Volume-3 Issue-4

  • Version
  • Download 170
  • File Size 4.00 KB
  • Create Date September 1, 2017
  • Download

 Download Abstract Book

S. No

Volume-3 Issue-4, April 2014, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



T.S.Keerthiga, S.Sarika

Paper Title:

Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols

Abstract:    Secure multiparty protocols is used as third party protocols in the data hiding and security. The major problem is, there is no Security Scheme operated for Data Storage Services between Multi Party protocols.  To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information. The system deals with Generalization approach, with a common Identification. Suppression approach, used for Hiding User Identity. In the secure random key algorithm, an Authentication Key is generated before a user change/update the data for Verification. Entire Data is encrypted to ensure Security.

  Security, Privacy, k-anonymity, Multi Party protocols.


1.        Mehmet Ercan Nergiz,Abdullah Ercument Cicek,Thomas B.Pedersen,and Yucel Saygin,”A Look-Ahead Approach to Secure Multiparty Protocols”,IEEE Transactions on knowledge and data engineering,VOL.24,NO.7,JULY 2012.
2.        M.Kantarclu and C.Clifton, “Privacy-Preserving Distributed Mining of association Rules on Horizontally Partitioned Data,”IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9,pp. 1026-1037,Sept. 2004.

3.        R.C.-W. Wong, J. Li, A.W.-C. Fu, and K. Wang, “(α, k)-Anonymity:An Enhanced K-Anonymity Model for Privacy Preserving Data Publishing,” Proc. 12th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ’06), pp. 754-759, 2006.

4.        B.-C. Chen, K. LeFevre, and R. Ramakrishnan,“Privacy Skyline:Privacy with Multidimensional Adversarial Knowledge,” Proc.33rd Int’l Conf. Very Large Data Bases (VLDB ’07), pp. 770-781, 2007.

5.        S.R. Ganta, S.P. Kasiviswanathan, and A. Smith, “CompositionAttacks and Auxiliary Information in Data Privacy,” Proc. 14thACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining(KDD ’08), pp. 265-273, http://doi.acm.org/10.1145/1401890.1401926, 2008.

6.        G.Ghinita,P.Karras,P.Kalnis,and N.Mamoulis,”Fast Data Anonymization with Low Information Loss”,Proc.33rd Int’l conf.Very Large Data Bases(VLDB’07),PP.758-769,2007.

7.        M.E.Nergiz,M.Atzori,andC.Clifton,”Hiding the presence of individuals in Shared Databases”,Proc.ACM SIGMOD Int’l Conf.Management of Data(SIGMOD’07),June-2007





T. Hemanth Kumar, P. Swaminathan, M. Mohanraj

Paper Title:

Modeling and Simulation of an Intelligent Power Conversion System for Photovoltaic Generation

Abstract:    This paper represents a simulation and design of two types of Maximum Power Point Tracking (MPPT) algorithm methods is proposed. Here the PV system is composed to a boost converter which can perform with those algorithm methods. In this the algorithm methods are Perturb and Observe (P&O) and Probability of Neural Network (PNN). The probability of neural network which can be deals with the neurons and can be included the neural based Maximum Power Point Tracking. By using these different MPPT techniques we can maximize the PV array output which can be track continuously from the solar panel’s temperature and irradiation. These MPPT techniques can be explained by using the MATLAB.

   Solar Module, Maximum Power Point Tracking (MPPT), Perturb and Observe (P&O) and Probability of Neural Network (PNN).


1.        Samer Alsadi, Basim Alsayid "Maximum Power     Point Tracking Simulation for Photovoltaic Systems Using Perturb and Observe Algorithm" International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012.
2.        David Sanz Morales "Maximum Power PointTracking Algorithms for Photovoltaic Applications"Thesis submitted for examination for the degree ofMaster of Science in Technology. Espoo 14.12.2010.

3.        J. Surya Kumari and Ch. Sai Babu Mathematical Modeling and Simulation of Photovoltaic Cell using  Matlab-Simulink Environment International Journal of Electrical and Computer Engineering (IJECE) Vol. 2, No. 1, February 2012, pp. 26~34.

4.        M.Lokanadham, K.Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012, pp.1420-1424.

5.        M.C. Di Piazza, M. Pucci, G. Vitale ConsiglioNazionale delle Ricerche, Istituto di Studi sui Sistemi Intelligenti per l'Automazione (ISSIA - CNR), sezione di Palermo, via Dante 12, 90141 Palermo, Italy.

6.        Donald F . Specht "Probabilistic Neural Network" Neural Networks, Vol. 3, pp. 109-118, 1990

7.        Mahmoud A. younis, Tamer khatib, Mushtaq najeeb, A Mohd ariffin przegl?d elektrotechniczny  (Electrical Review), ISSN 0033-2097, R. 88 NR 3b/2012.

8.        Vincent Cheung, Kevin Cannons, Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba June 10, 2002.





Khalilimard, Hussein

Paper Title:

How Construction Errors Affecting the Bearing Capacity of the Concrete Beams? Inelastic Deflection of Concrete I-Beams

Abstract:    Reinforced concrete I-beams are widely used in bridge construction. The span length to beam height ratio in these decks is sometimes between 15 and 30. Due to the widespread utilization of these bridges and their heavy traffic loads, special attention must be directed at recognizing the behaviors that lead to construction errors associated with these structures. Because of various construction and environmental factors, construction faults might result in concrete quality or during concrete placement which can consequently lead to inhomogeneities in beam sections. This means that concrete density and compressive strength in the beam cross section might deteriorate along the section height. Extensive research has been conducted on the non-linear and inhomogeneous behavior of concrete beams. However, few researchers have specifically addressed density and compressive strength variations along beam cross sections. The present research is aimed at estimating from elastic material parameters, the concrete I-beam inelastic deflection resulting from inhomogeneous behavior along the beam cross sectional height. The behavior of the beam under study was checked by comparing its relevant parameters with the results obtained from the OpenSees Software and the method proposed in the Concrete Code ACI318. Excellent agreement was observed in both cases. Moreover, a value of unity was proposed for parameter “n” in the relation set forth by Branson in the Concrete Code ACI318 for estimating section cracking moment in long span I-beams.

   Inelastic Deflection, Concrete Beam, Inhomogeneity, Cracked section, Construction errors.


1.       Joseph E. Wickline (2002) "A Study of Effective Moment of Inertia Models For Full-Scale Reinforced Concrete T-Beams Subjected To a Tandem-Axle Load Configuration
2.       Y.Y. Chang1, et. al. (2004) "A Simplified Method For Nonlinear Cyclic Analysis of Reinforced Concrete Structures: Direct And Energy Based Formulations", 13th World Conference on Earthquake Engineering, Vancouver, B.C., Canada, Paper No. 2830.

3.       Abd El Aziz, Mohamad Fathy. (2006) "Non-linear analysis of concrete beams prestressed and post-tensioned with carbon fiber reinforced polymer (CFRP) bars", Electronic Theses and Dissertations.

4.       Cengiz Dundar, Ilker Fatih Kara (2007) "Three dimensional analysis of reinforced concrete frames with cracked beam and column elements", Engineering Structures 29, 2262–2273.

5.       Bischoff, P. H. and Scanlon, A. (2007) “Effective Moment of Inertia for Calculating Deflections of Concrete Members Containing Steel Reinforcement and Fiber-Reinforced Polymer Reinforcement”, ACI Structural Journal, Vol. 104, No. 1, pp. 68-75.

6.       ACI-CRC Final Report (2008) “A Study of Static and Dynamic Modulus of Elasticity of Concrete”.

7.       M. Ahmed et. al. (2008) "Effect of Concrete Cracking on The Lateral Response of RCC Buildings", Asian Journal of Civil Engineering (building and housing) Vol. 9, No. 1 (2008), pp. 25-34.

8.       İlker Kalkan (2010) "Deflection Prediction for Reinforced Concrete Beams Through Different Effective Moment of Inertia Expressions", Int. J. Eng. Research & Development, Vol. 2, No. 1.

9.       Bischoff, P. H., and Gross, S. P. (2011) “Equivalent moment of inertia based on integration of curvature.” Journal of Compos. Constr., 15(3), 263–273.

10.     Kulkarni S.K. et. al. (2012) "Elastic Properties of RCC Under Flexural Loading-FE Approach", World Research Journal of Civil Engineering, ISSN: 2277-5986 & E-ISSN: 2277-5994, Vol. 2, Issue 1, 2012, pp.-30-33.

11.     S. Roohollah Mousavi and M. Reza Esfahani (2012), "Effective Moment of Inertia Prediction of FRP-Reinforced Concrete Beams Based on Experimental Results", Journal of Composites For Construction © ASCE / September/October 2012 16:490-498.

12.     Jing Bo An (2012) "Nonlinear Analysis for Bending Cross Section of Tensile-Compression Prestressed Concrete Beam", Applied Mechanics and Materials, 204-208, 4538.

13.     Amadio, Claudio et. al. (2012) "Evaluation of the deflection of steel-concrete composite beams at serviceability limit state", Journal of constructional steel research, Vol. 73 , p. 95-104. ISSN 1873-5983.

14.     Lin, X. and Zhang, Y. (2013) "Novel Composite Beam Element with Bond-Slip for Nonlinear Finite-Element Analyses of Steel/FRP-Reinforced Concrete Beams", J. Struct. Eng. , 10.1061/(ASCE)ST.1943-541X.0000829 , 06013003.

15.     Shahida Manzoor, Shuaib Ahmad (2013) "Ductility of RC Beams using Grade 72.5 Re-bar Steel", International Journal of Civil & Environmental Engineering IJCEE-IJENS Vol:13 No:03, p 5-8.

16.     Naser Kabashi et al., (2013) "Behaviour of concrete elements under the transversal forces and strengthening with the FRP", 2nd International Balkans Conference on Challenges of Civil Engineering, BCCCE, Epoka University, Tirana, Albania.

17.     Alameer Ali (2013) "Behaviour of Prestressed Ultra-High Performance Concrete I-Beams Subjected to Shear and Flexure", A thesis submitted to the Faculty of Graduate and Postdoctoral Studies, University of Ottawa, Canada

18.     S. B. Kandekar et. al. (2013) "Concrete Grade Variation in Tension and Compression Zones of RCC Beams", International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319-8753, Vol. 2, Issue 8

19.     Md Shahnewazv (2013) "Shear Behavior of Reinforced Concrete Deep Beams Under Static and Dynamic Loads", Bangladesh University of Engineering and Technology.

20.     Patel, Vipulkumar Ishvarbhai (2013) "Nonlinear inelastic analysis of concrete-filled steel tubular slender beam-columns", PhD thesis thesis, Victoria University.

21.     Amini Najafian H et. al. (2013) "Comparative assessment of finite element and strut and tie based design methods for deep beams", Magazine of Concrete Research, Vol:65, ISSN:0024-9831, Pages:970-986

22.     Bukhari IA et al. (2013) "Shear Strengthening of Short Span Reinforced Concrete Beams with CFRP Sheets", Arabian Journal for Science and Engineering, Vol:38, ISSN:1319-8025, Pages:523-536

23.     Stochino, Flavio (2013) "Flexural models of reinforced concrete beams under blast load", Doctoral Thesis, Universita' degli Studi di Cagliari.

24.     ACI 318 (2008) "Building Code Requirements for Reinforced Concrete and Commentary", American Concrete Institute, Michigan.





D. Usha Nandini, Ezil Sam Leni, M. MariaNimmy

Paper Title:

Mining of High Utility Itemsets from Transactional Databases

Abstract:    Efficient discovery of high utility itemsets from transactional databases crucial task in data mining. UP-Growth and UP-Growth+ algorithms are proposed for mining high utility itemsets. In this paper we also proposed a compact tree structure, called Utility pattern tree (UP-Tree) and it maintains the information of high utility itemsets. Previously we proposed FP-Growth algorithm for mining only large number of frequent itemsets, but not generate the high utility itemsets. They have the issue of producing large number of candidate itemsets and probably it degrades mining performance in terms of speed and space requirement. However, our previous study needs more space and execution time. Many algorithms are used to show the performance of UP-Growth and UP-Growth+. UP-Growth and UP-Growth+ becomes more efficient since database contain long transactions and generate fewer number of candidates than FP-Growth. The experimental results and comparison validate its effectiveness.

   Candidate pruning, Data mining, Frequent itemset, High utility itemset.


1.        R. Srikant and R. Agrawal, “Fast algorithms for mining association rules,” in Proc. of The 20th VLDB Conf,”  pp. 487-499, 1994.
2.        R. Agrawal, Imielinski. T and A. Swami, “Mining association rules between sets of items in large databases”, in proceedings of the ACM SIGMOD International Conference on Management of data, pp. 207-216, 1993.

3.        R. Agrawal and R. Srikant, “Mining Sequential Patterns,” in Proc. of the 11th Int’l Conference on Data Engineering, pp. 3-14, Mar 1995.

4.        Liu. Y, Liao. W, A. Choudhary, ”A Fast High Utility Itemsets Mining Algorithm,” In: 1st Workshop on Utility-Based Data Mining. Chicago Illinois, 2005.

5.        A.W.C. Fu, C.H. Cai, C.H. Cheng, and W.W. Kwong, “Mining Association Rules with Weighted Items,” Proc. Int’l DB Engineering and Apps Symp. (IDEAS ’98), pp. 68
77, 1998.

6.        Tanbeer. S.K., C.F. Ahmed, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE Trans. Knowledge and Data Engineering, vol. 21, no. 12, pp. 1708-1721, Dec. 2009.

7.        J. Yang, W. Wang, and Yu. P, “Efficient Mining of Weighted Association Rules (WAR),” Proc. ACM SIGKDD Conference. Knowledge Discovery and Data Mining (KDD ‘00), pp. 270-274, 2000.

8.        Tao. F, Farid. M, and F. Murtagh, “Weighted Association Rule Mining Using Weighted Support and Significance Framework,” Proc. ACM SIGKDD Conf. Knowledge 
9.        Erwin. A, Gopalan. R.P, Achuthan. N.R., “A Bottom-Up Projection Based Set of rules for Mining High Utility Itemsets,” In: International Workshop on Integrating AI and Data Mining. Gold Coast, Australia, 2007.
10.     Tseng V.S, C.W. Wu, B.E. Shie, and P.S. Yu, “UP-Growth: An Efficient Algorithm for High Utility Itemsets Mining,” Proc. 16th ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’10), pp. 253-262, 2010.

11.     Han. J, J. Pei, Yin. Y, “Mining frequent patterns without candidate generation,” In: ACM SIGMOD International Conference on Management of Data, 2000.

12.     S.J. Yen and Y.S. Lee, “Mining High Utility Quantitative Association Rules.” Proc. Ninth Int’l Conf. Data Warehousing and Knowledge Discovery (DWK), pp. 283-292, Sept. 2007.

13.     U. Yun, “An Efficient Mining of Weighted Frequent Patterns with Length Decreasing Support Constraints,” Knowledge-Based Systems, vol. 21, no. 8, pp. 741-752, Dec 2008.

14.     Y.-C. Li, C.C. Chang and J.S. Yeh, “Isolated Items Discarding Strategy for Discovering High Utility Itemsets,” Data and Knowledge Engineering, vol. 64, no. 1, pp. 198-217, (Jan 2008).

15.     http:// fimi.cs.helsinki.fi/, 2012.Frequent Itemset Mining Implementations Repository,





P.Chandra Sekhar, M.V.Sai Tej, U.N.S.Vijayshri, J.Nitish Kumar

Paper Title:

Design and Implementation of Microwave Inverted ‘L’ and ‘J’ Filter

Abstract:    In this paper, a filter is proposed using micro strip, series of patch. S-parameters, return loss and VSWR are calculated for the filter. A reference filter is designed using a series of patches and is modified into an inverted L and J line filter (proposed filter). The proposed filter can be easily implemented and has excellent filter characteristics which are near to the ideal filter. There are many practical applications of this filter for example in microwave radio relay communication systems, radio astronomy, RADAR. The entire simulation is done using CST Microwave Studio.

   Filter, micro strip, return loss, S-parameters, VSWR, transmission coefficient.


1.        David M. Pozar, “Microwave Engineering”, John Wiley & Sons, Inc., Fourth Edition, 2011.
2.        Constantine A. Balanis, “Antenna Theory: Analysis and Design”, John Wiley & Sons, Inc., Second Edition, 1997.

3.        Mathew M. Radmanesh, “Advanced Rf & Microwave Circuit Design: The Ultimate Guide to Superior Design”, Author House, 2009.

4.        P. Chandra Sekhar, et.al, “Performance Evaluation of Various filters at X band Frequency”, 10th IEEE International conference on Wireless and Optical Communication Networks (WOCN)-2013, pp.1-5, July 2013.

5.        Lotfi Neyestanak A.A, “Ultra wideband rose leaf microstrip patch antenna,” Progress in Electromagnetic Research, Vol. 86, pp.155-168, 2008.

6.        Roger L Freeman, “Fundamentals of Telecommunications”, John Wiley & Sons, Second Edition. Aug 2013.

7.        Ian C Hunter, “Theory and Design of Microwave Filters”, The institution of Electrical Engineers, 2001.

8.        Bates, R. N, “Design of microstrip spur-line band-stop filters,” Microwave, Optics and Acoustics, Vol. 1, No. 6, 1977.

9.        Computer Simulation Technology, CST studio suite 2010.

10.     H.W. Wu, S.K.  Liu, M.H. Weng, C.H. Hung, “Compact microstrip band pass filter with multi spurious Suppression,” Progress in Electromagnetic Research, Vol. 107, pp.21-30, 2010.

11.     Chin K.S. and D.J. Chen, “Novel microstrip band pass filters using direct-coupled triangular stepped-impedance resonators for spurious suppression.” Progress in Electromagnetic Research Letters, Vol. 12, pp. 11-20. 2009.

12.     A K Tiwary and N Gupta, “Performance of two microstrip low pass filter on EBG ground plane”, Microwave Review, Vol. 15, No. 2, pp, 37-40, Dec. 2009.

13.     J S Hong, M J Lancaster, Microwave Filters for RF/Microwave Applications, New York: John Wiley and Sons, Inc; 2001.





Zaki Majeed AbduAllah, Omar Talal Mahmood, Ahmed M. T. Ibraheem AL-Naib

Paper Title:

Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller

Abstract:   This paper presents the design and practical implementation of a buck-type power converter for Photovoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking (MPPT) algorithm. A buck converter is used to regulate battery charging. The system is controlled by a Peripheral Interface Controller (PIC) 16F877A microcontroller from Microchip via sensing the solar panel voltage and generating the Pulse Width Modulation (PWM) signal to control duty cycle of the buck converter. This type of microcontroller was chosen because it has the necessary features for the proposed design such as built-in Analog-to-Digital Converter (ADC), PWM outputs, low power consumption and low cost. Simulation and experimental results demonstrate the effectiveness and validity of the proposed system.

   Photovoltaic, MPPT, Buck Converter, PIC16F877A.


1.        S. Masri, P. Chan,“Development of a Microcontroller Based Boost Converter for Photovoltaic System ”, European Journal of Scientific Research, ISSN 1450-216X,Vol. 41 No.1, pp.38-47, 2010.
2.        Zhengshicheng, L. Wei, “Research and Implementation of Photovoltaic Charging System with MPPT”,  3rd IEEE Conference on Industrial Electronics and Applications, pp.619-624, 2008.
3.        M.H. Rashid, “Power Electronics Handbook”, Second Edition, ISBN 13-978-0-12-088479-7, 2007.
4.        M.A.S. Masoum, H. Dehbonei, E.F. Fuchs, “ Theoretical and Experimental Analyses of Photovoltaic Systems with Voltage and Current-Based MPPT ”, IEEE Transactions on Energy Conversion, Vol. 17, No. 4, pp.514-522, December 2002.
5.        E Koutroulis, K. Kalaitzakis, N.C. Voulgaris, “Development of a Microcontroller Based Photovoltaic MPPT Control System”, IEEE Transactionson Power Electronics, Vol. 16, No. 1, pp.46-54, January 2001.
6.        M.S. Rahman, “Buck Converter Design Issues”, Master thesis performed in division of Electronic Devices, 2007.
7.        PIC16F87XA Data Sheet DS39582B, Microchip Technology, Inc.





Rathod Balasaheb S, Satish. M. Rajmane

Paper Title:

A Case Study on Design of a Flywheel for Punching Press Operation

Abstract:    A flywheel is the heavy rotating mass which is placed between the power source and the driven machine to act as a reservoir of energy. It is used to store the energy when the demand of energy of energy is less and deliver it when the demand of energy is high. The current paper is focused on the analytical design of arm type of flywheel which is used for punching press operation. Now in regard to the design of flywheel it is required to decide the mean diameter of the flywheel rim, which depends upon two factors such as availability of space and the limiting value of peripheral velocity of the fly wheel. However the current design problem is formulated for punching machine which has to be make holes of 30 holes/minute in a steel plate of 18mm thickness with space limitation that is the diameter of flywheel should not exceed 1000mm, hence it can be observed that the design of the flywheel is to be carried out (based) on the availability of space limitation and accordingly the fluctuation of energy, dimensions of the flywheel, stresses induced in the flywheel are determined. Finally after detail analysis it is observed that the induced diameter of the flywheel is less than the allowable/permissible diameter and hence it can be concluded that the design is safe from availability of space point of view.

   Flywheel, peripheral velocity, fluctuation of energy, stresses, stored energy.


1.       Akshay P. Punde, G.K.Gattani , Analysis of Flywheel, International Journal of Modern Engineering Research (IJMER) , Vol.3, Issue.2, March-April. 2013 pp-1097

2.       Bjorn Bolund  , Hans Bernhoff, Mats Leijon , Flywheel energy and power storage systems,international journal of  Renewable and Sustainable Energy Reviews 11 (2007) 235–258

3.       Sudipta Saha, Abhik Bose, G. Sai Tejesh, S.P. Srikanth  , computer aided design & analysis on flywheel for greater efficiency, International Journal of Advanced Engineering Research and Studies, IJAERS/Vol. I/ Issue II/January-March, 2012/299-301

4.       M.lavakumar, R.prasanna srinivas, Design and analysis of light weight motor vehicle flywheel, International Journal of Computer Trends and Technology  (IJCTT) – volume 4 Issue -7July 2013

5.       Sushama G Bawane , A P Ninawe and S K Choudhary, Analysis and optimization of flywheel, International Journal of mechanical engineering and robotics Vol. 1, No. 2, July 2012

6.       S. M. Dhengle,  Dr. D. V. Bhope, S. D. Khamankar , sInvestigation of stresses in arm type rotating flywheel, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.02 February 2012.

7.       D.Y. Shahare, S. M. Choudhary , Design Optimization of Flywheel of   Thresher using FEM, Advanced Materials Manufacturing & Characterization Vol3 Issue 1 (2013)





K.Suganya, S.Dhamodharan

Paper Title:

Assessment of Data Quality in Health Care Using Association Rules

Abstract:    To find the outlier and disease possibility of ten cancer diseases. In the existing system, Transactional data of three companies are taken as input. Association rules are extracted from the input data using open source data mining tool.By applying consistency rule, the outliers are identified. Outliers are manually examined to determine whether any data quality is violation has really occurred. Cost for manual examination is estimated using confusion matrix. In this system, recorded patient details is taken as input. From the input data, association rule is identified and outliers are detected. Weight is assigned to each symptoms of all considered cancer disease. When user enters the symptoms, percentage of cancer disease possibility is calculated.

   Association rule,outlier,consistency rule

1.        Ms. Ishtake S.H , Prof. Sanap S.A."Intelligent Heart Disease Prediction System Using Data Mining Techniques" International J. of Healthcare & Biomedical Research, Volume: 1, Issue: 3,  Pages 94-101,April ( 2013)
2.        K.Srinivas, B.Kavihta Rani,A.Govrdhan, "Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks" K.Srinivas et al. / (IJCSE) International Journal on Computer Science and Engineering,Vol. 02, No. 02, Pages 250-255, (2010)

3.        Bendi Venkata Ramana, Prof. M.Surendra Prasad Babu, Prof. N. B. Venkateswarlu,"A Critical Study of Selected Classification Algorithms for Liver Disease Diagnosis" International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May (2011)

4.        Chunhua Ju, Yaolin Li ,"An Incremental Outlier Detection Model for Transaction Data Streams" , Journal of Information & Computational Science 10: 1 Pages: 49–59 (2013)

5.        Anjali Barmade, Madhu M.Nashipudinath, "An Efficient Strategy to Detect Outlier Transactions"  International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January( 2014 )

6.        S.Preetha, V.Radha "Enhanced Outlier Detection Method Using Association Rule Mining Technique" International Journal of Computer Applications (0975 – 8887) Volume 42– No.7, March (2012 )





L.Lakshmanan, D.C.Tomar, Japala Saikrishna Rao

Paper Title:

Implementation of Protus2.0 by Ontology for Advanced E Learning

Abstract: Protus2.0 E_ learning environment is used in learning process for decision making, communication and problem-solving. The semantic web used in real-time annotations of these ontology for debriefing of the students, student self study and better guidance of the learning methodologies of mentors.A ever-present methodology environment will provides an interoperable, pervasive, and flawless learning structural design to connect, fix together, and share three major scope of learning resources such as learning collaborators, learning services, and learning contents. ever-present learning is characterized for identify right learning collaborators, right learning contents and right learning services in the right place at the right time.   it promotes the achievement of practical knowledge as well as decision production, communication, and problem solving with help of  ontological Skills-based learning environments. These environments are a important to give feedback about the students from the practically conducted sessions and comments of learners actions can notify to the assessment of their quality process. And also, those learning environments are helping to the researchers for better understand the learning process. The proposed system examined study environments. Also, achieve the better student improving the knowledge as well as feedback of the understanding of learning environments; we proposed a new mechanism such as semantic based approach with the ontology is used. 

   semanticweb,ontology mapping methods, fuzzy logic, fuzzy grouping, k-means algorithms, tutorial systems.


1.        M.J. Weal, D. Michaelides, K.R. Page, D.C. De Roure, E. Monger, and M. Gobbi, “Semantic Annotation of Ubiquitous Learning Environments,” IEEE Trans. Learning Technologies, vol. 5, no. 2, pp. 143-156, Apr.-June 2012.
2.        T. Tiropanis, H. Davis, D. Millard, and M. Weal, “Semantic Technologies for Learning and Teaching in the Web 2.0 Era—A Survey,” Proc. Society On-Line (WebSci ’09), http://eprints.ecs. soton.ac.uk/17106, 2009.

3.        J.W. McDonald, M.O. Gobbi, D. Michaelides, E. Monger, M.J.Weal, and D. De Roure, “Grid-Enabled Data Collection and Analysis: Semantic Annotation in Skills-Based Learning,” Proc.Fourth Int’l Conf. E-Social Science, June 2008.

4.        M.J. Weal, D.T. Michaelides, D.C. De Roure, M. Gobbi, E. Monger, and J.W. McDonald, “Semantic Annotation in Ubiquitous Healthcare Skills-Based Learning Environments,” Proc. Workshop Semantic Web in Ubiquitous Healthcare (ISWC), Nov. 2007.

5.        K.R. Page, D.T. Michaelides, S.J.B. Shum, Y.-H. Chen-Burger, J.Dalton, D.C. De Roure, M. Eisenstadt, S. Potter, N.R. Shadbolt, A.Tate, M. Bachler, and J. Komzak, “Collaboration in the Semantic Grid: A Basis for E-learning,” Applied Artificial Intelligence, vol. 19, nos. 9/10, pp. 881-904, Nov. 2005.

6.        O. Lassila and M. Adler, “Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web,” Spinning the Semantic Web, D. Fensel, ed., MIT, pp. 363-376, 2003.

7.        T. D. of Health, “Delivery 21st Century IT Support for the NHS: National Strategic Programme,” technical report, The Stationary Office, June 2002.





Richu Sam Alex, R Narciss Starbell

Paper Title:

Energy Efficient Intelligent Street Lighting System Using ZIGBEE and Sensors

Abstract:    Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to automate the system so that we can conserve energy as well as to maximize the efficiency of the system. In this paper a new method is suggested so as to maximize the efficiency of the street lighting system and to conserve the energy usage by the system with the help of ZIGBEE and sensors. It uses a sensor combination to control and guarantee the desired system parameters. The information is transferred point by point using ZIGBEE transmitters and receivers and is sent to the control terminal used to check the state of the street lamps and hence we can take immediate actions if required.

Keywords:   Automation, Atmega, LED, PV, Sensors.


1.       A. Valente, R. Morais, C. Serodio, P. Mestre, S. Pinto, and M. Cabral, “A zigbee sensor element for distributed monitoring of soil parame- ters in environmental monitoring,” Proc. IEEEE Sensors, pp. 135–138, Oct. 2007.
2.       Z. Rasin, H. Hamzah, and M. S. M. Aras, “Application and evaluation of high power zigbee based wireless sensor network in water irrigation control monitoring system,” in Proc. IEEE Symp. Ind. Electron. Appl., Oct. 4–6, 2009, vol. 2, pp. 548–551.

3.       H. Tao and H. Zhang, “Forest monitoring application systems based on wireless sensor networks,” in Proc. 3rd Int. Symp. Intell. Inf. Technol. Appl. Workshops, Nov. 21–22, 2009, pp. 227–230.

4.       J. Liu, C. Feng, X. Suo, and A. Yun, “Street lamp control system based on power carrier wave,” in Proc. Int. Symp. Intell. Inf. Technol. Appl. Workshops, Dec. 21–22, 2008, pp. 184–188.

5.       Y. Chen and Z. Liu, “Distributed intelligent city street lamp monitoring and control system based on wireless communication chip nRF401,” in Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput., Apr. 25–26, 2009, vol. 2, pp. 278–281.

6.       W. Yongqing, H. Chuncheng, Z. Suoliang, H. Yali, and W. Hong, “Design of solar LED street lamp automatic control circuit,” in Proc. Int. Conf. Energy Environment Technol., Oct. 16–18, 2009, vol. 1, pp. 90–93.

7.       M. A. D. Costa, G. H. Costa, A. S. dos Santos, L. Schuch, and J. R. Pinheiro, “A high efficiency autonomous street lighting system based on solar energy and LEDs,” in Proc. Power Electron. Conf., Brazil, Oct. 1, 2009, pp. 265–273.





KR.Akshara, N.Srinivasan

Paper Title:

Collective Behavior Learning on Heterogeneous Affiliation in OSN

Abstract:    Millions of real world data is   generated by the social network like Facebook, twitter etc which gives us an opportunity to under or predict users behavior by means of collective learning. Many studies have been conducted already on this field. Existing algorithm uses connection or user relationship to understand their behavior but they lack the understanding of heterogeneity in their connection which reduces the effectiveness of their algorithm. In this project we proposed a mechanism to focus on these issues by  introducing the concept of edge centric clustering for classification of users based on their heterogeneity affiliation and extracting the social dimension , relevant community detection is made and the social dimension is extracted by using chi square testing model. Here in this work it also reduce the computational problem by scaling the samples applying the scheme sparse social network

   Collective Learning, Social Dimension, Community Detection


1.        L. Tang and H. Liu, “Toward predicting collective behavior via social dimension extraction,” IEEE Intelligent Systems, vol. 25,pp. 19–25, 2010.
2.        L.Tang and H.Liu, “Relational learning via latent social dimensions,” in KDD ’09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 817–826.

3.        M. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical Review E vol. 74, no. 3, 2006. [Online].Available:http://dx.doi.org/10.1103/PhysRevE.74.036104

4.        L. Tang and H. Liu, “Scalable learning of collective behavior based on sparse social dimensions,” in CIKM ’09: Proceeding of the 18th ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2009, pp. 1107–1116.

5.        P. Singla and M. Richardson, “Yes, there is a correlation: - from social networks to personal behavior on the web,” in WWW ’08: Proceeding of the 17th international conference on World Wide Web. New York, NY, USA: ACM, 2008, pp. 655–664.

6.        M. McPherson, L. Smith-Lovin, and J. M. Cook, -Birds of a feather: Homophily in social networks.

7.        A. T. Fiore and J. S. Donath, “Homophily in online dating: when do you like someone like yourself?” in CHI ’05: CHI ’05extended abstracts on Human factors in computing systems. NewYork, NY, USA: ACM, 2005, pp. 1371–1374.

8.        H. W. Lauw, J. C. Shafer, R. Agrawal, and A. Ntoulas, “Homophily in the digital world: A LiveJournal case study,” IEEE Internet Computing, vol. 14, pp. 15–23, 2010.

9.        S. A. Macskassy and F. Provost, “Classification in networked data: A toolkit and a univariate case study,” J. Mach. Learn .Res., vol. 8, pp. 935–983, 2007.

10.     X. Zhu, “Semi-supervised learning literature survey,” 2006.[Online].Available: ttp://pages.cs.wisc.edu/jerryzhu/ pub/ssl survey 12 9 2006.pdf





A. Prasanth Babu, N. Srinivasan

Paper Title:

Temporal Analyzing Time Interval for Text Document in Text Excavation

Abstract:    Text excavation has been an unavoidable data excavation technique. There are different methods for text excavation, the most famous one criterion matching successful will be excavation using the effective criterions. The quality of excavation text data is the main problem text excavation due to the large number of terms, words, tables, phrases, and noise. However, the originality of excavation terms in text data may be not high because of lot of noise in text especially in the domain of text excavation. Pattern taxonomy model is a criterion-based method which adopts the technique of sequential criterion excavation and uses closed criterions as features in the representative. In Criterion taxonomy model it does not analyze the time period to the given text documents and also does not provide the rank to the given sets of documents. Existing is used to term-based approach to extracting the text. In this system we are going to propose the temporal text excavation approach which it calculates the time series and give the rank of the documents by decomposing the documents.

   Text Excavation, Terrestrial sequence, Stumble Criterion Evolution, D-Criterion.


1.       M.F. Caropreso, S. Matlin, and F. Sebastiani. Statistical Phrases in Automated Text Categorization, Technical Report IEI-B4-07- 2000, Instituto di Elaborazione
dell’Informazione, 2000.

2.       C. Cortes and V. Vapnik. Substantiate-Vector Networks, Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.

3.       S.T. Dumais, Improving the Retrieval of Information from External Sources, Behavior Research Methods, Instruments, and Computers, Vol. 23, No. 2, pp. 229-236, 1991.

4.       J. Han and K.C.-C. Chang. Data Excavation for Web Intelligence, Computer, Vol. 35, No. 11, pp. 64-70, Nov. 2002.

