pb-doped Bi-Sr-Ca-Cu-O thin films. J. Appl.Phys., vol.70,no.6, pp.3171-3179, 1991.

4. Hiroki Wakamatsu, Takafumi Ogata, Naohiro Yamaguchi, Satoshi Mikusu, Kazuyasu Tokiwa, Tsuneo Watanabe, Kotaro Ohki, Kazuya Kikunaga, Norio Terada, Naoto Kikuchi, Yasumoto Tanaka and Akira Iyo.,Fabrication of (Cu, C)Ba2CuOy superconducting thin film by RF magnetron sputtering, J. Phys.: Conf. Ser. 43 289, 2006.

5. A.Guldeste, Effect of Deposition Conditions on Composition of rf-sputtered Bi-Sr-Ca- Cu-O thin films, Tr. J. of Physics, vol.22,pp.901-910,1998.

6. B. F.Kim, , J. Bohandy, T. E. Phillips, W. J. Green, E. Agostinelli, F. J. Adrian and K.Moorjani. Superconducting thin films of Bi-Sr-Ca-Cu-O obtained by laser ablation processing. Appl. Phys. Lett., vol.53,no.4, pp.321-323, 1988

7. A.N. Jannah, S.A. Halim, H. Abdullah, Superconducting Properties of BSCCO Thin Films by Pulsed Laser Deposition, European Journal of Scientific Research ,ISSN 1450-216X.29, no.4 , pp.438-446,2009.

8. R.M.Bowman,A.I.Ferguson and C.M.Pegrum,In situ fabrication of Y-Ba-Cu-O thin films by pulsed laser deposition .IEEE Trans.magnet,vol.27,pp.1459-1462,1991.

9. A.Ishii and T. Hatano: Preparation of high quality Bi2Sr2CaCu2O8+δ thin films on a MgO substrate by pulsed laser ablation and post-annealing recrystallization of films accompanying in-plane rotation of a and b axes Physica C,vol.340 ,p.173,2000.

10. P. B. Mozhaev, P. V. Komissinski, N. P. Kukhta, A. Kuhle, G. A. Ovsyannikov, J. L. Skov, “Comparison of high-pressure dc-sputtering and pulsed laser deposition of superconducting YBa2Cu3Ox thin films”, J. of Supercond. vol. 10, no. 3, p. 221-6, 1997.

11. A.Mead, M. Hase, I. Tsukada, K. Noda, S. Takebayashi and K. Uchinokura,. Physical properties of Bi2Sr2Can-1CunOy (n=1,2,3). Phys. Rev. B, vol.41,pp.6418-6430, 1990.

12. R. Latz, K. Michael and M. Scherer "high conducting large area indium tin oxide electrodes for displays prepared by DC magnetron sputtering", Jap .J. Appl.physics,vol.30,p.L149, 1991.

22-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Ginu Thomas, Rahul Vivek Purohit

Paper Title:

Hand Gesture Recognition via Covariance Method

Abstract: Gesture is a powerful form of communication among humans. This paper presents simple as well as effective method of realizing hand gesture recognition using Covariance Method. First an image database is created which constitutes various static hand gesture images. These images are a subset of American Sign Language (ASL). Preprocessing of the image is done so as to reduce the amount of noise present in the image. Eigen values of the Eigen vectors are calculated. A pattern recognition system is used to transform an image into feature vector i.e. Eigen image, which will then be compared with the trained set of gestures. The method used was successful to retrieve the correct match.

Keywords:
Covariance, Pattern Recognition


References:

1. Henrik Birk and Thomas Baltzer Moeslund, “Recognizing Gestures From the Hand Alphabet Using Principal Component Analysis”, Master’s Thesis, Laboratory of Image Analysis, Aalborg University, Denmark, 1996.
2. Simon Haykin, “Neural Networks: A Comprehensive Foundation”, 2nd edition Prentice Hall PTR ,1998

3. O. L. Mangasarian, David R. Musicant, “Lagrangian Support Vector Machines”, Journal of Machine Learning Research, 161-177 (2001)

4. Vikramaditya Jakkula,, “Tutorial on Support Vector Machine (SVM)” ,Vikramaditya Jakkula, School of EECS, Washington State University, Pullman, www.ccs.neu.edu/course/cs5100/resources/SVMTutorial.doc

5. D. P. Wiens, “Designs for approximately linear regression: Two optimality properties of uniform designs,” Stat. Probability Lett., vol. 12, pp. 217–221, 1991

6. A. Argyros, M. Lourakis, “Vision-Based Interpretation of Hand Gestures for Remote Control of a Computer Mouse”, Proc. of the workshop on Computer Human Interaction, 2006, pp. 40-51.

7. Y. Wu and T. S. Huang, “Hand modeling analysis and recognition for vision- based human computer interaction,” IEEE Signal Processing Magazine, Special
Issue on Immersive Interactive Technology, vol. 18, no. 3, pp. 51–60, 2001.

8. H. Xu, X. Hou, R. Su, and Q. Ni, “Real-time Hand Gesture Recognition System based on Associative Processors,” The 2nd IEEE International Conference on Computer Science and Information Technology, page 14-18, August 2009

9. H. Zhou, D. Lin, and T. Huang. Static hand gesture recognition based on local orientation histogram feature distribution model. In CVPRW '04: Proceedings of the 2004 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'04) Volume 10, page 161, Washington, DC, USA, 2004 ,IEEE Computer Society.

10. J. Triesch and C. von der Malsburg. A System for Person-Independent Hand Posture Recognition against Complex Backgrounds. IEEE, Transactions on Pattern Analysis and Machine Intelligence, Vol.232001, Nº. 12, December 2001.

11. K G Derpains, “A review of Vision-based Hand Gestures”, Internal Report, Department of Computer Science. York University, February 2004.

12. N. Yasukochi, A. Mitome and R. Ishii, “A Recognition Method of Restricted Hand Shapes in Still Image and Moving Image as a Man-Machine Interface,” IEEE Conference on Human System Interactions, page 306-310, 2008.

13. P. Premaratne and Q. Nguyen, “Consumer Electronics Control System based on Hand Gesture Moment Invariants,” Computer Vision IET, Vol. 1, page 35-41, March 2007.

14. Qing Chen , N.D. Georganas, E.M Petriu, “Real-time Vision based Hand Gesture Recognition Using Haar-like features”, IEEE Transactions on Instrumentation and Measurement -2007.

15. Q. Zhang, F. Chen and X. Liu, “Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background, “The 2008 International Conference on Embedded Software and Systems (ICESS2008), Page 338-343, July 2008.

16. Yikai Fang, Jian Cheng, Kongqiao Wang and Hanqing Lu, “Hand Gesture Recognition Using Fast Multi-scale Analysis”, Proc. of the Fourth International Conference on Image and Graphics, pp 694-698, 2007.

26-29

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Sivakami.P, Karthigaivel.R, Selvakumaran.S

Paper Title:

Voltage Control of Variable Speed Induction Generator Using PWM Converter

Abstract: The paper describes a simple control structure for a stand-alone Induction Generator (IG) used to operate under variable speeds. Fuzzy Logic Control (FLC) has been developed to automatically vary the duty-cycle of the PWM converter such that to maintain the DC-link voltage constant. The required reactive power for the variable-speed IG is supplied by means of the PWM converter and a capacitor bank to build up the voltage of the IG without the need for a battery and to reduce the rating of the PWM converter with the need for only three sensors. This proposed scheme has been used efficiently for variable speed wind or hydro energy conversion systems. The measurements of the IG system at various speeds and loads are given and show that this proposed system is capable of good DC voltages regulation. The proposed system has been simulated using MATLAB-SIMULINK software and verified the theoretical analysis.

Keywords:
DC power applications, Induction Generator (IG), Pulse Width-Modulation (PWM) converter, voltage regulation.


References:

1. Ahmed, T., Noro, O., Hiraki, E., and Nakaoka, M.: “Terminal voltage regulation characteristics by static VAR compensator for a three-phase self-excited induction generator”, IEEE Transa. Ind. Appli., 2004, 40, (4), pp. 978–988.
2. Suarez, E., and Bortolotto, G.: “Voltage-Frequency Control of A Self-Excited Induction generator”, IEEE Trans. Energy Convers., 1999, 14, (3), pp. 394–401.

3. Muljadi, E., and Lipo, T.A.: “Series compensated PWM inverter with battery supply applied to an isolated induction generator”, IEEE Trans. Ind. Appl., 1994, 30, pp. 1073–1082.

4. Marra, E.G., and Pomilio, J.A.: “Self-excited induction generator controlled by a VS-PWM bidirectional converter for rural applications”, IEEE Trans. Ind. Appl., 1999, 35, pp. 877–883.

5. Ojo, O., and Davidson, I.: “PWM-VSI inverter assisted stand-alone dual stator winding induction generator”. Conf. Rec. IEEE-IAS Annu. Meeting, October 1999, pp. 1573–1580.

6. Seyoum, D., Rahman, F., and Grantham, C.: “Terminal voltage control of a wind turbine driven isolated induction generator using stator orientated field contro”. IEEE APEC Conf. Rec., Miami Beach, 2003, vol. 2, pp. 846–852.

7. Naidu, M., and Walters, J.: “A 4-kW 42-V induction-machine-based automotive power generation system with a diode bridge rectifier and a PWM inverter”, IEEE Trans. Ind. Appl., 2003, 39, (5), pp. 1287–1293.

8. Leidhold, R., Garcia, G., and Valla, M.I.: “Induction generator controller based on the instantaneous reactive power theory”, IEEE Trans. Energy Convers.,
2002, 17, (3), pp. 368–373.

9. Ahmed, T., Nishida, K., and Nakaoka, M.: “A novel induction generator system for small-scale AC and DC power applications”. Proc. 36th Annual Power Electron. Specialists Conf., IEEE- PESC 05, 12–16 June 2005, vol. 1, pp. 250–256.

10. Tarek Ahmed, Katsumi Nishida, and Mutsuo Nakaoka,: “Advanced Control of PWM Converter With Variable-Speed Induction Generator”, IEEE transactions on industry applications, 2006, 42, (5), PP.631-701.

11. Timothy, and Ross, J,: “Fuzzy logic with engineering applications”. McGraw hill international editions, Electrical engineering series, New York,1989.

30-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Arti R.Bhore, N.D.Kale

Paper Title:

Reading Users’ Minds from Their Eyes: A Method for Implicit Image Annotation

Abstract: This paper explores the possible solutions for image annotation and retrieval by implicitly monitoring user attention via eye-tracking. Features are extracted from the gaze trajectory of users examining sets of images to provide implicit information on the target template that guides visual attention. Here Gaze Inference System (GIS) is a fuzzy logic based framework that analyzes the gaze-movement features to assign a user interest level (UIL) from 0 to 1 to every image that appeared on the screen. Because some properties of the gaze features are unique for every user, our user adaptive framework builds a new processing system for every new user to achieve higher accuracy. The generated UILs can be used for image annotation purposes; however, the output of this system is not limited as it can be used also for retrieval or other scenarios. The developed framework produces promising and reliable UILs where approximately 53% of target images in the users’ minds can be identified by the machine with an error of less than 20% and the top 10% of them with no error. As show in this paper that the existing information in gaze patterns can be employed to improve the machine’s judgment of image content by assessment of human interest and attention to the objects inside virtual environments.

Keywords:
Eye tracking framework, image annotation, image retrieval, Gaze Interface System.


References:

1. L. Kozma, A. Klami, and S. Kaski, “Gazir: Gaze-based zooming interface for image retrieval” in Proc. 2009 Int. Conf. Multimodal Interfaces, New York, 2009, pp. 305–312, ser. ICMI-MLMI’09, ACM.
2. SHYNI.G1,SHANMUGAPRIYA.K2 “An Adaptive Fuzzy Logic Based Technique To Read User’s Mind for Image Annotation” (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013)

3. M. Ames and M. Naaman,” Why we tag: motivations for annotation in mobile and online media“ In Proc. of CHI ’07, pages 971–980, SanJose, California, USA, 2007.

4. R. Shi, H. Feng, T.-S. Chua and C.-H Lee, “An adaptive image content representation and segmentation approach to automatic image annotation in Image and Video Retrieval” ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2004, vol. 3115, pp. 1951–1951.

5. H.Ma, J. Zhu, M.-T. Lyu, and I. King, “Bridging the semantic gap between image contents and tags” IEEE Trans. Multimedia, vol.12,no.5, pp.462–473,2010.

6. J. Fan, Y. Gao, H. Luo, and R. Jain, “Mining multilevel image semantics via hierarchical classification” IEEE Transactions on Multimedia, 10 (2):167–187, 2008.

7. A. L. Yarbus, “Eye Movements and Vision” New York: Plenum,1967, translated from Russian by Basil Haig,, Original Russian edition published in Moscow in 1965..

8. “Gazir: Gaze-based Zooming Interface for Image Retrieval” by laszlokozma, Artokl, Samuelkaski, Department of Information and Computer science, Helsinki University of Technology Finland.J. Jones. (1991, May 10). Networks (2nd ed.)

36-38

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Bilal Abdullah Nasir

Paper Title:

Design of Micro - Hydro - Electric Power Station

Abstract: Micro-hydro-electric power is both an efficient and reliable form of clean source of renewable energy. It can be an excellent method of harnessing renewable energy from small rivers and streams. The micro-hydro project designed to be a run -of-river type, because it requires very little or no reservoir in order to power the turbine. The water will run straight through the turbine and back into the river or stream to use it for the other purposes. This has a minimal environmental impact on the local ecosystem.
The design procedure of micro-hydro power plant was implemented by a Matlab Simulink computer program to calculate all the design parameters. The choice of the turbine type depending mainly on the site head and flow rate. The turbine power and speed were directly proportional with the site head, but there were specific points for maximum turbine power and speed with the variation of the site water flow rate. The head losses in the penstock could range from 5 to 10 percent of the gross head, depending on the length of the penstock, quantity of water flow rate and its velocity. The turbine efficiency could range from 80 to 95 percent depending on the turbine type, and the generator efficiency about 90 percent.
The design study showed that construction of micro-hydro-electric project was feasible in the project site and there were no major problems apparent at the design and implementation stages of the micro-hydro-electric power plant.

Keywords:
micro-hydro-electric power plant, design and implementation, hydro-turbines.


References:

1. Mohibullah, M. A. R. and MohdIqbal Abdul Hakim: "Basic design aspects of micro-hydro-power plant and its potential development in Malaysia", National Power and Energy Conference (PECon) Proceedings, Kuala Lumpur, Malaysia, 2004.
2. http:// www.microhydropower.net/

3. http:// www.alternative-energy.info/micro-hydro-power-pros-and-cons/

4. CelsoPenche: "Layman's guidebook on how to develop a small hydro site", Published by the European Small Hydropower Association (ESHA), Second edition, Belgium, June, 1998.

5. Dilip Singh: "Micro-hydro-power", Resource Assessment Handbook, An Initiative of the Asian and Pacific Center for Transfer of Technology, September, 2009.

6. European Small Hydropower Association (ESHA): "Energy recovery in existing infrastructures with small hydropower plants", Sixth Framework Programme, Publication by Mhylab, Switzerland, June, 2010.

7. Khurana, S. and Anoop Kumar: "Small hydro power – A review", International Journal of Thermal Technologies, Vol. 1, NO. 1, pp. 107-110, December, 2011.

8. Wazed, M. A. and Shamsuddin Ahmed: "Feasibility study of micro-hydro-electric power generation at Sapchari Waterfall, Khagrachari, Bangladesh", Journal of Applied Science, Vol. 9, No. 2, pp. 372-376, 2009.

9. Bard Jackson: "State-of-the-art in mini-hydro electrical design", Renewable Energy Review Journal, Vol. 4, No. 2, pp. 47-55, December, 1982.

10. Sadrul Islam, A. K. M. and et al.: "Appropriate low head micro-hydro systems for Bangladesh", Second International Conference on Electrical and Computer
Engineering (ICECE), Dhaka, Bangladesh, pp. 216-219, 26-28December, 2002.

11. Razak, J. A. and et al.: "Application of cross-flow turbine in off-grid Pico-hydro renewable energy systems", Proceeding of the American-Math 10 Conference on Applied Mathematics, pp. 519-526, 2010.

12. Khurana, S. and Hardeep Singh: "Effect of cavitation on hydraulic turbines-A review", International Journal of Current Engineering and Technology, Vol. 2, No. 1, pp. 172-177, March, 2012.

13. Okonkwo, G. N. and Ezeonu, S. O.: "Design and installation of a mini hydro- electric power plant", Scholarly Journal of Engineering Research, Vol. 1, No. 1, pp. 19-24, April, 2012.

14. Chennani, M., Salhi, I. and Doubabi, S.: "Study of the regulation of a micro-hydro-electric power plant prototype", International Scientific Journal for Alternative Energy and Ecology, Vol. 5, No. 61, pp. 79-84, 2008.

15. Pandey, V.: "Feasibility study of micro-hydro-power in Nepal", Research report, Nepal Engineering College, Bhaktapur, 2011.

39-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Ojasvi Bhatia, Yogesh Kumar Gupta

Paper Title:

Mitigating Phase Noise Effects in Orthogonal Frequency Division Multiplexing System Using Phase Locked Loop

Abstract: Orthogonal Frequency Division Multiplexing System are better suited to the today’s generation 3G networks and upcoming 4G networks in terms of bandwidth efficiency due to overlapping of frequency bands, high speed data transfer due to parallel data transfer, maintaining high quality of wireless link even under multipath conditions due to low symbol rate it minimizes ISI effects. The application of channel codes like convolution codes further reduces the Bit Error Rate and improves the link reliability. Although OFDM systems shows superior performance over single carrier and FDM system but there is one disadvantage that is the over sensitivity to Phase noise of the local oscillator which hinders the orthogonality of the sub carriers and increases inter carrier interference. OFDM system performance is degraded due to phase noise. Accordingly going deep into the various parameters of the OFDM system it was observed that Phase Locked Loop (PLL) could better control the phase noise problem in comparison to free running oscillator. It is deployed at the downlink side of incoming signal received from Antenna generating its own local frequency slightly higher than the incoming frequency to generate IF signal (after mixing the incoming and the local frequency) for further processing. Accordingly to examine closely the other aspects of PLL in relation to Free Running Local Oscillator various parameters of PLL in relation to OFDM system were studied in detail.

Keywords:
Bit Error Rate; Signal to Noise Ratio; Phase Locked Loop; Power spectral densitys.


References:

1. Denis Petrovic, Wolfgang Rave, Gerhard Fettweis,”Effects of Phase Noise on OFDM Systems With and Without PLL: Characterization and Compensation” IEEE Trans. On Communication, vol. 55, no. 8, August 2007.
2. Denis Petrovic, Wolfgang Rave, Gerhard Fettweis,” Performance Degradation of Coded-OFDM due to Phase Noise” Technische University¨at Dresden, Vodafone Chair Mobile Communications Systems, D-01062 Dresden, Germany-2011

3. Ville Syrjälä, Mikko Valkama, Nikolay N. Tchamov, and Jukka Rinne, “Phase Noise Modeling and Mitigation Techniques in OFDM Communications Systems”, 2009 IEEE.

4. Pramod Jacob Mathecken , “Performance Analysis of OFDM With Wiener Phase Noise and Frequency Selective Fading Channel “AALTO UNIVERSITY, School of Science and Technology, Faculty of Electronics, Communications and Automation Department of Signal Processing and Acoustics -2011

5. Yun-Soo ko, Seong-Min Kim, Kwang-Chun Lee,” PLL Apparatus for OFDM System having variable Channel Bands and Operating Method Thereof” , United States Patent No: US 7,612,618 B2, Nov,3, 2009

6. Tiejun (Ronald) Wang, John G. Proakis, and James R. Zeidler, “Techniques for Suppression of Intercarrier Interference in OFDM Systems” Center for Wireless Communications University of California, San Diego, IEEE Communications Society / WCNC 2008

7. Wu, and Y. Bar-Ness, “OFDM systems in the presence of phase noise:consequences and solutions,” IEEE Transactions on Communications, Vol. 52, No. 11, pp. 1988-1997, November 2004.

8. Q. Zou, A. Tarighat, and A. H. Sayed, “Compensation of phase noise in OFDM wireless systems,” IEEE Translations on Signal Processing, Vol. 55, No. 11, November 2007.

9. G. Armada and M. Calvo, “Phase noise and sub-carrier spacing effects on the performance of an OFDM communication system,” IEEE Commun. Lett., vol. 2, no. 1, pp. 11–13, Jan. 1998.

10. Keng Yang, “Phase Noise Profile aid system testing”, Microwave/Millimeter Technologies, www.rfdesign.com, Nov-2005

11. T. Pollet, M. van Bladel, and M. Moeneclaey, “BER sensitivity of OFDM systems to carrier frequency offset and Wiener phase noise” IEEE Trans. on
Communications, vol. 43, pp. 191-193, Feb. 1995.

12. S. M. Kay, “Fundamentals of statistical signal processing”, Volume 1, Estimation theory. Prentice Hall, 1993

48-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Srikanth Mandarapu, Sreedhar Lolla, Madhu Chandra Popuri

Paper Title:

Dynamic Simulation of Robust Sensorless Speed Measurement in IM Using MRAC against Variations in Stator Resistance and Rotor-Time Constant

Abstract: This paper proposes a Model Reference Adaptive Control (MRAC) which makes use of both back EMF and Reactive Power methods for sensorless rotor speed measurement against variations in rotor time constant in addition to the variations in stator resistance. The adjustable model makes use of these two methodologies eliminates the need to calculate rotor flux, thus avoiding the requirement of synchronously rotating reference angle and the stable speed can also be estimated even at low speeds. The effectiveness of the proposed model is proved with extensive computer simulation.

Keywords:
back emf method, reactive power method, Rotor Speed, Sensorless Control, Stator Resistance.


References:

1. Hassan K. Khalil, Elias G. Strangas, and Sinisa Jurkovic, “Speed Observer and Reduced Nonlinear Model for Sensorless Control of Induction Motors” IEEE Transactions on Control Systems Technology, vol. 17, No. 2, March 2009, pp. 327–339.
2. Peter Vas, “Sensorless Vector and Direct Torque Control”, New York: Oxford University Press, 1998.

3. Bimal K. B o s e, “Modern Power Electronics and AC Drives”, Prentice-Hall India, 2008.

4. Joachim Holtz, “Sensorless control of induction motor drives”, Proceedings of Vol. 90, No. 8, Aug. 2002 pp 1359 – 1394.

5. M. Srikanth, Madhu Chandra P., G. Manofer Ali, Arun Kumar Rath, “Robust MRAC Based Sensorless Rotor Speed Measurement against Variations in Stator Resistance Using Combination of Back EMF and Reactive Power Method” International Journal of Multidisciplinary Educational Research, Volume 1, Issue 3, August 2012, pp 38-46.

6. A. M. El-Sawy, Yehia S. Mohamed and A. A. Zaki, “Stator Resistance and Speed Estimation for Induction Motor Drives as Influenced by Saturation”, The Online Journal on Electronics and Electrical Engineering (OJEEE), Vol. 3 – No. 2, pp 416 - 424.

7. A.Venkadesan, S.Himavathi and A.Muthuramalingam, “Novel SNC-NN-MRAS Based Speed Estimator for Sensor-Less Vector Controlled IM Drives,” International Journal on Electrical and Electronics Engineering5:2 2011, pp 73 – 78.

8. Shady M. Gadoue, Damian Giaouris, and John W. Finch, “MRAS Sensorless Vector Control of an Induction Motor Using New Sliding-Mode and Fuzzy-LogicAdaptation Mechanisms,” IEEE J. Quantum Electron., submitted for publication.

52-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Aruna.D.Mane, Sirkazi Mohd Arif, Shaikh Sehzad, Shaikh Sohail

Paper Title:

Solar Panel Tracking System for GSM Based Agriculture System

Abstract: Solar modules are devices that cleanly convert sunlight into electricity and offer a practical solution to the problem of power generation in remote areas. This project involves the development of an Automatic Solar radiation tracker that could be further used for agriculture purpose, making use of a GSM Module as the control system. Fossil fuels are a relatively short-term energy source consequently; the uses of alternative sources such as solar energy are becoming more wide spread. To make solar energy more viable, the efficiency of solar array systems must be maximized. A feasible approach to maximizing the efficiency of solar array systems is sun tracking. Proposed in this paper is a system that controls the movement of a solar array so that it is constantly aligned towards the direction of the sun. The solar tracker designed and constructed in this paper offers a reliable and affordable method of aligning a solar module with the sun in order to maximize its energy output. Automatic Sun Tracking System is a hybrid hardware/software prototype, which automatically provides best alignment of solar panel with the sun, to get maximum output (electricity). The system will be implemented for irrigation purpose wherein the irrigation system will be controlled using a GSM technology

Keywords:
GSM, Solar Panel, Microcontroller.


References:

1. Islam, N.S. Wasi-ur-Rahman, M. “An intelligent SMS- based remote Water Metering System”. 12th International Conference on Computers and Information Technology, 2009, 21-23 Dec. 2009, Dhaka, Bangladesh. International Conference on Robotics, Vision, Information and Signal Processing 2007 (ROVISP2007), Penang, 28 – 30 November 2007.
2. Malik Sikandar Hayat Khiyal, Aihab Khan, and Erum Shehzadi. “ SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security”, Issues in Informing Science and Information Technology. Vol. 9. pp. 887 – 894. 2009.

56-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Vaibhav Sharma, Ankit Verma

Paper Title:

Fault Diagnosis of Analog Circuits Using dc Approach

Abstract: Fault diagnosis of circuit is a key problem of theory of circuit networks and especially with the development of electronic technique at high speed, the increasing complexity of electronic equipment and altitudinal integration of electronic circuit, it is of importance in particular. Testing and diagnosis of electronic devices are fundamental topics in the development and maintenance of safe and reliable complex systems. In both cases, the attention is focused on the detection of faults affecting a subsystem whose appearance generally impairs the global system safety and performance. In a complete fault diagnosis procedure, fault detection and isolation must be carried out together; the effectiveness of the procedure depends on fault detection and isolation performance as well as the complexity of the test phase. While there are established techniques to obtain an automatic diagnosis for a digital circuit, the development of an effective automated diagnosis tool for analog or mixed circuits is still an open research field. For more than two decades, the subject of fault location in analog circuits has been of interest to researchers in circuits and systems. In recent years this interest has intensified and a number of promising results has emerged.

Keywords:
In a complete fault diagnosis procedure, fault detection and isolation must be carried out together;


References:

1. J. W. Bandler and A. E. Salama, “Fault diagnosis of analog circuits,” Proc. ieee, vol. 73, pp. 1279–1325, Aug. 1985.
2. Walter Hochwald and Jhon D. Bastian “A dc approach for analog fault dictionary determination”,ieee transactions on circuit & system, vol.26,pp.523-529, July 1979.

3. Ying Deng', Yigang He' and Yichuang Sun “Fault diagnosis of analog circuits with tolerances using artificial neural networks”, ieee, pp.292-295, 2000.

4. Cesare Alippi, Marcantoonio Catelani, Ada Fort and Marco Mugnaini“SBT soft fault diagnosis in analog electronic circuits: a sensitivity-based approach by randomized algorithms”, ieee transactions on instrumentation and measurement, vol. 51, pp.1116-1125, Oct 2002.

5. Li Tingjun1, Jiang Zhongshan1, Zhao Xiuli1, Huangqilai1 Zhang Ying 2, “Fault diagnosis of analog circuit based on multi-layer neural networks”, icemi, pp.331-334, 2007.

6. Qu Haini, Xu Weisheng, Yu Youling “Design of neural network output layer in fault diagnosis of analog circuit”, icemi, pp.639-642, 2007.

7. Alice. McKeon Antony Wakeling,” Fault diagnosis in analogue circuits using ai techniques”, International test conference, pp.118-123, 1989

8. K. L. Butler, J. A. Momoh, “ A neural net based approach for fault diagnosis in distribution networks”, ieee , pp.1275-1278, 2000.

9. V. C. Prasad and N. Sarat Chandra Babu “Selection of Test Nodes for Analog Fault Diagnosis in Dictionary Approach” ieee transactions on instrumentation and
measurement, vol. 49, pp. 1289-1297, Dec 2000.

10. Francesco Grasso, Antonio Luchetta, Stefano Manetti, and Maria Cristina Piccirilli “A method for the automatic selection oft test frequencies in analog fault diagnosis” ieee vol. 56, pp. 2322-2329, Dec 2007.

60-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Bhavana Sharma, Shaila Chugh, Vishmay Jain

Paper Title:

Investigation of Adaptive Multipath Routing For Load Balancing In MANET

Abstract: In mobile ad hoc network (MANET), congestion is one of the most important limitations that affect the performance of the whole network. Multi-path routing protocol can balance and share the load better than the single path routing protocol in ad hoc networks, thereby reducing the congestion possibility by dividing the traffic in alternative paths. The performance of the network can be improved by using a load balancing mechanism. Such a mechanism transfers load from overloaded nodes to under loaded nodes. The objective of multipath routing is to improve the reliability and throughput and favors load balancing. Multipath routing allows the establishment of multiple paths between a pair of source and destination node. It is typically proposed in order to increase the reliability of data transmission or to provide load balancing and has received more and more attentions. In this paper, some of the congestion removing and load balancing routing schemes have been surveyed. The relative strengths and weaknesses of the protocols have also been studied which allow us to identify the areas for future research.

Keywords:
MANET, multipath routing, load balance and sharing.


References:

1. Z. Haas, M. Pearlman, 1997 “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, Work in Progress, Internet Draft, MANET Working Group.
2. I. F. Akyildiz et al, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, March 2002.

3. D.B. Johnson, D.A.Maltz and Y.Hu,“The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Internet Draft: draft-ietf-manet-dsr-06.txt, November 2001.

4. C.E.Perkins, E.M.Royer and S.R. Das, “Ad hoc On-Demand Distance Vector Routing,” Internet Draft: draft-ietf-manet-aodv-09.txt, November 2001.

5. D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks”, Mobile computing, chapter 5, Kluwer Academic, August 1996

6. M. R. Pearlman, Z. J. Haas, “Improving the performance of query-based routing

7. L. Wang, et al., “Multipath source routing in wireless ad hoc network” in Canadian Conf. Elec. Comp. Eng., vol. 1, 2000, pp. 479-83.

8. A. Nasipuri and S.R. Das, “On-Demand Multipath Routing for Mobile Ad Hoc Networks,” Proceedings of IEEE ICCCN’99, Boston, MA, Oct. 1999, pp. 64-70.

9. K. M. Mahesh, and S.R. Das “On-demand Multipath Distance Vector Routing in Ad Hoc Networks”.Proceedings of IEEE ICNP, November 2001.

10. K. M. Mahesh, and S.R. Das “On-demand Multipath Distance Vector Routing in Ad Hoc Networks”.Proceedings of IEEE ICNP, November 2001.

11. P.Periyasamy and Dr.E.Karthikeyan,“Performance Evaluation Of AOMDV Protocol Based On Various Scenario And Traffic Patterns”, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.1, No.6, pp. 33-48, December 2011.

12. Shameem Ansar. A, Prabaharan. P, Maneesha V Ramesh Rekha. P, "DVM based Multipath Routing in MANET for Different Scalable and Adaptive Environment" 2012 International Conference on Data Science & Engineering (ICDSE), 2012 IEEE, pp.-187-193.

13. Mohannad Ayash, Mohammad Mikki, Kangbin Yim "Improved AODV Routing Protocol to Cope With High Overhead in High Mobility MANETs", 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE 2012,pp.-244-251.

14. L. Reddeppa Reddy, S.V. Raghavan "SMORT: Scalable multipath on-demand routing for mobile ad hoc networks" in proceedings of Ad Hoc Networks, 2007, pp. 162–188.

15. Georgios Parissidis, Vincent Lenders, Martin May, and Bernhard Plattner,"Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative
Comparison" NEW2AN 2006, LNCS 4003, Springer-Verlag Berlin Heidelberg 2006, pp. 313–326.

16. R. Raja Kishore, B. Kalyani, K. Rajkumar,"Multipath Dynamic Source Routing Protocol for Mobile Ad hoc Networks", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9, November- 2012 ISSN: 2278-0181.

17. Xiaoyan Hong, Mario Gerla and Hanbiao Wang,"Load Balanced, Energy-Aware Communications for Mars Sensor Networks", NASA JPL under IPN-ISD Technology Task Project: “Ad-hoc Network Protocols”.2002 IEEE.

18. S. Vidhya Reddy, K.Srimathi, "Route Resurgence By Congestion Endurance (RRCE): A Strategic Routing Topology For Mobile Ad Hoc Networks" International Journal Of Scientific & Technology Research Volume 1, Issue 11, December 2012

19. Marc R. Pearlman,Zygmunt J. Hass, Peter Sholander, Siamak S.Tabriji," On the impact of alternate path routing for load balancing in mobile ad hoc networks", Mobihoc 00 Proceedings of the first ACM international symposium om mobile Ad hoc Network & computing, pp.3-10.

20. Amjad Ali, Wang Huiqiang “Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks “, Proceeding of Internationl MultiConference of Enginners Computer Scientists 2012 Vol I, March 2012 ,Hong Kong.

21. Sivakumar, P. and K. Duraiswamy, “A QoS routing protocol for mobile ad hoc networks based on the load distribution”, Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp: 1- 6, 2011. Raj bhupinder Kaur, Ranjit Singh Dhillon, Harwinder Singh Sohal, Amarpreet Singh Gill “Load Balancing of Ant Based Algorithm in MANET”, IJCST, Vol. 1, Issue 2, ISSN : 0976 - 8491, December 2010.

22. Tuan Anh Le, Choong Seon Hong, Member, IEEE, Md. Abdur Razzaque et. al. “An Energy-Aware Congestion Control Algorithm for Multipath TCP” IEEE Communications Letters, Vol. 16, No. 2, February 2012.

23. Jingyuan Wang, Jiangtao Wen et. al. in his work titled “An Improved TCP Congestion Control Algorithm and its Performance” 2011 IEEE.

24. M. Ali, B. G Stewart et. al. In his work titled “Multipath Routing Backbones for Load Balancing in Mobile Ad Hoc Networks” 978-1-4673-0784-0/12, 2012 IEEE.

25. S. Karunakaran, P. Thangaraj, “A cluster based congestion control protocol for mobile ad hoc networks”, International Journal of Information Technology and
Knowledge Management, Volume 2, No 2, pp. 471-474, 2010.

26. S.Venkatasubramanian, N.P.Gopalan, “A quality of service architecture for resource provisioning and rate control in mobile ad hoc network”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol 1, No 3, September 2010.

27. K. Chen, K. Nahrstedt, N. Vaidya, "The Utility of Explicit Rate-Based Flow Control in Mobile Ad Hoc Networks", Proc. IEEE Wireless Communications and Networking Conference (WCNC 04), pp 1921-1926, 2004.

28. K. C. Rahman, S. F. Hasan, “ Explicit Rate-based Congestion Control for Multimedia Streaming over Mobile Ad hoc Networks”, International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol 10, No 04, 2010.

29. H. Zhai, X. Chen, Y. Fang, “Rate-Based Transport Control for Mobile Ad Hoc Networks”, IEEE Wireless Communications and Networking Conference, pp 2264 – 2269, Vol 4, 2005.

30. E. Lochin, G. Jourjon, S. Ardon P. Senac, “Promoting the Use of Reliable Rate Based Transport Protocols: The Chameleon Protocol”, International Journal of
Internet Protocol Technology, Vol 5, Issue 4, pp 175-189, March 2010.

31. Y. Xu, Y. Wang, C.S. Lui, D-M. Chiu, “Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks”, 5th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks and Workshops (WiOpt), pp 1 – 10, 2007.

32. Y. Xu, Y. Wang, C.S. Lui, D-M. Chiu, “Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks”, 5th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks and Workshops (WiOpt), pp 1 – 10, 2007.

33. Yuanyuan ZOU,Yang TAO “A Method of Selecting Path Based on Neighbor Stability in Ad Hoc Network” This work is supported by chongqing science and technology key research projects (No.2009AB2245) , 2012 IEEE.

34. Ashish Bagwari, Raman Jee et al. “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International Conference on Communication Systems and Network Technologies, DOI 10.1109/CSNT.2012.76, 2012 IEEE.

35. Vishnu Kumar Sharma and Dr. Sarita Singh Bhadauria “Mobile Agent Based Congestion Control Using Aodv Routing Protocol Technique For Mobile Ad-Hoc Network” International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012, DOI : 10.5121/ijwmn.2012.4220

65-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Shweta Malhotra, Chander Kant Verma

Paper Title:

A Hybrid Approach for Securing Biometric Template

Abstract: Biometrics authentication provides highest level of security. It allows the user to get authenticated using his or her own physical or behavioral characteristics. Unimodal biometrics have several problems such as noisy data, spoof attacks etc. which cause data insecure. To overcome these problems multimodal biometrics is used. Multimodal biometrics allows fusing two or more characteristics into single identification. It leads to more secure and accurate data. In this paper, we have combined two characteristics –one physical and one behavioral and further a key is added to the template to make it more secure. The template is finally stored in database.

Keywords:
Biometric template protection, multimodal biometrics, biometric cryptosystem, hybrid approach for biometric template protection.


References:

1. M. Deriche, “Trends and Challenges in Mono and Multi Biometrics,” in Proc. of Image Processing Theory, Tools and Application (IPTA), Sousse, pp.1-9, 23-26 Nov 2008.
2. M. S. Ahuja and S. Chabbra, “A Survey of Multimodal Biometrics”, International Journal of Computer Science and its Applications, pp. 157-160.

3. A. Ross and A. Jain, “Information Fusion in Biometrics,” Journal of Pattern Recognition Letters, vol. 24, pp. 2115-2125, 2003.

4. Signal & Image Processing: An International Journal (SIPIJ) Vol.4, No.1, February 2013 DOI: 10.5121/sipij.2013.4105 57 AN OVERVIEW OF MULTIMODAL BIOMETRICS P. S. Sanjekar and J. B. Patil.

5. A.ross, K.nandakumar, and A.K. jain. Handbook of multibiometrics, springer, newyork, USA,ist edition, 2006.

6. S. Hariprasath and T. Prabakar, “Multimodal Biometric Recognition using Iris Feature Extraction and Palmprint Features,” in Proc. of International Conference on Advances in Engineering, Science and Management (ICAESM), Nagapattinam, pp. 174-179, 30-31 March 2012.

7. A. Kumar, M. Hanmandlu and S. Vasikarla, “Rank Level Integration of Face Based Biometrics,” in Proc. of Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, pp. 36-41, 16-18 April 2012.

8. S. Jahanbin, Hyohoon Choi and A. Bovik, “Passive Multimodal 2D+3D Face Recognition using Gabor Features and Landmark Distances,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 4, pp. 1287-1304, Dec. 2011.

9. T. Murakami and K. Takahashi, “Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion,” in Proc. Of International Joint Conference on Biometrics (IJCB), USA, ,pp. 978-985, 2011.

10. Y. Zheng and A. Elmaghraby, “A Brief Survey on Multispectral Face Recognition and Multimodal Score Fusion,” in Proc. of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, pp. 543-550, 14-17 Dec 2011.

11. N. Gargouri Ben Ayed, A. D. Masmoudi and D. S. Masmoudi, “A New Human Identification based on Fusion Fingerprints and Faces Biometrics using LBP and GWN Descriptors,” in Proc. Of 8th International Multi-Conference on Systems, Signals and Devices (SSD), Sousse, pp. 1-7, 22-25 March 2011.

12. P. K. Mahesh and M. N. S. Swamy, “A Biometric Identification System based on the Fusion of Palmprint and Speech Signal,” in Proc. of International Conference on Signal and Image Processing (ICSIP), Chennai, pp. 186-190, 15-17 Dec. 2010.

13. A.Yazdanpanah, K. Faez and R. Amirfattahi, “Multimodal Biometric System using Face, Ear and Gait Biometrics,” in Proc. of 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), Kuala Lumpur, pp. 251-254, 10-13 May 2010.

14. F. A. Fernandez, J. Fierrez and D. Ramos, “Quality-Based Conditional Processing in Multi- Biometrics: Application to Sensor Interoperability,” IEEE Trans. On Systems, Man, And Cybernetics—Part A: Systems and Humans, vol. 40, no. 6, pp.1168-1179, Nov. 2010.

15. A.Cheraghian, K. Faez, H. Dastmalchi and F. Oskuie, “An Efficient Multimodal Face Recognition Method Robust to Pose Variation,” in Proc. of IEEE Symposium on Computers & Informatics (ISCI), Kuala Lumpur, pp. 431-435, 20-23 March 2010.

16. Bhattacharjee, M. Saggi, R. Balasubramaniam, A. Tayal and Dr. A. Kumar, “A Decision Theory Based Multimodal Biometric Authentication System Using Wavelet Transform,” in Proc. of the 8th International Conference on Machine Learning and Cybernetics , Baoding, pp. 2336-2342, 12-15 July 2009.

17. M. Monwar and M. Gavrilova, “Multimodal Biometric System using Rank-Level Fusion Approach,” IEEE Trans. On Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 39, no. 4, pp. 867-878, August 2009.

18. P. Kartik, R. V. S. S. Vara Prasad and S. R. Mahadeva Prasanna, “Noise Robust Multimodal Biometric Person Authentication System using Face, Speech and Signature Features,” in Proc. Of Annual IEEE India Conference (INDICON), Kanpur, vol. 1, pp. 23-27, 11-13 Dec. 2008.

19. F. Yang and Baofeng M. A, “Two Models Multimodal Biometric Fusion Based on Fingerprint, Palm-Print and Hand-Geometry,” in Proc. of 1st International Conference on Bioinformatics and Biomedical Engineering (ICBBE), Wuhan, pp. 498-501, 6-8 July 2007.

20. Xiao-Na Xu, Zhi-Chun Mu and Li Yuan, “Feature-Level Fusion Method based on KFDA for Multimodal Recognition Fusing Ear and Profile Face,” in Proc. of International Conference on Wavelet Analysis and Pattern Recognition, Beijing, vol. 3, pp. 1306-1310, 2007.

21. S. Ribaric and I. Fratric, “Experimental Evaluation of Matching-Score Normalization Techniques on Different Multimodal Biometric Systems,” in Proc. of IEEE Mediterranean Electrotechnical Conference, Malaga, pp. 498-501, 16-19 May, 2006.

22. A.Jain, N. Karthik and A. Ross, “Score Normalization in Multimodal Biometric Systems,”Journal of Pattern Recognition, vol. 38, no.12, pp. 2270-2285, 2005.

23. Ross, A. K. Jain & J.A. Riesman, Hybrid fingerprint matcher, Pattern Recognition, 36, pp. 1661–1673, 2003

24. M. Ammar, T. Fukumura, & Y. Yoshida, A new effective approach for off-line verification of signature by using pressure features. 8th International Conference
on Pattern Recognition, pp. 566-569, 1986

25. M. A. Ismail, S. Gad, Off-line Arabic signature recognition and verification, Pattern Recognition, 33 pp. 1727-1740, 2000

26. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proc. of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.

27. A Survey on Biometric Cryptosystems and Cancelable Biometrics by Christian Rathgeb and Andreas Uhl.

72-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Y.Ch Sekhar, P.S.Srinivas Babu

Paper Title:

Hardware Modeling of VTD- Cache for fine Grain Voltage Scaling

Abstract: This proposed title of this work allows us to design Variation Trained Drowsy Cache for significant saving of power consumption. When addressing reliability issues. The novel and modular architecture of the VTD – Cache and its associated controller makes it easy to implemented in memory compilers with a small area and power overhead. With proper selection of scaled voltage levels and hort training period the proposed architecture allows micro tuning of the cache and also this architecture variation of supply voltage settings. We model this scheme on FPGA core.

Keywords:
Cache, drowsy cache, static random access memory (SRAM), AXI protocol.


References:

1. A. Sasan, H. Homayoun, A. Eltawil, and F. J. Kurdahi, “Process variation aware SRAM/cache for aggressive voltage-frequency scaling,” in Proc. DATE, pp. 911–916.
2. A. Sasan (Mohammad AMakhzan), A. Khajeh, A. Eltawil, and F. Kurdahi, “Limits of voltage scaling for caches utilizing fault tolerant techniques,” in Proc. ICCD, pp. 488–495.

3. M. A. Lucente, C. H. Harris, and R. M. Muir, “Memory system reliability improvement through associative cache redundancy,” in Proc. IEEE Custom Integr. Circuits Conf., May 1990, pp. 19.6/1–19.6/4.

4. Z. Bo, D. Blaauw, D. Sylvester, and K. Flautner, “The limit of dynamic voltage scaling and insomniac dynamic voltage scaling,” IEEE Trans.Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 11, pp. 1239–1252,Nov. 2005.

5. K. Flautner, K. Nam Sung, S. Martin, D. Blaauw, and T. Mudge, “Drowsy caches: Simple techniques for reducing leakage power,” in Proc. 29th Annu. Int. Symp. Comput. Arch. , 2002, pp. 148–157.

6. H. Zhou, M. C. Toburen, E. Rotenberg, and T. M. Conte, “Adaptive mode-control: A static-power-efficient cache design,” in Proc. Int. Conf. Parallel Arch. Compilation Techn., 2001, pp. 61–70.

7. A. Agarwal, B. C. Paul, S. Mukho padhyay, and K. Roy, “Process variation in embedded memories: Failure analysis and variation aware architecture,” IEEE Trans. Solid-State Circuits, vol. 40, no. 9, pp. 1804–1814, Sep. 2005.

8. S. Borkar, “Design challenges of technology scaling,” IEEE Micro, vol., no. 4, pp. 23–29, Jul.–Aug. 1999. 10. Y.-F. Tsai, D. Duarte, N. Vijaykrishnan, and M. J.
Irwin, “Implications of technology scaling on leakage reduction techniques,” in Proc. Des.Autom. Conf., Jun. 2003, pp. 187–190 .

9. K.Kuhn, “32nm SOC process, getting many things right at once, ” Mar. 26,2010. [online]. Available:

10. http://blogs.intel.com/technology/2010/03/32nm_soc_process_an_analogy_wi.php

77-80

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

H. B. Kekre, Dhirendra Mishra, Prasad Rangnekar, Raja Ketkar

Paper Title:

Detection of Remnant Material and Its Quantification

Abstract: Loading-unloading of goods is an essential task that is undertaken at every industrial site. Mines witness a large scale transportation activity. As the volume of such goods is large in size, the mode of transport used for delivery is usually dumpers. Huge cranes load the dumpers at one location with some material and then the dumper moves to the desired destination for unloading. After the unloading process, the dumper may still hold some residual matter in its dumping bed which may be misused stealthily; theft of which may amount to huge loss for the concerned industry. This paper mainly discusses attempts in the direction to devise an automatic system that will detect and quantify the remnant material which is left behind in the dump-trucks after the unloading process is formally completed. In this piece of research we have applied grey level co-occurrence matrix (GLCM) and Material specific techniques to detect the carry back for materials like aluminium, coal, copper, iron ore, manganese and lime stone. Results of both these approaches have been compared.

Keywords:
Carry-back detection, GLCM, Material specific techniques, monochrome, r-plane, Intensity adjustment.


References:

1. Hargrave, Chad; Thompson, Jeremy and Hainsworth, David. Remnant Coal Detection System for Coal Train Wagons [online]. In: CORE 2010: Rail, Rejuvenation and Renaissance. Wellington, N.Z.
2. Fei Cai, Honghui Chen and Jianwei Ma. “Man-made Object Detection Based on Texture Clustering and Geometric Structure Feature Extracting”. International Journal of Information Technology and Computer Science(IJITCS) ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

3. Raman Maini, Himanshu Aggarwal. “A Comprehensive Review of Image Enhancement Techniques”, Journal of Computing, Volume 2, Issue 3, March 2010.

4. A. Buades, B.Coll and J.m.Morel , “A Review of Image denoising algorithms with new one”,SIAM, multiscale modeling and simulation,Vol 4, No.2 , 2005, pp.490-530.

5. Rafael Gonzalez and Richard Woods , “Digital Image Processing”, third edition.2010

6. Muthukrishnan.R and M.Radha , “Edge detection technique for image segmentation”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011

7. Rajan Parekh, “Improving texture recognition using combined GLCM and wavelet features”,International journal of computer Application (IJCA),Vol. 29, No. 10, Sep 2011.

8. Dipti Patra, Mridula J., “Featured based segmentation of colour textured images using GLCM and Markov Random field model”, World academy of sciences, engineering and technology 2011,pp108-113.

9. Beliakov G.,James S.,Troiano L., “Texture recognition by using GLCM and various aggregation functions”,Fuzzy systems,2008,IEEE World conference on computational intelligence, June 2008,Hongkong.

10. S.Anitha, V. Radha, “comparison of image preprocessing techniques for textile texture images”,International journal of engineering, scinec and technology,Vol.2,No.12, 2010.

11. Dipti Deodhare,NNR Ranga Suri,R. Amit, “Preprocessing and image enhancement algorithms for form based intelligent character recognition system”,International journal of computer science and applications,Vol II, No. II, pp131-144,2005.

12. H.B.Kekre and Dhirendra Mishra, “Feature extraction of color images using discrete sine transform”, International Journal of Computer Application (IJCA),USA, Special Issue for ICWET 2011 Proceedings ISBN is : 978-93-80747-67-2

13. H.B.Kekre, Tanua Sarode & Dhirendra Mishra, “Coloring Gray Scale Digital Images using Kekre’s Fast Code Book Generation Algorithm” Published in the proceedings of International conference and workshop on emerging technologies (ICWET10); 26th& 27th Feb 2010 held at thakur college of engineering and technology, Mumbai,

14. H.B.Kekre and Dhirendra Mishra, “Coloring of Gray Scale Digital Image with consecutive pixel wise color palette using Kekre’s Fast Search Algorithm”, National/Asia pacific conference on Information communication and technology(NCICT 09) 6th& 7th March 2009; MPSTME , DJSCOE, BP, SVKM’s NMIMS

15. H.B.Kekre,Dhirendra Mishra , Stuti Narula and Vidhi Shah, “ Color feature extraction for CBIR”, International journal of science and technology (IJEST), Vol.3,No.12,December 2011.