5.       J. Han, J. Pei, and Y. Yin. Excavation Frequent Criterions without Candidate Generation, Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’00), pp. 1-12, 2000.

6.       Y. Huang and S. Lin. Excavation Sequential Criterions Using Graph Search Techniques, Proc. 27th Ann. Int’l Computer Software and Applications Conf., pp. 4-9, 2003.

7.       N. Jindal and B. Liu. Identifying Comparative Sentences in Text Documents, Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006.

8.       K.Aas and L.Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999.

9.       R.Agrawal and R.Srikant, “Fast Algorithms for Excavation Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94), pp. 478-499, 1994.

10.     H.Ahonen, O.Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Excavation Techniques for Descriptive Phrase Extraction in Digital Document Collections,” Proc. IEEE Int’l Forum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11, 1998.

11.     R. Baeza-Yates and B.Ribeiro-Neto, Modern Information Retrieval. Addison Wesley, 1999.

12.     N.Cancedda, N. Cesa-Bianchi, A.  Conconi, and C. Gentile, “Kernel Methods for Document Filtering,” TREC, trec.nist.gov/ ubs/trec11/papers/kermit.ps.gz, 2002.





Kulkarni Akshata

Paper Title:

A Review on Glucagon like Peptide-1 Approach in Diabetes Melltius

Abstract:    Epidemiology of diabetes has gained great significance both in estimating the burden of the disease and also in finding out the risk factors with an ultimate goal of prevention of the disease. Type 2 diabetes is a progressive chronic disease resulting from a dynamic interaction between defects in insulin secretion and insulin action. New molecules have recently been launched and many others are under clinical investigation. Besides classical sulfonylureas and glinides, new insulin secretagogues are now available, which target the incretin gut hormone glucagon-like peptide-1 (GLP-1). Indeed, oral incretin enhancers acting as antagonists of the enzyme DPP-4 (dipeptidylpeptidase-4), which inactivates natural GLP-1, and injectable incretin mimetics (exenatide) or analogues (liraglutide), which reproduce the actions of GLP-1 while resisting to DPP-4, represent new opportunities to stimulate insulin secretion, without increasing the risk of hypoglycaemia and weight gain. Therapies based on the incretin hormone glucagon-like peptide 1 (GLP-1) are novel treatment options for type 2 diabetes. Incretin hormones cause an increase in the amount of insulin released from beta cells in the pancreas following ingestion of food. Glucagon-like peptide-1 (GLP-1) is the most well-characterized incretin hormone, which is considered to be the most important incretin released by the gut into the bloodstream in response to meal. In addition to its effects on insulin secretion after eating, primary function of GLP-1 is to enhance insulin secretion. GLP-1 also has additional effects that can help in the management of diabetes.

   Diabetes mellitus, Glucagon like peptide-1,   incretins.


1.        C Alarcon, B Wicksteed, C.J Rhodes,Exendin 4 controls insulin production in rat islet beta cells predominantly by potentiation of glucose-stimulated proinsulin biosynthesis at the translational level. Diabetologia;49: 2006.pp-2920–2929.
2.        J.M Barragan,J Eng, R Rodriguez,E Blazquez, Neural contribution to the effect of glucagon-like peptide-1-(7-36) amide on arterial blood pressure in rats. Am J Physiol; 277: 1999. E784– E791.

3.        D.J Drucker,The role of gut hormones in glucose homestasis. J Clin Invest, 2007.117:pp-24-32.

4.        M Moller, S.P Sheikh,Central administration of GLP-1-(7-36) amide inhibits food and water intake in rats. Am J Physiol; 271: 1999,R848–R856.

5.        M.M Engelgau, T.J Thompson, W.H Herman ,JP Boyle, Aubert R.E,S.J.Kenny, Diabetes Care,1997, pp-785–91.

6.        H.C Fehmann, J.F Habener, Functional receptors for the insulinotropic hormone glucagon-like peptide-I(7-37) on a somatostatin secreting cell line. FEBS Lett,279,1991,  pp-335–340.

7.        F.M Gribble, Targetting GLP-1 release as potential strategy for therapy of type-2 diabetes mellitus,In:Diabetic medicine,25(8),1991,pp-889-894.

8.        J.J Holst, C Orskov,O.V Nielsen,T.W Schwartz,Truncated glucagon-like peptide I, an insulin-releasing hormone from the distal gut. FEBS Lett 211,1987,pp-169–174.

9.        M.I Harris,R.C Eastman,C.C Cowie,K.M Flegal,M.S Eberhardt MS,Diabetes Care,20,1987,pp-1859–62.

10.     B Kreymann,G.Williams,M.A Ghatei,SR Bloom, Glucagon-like peptide-1 7-36: a physiological incretin in man. Lancet; 2: 1987, pp-1300–1304.

11.     L.B Knudsen,Pridal,Glucogon like peptide-1(9-36) amide is major metabolite and glucagon like peptide-1(7-38)amide after in vivo administration to dogs and it acts as antagonist on pancreatic receptor. In: European of journal pharmacology, 318, (2-3),1996,pp-429-435.

12.     K Meeran K,D  O’Shea,CM Edwards,M..D Turton, MM Heath,I Gunn,S Abusnana,M Rossi,CJ Small,A.P Goldstone,G.M Taylor,D Sunter,J Steere,S.J Choi,M.A Ghatei,SR Bloom Repeated intracerebroventricular administration of glucagon-like peptide1-(7-36) amide or exendin-(9-39) alters body weight in the rat. Endocrinology; 140,1999,pp-244–250.

13.     S Mojsov,G.C Weir,J.F Habener J.F,Insulinotropin: glucagon-like peptide I (7-37) co-encoded in the glucagon gene is a potent stimulator of insulin release in the perfused rat pancreas. J Clin Invest,79,1987,pp-616–619.

14.     JJ Meier,B Gallwitz,S Salmen,O Goetze,J.J Holst, W.E Schmidt,M.A Nauck Normalization of glucose concentrations and deceleration of gastric emptying after solid meals during intravenous glucagon-like peptide 1 in patients with type 2 diabetes. J Clin Endocrinol Metab, 88,2003,2719–2725.

15.     C Orskov,A Wettergren,J.J Holst J.J,Secretion of incretin hormones glucagon like peptide-1 and gastric inhibition polypeptide with insulin secretion in normal man throughout day .In:Scandianrian journal of gastroenterology,31(7), 1996,pp-665-670.

16.     C Ruiz-Grande,C Alarcn,E Mzrida,I Valverde,Lipolytic action of glucagon-like peptides in isolated rat adipocytes. Peptides; 13,1992,pp-13–16.

17.     M Szayna,M.E Doyle,JA Betkey,H.W Holloway,R.G Spencer,N.H Greig,J.M Egan,Exendin-4 decelerates food intake, weight gain, and fat deposition in Zucker rats. Endocrinology; 141,2000,1936–1941.

18.     M.D Turton,D O’Shea,I Gunn,S.A Beak,C.M Edwards,K Meeran,S.J Choi,G.M Taylor,M.M Heath,P.D Lambert, Wilding J.P, Smith DM, Ghatei M.A, Herbert J, Bloom S.R,A role for glucagon-like peptide-1 in the central regulation of feeding. Nature 6;379,1996,pp-69–72.

19.     R.E.Wachters-Hagedoorn,M.G.Prieb,A.M Heiner,J.J  Holst,The rate of intestinal glucose absorption is corrected with plasma glucose.Depending insulinotropic polypeptide concentration in healthy men,In:the journal of nutrition,(136) 6,2006,pp-1511-1516.

20.     B Willms,J Werner,J.J Holst ,C Orskov,W Creutzfeldt, M.A Nauck,Gastric emptying, glucose responses, and insulin secretion after a liquid test meal: effects of exogenous glucagon-like peptide-1 (GLP-1)-(7-36) amide in type 2 (noninsulin-dependent) diabetic patients. J Clin Endocrinol Metab; 81,1996,pp-327–332.

21.     M Zander,A Christiansen,S Madsbad,J.J Holst, Additive Effect of Glucagon-Like Peptide 1 and Pioglitazone in Patients with Type 2 Diabetes. Diabetes Care, 27, 2004, pp-1910-1914.





Devarshi Chaurasia

Paper Title:

Bus Rapid Transit System (BRTS): A Sustainable Way of City Transport (Case Study of Bhopal BRTS)

Abstract:    Irrespective of the cities of any country around the world, at some point of time they have faced problems associated with passenger mobility and connecting the city periphery with central part, in urban areas and found few innovative solutions to overcome the problems. Urban Planners, Engineers and Urban Administrator have found Bus Rapid Transit (BRT) System as efficient, cost effective and simple as compare to other Light Rail Transit (LRT) and Metro Rail solution to provide ‘life line’ to city. Many cities around the world operating BRTS and getting positive results including so many Indian cities. By this technical paper, I am investigating the salient features and properties of BRT system with the help of various operational BRT. At last, I am presenting an observational study of Bhopal BRT system to analyze the actual condition and lacunas of BRTS.

   BRT system, Urban Transport, City, Passenger Mobility.


1.       Ahmedabad Bus Rapid Transit System, Urban Transport Initiatives in India: Best Practices in PPP report by National Institute of Urban Affairs, India http://www.niua.org/projects/tpt/AHMEDABAD%20BRTS.pdf http://www.ahmedabadbrts.com/web/About_JanMarg.html
2.       Agarwal P.K., Sharma Anupama, Sing A.R. (2010), An overview on Bus Rapid Transit System, JERS/Vol.-I/Issue-II/ Oct.-Dec./ page. 195-205.

3.       Bus Rapid Transit System Bhopal, Presentation by BCEOM International France, Bhopal Municipal Corporation, Sept. 2008 Downloaded from Internet on Aug. 2013)

4.       BRT Case Study, Curitiba, Brazil. http://onlinepubs.trb.org/onlinepubs/tcrp/tcrp90v1_cs/Curitiba.pdf

5.       Colleen McCaul (2009), Project Manager of GTZ Consulting Team: Johannesburg Rea Vaya BRT Project, South Africa http://www.unhabitat.org/downloads/docs/7997_81569_rea_vaya.pdf

6.       HT Correspondent, Hindustan Times  Bhopal, June 20, 2013 http://www.hindustantimes.com/India-news/Bhopal/3-things-missing-from-Bhopal-BRTS-estimates-panel/Article1-1079470.aspx

7.       Jaiswal Anuj, Sharma Ahsutosh (2012); ‘Optimization of Public Transport Demand : A case study of Bhopal’ IJSRP/Vol.-2/Issue-7/July 2012, ISSN No.: 2250-3153

8.       Kadiyali,L.R,(2008),Traffic Engineering and Transportation Planning, Khanna Publishers,Seventh Edition, Delhi.

9.       Kumar Manish, Sustainable Cities Collective , Article (Downloaded from Internet net on 6/10.2013)  http://sustainablecitiescollective.com/kumar

10.     Lloyd Wright, University College London, Book Title-Sustainable Transport: A source book for Policy Makers in Developing Cities, Module 3b: Bus Rapid Transit http://www.itdp.org/documents/brtplanningguidedec04.pdf

11.     Mohan Dinesh, Planning for Public Transport: Integrating Safety, Environment and Economic Issues, Transportation Research and Injury Prevention Programme Indian Institute of Technology, New Delhi 110 016, India.

12.     Rafael Villarsed (2008), Bagota Bus Rapid Transit, Transmilenio Institutional Presentation. http://tram.mcgill.ca/Teaching/seminar/presentations/BRTBog.pdf

13.     Transport Research & Injury Prevention Programme-TRIPP (2008), BRTS special Issue, IIT Delhi.

14.     Tiwari Geetam, Bus Priority Lanes for Delhi, Transportation Research and Injury Prevention Programme, Indian Institute of Technology, Delhi, India 110016.

15.      Yoga Adiwinarto (2013), Expanding TransJakarta BRT through ‘Direct service’ system, 32nd Southern Africa Transport Conference.





Remya George, Anjaly Cherian.V, Annet Antony, Harsha Sebestian, Mishal Antony, Rosemary Babu.T

Paper Title:

An Intelligent Security System for Violence against Women in Public Places

Abstract:    This paper describes about an intelligent security system for women. Women all over the world are facing much unethical physical harassment.  This acquires a fast pace due to lack of a suitable surveillance system. Our project is a venture to resolve this problem. The systems mainly consist of a monitoring device, the output of which is processed to identify insecure environments. Upon identifying unsafe environments system will send message to near-by control room also turn on alarms placed all around the area letting help from others. This system can be positioned in public places such as railway stations, bus stands, foot paths and shopping mall, where women are commonly experiencing attacks. We really believe that this endeavor will make a difference in the life of many and dream about seeing this world with individuals walking fearlessly.

   women security, face recognition.


1.        “violence against women in India-a literature review”-Sheela Saravanan, Intsitute of social studies trust.
2.        Aisha Meethian and B.M.Imran, “Real Time Gesture Recognition Using Gaussian Mixture Model”, International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013.
3.        ”A mobile application for women”-Times of India, Dec 03 2013.
4.        “electronic device for women safety”- Times of India, Sep 15 2013.
5.        P. Viola and M. J. Jones, “Robust real-time face detection”, International Journal of Computer Vision, 57(2):137–154, 2004.
6.        Qiang Li, Bo Li ,”Online Finger Gesture Recognition Using Surface Electromyography Signals”-Journal of Signal and Information Processing, 2013, 4, 101-105 doi:10.4236/jsip.2013.42013 Published Online May 2013
7.        A. Samal and P.A. Iyengar, “Automatic Recognition and Analysis of Human Faces and Facial Expressions: A Survey,” Pattern Recognition, vol. 25, no. 1, pp. 65-77, 1992.
8.        Y. Tian, T. Kanade and J. Cohn, “Recognizing Action Units for Facial Expression Analysis,” IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 23, no. 2, pp. 97–115, 2001.
9.        Regina Lionnie, Ivanna K. Timotius  and  Iwan Setyawan ,“Performance Comparison of Several Pre-Processing Methods in a Hand Gesture Recognition System based onNearest Neighbor for Different Background Conditions”, ITB J. ICT, Vol. 6, Nov. 3, 2012.
10.     Vinay Bettadapura,” Face Expression Recognition and Analysis: The State of the Art”
11.     Chen Wu and Hamid Aghajan “Model-based Human Posture Estimation for Gesture Analysis in an Opportunistic Fusion Smart Camera Network” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 9, pp. 884–900, 2007
12.     P. Ekman and W.V. Friesen, “Manual for the Facial ActionCoding System,”Consulting Psychologists Press,1977.
13.     MPEG Video and SNHC, “Text of ISO/IEC FDIS 14 496-3: Audio,” in Atlantic City MPEG Mtg., Oct. 1998, Doc. ISO/MPEG N2503.
14.     “Robust object tracking using local kernels and background information”-Jaideep Jeyakar, R. Venkatesh Babu, K. R. Ramakrishnan
15.     “Multiple Object Tracking by Kernel Based Centroid Method for Improve Localization”-   Rahul Mishra1, Mahesh K. Chouhan2, Dr. Dhiiraj Nitnawwre3 International Journal of Advanced Research in Computer Science and Software Engineering.
16.     M.S. Ryoo and J.K. Aggerwal, “observe and explain: a new approach for multiple hypotheses tracking of humans and objects” , university of Texsas,pg:1-8,2005
17.     Tao Zhao and Ram Nevatia, “tracking multiple human in a crowded environment”, International Journal of Computer Vision, pg:1-9,2004
18.     Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang, “Multiple Human Objects Tracking in Crowded Scenes”, International Journal of Computer Vision, pg:1

19.     Andrew Rayam, Adam Rossi, “automated facial expression recognition    system”, IEEE transactions, pg 1-6, 2009
20.     Ole Helvig Jensen, “Implementing the Viola-Jones Face Detection   Algorithm”, Technical University of Denmark, pg:1-32,2008
21.     Deqing Sun, Stefan Roth, Michael J Black, “secrets of optical flow estimation and their principles”, Brown university, pg:1-8, 2010





A.Mathumathi, Nivya.R.Mohan, Neethu Babu, D.Padmapriya, Anoop, M.Geetha Priya

Paper Title:

Leakage Power Optimization for VLSI Circuits @90nm CMOS Process

Abstract:    In Integrated Circuits (IC), the transistor density is increased by scaling down the size of MOSFETs. Scaling down of devices sizes for improving the performance has lead to a substantial increase in the subthreshold leakage current. In this paper, a new method is proposed to reduce leakage power in standby mode of operation. This proposed method combines Input Vector Control (IVC) and Gate Replacement (GR) techniques. The proposed method is validated by applying to three different benchmark circuits at 90nm CMOS process technology using HSPICE. The final results obtained are compared with other well known leakage reduction techniques and the proposed method proves to be more effective than other existing techniques.

   leakage reduction, HSPICE, CMOS, full adder, PDP


1.       M. Geetha Priya and K. Baskaran, “A Novel Low Power 3 Transistor based Universal Gate for VLSI Applications”, Journal of Scientific and Industrial Research, vol. 72, pp. 217-221, Apr. 2013
2.       M.Geetha Priya and K. Baskaran, “A new universal gate for low power SoC applications”, Sadhana-Academy Proceedings in Engineering Sciences, vol. 38, pp. 6445-651, Aug. 2013

3.       Afshin Abdollahi, Farzan Fallah and Massoud Pedram, “Leakage Current Reduction in CMOS VLSI Circuits by Input Vector Control”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 140-154, Feb. 2004

4.       Saibal Mukhopadhyay, Cassondra Neau, Riza Tamer Cakici, Amit Agarwal, Chris H. Kim and Kaushik Roy, “Gate Leakage Reduction for Scaled Devices Using Transistor Stacking”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 11, no. 4, pp. 716-730, Aug. 2003

5.       Narender Hanchate and Nagarajan Ranganathan, “LECTOR: A Technique for Leakage Reduction in CMOS Circuits”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 196-205, Feb. 2004

6.       Lin Yuan and Gang Qu, “A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 14, no. 2, pp. 173-182, Feb. 2006

7.       Kaushik Roy, Saibal Mukhopadhyay and Hamid Mahmoodi-Meimand, “Leakage Current Mechanisms and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits”, Proceedings of the IEEE, vol. 91, no. 2, pp. 305-327, Feb. 2003

8.       M. Geetha Priya, K. Baskaran, D. Krishnaveni & S. Srinivasan, "A New Leakage Power Reduction Technique for CMOS VLSI Circuits", Journal of Artificial Intelligence, vol.5, pp. 227-232, 2012

9.       Yu Wang, Xiaoming Chen, Wenping Wang, Yu Cao, Yuan Xie and Huazhong Yang, “Leakage Power and Circuit Aging Cooptimization by Gate Replacement Techniques”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 19, no. 4, pp. 615-628, Apr. 2011





Nandini Ammanagi, Rahul Khadilkar, Akash Harwani, Disha Budhlani, Disha Dembla

Paper Title:

Comparison of the Performance of Microstrip Antenna at 2.4GHz Using Different Substrate Materials

Abstract:    This paper discusses the performance of various dielectric substrates, having dielectric constants ranging from 2 to 5. These designs are basically rectangular micro strip patch antennas for wireless communication resonating at 2.4 GHz. They are simulated using the evaluator's version of the software IE3D and their performances are compared with respect to ‘return loss v/s frequency’ and ‘vswr v/s frequency’ parameters. The comparison is made for four dielectric substrates: FR4, RO-3003, PTFE(Teflon) and Polyguide. Analysis of each is done and compiled using MATLAB to show relative performance.

   Antenna, Dielectric substrate, IE3D, Microstrip, Rectangular Patch.


1.       C. A.  Balanis, “Antenna Theory-Analysis and Design,” 2nd ed., J. Peters, John Wiley and Sons, pp. 728-730.
2.       G. Kumar, K. P. Ray, “Broadband microstrip antennas”,  Artech House, 2003.

3.       N. Agarwal, D.C.Dhubkarya, R. Mittal,“ Designing & Testing of Rectangular Micro strip antenna operating at 2.0 GHz using IE3D” ,  Global Journal of Researches in Engineering, Volume 11 Issue 1, Version 1.0 February 2011, Journal Publisher: Global Journals Inc. (USA)

4.       K.Praveen Kumar, K.Sanjeeva Rao ,V.Mallikarjuna Rao, et al. “The effect of dielectric permittivity on radiation characteristics of co-axially feed rectangular patch antenna: Design & Analysis”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2013.

5.       A. Khan,R Nema. "Analysis of Five Different Dielectric SubstratesOn Microstrip Patch Antenna", International Journal of Computer Applications (0975 – 8887), Volume 55, No.18, October 2012.





Naser Hussein Judran, Ravi Jon

Paper Title:

A Study on Carbon Nano Tube and Bucky Balls Membrane for Water Purification

Abstract:    Carbon Nanotube are single sheets of graphite (called graphene) rolled into cylinders. The diameter of the tubes is typically of nanometer dimensions, while the lengths are typically micrometers. In this paper we are going Explore the property of Carbon Nanotube which is currently the focus of intense research. The Nanotube may consist of one up to tens and hundreds of concentric shells of carbons with adjacent shells separation of 0.34 nm; we are also going to explore the properties of carbon Nano tube through Raman Spectroscopy, and  this paper review the Bucky paper Membrane for water Filtration.

   Carbon Nanotube, Optical Properties, Bucky-paper, membrane; filtration method, Raman Spectroscopy.


1.        Edison TA, US Patent 470’925 (1892).
2.        Bacon R. Growth, structure and properties of carbon whiskers. J Appl Phys 1960; 31: 283-290.

3.        Dresselhaus MS, Dresselhaus G, Sugihara K, Spain IL, and Goldberg HA. Graphite fibers and filaments. (Springer-Verlag, Berlin, 1988), Vol. 5 of Springer Series in Materials Science.

4.        Oberlin A, Endo M, and Koyama T. Filamentous growth of carbon through  benzene decomposition. J Crystal Growth1975; 32: 335-349.

5.        Kroto HW, Heath JR, O’Brian SC, Curl RF, and Smalley RE. C60: Buckminsterfullerene. Nature 1985; 318: 162-163.

6.        Dresselhaus MS, Dresselhaus G, Eklund PC. Science of fullerences and carbon nanotubes. Academic Press, San Diego, California,1996.

7.        Smalley RE, Semiconductor cluster surface chemistry. DoD Workshop in Washington, DC (December 1990).

8.        Dresselhaus MS, Dresselhaus G, and Eklund PC. Symmetry for lattice modes in C60 and alkali-metal-doped C60. Phys Rev B 45 1992;

9.        Coleman Henry, Bryce Dorr, Jonathan A. Brant Separation and Purification Technology, Volume 100, (24 October 2012 ) Buckminsterfullerene (C60) nanoparticle fouling of microfiltration membranes operated in a cross-flow configuration

10.     Iijima S. Helical microtubules of graphitic carbon. Nature 1991; 354: 56-58.

11.     Iijima S and Ichihashi T. Single-shell carbon nanotubes of 1 nm diameter. Nature 1993; 363: 603.

12.     Bethune DS, Kiang CH, de Vries MS, Gorman G, Savoy R, Vasquez J, and Beyers R. Cobalt- catalysed growth of carbon nanotubes with single-atomic-layer walls. Nature 1993; 363:605.

13.     Wildoer JWG, Venema LC, Rinzler AG, Smalley RE, Dekker C. Electronic structure of atomically resolved carbon nanotubes. Nature 1998; 391: 59-62.

14.     Ajayan PM, Iijima S. Capillarity-induced filling of carbon nanotubes. Nature 1993; 361: 333.

15.     Thess A, Lee R, Nikolaev P, Dai H, Petit P, Robert J, Xu C, et al. Crystalline ropes of metallic carbon nanotubes. Science 1996; 273: 483-487.

16.     Buseck PR, Tsipursky SJ, Hettich R. Fullerenes from the geological environment. Science 1992; 257: 215–217.

17.     Saito R, Dresselhaus G, Dresselhaus MS. Physical properties of carbon nanotubes. Imperial College Press, London, 1998.

18.     Harris PJF, Carbon nanotubes and related structures – New materials for the twenty-first century. Cambridge University Press, Cambridge, UK, 1999. [19] Nanotube Modeler, JCrystalSoft 2004 – 2005, http://www.icrystal.com.

19.     Qin LC, Zhao X, Hirahara K, Miyamoto Y, Ando Y, Iijima S. The smallest carbon nanotube, Nature 2000; 408: 50.





P.Rajeswari, S.Pratheeba, S.R.Karthika

Paper Title:

A Comprehensive Overview on Different Applications of Wireless Sensor Network

Abstract:    The Wireless Sensor Network is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a micro controller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size. It detects things like temperature, sound, vibrations, pressure, motion, or pollutants through autonomous sensors. They are currently being used for industries and civilian use such as industrial process monitoring and control, machine health monitoring, monitoring of the environment, health care applications, home automation, tracking and traffic control. More specific applications would be things like habitat monitoring, tracking objects, detecting fires or landslides, and monitoring traffic. Generally a WSN would be scattered in an area where its sensor nodes collect data.

   Applications of Wireless Sensor Network, Area Monitoring, Wireless Sensor Network.


1.        http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6550437
2.        D. J. Cook and S. K. Das, “Smart environments: technologies , protocols and applications,” New York: John Wiley, pp. 13-15, 2004.

3.        K. Sohraby, D. Minoli, and T. Znati, “Wireless sensor networks: technology, protocols and applications,” New Jersey: John Wiley, pp. 38-71, 2007.

4.        http://www.memsnet.org/mems/what-is.html

5.        F. L. LEWIS,"Wireless Sensor Networks"Associate Director for Research,Head, Advanced Controls, Sensors, and MEMS Group,Automation and Robotics Research Institute The University of Texas at Arlington.

6.        Eric Lee Eekhoff A,“Wireless sensor networks and personal area networks for data integration in a virtual reality environment ”  submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE.

7.        Theofanis P. L AMBROU ,PhD Thesis Proposal ,Supervisor: Prof. Christos G. PANAYIOTOU, ”Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes ”.

8.        Alan Mainwaring -Intel Research Laboratory, Berkeley ,Joseph Polastre2 -2 EECS Department ,University of California at Berkeley ,David Culler-College of the Atlantic Bar Harbor, Maine :”Wireless Sensor Networks for Habitat Monitoring ”.

9.        J. G. T. Anderson. Pilot survey of mid-coast Maine seabird colonies: “an evaluation of techniques”. Bangor, ME, 1995. Report to the State of Maine Dept. of Inland Fisheries and Wildlife.

10.     http://www.eurekalert.org/pub_releases/2008-06/uoa-nws060408.php

11.     J. Portilla, A. de Castro, E. de La Torre, and T. Riesgo, “A modular architecture for nodes in wireless sensor networks,” Journal of Universal Computer Science, vol. 12, no. 3, pp. 328–339, 2006. 

12.     http://www.advanticsys.com/services/agricultural-environment- monitoring/

13.     J.D. Kenney, D.R. Poole, G.C. Willden, B.A. Abbott, A.P. Morris, R.N. McGinnis, and D.A. Ferrill, "Precise Positioning with Wireless Sensor Nodes: Monitoring Natural Hazards in All Terrains", 2009 IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, TX, USA, Oct. 2009.

14.     Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London". Sensors 8 (6): 3601

15.     T.L. Dinh, W. Hu, P. Sikka, P. Corke, L. Overs and S. Brosnan, "Design and Deployment of a Remote Robust Sensor Network: Experiences from an Outdoor Water Quality Monitoring Network", 2007 32nd IEEE Conference on Local Computer Networks

16.     http://ciemcal.org/wireless-sensor-network-and-mobile-ad-hoc- network/

17.     http://www.advanticsys.com/services/water-monitoring-equipment/

18.     http://www.enpicbcmed.eu/content/wireless-sensor-networks-accurate-continuous-monitoring-waterways-and-industrial-pipeline-ne.

19.     http://www.nireas-iwrc.org/index.php?link=PP-leak_detection.php.

20.     F. Viani, P. Rocca, M. Benedetti, G. Oliveri, A. Massa , "Electromagnetic passive localization and tracking of moving targets in a WSN-infrastructured environment " in Inverse Problems, vol. 26, (2010), p. 1-15. - DOI: 10.1088/0266-5611/26/7/074003

21.     Surie, D., Laguionie, O., Pederson, T.: "Wireless Sensor Networking of Everyday Objects in a Smart Home Environment". In Proceedings of the 4th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, pp. 189-194, (2008)

22.     Yenumula B Reddy,Grambling State University,Grambling, LA 71245,”Survey in Wireless Sensor Network”.

23.     http://ciemcal.org/wireless-sensor-network/





Meera Treesa Mathews, Manju E.V

Paper Title:

Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving

Abstract:   Secure sum computation is a simple example of Secure Multi party Computation. This provide privacy to data in case more than two parties are present, while finding combined results of individual data. Association rule mining algorithms like Apriori are used for mining frequent items from database. In this paper we address secure mining of frequent items from a horizontally partitioned data. It uses Apriori algorithm for mining frequent items with the help of a Extended Distributed Rk- Secure Sum Protocol for privacy preserving

   Secure sum computation, secure multi party computation, Apriori, Extended Distributed Rk- secure sum protocol, frequent items, Global support


1.       Jyotirmayee Rautaray, Raghavendra Kumar, “FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database”, International Journal of Scientific & Engineering Research, Vol. 4, No. 3,march 2013, pp 1-5.
2.       Jyotirmayee Rautaray, Raghavendra Kumar, “Distributed Rk- Secure sum  Protocol for Privacy Preserving”, IOSR Journal of Computer Engineering, Vol. 9, No. 1, January – February 2013,            pp. 49 – 52

3.       Priyanka Jangde, Gajendra Singh chandel, Durgesh Kumar Mishra, “Hybrid Technique for Secure Sum Protocol”, World of Computer science and Information Technology Journal, Vol. 1, No. 5, 2011, pp 198 – 201.

4.       Ms Shweta, Dr. Kanwal Garg, “Mining Efficient Association Rules through Apriori Algorithm Using Attributes and comparative analysis of various Association Rule Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, June 2013, pp. 306 – 312.

5.       Sunita B. Aher,  Lobo L.M.R.J, “ A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning”, International Journal of Computer Applications (0975 – 8887), vol . 39, No. 1, February 2012, pp. 48 – 52.

6.       Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” Distributed k-Secure sum Protocol for secure Multi –Party Computations”, Journal of Computing, Vol. 2, No. 3, March 2010, pp. 68 – 72.

7.       Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra, ”Changing Neighbour k- Secure Sum Protocol for secure multi party computation”, International Journal of Computer science And Information Security, Vol. 7, No. 1, 2010, pp. 239 – 243.

8.       Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” A modified ck- Secure Sum Protocol for multi party computation”, Journal of Computing, Vol. 2, No.2, February 2010, pp. 62 – 66.

9.       Yehuda Lindell, Benny Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining”, The Journal of Privacy and Confidentiality, vol.1, No.1, 2009, pp. 59-98.

10.     Rashid Sheikh , Beerendra Kumar, “Privacy Preserving K- Secure Sum Protocol”, International Journal of Computer science and Information Security, Vol. 6, No. 2, 2009, pp. 184 – 188.

11.     Murat Kantarcioglu, Chris Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge And Data Engineering, Vol. 16, No. 9, September 2004

12.     Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, “Tools for Privacy Preserving Distributed Data Mining”, SIGKDD Explorations, Newsletter, vol.4, no.2, ACM Press, 2002, pp.28-34.

13.     M. J. Atallah and W. Du. “Secure Multiparty Computational Geometry,” In proceedings of Seventh International Workshop on Algorithms and Data Structures(WADS2001). Providence, RhodeIsland, USA, 2001, pp. 165-179.

14.     W. Du and M.J.Atallah, “Privacy-Preserving Statistical Analysis,” In proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2001, pp. 102-110.

15.     Wenliang Du, Mikhail J. Atallah, “Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems”, In proceedings of new security paradigm workshop, Cloudcroft, New Maxico, USA, Sep. 11-13 2001, page 11-20.

16.     Rakesh Agrawal, Ramakrishnan Srikant,”Fast algorithm for mining association rules”, Proceedings of the 20th VLDB Conference Santiago,Chile, 1994.

17.     Rakesh Agrawal, Tomasz Imielinski, Arun Swami, “Mining Association Rules between Sets of items in Large Databases”, Proceedings of the 1993 ACM SIGMOD conference Washington DC, USA, May 1993, pp. 1- 10.

18.     Jiawie Han, Micheline Kamber, Jian Pie, “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishing, Third edition, pp 248 – 253.

19.     http://www.cs.sunysb.edu/~cse634/lecture_notes/ 07apriori.pdf accessed on date 02-02-2012.





Vidya.M, Reshmi.S

Paper Title:

Alleviating Energy Depletion Attacks in Wireless Sensor Networks

Abstract:    Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about energy draining attacks at the routing protocol layer, which drains battery power. A innovative approach for routing protocols, affect from attack even those devised to be protected which is short of protection from these attacks, which we call energy debilitating attacks, which enduringly disable networks by quickly draining nodes battery power. These energy depletion attacks are not protocol specific but are disturbing and hard to notice, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages.

   Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks.


1.       Eugene.Y.Vasserman, Nicholas Hopper, Vampire attacks Draining life   from ad-hoc wireless sensor networks,IEEE  volume 2 (2014). 2.       Jae-Hwan Chang and Leandros Tassiulas,Maximum lifetime routing in wireless networks,IEEE/ACM Transactions on Networking 12 (2004), no.4
3.       The network simulator — ns-2. http://www.isi.edu/nsnam/ns/

4.       Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001.

5.       John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003.

6.       Daniel Bernstein and Peter Schwabe, New AES software speed records, INDOCRYPT, 2008.

7.       I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic curves in cryptography, Vol. 265, Cambridge University Press, 1999.

8.       Joppe W. Bos, Dag Arne Osvik, and Deian Stefan, Fast implementations of AES on various platforms, 2009.

9.       Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003), no. 10.





Dushyant Kumar Shukla, Munish Vashishtha

Paper Title:

Noise Analysis of Common-Collector Amplifier using Stochastic Differential Equation

Abstract:   In this paper, we analyse the effect of noise in a common-collector amplifier working at high frequencies. Extrinsic noise is analyzed using time domain method employing techniques from stochastic calculus. Stochastic differential equations are used to obtain autocorrelation functions of the output noise voltage and other solution statistics like mean and variance. The analysis leads to important design implications  for improved noise characteristics of the common-collector amplifier.

   common-collector amplifier, noise, stochastic differential equation, mean and variance.


1.        Tarun Kumar Rawat,Abhirup Lahiri, and Ashish Gupta, Noise Analysis of Single-Ended  Input Differential Amplifier using Stochastic Differential Equation,
International Journal of Computer, Information, and System Science, and Engineering, pp.191-196,2008.

2.        Wei Yu and Bosco H. Lueng, Noise Analysis for Sampling Mixers using Differential Equations, IEEE Tran. On Circuit and Systems-II: Analog and Digital Signal Processing, Vol. 46, No. 6, June 1999.

3.        A. Demir, E.W.Y. Liu, and L.S. Vincentelli, Time Domain Non Monte Carlo Method noise simulation for non linear dynamic circuit with arbitrary excitation, IEEE Tran. Computer Aided Design, Vol. 15, pp.493-505,  May 1996.

4.        L. Arnold, Stochastic Differential Equation, John Wiley, NewYork.

5.        Jacob Millman and Christos C. Halkias, Integrated Electronics, Tata McGraw Hill.





Giriraj Sharma, Ashish Kumar Bansal

Paper Title:

A Practical Approach to Improve GSM Network Quality by RF Optimization

Abstract:    All GSM service provider uses KPI to monitor their QOS performance. Report generated from OMCR terminal & customer feedback are considered in further network improvement activity. RF optimization and drive test is the tool to keep continue watch on network QOS .In this paper some practical cases and solutions are adopted to improve the network QOS  during drive test & post processing. Major QOS parameter Handover, call drop, congestion, interference reasons and solutions are discussed. drive test tool Ascom TEMS 10.2.1 is used to perform drive test. if optimization done continuously it will attract more and more customers due to service satisfaction.

   GSM,RF optimization ,Drivetest, TEMS drive test tool, BSC,BTS,TRX,QOS


1.        TEMS investigation user’s manual, 11.0, Ascom- 2010.
2.        Bilal Haider, M Zafrullah Khan, M.K.Islam: Radio Frequency Optimization and QOS in operational GSM network.

3.        Syed Imran Basha, Idrish Shaik: Reducing Handover Failure Rate by RF Optimization

4.        Wireless Communications, Principles and Practice, 2nd    edition, Theodore S. Rappaport, Pearson publications.

5.        ITU-T recommendation G.1000 (2001), Communication quality    ofService: A framework and definition.





Mohammad Ali Adelian

Paper Title:

Improvement of Substation Earthing

Abstract:    Designing a proper substation grounding system is quite complicated. Many parameters affect its design. In order for a grounding design to be safe, it needs to provide a way to carry the electric currents into the ground under both normal and faulted conditions. Also, it must provide assurance that a person in the vicinity would not be endangered. The grounding portion of substation design will be explored. In order to properly plan and design the grounding grid, calculations of the following will be done: maximum fault current, grid resistance, grid current, safe touch and step voltages, ground potential rise, as well as expected touch and step voltage levels. Background information and guidelines to design a substation grounding grid will be provided. A set of equations will be presented to calculate whether the design is safe, and finally, an example will be provided that can be used as a template.

   Safety, reliability Step Voltage, Touch Voltage.


1.        Design Guide for Rural Substations”, Rural Utilities Service. United States Department of Agriculture. June 2001.
2.        Gonen, Turan. “Electric Power Distribution System Engineering.” CRC Press. 2008.

3.        Gonen, Turan. “Electric Power Transmission System Engineering: Analysis and Design.” CRC Press. 2009.

4.        "IEEE 80-2000 IEEE Guide for Safety in AC Substation Grounding."

5.        "IEEE 81-1983 IEEE Guide for Measuring Earth Resistivity, Ground Impedance, and Earth Surface Potentials of a Ground System.”

6.        Markovic, D. Miroslav. “Grounding Grid Design in Electric Power Systems.” TESLA Institute, 1994.

7.        NFPA 70-2008. National Electrical Code. 2008.





Ranjit Kumar Bindal

Paper Title:

A Review of Benefits of FACTS Devices in Power System

Abstract:    In developing countries, a pressure associated with economical and environmental constraints has forced the power utilities to meet the future demand by fully utilizing the existing resource of transmission facilities without building new lines. Flexible alternating current transmission systems (FACTS) devices are used to control the phase angle, voltage and impedance of high voltage AC lines. By using FACTS devices maximum benefits of transmission system can be managed i.e. utilization of existing transmission assets; increased transmission system availability and enabling environmental benefits. This paper presents different types of FACTS devices and their benefits for transmission in electrical power system.

   Transmission system, FACTS Devices, Benefits these devices.


1.       J.J Paserba, “H ow FACTS controllers benefits AC transmission system,” IEEE transmission on Power Engineering Society, Vol.3, sep-2003,pp 949-956.
2.       V.K.Candrakar, M.M.Missal, V.P.Rajderkar, S.N.Durve, “Flexible Alternating Current Transmission System (FACTS) for cost effective and reliable transmission of electrical energy,” National   Power engineering conference (NPEC-07) ,June-2007. 

3.       A.A Edris, R Aapa, M H Baker, L Bohman, K Clark, “ Proposed terms and definitions for flexible ac transmission system (FACTS)”, IEEE Tran. on power delivery Vol. 12, No.4, Oct 1997.

4.       N.G. Hingorani , L. Gyugyi, “ Understanding FACTS : Concepts and Technology of Flexible AC Transmission systems, ”  IEEE Power Engineering Society, IEEE press, Delhi 2001.

5.       ER.Moal Matru , Rajiv K. verma, “tyristor Based FACTS controllers for electrical transmission system ,” IEEE press, wiley Inter science publication , USA





G.Gokilakrishnan, R.Rajesh, R.Sureshkumar, R.Adithya

Paper Title:

An Innovative Cost Effective Slipper for Elderly Persons

Abstract:    This invention of Safety Slippers relates to the safety measures taken on behalf of elderly persons at times of emergency. This idea deals with the integration of program with sensor, transmitter and receiver in a normal slipper to identify the status of the program installed and take the appropriate action in time of need. This idea works on the principle of application of force which is the body weight of the user on the slipper. The concept involves the sensing of the force applied by the user through the sensor placed inside the slipper. The signal thus sensed is passed on to the receiver module through the transmitting module. As long as the signal is sensed continuously, the receiver module keeps the GSM module in deactivated mode. If the signal from the transmitting module is interrupted more than the set time limit, the receiver module activates the GSM module. The GSM module is incorporated with necessary text message or call options to a list of contacts to be sent. When the GSM module activates it alerts the corresponding contacts automatically without the intervention of human regarding the emergency alert.

   safety; slippers; sensor; transmitter; receiver; GSM module


1.       Ch.Naga KK, Raghu babu YV, A.Gamya, P.Jainath, M. Vijay. Design and development of activation and controlling of home automation system via SMS through
microcontroller. International Journal of Engineering Research and Applications ISSN: 2248-9622 Vol. 2, Issue 2,Mar-Apr 2012, pp.1349-1352

2.       Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir, Shahid Jaman, Nahian Chowdhury. Design and Implementation of Low Cost Home Security System using GSM Network - International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012. ISSN 2229-5518

3.       Gokilakrishnan G, Sureshkumar R, Rajesh R. Safety Slippers. Official Journal of Patent Office, Government of India, Issue No 43/ 2013: 27413: Application Number: 4569/ CHE/2013.

4.       Sathya Narayanan, Gayathri S. Design of wireless home automation and security system using PIC microcontroller. International journal of computer applications in engineering sciences - Volume iii, special issue, August 2013 - ISSN: 2231-4946

5.       www.radiolocman.com

6.       www.next.gr

7.       www.open-electronics.org





Ali Fadhil Naser

Paper Title:

Optimization of oblique Angle Design of Abutments and piers, and piers Shape of Continuous Prestressed Concrete Box Girder Bridges: Static Analysis part 1

Abstract:    Skewed bridges are normally used to cross roadways, waterways, or railways that are not perpendicular to the bridge structure at the intersection. It is required when it is often not possible to arrange that a bridge spans square to the feature that it crosses, particularly where it is important to maintain a relatively straight alignment of a roadway above or below the bridge. The pier shape has important effect on the structural performance of the bridge structure according to the location conditions. The main aims of this study are to select the optimal design of piers shape and skew angles in the prestressed box girder bridge, to study the effects of pier shape and skew angles on the static structural responses. There are 120 bridge model are used in this study. FEM of SAP2000 Ver. 14.0.2 is used in the analysis. The results of structural analysis show that the pier shape and skew angle has significant effects on the static responses of the bridge structure. For vertical displacement, the optimal models are skew angle of bridge structure is range from 36 degree to 54 degree and the solid rectangular pier (skew abutments and skew piers). The models of two square piers (skew abutments and without skew piers) and 48 skew angle is the optimal models for bending moment. For tensile stress, the model of skew angle 48 degree and the model of solid rectangular pier (skew abutments and skew piers) is the optimal model. It can be concluded that the skewed models gives good results than straight model.

   bridge, box girder, bending moment, vertical displacement.


1.       F. N. Ali and W. Zonglin, 2011, “Experimental Inspection of Damage and Performance Evaluation after Repair and Strengthening of Jiamusi Highway Prestressed Concrete Bridge in China“, World Academy of Science, Engineering and Technology,V. 73,  2011, pp: 195-201.
2.       State Department of Transportation, “Washington State Bridge Inspection Manual”, Technical Manual, Washington, USA, 2010.

3.       W. N. Al-Rifaie, and A. S. Kareem, “Bridges”, first edition, University of Technology, Baghdad, Iraq, 1986, pp 5-8.

4.       G. Fu and P. Chun, “Skewed Highway Bridges”, Final Report to Michigan Department of Transportation, Center for Advanced Bridge Engineering Department of Civil and Environmental Engineering, Wayne State University, Detroit, Michigan, USA. , 2013.

5.       SteelConstruction.info, “The free encyclopedia for UK steel construction information”, 2014, http://www.steelconstruction.info/Skew_bridges.

6.       NCHRP, “SHEAR IN Skewed Multi-Beam Bridges”, Final Report for National Cooperative Highway Research Program Transportation Research Board National Research Council, USA., 2002.

7.       X.H. He, X.W. Sheng, A.  Scanlon , D.G. Linzell, X.D. Yu, “Skewed concrete box girder bridge static and dynamic testing and analysis”, Engineering Structures, V. 39, 2012), pp:38–49.

8.       S. I. Ibrahim, “Effect of Skew Angle on Behavior of Simply Supported R. C. T-Beam Bridge Decks”, ARPN Journal of Engineering and Applied Sciences, V. 6, No. 8, 2011, pp:1-14.

9.       A. Dhar, M. Mazumder, M. Chowdhury and S. Karmakar, “Effect of Skew Angle on Longitudinal Girder (Support Shear, Moment, Torsion) and Deck Slab of an IRC Skew Bridge, The Indian Concrete Journal, 2013, pp:46-52.

10.     V. Khatri, P. R. Maiti, P. K. Singh and A. Kar, “Analysis of Skew Bridges Using Computational Methods”, International Journal of Computational Engineering V. 2, No.3, 2012, pp:628-636.

11.     F. B. Diab, M. Mabsoutb, and K. Tarhinic,” Influence of Skew Angle on Live Load Moments in Steel Girder Bridges, Bridge Structures, V. 7, 2011, pp: 151–163.

12.     C. C. Fu, L. Tim and T. Getaneh, “Theoretical and Field Experimental Evaluation of Skewed Modular Slab Bridges”, State Highway Administration Research Report, Report No.MD-12-SP109B4N, Maryland State Highway Administration. 2012.

13.     K. M. Kassahun, “Finite Element Modeling of  Skew Slab-Girder Bridges”, Thesis Submitted in partial fulfillment of the requirements for the degree Master of Science Faculty of Civil Engineering and Geosciences Technical University of Delft, 2010.

14.     http://en.wikipedia.org/wiki/Vertical_displacement, 2014.

15.     V. Samuel, K. Gaston, B. David, C. Denis, and I. Daniele, “Vertical Deflection of a Prestressed Concrete Bridge Obtained Using Deformation Sensor and
Inclinometer Measurement”, ACI Structural Journal, V.95, No.5, 1998, pp:518-526.

16.     http://www.learneasy.info/MDME/MEMmods/MEM30006A/Bending_Moment/Bending_Moment.html, 2014.

17.     http://en.wikipedia.org/wiki/Bending_moment., 2014.

18.     http://en.wikipedia.org/wiki/Shear_force, 2014.





Ashish B Chaudhari, S. Jebarani Evangeline

Paper Title:

A Space Vector Pulse Width Modulation Technique to Reduce the Effects of Voltage Unbalances

Abstract:    A space vector pulse width  modulation (SVPWM) technique is a special technique to determine the switching sequence of the semiconductor switches of the inverter. SVPWM provides more efficient use of the dc bus voltage,in comparison with the direct sinusoidal modulation technique.In this paper,switching pulses for three phase inverter has been carried out by using differentiation of alpha voltage vector.To obtain the phase angle,three phase voltages has to be transformed into voltage vectors alpha and beta using Clark’s transformation. In this paper,voltage vector beta has been carried out by differentiating alpha voltage vector using trigonometric relation between alpha and beta vector.The interaction between two voltage vectors has been reduced,which will give better result  compare to conventional SVM method for unbalanced voltage conditions.Different unbalances has been introduced for analysis.MATLAB software has been used for simulation.

   Three phase Inverter,Space Vector Pulse Width Modulation,Clark’s transformation,derivation of alpha voltage vector,voltage unbalances.


1.       Lutfu Saribulut,Mehmet Tumay, “Robust space vector modulation technique for unbalance voltage disturbances”,Elsevier journal,Electric power Systems Research 80(2010) 1364-1374.
2.       Joseph P John,Dr. S. Suresh Kumar, Jaya B,“Space vector modulation based field oriented control scheme for brushless DC motor”,,proceedings of ICETECT 2011

3.       K.Kishore Reddy,K.Vinoth Kumar,P.Ponrajan,S.Ramsankar,“Diode clamped inverter for SVPWM fed induction motor,proceedings of APECT’11 March  2011,FXEC,Tvl.

4.       Gupta A.K,,A.M. Khambadkone.(2006) “A space vector PWM scheme for multilevel inverters based on two-level space vector PWM”, IEEE Transactions on Industrial Electronics 53 ,1631–1639

5.       Celanovic  N.(2000) “Space vector modulation    and control of multilevel converters”,   Faculty of the Virginia Polytechnic Institute and State University, PhD. Thesis.

6.       Fitzer C., M. Barnes, P. Green. (2004)  “Voltage sag detection technique for a dynamic voltage restorer”,IEEE Transactions on Industry Applications  40,203–212.

7.       Mondal S.K.,B.K. Bose, V. Oleschuk, J.O.P.  Pinto. (2003) “Space vector pulse width modulation of three-level inverter extending operation into over modulation region”, IEEE Transactions on Power Electronics 18, 604–611

8.       Mondal S.K., J.O.P. Pinto, B.K. Bose. (2002) “A   neural-network based space-vector   PWM controller for a three-level voltage-fed inverter induction motor drive”,  IEEE Transactions on Power Electronics 38, 660–669.

9.       Pinheiro H., F. Botteron, C. Rech, L. Schuch, R.F.  Camargo, H.L. Hey, H.A. Grundling, J.R. Pinheiro.(2002)“Space vector modulation for voltage-source inverters:a unified approach”,  Industrial Electronics Society 1 ,23–29.

10.     Rodriguez J, J.S. Lai, F.Z. Peng, (2002) “Multilevel inverters: a survey of topologies, controls and applications”,IEEE Transactions on Industrial Electronics 49, 724–738.

11.     Sani A.M.(2007) “Advanced modulation techniques  for power converters”, The University of Manitoba, Master Thesis.

12.     Seok S.H., P.H. Gyu, N. Kwanghee(1999) “An instantaneous phase angle detection algorithm under unbalanced line voltage condition”,Power Electronics Specialists Conference 1, 533–537.





Amir Aliabadian

Paper Title:

A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm

Abstract:    Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach towards to unsupervised learning and is one of the major techniques in pattern recognition. FCM algorithm needs the number of classes and initial values of center for each cluster. These values are determined randomly, so it may cause target function converges to several local center. so many iterative stages are needed, until FCM can reach to global center for each cluster. In this paper, we suggest robust hybrid algorithm in which, we have real unsupervised learning algorithm, no need to initial center value and the number of clusters. The First layer in this algorithm finds initial clustering center by K-nearest neighbor (K-NN) rules based on unsupervised learning approach. In the second layer, we applied FCM only one time for having optimal clustering. It is done by means of Fuzzy clustering validation criterion, unlike FCM that needs iterative process. We applied new algorithm to several set of standard databases (IRIS).results show that this algorithm is more accurate than FCM both in estimation of optimal number of clusters and correctness of devotion of data to their real clusters.

   Cluster analysis. FCM algorithm. K-nearest neighbor. target function.


1.       Kuo-Lung Wu, Miin-Shen Yang - Alternative c-means clustering algorithms - Pattern Recognition35 (2002) 2267 – 2278.
2.       Dae-Won Kima, Kwang H. Lee, Doheon Lee, - On cluster validity index for estimation of the optimalnumber of fuzzy clusters - Pattern Recognition 37 (2004) 2009 – 2025.

3.       Oleg S. Pianykh - Analytically tractable case of fuzzy c-means clustering - Pattern Recognition 39(2006) 35 – 46

4.       Luis Rueda, Yuanquan Zhang - Geometric visualization of clusters obtained from fuzzy clusteringalgorithms - Pattern Recognition 39 (2006) 1415 – 1429

5.       Carl G. Looney - Interactive clustering and merging with a new fuzzy expected value –PatternRecognition 35 (2005) 2413 – 2423

6.       WitoldPedrycz, George Vukovich - Fuzzy clustering with supervision - Pattern Recognition 37(2004) 1339 – 1349

7.       Haojun Sun , Shengrui Wang, Qingshan Jiang - FCM-Based Model Selection Algorithms forDetermining the Number of Clusters - Pattern Recognition 37 (2004) 2027 – 2037

8.       Nabil Belacel, Pierre Hansen, NenadMladenovic - FuzzyJ-Means: a new heuristic for fuzzyclustering - Pattern Recognition 35 (2002) 2193 – 2200

9.       WeilingCai, Songcan Chen, Daoqiang Zhang - Fast and robust fuzzy c-means clustering algorithmsincorporating local information for image segmentation - Pattern Recognition 40 (2007) 825 – 838

10.     Chien-Hsing Chou, Chin-Chin Lin,Ying-Ho Liu, Fu Chang – A prototype classification method andits use in a hybrid solution for multiclass pattern recognition - Pattern Recognition 39 (2006) 624 – 634

11.     N. Zahid, M. Limouri, A. Essaid - A new cluster-validity for fuzzy clustering - Pattern Recognition32 (1999) 1089}1097

12.     Mario G.C.A. Cimino, Beatrice Lazzerini, Francesco Marcelloni – A novel approach to fuzzyclustering based on a dissimilarity relation extracted from data using a TS system - Pattern Recognition39 (2006) 2077 – 2091

13.     Michel MeH nard, Christophe Demko, Pierre Loonis - The fuzzy c-means: solving the ambiguityrejection in clustering - Pattern Recognition 33 (2000) 1219}1237

14.     Malay K. Pakhira, SanghamitraBandyopadhyay, UjjwalMaulik - Validity index for crisp and fuzzy clusters - Pattern Recognition 37 (2004) 487 – 501

15.     Wuhan, Hubei, China ",A Modified FCM Algorithm for MRI Brain Image Segmentation," 2008 International Seminar on Future Bio Medical Information Engineering, December18, 2008





N.Rajasekhar, T.V.Rajini Kanth

Paper Title:

Weather Analysis of Guntur District of Andhra Region using Hybrid SVM Data Mining Techniques

Abstract:    In the recent years, weather prediction has drawn much attention for research community because it helps in safeguarding human life and their wealth. Apart from that, it is useful in effective prediction of natural calamities, agricultural yield growth, air traffic control, marine navigation, forests growth & military purposes. Literature studies shows that Machine Learning Algorithms proved to be good than the existing techniques / methodologies/traditional statistical methods. Hence development of new Hybrid SVM (Support vector machines) model is required for effective weather prediction by analyzing the given weather data and to recognize the patterns existing in it. SVM comes under the set of supervised learning methods for classifications & regression. It will be yielding good results in predicting the weather than the existing machine learning programming techniques. In this paper, Guntur district weather data sets were considered for analysis using the hybrid SVM data mining techniques.

   weather prediction, Machine learning, Data mining techniques, Hybrid SVM.


1.        http://www.timeanddate.com/weather/forecast-accuracy-time.html
2.        http://en.wikipedia.org/wiki/Weather_forecasting

3.        Folorunsho Olaiya, Application of Data Mining Techniques inWeather Prediction and Climate Change Studies, I.J. InformationEngineering and Electronic Business, 2012, 1, 51-59, Published OnlineFebruary 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijieeb.2012.01.07

4.        Dr. M.H.Dunham, Companion slides for the text, “Data Mining,Introductory and Advanced Topics”, Prentice Hall, 2002.

5.        Y.Radhika and M.Shashi, “Atmospheric Temperature Predictionusing Support Vector Machines” International Journal of ComputerTheory and Engineering, Vol. 1,
No. 1, April 2009 1793-8201

6.        Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, Estimation of theInfluence of Fertilizer Nutrients Consumption on the Wheat Crop yield in India- a Data mining Approach, 30 Dec 2013, Volume 3, Issue 2, Pg.No:316-320, ISSN: 2249-8958 (Online).

7.        Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar,  A Data Mining Approach for the Estimation of Climate Change on the Jowar Crop Yield in India, 25Dec2013,Volume 2 Issue 2, Pg.No:16-20, ISSN: 2319-6378 (Online).

8.        A. Vijay Kumar, Dr. T. V. Rajini Kanth  “Estimation of the Influential Factors of rice yield in India” 2nd International Conference on Advanced Computing methodologies ICACM-2013, 02-03 Aug 2013, Elsevier Publications, Pg. No: 459-465, ISBN No: 978-93-35107-14-95.

9.        Dr.David, B.Stephenson, Data analysis methods in weather and Limate research Department of Meteorology University of Reading, July,20, 2005 ,http://www.met.rdg.ac.uk /cag/courses/





Hasan Iqbal, Divendu Mishra, Anchal Ojha, Arun Yadav, Ravi Kumar Srivastava, Satish Kumar Dwivedi

Paper Title:

Brick Lifting Machine

Abstract:    As we can see that during any type of construction work there is a need to carry the bricks from one floor to the other which is done manually by the workers because of which they often get injured and it also consumes a lot of precious time and in turn increases the labour cost, So in order to tackle with this problem with the help of mechanical engineering we had proposed to design a brick lifting machine which can lift up to 50 bricks at a time we had also focused on minimum power consumption and the efficiency so that in minimum power consumption maximum no. of bricks can be lifted. The key points in the designing of the lift is are factor of safety and the counterweight, there are many else technical parameters on which designing of lift depends such as Rate load, rated speed, Height of travel, the number and location of stops, type of drive etc. The motor which will be used for lifting the load will be D.C series motor and the type of drive is gearless traction drive. The gearless traction drive is preferred over geared traction drive because it provides higher efficiency.



1.     Aberkom- Results of experimental work on traction drives, Elevator technology 4 (Proceedings of ELEVCON 92) Amsterdam 1992
2.     Janovysky L – Elevator mechanical design Elis horwood ltd.

3.     Thiemann, H. (1979) Elevators, Veb Verlag Technik, Berlin, (in German).

4.     Philips R.S Electric lifts pitman publishing , London 1973

5.     Strakosch, G Vertical transportation elevators and escalators 2nd edition John Wiley and sons, new York 1983.





Ruchi Sharma, Aditi Gupta

Paper Title:

Differentiation of Oral Streptococcal Species by Haemolysis in Blood Agar Medium in Vitro

Abstract:   Pathogenic bacteria also cause infections such as tetanus, typhoid fever, diphtheria, syphilis, and leprosy. Blood agar medium contain a typical nutrient growth medium enriched with 5% sheep blood.  It is useful for encouraging growth of fastidious organisms. The Three Types of Lytic Activities seen on the plate are- clear zone around bacterial growth -RBC hemolyzed completely (Beta-hemolysis, pathogenic); green zone around growth -RBC partially hemolyzed (Alpha-hemolysis); no change around growth -RBC is not hemolyzed (Gamma-hemolysis or no hemolysis). The discrimination of oral bacteria specifically Streptococcal species can be done by haemolysis tests using blood agar medium. Other than ultramicroscopic and morphological studies this experiment also conveys the species differentiation due to its lytic activity. Thus, blood agar medium can be a useful medium for pathogenic bacterial survey and investigation. The present review has proved the importance of blood agar utilization in diagnostics and disease analysis.

   Bacteria,Streptococcus,  Blood, Agar, Haemolysis


1.       Kumar, Vinay; Abbas, Abul K.; Fausto, Nelson; & Mitchell, Richard N. (2007). Robbins Basic Pathology (8th ed.). Saunders Elsevier. pp. 843 ISBN 978-1-4160-2973-1
2.       Ray, C. George; Ryan, Kenneth J.; Kenneth, Ryan (July 2004). Sherris Medical Microbiology: An Introduction to Infectious Diseases (4th ed.). McGraw  Hill. p. 237. ISBN 978-0-8385-8529-0. LCCN 2003054180.  OCLC 52358530.

3.       Rickard A H (2008). "Cell-cell Communication in Oral Microbial Communities". Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0.

4.       Rogers A H (editor). (2008). Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0.

5.       Shaikh N, Leonard E, Martin JM (September 2010). "Prevalence of streptococcal pharyngitis and streptococcal carriage in children: a meta-analysis". Pediatrics 126 (3): e557–64. doi:10.1542/peds.2009-2648. PMID 20696723

6.       HW; Gerber, MA; Kaplan, EL; Lee, G; Martin, JM; Van Beneden, C (Sep 9, 2012). "Clinical Practice Guideline for the Diagnosis and Management of Group A Streptococcal Pharyngitis: 2012 Update by the Infectious Diseases Society of America.". Clinical infectious diseases : an official publication of the Infectious Diseases Society of America 55 (10): e86–102. doi:10.1093/cid/cis629. PMID 22965026.

7.       Hahn RG, Knox LM, Forman TA (May 2005). "Evaluation of poststreptococcal illness". Am Fam Physician 71 (10): 1949–54. PMID 15926411.

8.       Baltimore RS (February 2010). "Re-evaluation of antibiotic treatment of streptococcal pharyngitis". Curr. Opin. Pediatr. 22 (1): 77–82.

9.       A. Wayne, 2007, Clinical Laboratory Standards Institute. Principles and procedures for  blood cultures; Approved Guideline. CLSI document M47-PA: Clinical and Laboratory Standards Institute, 2007

10.     Baron EJ, Weinstein MP, Dunne WMJ, Yagupsky P, Welch DF, Wilson DM, eds. Cumitech 1C, blood cultures IV. Washington, DC:ASM Press, 2005





M. Sai Sarath Kumar, M. Aarthy

Paper Title:

A 2.8 GHz Low Power High Tuning Voltage Controlled Ring Oscillator

Abstract:    This work describes a two-stage CMOS Voltage Ring Oscillator (VCRO) using differential delay cells are analyzed. The main aim of the paper is to increase the tuning range of the circuit and obtain a good phase noise at the cost of design complexity and power consumption. Two-stage VCRO implemented in 90 nm Technology realizes a tuning range of 53.40% and a phase noise of -156.328 dBc/Hz for a power consumption of 9.85mW. The phase noise of the VCRO is bettered by cascading more number of stages to trade off power consumption A four-stage VCRO is implemented and achieved a tuning range of 62.15% and a phase noise of -116.608 dBc/Hz. However the power consumption of the circuit increased to 16.45mW. 

   Voltage Ring Oscillator, Phase Noise, Tuning Range


1.        “A 1.4GHz CMOS Low-Phase Noise Voltage - Controlled Ring Oscillator”, Ahmad Akmal Abd Ghani and Azilah Saparon, The 5th Student Conference on Research and Development –SCOReD 2007, 11-12 December 2007, Malaysia.
2.        “A 900-MHz CMOS Low-Phase-Noise Voltage-Controlled Ring Oscillator”, William Shing Tak Yan and Howard Cam Luong, , IEEE Transactions Circuits and Systems—II:Analog and Digital Signal Processing, VOL. 48, NO. 2,February 2001.

3.        B. Fahs, W. Y. Ali-Ahmad, and P. Gamand, “A twostage ring oscillator in 0.13-μm CMOS for UWB impulse radio,” IEEE Trans. Microw. Theory Tech.,vol. 57, no. 5, pp.1074–1082, May 2009.

4.        Y. A. Eken and J. P. Uyemura, “A 5.9-GHz voltagecontrolled ring oscillator in 0.18-μm CMOS,” IEEE J. Solid-State Circuits, vol. 39, no. 1, pp. 230–233, Jan. 2004.

5.        Changzhi Li, and Jenshan Lin, ‘’A 1–9 GHz Linear Wide-Tuning-Range Quadrature Ring Oscillator in 130 nm CMOS for Non-Contact Vital Sign Radar Application, 2009”.IEEE Microwave and wireless components Letters, VOL. 20,NO. 1, January 2010.

6.        B. Razavi, “Design of Analog CMOS integrated circuits,” McGraw Hill, 2001.





Miloni Ganatra, Ashwin Patani

Paper Title:

Time and Energy Optimizing Signature Indexing Technique Perform and Implementation by VHDL

Abstract:    The periodic broadcasting of frequently requested data can The periodic broadcasting of frequently requested data can reduce the workload of uplink channels and improve data access for users in a wireless network. Since portable devices have limited energy capacities associated with their relies on battery power, it is important to minimize the time and energy spent on accessing the required data from the broadcasted data. The indexing in the broadcast data plays an important role in this problem.  This research intends to study the indexing technique that is used to save the power and to minimize the access time. The simple signature technique to index data is one of the simplest ways to optimize these factors. The VHDL implementation of simple signature model presented here is real time.

   Mobile computing, mobile client, broadcast, signature indexing.


1.       [Acharya S.,Alonso R., Franklin M and Zdonik S.,”Broadcast Disc: Data Management for Asymmetric Communication Environments”,In Preceeding of ACM sigmod,pp 199-210.1995
2.       Serfert A.and  Hung J. “ FlexInd: A Flexible and Parametrised Air Indexing Scheme of Data Broadcast System”  EDBT 2006 LNCS 3896 pp 902-920 (2006).

3.       T. Imielinski, S. Viswanathan, and B. R. Badrinath. Energy efficiency indexing on air. In Proceedings of the International Conference on SIGMOD, pages 25–36, 1994.

4.       Imielinski T., Viswanathan S. and Badrinath B. R., “Data on Air: Organization    and Access”, IEEE Transactions on Knowledge and Data Engineering, 9(3): 353-371, 1997.

5.       Lee, D.K., Xu, J., Zheng, B. and Lee, W-C, “Data Management in Location-Dependent Information Services”, IEEE Pervasive Computing, 2(3):65-72, July-Sept, 2002.

6.       Amermend, D., Aristugi, M. “An Index Allocation Method for Data Access over Multiple Wireless Broadcast Channel” IPSJ Digital Courier, Vol. 2, 852 – 862, 2006.

7.       Lee G., Chen e, and Lo S-C, “Broadcast Data Allocation for Efficient Access on Multiple Data Items in Mobile Environments”, Mobile Networks and Applications, 8, 365- 375, 2003.

8.       Hu Q., Lee W. C. and Lee D. L. “Indexing Techniques for Wireless Data Broadcast under Data Clustering and Scheduling” CIKM ’99, 1 l/99 Kansas City, MO, USA (1996).





S.Adebayo Daramola, Olujimi Ajayi, Tiwalade Odu

Paper Title:

Robust Palm-print Feature for Human Identification

Abstract:    Palm-print is a unique biometric trait commonly uses to distinguish people. Identification of people with aid of machine is needed to solve insecurity challenges in our society.  Human palm-print is a good raw material for machine based identification systems. These systems require strong predominate feature from palm-print for successful operation.   In this work, a discriminate feature that can be used to differentiate people accurately is extracted from palm-print image. Edge detected palm-print image is sliced into smaller image blocks through centre points thereafter robust feature vector is generated from these smaller image blocks.  The new feature was experimental using feature plot and it is shown clearly that this feature will deliver excellent classification result.

   Centre points, City block distance, Image blocks, Palm-print.

1.        M. Nageshkumar., P.K Mahesh. and M.N. Shanmukha Swamy, “An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image”, International Journal of Computer Science Issues, Vol.2,  2009, pp49-53,
2.        S. Zokaee, K. Faez, “Human Identification Based on Electrocardiogram and Palmprint”, International Journal of Electrical and Computer Engineering, Vol.2, No.2, 2012, pp. 261-266. 

3.        D. Y Liliana, E. T Utaminingsih, “The Combination of Palm print and Hand Geometry for Biometrics Palm Recognition”, International Journal of Video & Image Processing and Network Security. Vol.12, No.1,  2012,  pp.1-5.   

4.        S. Kumra. T. Rao, “A Novel Design for a Palm Prints Enabled Biometric System”, IOSR Journal of Computer Engineering (IOSRJCE) Volume 7, Issue 3, 2012, pp. 1-8.

5.        W. K Kong,  D. Zhang., W. Li, “Palmprint Feature Extraction using 2-D Gabor Filters”, The Journal of Pattern Recognition Society”, Vol. 36, 2003, pp.2339 – 2347. 

6.        S. Karar and R. Parekh, “Palmprint Recognition using Phase Symmetry”, International Journal of Scientific and Research Publications, Vol.3, Issue 4, 2013, pp. 1-6.

7.        H. M Salman, “Palmprint Characterization Using Multi-wavelet Transform for Human Identification”, Eng.& Tech.Journal, Vol.27, No.3, 2009, pp405-417.
8.        J. Guo, Y. Liu, W. Yuan, “Palmprint Recognition Using Local Information from a Single Image Per Person”, Journal of Computational Information Systems, Vol.8 (8), 2012, pp.3199 – 3206. 

9.        H Imtiaz, S Aich, S A Fattah, “A Novel Pre-processing Technique for DCT domain Palm-print Recognition”, International Journal of Scientific & Technology Research , Volume 1, Issue 3, 2012,  pp.31 – 35. 