81-85

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Mounir M. Kamal, Mohamed A. Safan, Zeinab A. Etman and Mahmoud A. Abd-elbaki

Paper Title:

Effect of Polypropylene Fibers on Development of Fresh and Hardened Properties of Recycled Self-compacting Concrete

Abstract: The current research intends to study the possibility of producing fiber recycled self-compacting concrete (FRSCC) using demolitions as a coarse aggregate (crushed red brick and crushed ceramic). Polypropylene fibers were used in recycled self-compacting concrete (RSCC) to improve fresh and hardened properties of this type of concrete. Thirty one concrete mixes were prepared to achieve the aim proposed in this paper. Polypropylene fiber volume fraction varied from 0 to 1.5% of the volume of concrete with aspect ratio 12.5. The fresh properties of FRSCC were evaluated using slump flow, J-ring and V-funnel tests. Compressive strength, tensile strength, flexural strength tests were performed in order to investigate mechanical properties. Density was performed to investigate the physical properties The results cleared that; the optimum volume fraction of polypropylene fibers was 0.19% and 0.75% for the mixes contained crushed red break and ceramic as a coarse aggregate, respectively. At optimum volume fraction of polypropylene fibers; the mixes with 25, 50, 75 and 100% of crushed ceramic yields to improve in the compressive strength by 18.4, 26.3, 21.2 and 14.8%, respectively compared to the mixes with crushed red brick as a recycled aggregate was observed.

Keywords:
self-compacted concrete, red brick, ceramic, recycled materials, polypropylene fibers.


References:

1. B. Felekoglu, S. Turkel and B. Baradan "Effect of water/cement ratio on the fresh and hardened properties of self-compacting concrete". Building and Environment, 2007; 42.
2. P. Domone, "Self-compacting Concrete: An Analysis of 11 Years of Case Studies". Cement & Concrete Composites, 2006; 28 (2), pp. 197-208.

3. W. Zhu and P. J. M. Bartos, "Permeation properties of self compacting concrete". Cement and Concrete Research, June 2003; 33 (6), pp. 921-926.

4. M. Uysal, and K. Yilmaz, "effect of mineral admixtures on properties of self-compacting concrete". Cement & Concrete Composties, 2011; 33.

5. O. R. Khaleel, S. A. Al-Mishhadani, and H. Abdual Razak, "The effect of coarse aggregate on fresh and hardened properties of self-compacting concrete (SCC)". Procedia Engineering, 2011; 14.

6. M. Uysal, K. Yilmaz and M. Ipek, "The effect of mineral admixtures on mechanical properties, chloride ion permeability and impermeability of SCC". Construction and Building Materials, February 2012; 27 (1), pp. 263-270.

7. A.Rao, K. N. Jha and S. Misra, "Use of Aggregates from Recycled Construction and Demolition Waste in Concrete". Resources Conservation and Recycling, March 2007; 50 (1), pp. 71-81.

8. K. Khayat and Y. Roussel, "Testing and Performance of Fiber-Reinforced, Self Consolidating Concrete". Material & Structure, 2000, 33 (6), pp. 391-397.

9. Z. J. Grdic, G. A. Toplicic-Curcic, I. M. Despotovic and N. S. Ristic, "Properties of Self Compacting Concrete Prepared with Coarse Recycled Concrete Aggregate". Construction and Building Materials, July 2010; 24 (7), pp. 1129-1133.

10. V. Corinaldesi and G. Morconi, "Characterization of Self-Compacting Concretes Prepared with Different Fibers and Mineral Additions". Cement & Concrete Composites, 2011; 33 (5), pp. 596-601.

11. T. Greenough and M. Nehdi, "Shear Behavior of Fiber-Reinforced Self-Consolidating Concrete Slender Beams". ACI Materials Journal, 2008; 105 (5), pp. 468-477.

12. H. B. Dhonde, Y. Mo, T. T. Hsu and J. Vogel, "Fresh and Hardened Properties of Self-Consolidating Fiber Reinforced Concrete". ACI Materials Journal, 2007; 104 (5), pp. 491-500.

13. E. Ozbay, F. Cassagnebere and M. Lachemi, "Effect of Fiber Types on the Fresh and Rhelogical Properties of Self-Compacting Concrete". In K. H. Khayat, & D. Feys (Ed.), 6th International RILEM Symposium of Self-Compacting Concrete and 4th North American Conference on the Design and use of SCC, Montreal, Sep.2010;
26-29 (2), pp. 435-443

14. H. Yildirim, O. Tezel, O. Sengul and P. Guner, "Design, Production and Placement of Self-Consolidating Concrete". In K. H. Khayat, & F. Dimitri (Ed.), 6th International RIlEM Symposium on Self-Compacting Concrete, Montreal: RILEM Publication s.a.r.l, 2010; 26-29 (2), pp. 1333-1340.

15. European SCC Guidelines (2005) The European Guidelines for Self-compacting Concrete, Specification, Production and Use. Retrieved May 1, 2011, www.efca.info

16. C.X. Qian and P. Stroeven, "Development of Hybrid Polypropylene-Steel Fibers-Reinforced Concrete". Cement and Concrete Research, January 2000, 30 (1), pp. 63-69.

17. N.S. Apebo1, M.B. Iorwuab, J.C. Agunwamb, "Comparative Analysis of the Compressive Strength of Concrete with Gravel and Crushed over Burnt Bricks as Coarse Aggregates". Nigerian Journal of Technology (NIJOTECH), March 2013, 32 (1), pp. 7-12.

18. ASTM C618: Specification for Fly Ash and Raw Calcined Natural Pozzolan for Use as a Mineral Admixture in Portland Cement Concrete, Annual Book for ASTM Stand, 4, 2002, 4 p.

19. ASTMC 494/C 494M: Standard Specification for Chemical Admixtures for Concrete, Annual Book of ASTM Standards, 04.02, 2001, 9 p.

20. M. M. Kamal, M. A. Safan, Z. A. Etman and E. A. El-daboly "Behavior of Recycled Self-Compacting Concrete". Engineering Research Journal, Egypt, July 2013, 36 (3).

21. Techical Specifications for self-compacted concrete, National Buliding Reserch Center Cairo, Egypt, 2007

22. P.B. Cachim, "Mechanical Properties of brick aggregate concrete". Construction and Building Materials, March 2009, 23 (3), pp. 1292-1297.

86-93

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Annu, Chander Kant

Paper Title:

A Novel Approach for Facial Expression Recognition Using Euclidean Distances

Abstract: There has been a growing interest in automatic face and facial expression recognition from facial images due to a variety of potential applications in law enforcement, security control, and human computer interaction. However, despite of all the advances in automatic facial expression recognition, it still remains a challenging problem. This paper describes an idea of recognizing the human face even in the presence of strong facial expressions using the Eigen face method. The features extracted from the face image sequences can be efficiently used for face and facial expression recognition. Firstly, we compute the Eigen value and Eigen vectors of the input image and then finally the input facial image was recognized when similarity was obtained by calculating the minimum Euclidean distance between the input image and the different expressions.

Keywords:
Eigen face, Eigen value, Euclidean distance, facial expression recognition, facial features, face recognition.


References:

1. W. Zhao, R. Chellapa, A. Rosenfeld and P.J. Philips, “Face Recognition: A Literature Survey”, UMD CFAR Technical Report CAR-TR-948, 2000.
2. William A. Barrett, “A Survey of Face Recognition Algorithms and Testing Results”, Proceeding of IEEE, 1998.

3. L. Sirovich and M. Kirby, “Low-dimensional procedure for the characterization of human faces”, J. Opt. Soc. Am. A, Vol. 4, No. 3, March 1987, pp 519-524.

4. Turk M.A., Pentland A.P., “Face Recognition using Eigenfaces”, IEEE Conference on Computer Vision and Pattern Recognition, 1991, pp 586-591.

5. Turk M.A., Pentland A.P., “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience 3 (1): 1991, pp 71-86.

6. G. R. S. Murthy and R. S. Jadon, “Effectiveness of Eigenspaces for Facial Expressions Recognition” International Journal of Computer Theory and Engineering, vol. 1, no. 5, pp. 638-642, December 2009.

7. R. Zhi, M. Flierl, Q. Ruan, and W. B. Kleijn, “Graph-Preserving Sparse Nonnegative Matrix Factorization with Application to Facial Expression Recognition”, IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetics, vol.41, no. 1 pp. 38-52, February 2011.

8. L. Ma and K. Khorasani, “Facial Expression Recognition Using Constructive Feedforward Neural Networks”, IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetics, vol. 34, no. 3, pp. 1588-1595, June 2004.

9. P. S. Aleksic and A. K. Katsaggelos, “Automatic Facial Expression Recognition Using Facial Animation Parameters and Multistream HMMs”, IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 3-11, March 2006.

10. H. Huang and H. He, “Super-Resolution Method for Face Recognition Using Nonlinear Mappings on Coherent Features”, IEEE Transactions on Neural Networks, vol. 22, no. 1, pp. 121-130, January 2011.

11. Y. Gao, M. K. H. Leung, S. C. Hui, and M. W. Tananda, “ Facial Expression Recognition From Line-Based Caricatures” IEEE Transactions on Systems, Man and Cybernetics-Part A:Systems and Humans, vol. 33, no. 3, pp. 407-411, May 2003.

12. S. M. Lajevardi and H. R. Wu, “Facial Expression Recognition in Perceptual Color Space” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3721-3732, August 2012.

94-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

S.C.Shekokar, M. B. Mali

Paper Title:

Speech Enhancement Using DCT

Abstract: The speech enhancement problem comprises of various problems characterized by the type of noise source, the nature of interaction between speech and noise, the number of sensor signals (microphone outputs) available for enhancement and the nature of the speech application. Noise reduction remains a demanding problem due to wide variety of background noise types (car noise, babble noise, cockpit noise, train noise, subway noise, etc.) and the difficulty in estimating their statistics. The connection of noise and clean signal is usually classified as additive/multiplicative/convolution. The additive model very often dominates in real-world applications.

Keywords:
Speech enhancement, Speech processing


References:

1. Y. Soon, S. N. Koh, and C. K. Yeo, “Noisy speech enhancement using discrete cosine transform,” Speech Communication, vol. 24, pp. 249–257, 1998.
2. S. Ou, X. Zhao, and J. Dong, “Combining DCT and Adaptive KLT for Noisy Speech Enhancement,” in Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on, 2007, pp. 2857– 2860.

3. L. Rabiner, M. Cheng, A. Rosenberg, and C. McGonegal, “A comparative performance study of several pitch detection algorithms,” IEEE Transactions on Acoustics Speech and Signal Processing, vol. 24, no. 5, pp. 399–418, 1976.

4. H. Ding and I. Y. Soon, “An adaptive time-shift analysis for DCT based speech enhancement,” in Proceedings ICICS, 2009, pp. 1–4

5. Huijun Ding, Ing Yann Soon and Chai Kiat Yeo, “A DCT-based speech enhancement system with pitch synchronous analysis”, IEEE Transactions on Audio, Speech and Language Processing 2011.

6. Barry Commin, "Signal Subspace Speech Enhancement with Adaptive Noise Estimation” Department of Electronic and Computer Engineering, National University of Ireland, Galway, Sept. 2005.

98-100

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Ankit Gupta, Mridul Gupta, Neelakshi Bajpai, Pooja Gupta, Prashant Singh

Paper Title:

Efficient Design and Implementation of 4-Degree of Freedom Robotic Arm

Abstract: A robotic arm is a mechanical arm which is designed to perform a function similarly as a human arm does. It is usually programmable and arm may be a sum total of the mechanism or can be part of a complex robot. To design a robot, various links are being connected by joints allowing either a translational (linear) motion or a rotational motion in various planes. In many cases sensors are used in the arm that usually indicates the controller about the hardness by which the gripping is done by arm or directs the arm in directions in which it should move to perform the task or it tells the system about presence of object in front of it. Various aspects that are kept in mind while designing a robotic arm are torque calculation for each motor used, concept of inverse kinematics, interfacing to remote controller, ways for noise reduction in ADC (analog-to-digital converter).We have designed this robotic arm using servos, ATmega32 microcontroller with interfacing analog joysticks controller. We have made some improvements in design by reducing the noises that were generated due to mechanical construction of the joystick which continuously varies and gives some noises. And also we have used the fact the mechanical system has larger response time as compared to associated electronics. To overcome this we went for some software filters and algorithms following the ADC. Before this, we have introduced inverse kinematics with its difference from forward kinematics and various calculations related to it.

Keywords:
Averaging Filter, DOF (Degree of Freedom), End effectors, Inverse kinematics, IIR Filter.


References:

1. White Paper “Controlling Lynx6 Robotic Arm Micro mega”
2. http://electronicdesign.com/analog/use-software-filters-reduce-adc-nois

3. Barnett, Cox and O’Cull “Embedded C Programming and the Atmel AVR ” 2nd Edition 2007.

4. http://www.lynxmotion.com/images/html/proj057.htm

5. www.engineersgarage.com/articles/servo-motor?page=1

101-104

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Samadhan P. Deshmukh, Vivek K. Sunnapwar

Paper Title:

Development and Validation of Performance Measures for Green Supplier Selection in Indian Industries

Abstract: An environmentally conscious supply chain, also called a green supply chain, is a new concept appearing in recent literature. The purpose of this study is to identify the critical green manufacturing factors considered during supplier selection in the Indian manufacturing sector. The approach of the research includes a literature review, in-depth interviews and questionnaire surveys. The major activities of the green supply chain; namely green design, green logistic design, green manufacturing, green costs, quality, environment performance assessment, customer co-operation are covered throughout the research. Factor analysis is done using Statistical Package for the Social Sciences (SPSS) software to help managers understand the important environmental dimensions. Factor analysis is used to evaluate the relative importance of various environmental factors. The data are analysed using “mean score”.

Keywords:
Green Manufacturing, green supplier selection, environmental performance measures, factor analysis


References:

1. G. Kannan, J. Sarkis, R. Sivakumar, M. Palaniappan, “Multi criteria decision making approaches for green supplier evaluation and selection: A literature review”, Conference on the Greening of Industry Network, GIN 2012, Linkoping – Sweden, October 22-24, 2012.
2. A. H. I. Lee., H-Y Kang, C-F Hsu, H-C Hung, “A green supplier selection model for high-tech industry”, Expert Systems with Applications, vol. 36, 2009, pp. 7917–7927.

3. J. Sarkis, “Evaluating environmentally conscious business practices”. European Journal of Operational Research, vol. 107, 1998, pp. 159–174.

4. V. Baskaran, S. Nachiappan, S. Rahman, “Indian textile suppliers’ sustainability evaluation using the grey approach”, Int. J. Production Economics, vol. 135, 2012, pp. 647–658.

5. A. K. Bhateja, R. Babbar, S. Singh, A. Sachdeva, “Study of green supply chain management in the Indian manufacturing Industries: A literature review cum an analytical approach for the measurement of performance”, International Journal of Computational Engineering & Management, vol. 13, 2011, pp. 84–99.

6. A. M. Deif, “A system model for green manufacturing”, Journal of Cleaner Production, vol. 19, 2011, pp. 1553–1559.

7. K-J Wu, M-L Tseng, T. Vy, “Evaluation the drivers of green supply chain management practices in uncertainty”, Procedia - Social and Behavioral Sciences, vol. 25, 2011, pp. 384 – 397.

8. A. Awasthi, S. S. Chauhan, S. K. Goyal, “A fuzzy multicriteria approach for evaluating environmental performance of suppliers’’, Int. J. Production Economics, vol. 126, 2010, pp. 370–378.

9. L. Hua, C. Weiping, K. Zhixin, N. Tungwa, L. Yuanyuan, “Fuzzy multiple attribute decision making for evaluating aggregate risk in green manufacturing”, Tsinghua Science and Technology, ISSN 1007-0214, vol. 19/20, 2005, pp. 627–632.

10. P. K. Humphreys, Y. K. Wong, F. T. S. Chan, “Integrating environmental criteria into the supplier selection process”, Journal of Materials Processing Technology, vol. 138, 2003, pp. 349–356

11. C-C Chen, H-J Shyur, H-S Shih, K-S Wu, “A business strategy selection of green supply chain management via an analytic network process”, Computers and Mathematics with Applications, vol. 64, 2012, pp. 2544–2557.

12. W-C Yeh, M-C Chuang, “Using multi-objective genetic algorithm for partner selection in green supply chain problems”, Expert Systems with Applications, vol. 38, 2011, pp. 4244–4253.

13. C-T Lin, C-B Chen, Y-C Ting, “A green purchasing model by using ANP and LP methods”, Journal of Testing and Evaluation, vol. 40, No. 2, 2012, Paper ID JTE104259

14. D. Nimawat, V. Namdev, “An overview of green supply chain management in India”, Research Journal of Recent Sciences, vol. 16, 2012, pp. 77–82.

15. J. Sarkis, “A strategic decision framework for green supply chain management”, Journal of Cleaner Production, Vol. 11, 2003, pp. 397–409.

16. S. Kumar, S. Chattopadhyaya, V. Sharma, “Green supply chain management: A case study from Indian electrical and electronics industry”. International Journal of Soft Computing and Engineering, vol. 1, Issue-6, 2012, pp. 275–281

17. J. Pallant, SPSS Survival manual, Open University press, 2001.

18. A. K. Digalwar, K. S. Sangwan, “Development and validation of performance measures for world class manufacturing practices in India”, Journal of Advanced Manufacturing Systems, vol. 6, 2007, pp. 21–38.

105-109

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Alan Shaji Idicula, Kalpana Balani, Preetesh Shetty, Sayali Thalve, T. Rajani Mangala

Paper Title:

Scale Identification of an Audio Input

Abstract: Generally a music piece plays on one single scale. Each scale is uniquely characterized by a set of specific notes. In this paper, a methodology is presented for the recognition of musical scales that are associated with any piece of music. The procedure of recognition is essentially based on the comparison between the combinations of notes occurring in any music piece, with a predefined set of notes denoting a scale. To determine scale from a musical recording, frequency of the note is the characteristic which is used to identify a note and differentiate it from other notes. The proposed methodology led to the development of a system which can be exploited by a beginner learning music. The system performed successful recognition for the 92% of the tested recordings. It should be noted that the proposed system can operate in real time.

Keywords:
audio input, frequency, matrix, music, note, scale


References:

1. www.music.vt.edu/musicdictionary/appendix/scales/scales/ majorscales. html
2. Cooper, Paul (1973). Perspectives in Music Theory: An Historical-Analytical Approach, p.16. ISBN 0-396-06752-2.

3. http://www.mathworks.in/help/matlab/ref/wavread.html

4. A.Sheh and D. P. Ellis, “Chord segmentation and recognition using EM-trained hidden Markov models,” in Proceedings of the International Symposium on Music Information Retrieval, Baltimore, MD, 2003.

5. E. Jacobsen and R. Lyons, The sliding DFT, Signal Processing Magazine vol. 20, issue 2, pp. 74–80 (March 2003).

110-113

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

As’ad Munawir, Murni Dewi, Yulvi Zaika, Agoes Soehardjono MD

Paper Title:

Bearing Capacity on Slope Modeling with Composite Bamboo Pile Reinforcement

Abstract: the footing that placed on slope surface will decrease bearing capacity of soil. The function of using composite bamboo pile is to increase bearing capacity of footing on slope and that is one of the innovative slope reinforcement methods which necessary for last few years. Slope modeling with composite bamboo reinforcement was using an experiment box with 1,50 m as length; 1,0 m as width and 1,0 m as height. It used sand soil with fine gradation and composite bamboo pile with various pile length and pile location. The load was modeled as a strip footing with continuous increasing load by load cell until the limit load has been reach. The problem occurred in laboratory has been analyzed with Finite Element Method. It changed 3D slope modeling to be 2D modeling. Composite bamboo pile has been chosen as a new utilization innovation of bamboo as reinforced pile and that’s a positive value to optimize bamboo local material as steel reinforced replacement material. The result of experiment using composite bamboo as pile reinforcement on slope has increased slope bearing capacity. It shown with significant increasing of bearing capacity and maximum limit load can be reached on slope.

Keywords:
bearing capacity improvement, bearing capacity on slope, composite bamboo pile, finite element method.


References:

1. Azzam, W. R., Farouk, A. ” Experimental and Numerical Studies of Sand Slopes Loaded with Skirted Strip Footing”, EJGE, Vol.15, 2010
2. Bahloul, K. M. M. Behavior of Strip Footing Resting on Randomly Fiber Reinforced Sand Cushion Underlaid by a Layer of Soft Clay and Adjacent to a Slope. Bucharest, Rumania.

3. Haripal, P.K., Behera, R.N., and Patra, C.R. 2008. Behavior of Surface Strip Footing on Geogrid Reinforced Sand Bed. International Association for Computer Method and Advance in Geomechanics, India

4. Huang, C. H., Wen, W.W. 1994. Failure Mechanisms of Reinforced Sand Slopes Loaded with A Footing. Japanese Society of Soil Mechanics and Foundation Engineering.

5. Ip, K. W. 2005. Bearing Capacity for Foundation near Slope. Concordia University, Canada.

6. Kenny, M. J., Andrawes, K. Z. 1997. The Bearing Capacity of Footings on a Sand Layer Overlying Soft Clay. University of Strathclyde.

7. Kumar, S., Anil, V., and Ilamparuthi, K. 2009. Response of Footing on Sand Slopes. Indian Geotechnical Society Chennai Chapter.

8. Kusakabe, O., Kimura, T., Yamaguchi, H. 1981. Bearing Capacity of Slopes under Strip Loads on the Top Surfaces. Japanese Society of Soil Mechanics and
Foundation Engineering.

9. Marandi, S.M., Bagheripour, M.H., Rahgozar, R., and Ghirian A.R. 2008. Numerical Investigation Into the Behavior of Circular Pad Shallow Foundations Supported by Geogrid Reinforced Sand. Bahonar University, Kerman, Iran.

10. Meyerhof, G.G. 1957. The Ultimate Bearing Capacity of Foundations on Slopes. London: The Proceedings of the Fourth International Conference on Soil Mechanics and Foundation Engineering.

11. Mostafa, A. E. S. 2004. Strip Footing Behaviour on Pile and Sheet Pile-Stabilized Sand Slope. Alexandria Engineering Journal Vol. 43 (2004) No 1, 41-54.

12. Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2011. Pile Stability and Lateral Force on Slope Using Mini Composite Bamboo Pile Reinforcement. National Seminar – 1 BMPTTSSI – Konteks 5. Faculty of Engineering USU, Medan.

13. Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2011. Utilizing of Mini Composite Bamboo Pile as Soil Reinforcement Alternative for Landslide Prevention on Slope. Civil Engineering National Seminar VII. ITS, Surabaya.

14. Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2012. Influence of Various Dimension and Mini Composite Bamboo Pile Reinforcement Location on Slope Stability Modeling. National Symposium: Rekayasa Engineering and Bamboo Cultivation I. Gajah Mada University, Yogyakarta.

15. Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2012. Influence of Various Length and Mini Composite Bamboo Pile Reinforcement Location on Slope Stability Modeling. Civil Engineering National Seminar VIII. ITS, Surabaya.

16. Narita, K., Hakuju, Y. 1990. Bearing Capacity Analysis of Foundation on Slope by use of Log-Spiral Sliding Surface, Soil and Foundations, Vol. 30. Technical Note, Japanese society of soil mechanics and foundation engineering
17. Shin, E.C., Das B.M. 2000. Experiment Study of Bearing Capacity of a strip Foundation on Geogrid-Reinforced Sand Vol 7. Technical Note, Geosynthetics
International

18. Thanapalasingam, J., Granendran, C.T. 2008. Predicting the Performance of Foundation Near Reinforced Slope Fills. International Association for Computer Method and Advance in Geomechanics, India

19. Zahmatkesh, A., Choobbasti, A. J. 2010. Investigation of Bearing Capacity and Settlement of Strip Footing on Clay Reinforced with Stone Columns. Department of Civil Engineering, Babol University of Technology, Babol, Iran.

114-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Vikas Kumar

Paper Title:

Temperature- Aware Virtual Machine Scheduling in Green Clouds

Abstract: This paper present the temperature- aware virtual machine scheduling in green clouds which is design to maintain the temperature of virtualized cloud system below critical temperature threshold by scheduling VMs according to temperature of node and insures reliable quality of service. High temperature gradients degrade reliability and performance therefore it requires vigorous cooling in order to keep the equipment and the software stable. Moreover, high energy consumption not only increases operational cost, which reduces the profit margin of Cloud providers, but also leads to high carbon emissions which is not friendly for environment. Thus apart from saving energy and money by avoiding huge investment on cooling, it also reduces carbon footprints.

Keywords:
cloud computing, virtual machine


References:

1. Phaphoom.N, Wang. X, Abrahamson.P.” Foundations and Technological Landscape of Cloud Computing” (ISRN Software Engineering Volume 2013 (2013), Article ID 782174, 31 pages)
2. Dhiman.G, Marchetti.G, Rosing.T “v: Green: a system for energy efficient computing in virtualized environments” (Proceedings of the 14th ACM/IEEE international symposium on Low power electronics and design, page 243-248, published in ACM, 2009)

3. D. Ramesh, A. Krishnan “An Analysis on Energy Efficient System Design in Grid Computing”( Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, pp 421-428)

4. Barroso, L.A. Holzle, U. “The Case for Energy-Proportional Computing” (IEEE computer society, Volume: 40, Issue: 12, Dec. 2007 Page:33 – 37, ISSN :0018-9162)

5. Kansa.A, Zhao.F. “Fine-Grained Energy Profiling for Power-Aware Application Design” (http://research.microsoft.com/en-us/um/people/zhao/pubs/hotmetrics08joulemeter.pdf)

6. Arjamaa.H, “Energy Consumption Estimates of Information and Communication Technology: synthesis and analysis” (http://www.cse.tkk.fi/en/publications/B/5/papers/Arjamaa_final.pdf)

7. Christopher K. Lennard A. Richard Newton,” An Estimation Technique to Guide Low Power Resynthesis” (http://pdf.aminer.org/000/436/871/an_estimation_technique_to_guide_low_power_resynthesis_algorithms.pdf)

8. E. Pinheiro, R. Bianchini, E. V. Carrera, and T. Heath, “Load Balancing and Unbalancing for Power and Performance in Cluster-Based Systems” (Workshop on Compilers and Operating Systems for Low Power, pp: 182–195, 2009. )

9. S. Srikantaiah, A. Kansal, and F. Zhao, “Energy Aware Consolidation for Cloud Computing”, (Cluster Computing, Vol. 12, pp: 1–15, 2009.)

10. E. Elnozahy, M. Kistler, R. Rajamony, “Energy-Efficient Server Clusters” (Power-Aware Computer Systems, pp: 179-197, 2003)

11. R. Nathuji and K. Schwan, “Virtualpower: Coordinated Power Management in Virtualized Enterprise Systems” (ACM SIGOPS Operating Systems Review, Vol. 41, pp: 256-278, 2007.)

12. E. Dodonov, R. de Mell, “A Novel Approach for Distributed Application Scheduling Based on Prediction of Communication Events” (Future Generation Computer
Systems, Vol. 5, pp: 740-752, 2010.)

13. C. Guo, G. Lu, H. Wang, S. Yang, C. Kong, P. Sun, W. Wu,Y. Zhang, “Secondnet: A Data Center Network Virtualization Architecture with Bandwidth Guarantees”, (6th International Conference on emerging Networking Experiments and Technologies, USA, 2010.)

14. J. L. Berral, R. Nou, F. Julia, “Towards Energy-Aware Scheduling in Data Centers using Machine Learning” (1st International Conference on Energy-Efficient Computing and Networking, Passau, Germany, 2010.)

15. Y. Song, H. Wang, Y. Li, B. Feng, Y. Sun, “Multi-Tiered On-Demand Resource Scheduling for VM-Based Data Center”( 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, China, pp: 148–155, 2009.)

119-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Sahana S Bhandari

Paper Title:

Embedded Based Automated Student Attendance Governing System

Abstract: In all aspects of our life, we encounter event recording applications very often. Recording of any entity be it sound, pictures, events etc. is very useful as it enables us to manipulate data to our requirements. One can exploit the full potential of the recorded information for specific user defined purposes. Keeping in mind the significance of event recorders in today’s world, we arrived at a common decision of making embedded based instrument. The major problem faced by organizations is time consumption in taking attendance. This project totally eliminates the paper work in maintaining the attendance of each student in schools, colleges or universities. This instrument is easily scalable up to 150 students in 8 different subjects. Our goal is to have electronic files containing details about each student and their attendance status. This paper will try to organize the current attendance record system that will be much quicker and save time of instructors.

Keywords:
Baud rate, Counters, Integrated Chip, Interrupts, Microcontroller, Quartz crystal.


References:

1. 8051 microcontroller tutorial by Donal Heffernan University of Limerick May-2002
2. Simple Microcontroller projects in c for 8051 by Dogan Ibrahim.

3. Programming and Interfacing the 8051 Microcontroller in C and Assembly by Sencer Yeralan, P.E., Ph.D.Helen Emery Rigel Press, a Division of Rigel Corporation.

4. Basic Tutorial for Keil Software Written by www.MicroDigitalEd.com

5. A Simple RS232 Guide Posted on 12/12/2005 By Jon Ledbetter Updated 05/22/2007

6. http://www.circuitstoday.com/8051-programming-tutorial-chapter-1

7. http://ece.jagansindia.in/2011/08/how-to-write-program-for-8051-microcontro/

8. http://www.botskool.com/user-pages/tutorials/electronics/2x16-lcd-and-4x4-keypad-interfacing-8051-assembly-language

9. http://www.w3schools.com/default.asp

10. http://www.mlees-robotronics.in

123-128

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Mangala K. Pai, Jayalakshmi D.S.

Paper Title:

Survey on Privacy and Data Security Issues in Cloud Computing

Abstract: Cloud computing is a better way to run the business. Instead of running the apps by yourself, they are run on a shared data center. Cloud computing provides customers the illusion of infinite computing resources which are available from anywhere, anytime, on demand. Apart from these cloud computing is subject to privacy issues and security concerns. In this paper, we see the various types of issues in cloud computing and how to overcome that.

Keywords:
Cloud, threats, SaaS, Paas, IaaS, DoS, XSS, BGP, SQL injection


References:

1. Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy in Public Cloud Computing. National Institute of Standards and Technology, 2011.
2. Aderemi A. Atayero, Oluwaseyi Feyisetan G., “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”, Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 10, October 2011, ISSN 2079-8407

3. Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A NewTrusted and Collaborative Agent Based Approach for Ensuring Cloud Security,” Annals of Faculty Engineering, Hunedoara International Journal of Engineering, Year 2012, ISSN 1584-2665

4. John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the world of cloud computing”, IEEE Compute r and Relia bility Societies.

5. Grobauer, B.; Walloschek, T.; Stocker, E., "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE , vol.9, no.2, March-April 2012

6. Jian Wang; Yan Zhao; Shuo Jiang; Jiajin Le, "Providing privacy preserving in Cloud computing," Human System Interactions (HSI), 2011, 3rd conference.

7. Zhidong Shen; Li Li; Fei Yan; Xiaoping Wu, "Cloud Computing System Based on Trusted Computing Platform," Intelligent Computation Technology and Automation (ICICTA), International Conference on , vol.1., 2012.

8. Zhidong Shen; Qiang Tong, "The security of cloud computing system enabled by trusted computing technology," Signal Processing Systems (ICSPS), 2011 2nd International Conference, vol.2.

9. The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory.

10. Alexa Huth, James Cebula “The basics of cloud computing”, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf

11. Sugata Sanyal, Ajit Shelat, Amit Gupta, “new frontiers of network security: The threat within”

12. Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” 17th International workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4.

13. Wayne Jansen, Timothy Grance, “NIST Guidelines on Security and Privacy in Public Cloud Computing,” Draft special Publication 800-144, 2011.http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800 144_cloud-computing.pdf.

14. Josh Karlin, Stephanie Forrest, Jennifer Rexford, “Autonomous Security for Autonomous Systems,” Proc. Of Complex Computer and Communication Networks; vol. 52, issue. 15, pp. 2908- 2923, Elsevier,NY,USA,2008

129-134

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Vishwanath V.H., S. J. Sanjay and V. B. Math

Paper Title:

Thermal Analysis of A6061-Boron/Silicon Carbide Composite for In-plane Transverse Loading

Abstract: A structural composite is a material system consisting of two or more phases on a macroscopic scale, whose mechanical performance and properties are designed to be superior to those of constituent materials acting independently. FRP composites are slowly emerging from the realm of advanced materials and are replacing conventional materials in a variety of applications. However, the mechanics of fiber-reinforced composites is complex owing to their anisotropic and heterogeneous characteristics. In this paper, the micromechanical behavior of the square unit cell of a fiber reinforced composite lamina consisting of boron and Silicon Carbide fibers embedded in Alumina matrix, has been studied. A three-dimensional finite element model with governing boundary conditions has been developed from the unit cells of square pattern of the composite to predict the Thermal Gradient and Thermal Flux of A6061-Boron / Silicon Carbide fiber reinforced lamina for various volume Fraction . A finite element model incorporating the necessary boundary conditions is developed and is solved using commercially available FEA package to evaluate the Thermal properties. The variations of the Temperature at the fiber- matrix interface with respect to the Thermal Gradient & Thermal Flux are studied. This may result in the separation of fiber and matrix leading to deboning. This analysis is useful to realize the advantages of A6061-Boron / Silicon Carbide composites in structural applications, and to identify the locations with reasons where the Temperature is critical to damage the interface. The present analysis is useful to identify the composite effect in selecting the materials for reasonable properties.

Keywords:
Finite element method, FRP, Micro-mechanics, Model, Temperature.


References:

1. Issac M. Daniel and Ori Ishai, “Engineering Mechanics of Composite Materials”. Oxford university press. 1994.
2. C.T. Sun and R.S. Vaidya, “Prediction of Composite Properties from a Representative Volume Element”. Composites Science and Technology Vol.56, 1996, pp.171-179.

3. S.T. Pericles, G.E. Stavroulakis and P.D. Pnagiotopoulos, “Calculation of Effective Transverse Elastic Moduli of Fiber-reinforced Composites by Numerical Homogenization”. Composites Science and Technology Vol.57, 1997, pp. 573-586.

4. K. Sivaji Babua, K. Mohana Raob, V. Rama Chandra Rajuc, V. Bala Krishna Murthyd and M.S.R Niranjan Kumarea,“Micromechanical analysis of FRP hybrid composite lamina for in-plane transverse loading”. Indian Journal of Engineering & Materials Sciences Vol. 15, October 2008, pp. 382-390.

5. ANSYS Reference Manuals, 2010.

135-137

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

N.Muthuvairavan Pillai, J.George Chellin Chandran

Paper Title:

EESRBM: Energy Efficient Stateless Receiver Based Multicast Protocol for Ad Hoc Networks

Abstract: Multicast routing is used to send the information or message to a group of destination nodes simultaneously in a single transmission from the source. Multicast routing protocols typically rely on the priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. This multicast state maintenance adds a large amount of communication, processing and memory overhead for no benefit to the application. Hence a stateless receiver-based multicast (RBMuticast) protocol was developed that simply uses a list of the multicast member’s addresses, embedded in packet headers to enable receivers to decide the best way to forward the multicast traffic. Nodes in Mobile Ad-hoc Networks (MANETs) are battery powered and hence have limited life time. This RBMuticast does not consider the energy of the nodes and hence a node may die due to its excessive utilization which can result in energy depletion problem and thereby affect overall network performance. This also makes the communication living time to decrease and communication cost to increase. Thus I have developed a stateless multicast protocol called “Energy Efficient Stateless RBMuticast protocol for Ad Hoc Networks”. This protocol called EESRBM considers a hop with energy saving such that it holds low transmitting receiving costs and thereby selecting a long-lived path from source to destination. This protocol is more efficient than any of the existing multicast protocols.

Keywords:
Mobile ad hoc networks, multicast routing, stateless, receiver-based communication, energy-efficiency.


References:

1. S.-J. Lee, M. Gerla, and C.-C. Chiang, “On-Demand Multicast Routing Protocol,” Proc IEEE Wireless Comm. And Networking Conf. (WCNC ’99), vol. 3, pp. 1298-1302, 1999.
2. Okura, T. Ihara, and A. Miura, “BAM: Branch Aggregation Multicast for Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems Conf., p. 363, Nov. 2005.

3. C.-C. Chiang, M. Gerla, and L. Zhang, “Shared Tree Wireless Network Multicast,” Proc. Sixth Int’l Conf. Computer Comm. And Networks, pp. 28-33, Sept. 1997.

4. J. Garcia-Luna-Aceves and E. Madruga, “A Multicast Routing Protocol for Ad-Hoc Networks,” Proc. IEEE INFOCOM, vol. 2, pp. 784-792, Mar. 1999.

5. Deying Li, Qin Liu , Xiaodong Hu , Xiaohua Jia,” Energy efficient multicast routing in ad hoc wireless networks”, Computer Communications 30 (2007) 3746–3756.

6. C.-H.Feng,Y.Zhang,.Demirko and W.B.Heinzeman, ”Stateess Multicast Protocol for Ad Hoc Networks”, IEEE Mobile Computing , Vo.11, no.2, Feb 2012.

138-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Ting Yee Lim, Ahamad Tajudin Khader

Paper Title:

Monogamous Pairs Genetic Algorithm (MopGA)

Abstract: As the race in producing better Genetic Algorithms (GAs) to alleviate the notorious premature convergence problems heats on, the danger of overly complex solutions, ignoring the practicality and feasibility of basic algorithms continues in some researches. In this paper, we propose a new variant of GA with decent complexity without loosing the search power. Our approach is inspired by the monogamous behavior observed in nature. The efficacy of MopGA is verified on nine benchmark numerical test functions. The results are mostly comparable to standard GA and even achieve better overall average reliability and speed.

Keywords:
Genetic algorithm, monogamy, numerical function optimization


References:

1. B. Hatchwell, A. Russell, D. Ross, and M. Fowlie, "Divorce in cooperatively breeding long–tailed tits: a consequence of inbreeding avoidance?," Proceedings of the Royal Society of London. Series B: Biological Sciences, vol. 267, pp. 813-819, 2000.
2. R. G. Oldfield and H. A. Hofmann, "Neuropeptide regulation of social behavior in a monogamous cichlid fish," Physiology & Behavior, vol. 102, pp. 296-303, 2011.

3. K. A. Young, K. L. Gobrogge, Y. Liu, and Z. Wang, "The neurobiology of pair bonding: insights from a socially monogamous rodent," Frontiers in neuroendocrinology, vol. 32, pp. 53-69, 2011.

4. S. T. Leu, P. M. Kappeler, and C. M. Bull, "The influence of refuge sharing on social behaviour in the lizard Tiliqua rugosa," Behavioral ecology and sociobiology, vol. 65, pp. 837-847, 2011.

5. Y. Sakurai, K. Takada, N. Tsukamoto, T. Onoyama, R. Knauf, and S. Tsuruta, "Inner Random Restart Genetic Algorithm to optimize delivery schedule," in Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, 2010, pp. 263-270.

6. Y. Sakurai, K. Takada, N. Tsukamoto, T. Onoyama, R. Knauf, and S. Tsuruta, "Backtrack and Restart Genetic Algorithm to Optimize Delivery Schedule," in Signal-Image Technology and Internet-Based Systems (SITIS), 2010 Sixth International Conference on, 2010, pp. 85-92.

7. R. Chandrasekharam, V. Vinod, and S. Subramanian, "Genetic algorithm for test scheduling with different objectives," Integration, the VLSI Journal, vol. 17, pp. 153-161, 1994.

8. C. Giri, D. K. R. Tipparthi, and S. Chattopadhyay, "Genetic algorithm based approach for hierarchical SOC test scheduling," 2007, pp. 141-145.

9. C. Sai Ho and C. Hing Kai, "A Two-Level Genetic Algorithm to Determine Production Frequencies for Economic Lot Scheduling Problem," Industrial Electronics, IEEE Transactions on, vol. 59, pp. 611-619, 2012.

10. N. Das, R. Sarkar, S. Basu, M. Kundu, M. Nasipuri, and D. K. Basu, "A genetic algorithm based region sampling for selection of local features in handwritten digit recognition application," Applied Soft Computing, vol. 12, pp. 1592-1606, 2012.

11. B. Artyushenko, "Analysis of global exploration of island model genetic algorithm," 2009, pp. 280-281.

12. Alba, Enrique, Hugo Alfonso, and Bernabé Dorronsoro, "Advanced models of cellular genetic algorithms evaluated on SAT," presented at the Proceedings of the 2005 conference on Genetic and evolutionary computation, Washington DC, USA, 2005.

13. A.C. M. Oliveira, S. L. Ma, L. A. N. Lorena, S. Stephany, and A. J. Preto, "An Hierarchical Fair Competition Genetic Algorithm for Numerical Optimization," 2004.

14. J. J. Hu and E. D. Goodman, "The hierarchical fair competition (HFC) model for parallel evolutionary algorithms," 2002, pp. 49-54.

15. S. Wagner and M. Affenzeller, "SexualGA: Gender-specific selection for genetic algorithms," 2005, pp. 76-81.

16. J. Sсnchez-Velazco and J. A. Bullinaria, "Sexual selection with competitive/co-operative operators for genetic algorithms," 2003.

17. R. Lahoz-Beltra, G. Ochoa, and U. Aickelin, "Cheating for problem solving: a genetic algorithm with social interactions," 2009, pp. 811-818.

18. M. Zhang, S. Zhao, and X. Wang, "A hybrid self-adaptive genetic algorithm based on sexual reproduction and Baldwin effect for global optimization," 2009, pp. 3087-3094.

19. J. C. Culberson and U. o. A. D. o. C. Science, Genetic invariance: A new paradigm for genetic algorithm design: Citeseer, 1992.

20. J. C. Culberson, "Mutation-crossover isomorphisms and the construction of discriminating functions," Evolutionary Computation, vol. 2, pp. 279-311, 1994.

21. J. C. Culberson and U. o. A. D. o. C. Science, GIGA program description and operation: Citeseer, 1992.

22. Q. Chen, Y. Zhong, and X. Zhang, "A pseudo genetic algorithm," Neural computing & applications, vol. 19, pp. 77-83, 2010.

23. G. Schuiling, "The benefit and the doubt: why monogamy?," Journal of Psychosomatic Obstetrics & Gynecology, vol. 24, pp. 55-61, 2003.

24. A.M. J. Anacker, T. H. Ahern, L. J. Young, and A. E. Ryabinin, "The Role of Early Life Experience and Species Differences in Alcohol Intake in Microtine Rodents," PloS one, vol. 7, p. e39753, 2012.

25. M. U. Grüebler and B. NaefDaenzer, "Survival benefits of postfledging care: experimental approach to a critical part of avian reproductive strategies," Journal of Animal Ecology, vol. 79, pp. 334-341, 2010.

26. S. Gandhi, D. Khan, and V. S. Solanki, "A Comparative Analysis of Selection Scheme," International Journal of Soft Computing, vol. 2, 2012.

27. T. Jinn-Tsong, L. Tung-Kuan, and C. Jyh-Horng, "Hybrid Taguchi-genetic algorithm for global numerical optimization," Evolutionary Computation, IEEE Transactions on, vol. 8, pp. 365-377, 2004.

28. S. T. Hsieh, T. Y. Sun, and C. C. Liu, "Potential offspring production strategies: An improved genetic algorithm for global numerical optimization," Expert Systems with Applications, vol. 36, pp. 11088-11098, 2009.

29. X. Pan, L. Jiao, and F. Liu, "An improved multi-agent genetic algorithm for numerical optimization," Natural Computing, vol. 10, pp. 487-506, 2011.

30. Y.-W. Shang and Y.-H. Qiu, "A Note on the Extended Rosenbrock Function," Evolutionary Computation, vol. 14, pp. 119-126, 2006/03/01 2006.

31. Z. H. Zhan, J. Zhang, Y. Li, and H. S. H. Chung, "Adaptive particle swarm optimization," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 39, pp. 1362-1381, 2009.

32. D. H. Wolpert and W. G. Macready, "No free lunch theorems for optimization," Evolutionary Computation, IEEE Transactions on, vol. 1, pp. 67-82, 1997.

143-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Nehul J. Thakkar, Viral B. Prajapati, Shailesh M. Patel

Paper Title:

Automatic Loading & Unloading CNC turning Centre DX 200

Abstract: Manual work on CNC is normally done. Manual loading & unloading is time consumable & require manpower. Normally workers pick the component than load into the chuck & after the completion of operation unloads the component & place at require place. So it will take time to complete the cycle. In order to reduce the cycle time automation comes into play. By using robotics we can load & unload the components, which in turn reduces the cycle time & also require less labor work. So, we compare the cycle time which takes place in manually & in automation & make the model on SOLIDWORKS. Hence we can achieve the goal to reduce the cycle time & increase the productivity.

Keywords:
Automation, Pick & Place Unit, Loading unloading the component, Robotics.


References:

1. Design and hybrid control of the pneumatic force-feedback system for Arm-Exoskeleton by using on/off valve Chen Ying, Zhang Jia-fan , Yang Can-jun, Niu Bin.The State Key Laboratory of Fluid Power Transmission and Control, Zhejiang University, Hangzhou 310027, PR China.
2. Development of pick & place Robot, Mohd Hishamudin B Shaharom, University Kuala Lumpur (NOVEMBER 2011).

3. Flexible kinematics for modular robots, K N Tarchanidis, A S Mackay and J Lucas.

4. The structure design & kinematics of robot manipulator, Kesheng Wang & Terje K.Lien, Production Engineering Laboratory, NTH-SINTEF, N-7034 Trondheim, Norway.

5. Mathematical modelling, simulation and experimental verification of a scara robot M. Taylan Das, L. Canan Dulger Department of Mechanical Engineering, University of Gaziantep, 27310 Gaziantep, Turkey (2005).

6. Solidworks software

7. ANSYS V 12.1

150-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Athman Gunda, Kiptanui Too

Paper Title:

Development of a Short Message Service (SMS) Based Online Earth Moving Equipment Catalogue

Abstract: Earthmoving includes site preparation, excavation, embankment construction, backfilling, dredging, preparing base course, sub base, and sub grade, compaction, and road surfacing. The types of equipment used and the environmental conditions will affect the man- and machine-hours required to complete a given amount of work. Earth moving tools and equipment catalogue is essential for estimating onsite productivity and measuring project performance in earthmoving operations. This paper presents an online catalogue for earth moving operations Short Message Service (SMS), based system, developed for estimating performance of earth moving operations which will greatly assist contractors in selecting tools and equipment for earth works using SMS, making the system economical and efficient. The proposed system is programmed in c# programming language. The database is hosted on a MySQL and it uses Global system for mobile communication (GSM) to connect to a modem which in turn sends and receive short messages to and from the user. The developed system has been coded and the code request must contain only alphanumeric characters. Real case example of SMS request is analyzed to demonstrate the features of the developed online catalogue. When applied in the earthmoving industry the system can an enviable asset to contractors and increase the overall efficiency in earthmoving operations like embankment construction, backfilling, compaction and road surfacing, just to mention but a few

Keywords:
Earth Moving Operations (EMO), Global System for Mobile (GSM), Online Machine Catalogue (OMC), Short Message Service (SMS).


References:

1. Communication Commission of Kenya “Report released on 9th October 2012”. Viewed on 16th January, 2012, http:www.cck.go.ke.>publication and research.
2. Sylvia Nasambu Wasike. Analysis of ICT Policies and Regulations in the Mobile Sector in Kenya Interpretive Study of Mobile banking Service. June 2011.

3. Putnam, C.Rose, E.Walton, R. Kolko, B., "Mobile phone users in Kyrgyzstan: A case study of identifying user requirements for diverse users," Professional Communication Conference, July 2009.
4. A.Kukulska-Hulme and J.Traxler (Eds) (2005) Case studies, introduction and over view. In, Mobile learning: A hand book for educators and trainers.
5. Haraldur Arnorsson. Optimizing information flow in construction site. 2012.

6. Sonja Leskinen. “Mobile Solutions and the Construction Industry”. Is it a working combination? 2006.

7. C# definition. “Viewed on 1st February 2013”, http:/searchwindevelopment.techtarget.com/definition/c

8. MYSQL definition, “viewed on 2nd February 2013”, http://www.tecterms.com/definition/mysql.

9. Christopher Chepkuto Chebon, Development of road maintenance management system for unpaved roads in Kenya, 2009.

10. CASE “Earth moving equipments catalogue”, viewed on 26th December 2012. www.casece.com

11. “Bulk-sms-sending-using-c-gsmcomm”, viewed on 27th December 2012, http://bytes.com/topic/c-sharp/answers/943

154-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Subin Sunny, P.Balaji

Paper Title:

The Better Optimization Technique for the Placement of DG In Order To Reduce Overall Cost of Power System

Abstract: In a radial distribution system, the voltages at buses decrease and losses increase with increasing distance from the substation. DG can be utilized to overcome these problems. DG can deliver a portion of real and/or reactive power for reducing feeder current and thus improving both voltage profile and transmission efficiency. However, studies also shows incorrect placement of DG would lead to higher losses than the losses without DGs. This paper focuses on maximizing the net saving by minimizing the energy loss cost while considering installation and running cost of the Distributed generators. Both GA and PSO algorithms are used to find the optimal locations and sizes of DG. The obtained results are discussed and compared to each other. The proposed method is programmed and tested in a 33 bus distribution system using MATLAB software. For load flow analysis of the distribution network, forward backward sweep algorithm is used.

Keywords:
Voltage Profile Improvement, Genetic Algorithm, Particle Swarm Optimization, Distribution Generators, Forward/Backward Sweep Algorithm.


References:

1. G. Pepermans, J. Driesen, D. Haeseldonckx, R. Belmans and W.D.haeseleer, 2005. “Distributed Generation: Definition, Benefits and Issues”, Energy Policy, 33: 787-798.
2. W. El-Khattam, and M.M.A. Salama, “Distributed Generation Technologies, Definitions and Benefits”, Electric Power Systems Research. 71, pp.119–128, 2004.

3. S. Ghosh , S.P. Ghoshal and S. Ghosh, “Optimal sizing and placement of DG in network system”, International Journal of Electrical Power and Energy Systems. 2010, 32 (8): 849-856.

4. C´UrcˇIc´ S., Strbac G. and Zhang X.-P.: “Effect of losses in design of distribution circuits, IEE Proc., Gener. Transm. Distrib, 2001, 148, pp. 343–349.

5. Singh RK and Goswami SK. “Optimum allocation of distributed generations based on nodal pricing for profit, loss reduction, and voltage improvement including voltage rise issue,” Electrical Power Energy System 2010; 32:637–44.

6. K. Varesi, “Optimal Allocation of DG Units for Power Loss Reduction and Voltage Profile Improvement of Distribution Networks using PSO Algorithm,” World Academy of Science, Engineering and Technology 60 2011.

7. Sun jian, Jiang Daozhuo and Liu Zhihua, “Modified power flow algorithm of distribution network based on forward/backward sweep method,” Electric Power Automation Equipment.2004243:81-84

8. A. A. Bagheri, A. Habibzadeh and S. M. Alizadeh, “Comparison of the Effect of Combination of Different DG Types on Loss Reduction Using APSO Algorithm,” Canadian Journal on Electrical and Electronics Engineering Vol. 2, No. 10, October 2011.

9. Naresh A, “An analytical approach for DG allocation in primary distribution network," Electric Power and Energy Systems, pp. 669-678 (2006).

10. Caisheng Wang and M. Hashem Nehrir, “Analytical Approaches for Optimal Placement of Distributed Generation Sources in Power Systems,” IEEE Transactions on Power Systems, Vol. 19, No. 4, pp. 2068 – 2076, November 2004.

11. Víctor H. Méndez Quezada, Juan Rivier Abbad and Tomás Gómez San Román, “Assessment of Energy Distribution Losses for Increasing Penetration of Distributed Generation,” IEEE Transactions on Power Systems, Vol. 21, No. 2, pp. 533- 540, May 2006.

12. W. Prommee and W. Ongsakul, “Optimal Multi- Distributed Generation Placement by Adaptive Weight Particle Swarm Optimization,” Proc. Of the IEEE International Conference on Control, Automation and Systems, pp 1663-1668, Oct. 2008.

159-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Onur Yemenici, Habib Umur

Paper Title:

Velocity, Turbulent Intensity and Pressure Measurements in Turbulent Separated and Curved Flows

Abstract: Velocity, turbulent intensity and pressure measurements over various flow surfaces were carried out by a constant-temperature hot wire anemometer and a micro-manometer. The experiments performed over a flat plate, curved walls with a radius of 2.54 m either in concave or convex curvatures and a ribbed wall has a sequence of 7 ribs at the free stream velocity of 20 m/s encompassing turbulent flows. The results showed that the concave curvature destabilized the flow and increased turbulent intensity, contrary to the convex curvature. The presence of the ribs also caused bigger turbulent intensities and the flow separations and reattachments were determined before the first rib, between the ribs, on the first rib and behind the last rib.

Keywords:
Flow separation, turbulent intensity, curved flow, ribbed surface


References:

1. V.I. Terekhov and N.I. Yarygina, “Heat transfer in separated flows at high levels of free-stream turbulence”, IHTC-14 Washington DC USA, vol. 14, 2010, pp. 1-8.
2. Y.M. Chen and K.C. Wang, “Experimental study on the forced convective flow in a channel with heated blocks in tandem”, Exp. Therm. Fluid Sci., vol. 16, 1998, pp. 286-298.

3. D.N. Ryu, D.H. Choi and V.C. Patel, “Analysis of turbulent flow in channels roughened by two-dimensional ribs and three-dimensional blocks, Part I: Resistance”, Int. J. Heat Fluid Fl., vol. 28, 2007, pp. 1098-1111.

4. T.J. Young and K. Vafai, “Convective flow and heat transfer in a channel containing multiple heated obstacles”, Int. J. Heat Mass Transfer, vol. 41, 1998, pp. 3279–3298.

5. R.Wahidi, W. Chakrouni and S. Al-Fahed, “The behavior of the skin-friction coefficient of a turbulent boundary layer flow over a flat plate with differently configured transverse square grooves”, Exp. Therm. Fluid Sci., vol. 30, 2005, pp. 141-152.

6. M. Agelinchaab and M.F. Tachie, “PIV study of separated and reattached open channel flow over surface mounted blocks”, ASME J. Fluid. Eng., vol. 130, (2008) 1-9.

7. J. Cui, V.C. Patel and C.-L. Lin, “Large-eddy simulation of turbulent flow in a channel with rib roughness”, Int. J. Heat Fluid Fl., vol. 24, 2003, pp. 372–388.

8. V.I. Terekhov, N.I. Yarygina and R.F. Zhdanov, “Heat transfer in turbulent separated flows in the presence of high free-stream turbulence”, Int. J. Heat Mass Tran., vol. 46, 2003, pp. 4535–4551.

9. Y. Miyake, K. Tsujimoto and M. Nakaji, “Direct numerical simulation of rough-wall heat transfer in a turbulent channel flow”, Int. J. Heat Fluid Flow, vol.22, (2001) 237–244.

10. R.J. Volino and T.W. Simon, “Boundary layer transition under high free-stream turbulence and strong acceleration conditions: Part 2-Turbulent transport
results”, J. Heat Transfer-Transactions ASME, vol. 119, 1997, pp. 427–432.

11. D. Zhou and T. Wang, “Combined effects of elevated free-stream turbulence and streamwise acceleration on flow and thermal structures in transitional boundary layers”, Exp. Thermal Fluid Sci., vol. 12, 1996, pp. 338–351.

12. M.D. Kestoras and T.W. Simon, “Turbulent transport measurements in a heated boundary layer: combined effects of freestream turbulence and removal of concave curvature”, J. Heat Transfer-Transactions ASME, vol. 119, 1997, pp. 413–419.

13. R.E. Mayle, M.I. Blair and F.G. Kopper, “Turbulent boundary layer heat transfer on curved surfaces”, J. Heat Transfer-Transactions ASME, vol. 101, 1979, pp. 521–525.

14. H. Umur, “Concave wall heat transfer characteristics with longitudinal pressure gradients and discrete wall jets”, JSME Int. J., vol. 37, 1994, pp. 403–412.

15. D.H. Zhang, S.H. Winoto and Y.T. Chew, “Measurement in laminar and transitional boundary-layer flows on concave surface”, Int. J. Heat Fluid Flow, vol. 16, 1995, pp. 88–98.

16. K.C. Muck, P.H. Hoffman, and P. Bradshaw, “The effect of convex surface curvature on turbulent boundary layers”, J. Fluid Mech., vol. 161, 1985, pp. 347–369.

17. S.J. Kline and F.A. McClintock, “Describing uncertainties in single sample experiments”, Mech. Eng., vol. 75, 1953, pp. 3–8.

18. Z. Zhaoshun, H. Weidong and S. Hua, “Particle tracking method for measurements of turbulence properties in a curved channel”, Applied Scientific Research, vol. 51, 1993, pp. 249-254.

19. K. Nozawa and T. Tamura, “Large eddy simulation of the flow around a low-rise building immersed in a rough-wall turbulent boundary layer”, J. Wind Eng. Ind. Aerodyn. , vol. 90, 2002, pp. 1151–1162.

163-166

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Garima Vyas, Barkha Kumari

Paper Title:

Speaker Recognition System Based On MFCC and DCT

Abstract: This paper examines and presents an approach to the recognition of speech signal using frequency spectral information with Mel frequency. It is a dominant feature for speech recognition. Mel-frequency cepstral coefficients (MFCCs) are the coefficients that collectively represent the short-term power spectrum of a sound, based on a linear cosine transform of a log power spectrum on a non linear mel scale of frequency. The performance of MFCC is affected by the number of filters, the shape of filters, the way that filters are spaced, and the way that the power spectrum is warped. In this paper the optimum values of above parameters are chosen to get an efficiency of 99.5 % over a very small length of audio file.

Keywords:
Speech recognition, Feature extraction, Feature Matching, DCT, MFCCs


References:

1. Md Sahidullah, and Goutam Saha, “A Novel Windowing Technique for Efficient Computation of MFCC for Speaker Recognition” IEEE signal processing letters, vol. 20, no. 2, 2013, pp 149-153.
2. A.S.Bhalerao and V.B.Malode, “Implementation of Automatic Speaker Recognition on TMS320C6713 Using MFCC”, 2013 International Conference on Computer Communication and Informatics (ICCCI -2013), Coimbatore, India, 2013, pp 1-4.

3. Genevieve I. Sapijaszko and Wasfy B. Mikhael, “An Overview of Recent Window Based Feature Extraction Algorithms for Speaker Recognition” IEEE signal processing letters, vol. 12, 2012, pp 880-884.

4. R. Rajalakshmi and A. Revathy, “Comparison of MFCC and PLP in Speaker Identification using GMM” International Conference on Computing and Control
Engineering (ICCCE 2012), Coimbatore , 2012, pp 110-114.

5. Xinhui Zhou, Daniel Garcia-Romero, Ramani Duraiswami, Carol Espy-Wilson, Shihab Shamma, “Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition” IEEE signal processing letters, Maryland ,vol.12, 2011, pp 80-84.

6. Ibrahim Patel, Dr. Y. Srinivas Rao, “Speech Recognition Using HMM with MFCC- an Analysis Using Frequency Spectral Decomposition Technique” Signal & Image Processing : An International Journal, Vol.1, No.2, 2010, pp 101-110.

167-169

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Sarthak Singh, Sakshi Singh, Jitesh Kumar, Ankit Bajpai

Paper Title:

Declined Rectangular Slotted Microstrip Patch Antenna for Wi-Max and S-Band Application

Abstract: Low cost high performance antenna is required in communication services in areas such as wi-fi, wimax, microwave application , Ethernet etc. The electromagnetic simulation of the proposed antenna has been carried out using IE3D software which work on principle of Method of Moment. Return loss, VSWR, antenna efficiency and radiation pattern etc can be evaluated for given design.

Keywords:
Declined rectangularslot microstrip patch antenna for 3.5 GHz, return loss VSWR, antenna efficiency.


References:

1. M. K. Verma, Sapna Verma, and D. C. Dhubkarya, "Analysis and Designing of E-Shape Microstrip Patch Antenna for the Wireless Communication Systems", International Conference on Emerging Trends in Electronic and Photonic Devices & Systems (ELECTRO-2009), 2009.
2. Arny Adila Salwa Ali and Sharlene Thiagarajah, "A Review on MIMO Antennas Employing Diversity Techniques".Proceedings of the International Conference on Electrical Engineering and Informatics Institut Teknologi Bandung, Indonesia June 17-19, 2007.

3. Ramesh Gerg, Prakash Bhartia, Indar Bhal & Apisak Ittipiboon, "Microstrip Antenna Design Handbook", Artech House, London, 2001.

4. Sonali Jain, Prof. Rajesh Nema, " Review Paperfor Circular Microstrip Patch Antenna" International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.

5. Nasimuddin and Z. N. Chen, "Wideband multilayered microstrip antennas fed by coplanar waveguide-loop with and without via combinations," IET Microw. Antennas Propag., vol. 3, pp. 85-91, 2009.

6. J. S. Colburn and Y. Rahmat-Samii, "Patch antennas on externally perforated high dielectric constant Substrates IEEE Trans. Antennas Propag.,, vol. 47, no. 12, pp 1785-1794, 1999.

7. Kuo, Y. L. and K. L. Wong, Printed double- T monopole antenna for 2.4/5.2 GHz dual-band WLAN operations," IEEE Trans. Antennas Propag., Vol. 51, No. 9, 2187-2192.

8. Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

9. Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/

10. C. A. Balanis, "Antenna Theory, Analysis and Design," John Wiley & Sons, New York, 1997.

170-172

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Parul Saxena, Lokendra Kumar

Paper Title:

A Study of the Effect of Magnetic Field on the Transport of Cargos through Nuclear Pore Complex

Abstract: Nuclear pore complex is the largest type of macromolecular complex in the cell. In spite of their large size and complex structure NPC undergo complete breakdown and reformation at cell division. NPCs allow the transport of water soluble molecules across the nuclear envelope and can actively conduct 1000 translocations per complex per second. Small particles are able to pass through the nuclear pore complex by passive diffusion but larger particles are also able to pass through the large diameter of the pore but atmost negligible rates. Over the past few years there has been an increasing interest in the pore complex. The current challenge is to understand the effect of magnetic field and permeability on the transport of cargos from NPC using Mathematical model. For this purpose we have used bvp4c tool in Matlab. It is observed that magnetic field enhances the transport of cargos through NPC, which can be used in the cell based diseases.

Keywords:
Nuclear Pore Complex, Magnetic field. Mathematics Subject Classification: 76Zxx


References:

1. T. D. Allen, J. M. Cronshaw, S. Bagley, E. Kiseleya, M. W. Goldberg, 2000, The nuclear pore complex: mediator of translocation between nucleus and cytoplasm, Jour. of cell Sci., 113, pp. 1651- 1659.
2. A.Becskei, L. W. Mattaj, 2003, The strategy for coupling the Ran GTP gradient to nuclear protein export, PNAS, 100(4), pp. 1717-1722.

3. C.M. Feldherr, D. Akin, 1995, Nuclear transport as a function of cellular activity, Membr. Prot. Trans. 2, pp. 237-259.

4. C.M. Feldherr, D.Akin, 1999, Signal mediated transport in the amoeba, J.Cell Sci. 112, pp. 2043-2048.

5. B. Fontoura, G. Blobel, M. J. Matunis, 1999, A conserved biogenesis pathway for nucleoporins: proteolytic processing of a 186kDa precursor generates Nup98 and the novel nucleoporin, Nup96. J. Cell Biol. 144, pp. 1097-1112.

6. M. W.Goldberg, J. M. Cronshaw, E. Kiseleya, T. D. Allen, 1999, Nuclear pore complex dynamics and transport in higher eukaryotes, Protoplasma, 209, pp. 144-156.

7. D. Gorlich, U. Kutay, 1999, Transport between the cell nucleus and cytoplasm, Annu. Rev. Cell Dev. Biol. 15, pp. 607-660.

8. J. E. Hinshaw, B. O. Carragher, R. A. Milligan, 1992, Architecture and design of the nuclear pore complex, Cell 69, pp.1133-1141.

9. E. Izaurraide, I. W. Mattaj, 1992, Tansport of RNA between nucleus and cytoplasm, Semincell Biol, 3(4), pp. 279-288.

10. J. W. Mattaj, I. Englmeier, 1998, Nucleocytoplasmic transport: the soluble phase, Annu. Rev. Biochem., 67, pp. 265-306.

11. P. R. Michael, D. A. John, 2001, The nuclear pore complex as a Transport Machine, Jour. Biol. Chem., 276, pp. 16593-16596.

12. S. Nakielny, G. Deryfuss, 1999, Transport of proteins and RNAs in and out of the nucleus, Cell, 99, pp. 677-690.

13. E. M. O' Brien, D. A. Gomes, S. Sehgal, M. S. Nathanson, 2007, Hormonal regulation of Nuclear permeability, Jour. of Biol. Chem., 282(6), pp. 4210-4217.

14. R. Reichelt, A. Holzenburg, E. L. Jr. Buble, M. Jarnik, A. Engel , U. Aebi,1990, Correlation between structure and mass distribution of the nuclear pore complex and of distinct pore complex components, J. Cell Biol, 110, pp.883-894.

15. L. F. Shampine, J. Kierzenka, 2000, Solving boundary value problems for ordinary differential equations in MATLAB with bvp4c (Tutorial Notes).

16. A. C. Srivastava , P. Saxena, 2011, Torsional oscillations of a disk in a conducting fluid bounded by a porous medium under the effect of transverse magnetic field, Jour. Porous Media, 14 (7), pp. 607-614.

173-178

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Minal N. Chavhan, S.O.Rajankar

Paper Title:

Study the Effects of Encryption on Compressive Sensed Data

Abstract: Today’s technological era is highly dominated by data transfer. Since confidential data is transmitted over risky media like internet, faithful data transfer is now accompanied with secure data transfer. Security is the need of the hour. Here, a new and relatively simple encryption algorithm is proposed which shuffles the elements. It randomizes the data. But this algorithm is applied on compressed sensed data which inherently has encryption properties. A study of the security of this additional encryption algorithm over the compressed sensed data is done and observed the objective quality of the recovered data in presence of noise.

Keywords:
compressive sensing, faithful data transfer, objective quality, security


References:

1. Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”,IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
2. Krikor L., Baba S., Arif T., and Shaaban Z., “Image Encryption Using DCT and Stream Cipher”, European Journal of Scientific Research, vol. 32, no. 1, pp. 47-57, 2009.

3. Yahya A. and Abdalla A., “A Shuffle Image-Encryption Algorithm”, Journal of ComputerScience, vol. 4, no.12, pp. 999-1002, 2008.

4. Jayant Kushwaha, Bhola Nath Roy, “Secure Image Data by Double encryption”, International Journal of Computer Applications (0975 – 8887),Volume 5– No.10, August 2010.

5. Sanil Fulani, Dr. K.R. Rao.,“Compressive Sensing of Image and Application to Communication Channel Coding.”

6. Adem Orsdemir, H. OktayAltun, Gaurav Sharma, Mark F. Bocko, “On the Security and Robustness of Encryption via Compressed Sensing”, 978-1-4244-2677-5/08/$25.00 © 2008 IEEE.

7. Emmanuel J. Candès, Justin Romberg, Terrance Tao, “Stable Signal Recovery from Incomplete and Inaccurate Measurements,” Communications on Pure and Applied Mathematics, Vol. LIX, 1207–1223 (2006) ©2006 Wiley Periodicals, Inc.

8. Donoho D., “Compressed sensing”, IEEE Transactions on Information Theory, 52, 4 (Apr.2006), 1289—1306.

9. Emmanuel J. Candès, Michael B. Wakin, “Compressive sampling ppt”.

10. Emmanuel J. Candès, Justin Romberg, “Robust Uncertainty Principles: Exact Signal Reconstruction From Highly Incomplete Frequency Information”, IEEE transactions on information theory, vol. 52, no. 2, february 2006

11. Justin Romberg, “Variational Methods for Compressive Sampling”, Electrical and Computer Engineering, Georgia Tech, Atlanta, GA.

12. Emmanuel Candes and Terence Tao, “Near Optimal Signal Recovery From Random Projections: Universal Encoding Strategies”, IEEE Trans. Inform. Theory, submitted. Ar Xiv: math.CA/0410542,October 2004.

13. Heung-No Lee, “Introduction to Compressed Sensing”, GIST, Korea, 2011, pp 20-26, 86-95.

14. Stephen Boyd, Lieven Vandenberghe, Convex Optimization, Cambraidge University Press, pp. 7-10, 21, 561-570, 609- 612.

15. Chuong B. Do, Convex Optimization Overview (cnt’d), November 29, 2009

179-182

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Jitesh Kumar,Sakshi Singh, Sarthak Singh, Arvind Gaur

Paper Title:

A Multiple Nonagon Void Slotted Rectangular Micro-Strip Patch Antenna

Abstract: In this paper we present a proposed design for Rectangular micro-strip patch antenna by cutting multiple nonagon void shaped slots in the Rectangular patch. Using proposed antenna design and probe feeding at proper position we find the resultant return loss, VSWR and bandwidth. We are using IE3D simulation software for designing and analysis. We have observed that using slotted patch antenna and using probe feed at proper location we can get better VSWR and bandwidth.

Keywords:
Slotted Nonagon void shaped rectangular micro-strip patch antenna, VSWR, radiation pattern.


References:

1. Beno, D. S. Emmanuel “Diamond Shaped Symmetrical Slotted Miniaturized Microstrip Patch Antenna For Wireless Applications “Journal of Theoretical And Applied Information Technology (Jatit) , 31st January 2013. Vol. 47 No.3 , Issn: 1992-8645 E-Issn: 1817-3195.
2. Alka Verma “Analysis And Design of E Shaped Patch Antenna In X Band” International Journal of Advanced Engineering Technology (Ijaet) E-Issn 0976-3945.

3. Adil Hameed Ahmad and Basim Khalaf Jaralla,„Design and Simulation of Broadband Rectangular Microstrip Antenna, Eng. Tech. V0l.26,No1. 2008.

4. Fan Yang, Xui-Xia Zhang, Xioning Ye, and Yahya Rahmat-Sami, “Wideband E-shaped Patch Antenna for Wireless Communications,” IEEE Transactions on Antennas and Propagation, vol. 49, no.7, July 2001.

5. Sonali Jain, Prof. Rajesh Nema, “ Review Paperfor Circular Microstrip Patch Antenna” International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.

6. Nasimuddin and Z. N. Chen, “Wideband multilayered microstrip antennas fed by coplanar waveguide-loop with and without via combinations,” IET Microw. Antennas Propag., vol. 3, pp. 85–91, 2009.

7. S. K. Oh, H. S. Yoon, and S. O. Park, “A PIFA-type varactor-tunable slim antenna with a PIL patch feed for multiband applications,” IEEE Antennas Wireless
Propag. Lett., vol. 6, pp. 103–105, 2007.

8. Garima, D.Bhatnagar, J.S.Saini, V. K. Saxena and L. M. Joshi, “Design of Broadband Circular Patch Microstrip Patch Antenna with Diamond Shape Slot”, Indian
Journal of Radio and Space Physics, Vol 40, pp. 275-281, October 2011.

9. Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

10. Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/

11. C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.

183-185

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

Sakshi Singh, Jitesh Kumar, Sarthak Singh, Shalabh Gaur

Paper Title:

Design of Arrow Head Slotted Microstrip Patch Antenna for Wlan Applications

Abstract: In recent years, great interest was focused on microstrip antennas for their small volumes, low profiles, excellent integration, low costs and good performance. With the continuous growth of wireless communication service and the constant miniaturization of communication equipment, there are higher and higher demands for the volume of antennas, integration and working band. This paper presents a single layer arrow head slotted microstrip patch antenna is thoroughly simulated for wireless communications system application which are suitable for the 3.5GHz operations. A constant circular radiation pattern, for an operating frequency of 3.5GHz can be easily achieved. Configuration of an antenna is easy to design. Different parameters like VSWR which is 1.5 at 3.5GHz, gain, radiation pattern in 2D & 3D are simulated using IE3D. This type of proposed patch can be used for various applications in S band.

Keywords:
Micro-strip patch antenna, Radiation pattern,Gain, Circular polarization, VSWR, Return Loss.


References:

1. Ram Singh Kushwaha , D.K.Srivastava , J.P.Saini ” A Design of H-shape Slot loaded Wideband Microstrip Patch Antenna” International Journal of Electronics and Computer Science Engineering (IJECSE), ISSN-2277-1956/V1N2-533-537.
2. Ramadan, A., K. Y. Kabalan, A. El-Hajj, S. Khoury, and M. Al- usseini, “A reconfigurable U-Koch microstrip antenna for wireless applications," Progress In
Electromagnetics Research, PIER 93, 355-367, 2009.

3. Md. Mahabub Alam, Rifat Ahmmed Aoni, Md. Toufikul Islam ” Gain Improvement of Micro Strip Antenna Using Dual Patch Array Micro Strip Antenna” Journal of Emerging Trends in Computing and Information Sciences , VOL. 3, NO.12 Dec, 2012 ISSN 2079-8407

4. Mayank Dwivedi1, Vinod Kumar Singh2, Mandeep singh Saini “Compact Dual Band Slotted Microstrip Antenna for IEEE802.11b Applications” International Journalof Advanced Research in Computer Science and Software Engineering(IJARCSSE)” Volume 2, Issue 10, October 2012 ISSN: 2277 128X

5. Mohammad A. A. Subhi H. Ahmad A. K. and Juma S. M. “Cavity model analysis of rectangular microstrip antenna operating in TM03 mode”, IEEE proc. pp. 0-2218-2223, 2006..

6. K. L. Wong and W. H. Hsu, “A broadband rectangular patch antenna with a pair of wide slits,” IEEE Transactions on Antennas and Propagation, vol. 49, pp. 1345-1347,September 2001.

7. Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

8. C. J. Prior and P. S. Hall, “Micro strip disk antenna with short-circuited annular ring”,Electronics Letters, Vol.21, pp. 719-721, 1985.

9. Vinod K. Singh, Zakir Ali, “Dual Band U- shaped microstrip antenna for wireless Communication” International Journal of Engineering Science Technology, India, VOL 2 (6), pp 1623-1628, June,2010.

10. Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/

186-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Bhupendra Panchal, R.K.Kapoor

Paper Title:

Performance Enhancement of Cloud Computing with Clustering

Abstract: Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource sharing and use of virtualization allows improved performance for demanding scientific computing workloads. Number of data centers and physical servers are underutilized so they are used inefficiently. So performance evaluation and its enhancement in virtualized environment like public and private cloud are the challenging issues. Performance of cloud environment is dependent on CPU & memory utilization, Network and I/O disk operations. In order to improve the performance of the virtualization with cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus replicas are available at each data centers and are highly available. In the proposed work, the I/O parameters are chosen for increasing the performance in this domain. This enhancement can be achieved through the clustering and caching technologies. The use of technology for data centers clustering is proposed in this paper. Thus performance and scalability can be improved by reducing the number of hits to the cloud database.

Keywords:
Virtualization, cloud computing, clustering, performance enhancement, caching.


References:

1. G. Malathy, Rm. Somasundaram, “Performance Enhancement in Cloud Computing using Reservation Cluster”, European Journal of Scientific Research, ISSN 1450-216X Vol. 86 No 3 September, 2012, pp.394-401
2. Donglai Zhang, Paul Coddington and Andrew Wendelborn,” Improving Data Transfer Performance of Web Service Workflows in the Cloud Environment”, Int. J. Computational Science and Engineering, Vol. 1, No. 1/1, 2012

3. Wei Huang , Jiuxing Liu, Bulent Abali and Dhabaleswar K. Panda, “A Case for High Performance Computing with Virtual Machines”, ICS ’06 Proceedings of the 20th annual international conference on supercomputing, pages 125-134

4. C. Pelletingeas, “Performance Evaluation of Virtualization with Cloud Computing”, MSc Advanced Networking, 2010

5. Alexandru Iosup, Simon Ostermann, M. Nezih Yigitbasi, “Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing”, IEEE Transaction on parallel and distributed system, VOL. 22, NO. 6, JUNE 2011

6. Mattias Sunding, Maximizing Virtual Machine Performance, vkernel corporation, A Quest Software Company, http://www.vkernel.com

7. Devarshi Ghosal, R.Shane Canon and Lavanya Ramakrishnan,”I/O Performance of Virtualized Cloud Enviornment”

8. Joyent White paper, Performance and scale in cloud computing

9. Nikolaus Huber, Marcel von Quast, Micahal Hauck and Samuel Konev, “Evaluating and Modeling Virtualization Performance Overhead for Cloud Enviornments”

10. A. Mahendiran, N. Saravanan, N. Venkata Subramanian and N. Sairam, “Implementation of K-Means Clustering in Cloud Computing Environment” , Research Journal of Applied Sciences, Engineering and Technology 4(10): 1391-1394, 2012 ISSN: 2040-7467

11. Michael Shindler, Alex Wong and , and Adam Meyerson “Fast and Accurate k-means For Large Datasets”

12. P. Ashok, Dr. G.M Kadhar Nawaz, E.Elayaraja and V. Vadivel, “Improved Performance of Unsupervised Method by Renovated K-Means”

13. Karedla, R., Love, J.S. and Wherry,B.G.,”Caching strategies to improve disk system performance”,IEEE computer Society, VOL. 27, March 1994

14. Q. Luo, J.F.Naughton, R.Krishnamurthy, Pei Cao and Yunrui Li,”Active Query Caching for Database Web Servers”, WebDB 2000, LNCS 1997, pp. 92-104, 2001

189-191

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Er. Jagdish Patil, Er. Pratik Gite, Sanjay Thakur

Paper Title:

Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks

Abstract: In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. This observation was previously exploited by opportunistic routing protocols, by using single-path routing metrics to assign to each node a group of candidate relays for a particular destination. This paper addresses the least-cost anypath routing (LCAR) problem: how to assign a set of candidate relays at each node for a given destination such that the expected cost of forwarding a packet to the destination is minimized. The key is the following tradeoff: on one hand, increasing the number of candidate relays decreases the forwarding cost, but on the other, it increases the likelihood of “veering” away from the shortest-path route. Prior proposals based on single-path routing metrics or geographic coordinates do not explicitly consider this tradeoff, and a s aresult do not always make optimal choices. The LCAR algorithm and its framework are general and an be applied to a variety of networks and cost models. We show how LCAR can incorporate different aspects of underlying coordination protocols, for example a link-layer protocol that randomly selects which receiving node will forward a packet, or the possibility that multiple nodes mistakenly forward a packet. In either case, the LCAR algorithm finds the optimal choice of candidate relays that takes into account these properties of the link layer. Finally, we apply LCAR to low-power, low-rate wireless communication and introduce a new wireless link-layer technique to decrease energy transmission costs in conjunction with anypath routing. Simulations show significant reductions in transmission cost to opportunistic routing using single-path metrics. Furthermore LCAR routes are more robust and stable than those based on single-path distances, due to the integrative nature of the LCAR’s route cost metric.

Keywords:
Ad-hoc, MANET, Cooperative Caching


References:

1. Thomas Clausen and Philippe Jacquet, Optimized Link State Routing Protocol (OLSR), IETF RFC 3626, Oct. 2003,Available:http://www.ietf.org/rfc/rfc3626.txt [Accessed Sept. 17, 2009].
2. UniK OLSR daemon software, http://www.olsr.org/[Accessed Sept. 16,2009].

3. Implementing a fully distributedcertificate authority in an OLSR MANET Dhillon, D. (RSA Security Inc., Vancouver, BC, Canada); Randhawa, T.S. Wang, M. Lamont, L. Source: 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733), p 682-8 Vol.2, 2004

4. Thomas Aure, Metric-based routing framework and radio-aware shortest path selec- tion for OLSR, May 2008, Available: http://www.velocitynetworks.org/olsr/master-thomasau.pdf [Accessed Sept. 16, 2009].

5. MF-OLSR implementation, Available: http://www.velocitynetworks.org/olsr/eolsrd-0.5.zip [Accessed Sept. 16, 2009].

6. Multimetric OLSR and ETT, A. Lav´en, P. Hj¨artquist, 5th OLSR Interop & Workshop, October 2-4, 2009 in Vienna, Austria

7. Net-X webpage, http://www.crhc.illinois.edu/wireless/netx.html [Accessed Sept. 16,2009].

8. Pradeep Kyasanur, Capabilities, August 2006.

9. P. Kyasanur and N. Vaidya, ”Routing and Link-layer Protocols for Multi-Channel Multi-Interface Ad Hoc Wireless Networks” Source: ACM SIGMOBILE Mobile Computing and Communications Review , Issue 1 (January 2006), p 31 - 43 Vol.10, 2006

10. Implementing the expected transmission time metric for OLSR wireless mesh networks Esposito, P.M. (Grupo de Teleinformatica Automacao PEE/COPPE - DEL/POLI, Univ. Fed.do Rio de Janeiro, Rio de Janeiro,Brazil); Campista, M. Moraes, I.M. Costa, L. Duarte, O. Rubinstein, M.G. Source: 2008 1st IFIP Wireless
Days, p 5 pp.,2008

11. A high-throughput path metric for multi-hop wireless routing De Couto, D.S.J. (Com- put. Sci. & Artificial Intelligence Lab., MIT, Cambridge, MA, USA); Aguayo, D. Bicket, J. Morris, R. Source: Wireless Networks, v 11, n 4, p 419-34, 2005

12. A channel and rate assignment algorithm and a layer-2.5 forwarding paradigm for multi-radio wireless mesh networks Avallone, Stefano (Department of Computer En- gineering, University of Naples, 80125 Naples, Italy); Akyildiz, Ian F. Ventre, Giorgio Source: IEEE/ACM Transactions on Networking, v 17, n 1, p 267-280, 2009

13. Highly-resilient, energy-efficient multipath routing in wireless sensor networks Gane- san, D. (California Univ., Los Angeles, CA, USA); Govindan, R. Shenker, S. Estrin, D. Source: MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, p 251-4, 2001

192-196

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

Er. Mittu Mittal, Er. Gagandeep Kaur

Paper Title:

Mixed Pixel Resolution by Evolutionary Algorithm: A Survey

Abstract: Now a day’s Remote Sensing is a mature research area. Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed pixel which always degrades the image quality. Mixed pixels are usually the biggest reason for degrading the success in image classification and object recognition. Another major problem is the decomposition of mixed pixels precisely and effectively. Remote sensing data is widely used for the classification of types of features such as vegetation, water body etc but the problem occurs in tagging appropriate class to mixed pixels. In this paper we attempted to present an approach for resolving the mixed pixels by using optimization algorithm i.e. Biogeography based optimization. The main idea is to tag the mixed pixel to a particular class by finding the best suitable class for it using the BBO parameters i.e. Migration and Mutation.

Keywords:
Biogeography based optimization, Evolutionary algorithms, mixed pixel, Migration, Mutation, Remote Sensing


References:

1. Suruchi Sinha, Abhishek Bhola, V.K.Panchal, Siddhant Singhal and Ajith Abraham,” Resolving Mixed Pixels by Hybridization of Biogeography Based Optimization and Ant Colony Optimization”, WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia .
2. V.K.Panchal and Nitish Gupta. “Swarm Intelligence For Mixed Pixel Resolution”, IEEE Geo Sciences and Remote Sensing Symposium (IGRASS), pp- 2801-2804, 2011.

3. P. Bosdogianni ; Maria Petrou ; Josef Kittler ,” Mixed pixel classification in remote sensing” , Image and Signal Processing for Remote Sensing Jacky Desachy Rome, Italy | September 26, 2012.

4. A. L. Choodarathnakara, Dr. T. Ashok Kumar, Dr. Shivaprakash Koliwad, Dr. C. G. Patil ,” Mixed Pixels: A Challenge in Remote Sensing Data Classification for Improving Performance” , International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 9, November 2012.

5. Lavika Goel, Daya Gupta, Vinod Panchal ,” Extended Species Abundance Models of Biogeography Based Optimization” , 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation. 2166-8531/12 $26.00 © 2012 IEEE DOI 10.1109/CIMSim.2012.30.

6. Haiping Ma, Minrui Fei, Zhiguo Ding, Jing Jin,” Biogeography-Based Optimization with Ensemble of Migration Models for Global Numerical Optimization” , WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia.

7. Alaa Sheta, Malik S. Braik, Sultan Aljahdali ,” Genetic Algorithms: A Tool for Image Segmentation” ,The World Islamic Science and Education (WISE) University, Amman, Jordan 978-1-4673-1520-3/12/$31.00 ©2012 IEEE.

8. Dan Simon, Senior Member, IEEE, Mehmet Ergezer, Member, IEEE, Dawei Du, and Rick Rarick , “Markov Models for Biogeography-Based Optimization” , IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 41, and NO. 1, FEBRUARY 2011.

9. D. Simon, “Biogeography-based optimization,IEEE Trans. Evol. Comput.,vol. 12, no. 6, pp. 702–713, Dec. 2008.

10. Haiping Ma, Suhong Ni, and Man Sun ,” Equilibrium Species Counts and Migration Model Tradeoffs for Biogeography-Based Optimization” , Joint 48th IEEE
Conference on Decision and Control and 28th Chinese Control Conference Shanghai, P.R. China, December 16-18, 2009.

11. Binitha S, S Siva Sathya ,” A Survey of Bio inspired Optimization Algorithms”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-2, May 2012.

12. Anita Thengade , Rucha Dondal, “Genetic Algorithm - Survey Paper”, IJCA Journal 2012.

13. Purshottam J. Assudani, Latesh G. Malik ,” Genetic Algorithm Based Dot Pattern Image Processing” , IJCA Journal 2012.

197-199

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Abhishek Mathur, Trapti Agrawal

Paper Title:

A Survey: Access Patterns Mining Techniques and ACO

Abstract: In this paper we define Web Mining as Data Mining on the web. Further we define Web Usage Mining along with its applications and tools. Overall the focus of the paper will be to present a survey of the recent developments of the past and current work in Web Usage Mining and looks at Ant Colony optimization algorithm as a clustering technique for web usage patterns. In addition, there is an attempt to provide an overview of the state of the art on ACO in WUM.

Keywords:
Data Mining, Web Mining, Web Usage Mining, Site Customization, Ant Colony Optimization, Server Logs Data, Clustering


References:

1. Kavita sharma, gulshan shrivastava, and vikas kumar, “Web mining: today and tomorrow”, IEEE International conference on Electronics Computer technology 2011
2. M. eirinaki and m. vazirgiannis , web mining for web personalization, ACM transactions on internet technology, 3(1), 2000, 1-27.

3. hussain, t., s. asghar, et al. (2010). Web usage mining: a survey on preprocessing of web log file. IEEE, international conference on (iciet) 2010, karachi
pakistan

4. chhavi rana “a study of web usage mining research tools” int. j. advanced networking and applications volume:03 issue:06 pages:1422-1429 (2012)

5. xiangji huang, nick cercone, and aijun an. comparison of interestingness functions for learning web usage patterns, proceedings of the eleventh international
conference on information and knowledge management, pages 617–620. ACM press, 2002.
6. s. shiu c. wong and s. pal. mining fuzzy association rules for web access case adaptation. in case-based reasoning research and development: proceedings of the fourth international conference on case-based reasoning, 2001.
7. eleni stroulia nan niu and mohammad el-ramly. understanding web usage for dynamic web-site adaptation: a case study. in proceedings of the fourth international workshop on web site evolution (WSE’02), pages 53–64. ieee, 2002.

8. behzad mortazavi-asl. discovering and mining user web-page traversal patterns. master’s thesis, simon fraser university, 2001.

9. t. b. pedersen s. jespersen and j. thorhauge. a hybrid approach to web usage mining. technical report r02-5002, department of computer science aalborg university, 2002.

10. y. xie, v.v. phoha, web user clustering from access log using belief function, in: proceedings of the first international conference on knowledge capture (k-cap 2001), ACM press, 2001, pp. 202–208.

11. A. banerjee, j. ghosh, clickstream clustering using weighted longest common subsequences, in: proceedings of the web mining workshop at the 1st siam conference on data mining, 2001.

12. A. hay, g. wets, k. vanhoof, clustering navigation patterns on a website using a sequence alignment method in: intelligent techniques for web personalization: ijcai 2001, 17th int. joint conf. on artificial intelligence,august 4, 2001, seattle, wa, usa, pp. 1–6.

13. j.h. holland, adaptation in natural and artificial systems, university of michigan press, ann arbor, 1975,republished by the MIT press, 1992.

14. o. nasraoui, f. gonzalez, d. dasgupta, the fuzzy artificial immune system: motivations, basic concepts, and application to clustering and web profiling, in: proceedings of the world congress on computational intelligence (wcci) and ieee international conference on fuzzy systems, 2002, pp. 711–716.

15. A. ypma, t. heskes, clustering web surfers with mixtures of hidden markov models, in: proceedings of the 14th belgian–dutch conference on ai (bnaic_02),
2002.

16. s. oyanagi, k. kubota, a. nakase, application of matrix clustering to web log analysis and access prediction,.

17. p. berkhin, “survey clustering data mining techniques”, technical report, accrue software, san jose, california, 2002.

18. w. bin and s. zhongzhi, “ a clustering algorithm based on swarm intelligence”, proc. of the int. conf. on info-tech. and info-net, beijing,china, 2001, pp. 58-66. sigkdd explorations newsletter, 1(2), 2000, 12-23.

19. natheer khasawneh, chien-chung chan web usage mining using rough sets.

20. ms. jyoti dr. a. k. sharma dr. amit goel ms. payal gulati “a novel approach for clustering web user sessions using rst”

21. tasawar hussain, dr. sohail asghar, simon fong “a hierarchical cluster based preprocessing methodology for web usage mining”

22. zahid ansari_, a. vinaya babuy, waseem ahmed_ and mohammad fazle azeem “a fuzzy set theoretic approach to discover user sessions from web navigational data”

23. k.suresh, r.madanamohana, a.ramamohanreddy, a.subrmanyam “improved fcm algorithm for clustering on web usage mining”

24. ms k.santhisree, dr. a damodaram“clique: clustering based on density on web usage data: experiments and test.

25. ajith abraham, vitorino ramos “web usage mining using artificial ant colony clustering and linear genetic programming”@IEEE 2010

26. h. hannah inbarani, k. thangavel “clickstream intelligent clustering using accelerated ant colony algorith” ©2006 IEEE.

27. kobra etminani 1 mohammad-r. akbarzadeh-t. 2 noorali raeeji anehsarikobra etminani 1 mohammad-r. akbarzadeh-t. 2 noorali raeeji yanehsari “web usage mining: users' navigational patterns extraction from web logs using ant-based clustering method” ifsa-eusflat 2009

28. mrs. v. sujatha, dr. punithaval li “ an approach to user navigation pattern based on ant based clustering and classification using decision trees” @ 2010

29. anna alphy 1, s. prabakaran “cluster optimization for improved web usage mining using ant nestmate approach”@IEEE 2011.

30. pablo loyola, pablo e. rom´an and juan d. vel´asquez “clustering-based learning approach for ant colony optimization model to simulate web user behavior” 2011 IEEE.

200-206

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Surender Kumar Yellagoud, Munjuluri Sree Harsha, Bhamidipati Sridhar

Paper Title:

More Accurate and Fast Fault Identification on Power Networks Using Artificial Neural Networks

Abstract: This paper is mainly on illustrating the inherent potential of artificial intelligence(AI) tools and techniques to accurately predict and detect faults at an early stage in power systems. An AI mainly monitors and predicts locus ‘n’ nature of faults at an early stage on particular sections of power systems which increase the reliability and quality of the power system. The detector for this early warning fault detection device only requires external measurements taken from the input and output nodes of the power system. The AI detection system is capable of rapidly predicting a malfunction within the system. Artificial neural networks (ANNs) are being used at the core of the fault detection. Furthermore, comments on an evolutionary technique as the optimization strategy for ANNs are included in this work.

Keywords:
Fault detection, fault identification, fault classification, artificial neural networks, power system networks, power quality, power reliability.


References:

1. Europe Gets into Fuzzy Logic (Electronics Engineering Times, Nov. 11, 1991).
2. Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh, ed. R.R. Yager et al. (John Wiley, New York, 1987).

3. "U.S. Loses Focus on Fuzzy Logic" (Machine Design, June 21, 1990).

4. Why the Japanese are Going in for this 'Fuzzy Logic' by Emily T. Smith (Business Week, Feb. 20, 1993, pp. 39).

5. R. R. Yager, "On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision-making," IEEE Trans. on Systems, Man and Cybernetics, vol. 18, pp. 183-190, 1988.

6. Europe Gets into Fuzzy Logic (Electronics Engineering Times, Nov. 11, 1991).

7. Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh, ed. R.R. Yager et al. (John Wiley, New York, 1987).

8. U.S. Loses Focus on Fuzzy Logic (Machine Design, June 21, 1990).

9. Why the Japanese are Going in for this 'Fuzzy Logic' by Emily T. Smith (Business Week, Feb. 20, 1993, pp. 39).

10. L. Xu, M.-Y. Chow and L. S. Taylor, "Power Distribution Fault Cause Identification with Imbalanced Data Using the Data Mining Based Fuzzy Classification E-Algorithm," IEEE Transaction on Power Systems, Feb 2007,vol.22,no.1, pp.164-171.

11. L. Xu and M.-Y. Chow,"A classification approach for power distribution systems fault cause identification," IEEE Transactions on Power Systems, 2006, vol. 21, no. 1, pp. 53-60.

12. Yu Yuehai, Bai Yichuan, Xi Guofi~X, u Shiming, Luo Jianbo, “Fault Analysis Expert System for Power System”, IEEE-International Conference on Power System Technology–Powercon,2004,pp. 1822-1826.

13. Hong-Chan Chin, “Fault Section Diagnosis of Power System Using Fuzzy Logic”, IEEE Trans Power System, 2003, vol. 18, No. 1, pp. 245-250.

207-214

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

M. M. Manyuchi, A. Phiri, P. Muredzi

Paper Title:

Effect of Vermicompost, Vermiwash and Application Time on Soil Micronutrients Composition

Abstract: Vermicomposting is increasingly becoming popular as an organic solid waste management strategy. The technology results in two bio-fertilizers, vermicompost and vermiwash. The bio-fertilizers were applied to the soil and their impact on the soil micronutrients time was quantified. A maximum of 1000g of vermicompost and vermiwash was applied over 40 days. 23 factorial designs were used to determine the effects of the bio-fertilizers and application time on the soil micronutrients. Increasing the vermicompost quantity resulted in increased soil zinc, manganese and iron content. Increased vermiwash quantities resulted in increased soil iron content but resulted in decreased copper content. Furthermore, increased application time of the two bio-fertilizers resulted in enhanced soil copper and iron content but decreased the zinc and manganese content. The loam-clay soil, organic material from the bio-fertilizers and microbial activity played a significant role in altering the soil micronutrients.

Keywords:
Vermicompost, vermiwash, application time, soil micronutrients, bio-fertilizer


References:

1. D. C. Jadia and M. H. Fulekar, “Vermicomposting of vegetable waste: A bio-physicochemical process based on hydro- operating bioreactor”, African Journal of Biotechnology, Vol 7 (20), pp. 3723-3730, 2008.
2. T. Abbasi, S. Gajalakshmi and S. A. Abbasi, “Towards modelling and design of vermicomposting systems: Mechanisms of composting /vermicomposting and their implications”, Indian Journal of Biotechnology, Vol 8, pp. 177-182, 2009.
3. A. A. Ansari and K. Sukhraj, “Effect of vermiwash and vermicompost on soil parameters and productivity of okra (abelmoschus esculentus) in Guyana”, Pakistan J. Agric Resources, Vol 23, pp. 137-142, 2010.

4. W. Zularisam, Z. Siti Zahirah, I. Zakaria, M. M Syukri, A. Anwar and M. Sakinah, “Production of fertilizer from Vermicomposting Process of Municipal Waste”, Journal of Applied Sciences 10 (7), pp. 580-584, 2010.

5. V. Palanichamy, B. Mitra, N. Reddy, M. Katiyar, R. B. Rajkumari, C. Ramalingam and Arangantham, “Utilizing Food Waste by Vermicomposting, Extracting Vermiwash, Castings and Increasing Relative Growth of Plants”, International Journal of Chemical and Analytical Science 2 (11), pp. 1241-1246, 2011.

6. M. M. Manyuchi, A. Phiri, N. Chirinda, P. Muredzi, J. Govha and T. Sengudzwa, “Vermicomposting of Waste Corn Pulp Blended with Cow Dung Manure using Eisenia Fetida”, World Academy of Science, Engineering and Technology, 68, pp. 1306-1309, 2012.

7. M. M. Manyuchi, A. Phiri, P. Muredzi and S. Boka, “Comparison of vermicompost and vermiwash bio-fertilizers from vermicomposting waste corn pulp”, World Academy of Science, Engineering and Technology (submitted for publication), 2013a

8. M. M. Manyuchi., T. Chitambwe., P, Muredzi and Kanhukamwe, Q, “Continuous flow-through vermireactor for medium scale vermicomposting”, Asian Journal of Engineering and Technology, 1 (1), pp. 44-48, 2013b.

9. G. Nath, K. Singh and D. K. Singh, “Chemical Analysis of Vermicomposts/Vermiwash of Different Combinations of Animal, Agro and Kitchen Wastes”, Australian Journal of Basic Applied Sciences 3 (4), pp. 3671-3676, 2009.

10. M. Gopal, A. Gupta, C. Palaniswami, R. Dhanapal and G. V Thomas, “Coconut leaf vermiwash: a bio-liquid from coconut leaf vermicompost for improving the crop production capacities”, Current Science, Vol 98, pp. 1202-1210, 2010.

11. Sundaravadivelan, L. Isaiarasu, M. Manimuthu, P. Kumar, T. Kuberan and J. Anburaj, “Impact analysis and confirmative study of physico-chemical, nutritional and biochemical parameters of vermiwash produced from different leaf litters by using two earthworm species”, Journal of Agricultural Technology, Vol 7 (5) , pp. 1443-1457, 2011.

12. K. Tharmaraj, P. Ganesh, K. Kolanjinathan, R. Suresh Kumar and A. Anandan, “Influence of vermicompost and vermiwash on physico chemical properties of rice cultivated soil”, Current Botany, Vol 2, pp. 18-21, 2011.

13. G. Nath and K. Singh, “Effect of vermiwash of different vermicomposts on the kharif crops”, Journal of Central European Agriculture, Vol 13 (2), pp. 379-402, 2012.