10.     N. Swathi, C. Satish, V. S Satyanarayana, P. Ramesh, H. Kumar, N. Bhuma, C. Himabin, “New Palm Print Authentication System By Using Wavelet Based Method”,  Signal & Image Processing : An International Journal(SIPIJ) , Vol.2, No.1, .  2011, pp.191 – 203 .

11.     K. Ito, T. Aoki, H. Nakajima, K. Kobayashi and T. Higuchi, “A Palmprint Recognition Algorithm using Phase-based Image Matching” , IEEE International Conference of Image Processing ,  2006, pp.2669 – 2672.

12.     Jyoti Malik1, Ratna Dahiya1, G. Sainarayanan, “Personal Authentication Using Palmprint with Phase Congruency Feature Extraction Method”, International Journal of Signal Processing, Image Processing and Pattern Recognition system. Vol. 4, No. 3, 2011, pp. 19-34.

13.     K .Umadevi1 and L.Latha, An Efficient Searching and  Clusterig  based Palmprint  Identification, Research Journal of Computer Systems Engineering – RJCSE,  Vol 04, 2013,  pp. 613 – 617.

14.     K.Shanmugapriya, M. Karthika, Dr. S.Valarmathy, M.Arunkumar, “Performance Evaluation of Contourlet Transform based Palmprint Recognition using Nearest Neighbour Classifier”, International Journal of Emerging Technology and Advanced Engineering Volume 3, Issue 1, 2013, pp. 294 – 299.

15.     J. Malik1, G. Sainarayanan and R. Dahiya, “Personal Authentication using Palmprint  with Sobel code, Canny edge and Phase Congruency Feature Extraction Method”,  ICTACT Journal on  Image and Video Processing , Vol. 02, Issue  03,  2012, pp.357- 368.

16.     Allen George, G.Karthick, “Palmprint Recognition Using Ridge Features”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 11, 2013 ,  pp.4288 - 4291 .





R. Abd Allah

Paper Title:

Busbar Protection Scheme Based on Alienation Coefficients for Current Signals

Abstract:    In modern digital power system protection systems, statistical coefficients technique is recently used for fault analysis. An alienation technique is developed for busbar protection against all ten types of shunt faults, which may locate in busbar protection zone, under different loading levels, fault resistances and fault inception angle. It does not need any extra equipment as it depends only on the three-line currents measurements, of all feeders connected to the protected busbar, which are mostly available at the relay location. It is able to perform fault detection, fault confirmation, faulty phase selection and determine the fault location in about a half-cycle period. Thus, the alienation technique is well suited for implementation in digital protection schemes. The technique is efficient to detect current transformer saturation conditions without needing any additional algorithm.  The effects of DC components and harmonics are eliminated with estimation of alienation coefficients. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB package are used to implement the proposed technique.

   Busbar protection, current transformer saturation, fault detection, internal and external faults, alienation coefficient, ATP software, MATLAB.


1.        IEEE Guide for the Application of Current   Transformers Used for Protective Relaying Purposes IEEE Std. C 37.110-1996.
2.        Working group of the Relay Input Sources Subcommittee of the Power System Relaying Committee “Transient response of current transformers” IEEE Transaction on power apparatus and systems, Vol. PAS-96, no. 6, November/December 1977.

3.        W.J. Smolinky “Design Consideration in the Application of Current Transformers For Protective Relaying Purposes”, IEEE Transactions on Power Apparatus and System, Vol. PAS-92, no.4, July/August 1973.

4.        D.A. Bradley, C.B.Gray, D.O’Kelly “Transient compensation of current transformers” IEEE Transactions on Power Apparatus and Systems, Vol. PAS-97, no.4, July/Aug 1978

5.        Y.C. Kang, J.K.Park, S.H.Kang, A.T. Johns, R.K. Aggarawal “ An algorithm for compensating secondary currents of current transformers” IEEE Transactions on Power Delivery, Vol.12, no.1, January 1997

6.        D.C.Yu,Z.Wang, J.C. Cummins,H.-J. Yoon,L.A.Kojovic,and D.Stone  “Neural network for current transformer  saturation correction” in proc. IEEE Transm. Distrib. Conf., New Orrleans,LA,Apr.1999.

7.        M.E. Masoud, E.H.Shehab-Eldin, M.M Eissa, and M.F.Elnagar. “A New Compensating secondary current technique for saturated current transformers” The 8thInternational Middle- East power system conference “MEPECON 2001”, PP549-555.

8.        Jiuping Pan, Khoi Vu, and Yi Hu “An Efficient Compensation Algorithm for Current Transformer Saturation Effects” IEEE Transactions on Power delivery, Vol. 19, no.4, October, 2004, PP1623-1628.

9.        M.A. Salem, M.I. Gilany,Z. Osman and E. aboul Zahab “ A new algorithm for compensating the secondary current during current transformer saturation” The tenth International Middle- East power systems conference “MEPECON 2005” PP 427-433.

10.     M.S. Sachdev, T.S. Sidhu, H.S. Gill, ''A busbar protection technique and its performance during CT saturation and CT ratio-mismatch'', Power Delivery, IEEE
Transactions on  (Volume:15,  Issue: 3 ), Page(s):895 - 901, Jul 2000.

11.     Xuyang Deng, Jiale Suonan, Zaibin Jiao and Xiaoning Kang, ''A Model Parameter Identification Based Bus-bar Protection Principle'', Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010.

12.     Jiale Suonan, Xuyang Deng and Guobing Song, ''A Novel Busbar Protection Based on Fault Component Integrated Impedance'', Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010.

13.     Libao Xu, Grasset, H.,  Xingli Dong, Chenliang Xu and Ruidong Xu, ''A new method for busbar protection stability improvement'', Developments in Power System Protection (DPSP 2010). Managing the Change, 10th IET International Conference on, Page(s):1-4, April 2010.

14.     ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual  Preliminary Release No. 1.1 - October 2002.

15.     W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

16.     Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976.

17.     Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed. Ames, IA: Iowa State Press, pp. 175-178, 1980.

18.     Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University Press, pp. 630-633, 1992.

19.     Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294-323, 1992.

20.     Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban,2006.





B. Roja Reddy, Uttarakumari M.

Paper Title:

Orthogonal MIMO Radar Waveform Performance Analysis with Ambiguity Function

Abstract:    In this paper, the basic Multiple Input and Multiple Output ambiguity function tool is used to analyze the performance of orthogonal waveforms for MIMO radar antenna system. The orthogonal waveforms like modified Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Polyphase and Discrete Frequency Coding Space Time Waveform (DFCSTW) waveforms are considered. The resolution performance is governed and controlled by the system on transmit using orthogonal waveform diversity. The resolution performance is illustrated using MIMO radar orthogonal waveforms.

   Ambiguity Function (AF), Discrete Frequency Coding Space Time Waveform (DFCSTW), Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Orthogonal waveforms, Polyphase Waveforms.


1.        E.Fishler, A.Haimovich, R. Blum, L.Cimini, D.Chizhik, and R. Valenzuela, “MIMO radar: An idea whose time has come,” in proceedings of IEEE International Radar conference, Philadelphia, PA, April 2004, pp No.71-78.
2.        Qu JinYou Zhang JianYun Liu ChunQuan, “The Ambiguity Function of MIMO Radar,” in IEEE 2007 International Symposium on Microwave, Antenna, Propagation, and EMC Technologies For Wireless Communications, Hangzhou, 16-17 , Aug. 2007, pp no.265 – 268.

3.        Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Optimization Using Frequency-Hopping Waveforms,” in 41st Asilomar Conference in Signals, Systems and Computers, Pacific Grove, CA, 4-7 Nov. 2007, pp no. 192 – 196.

4.        Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Properties and Optimization Using Frequency-Hopping Waveforms,” in IEEE Transactions on Signal Processing, Vol 56, No. 12, Dec.2008,  pp no. 5926- 5936.

5.        Harger, Robert O. , “A Note on the Realization of Ambiguity Functions,” in IEEE Transactions on Space Electronics and Telemetry, 12 November 2007, pp no. 127 – 130.

6.        Bo Liu, Zishu He, liankui Zeng, “Optimization of Polyphase Code Based on Ambiguity Function for MIMO Radar, ” in International Conference on Communications, Circuits and Systems,  Kokura, 11-13 July 2007, pp no. 111 - 114

7.        Chun-Yang Chen and P. P. Vaidyanathan, “   Properties of the MIMO Radar Ambiguity Function, ”  in IEEE International Conference Acoustics, Speech and Singal Processing, Las Vegas, NV March 31 2008-April 4 2008, pp no. 2309 – 2312

8.        Yuri 1. Abramovich, Gordon 1. Frazer, “MIMO Radar Performance in clutter Limitations Imposed by Bounds on the Volume and Height  Distributions for The MIMO Radar Ambiguity  Function,” in 5th IEEE Signal Processing Workshop Array and Multichannel, Darmstadt, 21-23 July 2008, pp no. 441 – 445.

9.        Yuri I. Abramovich, Gordon J. Frazer, “Bounds on the Volume and Height Distributions for the MIMO Radar Ambiguity Function,” on IEEE Signal Processing Letters, Vol 15, 2008, Vol. 15, 2008, pp no. 505– 508.

10.     M. A. Haleem and A. Haimovich, “On The Distribution Of Ambiguity Levels in MIMO Radar, ” in 42nd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA,  26-29 Oct. 2008, pp no. 198 – 202.

11.     Daniel R. Fuhrmann, J. Paul Browning, and Muralidhar Rangaswamy, “Ambiguity function analysis for the Hybrid MIMO Phased-array Radar ,” in IEEE Radar
Conference, Pasadena, CA, 4-8 May 2009, pp no.1 – 6.

12.     Jamil, M. ; Zepernick, H. ; Pettersson, M.I. , “ Properties of ambiguity functions for weighted pulse trains with Oppermann sequences, ”  in International Conference on Signal Processing and Communication Systems, Omaha, NE V, 28-30 Sept. 2009, pp no. 1 – 8.

13.     Rajesh Sharma, “Analysis of MIMO Radar Ambiguity Functions and Implications on Clear Region ,” in Radar conference, Washington, DC, 10-14 May 2010, pp no.544 – 548.

14.     V.U. Reddy, “Signal Design for a Specified Transmit Beampattern, Spatial Ambiguity Function for MIMO Radar: A Brief Review of Recent Results, ” in IEEE Applied Electromagnetic Conference, Kolkatta, Indiai, 18-22 Dec. 2011, pp no. 1-4.

15.     Wicks, M.C. ; Vela, R. ; Lo Monte, L.,“  Range-Doppler-Angle Ambiguity Function Analysis in Modern Radar, ”in IEEE International Symposium on Antenna and Propagation Society, Chicago, IL 8-14 July 2012, pp no. 1.

16.     Wei Zhou, Haowen Chen, Weidong Jiang, Hongqiang Wang, “Generalized Ambiguity Function Analysis of MIMO SAR ,”  in IEEE 11th International Conference Signal Processing, Vol 3, Beijing, 21-25 Oct. 2012, pp no. 1724 – 1728.

17.     Honghui Yan, Guowei Shen, Rudolf Zetik, Ole Hirsch, and Reiner S. Thomä, “Ultra-Wideband MIMO Ambiguity Function and Its Factorability, ”  in IEEE Transactions on geosciences and Remote Sensing, Vol 51, No. 1, January 2013, pp no.504-519.

18.     Uttam K. Majumder, Mark R. Bell, Muralidhar Rangaswamy, “A Novel Approach for Designing Diversity Radar Waveforms that are Orthogonal on Both Transmit and Receive,” in IEEE Radar Conference, Ottawa, April 29 -May 3 2013, pp no. 1 – 6.

19.     Waseem Khan, Ijaz Mansoor Qureshi, and Kiran Sultan,“ Ambiguity Function of Phased–MIMO Radar With Colocated Antennas and Its Properties,” in IEEE Geoscience and Remote Sensing Letters, vol PP, Issue:99, 05 December 2013, pp no. 1 – 5.

20.     H. Deng, “Polyphase code design for orthogonal netted radar systems,” IEEE Trans. Signal Process., vol. 52, no. 11, pp. 3126–3135, Nov.2004.

21.     Bo., Liu., Zishu., He., Jiankui., Zeng., Benyong., Liu, “Polyphase Orthogonal Code Design for MIMO Radar Systems,” Proc. Int. Conf Radar, Shanghai, April 2006, pp. 1-4.

22.     Bo Liu, Zishu He, Jun Li, “Mitigation of Autocorrelation sidelobe peaks of Orthogonal Discrete Frequency-Coding waveform for MIMO Radar”, in proceedings of IEEE Radar conference, pp 1-6, China, Chengdu,2008.

23.     B. Roja Reddy, M uttarakumari, “Generation of orthogonal discrete frequency coded waveform using accelerated particle swarm optimization  algorithm for MIMO radar”, Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA 2012), New Delhi, India, Volume 1, pp 13-23,
May 25-27, 2012.

24.     Smt. B.Roja Reddy, M. Uttara Kumari, “Polyphase orthogonal Wave Form using Modified particle swarm optimization algorithm for MIMO Radar”, ”IEEE International Conference on Signal Processing Computing and Control at WAKNAGHAT-SHIMLA from March 15-17th -2012.





Samir S. Rathod, G. Niranjana

Paper Title:

Effective Resource Utilization for Caching as a Service in Cloud

Abstract:    With the growing popularity of cloud based data centers as the enterprise IT platform of choice, there is a need for effective management strategies capable of maintaining performance. Caching technology improves the performance of the cloud. Cache as a service (CaaS) model is an additional service to Infrastructure as a service (IaaS). The cloud server process introduce, pricing model together with the elastic cache system. This will increase the disk I/O performance of the IaaS, and it will reduce the usage of the physical machines. The emerging cloud applications provide data management services allowing the user to query the cloud data, paying the price for the infrastructure they use. Cloud management necessitate an economy that manages the services of multiple users in an efficient, but also, resource economic way that allows for cloud profit. The cloud caching service can maximize its profit using an optimal pricing scheme. This scheme requires an appropriately simplified price-demand model that incorporates the correlations of structures in the cache services. The pricing scheme should be adaptable to time changes. This paper proposes a novel price demand model designed for a cloud cache and a dynamic pricing scheme for queries executed in the cloud cache. This will estimates the correlations of the cache services in a time-efficient manner and improve the efficiency of resources in cloud storage infrastructure to deliver scalable service.

   Cloud Computing, CaaS model, Virtual Machine, Remote Memory, Optimal pricing scheme.


1.       X. Zhang and Y. Dong, "Optimizing Xen VMM Based on Intel Virtualization Technology," Proc. IEEE Int'l Conf. Internet Computing in Science and Eng. (ICICSE '08), 2008
2.       H. Kim, H. Jo, and J. Lee, "XHive: Efficient Cooperative Caching for Virtual Machines, " IEEE Tran s. Computers, vol. 60, no. 1, Jan. 2011

3.       G. Jung, M. A. Hiltunen, K. R. Joshi, "Amazon Elastic Compute Cloud", Amazon Web Services, 2010.

4.       Verena Kantere , Debabrata Dash , Gregory Francois , Sofia Kyriakopoulou, Anastasia Ailamaki Ecole Polytechnique F'ed'erale de Lausanne, "Optimal service pricing for a cloud cache", vol. 23, no. 9, pp. 1345-1358, 2011.

5.       M.D. Dahlin, R.Y. Wang, T.E. Anderson, and D.A. Patterson, "Cooperative Caching: Using Remote Client Memory to Improve File System Performance,” Proc. First USENIX Conf. Operating Systems Design and Implementation (OSDI ’94), 1994.

6.       A. Menon, A.L. Cox, and W. Zwaenepoel, “Optimizing Network Virtualization in Xen,” Proc. Ann. Conf. USENIX Ann. Technical Conf. (ATC `06), 2006.

7.       Hyuck Han, Young Choon Lee, Woong Shin, Hyungsoo Jung, Heon Y. Yeom and Albert Y. Zomaya, "Cashing in on the Cache in the Cloud", IEEE Transactions on Parallel and Distributed Systems, Vol. 23, no. 8, August 2012.

8.       C. Park, P. Talawar, D. Won, M. Jung, J. Im, S. Kim, and Y. Choi, “A High Performance Controller for NAND Flash-Based Solid State Disk (NSSD),” Proc. IEEE Non-Volatile Semiconductor Memory Workshop (NVSMW `06), 2006.

9.       J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazie'res, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S.M. Rumble, E. Stratmann, and R. Stutsman, "The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM/' ACM SIGOPS Operating Systems Rev., vol. 43, pp. 92-105, Jan. 2010

10.     C.A. Waldspurger, “Memory Resource Management in VMware ESX Server,” Proc. Fifth USENIX Conf. Operating System Design and Implementation (OSDI `02), 2002.





Vishal Srivastava, Tejasvi Gupta, Sourabh Kumar, Vinay Kumar, Javed Rafiq, Satish Kumar Dwivedi

Paper Title:

Automatic Side Stand

Abstract:    The side stand is used for supporting a parked motorcycle. If the rider may forget to retract the side stands before riding, then the undistracted stand hitting the ground and affected the riders control during the turn. Now a day’s sensor are used for ensure that the stand is in released condition. The motorcycle side stand consists of a metallic rod and helical spring which is offset from the centre. Some side stand retract automatically when the motorcycle is lifted up the support  some other are fit with electrical interlocks , warning devices or special retracting mechanism. In this paper there is possibility to reduce the evident which is takes place by the side stand. Side stand in two wheelers function the entire weight of the vehicle when it is parked. They are perfect on quick stop when one need to leave the vehicle for short while. They are provided with the spring that pulls it back into position to ensure extra safety. The presented mechanism consists of D.C. motor powered by motorcycles battery. Connected to the worm and worm gear mechanism for reduction of speed of motor and multiply the torque. The motor is actuated by the  Rotation sensor which is mounted on the front of the wheel.



1.       Everett, S.A., Shults, R.A., Barrios, L.C., Sacks, J.J., Lowry, R. and Oeltmann, J. (2001) Trend and subgroup differences in transportation related injury risk and safety behaviors among high school students.
2.       Reeder, A.I., Chalmers, D.J. and Langeley, J.D. (1996) The risky and protective motorcycling opinions and behaviors of young on road motorcyclist in New Zealand

3.       A journal paper ‘motorcycle accidents- case study and what do learn from them’ by Ecker, H. Viema University of Technology,

4.       Bhimbra         P.S,          2009-2010, ‘Electrical machine’.

5.       Sharma P.C., 2010-2011, ‘Machine design’ study for design purpose.

6.       Singh Sadhu, 2009-2010, ‘Machine design’ study for design purpose.

7.       R.S. Khurmi, 2008-2010, ‘Theory of machine study for torque calculation.

8.       Sabey, B.E. and Taylor, H. (1980) The known risk We run: The Highway.

9.       Hurt, H.H., Ouellet, J.V. and Thom, D.R. (1981) Motorcycle accident cause factors.

10.     Grayson, G. and Hakkert, A. (1987) Accident analysis and conflict behaviour. In J. Rothengatter and R. de Bruin (eds) Road user and traffic safety.

11.     Malaterre, G. (1990) Error analysis and in- depth accident analysis.

12.     Yin, R.K., (1984) case study research, Applied Social research Methods vol. 5. London Sage Publication.

13.     1891- Frederick G.Taylor and R.L GRANSTON, “bicycle support”, U.S.patent 456,347

14.     1928- W.S. Harley and Arthur R. Constantine assignors to Harley Davidson Motor Co., Milwau-kee, “Cycle Support”, U.S. Patent  1,675,551





Gazal Betab, Ranjeet Kaur Sandhu

Paper Title:

Fingerprints in Automated Teller Machine-A Survey

Abstract:    The main objective of this system is to develop a system that will increase the ATM security. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds.. The ATM will service one customer at a time. A customer will be required to enter a login id and validate his finger print and both will be sent to the bank for validation as part of each transaction. This makes the developed ATM software more secure as compared to the software that authenticates the user merely by using a PIN or password.

   ATM Fraud, ATM Fraud Countermeasures Biometrics, Fingerprint Verification.


1.        ”Automatic Teller Machine”. The history of computing project. Thocp.net. 17 April 2006
2.        Bhawna Negi 1 , Varun Sharma”Fingerprint Recognition System”, International Journal of Electronics and Computer Science Engineering 872 , www.ijecse.org ISSN- 2277-2011.

3.        Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008).

4.        G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008).

5.        Pennnam Krishnamurthy and Mr. M. Maddhusudhan Redddy. “Implementation of ATM Security by Using Fingerprint recognition and GSM”,  International Journal of Electronics Communication and Computer Engineering.Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X

6.        Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy,” Implementation of ATM Security by Using Fingerprint recognition and GSM”, International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X,(2012)

7.        Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image Computing Techniques and Applications, pp. 245-252, (2007).

8.        S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System”, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011.





Priyank Rajvanshi, Subhash Chand Gupta

Paper Title:

Single Sign on Using SAML

Abstract:    With the proliferation of SaaS and other web-based applications, identity management is becoming a major concern for businesses. Just think about the number of usernames and password you regularly type each day. You probably log into your company's network, portal, webmail, benefits system, Google Apps, bespoke applications and of course Force.com applications. Now multiply this by the number of users in your company and think about the support and security implications. You need dedicated resources to manage your identity store, respond to password reset requests, provision new users for each system and deactivate users that no longer need access. Just think of the number of man hours you could save if you could eliminate 25-50% of your passwords and their associated costs. Implementing a Single Sign-On (SSO) infrastructure enables users to sign in once and have access to all authorized resources. In this article, we'll look at the different methods of implementing SSO with Force.com, how to set up your own open source identity management system for federated authentication using SAML 2, and how to configure the Force.com platform to utilize your new identify provider. We'll also provide some troubleshooting techniques and outline some best practices to help you avoid common roadblocks, getting you up and running fast. In our approach we are trying to create Single Sign On in Salesforce so that in the applications which are connected to salesforce can be authenticated with this approach.

   Security, Identity Provider, SAML, Single Sign-On, Web, Authentication.


1.        OASIS Frequently Asked Questions “http://www.oasis- open.org/who/faqs.php”, 2009.
2.        P. Madsen. SAML 2: The Building Blocks of Federated Identity “http://www.xml.com/pub/a/2005/01/12/saml2.html”, 2005.

3.        Differences   Between   SAML   V2.0   and   SAML   V1.1. “https://spaces.internet2.edu/display/SHIB/SAMLDiffs”, Feb. 2007.

4.        N. Ragouzis et al. Security Assertion Markup Language (SAML)  V2.0  Technical  Overview.  “http://www.oasis- open.org/committees/download.php/22553/sstc-saml-tech- overview.pdf”, Feb. 2007.

5.        S. Cantor et al. Metadata for the OASIS Security Assertion Markup    Language    (SAML)    V2.0.    “http://docs.oasis- open.org/security/saml/v2.0/saml
metadata-2.0-os.pdf”, March 2005.

6.        M. Theimer. HttpFox 0.8.4. “https://addons.mozilla.org/en- US/firefox/addon/6647”, 2009.

7.        HttpWatch. “http://www.httpwatch.com/”, 2009.

8.        F. Hirsch et al. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasis-open.org/security/saml/v2.0/saml- sec-consider-2.0-os.pdf”, March 2005.

9.        S. M. Hansen, J. Skriver, and H. R. Nielson. “Using static analysis to validate the SAML single sign-on protocol”, in Proceedings of the 2005 workshop on Issues in the theory of security (WITS ’05), 2005, pages 27–40.

10.     T. Großand, and B. Pfitzmann, “Saml Artifact Information Flow Revisited”. Research Report RZ 3643 (99653), IBM Research, “http://www.zurich.ibm.com/security/publications/2006/Gr Pf06.SAML-Artifacts.rz3643.pdf”, 2006.

11.     S. Gajek, L. Liao, and J. Schwenk. “Stronger TLS bindings for SAML assertions and SAML artifacts”, in Proceedings of  the  2008  ACM  Workshop  on  Secure  Web  Services (SWS ’08), 2008, pages 11-20.





R. Abd Allah

Paper Title:

Automatic Power Factor Correction Based on Alienation Technique

Abstract:    In modern digital protection and control systems, an alienation technique has recently become the workhorse of quantitative research and analysis. In this paper, an alienation technique is developed for calculations of original power factor on-line, active and compensation reactive powers and determination of the required number of capacitor banks to get the desired power factor. Alienation coefficients are calculated between phase voltage and current signals of power supply. These calculations are performed within one-cycle. Thus, the algorithm is well suited for implementation in a digital reactive power control scheme. This scheme is able accurately to identify the required capacitor rating to get the desired power factor under different loading levels. It does not need any extra equipment as it depends only on the voltage and line-current measurements which are mostly available at the relay location. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed technique.

   Power system, power factor correction, correlation coefficient, alienation coefficient, reactive power control relays, ATP software, MATLAB..


1.        K. K. Kapil, “Reduction in transmission and distribution loses, an opportunity for earning carbon credits”, Available online: http://www.slideshare.net/kris_kapil/cdm-in-reduction-in-transmission and-distribution-losses.
2.        Y. Jiang, F.C. Lee, G. Hua and W. Tang, “A novel single-phase power factor correction scheme,” Eighth Annual Applied Power Electronics Conference and Exposition, pp: 287-292, 1993.

3.        S. Basu and M.H.J. Bollen, “A Novel Common Power Factor Correction Scheme for Homes and Offices,” IEEE Transactions on Power Delivery, Volume: 20, Issue: 3, pp: 2257 - 2263, 2005.

4.        L. W. W. Morrow, “Power-factor correction,” Transactions of the American Institute of Electrical Engineers, vol. XLIV, pp. 1–7, Jan 1925.

5.        D.K. Maly and K.S. Kwan, “Optimal battery energy storage system (BESS) charge scheduling with dynamic programming,” IEE Proceedings in Science, Measurement and Technology, pp: 453- 458, 1995.                                                                     

6.        Fang Lin Luo and Hong Ye, ''Research on DC-Modulated Power Factor Correction AC/AC Converters'' Industrial Electronics Society, 2007. IECON 2007. 33rd Annual Conference of the IEEE, PP: 1478 – 1483, Nov. 2007.

7.        Shicheng Zheng, Electr. & Inf. Sch. And Biqing Liao,''Research on active power factor correction based on PDC control'', Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, PP:1413 – 1418, May 2009.

8.        Mather, B.A. and Maksimović, D., ''A Simple Digital Power-Factor Correction Rectifier Controller'', Power Electronics, IEEE Transactions on  (Volume: 26 ,  Issue: 1) , PP: 9 – 19, Jan. 2011.

9.        Wang Su, ''Research and Simulation of Active Power Factor Correction Based on the Three-Phase Rectifier'', Power and Energy Engineering Conference (APPEEC), 2011 Asia-Pacific, PP:1 – 3, March 2011.

10.     J. Hazra, Balakrishnan Narayanaswamy, Kaushik Das, Ashok Pon Kumar, Deva P Seetharam, De Silva Liyanage and Sathyajith Mathew "Decentralized Power Factor Correction." Sustainable Future Energy 2012 and 10th See Forum Innovation for Sustainable and Secure Energy 21-23 November 2012, Brunei Darussalam.

11.     Sanjay N. Patel, Mulav P. Rathod, Keyur C. Patel, Parth H. Panchal, Jaimin N. Prajapati , ''Thyristorised Real Time Power Factor Correction (TRTPFC)'', International Journal of Engineering Research & Technology, Vol.2 - Issue 3, March – 2013.

12.     Abhinav Sharma, Vishal Nayyar, S. Chatterji, Ritula Thakur3and P.K. Lehana, ''PIC Microcontroller Based SVC for Reactive Power Compensation and Power Factor Correction'', International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013.

13.     ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002.

14.     W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

15.     Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976.

16.     M.Vitins, "A correlation Method for transmission line protection'', IEEE Transactions Power Apparatus and Systems, Vol.97, No.5, Sep/Oct 1978, pp.1607-1617.

17.     Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed. Ames, IA: Iowa State Press, pp. 175-178, 1980.

18.     Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University Press, pp. 630-633, 1992.

19.     Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294-323, 1992.





R. Abd Allah

Paper Title:

Protection Scheme for Transmission Lines Based on Correlation Coefficients

Abstract:   In modern digital power system protection systems, statistical coefficients technique is recently used for fault analysis. A correlation technique is developed for faults detection and discrimination. The proposed technique is able to accurately identify the condition of phase(s) involved in all ten types of shunt faults that may occur in extra high-voltage transmission lines under different fault resistances, inception angle and loading levels. The proposed technique does not need any extra equipment as it depends only on the three line-currents measurements which are mostly available at the relay location. This technique is able to perform the fault detection, type and phase selection in about a half-cycle period. Thus, the proposed technique is well suited for implementation in digital protection schemes. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed technique.

   Power system, fault detection, fault classification, correlation coefficient.


1.        M. M. Saha et al., “A new accurate fault location algorithm for series compensated lines,” IEEE Trans. Power Delivery, vol. 14, pp. 789–797, July 1999.
2.        A. G. Phadke, Computer Relaying for Power Systems. New York: Wiley, 1988.

3.        R. K. Aggrawal, Q. Y. Xuan, R. W. Dunn, and A. Bennett, “A novel fault classification technique for double-circuit line based on a combined unsupervised/supervised neural network,” IEEE Trans. Power Delivery, vol. 14, pp. 1250–125, Oct. 1999.

4.        W.-M. Lin, C.-D. Yang, and J. H. Lin, “A fault classification method by RBF neural network with OLS learning procedure,” IEEE Trans. Power Delivery, vol. 16, pp. 473–477, Oct. 2001.

5.        T. Dalstein and B. Kulicke, “Neural network approach to fault classification for high speed protective relaying,” IEEE Trans. Power Delivery, vol. 10, pp. 1002–1011, Apr. 1995.

6.        D. K. Ranaweera, “Comparison of neural network models for fault diagnosis of power system,” Elect. Power Syst. Res., pp. 99–104, 1994.

7.        K. H. Kim and J. K. Park, “Application of hierarchical neural networks to fault diagnosis of power system,” Int. J. Elect. Power Energy Syst., vol. 15, no. 2, pp. 65–70, 1993.

8.        A. L. O. Fernandez and N. K. I. Ghonaim, “A novel approach using a FIRANN for fault detection and direction estimation for high voltage transmission lines,” IEEE Trans. Power Delivery, vol. 17, pp. 894–901, Oct. 2002.

9.        Poeltl and K. Frohich, “Two new methods for fast fault type detection by means of parameters fitting and artificial neural networks,” IEEE Trans. Power Delivery, vol. 14, pp. 1269–1275, Oct. 1999.

10.     A. Girgis and M. B. Johns, “Ahybrid expert system for faulted section identification, fault type classification and selection of fault location algorithms,” IEEE Trans. Power Delivery, vol. 4, pp. 978–985, Apr. 1989.

11.     A. Protopapas, K. P. Psatiras, and A. V. Machias, “An expert system for substation fault diagnosis and alarm processing,” IEEE Trans. Power Delivery, vol. 6, pp. 648–655, Apr. 1991.

12.     H. T. Yang, W. Y. Chang, and C. L. Huang, “On line fault diagnosis of power substation using connectionist expert system,” IEEE Trans. Power Syst., vol. 10, pp. 323–331, Feb. 1995.

13.     A. Ferrero, S. Sangiovanni, and E. Zapitelli, “A fuzzy set approach to fault type identification in digital relaying,” IEEE Trans. Power Delivery, vol. 10, pp. 169–175, Jan. 1995.

14.     H.Wang andW.W. L. Keerthipala, “Fuzzy neuro approach to fault classification for transmission line protection,” IEEE Trans. Power Delivery, vol. 13, pp. 1093–1104, Oct. 1998.

15.     T. Adu, “An accurate fault classification technique for power system monitoring devices,” IEEE Trans. Power Delivery, vol. 17, pp. 684–690, July 2002.

16.     M.E. Masoud, M.M.A. Mahfouz, “Protection scheme for transmission lines based on alienation coefficients for current signals”, IET Gener. Transm. Distrib., Vol. 4, Iss. 11, pp. 1236 – 1244. March 2010

17.     W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

18.     Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban.

19.     ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002.





Ghazala Y. Hermiz, Bushra A. Aljurani, Md. Ali H. Al-Beayaty

Paper Title:

Effect of Mn Substitution on the Superconducting Properties of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ

Abstract:    The present study includes the preparation of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ compound with x = 0.0, 0.1, 0.2, 0.3, 0.4 and 0.5 by solid state reaction method. The effect of the substitution of Mn on Ca site on superconducting properties has been investigated to obtain the optimum conditions for the formation and stabilization of the high Tc phase. Energy dispersive X-ray spectroscopy (EDX) analysis was used to test the proportions and energies of the elements of the compound. The crystal structure was examined by XRD for all superconductor samples; it was found that the crystal structure was orthorhombic and all major peaks in the spectra could be pointed to 2223-phase with amount of 2212-phase ; a small volume fraction of impurities  like Ca2CuO3, CuO and Sr2Ca2Cu7Oδ were noticed in some samples. The highest Tc obtained for Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ composition was 118K for the sample with x=0.3.Scanning electron microscopy (SEM) has been used to identify the morphology of the superconducting phase and to investigate the influence of substitution effect of Mn on Ca site .The microstructure shows plate –like layered with increasing of voids and defect for samples with x=0.1,0.2,while the grains become smaller with disappear of grain boundaries of sample with x=0.3.

   Bi-based superconductors, Mn substitution, •Scanning electronic microscopy.


1.       P.Vase,R.Flukiger,M.Leghissa and G.Glowacki,“Current status of high-TC wire,” Supercond. Sci. Technol., vol. 13, 2000,pp. R71-R84.
2.       Y. Huang, J.Kerby,T. Nicol and T.Peterson,“Progress in Bi=2223 wire performance” presented at   CEC-ICMC , Madison, Wisconcin,USA,2001,16-20.

3.       B.L. Gyorffy, Z. Szotek, W.M. Temmerman, O.K. Andersen and O. Jepsen, “On the Quasi Particle Spectra of High Temperature Superconductors", Phys.Rev.B vol.58,1998,pp.1025.

4.       Retoux R, Studer F, Michel C, Raveau B, Fontaine A, Dartyge E. "Valence state for bismuth in the superconducting bismuth cuprates" Phys Rev. B vol.41(1),1990,pp.193-199 .

5.       H.Maeda, Y.Tanaka, M.Fukutomi ,T.Asano"A New High-Tc Oxide Superconductor without a Rare Earth Element"Jpn. J. Appl.Phys. vol.27, 1988,pp.209–210.

6.       G.Yildirim,S.Bal,E.Yucel,M.Dogruer,M.Akdogan.A.Varilci,C.Terzioglu" Effect of Mn Addition on Structural and Superconducting Properties of (Bi, Pb)-2223 Superconducting Ceramics "J Supercond. Nov. Magn. vol 25,2012,pp.381–390.

7.       I.Verma, R. Rawat, V. Ganesan, D. M. Phase and B. Das ,The Effect of Mn Substitution on Properties of Bi1.6Pb0.4Sr2 Ca2−xMnxCu3Oy Superconductors , IndiaJ Supercond Nov Magn.,vol. 25,2012,pp.85–90.

8.       R. Kumar• I.Verma • N.Verma ,V. Ganesan “Effect of Mn on the Surface Morphological Properties of (Bi,Pb)2Sr2Ca2Cu3−x MnxO10+δSuperconductor J. Supercond. Nov. Magn. Vol.25,2012,pp1215–1221.

9.       J. S. Hawa,H. Azhan ,S. Y. Yahya ,K. Azman ,H. N. Hidayah and A.  W. Norazidah”The effect of Eu substitution onto Ca site in Bi(Pb)-2223 superconductor via co-precipitation method” J. Supercond. Nov. Magn., Vol. 26, 2013, pp. 979-983.

10.     A.Ashish, “processing–property relationships for high Tc ceramic superconductors in the Bi-Ca-Sr-Cu-O system” Ph.D. Thesis, University of Illinois at Urbana
Champaign, 1992.

11.     L.W.Lei, Z.Y. Fu, J.Y.Zhang, "Influence of sintering temperature on microstructure and magnetotransport properties of La0.8Na0.2MnO3 ceramics" Materials
Letters vol.60, 2006,pp. 970-973 .

12.     V.Primo,F.Sapina,M.J.Sanchis,R.Ibanez,A.Beltran,D.Beltran,"A new improved synthesis of the 110 K bismuth superconducting phase: freeze-drying of acetic solutions” Materials Letters vol.15,1992,pp.149-155.





Ms.Anagha.C.K,  Mrs.S.Berclin Jeyaprabha , Ms.Shaema Lizbeth Mathew

Paper Title:

Optimal Sizing of Building Integrated Hybrid Energy system

Abstract:    In this study, an optimal sizing for building integrated hybrid photovoltaic, diesel generator and battery system for zero load rejection is performed. The optimization is obtained by considering the loss-of-load probability (LLP) of the system less than 0.01. For this system, the average daily solar radiation is collected from ‘Thondamuthur’region, Coimbatore. The load demand is collected from Civil Department building of Karunya University. The optimization presented in this study aims to calculate the optimum size of a PV array and diesel generator, and battery which examine the minimum system cost. An optimization problem in terms of system unit cost is solved graphically in this study. The results of the optimization show that a photovoltaic/diesel generator choice is more feasible compared to a standalone photovoltaic system or diesel generator system.

   Diesel Generator, Photovoltaic energy, Renewable energy, Sizing of the system


1.        R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–diesel systems using genetic algorithms‖, Solar Energy 79 (2005) 33–46.
2.        G.C. Seeling-Hochmuth, ―A combined optimisation concept for the design and operation strategy of hybrid-PV energy systems‖, Solar Energy 61 (1997)77–87.

3.        S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40.

4.        M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖, Solar Energy 66 (1999)1

5.        Tamer Khatib, A. Mohamed, K. Sopian, M. Mahmoud, ―Optimal sizing of building integrated hybrid PV/diesel generator system for zero load rejection for Malaysia‖.

6.        Ganguly, D. Misra, S. Ghosh, ―Modeling and analysis of solar photovoltaic electrolyzer - fuel cell hybrid power system integrated with a floriculture greenhouse‖, Energy and Buildings42 (2010) 2036–2043.

7.        S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PV/diesel /battery hybrid powersystem for a remotely located population near Rafha, Saudi Arabia‖, Solar Energy 35(2010)46-48.

8.        R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–dieselsystems using genetic algorithms‖, Solar Energy 79 (2005) 33–46.

9.        G.C. Seeling-Hochmuth, ―A combined optimisation concept for the designand operation strategy of hybrid-PV energy systems‖, Solar Energy 61 (1997)77–87.

10.     S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40.

11.     M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖, Solar Energy 66 (1999)1–9.

12.     S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PVedieselebattery hybrid powersystem for a remotely located population near Rafha, Saudi Arabia‖, Solar Energy 35(2010)46-48





Shaema Lizbeth Mathew, S.Berclin Jeyaprabha, Anagha.C.K

Paper Title:

Optimal Sizing Procedure for Standalone PV System for University Located Near Western Ghats in India

Abstract:    This paper presents an optimal sizing procedure and tracking for standalone photovoltaic system located in one of the remote areas of India. This work is based on the meteorological data in Thondamuthur region where Karunya University is located and load demand profile of Computer Technology Centre of Karunya University. The PV array tilt angle is designed optimally based on the optimization algorithm. The PV array can be tilted at various angles in order to receive maximum global solar energy in different season. This strategy of tilt angle adjustment can reduce the use of electromechanical or pure mechanical devices, reduce the number of site visits and increase the solar radiation capturing efficiency. PV array size and storage battery capacity are calculated based on numerical method and compared with intuitive method using MATLAB. It is proved in this paper that the system designed by intuitive method is more expensive than the system designed by the numerical method as the former is based on the worst month data.

   Array size, Battery capacity, Optimal Sizing, Optimization of energy sources, PV tilt angle


1.       A. McEvoy, T. Markvart, L. Castaner, “Practical Handbook of Photovoltaics: Fundamentals and Applications”, Elsevier, New York, NY, USA, 2011.
2.       M. Benghanem, “Optimization of tilt angle for solar panel: case study for Madinah, Saudi Arabia”, Applied Energy 88 (2011) 1427–1433.

3.       G. Shrestha, I. Goel, “A study on optimal sizing of standalone photovoltaic stations”, IEEE Transactions on Energy Conversion 13 (1998) 373–378.

4.       J. Hay, “Calculation of monthly mean solar radiation for horizontal and tilted surfaces”, Solar Energy (1979) 23.

5.       T. Khatib, A. Mohamed, K. Sopian, M. Mahmoud, “A new approach for metrological variables prediction using ANNs: application for sizing & maintain PV systems”, Journal of Solar Energy Engineering 134 (2) (2012) 205–217.

6.       Omidreza Saadatian, K Sopian, B R Elhab, Mh Ruslan, Nilofar Asim, “Optimal Solar Panels’ Tilt Angles and Orientations in Kuala Lumpur, Malaysia”, Advances in Environment, Biotechnology and Biomedicine ISBN: 978-1-61804-122-7.

7.       M.Jamil Ahmed, G.N.Tiwari, “ Optimization of tilt angle of solar collector to receive maximum radiation” , Open  Renewable Energy Journal, 2009, 2, 19-24.





Manjula Athani, Neelam Pathak, Asif Ullah Khan

Paper Title:

Dynamic Music Recommender System Using Genetic Algorithm

Abstract:    Web-based systems are popular  in many different areas, with the users they tend to deliver customized information by means of utilization of recommendation methods.The recommender system also has to recognize and provide items corresponding with user favorites. In this paper we presented a dynamic recommender system for music data. This system is able to identifying the n-number of users preferences and adaptively recommend music tracks according to user preferences. we are extracting unique feature of each music track. Then we are applying BLX-a crossover to a extracted features of each music track. User favorite and user profiles are included. Multiuser dynamic recommender system for n-user combines the two methodologies, the content based filtering technique and the interactive genetic algorithm by providing optimized solution every time and which is based on user’s preferences hence it give better result and better user system..

   recommender system: Interactive genetic algorithm; BLX-a crossover.


1.        Hyun-Tae Kim,Jong-Hyun Lee, Chang Wook Ahn :A Recommender system Based on Genitic Algorithm for Music Data Second International Conference on Computer Engineering and technolory v-6 415
2.        Balabanovic ,M.and Shoham,Y.(1997).Recommender as classification: Using Social and Content Based Information in recommendation. In Proceedings of National Conference on Artificial Intelligence,PP.714-720.

3.        Goldberg,D.,Nichols,Oki,B.M.,andTerry,D.(1992).Using Collaborative Recommendation.In Proceedings of European Conference on Research,7,pp 395-410.

4.        Balabanovic ,M.,Shoham Y.FAB: Content-based,Collaborative recommendation.Communications of the Association for Comuputing Machinery 40(3)(1997) 66-72.

5.        D.E. Goldberg and J.H. Holland. “Genetic Algorithm and Machine Learning” Machine Learning,vol 3,n0 2-3,pp95-99,1988.

6.        H. Takagi,” Interactive Evolutionary Computation: Fusion of the  Capabilities of EC Optimization and Human  Fvalution, ”Proceedings of the IEEEE, vol 89, pp.1275-1296,2001

7.        D.Thierens and D.Goldberg, “Elitist Recombination: An Integrated Selection  Recombination GA, “ in Proceedings of  the First IEEE Conference on Evoltionary Computation,pp508-512,1994.

8.        J.F. Crow and M. Kimura, “ Efficiency of Trucation Selection ,”in Proceedings of the National Academy of Sciences of the United States of America, vol 76, no 1 396-399,1979.

9.        F. Herrea,M.Lozano,and J.L. Verdegay, “Trackling Real-coded Genetic Algorithms : Operators and Tools for Behavioural Analysis, ”Artificial Intelligence Review, vol 12,265-319,318.

10.     R .Burke. “Hybrid Web Recommender Systems” Lecture Notes in Computer Science,vol.4321,pp 377-408,Sringer Berlin: Heidelberg,2007.

11.     M.J.Pazzani, “A Framework for collaborative, content-based and Demographic Filtering, ”Artificial Intelligence Review,vol.13,no 5-6,pp .394-408,1999.

12.     Elitist  Recombination, An Integrated selection; Recombination  GA ,In proceeding of the first of the first IEEE conferences on Evolutionary Computation ,pp 508-512,1994.

13.     J.F. Crow and  M. Kimura,” Efficiency of Truncation Selection “ in proceedings of the National Academy, of  science of the United States of Americal,vol,76 no 1 ,pp 396-399,1979. 





Benderradji R, Gouidmi H, Beghidja A

Paper Title:

Numerical Simulation of the Interaction Shockwave / Turbulent Boundary Layer: Interference RR/MR

Abstract:    This study focuses on both the development of the turbulent boundary layer in supersonic flow over a flat plate, the distance required for it to invade the entire section of the plate, and the effects of the size of the interaction area on the development of the boundary layer. Increasing the strength of the interaction is an increase in size of the areas of interaction leading to the formation of a recirculation bubble which is an area of the head losses. For this reason, it can increase and decrease the Mach number for a reflection or Mach explains the impact of the incident shock wave with strong boundary layer. The increase and decrease the Mach number has caused the appearance of a hysteresis loop which is represented by the contours of iso fields’ density. These studies are in agreement with respect to the trial that was presented by J. Delery et al (2009). We were given another contribution and investigations of the phenomenon of wave interaction of shock / turbulent boundary layer. The model used in this study is the kw-SST model, it is considered as the most suitable for this kind of problem, with special treatment of the near-wall region. Numerical simulations were performed using FLUENT software.

   Interaction of shockwave/ boundary layer- Interference shockwaves-Polar shock- RR Reflection- Reflection MR.


1.       J. Deleuze, “Structure d’une couche limite turbulente soumise à une onde de choc incident. Thèse doctorat. Université AIX-Marseille II,  No. 2079588 (1995).
2.       H. Laurent, Turbulence d’une interaction onde de choc/couche limite sur une paroi plane adiabatique ou chauffée, thèse de Doctorat, Université AIX-Marseille II, (1996).

3.       J. Délery and J. P. Dussauge, Some physical aspects of shock wave/boundary layer interactions, Shock wave, No. 19 (2009) 453-468.

4.       D. S. Dolling, Fifty years of shock-wave/boundary layer interaction research: what next?, AIAA J.  No. 39 (8)  (2001).

5.       A. Hadjadj  J, Larsson, B. E. Morgan, J. W. Nichols and S. K. Lele, Large-eddy simulation of shock/boundary layer interaction. Center for turbulence research-proceeding of the Summer ¨Program (2010).

6.       S. Deck, P. E. Weiss, M. Pamiès and E. Garnier, Zonal detached Eddy Simulation of spatially developing flat plate turbulent boundary layer, Computer§ Fluids No. 48 (2011) 1-15.

7.       K. Sinha, K. Mahesh and G. Candler, Modeling the effect of shock unsteadiness in shock-wave/turbulent boundary layer interactions, AIAA (2004).

8.       J. R. Edwards, Numerical simulations of shock/boundary layer interactions using time-dependent modeling techniques: A survey of recent results, Progress in Aerospace Sciences No. 44  (2008) 447-765.

9.       J. Y. Choi, I. S. Jeung and Y. Yoon, Scaling effect of the combustion induced by shock-wave boundary layer interaction in premixed Gas, Twenty-seventh symposium (international) on combustion (1998) 2181-2188.

10.     S. Pirozzoli and F. Grasso, Direct numerical simulation of impinging shock wave/turbulent boundary layer interaction at M=2.25, Physics of fluids No. 18  065113

11.     E. Touber and N. D. Sandham, Large-eddy simulation of low-frequency unsteadiness in a turbulent shock-induced separation bubble, Theor. Comput. Fluid Dyn. No. 23 (2009) 79-107.

12.     S. Teramoto, Large-Eddy simulation of shock wave/Boundary layer interaction, Trans. Japan Coc. Aero. Space sci. Vol. 47, No. 158  (2005) 268-275.

13.     B. Morgan, S. Kawai and S. K. Lele, Large-Eddy simulation of an oblique shock wave impinging on a turbulent boundary layer, 10th fluid dynamics conference and exhibit, AIAA  No. 4467 28 june-1 july Chicago, IIIinois (2010).

14.     M. Lagha, J. Kim, J. D. Eldredge and X. Zhong, A numerical study of compressible turbulent boundary layers, Physics of fluids No. 23  015106 (2011).

15.     M. F. Shahab, G. Lehnasch, T. B. Gatski and P, Comte,  DNS of a spatially developing, supersonic turbulent boundary layer flow over a cooled wall, Turbulence, Heat and Masse Transfer 6, (2009).

16.     S. Dubos, Simulation des grandes échelles d’écoulement turbulent supersoniques, These Doctorat, INSA de Rouen (2005).

17.     C. Hadad, Instationnarités, mouvements d'onde de choc et tourbillons à grandes échelles dans une interaction onde de choc/couche limite avec décollement, Thèse Doctorat, Université de Provence Aix-Marseille I (2005).

18.     V. S. Murthy and W. C. Rose,  Wall shear stress measurements in shock wave boundary layer interaction, AIAA J. No. 7, 16 (1978) 667-672.

19.     E. R. Van Driest, Turbulent boundary layer in compressible fluids, J. Aero. Sc. No. 3, 18 (1951) 145-160.

20.     Sebastian Deck, Philippe Duvaeu, Paulo d’Espincy et Philippe Guillen: Development and application of Spalart-Allmaras one equation turbulence model to three dimensional supersonic complex configurations. Aerospace Science and Technology. (2002) 171-183.





Alsana Bashir, Misba Gul, Javed A Naqash, Ajaz Masood

Paper Title:

Study of Permeability and Compressive Strength of Silica Fume Concrete

Abstract:    Qualitatively permeability within concrete may be defined as the ease with which water, air and other substances such as chloride ions or contaminants pass through the concrete pore structure. In general, the relative magnitude of permeability for a given permeant (water, air or any other ion/ salt contaminant) may act as a prima facie indicative parameter of durability of concrete. More the permeability, lesser may be the durability. As durability governs the service life of the structure, thus permeability indirectly affects the service life of the structure. Besides, in relation to durability, permeability invariably becomes a very important aspect for the design of over-head tanks, water retaining structures and open flat roofs where permeability of concrete becomes objectionable. As such making concrete least permeable without harming its compressive strength is of a primal importance for researchers. Present state of knowledge about permeability and methods to decrease it are discretely available from literature. Few pozzolanic materials have been reported to decrease the permeability remarkably. Efforts in this experimental study were primarily aimed at evaluating effect of Silica Fume on important characteristic properties of hardened concrete like crushing strength and permeability. The study was also aimed at optimizing the weight of cement replacing additive (% by weight of the cement), which may be required to cause favorable effects like relatively impermeable concrete, without compromising the strength aspect of the hardened concrete mix. With potential optimization of replacement, the study may also serve as a contrast/guideline, for relative effectiveness of Silica Fume Concrete over conventional Portland Cement Concrete.

   Concrete Permeability, Epoxy Sealing, Permeability cell, Silica Fume, Superplasticize


1.       M.G.Alexander, and B.J.Magee, “Durability Perfornance of Concrete Containing Condensed Silica Fume”, Cement Concrete Res., 29(6), 1999, pp.917-922.
2.       Bayasi, Zing, Zhou, Jing, “ Properties of Silica Fume Concrete and Mortor”,ACI Materials Journal 90 (4) ,1993, pp.349-356.

3.       DL.Venkatesh Babu , SC. Nateshan “Investigations on silica-Fume Concrete”, The Indian Concrete Journal, September 2004, pp.57-60

4.       R.Siddique and M. Iqbal Khan, “Supplementary Cementing Materials”, Engineering Materials, Springer-Verlag Berlin Heidelberg ,2011, pp.67-68.

5.       Khaloo, A.R; Houseinian, M.R., “Evaluation of Properties of Silica Fume for use in Concrete”, International Conference on Concretes, Dundee, Scotland, 1999.

6.       R. Duval, E.H.Kadri, “ Influence of Silica Fume on the workability and Compressive Strength of High Performance Concrete”, Cement and Concrete Research, Vol. 28, Issue 4, Pg. 533 – 547.

7.       IS: 4031, Methods of Physical Tests for Hydraulic Cement, Part I, IV, V, VI, 1988.

8.       IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards, New Delhi.

9.       IS 9103-1999 Concrete Admixtures-Specifications, Bureau of Indian Standards, New Delhi, India.

10.     IS: 3085 – 1965, “Indian Standard method of test for permeability of cement mortar and concrete”, Bureau of Indian Standards, New Delhi.

11.     IS 5514:1969 Apparatus used in Le-Chatelier test, Indian Standards, New Delhi, India.

12.     IS 8112:1989 Specifications for 43 grade ordinary Portland cement, Indian Standards Institution, New Delhi.





Harjot Kaur, Manpreet Kaur

Paper Title:

Detecting Clones in Class Diagrams Using Suffix Array

Abstract:    Model Driven Engineering has become standard and important framework in software research field. UML domain models are conceptual models which are used to design and develop software in software development life cycle. Unexpected copy of model elements leads to many problem. Models contain design level similarities and are equally harmful for software maintain -ace as code clones are. So number of clones need to be detected from UML domain models. This paper introduces an approach to detect clones in class diagrams. Class diagram contains redundant element which increases the complexity and need to be removed. Firstly, class diagrams are encoded as XML files. Tokens are extracted and matched using Suffix array technique. The approach is based on finding similarities in tokens known as clones.

   Code clones, Model Clones, Suffix Array.


1.        Abdul.H.B. and Jarzabek.S.,2005 “Detecting Higher-level Similarity Patterns in Programs” ESEC-FSE’05,ACM,.Lisbon,Portugal.
2.        Abdul.H .B., Puglisi.S.J., Smyth.W.F., Turpin.A. and Jarjabek.S., 2007 “Efficient Token Based Clone Detection with Flexible Tokenization” ESEC/FSE’07,ACM ,Cavtat Croatia.

3.        Antony.E.P, Alafi.M.H. and Cordy.J.R,,2013 “ An-Approach to clone detection in Behavioral Models” Queen’s university,Kingston,Canada,AAC-WCRE.

4.        Deissenboeck.F, Hummel.B,Juergens.E, Pfaehler.M .and Schaetz, B.,2010”Model Clone Detection in Practice``, IWSC`10,Cape Town, South Africa.,pp.37-44.

5.        Deissenboeck.F.,Hummel,B.,Juergens,E.,Schatz,B.,Wagner, S.,Giard,J.F. and Teuchert,S.,2008 “Clone Detection in Automotive model-Based Development” ICSE` 08,ACM, Leipzig,Germany.pp.603-612.

6.        Falke, R., Koschke, R. and Frenzel, P.,2008.” Empirical Evaluation of Clone Detection Using Syntax Suffix Trees”, Empirical Software Engineering, Vol. 13, No. 6, pp. 601-643.

7.        Hummel, B.,Juergens, E. and Steidl, D., 2011” Index-Based Model Clone Detection”, Proceedings of  5th International Workshop on Software Clones, Honolulu, USA, pp-21-27.

8.        Lin.H.J.  and Peng.L.F.,,2009 “Quick Similarity Measurement of Source Code based on Suffix Array”, International Conference on Computational Intelligence and Security” ,DOI 10.1109/CIS.2009.175.

9.        Liu.H, Zhiyi.M ,  Zhang.L. and Shao.W.,” Detecting Duplications in Sequence Diagrams Based on Suffix Trees” Software Institute, School of Electronics Engineering and Computer SciencePeking University, Beijing , China..

10.     Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Comparison and Evaluation of Clone Detection Tools: An Experimental Approach.” CSI journal of computing, Vol 1: No of 4,Pg 44-55,2012.

11.     Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Clone detection in Models : an Empirical Study.” 3rd IBM Collaborative Academia Research Exchange(I-CARE) 2011,New
Delhi, India,October 13,2011.

12.     Pham.N.H, H. A.,Nguyen, T. T., Nguyen, J.M.Kofahi and Nguyen,T.N.,2009.“ Complete and Accurate Clone Detection in Graph-based Models”, ICSE’09,Vancouver,Canada, IEEE.

13.     Petresen.H,2012 “Clone Detection in Matlab Simulink Models” ,IMM-M.Sc,Berlin..

14.     Purchase.H.C, Colpoys.L., McGill.M., Carrington.D. and Britton.C.,2001 “UML class diagram syntax: an empirical study of comprehension”, Australian Symposium on Information Visualization, Sydney,vol.9.

15.     Rattan.D,  Bhatia.R, and Singh.M ,2013. “Software clone detection: A      systematic review”, Information and Software Technology 55 pp.1165-1199.

16.     Rattan.D, Bhatia.R and Singh.M, 2012 “ Model Clone detection based on tree comparison”,IEEE ,.

17.     Roy, C.K., Cordy J.R. and Koschke, R., 2009. “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Science of Computer  Programming , Vol.74,No. 7,pp. 470-495.

18.     Roy, C.K., Cordy J.R. and Kosher, R.,2008. “An Empirical Study of Function clones in Open Source Software Systems”, Proceedings of 15 th Working conference on Reverse Engineering,pp-81-90.

19.     Roy, C.K., Cordy J.R. and Koschke, R.,2007.” A Survey on Software Clone Detection Resarch”, Technical Report 2007-541, Queen’s University at Kingston Ontario,Canada,115pp.

20.     Storrle.H“ Towards Clone Detection in UML domain models”, DOI:10.1007/s10270-011-0217-9.

21.     Yamashina.T, H.Uwano,K.Fushida,Y.Kamei,M.Nagura,S.Kawaguchi and H.Lida,”Shinobi: A Real Time Code Clone Detection Tool for Software Maintenance” nara institute of science and technology.





S B Chikalthankar, G D Belurkar, V M Nandedkar

Paper Title:

Factors Affecting on Springback in Sheet Metal Bending: A Review

Abstract:    Spring-back is a very common and critical phenomenon in sheet metal forming operations, which is caused by the elastic redistribution of the internal stresses after the removal of deforming forces. Spring-back compensation is absolutely essential for the accurate geometry of sheet metal components. This paper reviews the various parameters affecting spring back such as punch angle, grain direction of sheet metal material, die opening, ratio of die radius to sheet thickness, sheet thickness, punch radius, punch height, coining force, pre bend condition of strip etc.

   Bending, Die opening, Grain Direction Springback


1.        Huang, H. M., Liu, S. D., and Jiang, S. Stress and strain histories of multiple bending–unbending springback process. Trans. ASME, J. Eng. Mater.and Technol.,2001, 123, 384–390.
2.        Seo, D. G., Chang, S. H., and Lee, S. M. Springback characteristics of steel sheets for warm U-draw bending.Metals Mater. Int., 2003, 9, 497–501.

3.        D’Acquisto, L. and Fratini, L. Springback effect evaluation in three-dimensional stamping processes at the varying blank holder force. J. Mech. Eng. Sci., 2006,220, 1827–1837.

4.        Carden, W. D., Geng, L. M., Matlock, D. K., and Wagnor, R. H. Measurement of springback.Int. J. Mech. Sci., 2002, 44, 79–101.

5.        Ivina Suchi, Die Design Hnadbook, Edition Second

6.        H K Yi1, D W Kim1, C J Van Tyne2, and Y H Moon1, Analytical prediction of springback based on residual differential strain during sheet metal bending.Int. J. Mech. Sci., 2008, 117-129

7.        Recep Kazan, Mehmet Fırat, Aysun Egrisogut Tiryaki, “Source-Prediction of spring back in wipe-bending process of sheet metal using neural network”, Materials and Design 30 (2009) 418–423.

8.        SutasnThipprakmas, Finite element analysis of punch height effect on V-bending angle, Materials and Design 31 (2010) 1593–1598

9.        You-Min Huang and Daw-KweiLeu, effects of process variables on v-die bendingprocess of steel sheet, Int. J. Mech. Sci. Vol. 40, No. 7, 631 - 650, 1998

10.     W.M.Chan*, H.I. Chew, H.P.Lee, B.T.Cheok Finite Element analysis of springback of V bending sheet metal forming processes, Journal of Materials Processing Technology 148 (2004) 15-24

11.     Sutasn Thipprakmas, Wiriyakorn Phanitwong, Process parameter design of springback and spring-go in V bending process using Taguchi Technique, Material and Design 32 (2011) 4430-4436.

12.     Vijay Gautam, Parveen Kumar, Aadityeshwar Singh Deo, Effect of Punch Profile Radius and Localised Compression on Springback in V-Bending of High Strength Steel and its FEA Simulation, International Journal Of Mechanical EngineeringAnd Technology (Ijmet) , Volume 3, Issue 3, (2012), 517-530

13.     Luc Papelux, Jean-Philippe Ponthot, “Finite element simulation of spring back in sheet metal forming”, Material Processing Technology, 125-126 (2002) 785-791.





Tahseen Flaih Hasan

Paper Title:

FPGA Design Flow for SDR Transceiver using System Generator

Abstract:    Software defined radio (SDR) is highly configurable hardware platform that provides technology for realizing the rapidly expanding third (even future) generation digital wireless communication infrastructure. While among the silicon alternatives available for implementing the various functions of SDR, field programmable gate array (FPGA) is an attractive option in terms of performance, power consumption, and flexibility. This paper examines 16-QAM (Quadrature Amplitude Modulation) SDR transmitter and receiver with an appropriate timing recovery system using FPGA. We provide a tutorial style overview of techniques and schemes for system (abstraction) level design of the 16-QAM SDR transmitter and receiver using Xilinx System Generator, ModelSim and Synplify Pro software, and FPGA implementation (realization) using Xilinx ISE software. Two design alternatives are presented to highlight the rich design space accessible using the FPGA configurable logic. At last, this new design technique would help in designing and realizing SDR to 3G wireless communication system and accelerate the transition to 4G wireless communication system.

   FPGA, 16QAM, SDR, System Generator


1.        A. Pal, “FPGA-based (Xilinx) Embedded System Design,”   Workshop on Microcontroller and FPGA-based Embedded System Design, July 2007.
2.        The MathWorks, Inc.. DSP – Digital Signal Processing  & Communications. , 2009, [Online]. Available: http://www.mathworks.com/applications/dsp_comm

3.        Xilinx, Inc., DSP Design Flows in FPGA Tutorial Slides, 2003.

4.        J. G. Prokis, Digital Communications, 4th ed., New York: McGraw-Hill,2001

5.        D. Haessig, J. Hwang, S. Gallagher, and M. Uhm, “Case-Study of a Xilinx System Generator Design Flow for Rapid Development of   SDR Waveforms,” in Proc. SDR 05 Forum Tech. Conf. and Product    Exposition, Orange County, California, 2005.

6.        C. Dick, F. Harris, and M. Rice, “Synchronization in Software Radios Carrier and Timing Recovery Using FPGAs,” , pp. 195-   204. IEEE, 2000.

7.        System Generator for DSP User Guide, Release 9.2.01, Xilinx, Inc., 2007.

8.        Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007.

9.        P240 Analog Module User Guide, Rev 1.0, Avnet, Inc., May 2006. [Online]. Available: http://www.files.em.avnet.com/files/177/p240_analog-ug.pdf

10.     Virtex-4 MB Development Board User’s Guide, Ver. 3.0, AvnetMemec, Dec. 2005. [Online]. Available:

11.     “ADS5500: 14-bit, 125 Msps, Analog-to-Digital Converter Data Sheet,” Texas Instrument, Inc., Feb. 2007. [Online]. Available: http://focus.ti.com/lit/ds/symlink/ads5500.pdf

12.     “DAC5687: 16-bit, 500 Msps, 2x-8x, Interpolation Dual-Channel Digital-to-Analog Converter (DAC) Data Sheet,” Texas Instrument, Inc., June 2005. [Online]. Available: http://focus.ti.com/lit/ds/symlink/dac5687.pdf

13.     Synplicity FPGA Synthesis Reference Manual, Synplicity, Inc., 2007. 





S.S. Lavhate, Saurabh R. Keskar, Vishal P.Unhale, Avinash Sangale

Paper Title:

Advanced Paper Cutting Machine using ARM7

Abstract:   The proposed system will be an intelligent automated length measurement device composed of the rotary encoder, proximity switches, motor and embedded design consisting microcontroller with digital circuitry etc. this device used as control panel of paper cutting machine, which is used to cut the various kind of paper products, plastic, thin film, leather, slice of nonferrous metal etc. This system can be applicable in paper cutting industry and proves how it can be a low cost solution in the production practice.

   Cutting, Rotary encoder, Safety, touch screen.


1.       Gheorghe Livinţ, VasilHorga, Marcel Răţoi and Mihai Albu Gheorghe Asachi Technical University of Iaşi Romania.
2.       Abdel Azzeh, Richard duke “CAN control system for Electric Vehicle”, ENZCon 2005, the 12th Electronics New Zeland Conference. Manukau City, New Zealand, November 2005.

3.       Kumar, M. A.Verma, and A. Srividya, Response-Time “Modeling of Controller Area Network (CAN). Distributed Computing and Networking,






Amita Kumari,  Rajesh Mehra

Paper Title:

Design of Hybrid Method PSO & SVM for Detection of Brain Neoplasm

Abstract:   In the field of medical field ,Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body .This methodology consist of 4 steps: image processing ,image enhancement ,feature extraction and image classification. Image preprocessing is done with the help different gradient operator. Image enhancement step uses the noise removal and histogram equalization.  Wavelet based texture feature are extracted from normal and tumor regions. At last optimization is done with the help of PSO and SVM classifier

   MRI, GA,  HAAR wavelet, ANN, PSO


1.        Kharrat , A; Gasmi K.; Ben Messaoud ,M; Benamrane N. and  Abid M. “ A hybrid approach for automatic classification of brain MRI using  genetic algorithm and
support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010.

2.        E.F Badran,.; E.G Mahmoud, N Hamdy .“An algorithm for brain tumor  in MRI images”, International Conference on  Communication Computer Engineering and Systems(ICCES), Networking  & Broadcasting, pp 368-373, June, 2010.

3.        Abdullah, N.; Lee Wee Chuen; Ngah, U.K.; Ahmad, K.A. “Improvement of MRI brain classification using Principles  Component Analysis”, IEEE International Conference on  Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011.

4.        Lejian Huang, Elizabeth A. Thompson, Vincent Schmithorst, Scott K. Holland, and Thomas M. Talavage. “partially adaptive STAP algorithm approaches to functional MRI” ,IEEE transaction on biomedical engineering ,vol56, no2,February  2009

5.        M Kociolek , A.Materka,M.Strzelecki P.Szczypinski “Discrete wavelet transform –derived features for  digital image texture analysis ,proc. of international confrernce on signal and Electronic System, 18-21 ,sep 2001,Lodz,Poland ,pp.163-168





Sunil Kumar Yadav, Rajesh Mehra

Paper Title:

Analysis of Different IIR Filter based on Implementation Cost  Performance

Abstract:    In this paper we examine the optimal implementation cost performance of various IIR Filter, which are relevant for real time application therefore these filter can realize any transfer function .these IIR filter is designed and analyzed by FDATOOL and the implementation cost has been analyzed on the basis of filter order, multiplier, adder, and input samples. The Elliptical IIR Filter is examined and comparison from the Butterworth and Chebyshev is done. The Elliptical Filter is minimize the order of filter op to 96.59% to Butterworth Filter, and 85.7% to Chebyshev.



1.        Soo-Chang Pei, Huei-Shan Lin “Tunable FIR and IIR Fractional-Delay Filter Design and Structure Based on Complex Cepstrum”IEEE Transactions on circuits and systems—i: regular papers, VOL. 56, pages:2195-2206, OCTOBER 2009.
2.        Bojan Jovanović, and Milun Jevtić “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium pages:61-66, February 2010

3.        Arjuna Madanayake• Thushara  K.Gunaratne•Leonard T.  Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer

4.        Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter using FPGA Devices” International Technology Research Letters, pages:25-31, 2012

5.        Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013

6.        Fábio Fabian Daitx, Vagner S. Rosa, Eduardo Costa, Paulo Flores, Sérgio Bampi, “VHDL Generation of Optimized FIR Filters”, 2008 International Conference on Signals, Circuits and Systems

7.        Ke, Zhang, et al. "The application of the IIR filters based on FPGA in the DTV field." On Computer Science-Technology and Applications,. International Forum on. Vol. 3. IEEE, pages: 406-409 2009.

8.        Vagner S. Rosa, Fábio F. Daitx, Eduardo Costa, Sergio Bampi, “Design Flow for the Generation of Optimized FIR Filters”, ICECS 2009.