14. S. Quaik, A. Embrandiri, P. F. Rupani, R. P. Singh and M. H. Ibrahim, “Effect of vermiwash and vermicompost leachate in hydroponics culture of Indian borage (Plectranthus ambionicus) plantlets”, 11th International Annual Symposium on Sustainability Science and Management, pp. 210-214, 2012.

15. J. Mortvedt, Mironutrients, Efficient fertilizer use manual, Mosaic, pp. 1-10.

215-218

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Surender Kumar Yellagoud, Naman Bhadula, Siddharth Sobti

Paper Title:

A Study of Power Formers and Their Impact on Power System Reliability and Environment

Abstract: Conventional high-voltage generators are designed with voltage levels rated to maximum of 30 kV. The power grids with voltages as high as 1,100 kV cannot be directly supplied from these generators, power step-up transformers are used to transform the generated voltage to high transmission voltage level suitable for the interface with the transmission grid. These transformers impose significant drawbacks on the power plant as a whole - reduction in efficiency, high maintenance costs, more space, less availability, and an increased environmental impact. During the last century, a number of attempts were made at developing a high-voltage generator, the Powerformer, that could be connected directly to the power grid, without step-up transformer. When XLPE-insulated cables were introduced in the 1960s there were some initial problems with their reliability, caused by poor control of the manufacturing processes. These problems have since been overcome, and today’s high-voltage XLPE-insulated cables have an impressive track record. Therefore, the development of the Powerformer is inherently linked to the reliability and the development of the XLPE insulated cables. The powerformer has opened a new technological chapter in the generation and transmission of electrical energy. The technological advantage offered by the powerformer was studied in good detail and their impact on reliability in particular and environment in general was highlighted.

Keywords:
Powerformers, high-voltage generators, power system reliability, power step-up transformers, conventional generator.


References:

1. Powerformer a radically new rotating machine. ABB review 2/1998.
2. Powerformer in thermal power plants.From ABB.Porgies-article.

3. The Tension Rises at Porsi. From ABB

4. http://www.ee.lut.fi/fi/opi/kurssit

5. Environmental Management – from Regulatory Demands to Strategic Business Opportunities. The Royal Swedish Academy of Sciences.

6. M Leijon, L Getmer, H Frank, J Martinsson, T Karlsson, B Johansson,

7. K Isaksson, U Wollstrom, “Breaking Conventions in Electrical Power Plants”, Report 11/37-3, Proc CIGRE Session, Paris 1998, 8pp.

8. H.hooshiar, M. savabeghi, A. Vahedi, “Synchronous Generator: Past, Present and Future ’’, IEEE, 2008.

9. M.taherzadeh, A. Akbari, M. Ardebili,"An Investigation on Slot Configuration in New Generation of Synchronous Generators Based on XLPE Cables,” Turkey International Conference(ELECO), 2009. pp.197-201.

10. Ibrahim A. Metwally, R.M.Radwan, A.M. Abou-Elyazzied, “Powerformers: A breakthrough of high-voltage power generators” IEEE potentials, pp. 37-44, May 2008.

11. Environmental Management – Life Cycle Assessment – Principles and Framework. ISO 14040.

12. M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM," in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

13. M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM," in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

14. P. Wang and R. Billinton, "Reliability assessment of a restructured power system using reliability network equivalent techniques," in Proc. 2003 IEE Generation, Transmission and Distribution Conf., vol. 150, pp. 555-560.

15. R. Allan and R. Billinton, "Power system reliability and its assessment Part-I. Background and generating capacity," Power Engineering Journal, vol. 6, pp. 191-196, July 1992.

16. C. G. Melo and M. V. F. Pereira, "Sensitivity analysis of reliability indices with respect to equipment failure and repair rates," IEEE Trans. On Power Systems, vol. 10, pp. 1014-1021, May 1995.

17. M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM,"in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

18. "PowerformerTM four years on," Modern Power System, vol. 22, pp. 40- 42, 2002.

19. A. Aumuller and T. K. Saha, "Investigating the impact of PowerformerTM on voltage stability by dynamic simulation," IEEE Trans. on Power Systems, vol. 18, pp. 1142-1148, Aug. 2003.

20. J. McDonald and T. K. Saha, "Development of a technique for calculation of the influence of generator design on power system balanced fault behavior," in
Proc. 2002 IEEE Power Engineering Society SummerMeeting, vol. 2, pp. 731-736.

21. S. Lindhal, M. Leijon: Estimation of the Reliability of PowerformerTM, SECRC/ABB Corporate Research, Vasteras, SEGEN/DN HOG 9801, 1998, pp. 1 – 6.

219-226

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Rahmat Zolfaghari

Paper Title:

Converting UML Description of Software Architecture to Stochastic Process Algebra and Performance Evaluation

Abstract: Important qualitative parameters of the large software systems are determined by indicators of effectiveness of the software's,such as response time, operating power and error rate. Procedure modeling is an approach for evaluating the effectiveness andvalidationof the systems and, as well as it predicts the requirements of qualitative and quantitative performance and provides a comparison between all kinds of designs with respect to performance indicators.Present study suggested a method for converting the UML description designing software to Stochastic Process Algebra (SPA)model, which provides the application of using the UML in designing software with high performance; in other words it putting the performance in designing software and a high quality software is designed.In order tomodeling the parts of system we use state chart and for the interactions between the parts we use the Collaboration chart with the performance profile (using the performance profile is the distinction between the suggested approach and the former ones.). An algorithm is provided for automatic production of the SPA performance model from the XML(Extensible Markup Language) documents and state and collaboration charts with performance profiles(stereotype, label and limitation), using the Export XMIs oftware, Argo UML is provided, and then they gained SPA performance/operation model in the PEP Aworkbenchtool is loaded for performance analysis, so as the designer can test thefulfill of performance goals of his design according to type of different performance parameters and changing in value and chooses the best option in designing.

Keywords:
Performance evaluation,UML(Unified Modeling Language),SPA(Stochastic Process Algebra) and performance profile


References:

1. L.G williums, G.U. smith "performance Evaluation of Software Architectures" proc. Of wosp'98, santa Fe, New Mexico , USA, PP, 164-177 (1998)
2. R.Class, Software Runaway, "Lessons learned form Massive Software project Failures, prentice Hall" 1998

3. smith C.U., Performance Engineering Of Software System, Adison—Wesley(1990)

4. Cortllessa, V.,Mirandola, R. PRIMA-UML:A Performanc Validation Incremental Methodology on Early UML Diagram 101-129(2002)

5. Gu, G., Petriu, D.C, XSLT tranformation from UML models to LQN performance models, In [WOSP02], PP. 227-23

6. Arief, L.B., Speirs, N.A., A UML Tool for an Automatic Generation of Simulation Program, In [WOSP00] PP. 71-76

7. Mirco Tribastone and Stephen Gilmore. Automatic extraction of PEPA performance models from UML activity diagrams annotated with the MARTE profile. In Proceedings of the 7th International Workshop on Software and Performance (WOSP2008), pages 67-78, Princeton NJ, USA, 2008.

8. Mirco Tribastone and Stephen Gilmore. Automatic translation of UML sequence diagrams into PEPA models. In 5th International Conference on the Quantitative Evaluation of SysTems (QEST 2008), pages 205-214, St Malo, France, 2008.

9. Analysis of a Multimedia Stream Using SPA, H. Bowman, J.W.Brayans and a J. Derrick, University of Kent, 2001

10. Performance Modelling with UML and Stochastic Process Algebras, Catherine Canvent, Stephen Glimore, Jane Hiliston, Matthew Prowes and Perdita Stevens,2002

11. http://argouml.tigris.org

12. http://www.dcs.ed.ac.uk/pepa

13. http://www.sax.sourceforge.net

227-232

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Saurabh Agrawal, J. S. Yadav, Ravindranath C. Cherukuri

Paper Title:

A Novel Data Hiding Framework Using Switching Threshold Mechanism

Abstract: In the current digital era, the rapid escalations in digital multimedia and network have paved ways for people around to acquire, utilize and share multimedia information. In this paper, we introduce a novel algorithm for hiding significant amount of data while preserving the image artifacts. The algorithm uses image details and identifies the good locations for hiding using a discriminative filter. This principle enhances the immunity of the proposed system against stego detection algorithms and preserves the first order statistics of the image. In addition, the proposed algorithm could retrieve the embedded information without the prior information of the original cover. The simulation analysis would show that the proposed method offers higher immunity to stego detection algorithms and preserve the first order statistics of the image.

Keywords:
Information security and assurance, discriminative filter, switching mechanism, and steganography, secured communication


References:

1. N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding Techniques Steganography and Watermarking Attacks and Countermeasures (Advances in Information Security), Springer Publishers, ISBN 1461369673, 2012
2. Ching-Nung Yang, Chia-chen Lin, Chin-Chen Chang, Steganography and Watermarking, Nova Science Publishers Inc., 2013

3. Ravindranath C. Cherukuri and Sos S. Agaian, "New normalized expansions for redundant number systems: adaptive data hiding techniques", Proceedings of SPIE on Multimedia on Mobile Devices 2010, Vol. 7542, San Jose, California, USA 2010

4. Mamta Juneja, Parvinder Singh Sandhu, “Information Hiding Using Improved LSB Steganography and Feature Detection Technique”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 2, Issue-4, April 2013, pp.275-279

5. Shailender Gupta, Ankur Goyal and Bharat Bhusan, “Information Hiding Using Least Significant Bit Steganography and Cryptography,” I. J. Modern Education and Computer Science, 2012, Vol.6, pp-27-34

6. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” Journal of IBM Systems, Vol. 35, 1996.

7. W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems. J., vol. 35, 1996.

8. WbStego, http://wbstego.wbailer.com/

9. S_Tools, http://bit599.netai.net/s_tools.htm

10. Niimi, M.; Noda, H.; Kawaguchi, E.; Eason, R.O., "Luminance quasi-preserving color quantization for digital steganography to palette-based images," Pattern Recognition, 2002. Proceedings. 16th International Conference on , vol.1, no., pp.251,254 vol.1, 2002

11. Elke Franz. “Steganography Preserving Statistical Properties”, Information Hiding: 5th International Workshop, IH. pp. 287-294. July 2003.

12. Wu, D.C.; Tsai, W.H., "Spatial-domain image hiding using image differencing," IEE Proceedings in Vision, Image and Signal Processing, vol.147, no.1, pp.29-37, Feb 2000.

13. Agaian, S., Rodriguez, B., Perez, J., “Stego sensitivity measure and multibit plane based steganography using different color models”, IS&T/SPIE 18th Annual Symposium of Security, Steganography, and Watermarking of Multimedia Contents VIII, February 2006, vol. 6072, pp. 279–290 (2006)

14. S.S.Agaian, R.C.Cherukuri, S.Ronnie, “A New Secure Adaptive Steganographic Algorithm using Fibonacci Numbers”, 2006 IEEE Region 5 Technology and Science conference, San Antonio, USA, April 7-8 2006.

15. S. S. Agaian, R. R. Sifuentes, R. C. Cherukuri, “T-Order Statistics and Secure Adaptive Steganography”, SPIE Optics & Photonics advance technical program, San Diego, USA, 31July-4August 2005.

16. Chin-Chen Chang, Jun-Chou Chang, Yu-Chen Hu,“ Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing”, Fundamenta Informaticae,Vol. 70, Issue-3, pp 171-184, 2006

17. Jessica. F; M. Goljan and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images” Proceedings of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30

233-237

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

P.Sreenu, Appa Rao G, SSSV Gopala Raju

Paper Title:

A Case Study on Curve Design for Improvements to Existing Master Plan Roads

Abstract: The present case study deals with development of existing roads to master plan roads. The roads from NH-5 junction to kommadi village, NH-5 to Navodhaya School, are located in Visakhapatnam city in India. Particularly these areas are densely populated and occupied with housing units, schools and commercial buildings. As these roads could not meet the present & and future demand, new road proposals was put forward by Visakhapatnam development authority (VUDA) to widen the existing road to master plan road. The present condition of the road is in deteriorated state which is sacrificed and new pavement design is proposed according to IRC-37:2001 recommendations. The studies involves collection of details such as road width, gradient, deflection angle, length of curve and radius of curve and design them to the prescribed standards of IRC code. The curve parameters have been measured using theodolite by traversing along center line of the curve.

Keywords:
About four key words or phrases in alphabetical order, separated by commas.


References:

1. Annette R. Hill, Andrew R. Dawson and Michael Mundy (2001) Utilisation of aggregate materials in road construction and bulk fill. Res. Cons. Recycling. 32(3), 305-320.
2. Gopala Raju SSSV, Murali M and Rengaraju VR (2007) Reuse of polythyelene waste in road c onstruction. J. Environ. Sci. Engg. 49(1), 67-70.

3. Ministry of Road Transport and Highways (MoRTH) (2002) Specification for roads and bridges. Indian roads congress publication.

4. Pasetto M (2000) The re-utilisation of discarded building materials in cement-stabilised layers of road and airfield pavements. Waste Management Series. 1(1), 548-566.

5. Gopala Raju SSSV., (2011), Vehicular Growth and Its Management in Visakhapatnam City Case Study, Indian Journal of Science and Technology, Vol. 4,No.8, pp 903-906.

6. Bhuyan, P.K, 2002, Accidents Analysis on Two-Lane Roads, Unpublished Seminar Report, Department of Civil Engineering, Indian Institute of Technology Roorkee

7. Jain, S.S., Parida, M., Chauhan, M.P.S. and Landge, V.S., 2004, Identification of Hazardous Locations on National Highways, International Conference on Transportation Systems Planning and Operation (TRANSPO 2004), Chennai.

8. Gopala Raju SSSV., (2012), Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal of Innovations and Development, Vol.1, No.6, pp.469-471.

238-241

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

Aruna.D.Mane, Sirkazi Mohd Arif, Waleed Abdu Rahiman

Paper Title:

An Advanced Robot -Robin Heart (A Surgeon without Hand Tremor)

Abstract: The paper presents the current state of works conducted by the Zabrze team under the Robin Heart surgical robot and the Robin Heart Uni System mechatronic surgical tools project as a example of introducing technology and materials advances for progress in surgical robots. The project called “Polish Cardiosurgical Robot” has been developed by Foundation for Cardiac Surgery Development since year 2000. Within the project the telemanipulator to perform the endoscopic cardiosurgical operations has been designed, manufactured and examined. In the following paper the development of construction of arms for Robin Heart versions of the robot as well as the fixing system has been presented. In the preliminary phase of the project the requirements for mechanical construction were analyzed. Additional requirements enhancing functionality of the construction were also defined. A system to verify the forward kinematic and the trajectories for the Robin Heart master device was implemented. The system consists of hardware based on incremental encoders connected to a data acquisition card and software programmed in Matlab and LabView to create an interface between the system and the user. The system verifies the position of the tool tip when different values for the joints are configured. The visualization of trajectories is also possible after saving a routine of movements made by the user. Analyses of the planned development of the construction and ways of its possible applications were performed. The special intention is to show the review of the current and futuristic medical robots needs in the area of material science.

Keywords:
Medical robots, Examination of robots, Construction of robots.


References:

1. http://www.intusurg.com
2. D. Loulmet, A. Carpentier, N. d’Attellis, A. Berrebi, C.Cardon, O. Ponzio, B. Aupecle and J.Y.M. Relland, “Endoscopic coronary artery bypass grafting with the aid of robotic assisted instruments”, J. Thorac Cardiovasc Surg., July 1999.

3. V. Falk, T. Walther, R. Autschbach, A Diegeler, R Battellini and F.W. Mohr, “Robot-assisted minimally invasive solo mitral valve operation”, J. Thorac. Cardiovasc. Surg. 115 (2), 470–471 (1998).

4. http://www.computermotion.com

5. Z. Nawrat, K. Mianowski, L. Podsedkowski, P. Kostka, Z. Małota, P. Wróblewski and Z. Religa, “RobIn Heart – mature examination”, Materials of Conference AUTOMATION 2004, Warszawa, 2004, (in Polish).

6. P. Kostka, Z. Nawrat, R. Pruski and Z. Małota, “Control systems of cardio-surgical telemanipulators RobInHeart 0,1 and 2 – technical solutions”, Materials of Conference AUTOMATION 2004 -Automatization, News and Prospects, pp. 467–475, Warszawa, 2004, (in Polish).

7. L. Podsedkowski, “Forward and inverse kinematics of the cardio-surgical robot with non-coincident axis of the wrist”, SIROCCO, pp. 525–530 (2003).

8. Z. Nawrat, L. Podsedkowski, K. Mianowski, P. Kostka, P. Wróblewski, Z. Małota and Z. Religa, “RobIn Heart and Zeus and Da Vinci – the comparison of cardio-surgical robots”, XIII State Scientific Conference: Biocybernetics and biomedical engineering, Gdansk, pp. 464–469 (2003).

9. K. Mianowski, Z. Nawrat, M. Poreda “Project study of manipulator for the cardio-surgical robot RobIn Heart”, Materials of Conference AUTOMATION 2004, Warszawa, 2004, (in Polish).

10. L. Podsedkowski, Z. Nawrat, “Manipulator, especially medical manipulator,”Patent Application No P-363247 dated 3.11.2003.

11. Z. Nawrat “Robin heart progress – advances materials & technology in surgical robots ”bulletin of th polis academy of sciences ,2010.

12. L. Podsedkowski ”Robin heart 0,1,a – mechanical construction development”Poland ,2005

13. instruments N using quadrature encoders with E series DAQ boards .2006.from http://zone .ni.com/devzone/cda/tut/p/id/4623.

14. Datasheet USB 6009 [cited 2007 feb 2007];available from http://www.ni.com/pdf/products/us/20043762301101dlr.pdf

242-251

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

Sonal Miglani, KanwalGarg

Paper Title:

Experimental Study of an Improvedk-Means Algorithm and Its Comparison with Standardk-Means

Abstract: K-means algorithm is a popular, unsupervised and iterative clustering algorithmwell known for its efficiency in clustering large datasets.It is used in a variety of scientific applications such as knowledge discovery, Data Mining, data compression, medical imaging and vector quantization. This paper aims at studying the standard k-means clustering algorithm, analyzing its shortcomings and its comparison with an improved k-means algorithm. Experimental results show that the improved method can effectively increase the speed of clustering and accuracy, reducing the computational complexity of the k-means.

Keywords:
Clustering, Data Mining, K-Means Clustering


References:

1. Jiawei Han, Michelinekamber& Morgan Kauffman,“Data Mining: Concepts and Techniques”, 2nd edition 2006.
2. Koheriet. al, “Hierarchical K-means: an algorithm for centroids initialization for K-means”, Reports of the Faculty of Science and Engineering, Saga University, Vol. 36, No.1, 2007.

3. Sumathi&Kirubakaran, “Enhanced Weighted K-means Clustering based risk level prediction for Coronary heart disease”, European Journal of Scientific research, ISSN 1450-216X, No. 4, pp. 490-500, 2012.

4. MadhuYedla, SrinivasaRaoPathakota& T M Srinivasa, “Enhancing K-means ClusteringAlgorithm with Improved Initial Center”.International Journal of Computer
Science and Information Technologies, Vol. 1 (2), 121-125, 2010.

5. Khammar&Marhaban, “Obtaining the initial centroids based on the most dense colonies in the k-means Algorithm”, Reasearch Journal of Computer Systems & Engineering, ISSN: 2230-8563, vol. 03, issue. 01, July 2012.

6. Charles Elkan. “Using the triangle inequality to accelerate k-means”, In Tom Fawcett and Nina Mishra, editors, ICML, pages 147–153. AAAI Press, 2003.

7. Sujatha&ShanthiSona, “Novel Initialization Technique for K-means Clustering using spectural Constraint Prototype”, published in Journal of Global Research in Computer Science, Vol. 3 No. 6, ISSN-2229-371X, June 2012.

8. Bradley & Fayyad, “Refining Initial Points for K-means Clustering”, International Conference of Machine Learning”, pp. 91-99, May 1998.

9. Zhexue, “Extensions to the k-Means Algorithm for Clustering Large Data Sets with Categorical Values”, Data Mining and Knowledge Discovery, Vol. 2, Issue. 3,pp. 283-304, 1998.

10. Hamerly, “Making K-means Even Faster”, Department Of computer Science, Baylor University.

11. Dheeb, Malik &Sulieman, “Detection and Classification of Leaf Diseases using K-means-based Segmentation and Neural-networks-based Classification”, Information Technology Journal, Vol. 10, Issue. 2, pp. 267-275, 2011.

12. Neha&Kirti, “A mid-point based k-Means Clustering Algorithm”, International Journal of Computer Science and Engineering, ISSN 0975-3397, Vol. 4, No. 6, June 2012.

13. Azharet. al., “Enhanced K-means Clustering Algorithm To reduce number of iterations and time complexity”, Middle east Journal of Scientific Research 12 (7): 959-963, 2012.

14. Shi Na, Liu & Guan, “Research on K-Means Clustering Algorithm”, Third International Symposium on Intelligent Information Technology and Security Informatics, ISBN- 978-0-7695-4020, 2010.

252-254

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

A. M. Khan

Paper Title:

Circuit Edit Technology for Submicron Structures in Semiconductor Devices

Abstract: Aluminum and copper metal structures with sub micron dimension are widely used in semiconductor devices. Precise cutting of these metal lines is one of the fundamental requirements in VLSI Circuit Edit technology. Cutting of these sub micron metal lines should ensure good electrical isolation while maintaining nil / minimal damage to closely spaced adjacent metal structures. In this experimental work, both focused ion beam (FIB) technology and focused Laser beam technology have been explored. Relative merits and demerits of these technologies have been discussed. Laser beam assisted technology is found to be viable for cutting metal lines if spacing between metal lines is greater than two microns. Focused ion beam assisted technology is found to be quite effective in cutting metal structures when spacing between metal lines is less than a micron.

Keywords:
VLSI, FIB, Circuit Edit, Laser, IC.


References:

1. Dr. Chad Rue, “Circuit Edit Basics”, FEI Application Notes.
2. S. Smith, et al. “Test structures for the electrical characterization of platinum deposited by Focus Ion Beam”, Proceedings of IEEE 2002 International Conference on Micro Electronic test structures”, Volume : 15, April 2002, pp:157 – 162.

3. M.G. Mclaren et al., “Ion Beam Induced Deposition of Tungsten on Silicon”, IEEE Journal, 1997, pp 717 – 720.

4. S.K. Loh et al., “Application of Focus Ion Beam Circuit Edit in Failure Analysis”, Proceedings of ICSE 2006, Kuala Lumpur, Malaysia.

5. Valery Ray, “Recipe Development considerations for Focused Ion Beam Gas Assisted Etching” 8th European FIB User Group Meeting, 2004, Switzerland

6. David P Adams et al., “Micro milling of metal alloys with focused ion beam – fabricated tools”, Journal of the International Societies for precision Engineering and Nano Technology, Vol:25, 2001, pp:107-113.

7. Deubel. M et al., “Direct laser writing of three dimensional photonic –crystal templates for telecommunications”, Nature Materials; Volume : 3; 2004; pp:444 – 447

8. Mizoshiri.M. et al., “SiO2 based hybrid diffractive – refractive lenses fabricated by femto second laser assisted micro machining”, Applied Physics Express; Volume:1, No:12; 2008; pp 1270011 – 1270013.

9. G.Brown, et al., “Ultrafast laser inscription of Brag – grating wave guides using the multi scan techniques”, OPT LETTERS, Vol: 37; Nu:4, 2012; pp:491 – 493.

10. J.Gottmann, et al., “High speed and high precision fs – laser writing using a scanner with large numerical aperture”, JLMN, Vol:4, No:3, 2009; pp:192-196.

255-257

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Shobha.K, Mamatha Jadhav.V

Paper Title:

Simulation of a Secure Efficient Dynamic Routing In Wireless Sensor Network

Abstract: Wireless Sensor networks have features like low cost, flexibility, fault tolerance, high sensing fidelity, creating many new and exciting application areas for remote sensing. So, wireless sensor network has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. There are many issues of wireless sensor network which need to be addressed .So took up one of the idea to use OSPF for secure efficient dynamic routing in wireless sensor network. The protocols that are being used till date are not efficient enough in matter of the time taken for the transferring the message from one node to another. So this project provides secure efficient dynamic routing in wireless sensor network. The protocols that are being used just provide a data packet transfer without any proper time. With the implementation of open shortest path first protocol we can get a better routing path for with least cost path. Thus the implementation of this can give a better view in the data packet transferring.The Simulation of Secure Efficient Dynamic Routing in Wireless sensor network has been implemented using dijkstra’s algorithm for finding shortest path between the nodes. For providing security to the messages DES algorithm is used. The messages are encrypted and decrypted using this algorithm in order to provide security. User can be able to create number of nodes in the network. User can be able to send the packets using shortest path so that it reaches fast. User can also able to view the Routing Table at each node. User can also be able to view different nodes placed with their Node location and Node id. So from the Implementation it can be conclude that the proposed technique is very cost effective, secure and simpler to configure. From the performance Analysis it is clear that OSPF Routing in Wireless Sensor Networks is Very cost effective and more number of packets can be sent.

Keywords:
Open Shortest Path First (OSPF), Link-State Packets, Backbone Area of OSPF, Area Border Routers (ABRs).


References:

1. Shobha.K P.G Student, Mamtha Jadhav.V Assistant Professor, Develop and Simulate a Secure Efficient Dynamic Routing Using Protocol in Wireless Sensor Network ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012.
2. Namarta Kapoor, Nitin Bhatia, Sangeet Kumar, Simranjeet Kaur Wireless Sensor Networks: A Profound Technology International Journal of Computer Science and technology - IJCST Vol. 2, Issue 2, June 2011.

3. Kurt Stammberger, Mocana, Security in Wireless Sensor Networks An RTC Group Publication WIRELESS NETWORKS The magazine of record for the embedded computing industry July 2009.
4. P. S. Pandian, K. P. Safeer, Wireless Sensor Network for Wearable Physiological Monitoring JOURNAL OF NETWORKS, VOL .3, No.5, May 2008.
5. ZHAO Lei1, ZHANG Wei-Hong, XU Chao-Nong, XU Yong-Jun, LI Xiao-Wei1. Energy-aware System Design for Wireless Sensor Network Vol. 32, No. 6 ACTA AUTOMATICA SINICA November, 2006.

6. Chris Karlof, David Wagner, Secure routing in Wireless Sensor Networks: Attacks and Countermeasures University of California at Berkeley.

7. Chinese Journal of Electronics Vol.21, No.2, Apr. 2012 DRMA: A Dynamically Reconfigurable Management Architecture for Wireless Sensor Networks.

8. Computer Networks by Patterson.

9. Kurt Stammberger and Monique Semp, Introduction to Security for Smart Object Networks Internet Protocol for Smart Objects (IPSO) Alliance February 2010.

10. Industry Insight -Security for Wireless Networks Security in Wireless Sensor Networks. July 2009.

11. Sen,Jaydip ,Routing Security Issues in Wireless :Attacks and Defenses Author Networks 2011.

12. Ospf Design Guide document id: 7039.

13. Ronghui Hou, Member, IEEE, King-Shan Lui, Senior Member, IEEE, Fred Baker, and Jiandong Li, Senior Member, IEEE Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth .IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 2, FEBRUARY 2012.

14. Jie Yang, Student Member, IEEE, Yingying Chen, Senior Member, IEEE,Wade Trappe, Member, IEEE, and Jerry Cheng, Detection and Localization of Multiple Spoofing Attackers in wireless sensor network.

15. Yogendra Kumar Jain, Vismay Jain An Efficient Key Management Scheme for Wireless Network, International Journal of Scientific & Engineering Research, Volume 2,Issue 2, February-2011.

258-263

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Prashanti.G, Deepthi.S, Sandhya Rani.K

Paper Title:

A Novel Approach for Data Encryption Standard Algorithm

Abstract: Now a day’s providing Security for data is complicated task we have so many security methods that are implemented and deployed but out of them few are using and serving the needs of society. And we can’t say that any algorithm is perfect and avoids threats. The main goal of any design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, data in both the private and public sectors are increased which requires Availability, Authentication, Confidentiality, Integrity. In this paper we are considering The DES algorithm that defines the mathematical steps that transform original text (plain text) into a cipher text (secret code) and also transform the cipher text back to the original text. Here introduces a new method to enhance the performance of the Data Encryption Standard (DES) algorithm. This is done by replacing the 8/32 S-Box instead of 6/4 S-Box. The output of each S-Box undergoes AND and XOR operation before going to the permutation P. In this paper we also proposed a new operation Addition modulo instead predefined XOR operation applied during the 16 round of the standard algorithm.

Keywords:
DES, Encryption, Decryption, asymmetric cryptography, symmetric cryptography.


References:

1. New Approach of Data Encryption Standard Algorithm Shah Kruti R., Bhavika Gambhava.
2. J.Orlin Grabbe ―The DES Algorithm Illustrated‖

3. W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed., Prentice Hall, 1999.

4. The CAST-128 Encryption Algorithm. C. Adams, Entrust Technologies, May 1997. http://tools.ietf.org/pdf/rfc2144.pdf

5. Cryptography And Network Security By Atul Kahate

6. a simplified idea algorithm nick Hoffman http://www.nku.edu/~christensen/simplified%20IDEA%20algorithm.pdf

7. Network security and cryptography by bernard menezes
8. National Bureau of Standards – Data Encryption Standard, Fips Publication 46,1977.

9. O.P. Verma, Ritu Agarwal, Dhiraj Dafouti,Shobha Tyagi ― Performance Analysis Of Data Encryption Algorithms ― , 2011.

10. Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha ― Performance Evaluation of Symmetric Cryptography Algorithms, IJECT, 2011.

11. Diaa Salama, Abdul Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhound ― Performance Evaluation of Symmetric Encryption Algorithm ―,
IJCSNS, 2008.

12. Dr. Mohammed M. Alani ― Improved DES Security‖, International Multi-Conference On System, Signals and Devices, 2010.

13. Dhanraj, C.Nandini, and Mohd Tajuddin ― An Enhanced Approch for Secret Key Algorithm based on Data Encryption Standard‖, International Journal of Research And Review in Computer Science, August 2011

14. B.Scheier, Applied Cryptography: Protocols, Algorithms and Source Code in C,2nd ed.., John Wiley & Sons,1995.

15. The DES 15 years of public scrutiny. dorothy e denning.

16. http://faculty.nps.edu/dedennin/publications/DES-15Years.pdf

264-267

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Pravin P Kalyankar, S S Apte

Paper Title:

3D Volume Rendering Algorithm

Abstract: This paper presents an analysis of the algorithms used for generating 3D structures from 2D CT-Scan Datasets. This is achieved by developing an implementation of Marching Cubes, a surface construction algorithm that’s currently the standard used for 3D surface construction in the medical visualization industry. Two techniques have been chosen to produce the 3D models. The first technique is known as Volume Rendering and the second technique is known as the Marching Cubes Algorithm. Both techniques use voxels (3D square pixels) to determine the 3D area to be constructed. The Marching Cubes (MC) algorithm by Lorensen and Cline is most popular algorithm for extraction of isosurface out of volume data. Several drawbacks of MC algorithm are solved by using new improved version of MC algorithm.

Keywords:
Marching Cube, 3D surface reconstruction, isosurafce, Volume rendering, Medical imaging


References:

1. Bourke, P. "Polygonizing a Scalar Field", May 1994, http://astronomy.swin.edu.au/~pbourke/modelling/polygonise/
2. Cline, H., Lorensen, W., System and Method for the Display of Surface Structures Contained Within the Interior Region of a Solid Body, US Patent 4,710,876, to General Electric Corp., Patent and Trademark Office, 1985

3. Dedual, N., Kaeli, D., Johnson, B., Chen, G., Wolfgang, J., "Visualization of 4D Computed Tomography Datasets", Proc. 2006 IEEE Southwest Symposium of Image Analysis and Interpretation, March 2006

4. Lorensen, W., Cline, H. "Marching Cubes: A High Resolution 3D Surface Construction Algorithm", ACM Computer Graphics Volume 21, Number 4, July 1987

5. Johnson, C., Parker, S., Hansen, C., Kindlmann, G., and Livnat, Y. "Interactive Simulation and Visualization" Center for Scientific Computing and Imaging, University of Utah. http://www.cs.utah.edu/sci

6. Keppel, E. "Approximating Complex Surfaces by Triangulation of Contour Lines" IBM J. Res. Develop 19, 1 (January 1975), p. 2-1

7. Robb, R. A., Hoffman, E. A., Sinak, L. J., Harris, L. D., and Ritman, E. L. "High Speed Three-Dimensional X-Ray Computed Tomography: The Dynamic Spiral
Reconstructor", Proc. Of IEEE 71, 3 (March 1983), 308-319.

8. Sabella, P. " A Rendering Algorithm for Visualizing 3D Scalar Fields" ACM Computer Graphics Volume 22, Number 4, August 1988

9. Webb, A. Introduction to Biomedical Imaging, Wiley-Interscience, 2003, p. 34 - 47

10. Computed Tomography, Wikipedia, 17 April 2006, http://en.wikipedia.org/wiki/Computed_Tomography

11. Tomographic Reconstruction, Wikipedia, 24 March 2006, http://en.wikipedia.org/wiki/Tomographic-reconstruction

268-270

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

Achal Badgujar, Swati Nikam

Paper Title:

A Study of Channel Assignment Strategies used for Uncoordinated WLANs

Abstract: Due to tremendous increase in use of WIFI, the efficient use of available frequency spectrum has been a challenging issue. Such WIFI which are managed by non-network specialists are called Uncoordinated WLANS. The performance of Uncoordinated WLANs can be greatly improved by efficient channel assignment. In this paper, we describe the various channel assignment schemes used in Uncoordinated WLANs. After describing each scheme we also provide a qualitative comparison of the schemes based on complexity, scalability and execution behaviors. The survey is concluded with various research issues open for further study.

Keywords:
Channel assignment. Co-Channel interference, Uncoordinated WLANS


References:

1. M. Achanta, “Method and Apparatus for Least congested Channel Scan for Wireless Access Points,” US Patent No. 20060072602, Apr. 2006.
2. A. Mishra, S. Banerjee, and W. Arbaugh, “Weighted Coloring BasedChannel Assignment for WLANs,” SIGMOBILE Mob.Comput.Commun.Rev. vol. 9, no. 3, pp. 19–31, 2005.

3. K. K. Leung and B.-J. Kim, “Frequency Assignment for IEEE 802.11Wireless Networks,” in Proc. IEEE Vehicular Technology Conference,vol. 3, pp. 1422–1426, Oct. 2003.

4. M. Yu, H. Luo, and K. K. Leung, “A Dynamic Radio ResourceManagement Technique for Multiple APs in WLANs,” IEEE Trans.WirelessCommun., vol. 5, pp. 1910-1919, July 2006.

5. R. Akl and A. Arepally, “Dynamic Channel Assignment in IEEE802.11 Networks,” in Proc. IEEE International Conference on Portable Information Devices (PORTABLE’07), 2007.

6. M. Haidar, R. Akl, and H. Al-Rizzo, “Channel Assignment and Load Distribution in a Power-managed WLAN,” in Proc. IEEE PIMRC: 18thAnnual IEEE International Symposium on Personal, Indoor and MobileRadio Communications, September 2007.

7. A.Mishra and V. Shrivastava, D. Agrawal, S. Banerjee, and S. Ganguly,“Distributed Channel Management inUncoordinated Wireless Environments,”inProc. International Conference on Mobile Computing andNetworking, pp. 170–181, 2006.

271-273

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

58.

Authors:

Sandeep Kumar Singh, Nishant Chaurasia, Pragya Sharma

Paper Title:

Concept & Proposed Architecture of Hybrid Intrusion Detection System using Data Mining

Abstract: now day’s security is the primary concerned in the field of computer science. Intrusion detection system provides stronger security services with the help of rules. This paper has developed a security model based on hybrid intrusion detection system using data mining approach. Proposed security model is the combing network based and host based with efficient data mining approach to detect any type of intrusion which coming from public network or occurring in computer system. Basically this model work on misuse and anomaly detection mode, it will use an approach to extract features from arriving data packets and will apply data mining algorithm to get the rule for match normal and abnormal behavior.

Keywords:
Intrusion Detection System, Security, Network System, Host System, Data mining, association


References:

1. Duanyang Zhao, Qingxiang Xu, Zhilin Feng “Analysis and Design for Intrusion Detection System Based on Data Mining” 2010 Second IEEE International Workshop on Education Technology and Computer Science.
2. Asmaa Shaker Ashoor and Prof. Sharad Gore “ Importance of Intrusion Detection System (IDS)” International Journal of Scientific & Engineering Research,
Volume 2, Issue 1, January-2011

3. Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application(ISBEIA) langkawi, malaysia 2011

4. Anthony Chung “On Testing of Implementation Correctness of Protocol Based Intrusion Detection Systems ” Ninth IEEE International Conference on Software Engineering Research, Management and Applications 2011.

5. Chunyu Miao and Wei Chen “A Study of Intrusion Detection System Based on Data Mining” published in IEEE conferences 2010

6. Lin Ying, ZHANG Yan and OU Yang-Jia “The Design and Implementation of Host-based Intrusion Detection System” Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010.

274-276

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Manasa H.B, Anirban Basu

Paper Title:

Energy Aware Resource Allocation in Cloud Datacenter

Abstract: The greatest environmental challenge today is global warming, which is caused by carbon emissions. Energy crisis brings green computing, and green computing needs algorithms and mechanisms to be redesigned for energy efficiency. Green IT refers to the study and practice of using computing resources in an efficient, effective and economic way. Currently, a large number of cloud computing systems waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. The proposed energy aware resource allocation provision data center resources to client applications in a way that improves energy efficiency of the data center, while delivering the negotiated Quality of Service (QoS). In particular, in this paper we conduct a survey of research in energy-efficient computing and propose: architectural principles for energy-efficient management of Clouds; energy-efficient resource allocation policies and scheduling algorithms considering QoS expectations and power usage characteristics of the devices. It is validated by conducting a performance evaluation study using CloudSim toolkit. Green Cloud Computing aims at a processing infrastructure that combines flexibility, quality of services, and reduced energy utilization. In order to achieve this objective, the management solution must regulate the internal settings to address the pressing issue of data center over-provisioning related to the need to match the peak demand. In this context, propose an integrated solution for resource management based on VMs placement and VMs allocation policies. This work introduces the system management model, analyzes the system’s behavior, describes the operation principles, and presents a use case scenario. To simulate the approach of organization, theory and implementation of migration policies and reallocation changes were made as improvements in the code of CloudSim framework.

Keywords:
Energy efficiency, Green IT, Cloud computing, migration, resource management, virtualization.


References:

1. Berl, E. Gelenbe, M. di Girolamo, G. Giuliani, H.de Meer, M.-Q. Dang, and K. Pentikousis. EnergyEfficient Cloud Computing. The Computer Journal,53(7), September20 1 O,doi: 10.10931 comjnl! bxp08
2. The green grid consortium (2011).

3. Ministry of Economy, Trade and Industry, Establishment of the japan data center council, Press Release.

4. EMC 2008 Annual overview Releasing the power of infonnation, http://www.emc.comJ digital_universe.

5. S.Albers, "Energy -Efficient Algorithms," Communications of the ACM, vo1.53, no.5, pp.86-96,May 2010.

6. Anton Beloglazov, Jemal Abawajy, Rajkumar Buyya for “Energy-Aware Resource Allocation Heuristics for Effcient Management of Data Centers for Cloud Computing” preprint submitted to Future Generation Computer Science.

7. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the
5th utility, Future Generation Computer Systems 25 (6) (2009) 599-616.

8. E. Pinheiro, R. Bianchini, E. V. Carrera, T. Heath, Load balancing and unbalancing for power and performance in cluster-based systems, in: Proceedings of the Workshop on Compilers and Operating Systems for Low Power, 2001, pp. 182-195.

9. J. S. Chase, D. C. Anderson, P. N. Thakar, A. M. Vahdat, R. P.Doyle, Managing energy and server resources in hosting centers, in: Proceedings of the 18th ACM Symposium on Operating Systems Principles, ACM New York, NY, USA, 2001, pp. 103-116.

10. E. Elnozahy, M. Kistler, R. Rajamony, Energy-efficient server clusters, Power-Aware Computer Systems (2003) 179-197.

11. L. Chiaraviglio, I. Matta, GreenCoop: cooperative green routing with energy-efficient servers, in: Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking (e-Energy 2010), Passau, Germany, 2010, pp. 191-194.

12. M. Koseoglu, E. Karasan, Joint resource and network scheduling with adaptive offset determination for optical burst switched grids, Future Generation Computer Systems 26 (4) (2010) 576-589.

13. L. Tomas, A. Caminero, C. Carrion, B. Caminero, Network-aware meta-scheduling in advance with autonomous self-tuning system, Future Generation Computer
Systems 27 (5) (2010) 486-497.

14. E. Dodonov, R. de Mell, A novel approach for distributed application scheduling based on prediction of communication events,Future Generation Computer Systems 26 (5) (2010) 740-752.

15. L. Gyarmati, T. Trinh, How can architecture help to reduce energy consumption in data center networking?, in: Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking (e-Energy 2010), Passau, Germany,2010, pp. 183-186.

277-281

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

S.H.Patil, S.M.Shinde

Paper Title:

Reliable Data Collection Using Mobile Data Collector in Wireless Sensor Network

Abstract: in cluster based wireless sensor network common sensor nodes within the cluster sense the event periodically or continuous and transmit the data packets to the respective cluster head. Cluster heads will process the packets and transmit to the sink. As the cluster head act as intermediate node between common sensor nodes and sink so these nodes consumes more energy as compare to other nodes in network. So in this case these nodes are having more chances to dead early and due to that bottleneck problem occur in the network and this leads to affect the reliability of the network. With the help of proposed mobile data collector node (MDCN) model we can reduce the energy consumption of the nodes which are close to sink and also improve the reliability of the network

Keywords:
MDCN Architecture, reliability, Wireless sensor network (WSN), mobile data collector node (MDCN).


References:

1. Liang He1, Jun Tao, Jianping Pan1, Jingdong Xu2 “Adaptive Mobility-Assisted Data Collectionin Wireless Sensor Networks”
2. O. Chipara, Z. He, G. Xing, et al., “Real-time power-aware routing in wireless sensor network”.

3. Arun A Somasundara, Aditya Ramamoorthy Mobile Element Scheduling for Efficient Data Collection inWireless Sensor Networks with Dynamic Deadlines

4. R. Sugihara, “Controlled mobility in sensor networks,” Ph.D. Thesis,University of California, San Diego, US, 2009.

5. Shuai Gao, Hongke Zhang 2010 Energy Efficient Path-constrained SinkNavigation in Delay-guaranteed Wireless Sensor Networks

6. Deepak Puthal, Bibhudatta Sahoo, Suraj Sharma 2012 Dynamic model for efficient data collection in wireless sensor network with mobile sink.

7. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy- Efficient Communication Protocols for Wireless Microsensor Networks,”in Proc. HICSS’00, 2000.

8. Y. Zhuang, J. Pan, and L. Cai, “Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor Networks,” in ProcIEEE INFOCOM’10, 2010.

9. L. He, J. Pan, and J. Xu, ”Reducing data collection latency in wireless sensor networks with multiple mobile elements,” submitted to AHSWN.

10. D. Jea, A. Somasundara, and M. Srivastava, “Multiple controlled mobile elements (data mules) for data collection in sensor network,” in Proc IEEE
DCOSS’05, 2005.

282-285

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

M. Rama Bai

Paper Title:

An Approach for Classification of Preprocessed Textures Based On Boundary Moments

Abstract: Texture classification is one of the problems which have been paid much attention on by image processing scientists. Consequently, many different methods have been proposed to solve this problem. In most of these methods the researchers attempted to describe and discriminate textures based on linear and non-linear patterns. The present paper describes a novel and effective method of shape classification by combining innovative preprocessing techniques, morphological boundary method and Hu moments. To offer better classification rate, first innovative preprocessing methods are applied on various texture images. Preprocessing mechanisms describe various methods of converting a grey level image into binary image with minimal consideration of the noise model. Then shape features are evaluated using HM by suitable numerical characterization derived from moment invariant measures on the proposed Morphological Boundary(MB) method for a precise classification. This proposed MB derives a new shape descriptor to address the image classification problem by combining boundary extraction and Hu moment(HM) invariants information. A good comparison is made between these methods by combining preprocessing techniques, boundary extraction and Hu moments. This texture classification study using MB and HM has given a good performance. The experimental results clearly show the efficacy of the present method.

Keywords:
Image classification, shape representation, morphological operation, Hu moment invariants, boundary extraction, preprocessing techniques, structuring element.


References:

1. Kresch R. and Malah D, “Skeleton-based morphological coding of binary images,” IEEE Trans. Image Processing, Vol. 7, pp. 1387–1399, Oct. 1998.
2. Belongie S., Malik J. and Puzicha J, “Shape matching and object recognition using shape contexts,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 24, no. 4, pp.
509–522, Apr. 2002
3. Ei-Kwae E. A. and Kabuka M. R, “Binary object representation and recognition using the Hilbert morphological skeleton transform,” Pattern Recognition, Vol. 33, pp. 1621–1636, 2000.

4. A. Laine and J. Fan, “Texture classification by wavelet packet signatures”, IEEE Trans. on PAMI, 15(11), 1993, pp. 1186-1190.

5. A. Bovik , M. Clark , et.at, “ Multichannel Texture Analysis Using Localized Spatial Filters”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 12 (1), 1990, pp. 55-73.

6. Ming-Kuei Hu, ”Visual pattern recognition by moment invariants,” Information Theory, IRE Transactions, Vol. 8, pp. 179-187, Feb1962.

7. Boyce J. F. and Hossack W. J, "Moment Invariants for Pattern recognition," Pattern Recognition Letters, Vol. 1, pp. 451-456.

8. Chen C.C., Tung-I T Sai, “Improved moment invariants for shape discrimination”, Pattern Recognition, 26(5), pp. 683-686, 1993.

9. Sluzek A, “Identification and inspection of 2-D objects using new moment-based shape descriptors”, Pattern Recog., Vol. 16, pp.687-697, 1995.

10. Teaque M. R, "Image Analysis via the General Theory of Moments", Journal of the Optical Society of America, Vol. 70, pp. 920-930, 1980.

11. Hu M. K, “Visual pattern recognition by moment invariants”, IRE 2lan.s. Inform. Theory, IT-8, 1962, pp. 179-187.

12. Jia-Guu Leu, “Computing a shape's moments from its boundary”, Pattern recognition, Vol 24, no. 10, pp. 949-957, 1991.

13. B. Eswara Reddy, A. Nagaraja Rao, et al,” Texture Classification by Simple Patterns on Edge Direction Movements”, IJCSNS, Vol.7 No.11, November 2007.

14. A. Laine and J. Fan, “Texture classification by wavelet packet signatures”, IEEE Trans. on PAMI, 15(11), pp. 1186-1190, 1993.

15. Jia-Guu Leu, “Computing a shape's moments from its boundary”, Pattern recognition, Vol 24, no. 10, pp. 949-957, 1991.

16. Chaur-Chin Chen,” Improved Moment Invariants for Shape Discrimanation”, Pattern Recognition, Vol. 26, No.5, pp.683-686, 1993.

17. H. Sunder, D. Silver, et al, “Skeleton Based Shape Matching and Retrieval”, Proceedings of the shape modeling International, pp. 130-290, 2003.

18. Gang Xu and Yuqing Lei, “A New Image Recognition Algorithm Based On Skeleton”, IEEE International Joint Conference on Neural Network, pp. 777-782, 2008.

19. Zhihu Huang and Jinsong Leng, “Analysis of Hu’s Moments Invariants on Image Scaling and Rotation”, IEEE 2nd International Conference on Computer Engineering and Technology, Vol.7, pp.476-480, 2010.

20. V. Vijaya Kumar, et al ,”A measure of patterns trends on various types of preprocessed images”, IJCSNS, Vol.7 No.8, p.p. 253-257, 2007.

21. B.V. Ramana Reddy, A. Suresh, et al, “Classification of Textures based on Features Extracted from Preprocessing Images on Random Windows”, International Journal of Advanced Science and Technology, Vol. 9, pp: 9-18, August, 2009.

22. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing (Third Edition): Prentice Hall,2008.

23. J. Serra, Image Analysis and Mathematical Morphology, Academic Press, London, 1982.

286-291

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

Jasjeet Singh Pannu

Paper Title:

Performance Analysis of Tikhonov Distributed Phase Error over Wireless Fading Channels

Abstract: There is need to formulate an accurate and thoroughly reproducible error model for wireless mobile channels in order to enhance the quality of communication by using better modulation and coding schemes. However the various physical properties of propagation mode, distortion due to error in physical wireless medium and the synchronization mismatch between transmitter and receiver, leads to difficulty in modelling of the error performance of wireless channels. Phase shift keying (PSK) is one of the best modulation schemes for wireless applications mainly due to its bandwidth efficiency and constant envelope. Inspite of these advantages, PSK systems are prone to phase synchronization error which becomes even more vital issue in wireless systems as calculating correct phase over a random propagation medium is almost impossible. As a result, in addition with AWGN and fading, the synchronization mismatch of the phase between the transmitter and receiver evaluates the error performance of a wireless system. This paper examines the problem of wrong phase evaluation for the BPSK as well as for the case of general MPSK signals over Rayleigh, Nakagami-n (Rician), Nakagami-m and Nakagami-q (Hoyt) fading channels. The phase distortions are assumed to be random, unbiased, i.e. having zero-mean and may be represented by a Tikhonov distribution. The major contributions of related works were surveyed and the method that requires minimum mathematical operations (and thus proves to be less complex, more stable and accurate than others) is also explained. Apart from this, simple alternative approaches for obtaining analytical bit error rate (BER) for BPSK and symbol error rate (SER) through moment generating function (MGF) for Tikhonov distributed phase error have been proposed. The MGF methodology has wider applicability, is able to obtain reproducible results, and shows significant improvement in accuracy regarding theoretical BER calculation as seen from the graphical comparisons. Extensive Monte Carlo simulations that builds models of possible results by substituting a range of values were also performed to validate the theoretical results presented in the research paper

Keywords:
bit error rate, montecarlo simulation, synchronization, and Tikhonov distribution


References:

1. W. C. Lindsey and M. K. Simon, Telecommunication Systems Engineering, Dover, New York, USA, 1991.2. V. I. Tikhonov, Phase-lock automatic frequency control operation in the presence of noise, Automation and Remote Control (Avtomatika i Telemekhanika), Vol. 21, No. 3, pp. 209–214, March 1960.
3. C. M. Lo and W. H. Lam, Error probability of binary phase shift keying in Nakagami-m fading channel with phase noise, Electronics Leters, Vol. 36, No. 21, pp. 1773-1774, October 2000.