9.        Victor DeBrunner, Linda S. DeBrunner, and Anand Mohan  “Using 2nd-0rder information to reduce average coefficient length in IIR Filters” IEEE  Conference Publications pages 189-192, 2002





M.Natheera Banu

Paper Title:

FPGA Based Hardware Implementation of Encryption Algorithm

Abstract:   Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of advanced encryption standard (AES) with 128-bit key as a constant which is used for encrypting the text file and image for secure transmission. Timing report for the files are taken and conclude that text file of 128 bit size is taking less time to encrypt and decrypt compare to the image file. Synthesizing and implementation (Translate, Map and Place and Route) of the VERILOG code is carried out on Xilinx - Project Navigator ISE 12.3 software.

   AES, decryption, encryption, image and  text.




4.       Stefan Mangard Student Member, IEEE, Manfred Aigner, and Sandra Dominikus “A HIGHLY REGULAR AND SCALABLE AES HARDWARE ARCHITECTURE” IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 4, APRIL 2003

5.       P.Karthigaikumar Soumiya Rasheed “SIMULATION OF IMAGE ENCRYPTION USING AES ALGORITHM” IJCA Special Issue on Computational Science - New Dimensions & Perspectives” NCCSE, 2011.

6.       Manoj.B, Manula N Harihar “IMAGE ENCRYPTION AND DECRYPTION USING AES” International Journal of Engineering and Advanced Technology (IJEAT) ISSN:
2249 – 8958, Volume-1, Issue-5, June 2012.

7.       Jawad Ahmad and Fawad Ahmed “EFFICIENCY ANALYSIS  AND SECURE VALUATION OF IMAGE ENCRYPTION SCHEMES” International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04.

8.       Mr. Antosh M. Dyade, Prof. Raafiya Gulmeher “MODIFIED SHIFTROW TRANSFORMATION OF AES FOR IMAGE ENCRYPTION” International Journal of Communications And Engineering Vol. 4 Issue 3, Sept. 2013

9.       Sourabh Singh, Anurag Jain “AN ENHANCED TEXT TO IMAGE ENCRYPTION TECHNIQUE USING RGB SUBSTITUTION AND AES” International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013

International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-3, February 2013

11.     Chityala Prathyusha, P. Sharmila Rani “IMPLEMENTATION OF FAST PIPELINED AES ALGORITHM ON XILINX FPGA” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064

13.     Mg Suresh, Dr.Nataraj.K.R” AREA OPTIMIZED AND PIPELINED FPGA IMPLEMENTATION OF AES ENCRYPTION AND DECRYPTION” International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.





Sabah SHehd Abdulabas

Paper Title:

Efficient Timing Recovery Technique for Software Defined Radio Receiver using FPGA

Abstract:    This paper presents the timing recovery in software defined radio receiver as a widely used technique nowadays. Software defined radios (SDR) is the more configurable hardware platforms that provide the technology for realizing the fast growing third and new generation digital wireless communication structure. The more complex duty performed in a high data rate wireless system is the synchronization. The timing synchronization in SDRs using FPGA based signal processors is introduced. The 16-QAM loop for performing coherent demodulation were described and reported on the suggestion of FPGA automation. A matched filter control system is used to provide and addressed the symbol timing recovery technique. To explain the operations of the timing recovery loop and reflection, much approach is adopted and outlined for FPGA performance.

   Timing Recovery, SDR, FPGA


1.        Chris Dick, fred harris and Michael Rice,  “Synchronization in Software Radios - Carrier and Timing Recovery Using FPGAs”, IEEE, 2000, PP.195-204
2.        H. Meyr, M. Moeneclaey and S. A. Fechtal, Digital Communication Receivers, John Wiley & Sons Inc., New York, 1998.

3.        B. Sklar, Digital Communications Fundamentals and Applications, Prentice Hall, Englewood Cliffs, New Jersey, 1988.

4.        D. R. Brown III and H. Poor, “Time-slotted round-trip carrier synchronization for distributed beamforming,” IEEE Transactions on Signal Processing, 2008

5.        D. R. Brown III, G. B. Prince, and J. A. McNeill, “A method for carrier frequency and phase synchronization of two autonomous cooperative transmitters,” IEEE 6th Workshop on Signal Processing Advances in Wireless Communication, 2005

6.        Chan, Tsui, Yeung, and Yuk,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007

7.        Durke (2009), “Field Programmable Gate Array Based SDR Design” phd. Thesis, Naval postgraduate school, Department of Electrical and Computer Engineering,California:http://edocs.nps.edu/npspubs/scholarly/theses/2009

8.        Ezra, Joseph and kahn, “Carrier Synchronization for 3-bita and 4-bits per symbol optical transmission”, IEEE, Journal of light wave technology, Vol.23, pp.4110-4124, 2005

9.        Jeffry H. Reed, “Software Radio a modern approach to radio engineering”, Prentice Hall PTR, A division of person education Inc, ISBN 0-13-081158-0, pp.33-123, 2002

10.     Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal, online available: http://www.anacom.pt/render.jsp?contentId=761239, 2008

11.     Tony, “RF and Digital Signal Processing for Software-Defined Radio”, Elsevier, ISBN 978-0-7506-8210-7, UK, pp. 319, 2009

12.     Proakis, and Salehi,. “Digital Communications”, 5th ed., New York, NY: McGraw-Hill, Ch. 3, pp. 95-148, 2008





Varun Singh Nagar, Subhash Chand Gupta

Paper Title:

Voice and Location Based Appliance Automation System Using Mobile Cloud

Abstract:   We are in the information technology age. Mobile technology is getting a fast pace in this older population has more ratio than other age group. Smart phones are a great enhancing the use of technology and its advancement. In this paper we are going to present the modular based home automation system environment and the technologies required to achieve the goal of automation. This concept uses voice commands to act as commands to control the appliances in context to home office or car. Cloud platform is used for processing of commands on the air and dispatched from cloud server to controlling modules at home, office or car respectively.  As cloud computing is the future of information sharing and shared resource utilization with optimization. This also brief the challenges involved in implementing voice based appliance automation using cloud platform. As it is evident that home automation is in its immature state so other technological challenges should be considered which can affect the system.    

   Android, Cloud, Home automation, Speech recognition, Voice based.


1.        Vu Le , Sumit Gulwani , Zhendong Su “SmartSynth: Synthesizing Smartphone Automation Scripts from Natural Language  2013 ACM“
2.        Mitali Patil , Aswini Bedare, Varsha Pacharne “ The Design and Implementation of Voice Controlled Wireless Intelligent Home Automation System Based on ZigBee.“ 978-1-4244-4738-1/09/ 2013 IJARCSSE.

3.        Syed Anwaarullah , S.V.Altaf  “RTOS based Home Automation System using Android “ Jan-2013 IJATCSE.

4.        Humaid Al Shu’eili  “ Wireless Home Automation based on Voice Recognition”

5.        Andre Coucopulus  “Voice Processing for Home Automation Systems” Network Systems Design Line January 2007

6.        R.Gadalla “Speech Recognition System for Massey SmartHouse” 

7.        Jianliang Meng , Jhunwei Zhang “Overview of the Speech Recognition Technology” 978-0-7695-4789-3/12 $26.00 © 2012 IEEE.

8.        Rawan T.Khalil , AlaF.Khalifeh , Khalid A Dhrabakh “Mobile-Free Driving with Android Phones: System Design and Performance Evaluation” 2012 – 9th International Multi-Conference on Systems.

9.        Fengyu Zhou, Guohui Tian, Yang Yang, Hairong Xiao and Jingshuai Chen “Research and Implementation of Voice Interaction System Based on PC in Intelligent Space” Proceedings of the 2010 IEEE International Conference on Automation and Logistics August 16-20 2010, Hong Kong and Macau

10.     M. Saadeq Rafieee  , Ali Akbar Khazaei “A Novel Model Characteristics for Noise-Robust Automatic Speech Recognition Based onHMM”  978-1-4244-5849-3/10/$26.00 ©2010 IEEE.





N.Sasirekha, M.Hemalatha

Paper Title:

Quantum Cryptography using Quantum Key Distribution and its Applications

Abstract:    Secure transmission of message between the sender and receiver is carried out through a tool called as cryptography. Traditional cryptographical methods use either public key which is known to everyone or on the private key. In either case the eavesdroppers are able to detect the key and hence find the message transmitted without the knowledge of the sender and receiver. Quantum cryptography is a special form of cryptography which uses the Quantum mechanics to ensure unconditional security towards the transmitted message. Quantum cryptography uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence enables the communicating parties to detect the presence of potential eavesdropper. This paper also analyses few application areas of quantum cryptography and its limitations.

   Classical Cryptography, Photon polarization, Qubit, Quantum Cryptography, Quantum entanglement, Quantum Key Distribution, Sifting key.


1.        Wiesner, Stephen., 1983. "Conjugate coding." ACM Sigact News 15.1: 78-88.
2.        Henle, F., 2002. BB84 Demo. http://www.cs.dartmouth.edu/~henle/Quantum/cgi-bin/Q2.cgi

3.        Ford, James., 1996. "Quantum cryptography tutorial." http://www.cs.dartmouth.edu/~jford/crypto.html.

4.        Harrison, David M., 2001. "Quantum Teleportation, Information and Cryptography." http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport/  QuantTeleport.html.

5.        Knight, Will., 2004. "Entangled photons secure money transfer." Newscientist.com.     http://www.newscientist.com/news/news.jsp?id=ns99994914.

6.        Quantum cryptography. Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Quantum_cryptography. Modified 17 September 2004.

7.        The BB84 Quantum Coding Scheme, June 2001. http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84coding.html

8.        Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., "Quantum Cryptography", Reviews of Modern Physics, vol. 74, January 2002, pp. 146 - 195.http://www.gap

9.        Martinez-Mateo, Jesus, David Elkouss, and Vicente Martin. "Key reconciliation for high performance quantum key distribution." Scientific reports 3 (2013).

10.     C. H. Bennett and G. Brassard. 1984.Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proc. IEEE Int. Conf. on Comp.,Sys. and Signal Process., pages 175–179, Bangalore.

11.     A. K. Ekert. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67(6):661–663, 1991.

12.     Hughes, Richard J., et al. 1995. "Quantum cryptography." Contemporary Physics 36.3: 149-163.

13.     Hoque, S., Fairhurst, M., Howells, G., & Deravi, F. (2005, March 17). Feasibility of generating biometric encryption keys. Electronics Letters, 41(6), 1-2. 

14.     Webb, W. (2006, July 20). Hack-proof design. (Cover story). EDN, 51(15), 46-54.

15.     Lovoshynovskiy, S., Deguillaume, F., Koval, O., & Pun, T. (2005, January). Information-theoretic data-hiding:: recent achievements and openproblems. International Journal of Image & Graphics, 5(1), 5-35.

16.     Floyd, D. (2006, Fall2006). Mobile application security system (MASS). Bell Labs Technical Journal, 11(3), 191-198.

17.     Hughes, D. (2007, May). Cyberspace Security via Quantum Encryption. Military Technology,31(5), 84-87.

18.     Sasirekha, N., And M. Hemalatha. "A Hybrid Indexed Table And Quasigroup Encryption Approach For Code Security Against Various Software Threats." Journal of Theoretical & Applied Information Technology 60.2 (2014).

19.     Sasirekha, N., and M. Hemalatha. "Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software." International Review on Computers & Software 8.8 (2013).

20.     Sasirekha, N., and M. Hemalatha. “A Quasigroup Encryption Based Cryptographic Scheme for Software Protection.” International Journal of Advances in Engineering and Emerging Technology 3.1(2013).





Anamika Mishra, Anju Jaiswal, Ankita Jaiswal, A.K.Niketa

Paper Title:

Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power VLSI Application

Abstract:    In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low power circuit design. energy. This paper proposes an Adder circuit based on energy efficient two-phase clocked adiabatic logic. A simulative investigation on the proposed 1-bit full adder has been implemented with the proposed technique and hence compared with standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase Adiabatic Static Clocked Logic (2PASCL) respectively. Comparison has shown a significant power saving to the extent of 70% in case of proposed technique as compared to CMOS logic in 10 to 200MHz transition frequency range. Comparative results has also been shown by a histogram which represents the least power dissipation of proposed technique. In this paper   all circuits are analyzed in terms of power using 0.35um technology and simulated using Pspice .

   Adiabatic logic, energy recovery ,power supply, low power ,Full adder, Positive feedback adiabatic logic, 2PASCL


1.        A.K.Maurya, G. Kumar, "Energy Efficient Adiabatic Logic for low power VLSI APPLICATION," IEEE International Conference on Communication Systems & Network Technologies, pp 460-463,2011.
2.        H.M.Meimand and A.A.Kusha and M.Nourani,   "Adiabatic Carry look-ahead Adder with Efficient Power Clock Generator," IEEE Proc.-Circuit Devices Systems, Vol. 148, No. 5, pp. 229-234,October.2001

3.        S.Kim,M.C.Papefthymiou, "True Single-Phase Adiabatic Circuitry," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 9, No. 1, pp. 52-63, February 2001.

4.        W.C.Athas,L.J.Svensson,J.G.Koller,et al.,"Low power digital systems based on adiabatic switching principles,"IEEE Trans.On VLSI systems,2(4),Dec.1994,pp:398-407.

5.        P.Saxena ,Prof. D.Chandra and S.Kumar.V, "An Adiabatic Approach for Low Powerful Adder Design," International Journal On Computer Science & Engineering, Vol.3, No. 9,pp.3207-3221,2011

6.        A.Sajid, A.Nafees & S. Rahman, "Design and Implementation of Low Power 8-bit Carry-lookAhead Adder Using Static CMOS Logic and Adiabatic Logic,"
International Journal Information Technology and Computer Science, Vol.11, pp. 78-92,2013.

7.        N.Anuar, Y.Takahashi, and T.Sekine, "Two Phase Clocked Adiabatic Static CMOS Logic and its Logic Family," Journal of Semiconductor Technology and Science, Vol. 10,No. 1, pp. 1-10, 2010.

8.        M.S.Dhaka, Gayatri and P.Singh Dhaka, "Adiabatic Logic Gate for Low Power Application," International Journal of Engineering Research and Applications, Vol. 2, No. 3, pp. 2474-2478, 2012.

9.        M.Sharma, "Design & Analysis of CMOS Cells using Adiabatic Logic," International Journal of Networks & Systems, Vol. 1, No. 2, pp. 52-57, 2012.

10.     S.K.Kelly and J.L.Wyatt, "A Power Efficient Neural Tissue Stimulator with Energy Recovery," IEEE Transactions on Biomedical Circuits and Systems, Vol.5, No. 1, pp. 20-29, Feb. 2011.

11.     G.Singh ,R.Kumar and M.K.Sharma, "Comparative Analysis of Conventional CMOS and ENERGY Efficient Adiabatic Logic Circuits," International Journal of Emerging Technology and Advanced Engineering,Vol. 3,No.9,pp 260-264,September 2013.

12.     D.Maksimovic´, V.G.Oklobdžija, B.Nikolic´, and K. Wayne Current, "Clocked CMOS Adiabatic Logic with Integrated Single-Phase Power-Clocked Supply," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.8, No. 4, pp. 460-463, August 2000

13.     P.Teichmann(2012),"Fundamental of Adiabatic Logic," Chapter 2,pp 5-22.

14.     S.Goel,A.Kumar and M.A.Bayoumi,(2006),"Design of robust,energy efficient full adders for deep-submicro meter design using hybrib CMOS logic styles," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No. 12, pp.1309-1321.





A.Vaishnavi, B.Chanakya Raju, G.Prathiksha, L.Harshitha Reddy, C.Santhosh Kumar

Paper Title:

Comparison of Two Speaker Recognition Systems

Abstract:    This paper presents a comparison between two speaker recognition systems. One system uses 30 Shannon entropy values extracted from a four level wavelet packet decomposition method in addition to the first three formant frequencies as features and a cascaded feed forward back propagation neural network is used as classifier. The second system uses Mel frequency cepstral coefficients (MFCC) as features and a support vector machine (SVM) as classifier. Results suggest that wavelet based system has better performance than the classic MFCCs with an efficiency of 89.56%.

   Shannon entropy, Formant frequencies, cascaded neural network, MFCC, SVM.


1.        T. Kinnunen and H. Li, “An overview of text-independent speaker recognition from features to super vectors,” Speech communication.vol. 52, pp. 12-40. 2010.
2.        K. Daqrouq, “Wavelet entropy and neural network for text-independent speaker identification,” Engineering Applications of Artificial Intelligence., vol. 24, pp. 796-802. 2011.

3.        K. Daqrouq, T. Abu Hilal, M. Sherif, S. El-Hajjar and A. Al-Quawasmi, “Speaker identification system using wavelet transform and neural network,” Advances in Computational Tools for Engineering Applications (ACTEA)., ZoukMosbeh, Lebanon, pp. 559-564. Jul. 2009.

4.        R. Sarikaya, J.H.L. Hansen and L. Bryan, “Wavelet transform features with application to speaker identification,” in Proc. of IEEE Nordic Signal Processing Symp., Visgo, pp. 81-84. 1998.

5.        M. Siafarikas, T. Ganchev and N. Fakotakis, “Objective wavelet packet features for speaker verification,” in Proc. Of the InterSpeech-2004-ICSLP., Jeju, Korea, pp. 2365-2368. Oct. 2004.

6.        Kuruvachan K. George, Arunraj K and Sreekumar K.T, “Towards Improving the Performance of Text/Language Independent Speaker Recognition Systems.”

7.        D. A. Reynolds, Thomas F. Quatieri and Robert B. Dunn,“Speaker verification using Adaptive Gaussian Mixture Models,” in Digital Signal Processing Vol. 10.Nos. 1-3,January 2000.





Misba Gul, Alsana Bashir, Javed A Naqash

Paper Title:

Study of Modulus of Elasticity of Steel Fiber Reinforced Concrete

Abstract:    Plain, unreinforced concrete is a brittle material, with a low tensile strength, limited ductility and little resistance to cracking. In order to improve the inherent tensile strength of concrete there is a need of multidirectional and closely spaced reinforcement, which can be provided in the form of randomly distributed fibers. Steel fiber is one of the most commonly used fibers. Short, discrete steel fibers provide discontinuous three-dimensional reinforcement that picks up load and transfer stresses at micro-crack level. This reinforcement provides tensile capacity and crack control to the concrete section prior to the establishment of visible macro cracks, thereby promoting ductility or toughness. The modulus of elasticity of concrete is a very important parameter reflecting the ability of concrete to deform elastically. In addition, in order to make full use of the compressive strength potential, the structures using high strength concrete tend to be slimmer and require a higher elastic modulus so as to maintain its stiffness. Therefore, knowledge of the modulus of elasticity of high strength concrete is very important in avoiding excessive deformation, providing satisfactory serviceability, and avoiding the most cost-effective designs. The present experimental study considers the effect of steel fibers on the modulus of elasticity of concrete. Hook end steel fibers with aspect ratio of 50 and 71 at volume fraction of 0.5%, 1.0% and 1.5% were used. Study on effect of volume fraction and aspect ratio of fibers on the modulus of elasticity of concrete was also deemed as an important part of present experimental investigation. The results obtained show that the addition of steel fiber improves the modulus of elasticity of concrete. It was also analyzed that by increasing the fiber volume fraction from 0.5% to 1.5% and aspect ratio of fibers from 50 to 71 there was a healthy effect on modulus of elasticity of Steel Fiber Reinforced Concrete.

   Aspect ratio, Compressometer, Modulus of Elasticity, Steel fiber reinforced concrete, volume fraction.


1.       Chen, S, 2004. “Strength of Steel Fibre Reinforced Concrete Ground Slabs”. Proceedings of the Institute of Civil Engineers, Structures and Buildings (157), Issue SB2, pp. 157-163
2.       Banthia,N,Chokri,K, and Trottier,JF,1995. Impact tests on Cement-Based Fiber Reinforced Composites. ACI Publications, Detroit, USA, SP, 155-9, pp.171-188

3.       Khaloo, A R and Kim, N, 1997. “Influence of Concrete and Fiber Characteristics on Behaviour of Steel Fiber Reinforced Concrete under Direct Shear”. ACI Materials Journal, 94, No. 4, pp. 592-601.

4.       Johnston, CD, and Zemp, WR, 1991. “Flexural Fatigue performance of Steel Fibre reinforced concrete- Influence of Fibre Content, Aspect Ratio, and Type”. ACI Material Journal, 88, No.4, pp. 374-383.

5.       Elsaigh,WA and Kearsley,EP,2002.”Effect of Steel Fibre Content on Properties of Concrete”. Journal of Concrete/Beton, South Africa, No 102, pp. 8-12.

6.       Johnston Gopalaratnam, V.S. and S. Shah, 1987. “Failure mechanism and Fracture of fibre reinforced concrete, Fibre reinforced concrete – Properties and Application”, American Concrete Institute, Detroit, pp: 1-25

7.       A.M Shende et al.. “Comparative Study on Steel Fiber Reinforced cum Control Concrete” International Journal Of Advanced Engineering Sciences And Technologies Vol. No. 6, Issue No. 1, 116 – 120

8.       Mohammed Alias Yusof et al., “Mechanical Properties of Hybrid Steel Fibre Reinforced Concrete with Different Aspect Ratio.” Australian Journal of Basic and
Applied Sciences, 5(7): 159-166, 2011

9.       Er Prashant Y.Pawade et al. “Effect of Steel Fibres on Modulus of Elasticity of Concrete” (IJAEST) International Journal Of Advanced Engineering Sciences And Technologies Vol No. 7, Issue No. 2, 169 – 177

10.     Osman Gencel et al.. “ Workability and Mechanical Performance of Steel Fiber-Reinforced Self-Compacting Concrete with Fly Ash” Composite Interfaces 18 (2011) 169–184

11.     Saravana Raja Mohan. K, Parthiban. K “Strength and behaviour of Fly Ash based Steel Fibre Reinforced Concrete Composite.

12.     J. Mater. “Mechanical Properties of Steel Fiber Reinforced Concrete”, Journal of Materials in Civil Engineering ,Volume 19 , Issue 5, 2007

13.     IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards, New Delhi

14.     BS 1881: Part 121:1983,” Testing concrete Method for determination of static modulus of elasticity in compression”.

15.     ASTM C 469-94” Standard Test Method for Static Modulus of Elasticity and Poisson’s Ratio of Concrete in Compression”





K.V.Rama Krishna Rao,  K.Durga Rani,  S.S.S.V.Gopala Raju

Paper Title:

Feasibility Study on Motor Cycle Lanes in Visakhapatnam City

Abstract:    The present study addresses a comprehensive analysis and feasibility of motor cycle lanes in two important city roads, “CMR central to Thatichetlapalem via., Gurudwara junction”, and “Jagadamba junction to old post office via., Poorna market in Greater Visakhapatnam Municipal Corporation[GVMC]” which are carrying 52% and 55% of motor cycles in total traffic. The paper discusses the basic understanding of travel time benefits and travel comfort by separating two wheeler motor cycle traffic from mixed traffic.

   Exclusive motor cycle lanes, Inclusive motor cycle lanes, Motor cycle traffic, Mixed traffic.


1.       Radin Umar R.S., Barton, E. (1997) Preliminary Cost-Benefit Analysis of the Exclusive Motorcycle Lanes in Malaysia, REAAA Journal No. 9,1997pp  2-6
2.       Radin Umar R.S., Murray, G. Mackay and Brian, L. Hills (1995) Preliminary Analysis on Impact of Motorcycle Lanes Along Federal Highway F02, Shah Alam, Malaysia, Journal of IATSSResearch Vol. 19, No. 2, pp 93-98

3.       Gopala Raju SSSV, Duraga Rani K (2012) Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal of innovations & development, Vol.1, No.6, pp.469-471

4.       Gopala Raju SSSV (2011) Vehicular growth and its management: Visakhapatnam city in India– A case study, Indian Journal of Science and  Technology, Vol.4, No.8,pp. 903-906.

5.       Kumar P.S, Gopala Raju SSSV, Murali M, Prasad CSRK (2007), Assessment of Noise level due to vehicular traffic at Warangal city, International journal of environment and pollution, Vol.30, No.1, pp137-153.

6.       Hussain, H., Radin Umar, R. S., Ahmad Farhan, M. S., & Dadang, M. M. (2005). Key components of a motorcycle-traffic system - A study along the motorcycle path in Malaysia. IATSS Research, Vol. 29(1),pp.50-56.

7.       Tung, S. H., Wong, S. V., Law, T. H., and Radin Umar, R. S. (2008). Crashes with roadside objects along motorcycle lanes in Malaysia. International Journal of Crashworthiness, Vol. 13(2), pp.205-210.





A.Praveena, M.Jayashree

Paper Title:

Mitigation of Voltage SAG using Dynamic Voltage Restorer

Abstract:    Power quality problem is an occurrence manifested as an nonstandard voltage ,current or frequency that results in failure of end use equipments .one of the major problem in power quality is voltage sag .To improve the power quality, custom power devices are used. The custom power device used here is DVR(Dynamic Voltage Restorer) is role to compensate load voltage during the different fault conditions like voltage sag ,single line to ground ,double line to ground faults .In this work ,PI controller and discrete PWM pulse generator are used for the control purpose

   component; PWM(pulse width modulation) technic,DVR(dynamic voltage restorer),PI(proportional integral) controller


1.        D. Daniel Sabin, Senior member IEEE ,and Ambra Sannino, IEEE “A    summary of the draft IEEE P1409 Custom Power Application Guide” Transmission and Distribution   Conference and Exposition, IEEE PES, vol.3,pp.931-936,2003.
2.        Yash Pal, A. Swarup Senior Member, IEEE,and Bhim Singh, Senior Member IEEE”A Review of Compensating Type Custom Power Devices for Power Quality Improvement” IEEE Power India Conference,2008.

3.        Michael D. Stump, Gerald J. Keane “The Role, of Custom Power Products in Enhancing Power Quality at Industrial Facilities”, Energy Management and Power Delivery.vol. 2,507-517,International Conference 1998.

4.        Bingsen Wang, Giri Venkataramanan and Mahes Illindala,” Operation and Control of a Dynamic Voltage Restorer Using Transformer Coupled H-Bridge Converters”, IEEE Transactions on power electronics,vol.21,pp.1053-1061,july 2006.

5.        Fawzi AL Joeder” Modelling and Simulation of Different  System Topologies for Dynamic Voltage Restorer” Electric Power and Energy Conversion Systems,EPECS’09.InternationalConferences,IEEE,pp.1-6,2009.

6.        D.N.Katole Research Scholor :Department  of  Electrical Engg. G. H.Raisoni College of Engineering Nagpur, Maharashtra India.”Analysis and Mitigation of Balanced Voltage Sag with The  Help of Energy Storage System” ICETET pp.317-321,2010.

7.        H.P.Tiwari and Sunil Kumar Gupta “Dynamic Voltage Restorer against Voltage Sag” International Journal Of Innovation, Management and Technology.vol. 1,no. 3,pp.232-237,2010.





Amita Kumari, Rajesh Mehra

Paper Title:

Hybridized Classification of Brain MRI using PSO & SVM

Abstract:    Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body. In this method a hybrid approach for classification of brain tissue in MRI based on Particle Swarm Optimization (PSO) and Support Vector Machine (SVM) wavelet based texture feature are extracted from normal and tumor region by using HAAR wavelet. These features are given as input to the SVM classifier which classified them into normal & abnormal brain neoplasm. The algorithm incorporates steps for pre-processing, image segmentation and image classification using SVM classifier.

   MRI, Classification PSO, SVM, HAAR wavelet


1.        A .Kharrat,  K Gasmi , M Ben Messaoud , N Benamrane and M Abid . “ A hybrid approach for automatic classif ication of brain MRI using  genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010.
2.        E F Badran, E G  Mahmoud, N Hamdy  “An algorithm for brain tumor  in MRI images”, International Conference on  Communication Computer Engineering and Systems (ICCES), Networking  & Broadcasting, pp 368-373, June, 2010.

3.        N Abdullah, Lee Wee Chuen; U K Ngah, KA Ahmad,  “Improvement of MRI brain classification using Principles  Component Analysis”, IEEE International Conference on  Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011.

4.        M Hasanzadeh ,S Kasaei.”Multispectral brain MRI segmentation using genetic fuzzy systems” international conference on communication ,networking and broadcasting(ISSPA),pp 1-4,June,2001

5.        V.vapnik “the nature of statistical learning theory, springer-verlag, newyork, 1995
6.        S N Deepa, B A Devi .”Artificial neural networks design for classification of brain tumor” IEEE International Conference on Computer Communication and Informatics(ICCII), pp 1-6, 2012.
7.        E. I.Zacharaki ,Sumei Wang ,S Chawla, Dong Soo    Yoo, R Wolf ,E.R Melhem, C.Davatzikos.”MRI based classification of brain tumor type and grade using SVMRFE”.IEEE Symposium on bioengineering,pp-1035-1038,April ,2009.

8.        M .C Clark, L. O Hall, D.B.Goldgof, R.Velthuizen, F.R. Murtagh, and M.S Silbiger. “Automatic tumor segmentation using knowledge based technique, IEEE transaction on medical imaging, vol 17,no 2,pp-187-192,April,1998.

9.        W. E. Reddick ,  J.O Glass, E. N. Cook , T. D Elkin ,R. J. Deaton. “Automated segmentation and classification of multispectral magnetic resonance images of brain using artificial neural networks”, IEEE transaction on medical imaging, vol 16, no 6,pp 911-918 ,1997.

10.     Huazhu Song , Zichun Ding, Cuicui Guo , Zhe Li, Hongxia Xia. “ Research on combination kernel function of Support Vector Machine .” International Conference on Computer science and software engineering, pp-345-356, 2008

11.     Mcconnell Brain Imaging centre (june 2006) stimulated data base [online] available http://www.bic .mni.mcgill.ca /brainweb).

12.     Y.J .Kennedy ,R.Eberhart. “ Particle Swarm  Optimization.” IEEE International Conference on Neural Network,pp-1942- 1948, 1995.

13.     Vladimir N. Vapnik “ The Nature of Statistical Learning  Theory” New York: Springer –Verlag,2000





Azher Jameel

Paper Title:

A Comparative Study of XFEM and EFGM in Solving Frictional Contact Problems

Abstract:    In this paper, the extended finite element method (XFEM) and the element free Galerkin method (EFGM) have been employed to model and simulate the contact type of nonlinearities caused by the discontinuities due the frictional contact. In order to model these discontinuities, few modifications are made in XFEM and EFGM to incorporate these discontinuities in the formulation. The contact interface between the two bodies is modeled by applying an appropriate enrichment function. The classical approximate solution is enriched with the Heaviside jump function to simulate the contact behavior between the two surfaces. Gaussian quadrature has been used for the numerical integration of the weak formulation. Finally, three model problems are solved using XFEM and EFGM and the results obtained by the two techniques are compared with each other. The results obtained by XFEM show a good agreement with the results obtained by EFGM.

   XFEM, EFGM, slip criterion, slip rule, penalty factor, level set, Heaviside jump function.


1.        T. Liszka, J. Orkisz, "The finite difference method at arbitrary irregular grids and its application in applied mechanics", Computers and Structures, vol. 11, 1980, pp. 83-95.
2.        J. Oliver, A. E. Huespe,  P. J. Sanchez, "A finite element method for crack growth without remeshing", International Journal for Numerical Methods in Engineering, vol. 46, 1999, pp. 131-150.

3.        J. A. A. Portela, M. Aliabadi, D. Rooke, "The dual boundary element method: effective implementation for crack problems", International Journal for Numerical Methods in Engineering, vol. 33, 1991, pp. 1269-1287.

4.        U. Haussler, C. Korn, "An adaptive approach with the element free Galerkin method", Computer Methods in Applied Mechanics and Engineering, vol. 162, 1998, pp. 203-222.

5.        A. R. Khoei, S. O. R. Biabanaki, M. Anahid, "Extended finite element method for three-dimensional large plasticity deformations on arbitrary interfaces", Computer Methods in Applied Mechanics and Engineering, vol. 197, 2008, pp. 1100-1114.

6.        J. H. Chen, N. Kikuchi, "An incremental constitutive relation of unilateral contact friction for large deformation analysis", Journal of Applied Mechanics, vol. 52, 1985, pp. 639-648.

7.        P. Papadopoulos, R. L. Taylor, "A mixed formulation for the finite element solution of contact problems", Computer Methods in Applied Mechanics and Engineering, vol. 94, 1992, pp. 373-389.

8.        K. J. Bathe, A. Chaudary, "A solution method for planar and axisymmetric contact problems", International Journal for Numerical Methods in Engineering, vol. 21, 1985, pp. 65-88.

9.        N. Sukumar, D. L. Chopp, N. Moes, T. Belytschko, "Modeling holes and inclusions by level sets in the extended finite-element method", Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6183-6200.

10.     J. M. Melenk, I. Babuska, "The partition of unity finite element methods: basic theory and applications", Computer Methods in Applied Mechanics and Engineering, vol. 139, 1996, pp. 289-314.

11.     J. Dolbow, N. Moes, T. Belytschko, "An extended finite element method for modeling crack growth with frictional contact", Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6825-6846.

12.     N. Moes, T. Belytschko, "Extended finite element method for cohesive crack growth", Engineering Fracture Mechanics, vol. 69, 2002, pp. 813-833.

13.     I. V. Singh, B. K. Mishra, S. Bhattacharya, R. U. Patil, "The numerical simulation of fatigue crack growth using extended finite element method", International Journal of Fatigue, vol. 36, 2012, pp. 109-119.

14.     S. Glodez, Z. Ren, "Modelling of crack growth under cyclic contact loading", Theoretical and Applied Fracture Mechanics, vol. 30, 1998, pp. 159-173.

15.     P. M. A. Areias, T. Belytschko, "Analysis of three-dimensional crack initiation and propagation using the extended finite element method", International Journal for Numerical Methods in Engineering, vol. 63, 2005, pp. 760-788.

16.     A. R. Khoei, A. Shamloo, A. R. Azami, "Extended finite element method in plasticity forming of powder compaction with contact friction", International Journal of
solids and structures, vol. 43, 2006, pp. 5421-5448.

17.     M. Anahid, A. R. Khoei, "New development in extended finite element modeling of large elasto-plastic deformations", International Journal for Numerical Methods in Engineering, Vol. 75, 2008, pp. 1133-1171.

18.     B. Prabel, A. Combescure, A. Gravouil, S. Marie, "Level set X-FEM non-matching meshes: application to dynamic crack propagation in elasto-plastic media", International Journal for Numerical Methods in Engineering, vol. 69, 2006, pp. 1553-1569.

19.     S. Mariani, U. Perego, "Extended finite element method for quasi-brittle fracture", International Journal for Numerical Methods in Engineering, vol. 58, 2003, pp. 103-126.

20.     L. B. Lucy, "A numerical approach to the testing of the fission hypothesis", Astronomical Journal, vol. 82, 1977, pp. 1013-1024.

21.     J. W. Swegle, D. L. Hicks, S. W. Attaway, "Smoothed particle hydrodynamics stability analysis", Journal of Computational Physics, vol. 116, 1995, pp. 123-134.

22.     S. W. Attaway, M. W. Heinstein, J. W. Swegle, "Coupling of smooth particle hydrodynamics with the finite element method", Nuclear Engineering and Design,
vol. 150, 1994, pp. 199-205.

23.     T. Belytschko, L. Gu, Y. Y. Lu, "Fracture and crack growth by element free Galerkin methods", Modeling and Simulation in Materials Science and Engineering, vol. 2, 1994, pp. 519-534.

24.     N. Moes, M. Cloirec, P. Cartraud, J. F. Remacle, "A computational approach to handle complex microstructure geometries", Computer Methods in Applied Mechanics and Engineering, vol. 192, 2003, pp. 3163-3177.

25.     J. C. Simo, T. A. Laursen, "An augmented Lagrangian treatment of contact problems involving friction", Computers and Structures, vol. 42, 1992, pp. 97-116.

26.     C. Eck, O. Steinbach, W. L. Wendland, "A symmetric boundary element method for contact problems with friction", Mathematics and Computers in Simulation, vol. 50, 1999, pp. 43-61.

27.     A. R. Khoei, M. Nikbakht, "An enriched finite element algorithm for numerical computation of contact friction problems", International Journal of Mechanical Sciences, vol. 49, 2007, pp. 183-199.






Paper Title:

Performance Evaluation of Rotary Vane Compressor Using Oil Separator in Car AC System

Abstract:    One of the primary functions of an automobile climate control system is to provide the desired cooling and stabilize cabin temperatures to comfortable levels in hot climatic conditions. With the increasing demand for more energy efficient systems and thermal comfort in automobiles, the automobile AC system needs to be optimized to deliver the required cooling performance with minimum AC power consumption. Proper selection and integration of AC compressor with other system aggregates results in improved energy efficiency of the system. There are varies ideas to improve compressor efficiency .But considering manufacturing feasibility ,design and validation lead time and cost as many of the ideas dropped down. Oil separator is one of the way to improve cooling efficiency of compressor in which low investment and lead time involved. The function of oil separator is that separate the oil and refrigerant from the AC system.AC System contains compressor ,condenser, evaporator and txv as main parts. During AC system on condition, refrigerant flow on in the compressor ,condenser and evaporator txv too. Compressor contains OIL which is used for lubrication purpose for compressor internal parts.So that compressor moving parts will not damage as wear and tear. During compressor on condition oil also mix with refrigerant which can circulate the system.This paper response to implication of oil separator in Rotary vane compressor.

   Compressor, Oil separator


1.      G H Hundy ,A.R Trott,TC Welch Refrigeration and Air-conditioning Tata  McGraw Hill education Pvt Ltd.,4th  Edition (2010).
2.      P.N  Ananthanarayanan., “Basic Refrigeration and Air conditioning”., Tata McGraw Hill education Pvt Ltd.,3rd  Edition (2006).

3.      C.P.Arora., “Refrigeration and Air conditioning” Tata McGraw Hill education Pvt Ltd.,17th  Edition (2006).

4.      Valeo Japan Handbook and test reports.





Shakeel Ahmad, Rehan Ahmad Khan, Hina Gupta

Paper Title:

Seismic Performance of a Masonry Heritage Structure

Abstract:    World-wide experience from past earthquakes shows un-reinforced masonry structures are the most vulnerable and represent overall the largest threat to human life and property in future earthquakes. This highlights the structural inadequacy of buildings, especially unreinforced masonry buildings, to carry seismic loads and requires an urgent assessment of existing buildings in terms of the strength, expected performance and safety of existing buildings during earthquake as well as for carrying out the necessary rehabilitation. As it is a heavy, brittle material with low tensile strength and exhibits little ductility when subjected to seismic effects, unreinforced masonry is highly susceptible to earthquake damage than various other types of construction material. Unreinforced masonry buildings are usually characterized by sudden and dramatic collapse. Present study deals with an evaluation of the seismic performance of an old unreinforced masonry building structure. The 137 years old masonry heritage school building is located at Aligarh Muslim University, Aligarh (seismic zone IV). The building does not show any cracks under gravity loads. Since the historical building was built before the inception of seismic IS code, the point of concern is performance of building under seismic loads. In the present study, the building is modelled using finite element technique and its seismic evaluation is carried out using the commercially available Finite Element software assuming a homogeneous and nonlinear behaviour of the material. The building is subjected to different PGA levels (0.1g, 0.2g, 0.3g, 0.4g ) as input ground motion to determine its seismic performance.The results thus obtained will be useful for detecting the weak failure zones of the buildings under future seismic forces and retrofit accordingly using proper retrofitting techniques.

   Heritage masonry building, finite element modelling, seismic performance, peak ground acceleration.


1.       IS: 1905-1987, Indian Standard Code of Practice for Structural Use of Unreinforced Masonry, Bureau of Indian Standards, New Delhi.
2.       IS 1893–2002, Criteria for Earthquake Resistant Design of Structure.

3.       Suggested draft IS: 1905, Code of practice for structural use of unreinforced masonry (Draft suggested by IITK GSDMA Program on Building Codes which is available from www.nicee.org).

4.       M. Sirajuddin, N. S. Potty and J. Sunil, “Nonlinear seismic analysis of masonry structures,”, India, Journal of Design and Built Environment, Vol. 9, December 2011, pp. 1–16.

5.       Ueli Camathias (Master Thesis) “Seismic Performance Evaluation of a Historic Unreinforced Masonry Building Structure”, 2013.

6.       M. J. DeJong (Ph.D Thesis). “Seismic Assessment Strategies for Masonry Structures”, 2009.

7.       S.S. Khadka,” Seismic Performance of Tradational Unreinforced Masonry Building in Nepal,” Kathmandu University Journal of Science, Engineering and Technology
Vol. 9, No. I, July, 2013, pp 15-28.

8.       G. Angjeliu1, M. Baballëku,” Seismic assessment of historical masonry structures. The former Italian Embassy,” 2nd International Balkans Conference on Challenges of Civil Engineering, BCCCE, 23-25 May 2013, Epoka University, Tirana, Albania.

9.       P.B. Lourenço,”Computations on historic masonry structures”, Prog. Struct. Engng. Mater., 4, 2002, pp. 301-319.

10.     R. Capozucca,” Shear Behaviour of Historic Masonry Made of Clay Bricks,” The Open Construction and Building Technology Journal, 2011, 5, (Suppl 1-M6) pp. 89-96.

11.     H. R. Parajuli, J. Kiyono, H. Taniguchi, K. Toki, A. Furukawa, P.N. Maskey, “Parametric study and dynamic Analysis of a Historical Masonry Building of Kathmandu” Disaster Mitigation of Cultural Heritage and Historic cities, Vol.4, July 2010.





Sunil Kumar Yadav, Rajesh Mehra

Paper Title:

Analysis of FPGA Based Recursive Filter Using Optimization Techniques for High Throughput

Abstract:    In this paper we examine the optimal throughput of recursive filter using varies optimization techniques, which are relevant for real time application. By formulating filter design as a multi-objective optimization problem and approaching. Different approaches use for implementing of these methods on hardware. In this work FPGA implementation of recursive filters are examined and the comparison of these methods is done by analyzing the hardware cost and performance.

   IIR filter, VHDL, FPGA


1.        Bojan Jovanović, and Milun Jevtić “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium pages:61-66, ebruary 2010
2.        Arjuna Madanayake• Thushara  K.Gunaratne•Leonard T.  Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer

3.        Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter using FPGA Devices”
International Technology Research Letters, pages:25-31, 2012

4.        Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013

5.        Kamboh, Hamid M., and Shoab A. Khan. "An algorithmic transformation for FPGA implementation of high throughput filters." Emerging Technologies 7th International Conference on. IEEE,pages  1-6  2011.





Ravi Prakash Yadav, Ritesh Kumar Mishra

Paper Title:

Performance Analysis of OFDM System Employing an Efficient Scheme of ICI Self- Cancellation

Abstract:    Orthogonal frequency division multiplexing (OFDM) is very sensitive to frequency offset caused by Doppler frequency drift or frequency drift between transmitter and receiver oscillator. This leads to a loss in the orthogonality between sub-carriers and results in inter-carrier-interference (ICI). In this paper we proposed an efficient ICI self-cancellation scheme to reduce ICI in OFDM system and its performance is compared with existing methods of self-cancellation in terms of carrier-to-interference ratio (CIR) and bit-error rate (BER). Simulation result shows that the proposed scheme outperforms the existing schemes.

   Inter-carrier-interference (ICI), OFDM, self-cancellation (SC), data-conjugate, data-conversion.

1.       J. Armstrong, “Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM”, IEEE Trans. Commun., vol. 47, no. 3, pp. 365–369, Mar. 1999.
2.       P. H. Moose, “A technique for orthogonal frequency division multiplexing frequency offset correction”, IEEE Trans. Commun., vol. 42, no.10, pp. 2908–2914, 1994.

3.       J. Ahn and H. S. Lee, “Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,” Electronics letters, vol. 29, no. 16,
pp. 1476-1477, Aug. 1993.

4.       C. Muschallik, “Improving an OFDM reception using an adaptive Nyquist windowing,” IEEE Transactions on Consumer Electronics, vol. 42, pp. 259-269, Aug. 1996.

5.       P. Tan and N. C. Beaulieu , “Reduced ICI in OFDM System Using the “Better Than” Raised Cosine Pulse”, IEEE Commun., letters , vol.8 , no.3 , march 2004.

6.       Y. Zhao and S. G. Haggman, “Intercarrier Interference Self-Cancellation Scheme for OFDM Mobile Communication Systems”, IEEE Trans. on Commun., vol.49, no. 7, July 2001.

7.       K .Sathananthan, R.M.A.P.Rajatheva and S.B.Slimane, “Cancellation technique to reduce intercarrier interference in OFDM, IEEE Elect. Lett. , Dec. 2000.

8.       Y. Fu and C.C. Ko, “A new ICI self-cancellation scheme for OFDM systems based on a generalized signal mapper”, Proc. 5th wireless Personal Multimedia Communications, pp.995-999, 2002.

9.       Y-H Peng, “Performance Analysis of a New ICI-Self- Cancellation Scheme in OFDM Systems”, IEEE Trans. on Consumer Electronics, vol.53, no.4, pp.1333-1338, 2007.

10.     H.G. Ryu, Y. Li, J.S.Park, “An Improved ICI Reduction Method in OFDM Communication System”, IEEE Trans. Broadcasting, vol.51, no.3 pp.395-400, Sep.2005.

11.     Q. Shi, Y. Fang, M. Wang, “A novel ICI self-cancellation scheme for OFDM systems”, in IEEE WiCom, pp.1-4, 2009.

12.     H. Zhou and Y-F Huang, “A Maximum Likelihood Fine Timing Estimation for Wireless OFDM Systems”, IEEE Trans. on Broadcasting, Vol.55, No.1, pp.31-41,

13.     Q. Shi, “ICI Mitigation for OFDM Using PEKF”, IEEE Signal Process. Lett. , vol.17, no. 12, pp.981-984, Dec.2010.





Chithrakshi, Taranath H.B

Paper Title:

Image Compression Using Fuzzy Enhancement

Abstract:    Fuzzy logic is a way to embed an engineer’s experience into the system. It mathematically emulates human reasoning, provides an intuitive way to design function blocks for intelligent control systems, advanced fault detection and other complex applications. The fuzzy logic, unlike conventional logic system, is able to model inaccurate or imprecise models. The fuzzy logic approach offers a simpler, quicker and more reliable solution that is clear advantages over conventional techniques.  It can significantly improve response so we are actively incorporating fuzzy logic into many real time applications. Image processing is one of the area where fuzzy can be utilized for the image enhancement.  Image compression is one of the major image processing techniques that is widely used in medical, automotive, consumer and military applications. In this project fuzzy technique has been used in image compression with Discrete Wavelet Transforms (DWT) technique. Discrete wavelet transforms is the most popular transformation technique adopted for image compression. Complexity of DWT is always high due to large number of arithmetic operations. In order to minimize the complexity of DWT, modified DA split architecture has been proposed and implemented on FPGA.

   DA split architecture, Discrete wavelet transforms (DWT), Fuzzy logic, Image processing


1.        David S. Taubman, Michael W. Marcellin - JPEG 2000 - Image compression, fundamentals, standards and practice", Kluwer academic publishers, Second printing - 2002.
2.        G. Knowles, "VLSI Architecture for the Discrete Wavelet Transform," Electronics Letters, vo1.26, pp. 1184-1185,1990.

3.        M, Vishwanath, R. M. Owens, and M. 1. Irwin, "VLSI Architectures for the Discrete Wavelet Transform," IEEE Trans. Circuits And Systems II, vol. 42, no. 5, pp. 305-316, May. 1995.

4.        AS. Lewis and G. Knowles, "VLSI Architectures for 2-D Daubechies Wavelet Transform without MUltipliers".Electron Letter, vo1.27, pp. 171-173, Jan 1991.

5.        K.K. Parhi and T. Nishitani "VLSI Architecture for Discrete Wavelet Transform", IEEE Trans. VLSI Systems, vol. 1, pp. 191-202, June 1993.

6.        M. Vishwanath, R.M. Owens and MJ. Irwin, "VLSI Architecture for the Discrete Wavelet Transform", IEEE Trans. Circuits and Systems, vol. 42, pp. 305-316, May 1996.

7.        C. Chakrabarti and M. Vishwanath, "Architectures for Wavelet Transforms: A Syrvey", Journal of VLSI Signal Processing, Kulwer, vol.lO, pp. 225-236,1995.





S.Senthil Kumar, V.Parthasarathy

Paper Title:

Juggler Radio Network Using Virtual Wi-Fi

Abstract:    A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. Any single radio interface that is dynamically switched to a  wireless channel in different frequency bands to communicate with different nodes. This however incurs frequent channel switching overhead of the order of 100s of microseconds which is comparable to packet transmission times. A more practical method for concurrent channel usage is to use multiple radio interfaces .A multi-channel wireless mesh network architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 NICs. We address the problem of interference aware routing in multi-radio infrastructure mesh networks where in each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. In proposed Virtual Refined Wi-Fi Additional interfaces can support parallelism in network flows, improve handoff times, and provide sideband communication with nearby peers. Completely, such benefits are outweighed by the added costs of an additional physical interface. Instead, virtual interfaces have been proposed as the solution, multiplexing a single physical interface across more than one communication endpoint

   Ad-hoc, Virtual Wi-Fi, Radio interface, Multiracial, WMN.


1.        A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. In Broadnets, 2004. R. Draves, J. Padhye, and B. Zill; .Routing in Multi-radio, Multi-hop Wireless Mesh Networks.; ACM MobiCom '04.
2.        P. Hsiao, A. Hwang, H. Kung, D. Vlah; .Load-Balancing Routing for Wireless Access Networks.; Proc. of IEEE INFOCOM '01.

3.        I. Katzela, M. Naghshineh; .Channel assignment schemes for cellularmobile telecommunication systems: a comprehensive survey.; IEEE Personal Communications (June '96)

4.        T. R. Jensen, B. Toft; .Graph Coloring Problems.; Wiley Inter science, New York, '95.

5.        Jie Gao, Li Zhang; .Load Balanced Short Path Routing in Wireless Networks.; Proc. of INFOCOM '04 .

6.        H. Hassanein, A. Zhou; .Routing with load balancing in wireless Adhoc networks.; Proc. of ACM MSWiM '01.

7.        S.J. Lee and M. Gerla; .Dynamic Load-Aware Routing in Ad hoc Networks.; Proc. of ICC '01.

8.        A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.;ACM Mobile Computing & Comm Review (MC2R), April '04.

9.        C. Villamizar, R. Chandra, R. Govindan; .Internet RFC 2439 – BGP Route Flap Damping.

10.       Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.; ACM Mobile Computing & Comm Review (MC2R), April '04.

11.       Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniquesfor diagnosing faults in ieee 802.11 infrastructure networks. In Proceedings of the International Conference on Mobile Computing .Networking (MobiCom), pages 30–44, Philadelphia, PA, Sept. 2004.

12.     M. Shin, S. Lee and Y.-A. Kim, “Distributed Channel Assignment for Multi-Radio Wireless Networks”, IEEE Internat. Conf. on Mobile Adhoc and Sensor Systems (MASS), Oct. 8–11, 2006, pp. 417–426.

13.     J. Tang, X. Guoliang, and W. Zhang, “Interference-aware topology control and QoS routing in multi-channel wireless mesh networks,” in Proceedings of the 6th ACM International Symposium on Mobile AdHoc Networking and Computing, MobiHoc 2005,





Abhay Limaye, Shraddha Kakne, Priti Tiple, Shubhangi Bhamare

Paper Title:

Scrutinizing the Art of Intrusion Detection

Abstract:    Internet services and applications have become an inextricable part of quotidian life, enabling communication and the management of confidential information from any place imaginable. These internet services are bound to be vulnerable to attackers. Billions of dollars are lost every year in mending the systems hit by the intrusions. The means for pinpointing and tracking these intrusions are called as Intrusion Detection Systems (IDS). Intrusion Detection Systems  are procuring mainstream adulation as companies move more of their critical business interactions to the Internet. Thus, hereby, in this paper, we present the dissertation on the notion of Intrusion Detection wherein we first focus on the assorted genres of attacks or intrusions. Furthermore we attempt to discern the paradigm of Intrusion Detection Systems. Denouement of this paper elaborates pragmatic benefits and unrealistic conjectures of prevalent Intrusion Detection Systems.

   Intrusion Detection System (IDS), Dos (Denial of Service), brute force Attack, SQL injection attack.


1.        Amrita Anand,Brajesh Patel"International Journal of Advanced Research in   Computer Science and Software Engineering",International Journal of Advenced Research in Computer Science and Software Engineering 2 (8),  August- 2012.
2.        Sapna S. Kaushik, Dr.Prof.P.R.Deshmukh"Detection of  Attacks in an Intrusion Detection  System" (IJCSIT) International Journal of   Computer Science and Information Technologies, Vol. 2 (3) , 2011

3.        Renaud Bidou “Denial of Service Attacks”

4.        John Bellardo and Stefan Savage “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” 

5.        Faizal, M.A., MohdZaki M., Shahrin Sahib, Robiah, Y., SitiRahayu, S., and AsrulHadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.

6.        Christopher Kruegel, Fredrik Valeur, Giovanni Vigna(2005). Intrusion Detection and Correlation, Challenges and Solution, Springer Science+Business Media Inc, USA.





Munaga Siva Prasanth, Kallepalli Venkatesh

Paper Title:

Fire Suppression System in Locomotives

Abstract:    Still we had seen a lot of fire accidents and gas leakages are present in trains. So in this paper it is a remedy to reduce the death loss occurring due to fire accidents in trains. Fire on a running train is more catastrophic than on a stationary one, since fanning by winds helps spread the fire to other coaches. The damage is heavier due to improper reach of service at right time due to improper communication. This time delay is causing heavier damage. Thus, eliminating the time between when an accident occurs and when first responders are dispatched to the scene decreases the damage. This projects help in notifying the passengers and emergency services. The project consists of a microcontroller which is interfaced with the thermistor, gas sensors, water sprinkler and GSM modem, Once the sensors attached in the compartments of train sense the gas detection and fire detection, it assumes a fire accident. The controller assumes it as an emergency and power supply will be automatically off, starts the buzzer, doors are opened, Sprinkler on and GSM modem present in the train sending the message alert to loco pilot and near the railway stations.

   Sprinkler, D.C. Motor, Thermistor (NTC) & Smoke sensors, GSM, Buzzer, Submergible pump or centrifugal pump


1.        “The 8051 Microcontroller and Embedded Systems” by “Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinlay”
2.        “Practical electrical motor handbook” by “Irving Gottlieb”

3.        Microcontroller  AT89C52 datasheet

4.        Thermistor NTC datasheet

5.        http://en.wikipedia.org/wiki/Thermistor
6.        http://www.ti.com/general/docs/lit/getliterature.tsp? genericPartNumber= lm35&reg =en&fileType=pdf
7.        http://www.8085projects.info/Block-diagram-and-working-of-ADC0809.html
8.        http://www.dnatechindia.com/Tutorial/8051-Tutorial/Interfacing-Relay-to-Microcontroller.html

9.        http://www.systemsensor.com/en-us/Pages/Aspiration.aspx

10.     http://www.sohofireprotection.us/water-based-fire-sprinklers.html

11.     http://9circuits.com/store/products/pololu/flammable-gas-smoke-sensor/





Amrita Razdan, M. F. Wani

Paper Title:

Experimental Characterization for Wear Rate of Silicon Carbide and Nickel-Base Alloy for Human Implants

Abstract:   Among the available ceramic materials for load bearing bio-implant applications, silicon carbide is superior for its better biocompatibility, which can increase the longevity of prosthetic joints. The major cause of revision surgery and implant failure is Osteolysis (aseptic loosening of the prosthetic joint). The product of bearing wear, microscopic particulate debris in the joint space leads to implant loosening. Prosthetic joint mainly consists of acetabular cup, acetabular lining and femoral head. The best material for manufacturing acetabular cup is nickel –base alloy. For manufacturing acetabular lining and femoral head, silicon carbide is the best chosen material. The acetabular cup or knee cap is prone to catastrophic failures due to walking, stumbling etc. A sliding distance test was performed on polished surface of silicon carbide and nickel-base alloy (mirror- like finish, 1µm) by using Reciprocating Friction Monitor (Courtesy; National Institute of Technology, Srinagar) for the evaluation of wear coefficient by standard test procedures and equation outlined in ASTM F 603. The test was carried out in ambient temperature. The results obtained showed drastically reduced wear rates. The experiments on Reciprocating Friction Monitor for Silicon carbide and nickel –base alloy showed that the best choice for prosthetic joint replacement would be a combination of two materials; silicon carbide for femoral heads and acetabular lining, and nickel-base alloy for acetabular cup.

   Aseptic loosening, Nickel base alloy, Silicon Carbide, Total joint replacement, Wear rate.


1.       Willert HG, Bertam H, Buchhorn GH.   Osteolysis in Alloarthroplasty of the hip: The    role of ultra- high monolecular weight polyethylene wear particles. Clin Orthop Relat Res  1990;258:95-107.
2.       Ceramic on ceramic bearing Sukree  khumrak, Bangkok medical journal vol.4.

3.       Capello WN, D’Antonio JA, Feinberg JR, et al.  Ceramicon- ceramic total hip arthroplasty: update.  J Arthroplasty

4.       Chevillotte C, Pibarot V, Carret JP, et al. Hip squeaking: A 10 years Follow up Study. J  Arthroplasty 2012;27: 1008-13

5.       Nevelos JE, Ingham E, Doyle C, et al. Wear of  HIPed and non-HIPed alumina-alumina hip joints under standard and severe simulator testing conditions. Biomaterials 2001;22:2191-7.

6.       Hannouche D, et al. Ceramics in Total Hip Replacement. Clin Orthop Relate Res 2005;430:62-71.

7.       Chevillotte C, Trousdale RT, Chen Q, et al. Hip Squeaking : A Biomechanical study of Ceramic-on-Ceramic Bearing Surfaces. Clin Orthop Relat Res 2010;468:345-50.

8.       Walter WL, Insley GM, Walter WK, et al. Edge loading in third generation alumina ceramic-on-ceramic bearings: stripe wear. J Arthroplasty 2004;19:402-13.

9.       Tribochemical polishing of silicon carbide in oxidant solution Zhize Zhu ), Viktor Muratov, Traugott E. Fischer.Department of Materials Science and Engineering, SteÍens Institute of Technology, Hoboken, NJ 07030, USA .





Abdulaziz S. Al-Aboodi

Paper Title:

Kinematic Simulation of Three Rollers in Circular Motion Using 2D Planar FE Modeling

Abstract:    A method is established for joining a tube to a tubesheet by expanding the tube to the tubesheet. The expansion done using  different method such as rolling. The joint integrity is important to ensure the roundness of the structure of the heat exchanger, and to prevent leakage. Many parameters affect the joint integrity such as the initial clearance, wall reduction and material properties. The residual contact stress is the main parameter indicating the strength of the joint. In this paper, the two dimensional planar FE model is established for the tube to tubesheet roller expansion. The planar model is great way for our attempt to understand and analyze the problem. The planar model reveals a realistic motion of the rollers in addition to the exact geometry of the tubesheet. This eliminates the need for the assumption of uniform expansion and tubesheet sleeve diameter sets on the axisymmetric model. That, the ligament dimensional effect will be shown on this model.

   Kinamatic, Simulation, Finite Element, Rolling, Modeling.


1.       Al-Aboodi A (2006) Finite element analysis of roller expanded tubetubesheet joints with overenlarged tubesheet holes. PhD thesis, KFUPM
2.       Al-Aboodi A, Merah N, Shuaib AR, Al-Nassar Y, Al-Anizi SS (2008) Modeling the effects of initial tube-tubesheet clearance, wall reduction and material strain hardening on rolled joint strength.

3.       ASME J Press Vessel Technol 130/4:041204-1–041204-6

4.       Al-Aboodi A, Merah N, Shuaib AN, Al-Nassar Y (2009) FEA of groove geometry effect on roller and hydraulically expanded tube to tubesheet joint strength. Int J Precis Technol 1(2):201–207

5.       Allam M, Bazergui A (2002) Axial strength of tube-to tubesheet joints: finite element and experimental evaluations. J Press Vessel Technol 124:23–31

6.       Allam M, Chaaban A, Bazergui A (1998) Estimation of residual stresses in hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 120:129–137

7.       Andrieux S, Voldoire F (1995) Stress identification in steam generator tubes from profile measurements. Nucl Eng Design 158:417–427 ANSYS (2004) Version 9.0, program and help documentations, Swanson Analysis System, Inc.

8.       Aufaure M (1987) Analysis of residual stresses due to roll-expansion process: finite element computation and validation by experimental tests. In: Transaction of the 9th international conference of SMIRT, pp 499–503

9.       Cizelj L, Mavko B (1995) Propagation of stress corrosion cracks in steam generator tubes. Int J Press Vessel Piping 63:35–43 Cooper Power Tools (2005) Tube cleaners and expanders airetool   manual. SP-1100EN0405–410M

10.     Jawad MH, Clarkin EJ, Schuessler RE (1987) Evaluation of tube-totubesheet junctions. J Press Vessel Technol 109:19–26

11.     Merah N, Al-Zayer A, Shuaib A, Arif A (2003) Finite Element evaluation of clearance effect on tube-to-tubesheet joint strength. Int J Press Vessel Piping 80:879

12.     Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y, Al-Anizi SS (2009) Combined effects of tube projection, initial tube-tubesheet clearance and tube material strain hardening on rolled joint strength. ASME J Press Vessel Technol 131/5

13.     Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y (2010) 3-D FEA of the effects of large overtolerances on roller expanded tubetubesheet joint strength. In: Abstract published on IVth European conference on computational mechanics, Paris 16–21, 2010

14.     Metzger DR, Sauve RG, Nadeau E (1995) Prediction of residual stress by simulation of the rolled joint manufacturing process for steam generators, PVP vol 305. In: Current topics in computational mechanics. ASME, New York

15.     Scott DA, Wolgemuth GA, Aikin JA (1984) Hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 106:104–109

16.     Shuaib AN, Merah N, Khraisheh MK, Allam IM, Al-Anizi SS (2003) Experimental investigation of heat exchanger tubesheet hole enlargement. J Press Vessel
Technol 125:19–25

17.     Standard of the Tubular Exchanger Manufacturer Association ‘TEMA’, 7th edn (1988) TEMA, Terrytown

18.     Updike DP, Kalnins A, Caldwell SM (1992) Residual stresses in transition zone of heat exchanger tubes. J Press Vessel Technol 114:149–156

19.     Williams DK (1996) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs—part 1: 2-D solution, PVP vol 327. In: Residual stresses in design, fabrication, assessment and repair, ASME, New York, pp 173–180

20.     Williams DK (1997) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs-part 2: 3-D solution, PVP vol 354. In: Current topics in the design and analysis of pressure vessels and piping. ASME, New York, pp 17–28

21.     Williams DK (2003) Prediction of residual stresses in the mechanical roll of HX tubes into TEMA grooves, PVP vol 2003–1937. In: Design and analysis methods and fitness for service, ASME, New York, pp 121–29.





Ambika Oad, Himanshu Yadav, Anurag Jain

Paper Title:

A Review: Image Encryption Techniques and its Terminologies

Abstract:    In today’s environment, security becomes an important issue in communication. For secure transmission of data in open network, encryption is very important methodology. Though encryption we can prevent our data from unauthorized access during transmission. In recent years many image encryption methods have been proposed and used to protect confidential data. In this paper, we survey on existing work which is used different techniques for image encryption and we also give general introduction about cryptography.

   Cryptography, Image Encryption, Decryption, Security.


1.        http://en.wikipedia.org/wiki/Encryption
2.        http://en.wikipedia.org/wiki/Plaintext

3.        http://en.wikipedia.org/wiki/Ciphertext

4.        http://en.wikipedia.org/wiki/Decryption

5.        http://en.wikipedia.org/wiki/Cryptography

6.        Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “ Multilevel Image Encryption by Binary Phase XOR Operations “, IEEE Proceeding in the year 2003.

7.        M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25

8.        Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004

9.        Guosheng Gu ,Guoqiang Han “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.

10.     N.K. Pareek, Vinod Patidar, "Image encryption using chaotic logistic map", Elsevier, Image and Vision Computing 24 (2006) 926–934.

11.     Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm  1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008

12.     Mohammad Ali Bani Younes and Aman Jantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008.

13.     Mohammad Ali Bani Younes and Aman Jantan  ImageEncryption Using Block-Based Transformation Algorithm IAENG International Journal of Computer Science, 35,2008.

14.     Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009.

15.     Sesha Pallavi Indrakanti , P.S.Avadhani,   Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011.

16.     Amnesh Goel, Reji Mathews & Nidhi Chandra, "Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices", International Journal of Computer Applications (0975 – 8887), Volume 36– No.3, December 2011.

17.     Reji Mathews, Amnesh Goel, Prachur Saxena & Ved Prakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA. ISBN: 978-988

18.     S.Bosu Babu & S.S.P Kumar “Enhanced Color Visual Cryptography” Engineering Science and Technology: An International Journl, , ISSN: 2250-3498, Vol.2, No. 5, October 2012

19.     Quist-Aphetsi Keste,“ Image Encryption based on the RGB PIXEL Transposition and Shuffling” I.J.Computer Network and Information Security, 2013,7, 43-50,2013.

20.     Keerti Kushwah, Sini Shibu “New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique,” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 61 - 65

21.     Nehal Kandele, Shrikant Tiwari “A New Combined Symmetric Key Cryptography CRDDBT Using - Relative Displacement (RDC) and Dynamic Base Transformation (DBTC)”, International Journal of Engineering Research & Technology, Vol.2 - Issue 10 (October - 2013)( 2278-0181)





Aparna A Nair, S.K Sudheer, M. Jayaraju

Paper Title:

Analysis of Optical Characteristics for Photonic Crystal Fiber at Small Core Diameters

Abstract:   In the present study photonic crystal of eight ring with modified inner most ring has been considered. The important optical properties like chromatic dispersion, effective area, nonlinear coefficient and confinement loss has been studied.  Each characteristic has been investigated under different core diameter of the photonic crystal fiber. Each iteration has been done within range of wavelength 1000nm -1600nm .Using software like COMSOL MULTIPHYSICS and MATLAB, each parameter were realized. This design has made the propagation of electromagnetic waves of higher wavelength through the core under tight confinement. The novel design has made the light of higher wavelength to be trapped inside the core of very small diameters (1μm-3μm).A good confinement loss has been achieved due to increase of the number of rings

   Photonic crystal fiber (PCF), Finite Element Method, Chromatic Dispersion, Confinement Loss, and Nonlinear Coefficient.


1.        R. K. Sinha and Shailendra K. Varshney, “Dispersion Properties Of Photonic Crystal Fibers”, Microwave And Optical Technology Letters, Vol. 37, No. 2, 2003     .
2.        Tzong-Lin Wu, Senior Member, IEEE, Jung-Sheng Chiang, and Chia-Hsin Chao, “ A Novel Approach for Calculating the Dispersions of Photonic Crystal Fibers”, IEEE Photonics Technology Letters, Vol. 16, No. 6,  2004.

3.        P. St. J. Russell, “Photonic-Crystal Fibers,” J. Lightwave   Technol., No. 24 , pp. 4729-      4749, 2006

4.        Jianguo Liu, Lifang Xue, Zhi Wang, Guiyun Kai, Yange Liu, Weigang Zhang, and Xiaoyi Dong, “Large Anomalous Dispersion at Short Wavelength and Modal Properties of a Photonic Crystal Fiber With Large Air Holes” , IEEE Journal Of Quantum Electronics, Vol. 42, No. 9, 2006.

5.        Lars Grüner-Nielsen, and Bera Pálsdóttir , “Highly nonlinear fibers for very wideband supercontinuum generation” , Proc. of SPIE Vol. 6873, 68731B, 2008

6.        Feroza Begum, Yoshinori Namihira , S.M. Abdur Razzak , Shubi Kaijage , Nguyen Hoang Hai ,Tatsuya Kinjo , Kazuya Miyagi , Nianyu Zou, “Design and analysis of novel highly nonlinear photonic crystal fibers with ultra-flattened chromatic dispersion” Optics Communications 282 ,1416–1421,2009.

7.        Rekha Mehra , Pawan Kumar Inaniya, “Design of Photonic Crystal Fiber for Ultra Low Dispersion in Wide Wavelength Range with Three Zero Dispersion Wavelengths” , AIP Conf. Proc. 1324, 175 ,2010.

8.        Md. Anwar Hossain,Yoshinori Namihira, Jingjing Liu, S.M.Abdur Razzak, Md. Asraful Islam, Yuki Hirako, Kazuya Miyagi, Shinya Nozaki, “Dispersion Flattened Photonic Crystal Fibers For Supercontinuum Generation In A Telecommunication Window” , Proceedings of ICCTA2011.  

9.        WANG XiaoYan, LI ShuGuang, HAN Ying, DU Ying, XIA ChangMing  & HOU LanTian, “The polarization-dependent supercontinuum generation in photonic crystal fibers with high birefringence and two-zero dispersion”, Science China:Physics, Mechanics & Astronomy, Vol.55 No.2: 199–203, Feb 2012.