4. M. K. Simon and M. -S. Alouini, Simplified noisy reference loss evaluation for digital communication in the presence of slow fading and carrier phase error, IEEE Transactions on Vehicular Technology, Vol. 50, No. 2, pp. 480-486, March 2001.

5. J. G. Proakis and M. Salehi, Digital Communications, 5th edition, McGraw-Hill, Singapore, Asia, 2007.

6. M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables, Dover, Washington DC, USA, November 1970.

7. A. J. Viterbi, Principles of Coherent Communication, McGraw-Hill, New York, USA, 1966.

8. A. Falujah and V. K. Prabhu, Performance analysis of PSK systems in the presence of slow fading, imperfect carrier phase recovery, and AWGN, IEE Proceedings on Communications, Vol. 152, No. 6, pp. 903-911, December 2005.

9. I. S. Gradshteyn, I. M. Ryzhik, and A. Jeffrey ed., Table of Integrals, Series and Products, 7th edition, Academic Press, 2007.

292-295

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Chhaya Dalela

Paper Title:

Comparative Study of Radio Channel Propagation and Modeling for 4G Wireless Systems

Abstract: This paper concerns about the radio propagation models used for the upcoming 4th Generation (4G) of cellular networks. A comprehensive review of the propagation prediction models for 4G wireless communication systems is presented and computation of path loss due to specific terrain and clutter environment has been carried using MATLAB based simulations for various prediction techniques such as COST-231 Hata model, COST-231 Walfish-Ikegami method, SUI model and ITU-R(1411.1) model for broadband and mobile services. The results showed that COST-231Hata’s method gave better agreement in terms of path loss values in urban, suburban and rural areas as compared to COST-231 Walfisch–Ikegami model. COST-231 Hata model shows the lowest path loss in all the terrains whereas ITU-R(NLOS) model has highest path loss values. The prediction errors of the SUI and ITU-R NLOS models are considerably higher than those of the COST-231Hata and COST-231 Walfisch– Ikegami models.

Keywords:
LTE , Path loss, Propagation models


References:

1. G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64.
2. J. D. Parsons, The Mobile Radio Propagation Channel. NewYork: Wiley, 1998.

3. V. Abhayawardhana, I.Wassell, D. Crosby,M. Sellars, and M. Brown, “Comparison of empirical propagation pathloss models for fixed wireless access systems,” in Proc. IEEE Veh. Technol. Conf., Stockholm,Sweden, Jun. 2005, vol. 1, pp. 73–77.

4. COST Action 231, “Digital mobile radio. Towards future generation systems—Final report” European Communities, Tech. rep. EUR 18957, Ch. 4, 1999.

5. Ikegami, F., Yoshida, S., Tacheuchi, T. and Umehira, M.,“ Propagation Factors controlling Mean Field Strength on Urban Streets”, IEEE Trans., AP32(8), 822-9, 1984.

6. “Propagation data and prediction methods for the planning of short-range outdoor radio communication systems and radio local area networks in the frequency range 300 MHz to 100 GHz,” International Telecommunication Union, Geneva, Switzerland, Recommendation ITU-R P.1411-1, 2001.

7. V. Erceg et al., “Channelmodels for fixed wireless applications,” IEEE 802.16 Broadband Wireless Access Working Group, Jan. 2001.

8. Rappaport , Theodore S., “Wireless Communications Principles and Practice”, second edition, Prentice Hall, 2005.

9. Ekpenyong, Josheph Isabone and Etim Elcong, ”On Propagation path Loss Models For 3-G Based Wireless networks: A Comparative Analysis” Georgian Electronic Scientific journal: Computer Science and Telecommunications, vol. 2, no. 25, 2010.

10. Okumura, Y., Ohmori, E., Kawano, T. and Fukuda, K. (1968). Field strength and its variability in the VHF and UHF land mobile service, Review Electronic Communication Laboratories, 16(9/10), pp. 825– 873.

11. Mardeni, R, T. Siva Priya, “Optimize Cost231 Hata models for Wi-MAX path loss prediction in Suburban and open urban Environments”, Canadian Center of Science and Education, vol. 4, no 9, pp. 75-89,2010.

296-299

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

Sweety V. Batavia

Paper Title:

Real Time Data Warehousing using Dynamic SQL

Abstract: Data warehouse synchronization is a complex process in heterogeneous database environment. Maintaining the uniformity of data in real-time is a fundamental problem of data synchronization. In this paper we present a methodology to synchronize data warehouse in heterogeneous database environment in almost real-time using dynamic SQL approach. We capture all DML SQL query from source database and pass this to the processing module. Structure and DBMS systems at the source and target could be different; hence it is not possible to execute the source SQL directly into the target. A processing module runs continuously in the back end to read changes and prepare the dynamic SQL by referring the Reference Data. Reference Data acts as heart of the processing module that prepares the dynamic SQL. It specifies the mapping between source and target with all details. Another process executes the SQL query in the target system. If any error is encountered while executing the query in the target, it will be moved to the error processing module where it will be retried after some delay. Our preliminary experimental results evidence the effectiveness of the proposed method.

Keywords:
We capture all DML SQL query from source database and pass this to the processing module.


300-303

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

65.

Authors:

Z.Nouman, B.Klima, J.Knobloch

Paper Title:

Design and Implementation A Digital Sine-Cosine Generator Based FPGA

Abstract: This article proposes a new way to generate a sine and cosine waves based FPGA. These signals can be used to generate a PWM signals that can be used in SDR and DSP. It can be used in control system like control DC and AC motors. The problem is how can generate a sine and cosine waves that are composed of the positive and negative part. Any hardware accepts the values 0, 1 and can’t accept the negative values, we used the mode two’s components of numbers to represent the positive and negative samples and converted these results to decimal numbers, and we shifted a one half wave 8 bit to obtain the wave without distortion. We used MATLAB to generate the data of sine and cosine wave. We saved the data in ROM memory using VHDL language and we applied the results onto board spartan-3A FPGA.

Keywords:
comparator, counter, sine and cosine generator, lookup table, PWM, rom memory, VHDL.


References:

1. B. Shoaib, P.Muralidhar “FPGA Implementation of Sine and Cosine Value Generators using Cordic Algorithm for Satellite Attitude Determination and Calculators,” IEEE,conf.ICPCES,2010 Allahabad, Nov.29 2010-Dec.1 2010,pp.1-5, ISBN978-1-4244-8543-7
2. R.Mehra, B.Kamboj ”FPGA Based of Digital Wave Generator Using CORIC Algorithm, “ Int. J. Comp.Tech. Appl, Vol 1 (1), 54-58.

3. H.N.Srinivasa Murthy, M.Roopy “FPGA Implementation of Sine and cosine Generators using CORDIC Algorithm,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol.1, Issue.6, November 2012, pp.16-19.
4. R.F.Tinder, Engineering Digital Design. School of Electrical Engineering and Computer Science, Washington State University, Pullman, Washington 2000, ch.2.

5. Spartan-3 Generation FPGA User Guide UG331(V1.8) June 13, 2011 available:

6. M.Zwolinski, Digital System Design With VHDL, British library, Second edition published 2004,pp.143-153 available:

7. J.Král, Řešené Příklady Ve VHDL .Czech Republic, 30.9.2010, ISBN:978-80-7300-257-2,pp.81-103.

8. Spartan-3A/3AN FPGA Starter Kit Board User Guide UG334 (V1.1) June 19, 2008 available :

9. ChipScope Pro Software and Cores User Guide UG029 (V13.3) October, 2012 available:

304-307

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

Firoz Khan, Rajeev Kumar

Paper Title:

Design & Analysis of Rectangular Microstrip Patch Antenna

Abstract: In this paper the design consideration for the rectangular microstrip antenna is present. The various parameters of rectangular microstrip antenna, input impedance, VSWR, return loss, radiation pattern have been investigated as a function of frequency for different feed locations with a view to optimize the feed location for proper matching and radiations. The proposed antenna is designed at the height of 1.5mm from the ground plane and this design is operated at 1.9GHz. The entire simulation work is done on IE3D software.

Keywords:
Rectangular Microstrip Antenna, Return loss.


References:

1. C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.
2. R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna Design Handbook. Norwood, MA: Artech House, 2001.

3. S. Satthamsakul, N. Anantrasirichai, C. Benjangkapraset, and T. Wakabayashi, ”Rectangular Patch Antenna with inset feed and modifier ground plane for wide band antennas”, IEEE, Aug, 2008.

4. J. S. Roy, N. Chattoraj, N. Swain, “New Dual-Frequency Microstrip Antennas for Wireless Communication.”Proc. Romanian Journal of
Information Science and Tech, vol. 10, no. 1, 2007, 113-119.
5. Kumar, G. and Ray, K.P., Broadband Microstrip Antennas, Artech House, Inc, 2003.

308-310

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

S.Sundararaman, R.Saravanane, T.Sundararajan

Paper Title:

Treatment of Industrial Analgesic Wastewater by Submerged Membrane Bioreactor

Abstract: Extensive laboratory investigations were carried out using a commercially available submerged membrane (ZENON make; pore size – 0.04 µm and made of a polymeric material) for studying the treatment efficiency of an industrial pharmaceutical wastewater (obtained from a company manufacturing ‘analgesic’ drug). The bioaugmentation process adopted in the MBR is very effective for the treatment of the pharmaceutical effluent, as evident from the COD removal (%) obtained (ie., 82.5% @ 24 h HRT and 71.47% @ 8 h HRT, at the maximum OLR.

Keywords:
bioaugmentation, membrane bioreactor, pharmaceutical (industrial) effluent, submerged membrane


References:

1. Marrot, B., A. Barrios – Martinez, P. Moulin and N. Roche (2004), “Industrial wastewater treatment in a membrane bioreactor: A review”, Environmental Progress, 23 (1), 59 – 68
2. Sridang, P.C., J. Kaiman, A. Pottier and C. Wisniewski (2006), “Benefits of MBR in sea food wastewater treatment and water reuse: study case in Southern part of Thailand”, Desalination, 200, 712 – 714.

3. Matošić, M., I. Prstec, H.K. Jakopović and I. Mijatović (2009), “Treatment of beverage production wastewater by membrane bioreactor”, Desalination, 246, 285–293

4. Zheng, X. and J. Liu (2006), Dyeing and printing wastewater treatment using a membrane bioreactor with a gravity drain, Desalination, 190, 277 – 286.

5. Yun, MA., KM. Yeon, JS. Park, CH. Lee and J. Chun (2006), “Characterization of biofilm structure and its effect on membrane permeability in MBR for dye wastewater treatment”, Water Research, 40, 45 – 52.

6. Chang, JS., CY. Chang, AC. Chena, L.Erdei and S. Vigneswaran (2006), “Long-term operation of submerged membrane bioreactor for the treatment of high strength acrylonitrile-butadiene-styrene (ABS) wastewater: effect of hydraulic retention time”, Desalination, 191, 45–51.

7. Qin, JJ., M.H. Oo, G.Tao and K.A. Kekre (2007), “Feasibility study on petrochemical wastewater treatment and reuse using submerged MBR”, Journal of Membrane Science, 293, 161 – 166.

8. Ahn, S., S. Congeevaram, YK. Choung and J. Park (2008), “Enhanced phenol removal by floating fungal populations in a high concentration phenol-fed membrane bioreactor”, Desalination, 221, 494 – 501.

9. Benitez, J., A. Rodriguez and R. Malaver (1995), “Stabilization and dewatering of wastewater using hollow fiber membranes”, Water Research, 29 (10), 2281 – 2286.

10. Prado, N., J. Ochoa and A. Amrane (2009), “Zero nuisance piggeries: long term performance of MBR (membrane bioreactor) for dilute swine wastewater treatment using submerged membrane bioreactor in semi – industrial scale”, Water Research, 43, 1549 – 1558.

11. Chen, Z., N. Ren, A. Wang, ZP. Zhang, and Y. Shi (2008), “A novel application of TPAD–MBR system to the pilot treatment of chemical synthesis-based pharmaceutical wastewater”, Water Research, 42, 3385 – 3392.

12. Chen, ZB., DX. Hu, NQ. Ren, Y. Tian and ZP. Zhang (2009), “Biological COD reduction and inorganic suspended solids accumulation in a pilot- scale membrane bioreactor for traditional Chinese medicine wastewater treatment”, Chemical Engineering Journal, 155, 115 – 122.

13. Lesjean, B., V. Ferre, E. Vonghia and H. Moeslang (2009), “Market and design considerations of the 37 larger MBR plants in Europe”, Desalination and Water Treatment, 6, 227 – 233.

14. Bathe, S., N. Schwarzenbeck and M. Hausner (2005), “Plasmid-mediated bioaugmentation of activated sludge bacteria in a sequencing batch moving bed reactor using pNB2”, letters in Applied Microbiology, 41, 242-247.

15. Fantroussi,S.E. and S.N. Agathos (2005), “Is bioaugmentation a feasible strategy for pollutant removal and site remediation?” Current Opinion in Microbiology, 8, 267-275.

16. Chang, CY., JS. Chang, S. Vigneswaran and J. Kandasamy (2008), “Pharmaceutical wastewater treatment by membrane bioreactor process – a case study in southern Taiwan”, Desalination, 234, 393–401

311-313

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

M. Ashiquzzaman, Mohiuddin K. Shourav, K. M. Masud Rana

Paper Title:

Feasibility Study of Using Recycled Coarse Aggregate as a Radiation Shielding Material

Abstract: Radiation shielding is considered as a highly sensitive issue in the department of medical physics. Proper utilization of material in radiation shielding can be effective in terms of economy, durability and safety measure. Concrete is nowadays extensively used as a material for radiation shielding. The coarse aggregate of concrete plays an important role in concrete density where the density is related to the radiation attenuation. In this research, the feasible study has conducted of using the recycled coarse aggregate in radiation shielding. The focus of this paper is to introduce a possible better alternative of fresh aggregate to make the concrete shielding. Two types of recycled aggregates were taken; recycled stone aggregate (RCA) and recycled brick aggregate (RBA). Aggregate material properties were found out at the beginning of the research. As the Brachytherapy unit used in the research, the Cobalt-60 (Co-60) was selected as a source of photon energy. Then the HVL and TVL were measured based on the attenuation of radiation. The study shows that the use of recycled concrete in the radiation shielding is optimistic.

Keywords:
Recycled coarse aggregate, attenuation coefficient, radiation shielding, Co-60.


References:

1. M. Ashiquzzaman, SK. B. Hossen, F M Z. Hossain, “Prospect of Using Recycled Concrete as Coarse Aggregate in Bangladesh”, MIST Journal: Galaxy (Dhaka), Vol. 2, No. 1, pp. 07-15, Feb. 2013.
2. I. Akkurt, C. Basyigit, S. Kilincarslan, B. Mavi, A. Akkurt, “Radiation shielding of concretes containing different aggregates”, Cement & Concrete Composites , Vol. 28, Issue 2, pp. 153–157, Feb. 2006.

3. James E. Martin, “Physics for Radiation Protection: A Handbook”, WILEY-VCH Verlag GmbH & Co., 2006, ch. 8.

4. Berger MJ, Hubbell JH. NBSIR 87-3597: Photon cross-sections on a personal computer. National Institute of Standards, Gaithersburg. MD 20899, USA; 1987. Available from: <http://physics.nist.gov/PhysRefData/Xcom/Text/XCOM.html>

5. International Atomic Energy Commission: Radiation Protection in the Design of Radiotherapy Facilities, Safety Report Series No. 47, VIENNA, 2006, pp. 104.

6. Venselaar, Pérez-Calatayud : A Practical Guide To Quality Control of Brachytherapy, ESTRO Booklet No. 8, Brussels, Belgium, pp. 22, 2004.

314-317

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

Matheel E. Abdulmunim, Rabab F. Abass

Paper Title:

Novel Video Denoising Using 3-D Transformation Techniques

Abstract: Digital videos are often corrupted by a noise during the acquisition process, storage and transmission. It made the video in ugly appearance and also affect on another digital video processes like compression, feature extraction and pattern recognition so video denoising is highly desirable process in order to improve the video quality. There are many transformation for denoising process, one of them are Fast Discrete Wavelet Transform(FDWT) and framelet transform (Double-Density Wavelet Transform) which is a perfect in denoising process by avoiding the problems in the other transformations. In this paper we propose a method named Translation Invariant with Wiener filter (TIW) this method is proposed to solve the shift variance problem and use this method to denoise a noisy video with Gaussian white noise type.. It is applied with Two Dimensional Fast Discrete Wavelet Transform(2-D FDWT), Three Dimensional Fast Discrete Wavelet Transform(3-D FDWT), Two Dimensional Double Density Wavelet Transform(2-D DDWT) and Three Dimensional Double Density Wavelet Transform(3-D DDWT). The results show that our (TIW) gives a better denoising results comparative with the original methods.

Keywords:
Fast Discrete Wavelet Transform,Three Dimensional Fast Discrete Wavelet Transform, Double-Density Wavelet Transform, hard threshod, soft threshold, semisoft threshold, Translation Invariant Wiener filter (TIW).


References:

1. Guan L., He, Y., and Kung, S.,Y., " Multimedia Image and Video Processing", Taylor & Francis Group, LLC, 2th printing, 2012.
2. Raiaman A., Krishnaveni, V., and Ferose H. W.," A new denoising approach for the removal of impulse noise from color image and video sequences", Image Anal Stereol, Vol. 31, PP 185-191, 2012.

3. Zlokolica V.," Advanced Nonlinear Methods for Video Denoising", Ph.D. thesis, Faculteit IngenieurswetenschappenAcademiejaar,2006

4. Bahendwar Y., and G.R.Sinha,"A modified algorithm for denoising MRI images of Lungs using discrete wavelet transform ", International Journal of Computer Applications, National Conference on Innovative Paradigms in Engineering & Technology , PP. 29-32 , 2012 .

5. J.J. Galiana-Merino, J.L. Rosa-Herranz , S. Rosa-Cintas , and J.J. Martinez-Espla ," SeismicWaveTool: Continuous and discrete wavelet analysis and filtering for multichannel seismic data", Computer Physics Communications,Vol.184, PP. 162-171 , 2013 .

6. Li P., Kong,F., He, Q., and Liu, Y.," Multiscale slope feature extraction for rotating machinery fault diagnosis using wavelet analysis ", Measurement,Vol.46, PP. 497-505 , 2013 .

7. Burrus C. S., Goperath, R. A., and Guo, H., "Introduction to wavelet and wavelets transforms", A primer Upper Saddle, NJ (U.S.A.), Prantice Hall, Inc., 1998.

8. Al-Saraf T.O.K.," Fingerprint Recognition Using 3D Wavelet and 3D Multiwavelet With Neural Network", M.Sc. Thesis, Univ. of Sulayimani, Computer Science,Dep., Dec.2006.

9. Eristi H., " Fault diagnosis system for series compensated transmission line based on wavelet transform and adaptive neuro-fuzzy inference system ", Measurement,Vol.46, PP. 393-401 , 2013 .

10. AbdulWahab M.S., " 3D Wavelet-Based Optical Flow Estimation ", Eng. & Technology, Vol.25, No.2, PP. 299-311 , 2007 .

11. Geng P., Xianbin,L. Wanhai, Y., Shiqiang,Y.,and Jianhu,L., " A Video Denoising Method Based on Grouping the Similar Blocks and Surfacelet", Research Journal of Applied Sciences, Engineering and Technology, ISSN: 2040-7467Vol. 3 No.,10 PP. 1182-1187 , 2011 .

12. Al-Taai H. N., " Computationally efficient wavelet based algorithms for optical flow estimation ", Ph.D. Thesis, Univ. of Technology, Electrical and electronic engineering,Dep., Oct.2005.

13. Naher A. K.," A Framelet Based Approach for Image Denoising", M.Sc. Thesis, Univ. of Technology,Electrical and Electronic Eng.Dep.,July 2008 .

14. Kadhim W. Q.," Optical Flow Estimation Using Framelet Transform", M.Sc. Thesis, Univ. of Technology, Computer and Information Iechnology Eng.Dep., January 2010.

15. Goswami J. C., and Chan A. K., "Fundamentals of Wavelets Theory, Algorithms, and Applications", John Willy and Sons, 1999.

16. Abdulmunim M. E. A., " Color Image Denoising Using Discrete Multiwavelet Transform", Ph.D. Thesis, Univ. of Technology, Computer Science and Information Sys. Dep., 2004.

17. Jakiwer M.J.,"Quantitative Analysis of Denoising SAR Images ", M.Sc. Thesis, Univ. of Technology, Computer Science,Dep., Dec.2003.

18. Bradley A.B., " Shift-invariance in the Discrete WaveletTransform" Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., OurselinS. and Adriaansen,Vol.46, PP. 29-38 , Dec. 2003.

19. Mahmoud, W. A., and Abdulmunim, M. E., " Color Image Denoising Using Local Blocking With Translation-Invariant Multiwavelet Transform ", Eng. and Tech. Journal, University of Technology, Baghdad, Iraq, accepted paper for publication, 2004.

318-324

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

Veeraprathap.V, M.Nagaraja, M.Z.Kurian

Paper Title:

Network Interface Design and Implementation for NoC on FPGA with advanced Hardware and Networking Functionalities

Abstract: As we are living in a billion transistor era, the number of components on a given chip increases drastically, System on Chip (SoC) architectures become even more powerful. Key to this architecture is the ability to integrate multiple heterogeneous components into a single architecture, which requires modularity and abstraction. An integral part of this architectural design is the methods by which the various components communicate with one another. Network on Chip (NoC) architectures attempt to address these concerns by providing various component level architectures with specific interconnection network topologies and routing techniques. Networks-On-Chip (NoCs) have been proposed as a promising replacement to eliminate many of the overheads of buses and MPSoCs connected by means of general-purpose communication architectures. This paper presents the design and implementation of FPGA based Network on chip (NoC) which is scalable packet switched architecture with advanced Networking functionalities such as store & forward transmission, error management, power management and security. All these features are built on basic NI core, which includes data packetization/depacketisation, frequency conversion, data size conversion and conversion of protocols with limited circuit complexity and cost

Keywords:
Intellectual Property (IP), Multi-Processor System-on-Chip (MPSoC), Network-on-Chip (NoC), Network- Interface (NI), VLSI Architecture.


References:

1. Design of a NoC Interface Macrocell with Hardware Support of Advanced Networking Functionalities Saponara, Tony Bacchillone, Esa Petri, Member, IEEE, Luca Fanucci, Member, IEEE,Riccardo Locatelli, and Marcello Coppola
2. NoC Advantages for SoC Prototyping on Big FPGA BoardsJonah ProbellArteris, Inc jonah@arteris.com

3. P. S. Paolucci, F. LoCicero, A. Lonardo, M. Perra, D. Rossetti, C. Sidore, P. Vicini, M. Coppola, L. Raffo, G. Mereu, F. Palumbo, L. Fanucci, S. Saponara, and F. Vitullo, “Introduction to the tiled HW architecture of SHAPES,” in Proc. Design, Automation and Test in Europe, 2007,pp. 77–82.

4. B. A. A. Zitouni and R. Tourki, “Design and implementation of network interface compatible OCP for packet based NOC,” in Proc. 5th Int Design and Technology of Integrated Systems in Nanoscale Era (DTIS) Conf, 2010, pp. 1–8.

5. T. Tayachi and P.-Y. Martinez, “Integration of an STBus Type 3 protocol custom component into a HLS tool,” in Proc. 3rd Int. Conf. Design and Technology of Integrated Systems in Nanoscale Era DTIS 2008, 2008, pp. 1–4.

6. “NoC Interface for fault-tolerant Message- Passing communication on Multiprocessor SoC platform,” in Proc. NORCHIP, 2009, pp. 1–6.

7. “Synthesis of networks on chips for 3D systems on chips,” in Proc. Asia and South Pacific Design Automation Conf. ASP-DAC 2009, 2009, pp. 242–247.

8. “Efficient 2DMesh Network on Chip (NoC) considering GALS approach,” in Proc. Fourth Int. Conf. Computer Sciences and Convergence Information Technology ICCIT ’09, 2009, pp. 841–846.

325-330

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

71.

Authors:

Dushyant Pande, Sanjeev Gaba

Paper Title:

Measurement and Transmission of Atmospheric Parameters Using Radio Frequency Communication

Abstract: The measurement of various atmospheric parameters is of outmost importance, not only for the weather forecasting process but also for future references. A smart, robust and cheap system is implemented which can not only measure the various atmospheric parameters like light, temperature, humidity, wind speed and atmospheric pressure but can also transmit the acquired data to a personal computer using radio frequency based wireless communication. This paper proposes the design and development of such system. The system can be considered to be consisting of two modules. One is the transmitter module and the other is receiver module. The use of microcontroller and various sensors make the system operational in real time. The acquired data is displayed on the transmitting terminal with the help of a LCD and on the personal computer with the help of a customized Visual Basic interface.

Keywords:
Atmospheric parameters, Radio frequency transmission, Sensors, Visual basic, Weather monitoring.


References:

1. Muhammad Ali Mazidi and Janice Gillispe Mazidi, “The 8051 microcontroller and embedded systems”, Pearson education ltd., India, 2007.
2. G.S. Nhivekar, R.R.Mudholker, “Data logger and remote monitoring system for multiple parameter measurement applications”, e -Journal of Science & Technology (e-JST)

3. Cholatip Yawut and Sathapath Kilaso,2011, “A Wireless Sensor Network for Weather and Disaster Alarm Systems”, International Conference on Information and Electronics Engineering IPCSIT Volume.6, IACSIT Press, Singapore

4. Khalid Parveez, “A Smart Zigbee Based Wireless Weather Station Monitoring System” , International Conference on Computing and control Engineering (ICCCE 2012), 12 and 13 April 2012

5. Izzatdin Abdul Aziz, “Remote Monitoring in Agricultural Greenhouse Using Wireless Sensor and Short Message Service (SMS)”, International Journal of Engineering & Technology IJET Vol: 9 No: 9

6. Goswami, T. Bezboruah and K.C.Sharma, 2009, “Design of An Embedded System For Monitoring and Controlling Temperature and Light”, International Journal of Electronic Engineering Research Volume 1 Number 1

7. www.microchip.com

8. http://www.vbtutor.net/

331-335

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

72.

Authors:

Anju

Paper Title:

Performance Comparison of Vedic Multiplier and Booth Multiplier

Abstract: The performance of the any processor will depend upon its power and delay. The power and delay should be less in order to get a effective processor. In processors the most commonly used architecture is multiplier. If the power and delay of the multiplier is reduced then the effective processor can be generated. In this paper Vedic Multiplier and Booth Multiplier are implemented on FPGA and comparative analysis is done. The Comparison of these Architectures are carried out to know the best architecture for multiplication w. r. t. power and delay characteristics. The designs are implemented using VHDL in Modelsim 10.1 b and synthesis is done in Xilinx 8.2i ISE.

Keywords:
Urdhva Tiryagbhyam, Vedic multiplier, Booth multiplier, Xilinx.


References:

1. Ravindra P Rajput, M. N Shanmukha Swamy, ''High Seed Modified Booth Encoder multiplier for signed and unsigned numbers'', 14th Internaitonal Conference on Modeling and simulation, 2012 IEEE, pp. 649-654.
2. Rashmi K. Lamte and Prof. Bhasker, "Speedy Convolution using Vedic Mathematics", International Journal of Recent Trends in Engineering and Technology, Vol-05, No-01, March 2011.

3. Jagadeshwar Rao M, Sanjay Dubey, "A high speed and Area Efficient Booth Recoded Wallace tree Multiplier for fast Arithmetic Circuits," Asia Pacific Conference on postgraduate Research in Microelectronics & Electronics (PPIM EASIA) 2012.

4. Ch. Harish Kumar "Implementation and Analysis of Power, Area and Delay of Array Urdhava, Nikhilam Vedic Multipliers, " Internatinal Journal of Scientific and
Research Publications, Volume 3, Issue 1 January 2013, ISSN 2250 – 3153.

5. Nidhi Mittal, Abhijeet Kumar, "Hardware Implementation of FFT using vertically and crosswise Algorithm", International Journal of Computer Application (0975-8887), Volume-35- No-1, December 2011.

6. L. Sriraman, T.N. Prabakar.'' Design and Implementation of two variable Multiplier using KCM and Vedic Mathematics, 1st International Conference on Recent Advances in Information Technology 2012 IEEE.

7. H. Thapliyal, M. B. Srinivas and H. R. Arabnia , "Design And Analysis of a VLSI Based High Performance Low Power Parallel square Architecture", in Proc. Int. Conf. Also. Math. Compo. Sc., Las Vegas, June 2005, pp. 72-76.

8. Vinoth, C. Bhaaskaran, V.S.K. Brindha, B. Sakthikumarna, S. Kavinilavu, V. Bhaskar, B. Kanagaasabapathy, M. and Sharath, B. "A novel low power and high speed Wallace tree multiplier for RISC Processer,'' 3rd International Conference on Electronics Computer Technology (ICECT), 2011, Vol-1,April 2010,pp. 8-10 .

9. Chen Ping-hua and Zhao Juan, "High-Speed Parallel 32x32-bit Multiplier Using a Radix-16 Booth Encoder", Third International Symposium on intelligent Information Technology Application Wrokshops, 2009. IITAW 09, pp.406-409, 21-22 Nov. 2009.

10. Swami Bharati Krshna Tirthaji, Vedic Mathematics. Delhi: Motilal Banarsidass Publishers, 1965.

11. Asmita Haveliya "A Novel Design for High Speed Multiplier .for Digital Signal Processing Applications (Ancient Indian Vedic mathematics approach)" International Journal of Technology And Engineering System(IJTES):Jan - March 2011- Vo12 .No. l.

12. Harpreet Singh Dhillon and Abhijit Mitra "A Digital Multiplier Architecture using Urdhava Tiryakbhyam Sutra of Vedic Mathematics" IEEE Conference Proceedings,2008.

13. Parth Mehta, Dhanashri Gawali "Conventional versus Vedic mathematical method for Hardware implementation of a multiplier" 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

14. Himanshu Thapliyal, S. Kotiyal and M.B. Srinivas, "Design and Analysis of a Novel Parallel Square and Cube Architecture Based on Ancient Indian Vedic Mathematics", Proceedings on 48th IEEE International Midwest Symp-osium on Circuits and Systems (MWSCAS 2005)

15. Shamim Akhtar, "VHDL Implementation of Fast NxN multiplier Base on Vedic Mathematics," Jaypee Institute of Information Technology University, Noida, 2011307 U.P, India, 2007 IEEE.

16. Pushpalata Verma, K.K. Mehta, ''Implementation of an efficient multiplier based on Vedic Mathematics using EDA Tool'', International Journal of Engineering and Advance Technology (IJEAT) ISSN : 2249-8958, volume-1, Issue -5, June 2012.

336-339

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

73.

Authors:

Gopi K.R, Mohandas K.N, Reddappa H.N, M.R. Ramesh

Paper Title:

Characterization of As Cast and Heat Treated Aluminium 6061/Zircon sand/Graphite Particulate Hybrid Composites

Abstract: The present investigation has been focused on the development of hybrid composite involving aluminium matrix reinforced with particulates of Zircon sand and graphite (produced by stir casting technique), the cast composites were tested for hardness, wear characteristics and the obtained properties were correlated with the microstructure. The results of the present investigation indicate that there is a considerable improvement in the hardness valves, microstructure and resistance for wear.

Keywords
: Aluminium 6061, Zircon sand, Graphite


References:

1. Sanjeev Das V. Udhayabanu S. Das: “Synthesis and characterization of zircon sand/Al-4.5 wt% Cu composite produced by stir casting route” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, J Mater Sci (2006) 41:4668–4677.
2. J.S.S. Babu a, C.G. Kang b, H.H. Kim: “Dry sliding wear behavior of aluminium based hybrid composites with graphite nanofiber–alumina fiber” Engineering Research Center (NSDM), Pusan National University, Busan, South Korea, Materials and Design 32 (2011) 3920–3925.

3. Sanjeev Das, S. Das, K. Das: “Ageing behavior of Al–4.5 wt% Cu matrix alloy reinforced with Al2O3 and ZrSiO4 particulate varying particle size” J Mater Sci (2006) 41:5402–5406.

4. Sanjeev das, Karabi das and Siddhartha das: “Abrasive Wear Behavior of Al-4.5 wt% Cu/(Zircon Sand + Silicon Carbide) Hybrid Composite” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, Journal of composite materials, Vol. 43, No. 22/2009.

5. S. Suresha and B.K. Sridhara: “Wear characteristics of hybrid aluminium matrix composites reinforced with graphite and silicon carbide particulates” Department of Mechanical Engineering, The National Institute of Engineering, Mysore, Composites Science and Technology 70 (2010) 1652–1659.

6. Sanjeev Das, Siddhartha Das, Karabi Das: “Abrasive wear of zircon sand and alumina reinforced Al–4.5 wt%Cu alloy matrix composites” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, Composites Science and Technology 67 (2007) 746–751.

340-344

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

74.

Authors:

Simon Muhič, Milan Šturm, Mitja Mazej

Paper Title:

Numerical and Experimental Validation of Low Exergy System for Heating and Cooling Of Residential Buildings

Abstract: This study presents the concept of a low-exergy thermal system with thermal barrier for indirect heating and cooling of a residential building. The main concept of this technology is based on the active layer with thermal barrier located inside of external wall that is reducing the transmission heat losses and gains through the building envelope by stabilizing the temperature in the thermal barrier at the level close to the indoor air temperature. With this approach the heat flux through the wall between the interior and the thermal barrier layer is reduced to a minimum value. The active layer technology is driven by the stored solar energy for heating in winter and cold soil for cooling of the building in summer. Application of the thermal barrier system with the soil heat storage has been studied numerically and experimentally on an existing residential building. On the basis of performed numerical simulations and the data obtained from the measurements the advantages and the effectiveness of the concept have been confirmed. This study provides valuable information on the application of the system and confirms its potential for zero-energy building requirements.

Keywords:
Thermal barrier, Indirect heating and cooling, Renewable energy sources, Active layer.


References:

1. EU Parliament and the Council of the EU. Directive 2010/31/EU. Official Journal of the European Union, L153, 18.6.2010.
2.
Chan, H.Y., Riffat, S.B., Zhu J. Review of passive solar heating and cooling technologies, Renewable and Sustainable Energy Reviews 14, 2010, pp 781–789.

3. Schmidt, T., Mangold, D., Müller-Steinhagen, H. Central solar heating plants with seasonal storage in Germany, Solar Energy 76, 2004, pp 165–174.

4. Popiel, C.O., Wojtkowiak, J., Biernacka, B. Measurements of temperature distribution in ground. Experimental Thermal and Fluid Science 25, 2001, pp 301–309.

5. Rantala, J. A new method to estimate the periodic temperature distribution underneath a slab-on-ground structure. Building and Environment 40, 2005,
pp 832–840.

6. TRNSYS 17. SEL, TRANSSOLAR Energitechnik GmbH, CSTB and TESS. Website: http://sel.me.wisc.edu/trnsys

7. Duffie J., Beckman W. Solar Engineering of Thermal Processes, Wiley, New York, 1980.

8. Feist W., Pfluger R., Kaufman B., Schnieders J., Kag O. Passive House Planning Package 2007, Technical information PHI-2007/1E. Passiv Haus Institut, 2007.

345-351

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

75.

Authors:

Priyadarshini. M, Murali Babu. B

Paper Title:

Differential Evolution Algorithm for Security Constrained Optimal Power Flow

Abstract: This paper presents a differential evolution algorithm approach to solve Security Constrained Optimal Power Flow (SCOPF) problem in power system including FACTS device. In this process, under a line outage the generation cost is to be minimised and to keep the power flow in their security limits, in addition to that the losses is to be minimised after installing the FACTS device. A versatile FACTS device Unified Power Flow Controller (UPFC) is considered as a combination of SVC and TCSC .The operating limit of the FACTS device is defined not only to minimize the total generation cost but also to reduce transmission loss. The proposed method was tested using standard IEEE-30 bus system with 6 generating units to show the effectiveness of the proposed algorithm for solving the SCOPF problem.

Keywords:
Differential Evolution, generation cost, transmission loss, Security Constrained Optimal Power flow, UPFC, SVC, TCSC.


References:

1. Yunqiang lu, and AliAbur, “Static security enhancement via optimal utilization of thyristor controlled series capacitors”, IEEE Transactions on power Systems, Vol,17 , pp. 324-329, 2002.
2. O.Alsac,and B. Scott, “Optimal load flow with steady state security”, IEEE Transaction. PAS -1973, pp. 745-751.

3. A.Monticelli , M .V.F Pereira ,and S. Granville “Security constrained optimal power flow with post contingency corrective rescheduling” , IEEE Transactions on Power Systems :PWRS-2, No. 1, pp.175-182.,1987.
4. K.Y Lee ,Y.M Park , and J.L Oritz, “Fuel –cost optimization for both real and reactive power dispatches” , IEE Proc; 131C,(3), pp.85-93.

5. M.K. Mangoli, and K.Y. Lee, “Optimal real and reactive power control using linear programming” , Electr.Power Syst.Res, Vol.26, pp.1-10,1993.

6. G.M. Lima, et al, “Phase shifter placement in large –scale systems via mixed integer programming” , IEEE Trans., PWRS-18,(3),pp.1029-1034,2003

7. M. Saravanan, S.M.R. Slochanal, P. Venkatesh, and P.S. Abraham, “Application of PSO Technique for Optimal Location of FACTS Devices Considering System Loadability and Cost of Installation”, Power Engineering Conference, Vol. 21, 2005, pp.716 -721.

8. L.J. Cai, I. Erlich, “Optimal Choice and Allocation of FACTS Devices using Genetic Algorithms”, Proceedings on Twelfth Intelligent Systems Application to Power Systems Conference, 2003, pp. 1–6.

9. S. Gerbex, R. Cherkaoui and A. J. Germond, “Optimal Location of FACTS Devices to Enhance Power System Security”, Proceeding on IEEE Bologna PowerTech Conference, Vol. 3, 2003, pp.1-7.

10. Rainer Storn, Kenneth Price, “differential evolution – A simple and efficient adaptive scheme for global optimization over continuous spaces” TR-95-012, March 1995.

11. Dervis Karaboga, Selcuk Okdem, “A Simple And Global Optimization Algorithm For Engineering Problems: Differential Evolution Algorithm”, Turk J Elec. Engin., Vol. 12, No. 1, 2004, pp. 53-60.

12. Raul E. Perez-Guerrero, Jose R. Cedeno- Maldonado, “Differential Evolution Based Economic Environmental Power Dispatch” Pp.191-197.

13. R.Balamurugan and S.Subramanian ,“Self Adaptive Differential Evolution Based Power Economic Dispatch Of Generators With Valve Point Effects And Multiple Fuel Options”, International Journal Of Computer Science And Engineering ,Vol. 1, No. 1, 2007, ISSN 1307-3699, pp. 10-17.

14. Raul E. Perez-Guerrero and Jose R. Cedeno-Maldonado, “Economic Power Dispatch With Non-Smooth Cost Functions Using Differential Evolution”, pp. 183-190.

352-356

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

76.

Authors:

Arshad Nawaz, Muhammad Naeem Arbab

Paper Title:

Voltage Regulation of Variable Speed Wind Turbine using MATLAB/Simulink

Abstract: The conventional sources of energy are depleting and emphasis is now focused on renewable energy. Wind energy is one of the renewable sources having great potential. It is cheap and requires less maintenance but also have issues associated with it. The main issue associated with Wind turbines (WT) is the unpredictable nature of wind. This makes it difficult to get a constant frequency and constant voltage from wind turbines driven by the variable speed. This paper presents method of regulating the output voltage for standalone wind turbine driven by variable speed wind. The method is based on the using voltage regulator for the fluctuating voltage of wind turbine driven by variable speed. The regulated voltage is supplied to utility. Battery system is also proposed for the system which will provide power when wind regulated voltage is dropped from a threshold value due to low wind speed or absence of wind.

Keywords:
Voltage regulation, Renewable energy, Variable speed wind turbine, off-grid


References:

1. Khattak and M. N. Arbab, “Model and Design for the Control of Hybrid Domestic Power System,” vol. 02, no. 02, 2012.
2. V. D. Induction and M. M. A. Salama, “Voltage Regulation of Wind Farms Equipped Generators Wind Turbines,” pp. 1–8, 2010.

3. W. Turbines, “Wind Turbines,” http://www.springerlink.com/index/10.1007/3-540-29284-5, pp. 1–7, 2006.

4. R. Mittal, K. S. Sandhu, and D. K. Jain, “Battery energy storage system for variable speed driven PMSG for wind energy conversion system,” 2010 Joint International Conference on Power Electronics, Drives and Energy Systems & 2010 Power India, pp. 1–5, Dec. 2010.

5. K. Kalyan, E. Swati, and C. Ravindra, “Voltage Stability of Isolated Self Excited Induction Generator ( SEIG ) for Variable Speed Applications using Matlab / Simulink,” no. 3, pp. 186–190, 2012.

6. L. Theraja, Electrical Technology. .

7. K. Premalatha and S. Sudha, “Self-Excitation and Voltage Control of an Induction Generator in an Independent Wind Energy Conversion System,” ijmer.com, vol. 2, no. 2, pp. 454–461, 2012.

8. A. Neal, R. N. Clark, B. A. Neal, and R. N. Clark, “Speed Control of a Small Wind Turbine Using Electrical Loading Speed Control of a Small Turbine Using Electrical Loading.”

9. X. Juankorena, I. Esandi, J. López, and L. Marroyo, “Method to Enable Variable Speed Wind Turbine Primary Regulation,” pp. 495–500, 2009.

357-360

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

77.

Authors:

Susheel Kumar Sharma, Syed Hasan Mehdi

Paper Title:

Influences of the Welding Process Parameters on the Weldability of Material

Abstract: In this study, influence of the welding process parameters on the weldability of material, low carbon alloy steel (0.14% C) specification having the dimensions 75 mm X 50 mm X 6mm welded by metal arc welding were investigated. The welding current, arc voltage, welding speed, heat input rate are chosen as welding parameters. The depth of penetrations were measured for each specimen after the welding operation on closed butt joint and the effects of welding speed and heat input rate parameters on depth of penetration were investigated.

Keywords:
Low Carbon Steel, Manual Metal Arc Welding, Welding Bead Penetration, Welding Process Parameters, Welding Speed.


References:

1. OP Khanna, A text book of welding technology, Dhanpat Rai Publications Ltd., 2006,P3.
2. Lee JI, Um KW. A prediction of welding process parameters by prediction of back-bead geometry. J Mater Process Technol, 2000.

3. Raveendra J, Parmar RS. Mathematical models to predict weld bead geometry for flux cored arc welding. Met Construct, 1987.

4. Modenesi PJ, Avelar RC. The influence of small variations of wire characteristics on gas metal arc welding process stability. J Mater Process Technol, 1999.

5. Modenesi PJ, Avelar RC. The influence of small variations of wire characteristics on gas metal arc welding process stability. J Mater Process Technol, 1999.

6. Renwick, B.G. and Patchett, B.M. (1976) Operating characteristics of submerged arc process. Welding Journal, 55 (3): 69s-79s.

7. Gunaraj, V. and Murugan, N. (2000) Prediction and Optimization of Weld Bead Volume for the Submerged Arc Process- Part-1. Welding Research Suppl. 79(10): 286s-294s.

8. Ravindra J& Pramar R S , Mathematical Model To Predict Weld Bead Geometry For The Flux Cored Welding Process, Metal Construct, 19 (1987) 31 R-35R.

9. Md. Ibrahim khan, Welding science and technology, new age international publishers, Edition 2007, pp.66.

361-363

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

78.

Authors:

Shubhangi Mishra, Ashish Xavier Das, A.K.Jaisawal

Paper Title:

Effect of Mobility and Different Data Traffic in Wireless Ad-hoc Network through Qual Net

Abstract: Wireless Ad Hoc Network is collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized network. An Ad-hoc network does not have any centralized arbitrator or server. Routing is process of selecting path in a network along which to send data packets. In this paper effect of different Mobility models and Data traffic are comparatively discussed on the basis of different routing protocols AODV, OLSR and ZRP. The performance of these routing protocols is analyzed by three metrics i.e. End to end delay, Jitter and Through-put. We have studied the effect, of mobility models on the performances (End to end delay, through-put and Jitter) of routing protocols AODV, OLSR, and ZRP by using in the first the CBR (Constant Bit Rate) and secondly a multiservice VBR (Variable Bit Rate) traffic. Random Waypoint Mobility model (RWP) and Group Mobility Model has been used. Simulations are performed using QualNet 6.1 version Simulator from Scalable Networks.

Keywords:
MANET, AODV, OLSR, ZRP, CBR, VBR, Group Mobility, RWP (random waypoint)


References:

1. C. E. Perkins and E. M Royer., “Ad hoc on demand distance vector (AODV) routing (Internet-Draft)”, Aug-1998.
2. C. S. R. Murthy, B. S. Manoj, "Ad Hoc Wireless Networks: Architecture and Protocols", Ch. Routing Protocols for Ad Hoc Wireless Networks, pp. 299-364.

3. Z.J. Haas, M.R. Pearlman and P. Samar, "Intra-zone Routing Protocol (IARP)", IETF Internet Draft, draft-ietfmanet-iarp-02.txt, July 2002.

4. Z.J. Haas, M.R. Pearlman and P. Samar, "Inter-zone Routing Protocol (IERP)", IETF Internet Draft, draft-ietfmanet- ierp-02.txt, July 2002.

5. T. Clausen, P. Jacquet A. Laouiti, P. Muhlethaler, A. Qayyum, and L. Viennot, “Optimized link state routing protocol”, In IEEE INMIC, 2001.

6. C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall PTR. 2002: 55-77

7. Z.J. Haas, M.R. Pearlman and P. Samar,“The Zone Routing Protocol for Ad-hoc Networks”, draft-ietf-manet-zone-zrp-04.txt, July 2002.

8. C.E.Perkins, “Ad Hoc Networking”, [M]. London: Addison-Wesley, 2001.

9. Azzedine Boukerche,“A Performance Comparison of Routing Protocols for Ad Hoc Networks”, 2001 IEEE.

10. Z.J. Haas, M.R. Pearlman, R. Marc, “The Performance of Query Control Schemes for the Zone Routing Protocol” ,August 2001, IEEE/ACM Transactions on
Networking, Vol. 9, No. 4

11. M. Subramanya Bhat., D. Shwetha and J.T. Devaraju, “A Performance Study of Proactive, Reactive and Hybrid Routing Protocols using Qualnet Simulator”, International Journal of Computer Applications (0975 – 8887) Volume 28– No.5, August 2011

12. The Qualnet simulator www.scalable-networks.com

13. C. Bettstetter,G. Resta, P. Santi, “The node distribution of the random waypoint mobility model for wireless ad hoc networks,” IEEE Transactions on Mobile Computing, vol. 2, no. 3, pp257- 269,2003.

14. V. Vasanthi, Romen Kumar, Ajith Singh and M. Hemalatha, “ A detailed study of mobility models in wireless sensor network” ,vol. 33, no. 1, November 2011.

15. M. Amnai, Y. Fakhri And J. Abouchabaka, “Impact of mobility on delay-throughput performance in multiservice mobile Ad-hoc network” ,Int’l J. of Communications, Network and System Sciences, , 4, 395-402, June 2011.

16. J. C. Cano, C.T. Calafate, M.P. Malumbres, P. Manzoni, “Evaluating the performance impact of Group mobility in MANETs”, September 2004.

17. L. Viennot, P. Jacquet And T. H. Clausen., “ Analyzing control traffic overhead versus mobility and data traffic activity in mobile Ad-hoc network protocols” , vol. 10, issue 4, July 2004.

18. N. Bilandi and H. K. Verma “Comparative analysis of Reactive, Proactive and Hybrid routing protocols in MANET” ,IJECSE, vol. 1, no. 3,2009.

19. Dubey and Shrivastava, “Energy Consumption using Traffic Models for MANET Routing Protocols”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN), Vol. 1, Issue 1, pp. 84-89,2011

20. Jun-Hoong and Au-Yong, “Comparison of On Demand Mobile Ad Hoc Network Routing Protocols Under ON/OFF SourceTraffic Effect”, Proc. of IASTED International Conference, March 29-31, 2006, Chiang Mai, Thailand.

21. D. Dwivedi, S. Dubey, A. Verma and A. Lala, “Energy efficient reactive routing using energy evaluation model with CBR and VBR traffic model” , Vol. 1, no. 4, 2012.

364-368

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

79.

Authors:

S. Ezhil Vannan, S. Rekha

Paper Title:

A New Method for Obtaining an Optimal Solution for Transportation Problems

Abstract: In this paper a new method is proposed for finding an optimal solution for a wide range of transportation. This method is easy to understand and use compared to other methods. The main feature of this method is that it requires very simple arithmetical and logical calculations and avoids large number of iterations. This method is very efficient for those decision makers who are dealing with logistics and supply chain related issues. This method can easily adopt among the existing method.

Keywords:
Transportation problem, Exponential approach, cost matrix, optimal solution.


References:

1. G.B. Dantzig, Linear programming and extensions, Princeton University Press, Princeton, NJ 1963.
2. Taha. H.A., Operations Research- Introduction, Prentice Hall of India (PVT), New Delhi, 2004.

3. Sharma . J.K., Operations Research- Theory and applications, Macmillan India (LTD), New Delhi, 2005.

4. V.J.Sudhakar, N. Arunsankar and T. Karpagam, A New approach for finding an Optimal solution for transportation Problems. European journal of scientific Research, vol 68, pp.254-257,2012.

5. Chandrasekhar Putcha, Aditya K. Putcha, MD Rohul Amin Bhuiysn and Nasima Farzana Hoque, Development of New Optimal Method for solution of
Transportation portation Problems Preceding of world Congress on Engineering 2010.

6. H.Arsham, Post optimality analyses of the transportation problem, Journal of the Optimal Research Society, vol 43, pp. 121-139, 1992.

7. A. Henderson and R. Schlaifer Mathematical programming: Better information for better decision making, Harvard Buisness Review, vol 32, pp.73-100, 1954.

8. Koopmans T. C., Optimum Utilization of Transportation System, Econometrica, Supplement vol 17, 1949.

369-371

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

80.

Authors:

K.Velayutham, U.Arumugam, B.Kumaragurubaran, P.Gopal

Paper Title:

Analysis of Corrosion Prevention Methods in Railway Coaches and Bogies

Abstract: This paper mainly deals with corrosion that occurs in Railway coaches and bogie components, causes of corrosion, steps taken to prevent corrosion, suggestions to minimize this problem. This paper contains new suggestions to minimize the problems: more emphasis has laid on dissimilar welding and special coating which are being done perfunctorily, the various most affected parts near the bottom of lavatory side wall plates are to be identified and replacing by dissimilar material of stainless steel and IRS M – 41.Study of modification in components design and epoxy coating methods are to be applied on the sole bar and destruction tubes. This paper describes the technique and gives details on applications.

Keywords:
Coating, Corrosion prevention design, Dissimilar welding, Surface treatment.


References:

1. David G. Manning “Corrosion performance of epoxy-coated reinforcing steel: North American experience” dx.doi.org/10.1016/0950-0618 (95)00028-3
2. E Potvin “Corrosion protective performances of commercial low – VOC epoxy/urethane coatings on hot-rolled 1010 mild 1010 mild steel”. dx.doi.org/10.1016/S0300-9440 (97)00095-7

3. K.Saravanan “Performance evaluation of polyaniline pigmented epoxy coating for corrosion protection of steel in concrete environment” dx.doi.org/10.1016/j.porgcoat.2007.03.002

4. B.N. Grgura “Corrosion behavior and thermal stability of electrodeposited PANI/epoxy coating system on mild steel in sodium chloride solution” doi.org/10.1016/j.porgcoat.2006.05.003

5. K.Kobayashi “Experimental studies on epoxy coated reinforcing steel for corrosion protection” doi.org/10.1016/0262-5075(84)90039-3

6. R. Radhakrishnan “Epoxy powder coatings containing polyaniline for enhanced corrosion protection” oi.org/10.1016/j.porgcoat.2008.07.024

7. M.R. Bagherzadeh “Novel water-based nanosiloxane epoxy coating for corrosion protection of carbon steel” dx.doi.org/10.1016/j.surfcoat.2011.05.036

8. J.B. Bajata “Corrosion stability of epoxy coatings on aluminum pretreated by vinyltriethoxysilane” doi.org/10.1016/j.corsci.2008.04.018

9. D.G. Leea “Fatigue properties of inertia dissimilar friction-welded stainless steels” doi.org/10.1016/j.jmatprotec.2004.04.400

10. A. Josepha “Evaluation of residual stresses in dissimilar weld joints” doi.org/10.1016/j.ijpvp.2005.03.006

11. .M.J. Torkamany “Effect of laser welding mode on the microstructure and mechanical performance of dissimilar laser spot welds between low carbon and
austenitic stainless steels” doi.org/10.1016/j.matdes.2011.05.024

12. N. Arivazhagana “High temperature corrosion studies on friction-welded dissimilar” dx.doi.org/10.1016/j.mseb.2006.02.047

13. Jamasri “Corrosion Fatigue Behavior of Resistance Spot Welded Dissimilar Metal Welds between Carbon Steel and Austenitic Stainless Steel with Different Thickness” .doi.org/10.1016/j.proeng.2011.04.10
14. M.V Venkatesana “Influence of FCA Welding Process Parameters on Distortion of 409M Stainless Steel for Rail Coach Building” doi.org/10.1016/S1006
706X(13)60047-3

15. Bijayani Panda “On the corrosion behaviour of novel high carbon rail steels in simulated cyclic wet–dry salt fog conditions” doi.org/10.1016/j.corsci.2008.02.021

16. F. Presuel-Morenoa “Corrosion-resistant metallic coatings” dx.doi.org/10.1016/S1369-7021(08)70203-7

17. Kirsten Bobzin, “Investigation of Wear and Corrosion Protection of AlSi20 Coatings Produced by Plasma Spraying and Laser Cladding on AZ31B” DOI 10.1007/s11666-012-9867-6

18. Fujian Tanga “Corrosion resistance and mechanism of steel rebar coated with three types of enamel” doi.org/10.1016/j.corsci.2012.02.02

19. Z. Sun , a “The application of electron beam welding for the joining of dissimilar metals: dx.doi.org/10.1016/0924-0136(95)02150-7

20. Ion Mitelea “Dissimilar friction welding of induction surface-hardened steels and thermochemically treated steels” dx.doi.org/10.1016/j.jmatprotec.2012.04.01

21. Shu Xu “Thermal Stress Analysis of dissimilar welding joints by Finite Element Method” doi.org/10.1016/j.proeng.2011.08.722

22. Shaogang Wang “Characterization of microstructure, mechanical properties and corrosion resistance of dissimilar welded joint between 2205 duplex stainless steel and 16MnR dx.doi.org/10.1016/j.matdes.2010.07.012

23. Jamasri , “Corrosion Fatigue Behavior of Resistance Spot Welded Dissimilar Metal Welds between Carbon Steel and Austenitic Stainless Steel with Different Thickness” doi.org/10.1016/j.proeng.2011.04.108

372-376

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

81.

Authors:

B.Kumaragurubaran, T.Parthipa Saravana Kumar, T.Senthil Kumar, M. Chandrasekar

Paper Title:

Optimizing the Plasma Spray Process Parameters of Yttria Stabilized Coatings on Aluminum Alloy Using Response Surface Methodology

Abstract: Atmospheric plasma spraying is used extensively to make Thermal Barrier Coatings of 7-8% yttria-stabilized zirconia powders. The main problem faced in the manufacture of yttria-stabilized zirconia coatings by the atmospheric plasma spraying process is the selection of the optimum combination of input variables for achieving the required qualities of coating. This problem can be solved by the development of empirical relationships between the process parameters (current, powder feed rate, stand-off distance, no of passes) and the coating quality characteristics (coating thickness, coating hardness and porosity) through effective and strategic planning and the execution of experiments by response surface methodology. This article highlights the use of response surface methodology by designing four factor five level central composite rotatable design matrixe with full replication for planning, conduction, execution, and development of empirical relationships. Further, response surface methodology was used for the selection of optimum process parameters to achieve desired quality of yttria-stabilized zirconia coating deposits on aluminum alloy.

Keywords:
Plasma spray, statistical experiments, response surface methodology, yttria stabilized zirconia, coating thickness, porosity, coating hardness.


References:

1. T. Beck, R. Herzog, O. Trunova, M. Offermann, R.W. Steinbr-ech, and L. Singheiser, Damage Mechanisms and Lifetime Behavior of Plasma-Sprayed Thermal Barrier Coating Systems for Gas Turbines. Part II. Modeling, Surf. Coat. Technol., 2008, 202, p 5901-5908
2. J. Go´ mez-Garcı´a, A. Rico, M.A. Garrido-Maneiro, C.J. Mu´ nez, P. Poza, and V. Utrilla, Correlation of Mechanical Properties and Electrochemical Impedance Spectroscopy Analysis of Thermal Barrier Coatings, Surf. Coat. Technol., 2009, 204, p 812-815

3. S.-I. Jung, J.-H. Kim, J.-H. Lee, Y.-G. Jung, U. Paik, and K.-S.Lee, Microstructure and Mechanical Properties of Zirconia-Based Thermal Barrier Coatings with Starting Powder Mor-phology, Surf. Coat. Technol., 2009, 204, p 802-806

4. S.A. Sadeghi-Fadaki, K. Zangeneh-Madar, and Z. Valefi, The Adhesion Strength and Indentation Toughness of Plasma-Sprayed Yttria Stabilized Zirconia Coatings, Surf. Coat. Technol., 2010, 204, p 2136-2141

5. P. Diez and R.W. Smith, The Influence of Powder Agglomeration Methods on Plasma Sprayed Yttria Coatings, J. Therm. Spray Technol., 1993, 2, p 165-172

6. A. Kulkarni, A. Vaidya, A. Goland, S. Sampath, and H. Herman, Processing Effects on Porosity-Property Correlations in Plasma Sprayed Yttria-Stabilized Zirconia Coatings, Mater. Sci. Eng. A, 2003, 359, p 100-111

7. R. Kingswell, K.T. Scott, and L.L. Wassell, Optimizing the Vacuum Plasma Spray Deposition of Metal, Ceramic and Cermet Coatings Using Designed Experiments, J. Therm. Spray Technol.,1993, 2, p 179-186

8. Y. Wang and T.W. Coyle, Optimization of Solution Precursor Plasma Spray Process by Statistical Design of Experiment, J. Therm. Spray Technol., 2008, 17, p 692-699

9. Troczynski and M. Plamondon, Response Surface Methodology for Optimization of Plasma Spraying, J. Therm. Spray Technol., 1992, 1, p 293-300

10. F.H. Yuan, Z.X. Chen, Z.W. Huang, Z.G. Wang, and S.J. Zhu, Oxidation Behavior of Thermal Barrier Coatings with HVOF and Detonation-Sprayed NiCrAlY Bondcoats, Corros. Sci., 2008, 50, p 1608-1617

11. E. Lugscheider, F. Ladru, V. Gourlaouen, and C. Gualco, Enhanced Atmospheric Plasma Spraying of Thick TBCs by Improved Process Control and Deposition Efficiency, Thermal Spray: Meeting the Challenges of the 21st Century, C. Coddet, Ed., May 25-29, 1998 (Nice, France), ASM International, 1998, 1693 p

12. J. Wigren and L. Pejryd, Thermal Barrier Coatings-Why, How, Where and Where to, Thermal Spray: Meeting the Challenges of the 21st Century, C. Coddet, Ed., May 25-29, 1998 (Nice, France), ASM International, 1998, 1693 p

13. K.C. Chang, W.J. Wei, and C. Chen, Oxidation Behavior of Thermal Barrier Coatings Modified by Laser Remelting, Surf. Coat. Technol., 1998, 102, p 197-204

14. P.-C. Tsai, J.-H. Lee, and C.-L. Chang, Improving the Erosion Resistance of Plasma-Sprayed Zirconia Thermal Barrier Coat-ings by Laser Glazing, Surf. Coat. Technol., 2007, 202, p 719-724

15. M. Prystay, P. Gougeon, and C. Moreau, Structure of Plasma-Sprayed Zirconia Coatings Tailored by Controlling the Temper-ature and Velocity of the Sprayed Particles, J. Therm. Spray Technol., 2001, 10, p 67-75

16. M. Friis, C. Persson, and J. Wigren, Influence of Particle In-Flight Characteristic on the Microstructure of Atmospheric Plasma Sprayed Yttria Stabilized ZrO2, Surf. Coat. Technol., 2001, 141, p 115-127

17. A. Kucuk, R.S. Lima, and C.C. Berndt, Influence of Plasma Spray Parameters on In-Flight Characteristics of ZrO2-8(wt.%)Y2O3 Ceramic Particles, J. Am. Ceram. Soc., 2001, 84, p 685-692

18. Kucuk, R.S. Lima, and C.C. Berndt, Influence of Plasma Spray Parameters on Formation and Morphology of ZrO2-8(wt.%)Y2O3 Ceramic Particles, J. Am. Ceram. Soc., 2001, 84, p 693-700

19. R. Suryanarayanan, Plasma Spraying: Theory and Applications, World Scientific Publishing, New York, 1993

20. R.B. Hiemann, Plasma-Spray Coating-Principles and Applica-tions, Wiley VCH Publishers Inc., New York, 1996

21. L. Pawlowski, The Science Engineering of Thermal Spray Coat-ings, 2nd ed., John Wiley & Sons Ltd, London, 2008

377-384

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

82.

Authors:

Mohini Gupta, Amit Kanungo

Paper Title:

Survey Detection and Prevention Scheme against Wormhole Attack in MANET

Abstract: In Mobile ad hoc network (MANET) various routing attacks for single-path routing have been proposed in previous work. These nodes communicate with each other by interchange of packets, which for those nodes not in wireless range goes hop by hop. Due to absence of a defined central authority, securing the routing process becomes a challenging task thereby leaving MANETs vulnerable to attacks, by that the deterioration in the performance characteristics as well as raises a serious question mark about the reliability of such networks. This last point is where the main problem for MANET security resides, the ad hoc networks can be reached very easily by users, but also by malicious attackers. If a malicious attacker reaches the network, the attacker can easily exploit or possibly even disable the mobile ad hoc network. In this paper we presents the overview of types of attacks and their solution to recognizes the effect of attacker and security schemes.

Keywords:
MANET, Routing, Attack, survey, Security scheme.


References:

1. Dow CR, Lin PJ, Chen SC, Lin JH, Hwang SF "A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad-hoc Networks", Paper presented at the IEEE 19th International Conference on Advanced Information. Networking and Applications, Tamkang University, Taiwan, 28-30 March 2005.
2. Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki "A NEW CLUSTER-BASED WORMHOLE INTRUSION DETECTION ALGORITHM FOR MOBILE AD-HOC NETWORKS" International Journal of Network Security & Its Applications (IJNSA), Vol 1, No 1, April 2009.

3. S. Choi, D. Kim, D. Lee, J. Jung. "WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks". In International Conference on Sensor Networks, Ubiquitous and Trustworthy Computing, pp. 343-348, 2008.

4. Shang-Ming Jen, Chi-Sung Laih, Wen-Chung Kuo. "A Hop-Count Analysis Scheme for Avoiding Wormhole Attacks in MANET", 9 (6), pp. 5022-5039, 2009.

5. D. Djenouri, O. Mahmoudi, D. Llewellyn-Jones, M. Merabti, "On Securing MANET Routing Protocol Against Control Packet Dropping". In IEEE International Conference on Pervasive Services, pp. 100-108, 2007.

6. F. Nait-Abdesselam, B. Bensaou, T. Taleb. "Detecting and Avoiding Wormhole Attacks in Wireless Ad hoc Networks", IEEE Communications Magazine, 46 (4), pp. 127 - 133, 2008.

7. H.S. Chiu and K. Lui. "DelPHI: Wormhole Detection Mechanism for Ad Hoc Wireless Networks". In Proceedings of International Symposium on Wireless Pervasive Computing, pp. 6-11, 2006.

8. T. Peng, C. Leckie and R. Kotagiri, "Survey of network-based defense mechanisms countering the DoS and DDoS problems", ACM Comput. Surv. 39, April 2007.

9. R. Sommer and V. Paxson, "Enhancing byte-level network intrusion detection signatures with context", CCS, 2003.

10. X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone and A. Lakhina, "Detection and identification of network anomalies using sketch subspaces", IMC, 2006.

11. H. Ringerg, A. Soule, J. Rexford and C. Diot, "Sensitivity of pc a for traffic anomaly detection", SIGMETRICS, 2007.

12. Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera and Sushil Jajodia, "Online Detection of Network Traffic Anomalies Using Behavioural Distance", IEEE IWQoS 2009, Charleston, July 2009.

13. Huaizhi Li; Singhal, M.;, "A Secure Routing Protocol for Wireless Ad Hoc Networks," System Sciences, 2006. HICSS '06. Proceedings of the 39th Annual Hawaii International Conference on , vol.9, no., pp. 225a, 04-07 Jan. 2006.

14. Razak, S.A., Furnell, S., Clarke, N. Brooke, P. Mehrotra, Sharad. Zeng, Daniel, Chen, Hsinchun. Thuraisingham, Bhavani. "A Two- Tier Intrusion Detection System for Mobile Ad Hoc Networks-A Friend Approach", Lecture Notes In Computer Science, volume 3975, pp. 590-595, 2006, Springer.

15. D. A. Maltz and D. B. Johnson and Y. Hu. The dynamic source routing protocol (DSR) for mobile ad hoc.

16. L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proceedings of the Network and Distributed System Security Symposium.

17. Rouba El Kaissi, Ayman Kayssi, Ali Chehab and Zaher Dawy,"Dawsen: a defense mechanism against wormhole attacks in wireless sensor networks", IN Second International Conference on Innovations in Information Technology (IIT'05).

18. Y. C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," in INFOCOM, 2003.

19. S. Capkun, L. Buttyn, and J. P. Hubaux, "SECTOR: Secure tracking of node encounters in multi-hop wireless networks," in 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), October 2003.

20. P. Albers, O. Camp, et al. "Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches". Proceedings of the 1st International Workshop on Wireless Information Systems (WIS-2002), pp. 1-12, April 2002.

21. O. Kachirski, R. Guha. "Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks." Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), IEEE, 2003

22. D. Sterne, P. Balasubramanyam, et al. "A General Cooperative Intrusion Detection Architecture for MANETs". In Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA'05), pp. 57-70, 2005.

23. B. Sun, K.Wu, and U. W. Pooch. "Alert Aggregation in Mobile Ad Hoc Networks". The 2003 ACM Workshop on Wireless Security in conjuction with the 9th Annual International Conference on Mobile Computing and Networking (MobiCom'03), pp. 69-78, 2003

385-390

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

83.

Authors:

Shanu Singh, Shikha Chandana, Amit Kumar Pandey

Paper Title:

Co-operative and Threshold Detection Method and Proposed Algorithm for Black Hole Attack

Abstract: To avail the prospective of wireless communication now days, the complete communication should be flexible and supportive to various architectures. Now a days various prospective has been proposed to achieve the flexibility and minimize the losses. Various routing protocols has been proposed in case of Mobile and ad-hoc networks. Various optimized link and nodes for routing is insisted in this paper. This paper comes with a complete comparative study of various routing protocol, security issue and physical layers . In this paper an approach has been proposed for Black Hole Removal using Threshold and Co-operative Method. Co-operative detection method has been also proposed to identify the proper step. Over all this paper contains a comparative routing protocol and study of various security issue physical layer and proposed algorithm for co-operative detection method of Black hole Attack.

Keywords:
Routing protocol, security issue, physical layers, co-operative detection.


References:

1. Michele Nogueira Lima, Aldri Luiz dos Santos and Guy Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks”, IEEE Communications Surveys and Tutorials COMSUR), Volume 11, Number 1, 2009, pp 1-3.
2. Nishu Garg and R.P Mahapatra, “MANET Security Issues”, International Journal of Computer Science and Network Security (IJCSNS), Volume 9, Number 8, 2009, pp. 241-246.

3. Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks - A Survey”, Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, 2006.

4. Kamanshis Biswas and Md. Liakat Ali, ”Security Threats in Mobile Ad Hoc Network”, Master Thesis Computer Science, Thesis no: MCS-2007:07, 22nd March, 2007.

5. Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala, “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, Volume 2, Number 3, 2008, pp 18-29.

6. Sheenu Sharma and Roopam Gupta,”Simulation study of Black Hole Attack in the Mobile Adhoc Network”, Journal of Engineering Science and Technology, Volume 4, Number 2, 2009, pp 243-250.

7. Hao yang, Haiyun Luo, Fan Ye, Songwu Lu and Lixia Zhang, “Secuirty in Mobile Ad hoc Networks: Challenges and Solutions”, IEEE Wireless Communications Journal, Volume 11, Number 1, 2004, pp 38-47.

8. Payal N. Raj and Prashant B. Swadas, “DPRAODV: A dynamic learning system against black hole attack in AODV based MANET”, International Journal of Computer Science Issues (IJCSI), Volume 2, Number 3, 2009, pp 54-59.

9. S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, “Prevention of cooperative black hole attack in wireless ad hoc networks,” International Conference (ICWN’03), Las Vegas, Nevada, USA, 2003, pp 570-575.

10. Mohammad Al-Shurman, Seong-Moo Yoon and Seungjin Park, “Black Hole Attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference , Proceedings of the 42nd annual Southeast regional conference, 2004, pp 96-97 .

11. Chang Wu Yu, Tung-Kuang, Wu, Rei Heng, Cheng and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks”, PAKDD 2007 International Workshop, May 2007, Nanjing, China, pp 538–549.

12. Hesiri Weerasinghe, “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Proceedings of the Future Generation Communication and Networking, Volume 2, 2007, pp 362-367.

13. Mehdi Medadian, M.H. Yektaie and A.M Rahmani, “Combat with Black Hole Attack in AODV routing protocol in MANET”, First Asian Himalayas International Conference on Internet (AH-ICI2009), 3-5th Nov, 2009.

14. Bo Sun Yong, Guan Jian Chen and Udo W. Pooch, “Detecting Black-hole Attack in Mobile Ad Hoc Networks”, The Institution of Electrical Engineers (IEE),Volume 5, Number 6, 2003, pp 490-495.

15. Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini Marko Jahnke and Jens Tolle, “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, 32nd IEEE Conference on Local Computer Networks, 15-18th Oct 2007, Dublin, pp 1043-1050.

16. Gao Xiaopeng and Chen Wei, “A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks”, IFIP International Conference on Network and Parallel Computing – Workshops, 18-21 Sep 2007, Dalian, China, pp 209-214.

17. Ming Yu, Mengchu Zhou and Wei Su, “A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments”, IEEE Transactions on Vehicular Technology, Volume 58, Number 1, pp 449-460, 2009.

18. K. Lakshmi et al. “Modified AODV Protocol Against Blackhole Attacks in MANET” International Journal of Engineering and Technology Vol.2 (6), 2010, 444-449.

19. Mohammad Al-Shurman and Seong-Moo Yoo “Blackhole Attack in mobile ad-hoc networks” Electrical and Computer Engineering Department The University of Alabama in Huntsville Huntsville, Alabama 35899.

391-395

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

84.

Authors:

Monica P. Chanchlani, Madhuri Khambete

Paper Title:

A Novel Speed-up Feature Matching Algorithm for Image Registration using SUSAN and RANSAC

Abstract: A novel feature matching algorithm for image registration is proposed in this paper. The accuracy of a registration process is highly dependent on the feature detection and matching. In this paper, we use a SUSAN (Smallest Univalue Segment Assimilating Nucleus) algorithm to detect features, which is one of the most excellent methods, robust to noise and less affected by rotation. One common approach used for feature matching is correlation between feature points. But in this method much computational time is required to establish the correspondences. In this paper, we overcome this difficulty through our speed-up approach. The basic concept of our approach is to calculate the descriptor values for every feature point which are then stored. These values will finally be used for feature matching. This reduces the number of operations in feature matching step and thus speed-up in matching is obtained. After matching, RANSAC method is used to find the registration transform parameters.

Keywords:
Image Registration, SUSAN, Feature Matching, Computation Time, RANSAC.


References:

1. S. M. Smith and J. M. Brady, “SUSAN-A New Approach to Low Level Image Processing,” in Computer Vision, vol. 23, 1997, pp. 45–78.
2. Jie Zhao et al., “A new corner detection algorithm with SUSAN fast hierarchical method,” in IEEE Int. Asia Symposium on Intelligent Interaction and Affective Computing, 2009, pp.112-115.

3. Yang Xingfang et al, “An improved SUSAN corner detection algorithm based on adaptive threshold,” in IEEE 2nd Int. Conf. on Signal Processing Systems (ICSPS), vol. 2, 2010, pp.613-616.

4. David G. Lowe, “Distinctive image features from scale-invariant keypoints,” in International Journal of Computer Vision, vol. 60, 2004, pp. 91-110.

5. David G. Lowe, “Object Recognition from Local Scale Invariant features,” in Proc. Conf. Computer Vision, vol. 2, 1999, pp.1150-1157.

6. Gang Hong and Yun Zhang, “Combination of feature-based and area-based image registration technique for high resolution remote sensing image,” in Geoscience and Remote Sensing Symposium, Barcelona, 2007, pp. 377-380.

7. Harris C.G and Stephens M.J., “A combined corner and edge detector,” in Proceedings Fourth Alvey Vision Conference, Manchester, U.K., 1988, pp.147-151.

8. Zitova B and Flusser J, “Image registration methods: A survey,” in Journal of Image and Vision ELSEVIER, vol. 21, 2003, pp. 977-1000.

9. Fischler, M.A., Bolles, R.C, “Random sample consensus: A paradigm for model fitting with applications to image analysis and automated cartography,” in Communication of ACM 24, 1981, pp.381–395.

10. B. Rezaie and M.D. Srinath, “Algorithms for Fast Image Registration,” in IEEE Trans. Aerosp. Electron. Syst., vol. AES-20, no. 6, Nov. 1984, pp.716-728.

11. Haifeng Liu et al., “An Improved Best Bin First Algorithm for Fast Image Registration,” in IEEE Int. Conf. on Electron. & Mech. Eng. and Inform. Technol., 2011, pp. 355-358.

12. Chaminda Namal Senarathne et al., “A Faster Image Registration and Stitching Algorithm,” in IEEE 6th Int. Conf. on Ind. and Inform. Syst., Sri Lanka, Aug. 2011, pp. 66-69.

13. Jinbo LU and Bin HE, “A New Accurate and Fast Algorithm of Sub-Pixel Image Registration,” in IEEE Proc. of ICSP, 2011, pp. 1008-1012.

396-399

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

85.

Authors:

Sajith A.G, Hariharan.S

Paper Title:

A Fast Level Set Algorithm for Liver Tumor Segmentation

Abstract: Accurate and fast image segmentation algorithm is of paramount importance for a wide range of medical imaging applications. The most widely used image segmentation algorithms are region based and typically rely on the homogeneity of the image intensities in the regions of interest, which often fail to provide accurate segmentation results due to the gradient function gives very small values at the boundary and makes the speed of the moving contour low and the gradient based term can never stop the level set evolution completely even for ideal edges, making leakage often inevitable. In this paper a fast narrow band distance preserving level set evolution algorithm is used for liver tumor segmentation. Experimental result for CT images shows desirable performances of the method.

Keywords:
Level set, FCM.


References:

1. R. Malladi, J. Sethian, B. Vemuri, "Shape modeling with front propagation: A level set approach, IEEE Trans. On PMI, Vo1.17, N0.2, 1995.
2. J. A. Sethian, "Level Set Methods and Fast Matching Methods", Cambridge, U.K.: Cambridge Univ. Press, 1999.

3. A pde-based fast local level set method. Journal of Computational Physics 155, 1999.

4. Stanley Osher and Ronald Fedkiw, Level Set Methods mid Dynamic implicit Surfaces, Springer-Verlag. New York,2002.

5. S. Osher and R. Fedkiw, Level Set Methods and Dynamic Implicit Surfaces, Springer-Verlag, New York, 2002.

6. S. Osher and N. Paragios, Geometric Level Set Methods in Imaging, Vision and Graphics, Springer, 2003.

7. Chunming Li, Chenyang Xu, Changfeng Gui, and Martin D. Fox, "Level Set Evolution Without Reinitialization:A New Variational Formulation", IEEE International Conference on Computer Vision and Pattern Recognition (CVPR), pp. 430-436, San Diego, 2005.

8. Li-jun Zhang Xiao-juan Wu Zan Sheng , " A fast image segmentation approach based on level set method", the 8th International Conference on Signal Processing, School of Information Science and Engineering, Shandong University, 2006

9. Chunming Li ; Chenyang Xu ; Konwar, K.M. ; Fox, M.D." Fast Distance Preserving Level Set Evolution for Medical Image Segmentation ",the 9th International Conference on Control, Automation, Robotics and Vision, .( ICARCV ),pp.1-7, 2006.

10. Qian Li "Research on segmentation of brain tumor based on active contour model," MS Thesis. Huazhong University of Science andTechnology, Wuhan, China, 2007.

11. Ross T. Whitaker Sean Mauch Ken Museth, David E. Breen and David Johnson. Algorithms for interactive editing of level set models.

12. Sariyanni C, Asvestas P, Matsopoulos G K, Nikita K.S, Nikita A.S, Kelekis D, "A fractal analysis of CT liver images for the discrimination of hepatic lesions:A comparative study", IEEE: Proceedings of the 23rd Annual International Conference on Engineering in Medicine and Biology Society,1557 - 1560,2001.

13. Yugang Liu, Yizhou Yu,"Interactive Image Segmentation Based on Level sets of Probabilities" IEEE: Transactions on Visualization and Computer Graphics,2012 Vol.18, No 2;202-213.

14. Bing Nan Li, Chee Kong Chui, Stephen Chang, Sim Heng Ong,"A new unified level set method for semi-automatic liver tumor segmentation on contrast-enhanced CT images" Expert Systems with applications.2012;39:9661-9668.

15. Carlos Nicolau, Ramon Vilana, Violeta Catala, Luis Bianchi, Rosa Gilabert, Angeles Garcia, Concepcio Bru,"Importance of Evaluating All Vascular Phases on Contrast Enhanced Sonography in the Differentiation of Benign from Malignant Focal Liver Lesions",AJR 2006;186:158-167.

16. Bezdek, J.C.: Pattern Recognition with Fuzzy Objective Function Algorithms. New York: Plenum Press, 1981.

400-404

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

86.

Authors:

B. Nath, S. Roy

Paper Title:

Some Classes of Fuzzy I – Convergent Difference Double Sequence Spaces Associated With Multiplier Sequences

Abstract: In this article we introduce some new classes of fuzzy real-valued difference double sequence spaces associated with a multiplier sequence. We introduce double sequence spaces and where a multiplier sequence of non-zero real numbers is and is a double sequence of bounded strictly positive numbers. We also make an effort to study some algebraic and topological properties of these sequence spaces Also we characterize the multiplier problem and obtain some inclusion relation involving these classes of sequences.

Keywords:
Multiplier sequence, I–convergent, Ddifference sequence spaces, Solid space, Sequence algebra, Convergence free etc.


References:

1. G. A. Anastassiou, Fuzzy approximation by fuzzy convolution type Operators, Comput.Math. Appl., 48, 2004, pp.1369-1386.
2. L. C. Barrorss, R. C. Bassanezi and P. A. Tonelli, Fuzzy modeling in population dynamics, Ecol. Model., 128, 2000, pp. 27-33.

3. M. Basarir and O. Solancan, On some double sequence spaces, J. Indian Acad. Math., 21(2), 1999, pp. 193-200.

4. T.J. I. Bromwich, “An Introduction to the Theory of Infinite Series”, Macmillan & Co.Lt., 1965, New York.

5. M. Burgin, Neoclassical analysis, fuzzy continuity and convergence; Fuzzy Sets and Systems, 75, 1995, 291-299.

6. M. Burgin, Theory of fuzzy limits, Fuzzy Sets and Systems, 115, 2000, pp. 433-443.

7. M. A. Erceg, Metric spaces in fuzzy set theory; Math. Anal. Appl., 69, 1979, pp. 205-230.

8. M. Et and R. Colak, On some generalized difference sequence spaces; Soochow J. of Math. 21, 1995, pp. 337
386.

9. A. L. Fradkow and R. J. Evans, Control of chaos, Methods and applications in engineering, Chaos, Solution & Fractals, 29 , 2005, pp. 33-56.

10. R. A. Giles, Computer program for fuzzy reasoning; Fuzzy Sets and Systems, 1980, pp. 221-234.

11. G. Goes and S. Goes, Sequences of bounded variation and sequences of Fourier Coefficients. Math. Zeift.118, 1970, pp. 93
102.

12. G. H. Hardy, On the convergence of certain multiple series, Proc. Camb. Phil. Soc., 19, 1917, pp. 86-95.
13. L. Hong and J. Q. Sun, Bifurcations of fuzzy nonlinear dynamical systems, Commun. Nonlinear Sci. Numer. Simul., 2006, pp. 1-12.
14. G. Jager, Fuzzy uniform convergence and equicontinuity, Fuzzy Sets and Systems, 109, 2000, pp. 87-98. P.K.Kamthan and M. Gupta, Sequence Spaces and Series. Marcel Dekker, 1980.
15. H. Kizmaz, On certain sequence spaces, Canad. Math. Bull., 24 (2), 1981, pp. 169-176.

16. Kostyrko,P. Šalát & Wilczyński, I-convergence, Real Analysis Exchange, 26(2), 2001, pp. 669–686.

17. J. Madore, Fuzzy physics, Ann. Physics, Ann. Phys., 219, 1992, pp. 187-198.

18. F. Moričz, Extension of spaces c and from single to double sequences, Acta. Math. Hung., 57(1-2), 1991, pp. 129-136.

19. K. Peeva, Fuzzy linear systems, Fuzzy Sets and Systems, 49, 1992, pp. 339-355.

20. T. Šalát, B. C. Tripathy and M. Ziman, On some properties of I-convergence, Tatra Mt. Math. Publ., 28, 2004, pp. 279-286.

21. M. Sen and S. Roy, On Paranormed type Fuzzy real valued I-convergent double sequences, Far East Journal of Mathematical Sciences (FJMS), 53(1), 2011, pp. 1-16.

22. M. Sen and S. Roy, On Paranormed type Fuzzy real -valued I-convergent double Multiplier Sequences, Kuwait Journal of Science and Engineering, 2011( to be published ).

23. B. C. Tripathy, On generalized difference paranormed statistically convergent sequences, Indian Jour. Pure Appl. Math. 35(5), 2004, pp. 655- 663.

24. B. C. Tripathy, On some classes of difference paranormed sequence spaces associated with multiplier sequences, International Jour. Math. Sci. 2(1), 2003, pp. 159–166.

25. B.C. Tripathy, and A.J. Dutta, Bounded variation double sequence space of fuzzy real numbers, Computers & Mathematics with Applications, (2), 2010, pp. 1031-1037.

26. B. C. Tripathy and B. Hazarika, Paranormed I-convergent sequences spaces, Math. Slovaca, 59(4), 2009, pp. 485-494.

27. B.C. Tripathy, and B. Sarma, Statistically convergent difference double sequence spaces, Acta Mathematica Sinica, 24(5), 2008, pp. 737-742.

28. B. C. Tripathy, B.C. and M. Sen, Vector valued paranormed bounded and null sequences associated with multiplier sequences, Soochow Jour. Math. 29(3), 2003, pp. 313–325.

29. B. C. Tripathy and M. Sen, On fuzzy real-valued I-convergent Sequences, Journal of Fuzzy Mathematics, 16(1) , 2008, pp. 91-99.

30. B. K. Tripathy and B. C. Tripathy, On I convergence of double sequences, Soochow Journal of Mathematics, 31(4) , 2005, pp. 549-560.

31. L. A. Zadeh, Fuzzy sets, Information and Control. 8(3), 1965, pp. 338-353.

405-409

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

87.

Authors:

Sushma K S, Vinay Kumar V

Paper Title:

Dynamic Resource Allocation for Efficient Parallel Data Processing Using RMI Protocol

Abstract: In recent years ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IaaS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data processing in their product portfolio, making it easy for customers to access these services and to deploy their programs. the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this paper we discuss the opportunities and challenges for efficient parallel data processing in clouds and present our research project Nephele. Nephele is the first data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IaaS clouds for both, task scheduling and execution. In this paper we discuss the opportunities and challenges for efficient parallel data processing Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution. Based on this new framework, we perform extended evaluations of MapReduce-inspired processing jobs on an IaaS cloud system and compare the results to the popular data processing framework Hadoop.

Keywords:
Many-Task Computing, High-Throughput Computing, Loosely Coupled Applications, Cloud Computing.


References:

1. Amazon Web Services LLC. Amazon Elastic Compute Cloud (Amazon EC2). http://aws.amazon.com/ec2/, 2009.
2. Amazon Web Services LLC. Amazon Elastic MapReduce. http://aws.amazon.com/elasticmapreduce/ , 2009.

3. AmazonWeb Services LLC. Amazon Simple Storage Service. http://aws.amazon.com/s3/ , 2009.

4. M. Coates, R. Castro, R. Nowak, M. Gadhiok, R. King, and Y. Tsang. Maximum Likelihood Network Topology Identification from Edge-Based Unicast Measurements. SIGMETRICS Perform. Eval. Rev., 30(1):11–20, 2002.

5. R. Davoli. VDE: Virtual Distributed Ethernet. Testbeds and Research Infrastructures for the Development of Networks & Communities, International Conference on, 0:213–220, 2005.

6. J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI’04: Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation, pages 10–10, Berkeley, CA, USA, 2004. USENIX Association.

7. i. Raicu, I. Foster, and Y. Zhao. Many-Task Computing for Grids and Super computers. In Many-Task Computing on Grids and Supercomputers, 2008. MTAGS 2008. Workshop on, pages 1–11, Nov.2008.

8. M. Stillger, G. M. Lohman, V. Markl, and M.Kandil. LEO-DB2’s LEarning Optimizer. In VLDB ’01: Proceedings of the 27th International Conference on Very Large Data Bases, pages 19–28, San Francisco, CA, USA, 2001. Morgan Kaufmann Publishers Inc.

9. D. Warneke and O. Kao. Nephele: Efficient Parallel Data Processing in the Cloud. In MTAGS ’09: Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers, pages 1–10, New York, NY, USA, 2009. ACM.

10. T. White. Hadoop: The Definitive Guide. O’Reilly Media, 2009.

410-413

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

88.

Authors:

Gupta, P., Purohit, G. N., Dadhich, A.

Paper Title:

Crime Prevention through Alternate Route Finding In Traffic Surveillance Using CCTV Cameras

Abstract: Road Traffic Network Surveillance through CCTV Cameras finds its applications in various issues of social and administrative importance including Crime Prevention. Crimes associated with theft, kidnapping and missing cases demand tracking of paths of a suspect vehicle, which that vehicle might have followed. Since it is difficult to place CCTV Cameras at each and every traffic intersection point, information collected from CCTV Cameras placed at some important junctions can be exploited to generate the required paths. Algorithm for finding the routes of the suspect vehicle in given road traffic network with certain active intersection points, which are under CCTV surveillance, has been suggested. Simulation of the algorithm has been conducted in SUMO and results in the form of alternate paths between two given intersection points, where the target vehicle has been tracked through CCTV Cameras are presented.

Keywords:
Alternate Routes, CCTV Camera, Crime Prevention, Python, Simulation, Urban Mobility, Traffic Surveillance.


References:

1. Gibbens R.J, Saatci Y. Data Modelling and Inference in Road Traffic Networks. http://mlg.eng.cam.ac.uk/yunus/ra-paper.pdf
2. Halaoui H.F. Intelligent Traffic System: Road Traffic Networks with Time-Weighted Graphs. International Journal on Infonomics. Volume 3, Issue 4, December 2010.

3. Bader R., Dees J., Geisberger R., Sanders P. Alternative Route Graphs in Road Networks.

4.
Papageorgiou, M. Review of Road Traffic Control Stratagies. Proceedings of IEEE. Volume 91, Issue 12. Page Number 2043-2067.
5. Jain Vipin, Sharma Ashlesh, Lakshminarayanan (2012). Road traffic congestion in developing the world .ACM 978-1-4503-1262-2/12/03.

6. Dailey Daniel J., Cathey Frederick W., Pumrin Suree(2001). The use of uncalibrated roadside CCTV camers to estimate mean traffic speed.

7. Ozkurt Celil, Camci Fatih, (2009) Automatic Traffic density Estimation and Vehicle Classification for Traffic Surveillance Systems using Neural Network. Mathematics and Computational Applications, Vol 14, No3, pp 187-196,2009.

8. E. Atkoˇci ¯unas, R. Blake, A. Juozapaviˇcius, M. Kazimianec (2005) Image Processing in Road Traffic Analysis. www.lana.lt/journal/19/Atkociunas.pdf‎.

9. Choudekar Pallavi, Banarjee Sayanti, Muju M.K. Real Time Traffic Control Using Image Processing. Indian Journal of Computer Science and Engineering.
http://www.researchgate.net/publication/50417981_REAL_TIME_TRAFFIC_LIGHT_CONTROL_USING_IMAGE_PROCESSING.
10. LeBlanc Larry J., Edward Morlok K., Pierskalla William P.; An efficient approach to solving the road network equilibrium traffic assignment problem. Volume 9, Issue 5 October 1975, Pages 309-318.

11. Dell’olmo P., Mirchandani P. B.; REALBAND: an approach for real time coordination of traffic flows on networks. Transportation Research Board TRB. Annual meeting (1995), pp 106-116. ISSN- 0361-1981.

414-418

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

89.

Authors:

Abhinav Sharma, Saleem Khan, Shavet Sharma, Parveen Lehana

Paper Title:

Effect of Impedance Load on the Power Factor of Microcontroller Based Power System

Abstract: Power system designs require considering various parameters effecting power factor. The research work is carried out to study and analyze the effect of impedance with varying inductance on the power factor of designed system. Eight different values of the inductance are taken from 269.1 mH to 1232.0 mH with capacitance of 50 µF and resistance 124 Ω. From the analysis it is observed that the current through the load is inversely proportional to the values of inductance and similar is the case for power factor. The minimum and maximum values of power factor obtained are 0.358 and 0.987 respectively.

Keywords:
Active Power, impedance, power factor.


References:

1. J.G. John and J.R. Stevenson, “Power system analysis,” McGraw-hill Book Company, New York, 1994.
2. S.N. Patel, M.P. Rathod, K.C. Patel, P.H. Panchal and J.N. Prajapati, “Thyristorised Real Time Power Factor Correction,” Int. J. of engg. Research & technology (IJERT), Vol. 2, Issue 3, March 2013, pp.1-5.

3. P. Trivedi, T. Singh and D.V. Avasthi, ‘‘Development of power factor controller using pic microcontroller,” Int. J. of Emerging trends in Eng. and Develop. , Vol.6, Issue 2, September 2012, pp.531-538.

4. K.R. Govindan, “Power Factor Improvement,” Kavoori Consultants, 2002.

5. Mandeep Singh & Jatin Gupta, “Power Factor Improvement in a Textile Plant: An Analysis,” Int. J. of Electronics Engineering, Vol.3, No. 2, 2011, pp. 201–202.

6. Neena Malhotra and Shivani sehgal, “Power Factor Improvement in a Sugar Mill: An Analysis,” Int. J. of Soft Computing and Engineering (IJSCE), Vol.2, Issue 4, September 2012, pp.71-73.

7. V.K. Mehta and Rohit Mehta, “principle of electrical machines,” S. Chand and company ltd., 2005, pp. 313-377
8. S. Rao, “EHV-AC, HVDC Transmission & Distribution Engineering,” Khanna Publishers, 2011, pp. 1157-1205.

9. V.k. jain and Amitabh bajaj, “A textbook of design of electrical installations,” Laxmi publications ltd., 2004, pp.308-316.

10. P.V. Prasuna, J.V.G. Rama Rao and Ch. M. Lakshmi, ‘‘Improvement in power factor & THD using dual boost converter,” Int. J. of Eng. Research and Applicat. (IJERA), Vol.2, No.4, July-August 2012, pp.2368-2376.

11. Akagi Hirofumi. Active Filters for Power Conditioning. In Timothy L. Skvarenina, “The Power Electronics Handbook: Industrial Electronics Series,” United State of America, CRC Press., 2002, Chap. 17, pp.30-63.

12. Jianrong Qin and Jiacun Wang, “An online energy evaluation system for manufacturing plants,” Int. J. Of Intelligent Control and Systems, Vol. 17, No. 3, September 2012, pp.86-93.

13. M. Ravindran and V. Kirubakaran, “Electrical energy conservation in automatic power factor correction by embedded system,” Energy and Power, Vol. 2, No. 4, 2012, pp. 51-54, http://journal.sapub.org/ep.

14. S. Hasan saeed and D. K. Sharma, “Non-Conventional energy resources,” Katson publications, New Delhi, 2006-07.

15. Y.Y. Hong, Y.T. Chen and Y.L. Hsu, “Three-phase active power line conditioner planning,” IEEE Proc. Generation, Transmission and Distribution , Vol. 145, No. 3, May 1998, pp.281-287.

16. A.R. Prasad, P.D. Iogas and S. Manias, “A novel passive wave shaping method for single-phase diode rectifiers,” IEEE transactions on industrial electronics, Vol. 37, No. 6, pp. 521-529, 1990.

17. Piyush Sharma and Tripti Saha, “Performance analysis of uncontrolled ac/dc converter using different types of passive filter,” 2nd Int. Conference on Emerging Trends in Engineering & Technology, College of Engineering, Teerthanker Mahaveer University, April 12, 13, 2013,pp.1-6.

18. Steven W. Blume, “Electric Power System Basics,” Wiley-Interscience A John Wiley & Sons, Inc., Publication, IEEE Press,2007.

19. G.D. Rai, “Non-Conventional energy sources,” Kanna publications, New Delhi, 2006.

20. Cathleen Shamieh and Gordon McComb, “Electronics for Dummies,”2nd edition, Wiley publishing, Inc., 2009, pp.91-105.

21. U.A. Bakshi and A. V. Bakshi, “Electric Circuit Analysis,”1st edition, Technical publications pune,2008,chapter 3, pp.1-74.

419-422

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

90.

Authors:

Jyoti Lalotra, Saleem Khan, Shavet Sharma, Parveen Lehana

Paper Title:

Investigation of the Effect of Inductive Load on Harmonic Distortion of IGBT based Power System

Abstract: Research work carried out to investigate the effect of loads (combination of resistive, capacitive, and inductive) on the IGBT based power system. Total harmonic distortion in the input and output is calculated. Eight different combinations of the load are taken with different values of inductance keeping resistance and capacitance constant. Input and output voltages were recorded for all combinations using Gold wave software having duration of 1 sec with sampling rate of 16,000. A computer algorithm is designed to calculate total harmonic distortion in the input and output of the system. The designed microcontroller and IGBT based power system shows reduction in the distortion at the output.

Keywords:
Power system, harmonics, Total harmonic distortion.


References:

1. N.N. Barsoum and F.T.C. Png, “High quality ac power with Triac inverter,” in CD proc. of Australia universities in power and energy conference AUPEC Melbourne, Australia, Dec.2006, pp. 10-13.
2. S. Jain, T.S.Singh and S.P. Phulambrikar, “Improve power quality and reduce the harmonics distortion of sensitive load,” International journal. Of Engineering Research and Application (IJERA), Vol. 2, Issue 6, Nov. and Dec. 2012, pp. 806-815.

3. N. Mohan, T.M. Undeland and W.P. Robbins. Power electronics, converters, applications and design, Third Edition, Ed New York, John Wiley & Sons Inc., 2003.

4. C. Reitsma, Student Member, “An introduction to Inverters and Applications”.

5. Toshiba Field Effect Transistor Silicon N Channel MOST Type 2SK2232, 1998, Toshiba Semiconductor, [Online], Retrieved: August 12, 2005.

6. Nasser’s, 2004, MOSFETs vs. IGBTs: Which is Brtter? , Retrieved: September 10, 2005.

7. Francisco C. De La Rosa, “Harmonics and power systems,” Taylor & Francis Group, CRC Press 2006, pp.1-184.

8. Mukhtiar Ahmed Mahar, Muhammad Aslam Uqaili and Abdul Sattar Larik,“ Harmonic analysis of ac-dc topologies and their impacts on power systems”, Mehran University Research Journal Of Engineering & Technology, Vol. 30, No. 1, January, 2011,pp-173-178.

9. Total Harmonic Distortion and Effects in Electrical Power Systems “Associated Power Technologies”. 05 April 2011,

10. L.M. Tolbert, H.D. Hollis and P.S. Hale, Jr. , “ Survey of harmonics measurements in electrical distribution system”, IEEE IAS Annual Meeting , Oct.6-10, 1996, San Diego, CA,pp.2333-2339

11. Buckley, A. J. and Duncan, M. GENERAL APPLICATION NOTE Harmonics Guide General Application Note DDLM014 Rev A Copyright © 2007 Drive Dynamics Limited.

12. QIU Tang, Yaonan Wang and Siyu Guo, “Design of power system harmonic measurement system based on Lab view,” Fourth international conference on national computation, IEEE Computer society, 2008, pp.489-493.

13. Analysis and control of power system oscillation CIGRE, technical report 38.01.2007, Dec 1996.

14. Valery Knyazkin, Claudio Canizares and lennart Soder , “ On the parameter estimation and modeling of aggerate power system loads,” applied to IEEE transaction on power system, 2003, pp.1-9.

15. K. Tomiyama, S. Ueoka, T. Takano, I. Iyoda and K. Matsuno, “Modeling of load during and after system faults based on actual field data,” pp.1-7.

16. C.taylor, “power system voltage stability, ser. Power system engineering,” Mc Graw-hill, INC., 1994.

17. Dhill, “Non linear dynamic load model with recovery for voltage stability studies,” IEEE transaction on power system, Vol.8, No.1, Feb 1993, pp.166-176.

18. IEEE Task Force Report, “Loads representation for dynamic performance analysis of power system,” IEEE transaction on power system, Vol. 8, No.2, May 1993, pp.472-482.

19. “Bilobiography on load model for power slow and dynamic performance simulation,” IEEE transaction on power system, Vol.10, No.1, Feb. 1995, pp.523-538.

20. Y. Makarov, V. Maslennikov and D.Hill, “revealing loads having the biggest influence on power system small disturbance stability,” IEEE transactions on power systems, Vol.11, No.4, Nov 19996, pp.2018-2023.

423-426

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

91.

Authors:

L.Maria Irudaya Raj, Sathishkumar.J, B.Kumaragurubaran, P.Gopal

Paper Title:

Analysis of Hard Chromium Coating Defects and its Prevention Methods

Abstract: This paper mainly deals with various Chromium coating defects that occur while electro plating of different mechanical components and methodology adopted to prevent it. It also covers suggestions to minimize this problem. This paper contains new suggestions to minimize the problems by using recent technological developments. Since the chemicals used for chromium coating are posing threat to environment it is need of the hour to minimise the use such chemical consumption. The reduction in defective components will increase productivity as well as protect the environment to some extent It also describes the various alternate coating methods for chromium coating through which we can achieve the required surface properties. India being a Developing country .for various coating application chromium is used. Since the process is slow and involves lengthy cycle time unless the defects are minimized the products cannot be delivered in time which will create loss to the Industries. Being the cheaper & simple technological process it is being used for coating applications. Disposal of effluents generated by this chromium coating process has to be taken care of by the Industries which are using the process. By using the chromium along with other materials, defects can be minimized as well as better surface properties can be obtained. This paper describes the techniques and gives details of chromium coating applications in various Industries.

Keywords:
Chromium Coating, Defects, Prevention methods, Surface treatment..


References:

1. J. David Greenwood Hard Chromium Plating – A Handbook of modern practice, 2nd Edition, Robert Draper Ltd, 1971.
2. H. Royle Toxicity of chromic acid in the chromium plating industry (2)‖, Environmental Research, vol. 10, pp. 141-163, 1975.

3. T. Norseth The carcinogenicity of chromium‖, Environmental Health Perspectives, vol. 40, pp. 121-130, 1981.

4. S.D. Flora et al Genotoxicity of chromium compounds – a review‖, Mutation Research/Reviews in Genetic Toxicology, vol. 338, pp. 99-172, 1990. .,

5. F.W. Sunderman A review of the carcinogenicities of nickel, chromium and arsenic compounds in man and animals, Preventive Medicine, vol. 5, pp. 279-294,
1974.

6. M. Bielewski., Replacing cadmium and chromium, Institute for Aero Research, 2009. ―Progress in developing electrodeposition for substitute hard chromium, New Technology and New Process, 2009.

7. W. Xiaohe et al

8. X. Wenying et al.,

9. E.W. Brooman, ―Formation and Performance of Ni-W amorphous alloy deposit‖, Journal of Electroplating and Finishing, vol. 15, pp. 18-24, 1996.

10. Z. Wanqiu,―High temperature oxidation resistance of Ni-W coatings electroplated on steel, Journal of Nanostructured Materials, vol. 10, pp. 1285-1288, 1998

11. B. Muller et al, ―Formation of ductile - amorphous and nanocrystalline Ni-W alloys by electrodeposition, Journal of Plating and Surface Finishing, vol. 87, pp. 148-152, 2000.

12. T. Yamasaki et al

13. W.U. Gang et al.,

14. N.E. Fenineche et al.,

15. Z.L. Qun et al., ―Investigation on electrodeposit technology of Ni-W-P amorphous alloy‖, Journal of Physics, pp. 19-23, 1999.

16. H.J. Yun et al.,

17. H.E. Fengjiao et al., ―Friction and wear behavior of electrodeposited amorphous Fe-Co-W alloy deposits‖, The Transcations of Nonferrous Metals Society of China, vol. 14, pp. 901-906, 2004

18. M. Srivastava et al., ―Structure and properties of electrodeposited Ni-Co-YZA composite coatings, Journal of Applied Electrochemistry, vol. 38, pp. 669-677, 2008.

427-432

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

92.

Authors:

Megha Parolekar,V.G.Bhongade, S.Dutt

Paper Title:

Voltage Profile Improvement and Power Loss Reduction in Different Power Bus Systems Using TCSC

Abstract: With the restructuring of power market, the voltage stability has become a major concern .FACTS devices adaptive to voltage-magnitude controlas well as can regulate the active and reactive powersimultaneously because of their flexibility and fast controlcharacteristics. This paper focused on the mathematical modeling of Flexible Alternating Current Transmission Systems (FACTS) -devices in optimal power flow analysis. A Thyristor Controlled Series Capacitors (TCSC) mathematical models have been established,and the Optimal Power Flow (OPF) with these FACTS-devices is solved by Newtons method. This article employs MATLAB Simulation, the development of OPF and the suitability of Newton-based algorithms for solving OPF-TCSC problem is done. The concept was tested and validated with TCSC in 5-bus,14-bus and 30-bus test system. Optimal Power Flow problem has been explored and tested with and without compensating device. The results show that in large-scale system, where the number of constraints is very large, the Thyristor-Controlled Series Capacitor is effective for controlling the specified amount of active and reactive power in between two buses as well improves voltage profile which improves system security . Placement of these devices in suitable locationcan lead to control in line flow and maintain bus voltages indesired level .

Keywords:
Net active and reactive power loss Optimal power flow, Optimal location,TCSC device,Voltage magnitude.


References:

1. HadiSaddat, "Power System Analysis (MATLAB concept)", Tata McGraw-Hill, Edition, 2002
2. Muhammad H. Rashid, "Power Electronics (concept of Flexible AC Transmission Systems)", Pearson Education-3rd Edition, 2004

3. Narain G. Hingoriani/Laszlo Gyugyi, "Understanding FACTS", IEE press, 1st Indian Edition, 2001

4. IJ Nagrath / DP Kothari, "Powr System Engineering (concept of series and shunt compensation)", Tata McGraw-Hill, 2003

5. C. L. Wadhwa, "Electrical Power systems (compensation in power system)", New Age International, 3rd Edition, 2004.

6. P. Moore and P. Ashmole, "Flexible ac transmission systems : part 4-advanced FACTS controller," Power Engineering Journal, April 1998, pp.95-100.

7. E Acha/VG Agelidis / THE Miller, "Power Electronic Control in Electrical Systems", Newnes Power Engineering Series, 1st Indian Edition, 2006.

8. Fuerte-Esquivel, C.R.; Acha, E.; Ambriz-Perez, H.: "A thyristor controlled series compensator model for the power flow solution of practical power networks", power systems, IEEE transactions on Power Delivery, Volume 15, Issue 1, Feb. 2000 Page (s) : 58 - 64

9. Gama, C.; Tenorio, R.; "Improvements for power systems performance: modeling, analysis and benefits of TCSCs", Power Engineering Society Winter Meeting, 2000. IEEE Volume 2, 23-27 Jan. 2000 Page(s): 1462-1467 vol. 2.

10. J.G. Singh, S.N. Singh, S.C. Srivastava, "Placement of FACTS Controllers for Enhancing Power System Loadability," inProc.of the IEEE Power India Conference, 2006, pp. 10-17.

11. S.N. Sing, A.K. David, "A New Approach for Placement of FACTS Devices in Open Power Markets," IEEE PowerEngineering Review, 2001, Vol. 21, No.9, pp. 58-60.

12. S. Gerbex, R. Cherkaoui, A.J. Germond, "Optimal Location of FACTS Devices to Enhance Power System Security", in Proc. of the IEEE Power Tech onference,2003, Bologna, Vol. 3, pp. 1-7.

13. N.G. Hingurani, L. Gyugyi, Understanding FACTS:Concepts and Technology of Flexible AC TransmissionSystems, IEEE Press, New York, 2000.

14. M. Noroozian, L. Angquist, M. Ghandhari, G. Anderson,"Improv-ing Power System Dynamics by SeriesconnectedFACTS De- vices," IEEE Trans. on Power Delivery, Vol. 12, No.4, October 1997.

15. J.A. Momoh, J. Zhu, G.D. Boswell, S. Hoffman, "PowerSystem Security Enhancement by OPF with PhaseShifter," IEEE Trans. on Power Systems, Vol. 16, No.2,May 2001.

16. Sung-Hwan, L. Jung-Uk, M. Seung-Il, "FACTSOperation Scheme for Enhancement of Power SystemSecurity," in Proc of IEEE Power Tech Conference,Bologna, 2003, Vol. 3, pp. 36-41.

433-438

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

93.

Authors:

L. Sreenivasulu Reddy, T. Mahesh Kumar, C. Jaya Subba Reddy

Paper Title:

The Fundamental Results on Non-Associative Rings with Cyclic Property

Abstract: This paper describes results on a non-associative ring R with the cyclic property:

Keywords:
Non-Associative ring, Cyclic Property.


References:

1. Schafer, Richard D. (1995). An introduction to non-associative algebras. Dover Publications. pp. 72–75. ISBN 0-486-68813-5.
2. Springer, T. A.; F. D. Veldkamp (2000). Octonions, Jordan Algebras and Exceptional Groups. Springer-Verlag. ISBN 3-540-66337-1.

439-440

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

94.

Authors:

Shima Simsar, Mahmood Alborzi, Jamshid Nazemi,Mahmood Abbasi Layegh

Paper Title:

Forecasting Power Demand Using Neural Networks Model

Abstract: In recent years, by entering the competition arena, not only providing the needed electricity demand, but also reducing the cost of purchased electricity has been one of the biggest challenges of power distribution companies. Solving this challenge has lots of profits and high efficiency for these companies, this research deals with forecasting power demand using neural networks model. To test the power demand , two consecutive years in the West Azarbaijan Province have been selected as a case study.Daily consumption of electricity demand follows time series models. In this study, the daily demand for two years, temperature and humidity of each day and type of days (weekdays or weekends) have been considered. In order to fit the neural network model, the architecture of multi-layer perceptron (MLP) with back propagation learning algorithm has been used. The results indicate that data related to humidity, temperature and also weekends or off-days have an effect on prediction of electricity demand.

Keywords:
Forecast, Neural network, Time series, Power demand.


References:

1. Balkin,S,D.and J,k,Ord.2000.Automatic Neural Network Modeling for Univariate time series , International Journal of Forecasting ,16:509-515.
2. Darbelly, G. S. and M. Slama 2000. Forecasting the short-term demand for electricity, do neural networks stand a better chance?, International Journal Of Forecasting, 16: 71-83.

3. Khaloozadeh,H.S,Khali.and L,Caro.2001.Long term prediction of Tehran price index(TEPIX) Using Neural Network, Proceeding of the 2 Iran Armenian workshop on neural network,139-145.

4. Tkacz ,G.2001.Neural network forecasting of Canadian GDP Growth, International Journal of Forecasting,17 :57-69.

5. Andreou,A.S,Georgopoulas. and S,D,Likothanassis.2002.Exchange Rate Forecasting : A Hybrid Algorithm Based on Genetically Optimized Adaptive Neural Networks,Computational Economics,20 :191-210.

6. Rech , G.2002.Forecasting with Artificial Neural Network Models,SSE/EFI Working Paper Series in Economics and Finance,4:1-20.

7. Wilson,I,D.S,D,Pris.J,A,Ware&D,H,Jenkins.2002.Residential property price time series forecasting with neural networks, knowledge based systems,15 : 335-341.

8. Olsen,D.and C.Mossman.(2003).Neural network of Canadian stock returns using accounting rations ,International Journal Of Forecasting,19:453-465.

9. Heravi.s , D.R.Osborn,C.R.Birchenhall,(2004). Linear versusneural network forecast for European industrial production series, International Journal Of forecasting.20:435-446.

10. Darbely, G,S.and M,Slama.2005. Forecasting the Short-Term Demand for electricity , Do Neural Network stand a Better Chance ? International journal of forecasting,16:71-83

11. Sozen A, Arcaklioglu E, Ozkaymak M. 2005. Modelling of the Turkey’s net energy consumption using artificial neural network. Int. J. Comput. Appl. Technol., 22(2/3):130–6.

12. Hippert, H., D. Bunn & R. Souza. (2005). Large Neural Networks for Electricity Loads Forecasting: Are they overfitted?. Forecasting, 21(3): 425-434.

13. Murat Ys , Ceylan H. 2006. Use of artificial neural networks for transport energy demand modeling. Energy Policy, 34: 3165–72.

14. Azadeh.A , Ghaderi.S.F, Sohrabkhani.S. (2008). A simulated-based neural network algorithm for forecasting electrical energy consumption in Iran. Energy Policy ,Vol.36, pp.2637-44.

15. Kutluk KaganSumer , Ozlem Goktas , Aycan Hepsag (2009) . The application of seasonal latent variable in forecasting electricity demand as an alternative method . Energy Policy 37 , PP . 1317–1322.

16. Kavaklioglu K., Ceylan H., Ozturk H.K., Canyurt, O.E. (2009). Modeling and prediction of Turkey’s electricity consumption using Artificial Neural Networks, Energy Conversion and Management, 50: 2719–2727.

17. Mun˜oz, Antonio., & Eugenio F.& U´ beda , Sa´nchez & Cruz, Alberto&Mar´ın,Juan (2010). Short-term Forecasting in Power Systems:A Guided Tour. Handbook of Power Systems II, Energy Systems, pp.129,160.

18. Hongzhan NIE, Guohui LIU, Xiaoman LIU, Yong WANG. (2012). Hybrid of ARIMA and SVMs for Short-Term Load Forecasting. International Conference on
Future Energy, Environment, and Materials , pp.1455,1460.

19. Khashei,Mehdi . Bijari,Mehdi . Hejazi,Seyed Reza. (2012). Combining seasonal ARIMA models with computational intelligence techniques for time series forecasting. Soft Comput, Vol.16, pp.1091-1105.

20. Gam Imen,BenRejeb Jalaleddine. (2012). Electricity demand in Tunisia. Energy Policy,vol 45, pp.714-720.

441-446

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

95.

Authors:

A.Sathyavathi, M.R.Rajaraman, B.Kumaragurubaran, P.Gopal

Paper Title:

Surface Roughness Optimization Techniques of CNC Turning: A Review

Abstract: Surface Roughness are generally used as a guide to find out the surface finish for unbroken upgrading of surface quality. A great number of publications by a variety of authors reproduce the significance in this parameters. Reviews of literature on surface roughness optimization have been done in the past by a most of the authors. However, considering the assistance in the recent times, a special review is attempted here. In this paper, the authors have reviewed the literature in a way that would facilitate researchers, academicians and industrials to take an earlier look at the growth, development and applicability of this technique. The authors have reported various papers and have proposed a different scheme of sorting. In count, positive gaps that would offer hints for further research in this playing field have been identified.

Keywords:
Computer numerial control, Surface Roughness, Optimization, Tool


References:

1. S. Y. Liang, R. L. Hecker, and R. G. Landers, “Machining process monitoring and control: The state-of-the-art,” Trans. of ASME, J. of Manufacturing Science and Engineering, 126-2, pp. 297-310, 2004.
2. D U Braga, A E Diniz, G.W.A. Miranda, N.L. Coppini, Using a minimum quantity of lubricant (MQL) and a diamond coated tool in the drilling of aluminum-silicon alloys Journal of Materials Processing Technology. 2002, Vol. 122, pg. 127-138.

3. Kelly JF, Cotterell MG (2002) Minimal lubrication machining of aluminium alloys. J Mater Process Technol 120:327–334

4. M. Nouari, G. List, F. Girot, D. Coupard; Experimental analysis and optimisation of tool wear in dry machining of aluminium alloys. Wear, 255 (2003), pp. 1359–1368.

5. MS Carrilero, JMS Sola, JM Sanchez, M. Alvarez, J. Gonzalez, M. Macros; A SEM and EDS insight into the BUL and BUE differences in the turning process of AA2024 Al–Cu Alloy. International Journal of Machine Tools and Manufacture, 42 (2002), pp. 215–220

6. D. Larrouquere, S. Dominiak, D. Dudzinski, Cutting forces and wear in dry machining of Inconel 718 with coated carbide tools , Wear, 2007, http://dx.doi.org/10.1016/j.wear.2006.10.009,

7. Torres CD, Heaney PJ, Sumant AV, Hamilton MA, Carpick RW, Pfefferkorn FE (2009) Analyzing the performance of diamond coated micro end mills. Int J Mach Tool Manuf 49:599–612

8. Astrand M, Selinder TI, Fietzke F, Klostermann H, PVDAl2O3- coated cemented carbide cutting tools, Surf Coat Tech, 2004

9. Dong HY, Huang PJ, Bi YB, Study on the orthogonal cutting process of Al7050T7451 with uncoated and coated Tools, Key Eng Mat, 2009.

10. Iqbal S, Mativenga PT, Sheikh MA, Characterization of machining of AISI 1045 steel over a wide range of cutting speeds. Part 1: investigation of contact phenomena., J Eng Manuf, 2007

11. Grzesik W, Luttervelt CA, Analytical models based on composite layer for computation of tool-chip interface temperatures in machining steels with multilayer coated cutting tools., Ann CIRP Manuf Technol, 2005

12. Bouzakis, K.D., et al., Application in milling of coated tools with rounded cutting edges after the film deposition., CIRP Annals - Manufacturing Technology, 2009.

13. Corduan, N., et al. Wear Mechanisms of New Tool Materials for Ti- 6AI-4V High Performance Machining, CIRP Annals – Manufacturing Technology, 2003.

14. Özel, T., et al, Investigations on the effects of multi-layered coated inserts in machining Ti–6Al–4V alloy with experiments and finite element simulations., CIRP Annals - Manufacturing Technology,2010

15. G. Vosniakos, An intelligent software system for the automatic generation of NC programs from wireframe models of 2-1/2D mechanical parts, Comput. Integr. Manufact. Syst., 1998

16. M. Kovacic, J. Balic, Evolutionary programming of a CNC cutting machine, Int. J. Adv. Manufact. Technol. (2002)

17. S. Chao-Ton, C. Mu-Chen, Computer-aided optimization of multi-pass turning operations for continuous forms on CNC lathes, IIE Trans.1999.

18. Y. Lin, An adaptive tool path generation algorithm for precision surface machining, Comput. Aided Des. 1999.

19. J P Davim, C.A. C. Ant´onio, optimization of cutting conditions in the machining of aluminium matrix composites using a numerical and experimental model, Journal of Materials Processing Technology, 2001.

20. W S Lin, B.Y. Lee, C. L. Wu, Modeling the surface roughness and cutting force for turning, Journal of Materials Processing Technology,2001.

21. Q. Meng, JA Arsecularatne, P. Mathew. Calculation of optimum cutting conditions for turning operations using a machining theory, International Journal of Machine Tools and Manufacture, 2000

22. M. N. Dhavlikar, M. S. Kulkarni, V. Mariappan, Combined Taguchi and dual response method for optimization of a centerless grinding operation, Journal of Materials Processing Technology, 2003.

23. S J Kim, K.S. Kim, H. Jang, Optimization of manufacturing parameters for a brake lining using Taguchi method, Journal of Materials Processing Technology,2003.

24. M. Gen, R. Cheng, Genetic Algorithms and Engineering Design, Wiley, Canada, 1997.

25. R. Saravanan, P. Asokan, K. Vijayakumar, Machining parameters optimisation for turning cylindrical stock into a continuous finished profile using genetic algorithm and simulated annealing, International Journal of Advance Manufacturing Technology, 2003

26. K. Krishnakumar, S.N. Melkote, Machining fixture layout optimization using the genetic algorithm, International Journal of Machine Tools and Manufacture (2000)

447-450

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

96.

Authors:

S.V. Kshirsagar, V.N. Dhage, S.J. Shukla, K.M. Jadhav

Paper Title:

Influence of Mn-Zn Co-Substitution on the Structural and Magnetic Properties of Magnesium Ferrite

Abstract: The magnesium manganese - Zinc ferrites having chemical formula MgMnxZnxFe2-2xO4 for x varying from 0.0 to 0.6 in the steps of 0.1 have been synthesized by standard ceramic technique. The variation of Mn - Zn substitution has significant effect on the structural and magnetic properties of magnesium ferrite. The phase identification of the powders performed using X-ray diffraction technique shows presense of high purity cubic phase and absence of any secondary phases. The lattice constant increases from 8.35 to 8.43Å with increase in Mn-Zn substitution x. The Pulse field hysteresis loop tracer technique is used to study the magnetic properties of the prepared samples. The Saturation magnetization (Ms), remanance magnetization (Mr), Coercivity (Hc) and magneton number (nB) are measured at room temperature. The Saturation magnetization (Ms) and magneton number (nB) increases upto x = 0.3 and then decreases with increase in Mn-Zn substitution x in magnesium ferrite.AC Susceptibility measurement confirms the decrease in Curie temperature with increase in Mn-Zn substitution x.

Keywords:
Magnesium ferrite, ceramic technique, X-ray diffraction, Magnetization.


References:

1. Navneet Singh, Ashish Agarwal, Sujata Sanghi, “dielectric-relaxation-conductivity-behavior-and-magnetic-properties-of-mg-substituted-zn-li ferrites”, Current Appl. Phys. 11 (2011) 783.
2. N. M. Deraz, and Omar H. Abd-Elkader,“Effects of Magnesia Content on Spinel Magnesium Ferrite Formation”Int. J. Electrochem. Sci., 8 (2013) 8632 - 8644 .

3. S.D. Chhaya, M.P. Pandya, M.C. Chhantbar, K.B. Modi, G.J. Baldha and H.H. Joshi, “Study of substitution limit, structural, bulk magnetic and electrical properties of Ca2+ substituted magnesium ferrite” J. Alloys. Compd. 377 (2004) 155.

4. K.K. Bamzai,Gurubinder Kour, B. Kour, and S.D. Kulkarni, “Effect of cation distribution on the structural and magnetic properties of Dy substituted magnesium ferrite”,J. Magn.magn.mater, 327 (2013) 159.

5. N. Rezlescu, C. Doroftei,E. Rezlescu and P.D. Popa, “Structure and humidity sensitive electrical properties of the Sn4+ and/or Mo6+ substituted Mg ferrite”,Sensors and Actuators B: chemical,115 (2006) 589.

6. E. Wolska, E. Riedel and W. Wolski, “The evidence of Cd2+xFe1-x[Ni1-xFe1-x]O4 cation distribution based on X-ray and Mossbauer data”, Physica Status Solidi(A) 132 (1992) K51.

7. A.B. Shinde, V.N. Dhage, K.M. Jadhav, “Structural and magnetic properties of indium substituted cobalt ferrite nanoparticles synthesized by sol-gel autocombustion technique”, Inter. J. Eng. Adv. Tech. 2 (2013) 413.

8. P.S. Aghav, V.N. Dhage, M.L. Mane,D.R. Shengule, R.G. Dorik and K.M. Jadhav, “Effect of aluminum substitution on the structural and magnetic properties of cobalt ferrite synthesized by sol-gel auto combustion process”, Physica B: Condensed Matter, 406 (2011) 4350.

9. S.Ounnunkad, P. Winotai and S. Phanichphant, “ cation distribution and magnetic behavior of Mg1-xZnxFe2O4 ceramics monitored by Mossbauer spectroscopy”, J. Electroceram, 16(2006) 363.

451-454

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

97.

Authors:

Sachin S Patil, P T Nimbalkar, Abhijit Joshi

Paper Title:

Hydraulic Study, Design & Analysis of Different Geometries of Drip Irrigation Emitter Labyrinth

Abstract: In order to solve the problem of water shortage in agriculture, it’s necessary to develop water-saving irrigation. Drip Irrigation is a method of applying uniform and precise amount of water directly to the root zone of the plants as per the requirement, through emitters at frequent intervals over a long period of time, via pressure pipe network. As the key device in drip irrigation systems, the emitter is to drip the pressured water in the pipeline to the root of the crops evenly and steadily, so as to guarantee the water demand for crop growth. The quality of the emitter has an important effect on the reliability, life span of the drip irrigation system and irrigation quality. Usually, the structure of the emitter channel is very complex with a dimension. Emitter’s intricate inner channel makes the flow of water have turbulent behavior. In the design of emitter structure, we use 3D parametric CAD software SolidWorks 2012 to design labyrinth emitter. According to emitter’s hydraulic performance and its requirement for anti-clogging, we can design new channel structures by changing those dimensions. The irrigation quality of drip irrigation system is verified by emitter’s hydraulic performance. In the high-pressure pipeline, the water energy may dissipate after flowing through the labyrinth channel and the flow rate can be controlled to meet the water need of the crops. To ensure the emitter’s hydraulic performance, before the fabrication of emitter, computational fluid dynamics (CFD) is used to predict emitter’s flow rate and analyze its hydraulic performance under various water pressures.

Keywords:
anticlogging, discharge,drip irrigation, exponent, emitter.


References:

1. Glaad YK, Klous LZ 1974. Hydraulic and mechanical properties of drippers. In: Proceedings of the 2nd International Drip Irrigation Congress, San Diego, California, USA, 7–14 July. Pp. 7–14.
2. Nina Philipova, HYDRAULIC MODEL OF TRICKLE-IRRIGATION LATERALS; Institute of Mechanics, Bulgarian Academy of Sciences, Acad. G. Bonchev Str., Bl.4,
Sofia 113, Bulgaria.

3. P. Cicconi, R. Raffaeli, A Knowledge Based Approach for Affordable Virtual Prototyping: the Drip Emitters Test Case, Competitive Design, Cranfield University, 30-31 March 2009, pp575.

4. WEI Zhengying*, CAO Meng, LIU Xia, TANG Yiping, and LU Bingheng, Flow Behaviour Analysis and Experimental Investigation for Emitter Microchannels, CHINESE JOURNAL Vol. 25, No., 2012.

5. Yan Dazhuang, Yang Peiling, RenShumei, Li Yunkai and XuTingwu; Numerical study on flow property in dentate path of drip emitters; The Royal Society of New Zealand 2007

6. Zhengying Wei, Application of RP and Manufacturing to Water-Saving Emitters, Xi’an Jiaotong University 7

455-462

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

98.

Authors:

Shweta S. Khobragade, Swapnali P. Karmore

Paper Title:

Review on: Low Power VLSI Design of Modified Booth Multiplier

Abstract: Low power VLSI circuits became very vital criteria for designing the energy efficient electronic designs for prime performance and compact devices. Multipliers play a very important role for planning energy economical processors that decides the potency of the processor. To scale back the facility consumption of multiplier factor booth coding methodology is being employed to rearrange the input bits. The operation of the booth decoder is to rearrange the given booth equivalent. Booth decoder can increase the range of zeros in variety. Hence the switching activity are going to be reduced that further reduces the power consumption of the design. The input bit constant determines the switching activity part that's once the input constant is zero corresponding rows or column of the multiplier ought to be deactivated. When multiplicand contains more number of zeros the higher power reduction can takes place. So in modified booth multiplier high power reductions will be achieved.

Keywords:
Digital signal processing(DSP); Carry Save Adder(CSA); Full Adder(FA),Column Bypass Multiplier(CBM)


References:

1. Tushar V.More, Dr.R.V.Kshirsagar, “Design of Low Power Column Bypass Multiplier using FPGA” IEEE journal of solid-state, circuits, vol 31,pp 1535-1546,July 2011.
2. Shiann-Rong Kuang and Jiun-Ping Wang “Design of power efficient configurable booth multiplier” IEEE Trans. Circuits Syst. I Regular Papers vol. 57, no.3, pp. 568-580, March 2010.

3. Rao P.V and Cyril Prasanna Raj and S. Ravi, “VLSI Design and Analysis of Multipliers for Low Power”, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009.

4. Padmanabhan Balasubramanian and Nikos E. Mastorakis, “High Speed Gate Level Synchronous Full Adder Designs,” WSEAS TRANSACTIONS on CIRCUITS and SYSTEMS Issue 2, Volume 8, pp 290-300, February 2009.

5. A. Dandapat, S. Ghosal, P. Sarkar, D. Mukhopadhyay (2009), “A 1.2- ns16×16-Bit Binary Multiplier Using. High Speed Compressors”, International Journal of Electrical, Computer, and Systems Engineering, 2009, 234-239

6. C. N.Marimuthu1, P. Thangaraj2,"Low Power High Performance Multiplier" ICGST-PDCS, Volume 8, Issue 1, December 2008

7. Sanjiv Kumar Mangal,Rahul M.Badghare,“ FPGA Implementation of Low Power Parallel Multiplier”,10th International Conference on VLSI Design,2007.

8. X. Chang, M. Zhang, G. Zhang, Z. Zhang, and J. Wang, “Adaptive clock gating technique for low power IP core in SOC design,” in Proc. IEEE Int. Symp. Circuits Syst., May 2007, pp. 2120–2123

9. T.-B. Juang and S.-F. Hsiao, “Low-power carry-free fixed-width multipliers with low-cost compensation circuit,” IEEE Trans.5 Circuits Syst.II, Analog Digit. Signal
Process. vol. 52, no. 6, pp. 299–303, Jun. 2005

10. Yingtao Jiang, Abdulkarim Al-Sheraidah, Yuke Wang, Edwin Sha, and Jin-Gyun Chung, “ A Novel Multiplexer-Based Low-Power Full Adder,” in IEEE transactions on circuits and systems vol. 51, no. 7, July 2004.

11. “A Novel Parallel Multiply and Accumulate (V-MAC) Architecture Based On Ancient Indian Vedic Mathematics” Himanshu Thapliyal and Hamid Rarbania,july 2004

12. K. J. Cho, K. C. Lee, J. G. Chung, and K. K. Parhi, “Design of low error fixed-width modified booth multiplier,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 12, no. 5, pp. 522–531, May 2004.

13. Oscal T. -C. Chen, Sandy Wang, and Yi-Wen Wu, “Minimization of Switching Activities of Partial Products for Designing Low-Power Multipliers”, IEEE Transactions on VLSI Systems, vol. 11, no. 3, June 2003.

14. Ohban.J, V.G. Moshnyaga, and K. Inoue, “Multiplier energy reduction through bypassing of partial products,” Asia-Pacific Conf.on Circuits and Systems. vol.2, pp. 13-17, 2002.

15. Zhijun Huang and Milos D. Ercegovac, ―Two-Dimensional Signal Gating for Low-Power Array Multiplier Design‖, IEEE Conference Proceedings, 2002

16. T. Kitahara, F. Minami, T. Ueda, K. Usami, S. Nishio, M. Murakata,and T. Mitsuhashi, “A clock-gating method for lowpower LSI design,” in Proc. Int. Symp. Low Power Electron. Des., Feb. 1998, pp. 07–312.

17. Jorn Stohmann Erich Barke, “A Universal Pezaris ArrayMultiplier Generator for SRAM-Based FPGAs” IMS- Institute of Microelectronics System, University of Hanover Callinstr, 34,D- 30167 Hanover,Germany,1997

18. Issam S. Abu-Khater, Abdellatif Bellaouar, and M. I. Elmasry, “Circuit Techniques for CMOS Low-Power High-Performance Multipliers”, IEEE journal of solid-state, circuits, vol 31,pp 1535-1546, 1996.

19. C. R. Baugh and B. A.Wooley, .A two.s complement parallel array multiplication algorithm., IEEE Trans. Comput., vol. C-22, pp. 1045- 1047, Dec. 1973

20. L. Dadda, “Some schemes for parallel multipliers,” Alta Freq., vol. 34,pp. 349–356, May 1965.

21. C.Wallace, “A suggestion for a fast multiplier,” IEEE Trans. Electron.Comput., vol. EC-13, no. 1, pp. 14–17, Feb. 1965

22. N. H. E. Weste, and K.Eshraghain, “PRINCIPLES OF CMOS VLSI Design, A Systems Perspective,” Pearson Education, 2010.

23. M. Morris Mano, “Digital Design” – Third Edition, Prentice Hall of India private limited, 2006..

24. Anantha. P. Chandrakashanan, R. Brodcrsen, ―Low Power Digital CMOS Design‖, Kluwer. Academic Publisher, 1996.

25. I Koren, Computer Arithmetic Algorithms, Prentice Hall, Englewood Cliffs, New Jersey, 1993

463-466

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

99.

Authors:

K. Sundeep Kumar, Lalitha Asokan, Priyadarshini M.P, B. Eswara Reddy.

Paper Title:

Assessment of the Wound-Healing Process by Accurate Single View Issue Classification and Depth Estimation for Telemedicine

Abstract: With the widespread use of digital cameras, freehand wound imaging has become common practice in clinical settings. There is however still a demand for a practical tool for accurate wound healing assessment, combining dimensional measurements and tissue classification in a single user friendly system. In this research work, we propose optimal techniques for the assessment of wound healing process. The proposed system comprises cascade of four stages - Pre - Processing Stage, Segmentation, Feature Extraction and Classification. All the implementations are done in MATLAB.

Keywords:
Clustering, Epidermis, Feature vectors, Intensity, Multi -Class, Tissue.


References:
1. Thomas Hess, “Skin and Wound Care”, (6th edition) ,Published by Lippincott, Williams and Wilkins.
2. Milan Sonka, Vachav Hlavac, Roger Boyle,”,Digital Image Processing and computer vision”, © 2008 by Cengage Learning.

3. Maria Petrou and Costas Retrou, “Image Processing: The fundamentals “ (2nd edition),2010.

4. Mark Haiden, “Advanced Biomedical Image Analysis,© 2011 by John Wiley & Sons.

5. Rangaraj M. Rangayyan, “Biomedical Image Analysis”,©2005 by 2005 Press LLC.

6. Keshava Reddy and Jyothi Bellary, “Multi-Class Support Vector Machines - A comparative approach”, International Journal of Applied Physics and Mathematics, Vol. 2,No. 2, July 2012.

7. Hazeem Wannous, Yves Lucas, Sylvie Treuillet,”Efficient SVM Classifier based on color and texture region features for wound tissue images”, Proc. SPIE 6915,
Medical Imaging 2008: Computer Aided Diagnosis, 691525 (March 17, 2008).

8. Hazeem Wannous, Yves Lucas, Sylvie Treuillet,”Robust Tissue Classification for reproducible wound assessment in Telemedicine environments”, Journal of Electronic Imaging 19 (2), 023002, (Apr - Jun 2010).

9. Hazeem Wannous, Yves Lucas, Sylvie Treuillet,”Enhanced Assessment of Wound Healing process by Accurate Multi - view Tissue Classification”, IEEE transactions on Medical Imaging, Vol. 30, No. 2, February 2011.

467-475

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

100.

Authors:

Triveni.K.S, E. Elavarasi

Paper Title:

High Speed Efficient Karatsuba- Ofman Pipelined Multiplier for Low Contrast Image Enhancement

Abstract: Multiplication is one of the supreme operation in many high performance systems such as microprocessor, FIR filters, Digital Signal Processor, Image Processing etc. Since multiplication dominates the execution time of most operations, there is a huge demand in increasing the speed of the multipliers, which has been subject of interest over years. . Multiplier based on Vedic Mathematics is one of the fast and low power multiplier. This proposed Karatsuba-Ofman Pipelined Multiplier (KOPM) is designed mainly to optimize speed of the multiplier which is the major requirement in many applications. Karatsuba-Ofman algorithm [3] is employed to optimize the speed. Pipelining will enhance the performance of the multiplier. The multiplier is implemented for the low contrast image enhancement. This multiplier has been synthesized on Spartan3E.

Keywords:
Karatsuba-Ofman, Low contrast image, Pipelining, Vedic Mathematics.


References:

1. Jagadguru Swami, Sri Bharati Krsna Tirthji Maharaja,” Vedic Mathematics”,Motilal Banarsidas, Varanasi, India, 1986.
2. Dr. K. S. Gurumurthy, M.S. Prahalad, “Fast and Power Efficient 16×16 Array of Array Multiplier using Vedic Multiplication”, IMPACT-IEEE, 2010

3. Serdar S. Erdem, Cetin K. Koc, “A Less Recursive Variant of Karatsuba-Ofman Algorithm for Multiplying Operands of Size a Power of Two”, Computer Arithmetic Proceedings, 16th IEEE Symposium on Digital Object Identifier, 2003,Page(s): 28 – 35.

4. Abhijit Asati, Chandrashekar “A High-Speed, Hierarchical 16×16 Array of Array Multiplier Design”, IMPACT 2009.

5. Gang Zhou, Harald Michalik, and László Hinsenkamp, “Complexity Analysis and Efficient Implementations of Bit Parallel Finite Field Multipliers Based on Karatsuba-Ofman Algorithm on FPGAs”, ieee transactions on Very Large Scale Integration (VLSI) systems, vol. 18, no. 7, July 2010

6. M. Ramalatha, K. Deena Dayalan, P. Dharani, S. Deborah Priya, “High Speed Energy Efficient ALU Design using Vedic Multiplication Techniques”, July 15-17, 2009, ACTEA

7. Matthias Fugger, Andreas Dielacher, Ulrich Schmid, “How to Speed-up Fault-Tolerant Clock Generation in VLSI Systems-on-Chip via Pipelining”, 2010 European Dependable Computing Conference.

8. C.Prema, C.S.Mainkanda babu, “Enhanced high speed modular multiplier using Karatsuba algorithm” , 2013 International Conference on Computer Communication and Informatics (ICCCI -2013), Jan. 04 – 06, 2013, Coimbatore, INDIA.

9. Prof J M Rudagil, Vishwanath Amble, Vishwanath Munavalli, Ravindra Patil, Vinaykumar Sajjan, “Design and Implementation of Efficient Multiplier using Vedic mathematics” Proc. of1nt. Con/, on Advances in Recent Technologies in Communication and Computing 2011.

10. Digital VLSI “A Pipelining & Parallel Processing” Mahdi S habany, Sharif University of Technology.

11. Circuit design with VHDL by Pedroni.

12. Introduction to Xilinx ISE 8.2i. University of Pennsylvania, Digital Design Laboratory.

13. VHDL programming by example by Douglas L.Perry.

476-479

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

101.

Authors:

C. Srujana, B. Rama Murthy, K.Tanveer Alam, U. Sunitha, Mahammad D.V, P.Thimmaiah

Paper Title:

Development of RFID Based Library Management System Using MATLAB

Abstract: Radio frequency identification (RFID) is a rapidly emerging technology which allows productivity and convenience. No doubt it is an integral part of our day to day life, as we are using in many applications like industrial, shopping malls, traffic and libraries. As so far this technology implemented successfully worldwide. But in India it is still in observation state especially in library management at university and educational institutions due to lack of awareness and cost. To overcome this situation here we made an attempt to implement RFID based library management system in our university. The proposed system is based on high frequency DLP RFID1 Read/Writer having the range of frequency is 13.56 MHz’s and it can Read up to 15 Tags simultaneously. The software written in MATLAB and MySQL to improve system performance. The proposed system successfully implemented in our library and it is satisfactory working

Keywords:
DLP RFID1 Read/Writer, RFID tag, MATLAB, MySQL


References:

1. Finkenzeller, Klaus, 2003: RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification, Second Edition. John Wiley & Sons, pg. 396.
2. Daniel H, Puglia A, Puglia M (2007). RFID: A guide to radio frequency identification. New York, John Wiley and sons, Inc., p. 1.

3. Cheng Feng , Computer and Communication Technologies in Agriculture Engineering (CCTAE), 2010 International Conference On (Volume:1 ISBN:978-1-4244-6944-4 ) date: 12-13 June 2010, Page(s):262 – 264.

4. "DLP-RFID1 RFID Reader/Writer." DLP Design- Products. DLP Design. <http://www.dlpdesign.com/rf/rfid1.shtml>.

5. Sujatha G (2007). Radio frequency identification (RFID) technology in library management. Pearl. 1: 22-24

6. RFID Journal. (2003). Gillette Confirms RFID Purchase. RFID Journal. Available at:

7. USB to Serial communication drivers

8. MATLAB Guide, Second EditionDesmond J. Higham and Nicholas J. Higham

9. "Test and Measurement Widgets: Demo_tmwidgets-FileExchange-MATLAB Central."Test and Measurement Widgets :Demo_tmwidgts_File exchange ,MATLABCentral.Web.08.May.2012

10. MATLAB & Simulink Based Books- Programming and Computer ScienceStephen J. Chapman, BAE System

480-483

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

102.

Authors:

Sridevi P.M, Jitendranath Mungara, K. Sundeep Kumar, Manoj Challa

Paper Title:

Energy Efficiency by Utilizing Link Quality and Loop Breaking In WSN

Abstract: Energy is a major critical resource in wireless sensor network. Most of routing protocol forward message along with minimum energy to the sink to minimize the consumption of energy, which causes imbalance of residual energy and link unreliability among all sensor nodes. In this paper, with the help of the potential classes, we are going to design the energy balanced routing protocol with link quality by creating mixed potential field in terms of energy density, residual energy, depth and link quality. The goal of paper is to forwarding packets towards to sink through dense energy and protect the nodes from low residual energy. The link quality mechanisms rely on aggregation of the high quality links to maintain network connectivity for long time, which avoids unwanted transient topology break down. Our results show that improvements in balancing energy, network throughput and network lifetime in wireless sensor network.

Keywords:
WSN, balanced energy consumption, potential field, required power, energy efficient routing and link quality.


References:

1. Fen Gyuna Ren, Jiao Zhang, “Energy Balanced Routing Protocol for Data Gathering in Wireless Sensor Networks”, 2011.
2. J. Evan, D. Raychaudhri, and S. Paul, “Overview of Wireless, Mobile and Sensor Networks in 2006.

3. R. Munsunuri and J.A. Cobb, “Hierarchical-Battery Aware Routing in Wireless Sensor Networks, 2005.

4. F. Ye, G. Zhong, S. Lu, and L. Zhang,”GRAdient Broadcast: A Robust Data Delivery Protocol for Large Scale Sensor Networks,” 2005.

5. J. Faruque and A Helmy, “RUGGED: Routing on Fringerprint Gradients in Sensor Networks,” 2004.

6. A. Papadoulos and J.A. Mccann, “Towards the Design of an Energy-Efficent, Location-Aware Routing Protocal for Mobile, Ad-Hoc Sensor Networks,” 2004.

7. J. Faruque and A Helmy, “Gradient-Based Routing in Sensor Networks,” 2003.

8. A. Boukerche, X. Cheng, and J.Linus, , “Energy-Aware Data-Centric Routing in Microsensor Networks,” 2003.

9. Basu, A. Lin and S. Ramanathan, “Routing Using Potentials: A Dynamic Traffic-Aware Routing Algorithm,,” 2003.

10. C. Schurgers and M. Srivastava, “Energy Efficient Routing in Wireless Sensor Networks”, 2001.

484-486

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

103.

Authors:

Prachi Shukla, Kanwar Preet Kaur

Paper Title:

Performance Analysis of EDFA for different Pumping Configurations at High Data Rate

Abstract: The performance of Erbium Doped Fiber Amplifier (EDFA) depends on various parameters like, Er+3 doping concentration, active fiber length, pump power, pumping wavelength etc. In this paper, the analysis of gain and noise figure (NF) of EDFA is done at different pump power (10, 50, & 100mw) and at different fiber length (10, 30, & 50m) for different pumping configuration i.e. forward pumping, backward pumping, and bidirectional pumping operating in C-band at high data rate.

Keywords:
Erbium Doped Fiber Amplifier (EDFA), Erbium Doped Fiber (EDF), Gain, Noise Figure (NF).


References:

1. G.P.Agarwal, “Fiber-Optic Communication Systems”, John Wiley& Sons, New York, 1997.
2. G.Keiser, “Optical Fiber Communication”, 3rd Ed., McGraw Hill, Singapore, 2000.

3. Banaz O. Rashid et al, “Gain and Noise Figure Performance of Erbium-Doped Fiber Amplifiers at 10Gbps” Kirkuk University Journal Scientific Studies, pp.60-69, 2008.

4. Rajneesh Kaler, R.S. Kaler, “Gain and Noise figure performance of erbium doped fiber amplifiers (EDFAs) and Compact EDFAs” Elsevier, pp.443-440,2011.

5. A.Cem Çokrak , Ahmet Altuncu “Gain and noise figure performance of Erbium doped fiber amplifiers (EDFA)” Journal Of Electrical & Electronics Engineering, vol:4,no.2,pp1111-1122, 2004.

6. Parekhan M. Aljaff, and Banaz O. Rasheed “Design Optimization for Efficient Erbium-Doped Fiber Amplifiers” World Academy of Science, Engineering and Technology ,pp 40-43, 2008.

7. Diana Binti Mahad et al, “EDFA Gain Optimization for WDM System” Elektrika , journal of electrical Enguneering, Vol. 11, No. 1, pp34-37, 2009.

8. M.A.Othman, M.M. Ismail et al, “Erbium Doped Fiber Amplifier (EDFA)for C-Band Optical Communication System” International Journal of Engineering & Technology IJET-IJENS, Vol:12, No:04, pp 48-50, 2012.

9. P. Schiopu and F. Vasile,” The EDFA Performance with gain versus pump power”,IEEE Semiconductor Conference, 2004.

10. F. Vasile and P. Schiopu, “The signal and pumping power for EDFA”, IEEE Proceedings of the International Semiconductor Conference CAS, Sinaia, pp. 175-178, 2003.

11. Shien-Kuei Liaw et al “Investigate C+L Band EDFA/Raman Amplifiers by Using the Same Pump Lasers” 2006.

487-490

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

104.

Authors:

Aaradhna Dubey, Rajneesh Agrawal, Rajender Singh Yadav

Paper Title:

Enhanced Routing Technique for Energy Conservation in Wireless Sensor Networks

Abstract: Wireless Sensor Networks are being applied in many real world applications in recent years. For real time applications WSN are proving to be the best mechanism. Some of the important application examples for WSN are environment monitoring, health monitoring and military etc. Such applications require real time data to be delivered on time for critical evaluations. To ensure the reliability in wireless sensor networks applications, power efficiency needs to be focused since sensor nodes have a limited power supply. The power efficiency in wireless sensor networks is a main factor to ensure the success of these networks. The main sources of energy consumption in WSN are routing process and initialization process in routing mechanism which applies a significant impact on energy level. The works proposed and implemented by the various authors examined energy level and performance in terms of the entire process of routing mechanism. This work proposes to reduce the usage of the energy and long sustaining energy levels in the WSN. As energy level is critical in evaluating the performance therefore an algorithm is being proposed to evaluate the best route on the basis of the energy levels of the nodes alongwith other metrics. This will be useful in forwarding the packets to even long distances with the least burden on the nodes having less energy level. The store & forward technique is being applied for reducing the energy usage involved in getting routing information from other nodes.

Keywords:
Wireless Sensor Networks, Store & Forward Technique, Power & Energy Levels


References:

1. Ismail Ahmedy, Md Asri Ngadi, Syaril Nizam Omar "Using Store- Forward Technique to Conserve Energy in Wireless Sensor Networks: Initial Step for Routing Mechanism".
2. Tafzeel ur Rehman Ahsin and Slimane Ben Slimane, "Energy Efficient Resource Allocation and Deployment Strategies for Wireless Networks", 978-1-4673-0229-6 © 2012 IEEE.

3. Roc Meseguer, Carlos Molina, Sergio F. Ochoa3, Rodrigo Santos, "Reducing Energy Consumption in Human-centric Wireless Sensor Networks", 2012 IEEE International Conference on Systems, Man, and Cybernetics October 14-17, 2012, COEX, Seoul, Korea, 978-1-4673-1714-6 © 2012 IEEE

4. Hidetoshi Kajikawa, I-Te Lin, and Iwao Sasase, "Grid-based Routing Protocol Using Cell Rotation to Reduce Packets Latency and Energy Consumption in Wireless Sensor Networks", 3rd IEEE International Research Student Workshop, 978-1-4244-8790-5 © 2012 IEEE

5. Byoung Hoon Jung, Hu Jin, and Dan Keun Sung, "Adaptive Transmission Power Control and Rate Selection Scheme for Maximizing Energy Efficiency of IEEE
802.11 Stations", 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC), 978-1-4673-2569-1 © 2012 IEEE

6. Raghunandan.G.H, Sagar Metri, "A Novel Approach to Increase Overall Efficiency in Wireless Sensor Networks", 2012 International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 978-1-4673-0210-4 © 2012 IEEE

7. J. Zhao, R. Govindan. "Understanding packet delivery performance in dense wireless sensor networks," Proc. of 1st International Conference on Embedded Networked Sensor Systems, pp. 1-13, 2003.

8. M. Z. Zamalloa, B. Krishnamachari. "Analyzing the transitional region in low power wireless links," Proc. of 1st International Conference on Sensor and Ad hoc Communications and Networks, pp. 517-526, 2004.

9. W. Fang, D. Qian, Y, Liu. "Transmission control protocols for wireless sensor networks," Journal of Software, vol. 19, no. 6, pp. 1439-1451, 2008

10. S. Kim, R. Fonseca, D. Culler. "Reliable transfer on wireless sensor networks," Proc. of 1st International Conference on Sensor and Ad Hoc Communications and Networks, pp. 449-459, 2004

11. A. Nosaratinia, T. E. Hunter, A Hedayat. "Cooperative communication in wireless networks," IEEE Communications Magazine, vol. 42, no. 10, pp. 74-80, 2004

12. J. E. Wieselthier, G. D. Nguyen, A. Ephremides. "Algorithms for energy-efficient multicasting in ad hoc wireless networks," ACM/Springer Mobile Networks and Applications, vol. 6, no. 3, pp. 251- 263, 2001

13. S. Biswas, R. Morris. "ExOR: opportunistic multi-hop routing for wireless networks," ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 133-144, 2005

14. G. Fairhurst, L. Wood. "Advice to link designers on link Automatic Repeat reQuest (ARQ)," IETF RFC, 2002

15. Q. Cao, T. Abdelzaher, T. He, R. Kravets. "Cluster-based forwarding for reliable end-to-end delivery in wireless sensor networks," Prof. of 25th Annual IEEE Conference on Computer Communications, pp. 1928-1936, 2007

16. J. Wang, H. Zhai, W. Liu, Y. Fang. "Reliable and efficient packet forwarding by utilizing path diversity in wireless ad hoc networks," Proc. of IEEE Military Communications Conference 2004, pp. 258-264, 2004

491-494

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

105.

Authors:

Anil Kumar G, P Jayarekha, Krishna Kumar M, H S Guruprasad

Paper Title:

Implementation of Software for VPLS Service Reconfiguration

Abstract: This paper focus on the design and implementation of a software solution for fast reconfiguration of a Virtual private LAN service (VPLS) service for a business enterprise in the MPLS VPN network. The VPLS service as is a transparent LAN service for two or more customers sites is provisioned with the Service Access Point (SAP), Service Distribution Point (SDP) and Pseudo wire configurations with a per service granular QoS. The paper also pronounces the fast user customization of the service which reflects in the service manager. Each service in the service router has a unique ID. The reconfiguration is done based on the specifications provided by the customer. The flexibility of reconfiguration and customization criteria is met by the software tool which acts as a black box, taking the service IDs of the VPN services and provides scalability in accessing the configurations of large number of services and providing LOG files which associate to minimize the reconfiguration time of the VPN service. At the end, an example VPLS service is shown with the actual and desired service configurations and also the features of the software tool along with the design, implementation consisting of various modules the project is divided in and the procedures used with the test results provided.

Keywords:
MPLS/VPN, Reconfiguration, SAP, SDP, VPLS.


References:

1. Anil kumar G, Krishna Kumar M, Dr. P Jayarekha, "Software solution for fast Reconfiguration of VPLS services," National Conference on Wireless Communication, Signal Processing, Embedded Systems, WiSE 2013.
2. Brian Daugherty and Chris Metz, “Multiprotocol Label Switching and IP, LS VPNs over IP Tunnels,” IEEE INTERNET COMPUTING, JUNE 2005.

3. Besnik Shatri,Agim Abdullahu, Skënder Rugova,Arianit Maraj, “VPN creation in IP/MPLS Network in Kosova,” Seventh International Conference on Networking, 2008 IEEE.

4. Zhuo (Frank) Xu Alcatel - Lucent SRA No. 1, “Designing and Implementing IP/MPLS-Based Ethernet Layer 2 VPN Services”, An Advanced Guide for VPLS and
VLL.

5. Jiezhao Peng, “VPLS Technology Research and Application in the Architectures of E-Government Network,” International Conference on Management of e-Commerce and e-Government, 2009 IEEE.

6. Giuseppe Di Battista, Massimo Rimondini, Giorgio Sadolfo, “Monitoring the Status of MPLS VPN and VPLS Based on BGP Signaling Information,” IEEE Network Operations and Management Symposium (NOMS), 2012.

7. Shivanagouda Biradar, Basel Alawieh and Hussein Mouftah, “Delivering Reliable Real-Time multicast Servicesover Virtual Private LAN Service,” IEEE ICC, 2006 IEEE.

8. Byeongsik Kim, Seunghyun Yoon, Youhyeon Jeong, Hoyoung Song, “Design and Implementation of ME-VPN,” ICACT,2012.

9. F´abio Luciano Verdi and Edmundo R.M. Madeira, “Service Provisioning and Management in Virtual Private Active Networks,” in Ninth IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS), 2003.

10. Chris Metz, “The Latest in VPNs,” IEEE INTERNET COMPUTING, UNE 2004.

11. Jeremy De Clercq and Olivier Paridaens, “Scalability Implications of Virtual Private Networks,” IEEE Communications Magazine, May 2002.

12. 7750 SR OS Services Guide, Alcatel-Lucent India Private Limited

495-499

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

106.

Authors:

A.Rachidi, A.Talbi, A.Khatory

Paper Title:

The New Forms of the Industrial Maintenance: Which Impact in the Performance of the Industrial Companies? (Case study)

Abstract: for a long time the industrial Maintenance is regarded as a vital action in the industrial companies, this classical design of Maintenance saw a radical evolution according to the technological development as well as the integration of the New Information and Communication Technologies (N.I.C.T.), the globalization and the word competitiveness which involve the assurance of the total quality of products and the cutting cost, that is it on their immaterial resources(human, system, process…), or in the materiel resources (Tools, equipment…). However, it is unanimously recognized that N.I.C.T. play a key role for the support and the assistance of the majority of the activities of Maintenance and whose the Computerized Mechanical Management System (C.M.M.S.) constitutes a significant portion. These multiple evolutions have created a new requirement as regards of competences and versatility of the operators of Maintenance, the latter must know as well permanently about the last developments in the developments in the technologies of the generating stations automated as of the new method and tools for Maintenance. Our word fellows two ways; the first one consists in describing the successive changes of the Maintenance function and its impact on the competence of the operators of Maintenance. The second aims to modeling the positioning of the Maintenance function starting form a diagnosis based on the concept of audit which is carried in the Tangier Free Zone (T.F.Z.), according to three branches of industry, the textile, leather and clothing sector, the construction, manufacturing and aeronautical sector, and finally the wiring, electronics and electricity sector, while locating the impact of the N.I.C.T. in the industrial Maintenance.

Keywords:
C.M.M.S., Competence, Evolution, Impact, Industrial Maintenance, Modeling, N.I.C.T., TFZ.


References:

1. Association Française des ingénieurs et responsables de maintenance, « production maintenance » guide GMAO – seconde édition- revue de l’AFIM, paris septembre 2004.
2. Association Française de Normalisation, AFNOR : NF EN 13-306, « Terminologie de la maintenance », Ed. Afnor, Paris, 2001.

3. A.Rachidi, A. Talbi & A.Khatory, « L’entreprise virtuelle, une stratégie pour le développement des entreprises. », Colloque de Recherche Appliquée et de
Transfer de Technologie (CRATT’12), ISET Radés, Tunisie, 2012.

4. A.Rachidi, A.Talbi & A.Khatory, « The industrial maintenance: a function by mutation and the skills in evolution » International Journal of Research and Reviews in Mechatronic Design and Simulation (IJRRMDS), Vol. 2, No. 2, June 2012, ISSN: 2046-6234, Science Academy Publisher, United Kingdom
5. Blanc M., Charron E., Freyssenet M., Le « développement » des systèmes-experts en entreprise, Cahiers de recherche du GIP « Mutations Industrielles », n°
35, novembre 1989, 84 p. Édition numérique, freyssenet.com, 2007, 800 ko.

6. Jean BUFFERNE « la TPM : un système de production », Technologie (SCEREN - CNDP) – Revue Française de gestion Industrielle, Paris, avril 2008.

7. Eugène Désiré EFAGA, « Analyse des données du retour d’expérience pour l’organisation de la maintenance des équipements de production des PME/PMI dans le cadre de la MBF (Maintenance Basée sur la Fiabilité), thèse doctorat, université Luis Pasteur Strasbourg, 2004 .

8. Foreign Direct investment, Magazine, « Global Free Zones of the Future 2010/11Winners,http://www.scspa.com/Cargo/Logistics/ftzs/ documents/Free_Zones_of_the_Future_2010.pdf, June/July 2010.

9. Catherine FRENOT « Référentiel des métiers et des compétences », direction de la protection judiciaire de la jeunesse DPJJ/SDRHRS ministère de la justice, mise à jour juillet 2008.

10. Ministère de l’économie des finances et de l’industrie « les métiers de la maintenance industrielle » mode d’emploi, édition de l’industrie, Paris 2001.

11. Monchy F., « Maintenance, Méthodes et Organisations » Ed. DUNOD, Coll. L'Usine Nouvelle Série Gestion Industrielle (2e édition), Paris, ISBN 2-10-007816-5, 2003

12. Muller A., « On the concept of e-maintenance review and current research», reliability Engineering and System Safety, 93 (8), p. 1165-1187, 2008.

13. Noureddine Zerhouni « classification des différentes architectures de maintenance » 7ème Congrès international de Génie Industriel – 5-8 juin 2007 – Trois-Rivières, Québec (CANADA).

14. Logiciel Sphinx plus2 V5, « Repère méthodologique pour logiciel Sphinx plus 2 V5»,http://www.lesphinxdeveloppement.fr/Publicc/uP Load/_FRANCE/pdf/Support/Declic/ReperesMethodologiques.pdf,2009.

15. Marion PERSONNE, « Contribution à la méthodologie d'intégration de l'environnement dans les PME-PMI: Évaluation des performances environnementales. » thèse doctorat, INSA Lyon, 1998.

500-507

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

107.

Authors:

Disha Budale, Dashrath Mane

Paper Title:

Predictive Analytics in Retail Banking

Abstract: Today banks are facing intensive competition due to the gradual growth of many banks as well as due to the increase in demands of the customers. Customers easily switch to another bank if the other bank is providing them more benefits and facilities that they want. To tap these needs of the customers and reduce the customer attrition, many banking institutions are using predictive analytics. Using the predictive analytics banks are trying to improve their relationship with customer, and retain their existing customers and also devise effective mechanism for marketing.

Keywords:
Predictive Analytics; Banks; CRM; Customer Retention


References:

1. http://blog.thegmid.com/tag/analytics-in-retail-banking/
2. http://en.wikipedia.org/wiki/Predictive_modelling

3. http://en.wikipedia.org/wiki/Generalized_linear_model

4. http://scn.sap.com/community/predictive-analysis/blog/2013/02/12/sap-predictive-analysis-and-hana-like-chocolate-and-peanut-butter

5. https://en.wikipedia.org/wiki/Prediction

6. http://www.infosys.com/FINsights/Documents/pdf/issue8/analytics-retail-banking-why-how.pdf

7. http://www.statmethods.net/advstats/glm.html

508-510

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

108.

Authors:

Mangal Patil, J. S. Chitode

Paper Title:

Improved Technique for Audio Watermarking Based on Discrete Wavelet Transform

Abstract: With digital computers, Internet flexibility promotes an efficient distribution of the digital contents. An Approach of digital watermarking has been proved as an effective approach for providing the copyright protection of multimedia data for audio, image & video signals. We propose an effective watermarking algorithm based on Discrete Wavelet Transform for audio. This approach embeds the image watermark data into approximate coefficients of the wavelet transform. Embedded watermark can be faithfully recovered under different attacks such as volume scaling, re-Sampling, low pass filtering & re-quantization, etc. The performance evaluation of proposed algorithm indicates improved signal to Noise ratio & peak signal to noise ratio.

Keywords:
Digital Audio Watermarking, Information Hiding, Copyright Protection, Wavelet Transform, Robustness.


References:

1. W. Bender, D.Grul, N.Morimoto, A .Lu, “Techniques for data hiding, IBM System Journal”, vol.35, pp.313-336, 1996.
2. IFPI (International Federation of the Phonographic Industry). (2009). http://www,ifpi.org.

3. L. Robert. Shanmugapriya, “A study on Digital watermarking Techniques”, International journal of Recent trends in Engineering,Vol. No.2,May 2009, pp.223-225.

4. Cvejic Needljko, “Algorithms for Audio watermarking and Steganography” , Department of Electrical & Information Engineering, Finland, University of Oulu,,2004.

5. D. Kirovski and H. S. Malvar, Spread-Spectrum Watermarking of Audio Signals, IEEE Transactions on Signal ProcessingVol.3,pp.1345-1348,,2001.

6. Cox I. J.,Kilian J,. Leighton F. T. ,Shamoon T. , “Secure spread spectrum watermarking for Multimedia”, IEEE Transaction on Image Processing,Vol. 6,No.12,pp. 1673-1687, 1997.

7. Hafiz Malik, Ashfaq Khokhar, Rashid Ansari, “Robust Audio watermarking using spread spectrum theory”, ICCAP,pp.385-388,2004.

8. Hooman Nikmehr,sina Tayfeh Hashemy, “A New Approach to audio Watermarking using discrete Wavelet & Cosine Transforms”, International conference on Communication Engineering , 22-24 December 2010,pp.1-10/183.

9. Senbin Yang,Wei Tan,Yanpu Chen, “ Quantization based Digital Audio Watermarking in discrete Fourier transform”, Journal of Multimedia,Vol.5,No.2,pp.151-158, 2010

10. Xianghong Tang ,Yamei Niu,Hemali Yue,Zhong Yin, “ A Digital Audio watermark Embedding Algorithm”, International Journal Information Technology,Vol. No.11,No.12,pp.24-31, 2005.

11. Pranab Kumar Dhar,Jong-Myon Kim , “Digital Watermarking scheme based on Fast Fourier Transformation for audio Copyright Protection”, International Journal of Security & its Applications ,Vol. 5, No.2,pp.33-48, 2011.

12. N.V. Lalitha,G.Suresh,Dr.V. Sailaja, “ Improved Audio watermarking using DWT-SVD” ,International Journal of Scientific & Engineering Research Volume 2,Issue 6,pp.1-6,2011.

13. Neha Baranwal ,Kamalika Dutta, “Peak detection based spread spectrum Audio Watermarking using discrete Wavelet Transform”, International Journal of Computer Applications,Vol. 24, No. 1,pp.16-20,2011

14. Ali Al Haj, Ahmed Mohammad, “Digital Audio Watermarking based on the Discrete Wavelets Transform & Singular value decomposition”, European Journal of scientific Research Vol.No.39.1, pp.6-21, 2010.

15. Ming Li,Yun Lei,Jian Liu ,Yonghong Yan, “ A Novel Audio Watermarking in wavelet domain”, International conference on Intelligent Information Hiding & Multimedia Signal processing,IEEE,2006.

16. Mamoun Suleiman Al Rababa, Ahmad Khader Haboush,As’ad Mahmoud Al Naser, “Experimental Validation for Hiding data using Audio Watermarking”, Australian Journal of Basic & Applied Sciences,Vol.5,No.7,pp.135-145,2011.

17. Fabien A P Petitcolas, “Watermarking Schemes Evaluation” ,IEEE Signal Processing magazine ,17(5) ,pp. 58-64,2000.

18. J.D. Gordy, “Performance evaluation of digital watermarking algorithms, “Master’s thesis, University of Calgary, April 2000.

19. Vivekananda Bhat K.,Inndranil Sengupta,Abhijit Das, “An Adaptive audio watermarking based on the singular value decomposition in the Wavelet domain”, Digital Signal Processing (Elsevier) ,pp.1547-1558.,2010.

511-516

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

109.

Authors:

Disha Budale, Dashrath Mane

Paper Title:

Predictive Analytics in Retail Banking

Abstract: Today banks are facing intensive competition due to the gradual growth of many banks as well as due to the increase in demands of the customers. Customers easily switch to another bank if the other bank is providing them more benefits and facilities that they want. To tap these needs of the customers and reduce the customer attrition, many banking institutions are using predictive analytics. Using the predictive analytics banks are trying to improve their relationship with customer, and retain their existing customers and also devise effective mechanism for marketing.

Keywords:
Predictive Analytics; Banks; CRM; Customer Retention

References:
1. http://blog.thegmid.com/tag/analytics-in-retail-banking/
2. http://en.wikipedia.org/wiki/Predictive_modelling

3. http://en.wikipedia.org/wiki/Generalized_linear_model

4. http://scn.sap.com/community/predictive-analysis/blog/2013/02/12/sap-predictive-analysis-and-hana-like-chocolate-and-peanut-butter

5. https://en.wikipedia.org/wiki/Prediction

6. http://www.infosys.com/FINsights/Documents/pdf/issue8/analytics-retail-banking-why-how.pdf

7. http://www.statmethods.net/advstats/glm.html

517-523

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

110.

Authors:

Gargi Amrujkar, Pramila Adavi

Paper Title:

E - Partner System for Construction or a New ERA for Business Partnering in Construction Industry

Abstract: Partnering is a set of actions, from Project Management, that help project teams improve their performance and thus, provide substantial benefits. Business partnering is "the development of successful, long term, strategic relationships between customers and suppliers, based on achieving best practice and sustainable competitive advantage"(Lendrum, 1997). Partnering attributes commitment, trust, mutual objectives & goals and developing long term relationship with all the stakeholders associated with the project. Stakeholders such as Architect & Designers, Consultants, Contractors & Sub-Contractors and Suppliers & Vendors collaboratively work together under same terms and conditions with similar organizational culture for achieving a successful project. This paper describes a web – based Partnering System with the principle of overcoming the various problems that are associated with the traditional or manual process to achieve complete transparency at every step and at every transaction. Thus, increasing competitiveness of companies/firms by taking advantage of mutually developed relations & opportunities and reducing risks . It is an attempt to bridge the gap between the Builder’s Organization and the various Stakeholders associated with a Project. Analysis and thus, System Development has been done with the objective of identifying a standard operating procedure for successful and strategic partnering relationships. Partnering strategy focuses on developing guidelines which include Partner Registration, Partner Selection & Approval based on qualification criteria, Partner Evaluation based on weighted grade point average, Automated Generation of Quotation and Negotiation, forming a Partnering Agreement & setting up mutual goals & objectives and Generating automated Purchase/Work/Service order along with Time & Payment Schedule. Basis for Project Partners is to adopt a “Win - Win” approach to solve problems and develop ‘Synergistic’ team work amongst them.

Keywords:
Business Partnering, Web - Based System, Stakeholders, Evaluation, Dashboard.


References:

1. Partnering in the Construction Industry, Code of Practice for Strategic Collaborative Working, authors- John Bennett, P.A, Sarah Peace.
2. Critical Success Factors For Partnering In The Turkish Construction Industry, Irem Dikmen1, M. Talat Birgonul, Beliz Ozorhon And Koksal Eren, - Arcom.Ac.Uk

3. Bayramoglu, S (2001) Partnering in construction: Improvement through integration and collaboration. Leadership and Management in Engineering, 1(3), 39-43.

4. Drexler, J.A., Larson, E.W. ―Partnering: Why Project Owner-Contractor Relationships Change?‖ Journal of Construction Engineering and Management, American Society of Civil Engineers. July/August 2000, pp. 293-297.

5. Black, C, Akintoye, A and Fitzgerald, E (2000). An analysis of success factors and benefits of partnering in construction. International Journal of Project Management, 18(6),423-432.

6. Jeroen Bemelmans, Hans Voordijk, Bart Vos, and Jan Buter. (2012) Assessing Buyer-Supplier Relationship Management: Multiple Case-Study in the Dutch Construction Industry. Journal of Construction Engineering and Management 138:1, 163-176 Online publication date: 1-Jan-2012.

7. Jeroen Bemelmans, Hans Voordijk, and Bart Vos. (2012) Supplier-contractor collaboration in the construction industry: A taxonomic approach to the literature of the 2000-2009 decade. Engineering, Construction and Architectural Management 19:4, 342-368 Online publication date: 1-Jan-2012

8. Lena E. Bygballe, Marianne Jahre, and Anna Swärd. (2010) Partnering relationships in construction: A literature review. Journal of Purchasing and Supply Management 16:4, 239-253 Online publication date: 1-Dec-2010.

9. Crane, T., Felder, ., Thompson, ., Thompson, ., and Sanders, . (1997).‖Partnering Process Model.‖ J. Manage. Eng., Journal of Management in Engineering.

10. Crowley, L. and Karim, M. (1995). ‖Conceptual Model of Partnering.‖ J. Manage. Eng., 11(5), 33–39. Journal of Management in Engineering.

11. Caltrans. Field Guide to Partnering on Caltrans Projects. California Department of Transportation Statewide Planning Steering Committee. April 2000.

524-528

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

111.

Authors:

Garima Nautiyal, Rajesh Kumar

Paper Title:

Spectrum Sensing In Cognitive Radio Using Matlab

Abstract: The radio frequency spectrum is a scarce natural resource and its efficient use is of the utmost importance. The spectrum bands are usually licensed to certain services, such as mobile fixed broadcast, and satellite, to avoid harmful interference between different networks. Most spectrum bands are allocated to certain services but worldwide spectrum occupancy measurements show that only portions of the spectrum band are fully used. Moreover, there are large temporal and spatial variations in the spectrum occupancy. In the development of future wireless system the spectrum utilization functionalities will play a key role due to the scarcity of unallocated spectrum. Moreover, the trend in wireless communication system is going from fully centralized system into the direction of self-organizing system where individual nodes can instantaneously establish ad hoc networks whose structure can change over time. Cognitive radio, with the capabilities to sense the operating environment, learn and adapt in real time according to environment creating a form of mesh network, are seen as a promising technology. The paper presents an overview of cognitive radio, various spectrum sensing technique used in CR and also describe the state-of-the-art in cognitive radio standards and regulation. In this project we have implemented and analyzed the energy detection technique for spectrum sensing in CR.

Keywords:
Cognitive Radio, Spectrum Sensing, Energy Detection, Primary user, Secondary user, Threshold, Probability of detection, Probability of false alarm.


References:

1. S. Hakin, "Cognitive Radio: Brain-Empowered Wireless Communications," IEEE J. On selected areas in communication, vol.23, pp.201-220, Feb. 2005
2. FCC Spectrum Policy Task Force (SPTF), "Report of the Spectrum Efficiency Working Group," November 2002.

3. J.Mitola, "Cognitive Radio: Making Software Radios more personal," IEEE Pers. Commun, vol.6, no.4, pp.13-18, Aug. 1999.

4. Ian F.Akyiliz, Won-Yeol Lee, Mehmet C. Vuran, Shantidev Mohanty, "Next generation dynamic spectrum access," 2006 Elsevier.

5. Maninder Jeet Kaur, "Analysis of Decision Making Operation in Cognitive radio using Fuzzy Logic System," Department of Computer Science and Engineering
National Institute of Technology, Jalndhar, Punjab, India International Journal of Computer Applications (0975 - 8887) Volume 4- No.10, August 2010.

6. Mithun Chakraborty R.Bera, P.Pradhan, S.Sunar "Spectrum sensing and Spectrum shifting implementation in a Cognitive Radio based IEEE 802.22 Wireless
Regional Area Network, " (IJCSE) International Journal on Computer Science and Engineering Vol.2, No. 04,2010, 1477-1481.

7. Nicola Baldo and Michele Zorzi, "Cognitive Network Access using Fuzzy Decision Making," Department of Information Engineering - University of Padova, Italy, vol.04, IEEE 2007.

8. Ila Sharma, "A Novel Approach for Spectrum Access Using Fuzzy Logic in Cognitive Radio," Department of Electronics and Communication Engineering Jaypee University of Information Technology, Waknaghat, Solan-173 234, India I.J. Information Technology and Computer Science, 2012, 8, 1-9 Published Online July 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijitcs.2012.08.01.

9. Zeljko Tabakovic, "A Survey of Cognitive Radio Systems," Croatian Post and Electronic Communications Agency, Juriši?eva 13, Zagreb, Croatia vol 03 july 2000.

10. Nisha Yadav, "A comprehensive study of spectrum sensing techniques in cognitive radio." Department of Electronics and Communication Engineering, Gurgaon Institute of Technology & Management, Bilaspur, Gurgaon, India. International Journal of Advances in Engineering & Technology, July 2011.

11. Mahmood A. Abdulsattar, "Energy detection technique for spectrum sensing in cognitive radio: a survey," Department of Electrical Engineering, University of Baghdad, Baghdad, Iraq, International Journal of Computer Networks & Communications (IJCNC) Vol.4, No.5, September 2012.

12. Yonghong Zeng, Ying-Chang Liang, Anh Tuan Hoang, and Rui Zhang, "A Review on SpectrumSensing for Cognitive Radio: Challenges and Solutions," Institute for Infocomm Research, Singapore 138632, Journal on Advances in Signal Processing Volume 2010, Article ID 381465, 15 pages doi:10.1155/2010/381465.

13. Praveen Kaligineedi, Majid Khabbazian and Vijay K. Bhargava, "Secure Cooperative Sensing Techniques for Cognitive Radio Systems," Department of Electrical and Computer Engineering University of British Columbia Vancouver, ICC 2008 proceedings.

14. Sohaib Ahmad, "Desicion making technique for cognitive radios." Master of Science in Electrical Engineering,Department of Telecommunication/Signal Processing/Internet system.

15. Rehan Ahmed & Yasir Arfat Ghous, "detection of vacant frequency bands in Cognitive Radio," Blekinge Institute of Technology May 2010.

16. Mehdi Ahmadi, "Modelling and Performance Evaluation of IEEE 802.22 Physical Layer," vol. 02, july2007.

17. N.Prasad "Cognitive Radio Network Architecture", Center for TeleInFrastruktur Aalborg University Aalborg, Denmark vol 02, july 2000.

18. Vandana Rohokale, Nandkumar Kulkarni, Neeli Prasad"Cooperative Opportunistic Large Array Approach for Cognitive Radio Networks", Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark, vol 01,july 2001.

529-532

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

112.

Authors:

N. Nafsin, H. M. M. A. Rashed

Paper Title:

Effects of Copper and Magnesium on Microstructure and Hardness of Al-Cu-Mg Alloys

Abstract: Aluminum alloys with a wide range of properties are used in engineering structures. Selecting the right alloy for a given application entails considerations of its tensile strength, density, ductility, formability, workability, weldability, and corrosion resistance, to name a few. Aluminum alloys are used extensively in aircraft due to their high strength-to-weight ratio. On the other hand, pure aluminum metal is much too soft for such uses, and it does not have the high tensile strength that is needed for airplanes and helicopters. Thus various alloying elements are added to aluminum to enhance the mechanical properties of aluminum. Copper has been the most common alloying element almost since the beginning of the aluminum industry, and a variety of alloys in which copper is the major addition were developed. Magnesium (Mg) used to strengthen and harden aluminum castings. The current research emphasizes establishment of relationship between microstructure and cold deformation behavior of aluminum-copper -magnesium alloys. Aluminum-copper-magnesium alloys with varying Cu% and Mg% were casted and their chemical compositions were determined using Optical Emission Spectroscopy (OES). These alloys undergone cold deformation after homogenization and their microstructures were examined using optical microscope. Finally the effects of deformations were studied by measuring the hardness of those alloys.

Keywords:
Aluminum alloy, microstructure, cold deformation, hardness.


References:

1. I. J. Polmear, Light Alloys, 1995.
2. H. N. Girisha, K. V. Sharma, Effect of magnesium on strength and microstructure of aluminum, copper, magnesium alloys, International Journal of Scientific Engineering and Research, 3 (2), 2012.

3. A. Zhu, B. M. Gable, G. J. Shiflet, E. A. Jr. Starke, Trace element eects on precipitation in Al–Cu–Mg–(Ag, Si) alloys: a computational analysis, Acta Materialia 52, 3671–3679, 2004.

4. S. Zhang, Q. Han, Zi-Kui Liu, Thermodynamic modeling of the Al–Mg–Na system, Journal of Alloys and Compounds 419, 91–97, 2006.

5. N. Saunders, The Modelling of Stable and Metastable Phase Formation in Multi-Component Al-Alloys, 9th International Conference on Aluminium Alloys, Brisbane, Australia, 2-5 August, 2004.

6. N. Saunders, Z. Guo, A.P. Miodownik and J.-Ph.Schillé, Modelling the Material Properties and Behaviour of Multicomponent Alloys, International Congress on FEM Technology with ANSYS CFX & ICEM CFD Conference, 22nd CAD-FEM Users’ Meeting, 2004.

7. T.E. Quested, A.T. Dinsdale, A.L. Greer, Thermodynamic modelling of growth-restriction eects in aluminium alloys, Acta Materialia 53, 1323–1334, 2005.

8. J. Lacaze and R. Valdes, CALPHAD-type Assessment of the Al–Mg–Si System”, Monatshefte ur Chemie 136, 1899–1907, 2005.

9. S. O. Adeosun, O. I. Sekunowo, S.A. Balogun, L.O. Osoba, Effect of Deformation on the Mechanical and Electrical Properties of Aluminum-Magnesium Alloy, Journal of Minerals & Materials Characterization & Engineering, 10 (6), 553-560, 2011.

10. A. Abdulhaqq, P. Hamid, S. Ghosh,, O. Jain, and R. Subrata, Processing, Microstructure and Mechanical Properties of Cast in-situ Al (Mg,Mn)-Al2O3(MnO2) Composites, Metallurgical and Materials Transactions A, 36A, 221, 2005.

11. N. Roy, A. Samuel and F. Samuel, Metallurgical and Materials Transactions, 27A, 415-429, 1996.

12. D. Lassance, M. Schmitz, F. Delannay and T. Pardoen, Linking Microstructure and High Temperature Ductility in Aluminum alloys AA6xxx, Seminar paper available online at: www.hallf.kth.se/forskning/ecf15/ECF-proceedings/Lassance, 2002.

13. R. Valiev, N. Krashkov and K. Tsenev, Plastic Deformation of Alloys with Submicron-grained Structure, Materials Science and Engineering A, 153 (3), 172-196, 1991.

14. R. S. Rana, R. Purohit, Effect of Magnesium Enhancement on Mechanical Property and Wear Behavior of LM6 Aluminum Alloy, International Journal of Scientific Engineering and Research, 3 (7), 2012.

533-536

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

113.

Authors:

Anupa.K, Channabasappa Baligar

Paper Title:

Real-Time Communication between Aero Gas Turbine Engine Controller and Pilot Online Monitoring System

Abstract: The application presented, is developed based on real-time systems which is built for a very small set of mission-critical applications like space craft’s , avionics and other distributed control systems. The modern software deals with external interfaces and has to consider various timing implications The platform is based on the VxWorks 5.4.2 and developed using Tornodo IDE 2.0.2 tool with the targeted deadline of 30 milliseconds at the baud rate of 9.6kbps. RS232 interface executes the role of Transportation and Communication, an interface cable used for serial communication between Digital Electronic Control Unit (DECU) and the host to transfer data to the pilot Online Monitoring System and that is based on Laboratory Virtual Instrument Engineering Workbench (LabVIEW )7.1.

Keywords:
Aero gas turbine engine, Digital Electronic Control Unit (DECU), Online Monitoring display, RS232 serial communication.


References:

1. Prindle.j. “A method for providing turnkey embedded computer operating systems for independently developed user applications in a military environment”, digital avionics system, 18th IEEE conference, vol-1, 1999, pp .A.5-2.A.5-8.
2. Xiao-feng WAN, Li-xiang CAI, Yi-si XING, “The Application of Data Communication between VxWorks and Ethernet”, IEEE International Conference on Industrial Mechatronics and Automation, 2009, pp 286-288.

3. Zhen Zhang,Yan Li,Yan “Design and implementation of control system software based on VxWorks Multitasks ”,IEEE 3rd international conference on advanced
computer theory and engineering (ICACTE),Vol-2, 2010,pp 285-288.

4. Kornecki.A.J; Zalewski.J; Eyassu.D “Learning Real-Time Programming Concepts through VxWorks Lab Experiments”, Software Engineering Education & Training, 13th IEEE Digital Object Identifier conference, 2000, pp 294-301.

5. Machacek, J.; Drapela, J. “Control of serial port (RS-232) communication in labview”, Modern Technique and Technologies IEEE International Conference, Vol-3, 2008, pp 36 - 40.

6. Xinghai Han; Xiangxin Kong “The Designing of Serial Communication Based on RS232”, IEEE International Symposium on Cryptography and Network Security, Data Mining and Knowledge Discovery, E-Commerce & Its Applications and Embedded Systems (CDEE), 2010, pp 382 – 384

537-540

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

114.

Authors:

A. Yasmine Begum, G.V.Venkata Marutheswar, K.Ayyappa Swamy

Paper Title:

Tuning of PID Controller for superheated Steam Temperature System using Modified Zeigler-Nichols Tuning Algorithm

Abstract: This paper explains the tuning of superheated steam temperature system using Modified Zeigler tuning Algorithm. PID control has a wide range of applications in industrial control. Since many process plants use PID to control the dynamics involved in the process. It has been found possible to set satisfactory controller parameters from less plant information than a complete mathematical model.The fifth order model of super-heated temperature system is converted into first order model with delay using process reaction curve method. The analog PID controller is designed for superheated steam temperature system using Modified Zeigler tuning algorithm and Zeigler Nichols algorithm and results are compared.

Keywords:
Criterion of Optimality Tuning Rules, Figures of Merit, Process reaction curve.


References:

1. Keyu Li, PID Tuning for Optimal Closed-Loop Performance with Specified Gain and Phase Margins, IEEE Transaction on Control Systems Technology, Vol. 21, No.3, May 2013.
2. Qibing Jin, FengHao and Qi Wang, IMC-PID Controller Based on Diagonal Equivalent Model for Multivariable Systems with Multiple Time Delays, Journal of Chemical Engineering of Japan, Vol. 46, No. 3, pp. 209–218, 2013

3. Astron K J and T Hagglund, PID controller theory design and tuning, Instrument society of America,19[95.

4. Astrom K J and T Hagglund, Automatic tuning of PID controllers, Instrument Society of America,1998.

5. Donald R Coughanowr, Process systems analysis and control, 2nd edition, Mc Graw-Hill, 1991.

6. George Stephanopolous, chemical process control: An introduction to theory and practice, PHI, New Delhi, 1999.

7. I J Nagarth and M Gopal Control system engineering. 2nd edition, new age International, India,2000.

8. M Chindambaram, Applied process control, Allied publishers limited, India, 1998.

9. F J Shinskey, process control systems: Application, design & adjustment, Mc Graw-Hill,1988.

10. The Bharath Heavy Electricals Limited, Hyderabad: Transfer function of a super heated steam temperature system of 500MW boiler, R&D technical information sheet.

11. Astrom K J & T Hagglung(1984 C), A frequency domain approach to analysis and design of simple feedback loops,Proceedings of the 23rd IEEE conference on decision and control, Las Vegas.

12. Gawthrop P J (1982), Self tuning PI and PID controllers, IEEE conference on applications of Adoptive and Multivariable control, Hull.

13. Tyreus B D W I Luyben, Tuning of PI controllers for integrator/dead time processes, ind.eng.chem. Res., 31, 2625-2628(1992).

541-543

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

115.

Authors:

Mohammed Saleh Al.Ansari

Paper Title:

The Water Demand Management in the Kingdom of Bahrain

Abstract: Many factors affect the availability and sustainability of the water supply in Bahrain: climate change, water quality, pollution, and the production capacity of new technologies and non-conventional methods. With growing demand due to climate change, booming industrial complexes and population growth, groundwater abstraction is no longer a sustainable water resource on its own and other methods must be put to increasing use. In Bahrain, non-conventional methods such as desalination and treated sewage effluents (TSE) are increasingly used to meet the water demand for agricultural, municipal and industrial purposes. Pollution, seawater intrusion and other issues continue to thwart non-conventional water resource methodologies and services, creating a bottleneck for the water demand. Water conservation methods for managing the water demand seem promising in all sectors and at all levels, including transmission and household level use.

Keywords:
Water Resources, Virtual Water, Desalination


References:

1. Basheer et al, "Country Paper about Bahrain, Development of Water Resources", UNEP, 2001.
2. Economic Overview, Kingdom Of Bahrain, http://www.gulfbase.com/site/interface/thegcc/ bahrain/economy.html

3. Electricity and Water Authority, "Electricity and Water 15 Year master Plan 2006 – 2020", Final Report and Volumes 1-7, Kingdom of Bahrain, September 2006

4. Presentation. Water Conservation: Optional or Obligatory?

5. Bingham, Anne. Demand management gains importance as water supply runs low. Water Resource Management, February 1995, 14-17.

544-554

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

116.

Authors:

Manju Pillai, Pramila Adavi

Paper Title:

Electronic Contract Management

Abstract: The world today is moving on to paperless process to reduce manual intervention and come up with a flawless system. Contract management is an important issue in construction industry. Managing contracts in construction organization is cumbersome due to multiple stakeholders being involved in the process, Hence the need for managing the contracts in a systematic and organized manner. Electronic Contract Management forms an aid to managing multiple contracts in a construction organization. Electronic contract management is a system having constant process of ensuring that a contract is well structured and reviewed appropriately. This system will streamline the business process by reducing the time taken to create, review, execute, and approve contracts. This in turn would ease activities like tracking, central storage of contract documents, and reduction in disputes. Electronic contract management would thus minimize risks associated with manual data entry. Key objectives of electronic contract management are
1. Ensure easy access to contract information

2. Improvised Contract workflow

3. Flawless billing system

This paper illustrates more on Electronic contract management which automates and simplifies the lifecycle process associated with creating and managing the contracts or legally binding agreements.


Keywords:
Electronic contract management, Contract management process, Contract change process.


References:

1. The Chartered institute of Purchasing and Supply ‘Contract Management Guide’
2. International Association of Contract and Commercial Managers (IACCM)

3. FIDIC Website

4. Australian Government ‘Public Private Contract Management’

5. Chang, A. and Ibbs, C. (1998). ”On-Call Contracting Strategy and Management.” J. Manage. Eng.,14(4), 35–44, TECHNICAL PAPERS. Journal of management in engineering, Volume 14, Issue 4 (July 1998)

6. Cheung, S., Yiu, K., and Chim, P. (2006). ”How Relational are Construction Contracts?” J. Prof. Issues Eng. Educ. Pract., 132(1), 48–56.Legal affairs section. Journal of Professional issues in engineering education and practice,Volume 132, Issue 1 (Jan 2006)

7. Shumway, R., Richard, A., and Ritti, J. (2004). ”New Trends and Bad Results in Construction Contracts, Part I.” Leadership Manage. Eng., 4(3), 93–98.

8. Thomas, H., Smith, G., and Wright, D. (1990). ”Resolving Disputes over Contract Notice Requirements.” J. Constr. Eng. Manage.,116(4), 738–755.

555-557

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

117.

Authors:

Sunil Gupta, Harsh K Verma, A L Sangal

Paper Title:

Security Attacks & Prerequisite for Wireless Sensor Networks

Abstract: Due to encroachment of software and hardware developed and its technology a feasible network can be composed of small, inexpensive sensor with several attributes. Security is one of major concern for wireless sensor networks (WSN) because of lots of their critical applications. This paper describes the security attacks and its prerequisite and vulnerability for processing and collecting the information in WSN.

Keywords:
security attacks, wireless sensor network, requirements and vulnerabilities.


References:

1. R. Di Pietro et al. / Ad Hoc Networks 1 (2003) 455–468 459• Backward secrecy. Given that an adversary managed to recover a contiguous subset of session keys, no previous session keys can be recovered.
2. D.Wood and J. A. Stankovic, ―Denial of service in sensor networks, Computer, vol. 35, no. 10, pp. 54–62, 2002.

3. F. Akyildiz et al., ―A Survey on Sensor Setworks, IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102–114.

4. Y. Wang, G. Attebury, and B. Ramamurthy, ―A Survey of Security Issues in Wireless Sensor Networks, IEEE Commun. Surveys Tutorials, vol. 8, pp. 2–23, year 2006.

5. L. Eschenauer and V.D. Gligor, ―A key-management scheme for distributed sensor networks, In Proceedings of the 9th ACM Conference on Computer and Networking, pp. 41- 47, Nov 2002.

6. E. Crawley et al., ―A Framework for QoS-Based Routing in the Internet, RFC 2386, http://www.ietf.org/rfc/rfc.2386.txt, Aug. 1998

7. S. Tilak, N. Abu-Ghazaleh and W. Heinzelman, ―A taxonomy of wireless micro-sensor network communication models, ACM Mobile Computing and Communication Review(MC2R), June 2002.

8. Pfitzmann, M. Kohntopp, Anonymity, unobservability and pseudonymity – a proposal for terminology, in: Hannes Federath(Ed.), Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science (LNCS), vol. 2009, Springer-Verlag, 2001, pp. 1–9

9. A.D. Wood and J.A. Stankovic, ―Denial of service in sensor networks, IEEE Computer, Vol. 35, No. 10, pp. 54-62, 2002.

10. Adrian Perrig, John Stankovic, David Wagner, ―Security in Wireless Sensor Networks Communications of the ACM, Page53-57, year 2004

11. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, ―A survey on sensor networks, IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, August 2002.

12. X. Wang, W. Gu, K. Schosek, S. Chellappan, and D. Xuan, ―Sensor network configuration under physical attacks,, Technical report (OSU-CISRC-7/04-TR45), Department of Computer Science and Engineering, Ohio State University, July 2004.

13. Biswas and Md. Liaqat Ali, ―Security threats in Mobile Ad-Hoc Network, Master Thesis, Blekinge Institute of Technology Sweden, 22nd March 2007

14. M.T.Refaei, V.Srivastava, L.Dasilva, M.Eltoweissy, ―A Reputation-Based Mechanism for Isolating Selfish nodes in Ad-Hoc Networks, Second Annual International Conference on Mobile and Ubiquitous Systems, Networking and Services, pp.3-11, July, 2005.

15. N.Shanti, Lganesan and K.Ramar, ―Study of Different Attacks On Multicast Mobile Ad-Hoc Network.

16. C.Wei, L.Xiang, B.yuebin and G.Xiaopeng, ―A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks, Second International Conference on Communications and Networking in china, pp.366-370, Aug, 2007.

17. C. Perkins and E Royer, ―Ad Hoc On-Demand Distance Vector Routing, 2nd IEEE Wksp. Mobile Comp. Sys. And Apps., 1999.

18. C. Karlof and D. Wagner, ―Secure routing in wireless sensor networks: Attacks and countermeasures, AdHoc Networks Journal, vol. 1, no. 2–3, pp. 293–315, September 2003.

19. Pathan, A.S.K.; Hyung-Woo Lee; Choong Seon Hong, ―Security in wireless sensor networks: issues and challenges Advanced
Communication Technology (ICACT), Page(s):6, year 2006
20. Zia, T.; Zomaya, A., ―Security Issues in Wireless Sensor Networks, Systems and Networks Communications (ICSNC) Page(s):40 – 40,

558-566

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

118.

Authors:

Ganesan. V*, Aruna Devi. J, Astalakshmi. A, Nima. P., Thangaraja. A

Paper Title:

Eco- Friendly Synthesis of Silver Nanoparticles using a Sea Weed, Kappaphycus Alvarezii (Doty) Doty ex P.C.Silva

Abstract: The present study is aimed to investigate the ability of Kappaphycus alverazii to reduce silver nitrate into silver nanoparticles. The sea weed, Kappaphycus alverazii was collected from the coasts of Rameswaram, Ramanathapuram district of Tamil Nadu, India. The sea weed broth was prepared and resuspended in an aqueous solution of 1mM silver nitrate in 250ml Erlenmeyer flask. This mixture is known as reaction medium. The reduction of silver nitrate into silver nanoparticles in the reaction medium was monitored by keeping it in an incubator cum shaker with 250 rpm at 27°C for 96hours. From this reaction medium, a small aliquot of the sample was used for the characterization of silver nanoparticles through UV-Visible spectroscopic analysis, Fourier Transform Infrared (FTIR) spectral analysis, X-Ray diffraction (XRD) analysis, Scanning Electron Microscopic (SEM) and Energy Dispersive X-ray (EDX) analyses. The time dependant spectral analysis provides the evidence of synthesis of nanoparticles. The FTIR analysis explains the stability of silver nanoparticles that are synthesized by the sea weed. The XRD analysis gives the structural information of nanoparticles. The SEM and EDX analyses confirmed the synthesis of nanoparticles. Thus eco-friendly synthesis of silver nanoparticles is achieved using the sea weed, Kappaphycus alverazii, as there is no involvement of toxic chemicals as reducing agents in this biological synthesis.

Keywords:
Kappaphycus alverazii, silver nanoparticles, eco-friendly synthesis, sea weed broth, reaction medium.


References:

1. D. Mandal, M. Bolander, D. Mukhopadhay, G. Sarkar, and P. Mukherjee, The use of microorganisms for the formation of metal nano particles and their applications. Appl. Microbiol. Biotechnol. 2006,69. 458 – 492p.
2. L. Du, H. Jiang, X. Li, E. Wang, Biosynthesis of gold nano particles arsisted by Escherichia coli DH5a and its application on directelectrochemistry of hemoglobin. Electrochem. Comm.. 2007, 9. 1165-1170p.

3. I. Sondi, and B. Salopek-Sondi, Silver nanoparticles as antimicrobial agents a case study on E. coli as a model for Gram negative bacteria. J. Colloidinterface and science. 2004,275.117-182p.

4. A. Hutten, W. Saikaly, G. Thomas, New magnetic nano particles for biotechnology. J. Biotechnol 2004, 112. 47-63p.

5. D. Bhattacharya, and G. Rajinder, Nanotechnology and potential of microorganisms. Crit Rev Biotechnol.Crit Rev Biotechnol.. 2005, 25. 199-204p.

6. K. M. Moghaddam, An introduction to microbial metal nano particle preparation method.J. Young Investigation 2010, p19.

7. G.M. Whitesides, The right side in nanobiotechnology Biotechnol. 2003, 21. 1161-1165p.

8. Y. Zhou, S.H. Yu, X.P. Cui, C.Y. Wang, and Z.Y. Chen,. Formation of silver nano wires by a novel solid- liquid phase are discharge method. Chem. Mater. 1999,
11. 545-546p.

9. Y.Y. Yu, S.S. Chang, C.L. Lee, and C.R.C. Wang, Gold nanorods: Electro Chemical synthesis and optical properties.J. Phys. Chem. Biotechnol. 1997, 101. 6661-6664p.

10. Z. G. Canizal, J. A. Ascencio, J. Gardea-Torresday, and M. Jose-Acaman, Multiple twinned gold nanorods grown by bio reduction technjqes, J.Nanopart Res. 2001, 3. 475 – 481p.

11. F. Mouxing, L. Qingbiao, S. Daohua, L. Yinghua, H. Ning, D. Xu, Huixuan.,W and Jiale, H. Rapid preparation processes of silver nano particles by bioreduction and their characterization. Chin.J.Chem.Eng. 2003, 14. 114- 117p.

12. S. He, Z. Guo,, Z. Yu, S. Zhang, J. Wang, and N. Gu, Biosynthesis of gold nanoparticles using the bacteria Rhodopseudomonas capsulata. Materials Letters. 2007, 61. 3984-3987p.

13. A. Leela, and M.. Vivekanandan, Tapping the unexploited plant resource for the synthesis of silver nano particles. Afr. J. Bioitechnol. 2008, 7. 3162- 3165p.

14. V. Veena, P. Nima, and V. Ganesan, Green synthesis of silver nanoparticles using Enicostema hysopifolium and Rauvolfia tetraphylla leaf broth. J. Advanced Biotech. 2011, 11. 06-10.

15. J. R. Morones, J.L. Elechiguerra, A. Camacho Bragado, and H.M.J, Lara Yacaman, Interaction of silver nanoparticles with HIV- 1. J. Nanotech. 2005, 3. 6-15p.

16. G. Singaravelu, J.S Arockiamary, V. Ganesh kumar, and K.. Govindaraju, A novel extracellular synthesis of monodisperse gold nanoparticles using marine alga, Sargassum wightii Greville. Colloids Surf. B Biointerfaces.; 2007, 57:97-101.

17. T.C. Prathna, L. Mathew, N. Chandrasekaran, A. M. Raichur, and A. Mukherjee, Biomimetic synthesis of nanoparticles: Science, Technology & Applicability, Edited A. Mukherjee, In Tech Publishers, Croatia, 2010, pp1-20.

18. Mubarak Ali, D., Sasikala, M., Gunasekaran, M., and Thajuddin. Biosynthesis and characterization of silver nanoparticles using marine Cyanobacterium, Oscillatoria willei NTDM01. Dig.J. Nanomater. Bios.. 2011, 6: 385-390.

19. P. Kumar, S. Senthamil Selvi, A. Lakshmi Prabha, K. Prem Kumar, R. S. Ganeshkumar, and M. Govindarajau, Synthesis of silver nanoparticles from Sargassum tenerrimum and screening phytochemicals for its antibacterial activity. Nano Biomed. Eng. 2012, 4:12-16.

20. S. Murugesan, M. Elumalai, and R. Dhamotharan, Green synthesis of silver nanoparticles from marine alga Gracilaria edulis. Biosci. Biotech. Res. Comm. 2011, 4: 105-110.

21. M. Mahdieh, A. Zolanvari, A. S. Azimee, and M. Mahdieh, Green synthesis of silver nanoparticles by Spirullina platensis. Scientia Iranica 2012, F 19: 926-929.

22. S. Swaminathan, S. Murugesan, S. Damodarkumar, R. Dhamotharan, and S. Bhuvaneshwari, Synthesis and characterization of gold nanoparticles from alga Acanthophora specifera (VAHL) Boergesen. Int. J. Nano Sci and Nanotechnol. 2011, 2: 85-94.

23. D. Devina Merin, S. Prakash, B. Valentine Bhimba, Antibacterial Screening of silver nanoparticles synthesized by marine micro alga. Asian Pacific J. Tropical medicine. 797-2010, 799.

24. C. Nabanita, B. Anupam, L. Susanta, P. Arpita, G. Amar Nath, and P. Ruma, Biorecovery of gold using Cyanobacteria and an eukaryotic alga with special reference to nanogold formation – a novel phenomenon. J. Appl Phycol. 2009,21: 145-152.

25. S. Rajesh, D. Patric Raja, J. M. Rathi, and K. Sahayaraj, Biosynthesis of silver nanoparticles using Ulva fasciata (Delite) ethyl acetate extract and its activity against Xanthomonas campestris pv. Malvacearum. J Biopest. 2012, 5: 119-128.

26. J. Suriya, S. Bharathi Raja, V. Sekar, and R.