10.     M. Samiul Habib, M. A. Motin, M. I. Hasan, M. Selim Habib, S.M. Abdur Razzak, and M. A. Goffar Khan, “Dispersion and Confinement Loss Control with Decagonal Photonic Crystal Fibers for Wideband Transmission Systems”, IEEE 2013.

11.     Aparna A Nair, Dr. S.K Sudheer, Dr. M Jayaraju, “Research on Optical Properties of Photonic Crystal Fiber (PCF) at Telecommunication Windows”, in proceedings of International Conference on Recent trends in Engineering Technology, ICRTET Cochin, Kerala, pp-80-85,January 2014





Reshma Elizabeth Regi, Haris P.A.

Paper Title:

Performance of PAPR Reduction in OFDM System with Complex Hadamard Sequence using SLM and Clipping

Abstract:   Orthogonal Frequency Division Multiplexing (OFDM) is an efficient method of data transmission for high speed communication systems. However, the main drawback of OFDM system is that, it exhibits high Peak to Average Power Ratio (PAPR) of the transmitted signals. OFDM consist of large number of independent subcarriers, as a result of which the amplitude of such a signal can have high peak values. The Selected Mapping (SLM) technique is one of the promising PAPR reduction techniques for OFDM. This technique however increases the computational and phase search complexity and PAPR reduction performance is largely dependent on the selection of random phase sequences. In this paper,  a new SLM method which rotates the phase of input data after IFFT by using matrices generated from complex Hadamard code is proposed. After phase  rotation, clipping technique is used to further reduce the PAPR. From  simulation results, we can find that the proposed method has lower PAPR than conventional SLM combined with clipping technique.

  OFDM-Orthogonal frequency division multiplexing, Clipping, SLM-Selected Mapping, Hadamard Sequence.


1.       Y. Wu and W. Y. Zou, ”Orthogonal frequency division multiplexing: a multi-carrier modulation scheme,” IEEE Transactions on Consumer Electron, Aug. 1995.
2.       L. J. Cimini Jr., ”Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans. Commun., vol. COM-33, pp. 665-675, July 1985.

3.       Dov Wulich,”Definition of Efficient PAPR in OFDM ,”    IEEE communication Letters, vol. 9, no. 9, Sept 2005

4.       R. van Nee and A. de Wild, “Reducing the Peak-to-Average Power Ratio of OFDM,” in Proc. of Vehicular Technology Conference, IEEE, vol. 3, pp. 2072-2076.May 1998.

5.       L. Wang and C. Tellambura, ”A simplified clipping and filtering technique for par reduction in ofdm systems, ”IEEE Signal Process. Lett, vol. 12, no. 6, pp. 453–456, 2005

6.       J. Armstrong, ”Peak-to-average   power reduction    for ofdm by repeated clipping and frequency domain filtering,” Electron. Lett, vol. 38, no. 5, pp. 246–247, 2002.

7.       Xiaodong Li and Leonard J. Cimini, Jr. “Effects of Clipping and Filtering on the Performance of OFDM, ”IEEE Comm. Letters vol. 2, no. 5, pp. 131-133,1998

8.       Steve C. Thompson, John G. Proakis, and James R. Zeidler, “The Effectiveness of Signal Clipping for PAPR and Total Degradation Reduction in OFDM Systems,” IEEE    Globecom.,   vol. 30, pp. 2807-2811, 2005.

9.       Guoguang  Chen,  Rashid Ansari,   Yingwei Yao,“ Improved Peak Windowing for PAPR Reduction in OFDM,”    IEEE Conference Publications pp. 1-5,2009.

10.     A. E. Jones, T. A. Wilkinson, and S. K. Barton, “Block coding scheme for reduction of peak to mean envelope power ratio of multicarrier transmission schemes,” Electron. Lett., vol. 30, pp. 2098-2099, 1994.

11.     Wattanasuwakull, T. ; Benjapolakul, W,”PAPR Reduction for OFDM Transmission by using a method of Tone Reservation and Tone Injection” in proc. of Information, Communications and Signal Processing, Conference, IEEE ,pp. 273 - 277,2005

12.     B. S. Krongold and D. L. Jones. “PAR reduction in OFDM via active constellation extension,”IEEE Trans. Broadcasting, April 2002.

13.     R.W. Bguml, R.F.H. Fischer and J.B. Huber “Reducing the peak-to-average power ratio of multicarrier modulation by selected mapping,” Electronics letters, vol. 32, no. 22, pp. 259– 268, October 1996.

14.     Sang -Woo Kim, Jin-Kwan Kim and Heung-Gyoon Ryu “A Computational Complexity Reduction Scheme Using Walsh Hadamard Sequence in SLM Method. ” IEEE conference Publications, pp. 762-766, 2006

15.     S.H. Muller and J.B. Huber “OFDM with reduced peak to-average power ratio by optimum combination of partial transmit sequences” Electronics letters, vol. 33,no. 5 ,pp. 368- 369, february 1997.

16.     Asma Latif; N. D. Gohar, “Reducing Peak-to-Average Power Ratio (PAPR) Using Partial Transmit Sequence in OFDM Systems, ” Proc of lEEE, pp. 126-130,2003

17.     Aparna P. More, Sunil B. Somani, “The Reduction of PAPR  in OFDM Systems Using Clipping and SLM Method, ” Proc on lEEE conference, pp. 593-597,2013

18.     Aye Aung, Boon Poh Ng, and Susanto Rahardja,”Sequence- Ordered Complex Hadamard Transform Properties,Computational   Complexity and Applications” ,IEEE Transactions on signal processing , vol. 56, no. 8,pp. 3562-3571 , 2008





Bibi Ayesha.H.Patel, K.Indira

Paper Title:

Automatic Recognition of Rodent Species based on Mathematical Morphological Characterization of Skull

Abstract:  Morphological image processing is a collection of non-linear operations related to the shape or morphology of features in an image. Digital image processing technique applied to extract morphological features of skull image taken from optical camera. Based on the prominent nine extracted morphological features of rodent species, the closed form univariate two-factor analysis is derived. These two factor analysis is used for real time auto-recognition uniqueness of rodent species such as Meriones unguiculatus, Microtus brandti and Rattus norvegicus. The same two-factor auto-recognition analysis is used over x-ray image of rodent's skull as well as other rodent species like squirrel. The  considered morphological features are short axis(X1), perimeter(X2), eccentricity(X3), sphericity(X4), bump area(X5), paraxial area of enclosing rectangle(X6), hu1(X7), hu2(X8), hu3(X9).

   Morphological image processing , Hu- moments, Rodent species.


1.       Onboard Autonomous Rock Shape Analysis For Mars Rovers, IEEE 2002
2.       Zhihu Huang, Jinsong Leng  "Analysis of Hus Moment Invariants on Image Scaling and Rotation",  IEEE 2010

3.       J. F. Boyce and W. J. Hossack, " Moment Invariants for Pattern  Recognition," Pattern Recognition Letters, vol. 1, pp. 451-456, 1983

4.       Jan Flusser and Tomas Suk, "A Moment-based Approach to  Registration of Images with Affine Geometric Distortion," IEEE  transaction on Geoscience and Remote Sensing, vol. 32, pp. 382-387, 1994





Monali Chaudhari, Amogh Waghmare, Sheldon Fernandes, Sagar Sinkar

Paper Title:

Dual Axes Maximum Light Intensity Tracker

Abstract:    Efficiency of any solar powered system reduces due to mismatch between the direction of the sun’s rays and axis of the solar panel. Aim of the proposed and implemented scheme is to increase the efficiency of such a system, by reorienting the plane of the solar panel orthogonal to the sun’s radiation by using a simple low powered system. To achieve this, the panel is moved about two axes after a certain interval of time depending upon the ambient light conditions.

   LDR, Gimbal Structure, ADC, LSB


1.       Saravanan C. , Dr .M.A. Panneerselvam, I. William Christopher, “A    Novel Low Cost Automatic Solar Tracking System”.
2.       Design, Development and Performance Test of an Automatic Two-Axis Solar Tracker system by Bajpai, P. (Electr. Eng. Dept., IIT Kharagpur, Kharagpur, India) et.al. India Conference (INDICON), 2011 Annual IEEE

3.       Design, Manufacturing and Performance Test of a Solar Tracker Made by a Embedded Control by Beltran, J.A. et.al.  Electronics, Robotics and Automotive Mechanics Conference,25-28 Sept. 2007 Page(s): 129 – 134 Print ISBN: 978-0-7695-2974-5





Syed Shujauddin Sameer

Paper Title:

Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association Rules

Abstract:    The availability of data on the internet is increasing on a larger basis daily .Privacy Preservation data mining has emerged to address one of the side effects of data mining Technology. The threat to individual privacy through data mining is able to infer sensitive information from Non-sensitive information or unclassified data. There is a n urgent need to be able to infer some mechanism to avoid the projection of all the sensitive information .An approach in data mining techniques is very much essential. Alteration of data, filtering of the data, blocking of the data are Some of the approaches. Given specific rules to be hidden, the techniques involve is to hide only the given sensitive data. In this work we assume that only sensitive datais given and we analyze the approaches to secure sensitive data in the database.

   Privacy preserving data mining, Association rules ,Sensitive data.


1        Privacy Preserving Decision Tree Learning Using Unrealized Data Sets ,Issue No 02- February 2012.Vol. 24,Knowledge and Data Engineering ,IEEE Transactions
2        D. Agrawal and C. C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms”, In Proceedings of the 20th Symposium on Principles of Database Systems, Santa Barbara,California, USA, May 2001.

3        R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases”, In Proceedings of ACM SIGMOD International Conference on Management of Data, Washington DC, May 1993.

4        R. Agrawal and R. Srikant, ”Privacy preserving data mining”, In ACM SIGMOD Conference on Management of Data, pages 439–450, Dallas, Texas, May 2000.

5        Ljiljana Brankovic and Vladimir Estivill-Castro, “Privacy Issues in Knowledge Discovery and Data Mining”, Australian Institute of Computer Ethics Conference, July, 1999, Lilydale.

6        C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining”, in Workshop on Research Issues on Data Mining and knowledge Discovery, 1996.

7        C. Clifton, “Protecting Against Data Mining Through Samples”, in Proceedings of the ThirteenthAnnual IFIP WG 11.3 Working Conference on Database Security, 1999.

8        C. Clifton, “Using Sample Size to Limit Exposure to Data Mining”, Journal of Computer Security, 8(4), 2000.SIGMOD

9        Chris Clifton, Murant Kantarcioglu, Xiaodong Lin and Michael Y. Zhu, “ Tools for Privacy PreservingDistributed Data Mining”, SIGKDD Explorations, 4(2), 1-7, Dec. 2002.

10      E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino, “Hiding Association Rules by Using Confidence and Support” in Proceedings of 4th Information Hiding Workshop, 369-383, Pittsburgh,PA, 2001.

11      A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules”, In Proc. Of the 8th ACM SIGKDD Int’l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002.

12      Alexandre Evfimievski, “Randomization in Privacy Preserving Data Mining”, SIGKDD Explorations, 4(2), Issue 2, 43-48, Dec. 2002.

13      Alexandre Evfimievski, Johannes Gehrke and Ramakrishnan Srikant, “Limiting Privacy Breaches in Privacy Preserving Data Mining”, PODS 2003, June 9-12, 2003, San Diego, CA.

14      M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules onhorizontally partitioned data”, In ACM SIGMOD Workshop on Research Issues on Data Miningand Knowledge Discovery, June 2002.

15      Y. Lindell and B. Pinkas, “Privacy preserving data mining”, In CRYPTO, pages 36–54, 2000.

16      D. E. O’ Leary, “Knowledge Discovery as a Threat to Database Security”, In G.  Piatetsky-Shapiro and W. J.Frawley, editors,    Knowledge Discovery in Databases, 507516, AAAI Press/ MIT Press, Menlo Park, CA,  1991.

17      S. Oliveira, O. Zaiane, “Algorithms for Balancing Privacy and Knowledge Discovery i Association Rule Mining”, Proceedings of 7th International  Database Engineering and ApplicationsSymposium (IDEAS03), Hong Kong, July 2003.

18      S. Oliveira, O. Zaiane, “Protecting Sensitive  Knowledge by Data Sanitization”, Proceedings of IEEE International Conference on Data Mining, November 2003.

19      S. J. Rizvi and J. R. Haritsa, “Privacy-preserving Association rule mining”, In Proc. of the 28th Int’l Conference on Very Large Databases,    August  2002.

20      Y. Saygin, V. Verykios, and C. Clifton, “Using Unknowns to Prevent Discovery of Association Rules”, SIGMOD Record 30(4): 45-54, December 2001.

21      Surajit Chaudhuri. “Efficient evaluation of queries with mining predicates”, In Proc. ofthe 18th Int’l Conference on Data Engineering    (ICDE) 529-540,2002.





Prabodh Sarmah, Devajit Mahanta

Paper Title:

Computational Methods for Enzyme Design and Its Biological Significance

Abstract:   Enzymes are large biological molecules responsible for the thousands of metabolic processes that sustain life. They are highly selective catalysts, greatly accelerating both the rate and specificity of metabolic reactions, from the digestion of food to the synthesis of DNA. Most enzymes are proteins, although some catalytic RNA molecules have been identified. Enzymes adopt a specific three-dimensional structure, and may employ organic (e.g. biotin) and inorganic (e.g. magnesium ion) cofactors to assist in catalysis. Multiple experimental approaches have been applied to generate nearly all possible mutations of target enzymes, allowing the identification of desirable variants with improved properties to meet the practical needs. Meanwhile, an increasing number of computational methods have been developed to assist in the modification of enzymes during the past few decades. With the development of bioinformatics algorithms, computational approaches are now able to provide more precise guidance for enzyme engineering and make it more efficient and less laborious. In this review, we summarize the recent advances of method development with significant biological outcomes to provide important insights into successful computational protein designs.

   Enzymes, computational approaches


1.       Smith AL (Ed) (1997). Oxford dictionary of biochemistry and molecular biology. Oxford [Oxfordshire]: Oxford University Press. ISBN 0-19-854768-4.
2.       Grisham, Charles M.; Reginald H. Garrett (1999). Biochemistry. Philadelphia: Saunders College Pub. pp. 426–7. ISBN 0-03-022318-0.

3.       Bairoch A. (2000). "The ENZYME database in 2000" (PDF). Nucleic Acids Res 28(1): 304–5. doi:10.1093/nar/28.1.304. PMC 102465. PMID 10592255.

4.       Lilley D (2005). "Structure, folding and mechanisms of ribozymes". Current Opinion in Structural Biology 15 (3): 313–23. doi:10.1016/j.sbi.2005.05.002. PMID 15919196.

5.       Cech T (2000). "Structural biology. The ribosome is a ribozyme". Science 289 (5481): 878–9. doi:10.1126/science.289.5481.878. PMID 10960319.

6.       Groves JT (1997). "Artificial enzymes. The importance of being selective". Nature 389(6649): 329–30. doi:10.1038/38602. PMID 9311771.

7.       de Réaumur, RAF (1752). "Observations sur la digestion des oiseaux". Histoire de l'academie royale des sciences 1752: 266, 461.

8.       Williams, H. S. (1904) A History of Science: in Five Volumes. Volume IV: Modern Development of the Chemical and Biological Sciences Harper and Brothers (New York) Accessed 4 April 2007

9.       Payen, A. et J.-F. Persoz (1833) "Mémoire sur la diastase, les principaux produits de ses réactions et leurs applications aux arts industriels" (Memoir on diastase, the principal products of its reactions and their applications to the industrial arts), Annales de chimie et de physique, 2nd series, 53 : 73–92.

10.     Dubos J. (1951). "Louis Pasteur: Free Lance of Science, Gollancz. Quoted in Manchester K. L. (1995) Louis Pasteur (1822–1895)—chance and the prepared mind".Trends Biotechnol 13 (12): 511–5. doi:10.1016/S0167-7799(00)89014-9.PMID 8595136.

11.     Kühne coined the word "enzyme" in: W. Kühne (1877) Jump up^ Text of Eduard Buchner's 1907 Nobel lecture at http://nobelprize.org. Retrieved 4 April 2007.

12.     The naming of enzymes by adding the suffix "-ase" to the substrate on which the enzyme acts, has been traced to French scientist  Jump up^ Willstätter, R. (1927). Problems and Methods in Enzyme Research. Cornell University Press, Ithaca. quoted in Blow, David (2000). "So do we understand how enzymes work?" (pdf). Structure 8 (4): R77–R81. doi:10.1016/S0969-2126(00)00125-8.PMID 10801479.

13.     1946 Nobel prize for Chemistry laureates at http://nobelprize.org. Retrieved 4 April 2007.

14.     Blake CC, Koenig DF, Mair GA, North AC, Phillips DC, Sarma VR. (1965). "Structure of hen egg-white lysozyme. A three-dimensional Fourier synthesis at 2 Angstrom resolution". Nature 206 (4986): 757–61. doi:10.1038/206757a0. PMID 5891407.

15.     Chen LH, Kenyon GL, Curtin F, Harayama S, Bembenek ME, Hajipour G, Whitman CP (1992). "4-Oxalocrotonate tautomerase, an enzyme composed of 62 amino acid residues per monomer". J. Biol. Chem. 267 (25): 17716–21. PMID 1339435.

16.     Smith S (1 December 1994). "The animal fatty acid synthase: one gene, one polypeptide, seven enzymes". FASEB J. 8 (15): 1248–59. PMID 8001737.

17.     Anfinsen C.B. (1973). "Principles that Govern the Folding of Protein Chains". Science181 (4096): 223–30. doi:10.1126/science.181.4096.223. PMID 4124164.

18.     Dunaway-Mariano D (2008). "Enzyme function discovery". Structure 16 (11): 1599–600. doi:10.1016/j.str.2008.10.001. PMID 19000810.

19.     The Catalytic Site Atlas at The European Bioinformatics Institute. Retrieved 4 April 2007.

20.     Jaeger KE, Eggert T. (2004). "Enantioselective biocatalysis optimized by directed evolution". Current Opinion in Biotechnology 15 (4): 305–

21.     Shevelev IV, Hubscher U. (2002). "The 3' 5' exonucleases". Nature Reviews Molecular Cell Biology 3 (5): 364–

22.     Tymoczko, John L.; Stryer Berg Tymoczko; Stryer, Lubert; Berg, Jeremy Mark (2002).Biochemistry. San Francisco: W.H. Freeman. ISBN

23.     Ibba M, Soll D. (2000). "Aminoacyl-tRNA synthesis". Annu Rev Biochem. 69: 617–50.doi:10.1146/annurev.biochem.69.1.617. PMID 10966471.

24.     Rodnina MV, Wintermeyer W. (2001). "Fidelity of aminoacyl-tRNA selection on the ribosome: kinetic and structural mechanisms". Annu Rev Biochem. 70: 415–35.doi:10.1146/annurev.biochem.70.1.415. PMID 11395413.

25.     Tawfik, O. K. A. D. S.; Tawfik, D. S. (2010). "Enzyme Promiscuity: A Mechanistic and Evolutionary Perspective". Annual Review of Biochemistry 79: 471–505.doi:10.1146/annurev-biochem-030409-143718. PMID 20235827. edit

26.     Fischer E. (1894). "Einfluss der Configuration auf die Wirkung der Enzyme" [Influence of configuration on the action of enzymes]. Berichte der Deutschen chemischen Gesellschaft zu Berlin 27 (3): 2985–93. doi:10.1002/cber.18940270364Jump up^ Koshland D. E. (1958). "Application of a Theory of Enzyme Specificity to
Protein Synthesis". Proc. Natl. Acad. Sci. 44 (2): 98–104. doi:10.1073/pnas.44.2.98.PMC 335371. PMID 16590179.

27.     Davies GJ, Bohm M. (2002). "Glycosidase mechanisms". Current Opinion in Chemical Biology 6 (5): 619–29. doi:10.1016/S1367-5931(02)00380-0.PMID 12413546.

28.     Boyer, Rodney (2002) [2002]. "6". Concepts in Biochemistry (2nd ed.). New York, Chichester, Weinheim, Brisbane, Singapore, Toronto.: John Wiley & Sons, Inc. pp. 137–8. ISBN 0-470-00379-0. OCLC 51720783.

29.     Savir Y & Tlusty T (2007). "Conformational proofreading: the impact of conformational changes on the specificity of molecular recognition". In Scalas, Enrico. PLoS ONE 2(5): e468. doi:10.1371/journal.pone.0000468. PMC 1868595. PMID 17520027.

30.     Chou K.C. (1996). "Review: Prediction of human immunodeficiency virus protease cleavage sites in proteins". Analytical Biochemistry 233 (1): 1–14.doi:10.1006/abio.1996.0001. PMID 8789141.

31.     Gan, Y. R., Huang, H., Huang, Y. D., Rao, C. M., Zhao, Y., Liu, J. S., Wu, L. & Wei, D. Q. (April 2006). "Synthesis and activity of an octapeptide inhibitor designed for SARS coronavirus main proteinase". Peptides 27 (4): 622–625.doi:10.1016/j.peptides.2005.09.006. PMID 16242214.

32.     Du, Q. S., Wang, S., Wei, D. Q., Sirois, S. & Chou, K. C. (2005). "Molecular modelling and chemical modification for finding peptide inhibitor against SARS CoV Mpro". Analytical Biochemistry 337 (2): 262–270. doi:10.1016/j.ab.2004.10.003.PMID 15691506.

33.     Du, Q. S., Sun, H. & Chou, K. C. (2007). "Inhibitor design for SARS coronavirus main protease based on "distorted key theory"". Medicinal Chemistry 3 (1): 1–6.doi:10.2174/157340607779317616. PMID 17266617.

34.     Fersht, Alan (1985). Enzyme structure and mechanism. San Francisco: W.H. Freeman. pp. 50–2. ISBN 0-7167-1615-1.

35.     Jencks, William P. (1987). Catalysis in chemistry and enzymology. Mineola, N.Y: Dover. ISBN 0-486-65460-5.

36.     Villa J, Strajbl M, Glennon TM, Sham YY, Chu ZT, Warshel A (2000). "How important are entropic contributions to enzyme catalysis?". Proc. Natl. Acad. Sci. U.S.A. 97(22): 11899–904. doi:10.1073/pnas.97.22.11899. PMC 17266. PMID 11050223.

37.     Warshel A, Sharma PK, Kato M, Xiang Y, Liu H, Olsson MH (2006). "Electrostatic basis for enzyme catalysis". Chem. Rev. 106 (8): 3210–35. doi:10.1021/cr0503106.PMID 16895325.

38.     Eisenmesser EZ, Bosco DA, Akke M, Kern D (2002). "Enzyme dynamics during catalysis". Science 295 (5559): 1520–3. doi:10.1126/science.1066176.PMID 11859194.

39.     Agarwal PK (2005). "Role of protein dynamics in reaction rate enhancement by enzymes". J. Am. Chem. Soc. 127 (43): 15248–56. doi:10.1021/ja055251s.PMID 16248667.

40.     Eisenmesser EZ, Millet O, Labeikovsky W (2005). "Intrinsic dynamics of an enzyme underlies catalysis". Nature 438 (7064): 117–21. doi:10.1038/nature04105.PMID 16267559.

41.     Yang LW, Bahar I (5 June 2005). "Coupling between catalytic site and collective dynamics: A requirement for mechanochemical activity of enzymes". Structure 13 (6): 893–904. doi:10.1016/j.str.2005.03.015. PMC 1489920. PMID 15939021.

42.     Agarwal PK, Billeter SR, Rajagopalan PT, Benkovic SJ, Hammes-Schiffer S. (5 March 2002). "Network of coupled promoting motions in enzyme catalysis". Proc Natl Acad Sci USA. 99 (5): 2794–9. doi:10.1073/pnas.052005999. PMC 122427.PMID 11867722.

43.     Agarwal PK, Geist A, Gorin A (2004). "Protein dynamics and enzymatic catalysis: investigating the peptidyl-prolyl cis-trans isomerization activity of cyclophilin A".Biochemistry 43 (33): 10605–18. doi:10.1021/bi0495228. PMID 15311922.

44.     Tousignant A, Pelletier JN. (2004). "Protein motions promote catalysis". Chem Biol. 11(8): 1037–42. doi:10.1016/j.chembiol.2004.06.007. PMID 15324804

45.     Flomenbom O, Velonia K, Loos D et al. (2005). "Stretched exponential decay and correlations in the catalytic activity of fluctuating single lipase molecules". Proc. Natl. Acad. Sci. U.S.A. 102 (7): 2368–2372. doi:10.1073/pnas.0409039102.PMC 548972. PMID 15695587.

46.     English BP, Min W, van Oijen AM et al. (2006). "Ever-fluctuating single enzyme molecules: Michaelis-Menten equation revisited". Nature Chemical Biology 2 (2): 87–94.doi:10.1038/nchembio759. PMID 16415859.

47.     Lu H, Xun L, Xie X S (1998). "Single-molecule enzymatic dynamics". Science 282(5395): 1877–1882. doi:10.1126/science.282.5395.1877. PMID 9836635.

48.     Olsson, MH; Parson, WW; Warshel, A (2006). "Dynamical Contributions to Enzyme Catalysis: Critical Tests of A Popular Hypothesis". Chem. Rev. 106 (5): 1737–.

49.     Neet KE (1995). "Cooperativity in enzyme function: equilibrium and kinetic aspects".Meth. Enzymol. Methods in Enzymology 249: 519–67. doi:10.1016/0076-6879(95)49048-5. ISBN 978-0-12-182150-0. PMID 7791626.

50.     Changeux JP, Edelstein SJ (2005). "Allosteric mechanisms of signal transduction".Science 308 (5727): 1424–8. doi:10.1126/science.1108595. PMID 15933191.

51.     de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Cofactor". International Union of Pure and Applied Chemistry. Retrieved 30 October 2007.

52.     de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Coenzyme". International Union of Pure and Applied Chemistry. Retrieved 30 October 2007.

53.     Fisher Z, Hernandez Prada JA, Tu C, Duda D, Yoshioka C, An H, Govindasamy L, Silverman DN and McKenna R. (2005). "Structural and kinetic characterization of active-site histidine as a proton shuttle in catalysis by human carbonic anhydrase II".Biochemistry. 44 (4): 1097–115. doi:10.1021/bi0480279. PMID 15667203.

54.     Wagner, Arthur L. (1975). Vitamins and Coenzymes. Krieger Pub Co. ISBN 0-88275-258-8.

55.     BRENDA The Comprehensive Enzyme Information System. Retrieved 4 April 2007.

56.     Törnroth-Horsefield S, Neutze R (2008). "Opening and closing the metabolite gate".Proc. Natl. Acad. Sci. U.S.A. 105 (50): 19565–6. doi:10.1073/pnas.0810654106.PMC 2604989. PMID 19073922.

57.     Ferguson, S. J.; Nicholls, David; Ferguson, Stuart (2002). Bioenergetics 3 (3rd ed.). San Diego: Academic. ISBN 0-12-518121-3.

58.     Henri, V. (1902). "Theorie generale de l'action de quelques diastases". Compt. Rend. Hebd. Acad. Sci. Paris 135: 916–9.

59.     Sørensen,P.L. (1909). "Enzymstudien {II}. Über die Messung und Bedeutung der Wasserstoffionenkonzentration bei enzymatischen Prozessen". Biochem. Z. 21: 131–304.

60.     Michaelis L., Menten M. (1913). "Die Kinetik der Invertinwirkung". Biochem. Z. 49: 333–369. English translation. Retrieved 6 April 2007.

61.     Briggs G. E., Haldane J. B. S. (1925). "A note on the kinetics of enzyme action".Biochem. J. 19 (2): 339–339. PMC 1259181. PMID 16743508.

62.     Xue X, Liu F, Ou-Yang ZC (2006). "Single molecule Michaelis-Menten equation beyond quasistatic disorder". Phys. Rev. E 74 (3): 030902. doi:10.1103/PhysRevE.74.030902.PMID 17025584.

63.     Radzicka A, Wolfenden R. (1995). "A proficient enzyme". Science 267 (5194): 90–931.doi:10.1126/science.7809611. PMID 7809611.

64.     Ellis RJ (2001). "Macromolecular crowding: obvious but underappreciated". Trends Biochem. Sci. 26 (10): 597–604. doi:10.1016/S0968-0004(01)01938-7.PMID 11590012.

65.     Kopelman R (1988). "Fractal Reaction Kinetics". Science 241 (4873): 1620–26.doi:10.1126/science.241.4873.1620. PMID 17820893.

66.     Savageau MA (1995). "Michaelis-Menten mechanism reconsidered: implications of fractal kinetics". J. Theor. Biol. 176 (1): 115–24. doi:10.1006/jtbi.1995.0181.PMID 7475096.

67.     Schnell S, Turner TE (2004). "Reaction kinetics in intracellular environments with macromolecular crowding: simulations and rate laws". Prog. Biophys. Mol. Biol. 85 (2–3): 235–60. doi:10.1016/j.pbiomolbio.2004.01.012. PMID 15142746.

68.     Xu F, Ding H (2007). "A new kinetic model for heterogeneous (or spatially confined) enzymatic catalysis: Contributions from the fractal and jamming (overcrowding) effects".Appl. Catal. A: Gen. 317 (1): 70–81. doi:10.1016/j.apcata.2006.10.014.

69.     Garcia-Viloca M., Gao J., Karplus M., Truhlar D. G. (2004). "How enzymes work: analysis by modern rate theory and computer simulations". Science 303 (5655): 186–95.doi:10.1126/science.1088172. PMID 14716003.

70.     Olsson M. H., Siegbahn P. E., Warshel A. (2004). "Simulations of the large kinetic isotope effect and the temperature dependence of the hydrogen atom transfer in lipoxygenase". J. Am. Chem. Soc. 126 (9): 2820–8. doi:10.1021/ja037233l.PMID 14995199.

71.     Masgrau L., Roujeinikova A., Johannissen L. O., Hothi P., Basran J., Ranaghan K. E., Mulholland A. J., Sutcliffe M. J., Scrutton N. S., Leys D. (2006). "Atomic Description of an Enzyme Reaction Dominated by Proton Tunneling". Science 312 (5771): 237–41.doi:10.1126/science.1126002. PMID 16614214.

72.     Cleland, W.W. (1963). "The Kinetics of Enzyme-catalyzed Reactions with two or more Substrates or Products 2. {I}nhibition: Nomenclature and Theory". Biochim. Biophys. Acta 67: 173–87.

73.     Price, NC. (1979). "What is meant by 'competitive inhibition'?". Trends in Biochemical Sciences 4 (11): pN272. doi:10.1016/0968-0004(79)90205-6.

74.     R Poulin; Lu, L; Ackermann, B; Bey, P; Pegg,

75.     Yoshikawa S and Caughey WS. (15 May 1990). "Infrared evidence of cyanide binding to iron and copper sites in bovine heart cytochrome c oxidase. Implications regarding oxygen reduction". J Biol Chem. 265 (14): 7945–58. PMID 2159465.

76.     Hunter T. (1995). "Protein kinases and phosphatases: the yin and yang of protein phosphorylation and signaling". Cell. 80 (2): 225–36. doi:10.1016/0092-8674(95)90405-0. PMID 7834742.

77.     Berg JS, Powell BC, Cheney RE (1 April 2001). "A millennial myosin census". Mol. Biol. Cell 12 (4): 780–94. doi:10.1091/mbc.12.4.780. PMC 32266.PMID 11294886.

78.     Meighen EA (1 March 1991). "Molecular biology of bacterial bioluminescence".Microbiol. Rev. 55 (1): 123–42. PMC 372803. PMID 2030669.





Anil Sai Bodepudi, Anil Kumar Kopparthy, Annavarapu Santosh Kumar

Paper Title:

Mobile Operated Control System for Humanoid Robot

Abstract:   In this paper a control system is designed to operate a Humanoid Robot “Bioloid Premium” using DTMF (Dual-Tone-Multiple- Frequency) technology of mobile phones for long range operations.   The mobile phone with the operator acts as a transmitter and the one attached to the Robot acts as a receiver and hence no additional communication devices are required.   The operator calls the mobile installed in the humanoid Robot which gets activated through auto answering mode. In the course of a call, if any button is pressed, a DTMF tone corresponding to the button pressed is heard at the other end of the call. The Humanoid Robot perceives this DTMF tone with the help of the phone placed on it. The received tone is processed by the Arduino microcontroller with the help of DTMF decoder. The decoder decodes the DTMF tone into its equivalent binary digit and the same is sent to the microcontroller. The microcontroller is programmed to take a decision for any given input and outputs its decision to the CM-530 controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to motor driver in order to control the servo motors in required direction for human like moves. Auto answering video calling is done in order to control the humanoid very easily and precisely. Experiment based on the DTMF has been carried out which can be implemented in the humanoid robot for various applications like security or safety, defence, assistance in medical and environmental hazards and other humanitarian services.

   Humanoid Robot, DTMF, Microcontroller.


1.        Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oilphant,  GSM and Personal Communications Handbook, Artech House Boston, London, 1998 .
2.        Sabuj  Das  Gupta,  Arman  Riaz  Ochi,  Mohammad  Sakib Hossain,             Nahid      Alam      Siddique,      Designing      and Implementation of Mobile Operated Toy Car by DTMF, International Journal of Scientific and Research Publications, Vol 3, Issue 1, pp 1-7, 2013.

3.        4Online Available: www.natalnet.br/~aroca/afron/mt8870.pdf Online Available: http://www.arduino.cc/

4.        Online Available: http://www.robotis.com/xe.





Wail N. Al-Rifaie

Paper Title:

An Approximate Method for the Design of Ferrocement Beams

Abstract:    A simple analytical model is proposed to design the ferrocement rectangular beam subjected to flexural loading. The predicted results of cross sectional resistance moment obtained using the proposed model is compared with ACI (trial and error) method. A parametric study was conducted to estimate the influence of volume fraction of reinforcement and the depth of the beam. The comparison between the proposed and ACI methods was quite satisfactory.

   Frrocement, pre-fabricated building, moment, eco-housing.


1.        IFS Committees 10, 2001”Ferrocement Model Code,” Building Code Recommendations for Ferrocement (IFS 10-01).
2.        ACI Publication SP.61, 1979 “Ferrocement–Materials and Applications”, pp 1-195.

3.        ACI committee 549, 1980, “Guide for the Design, Construction, and Repair of Ferrocement” ACI Structural Journal, May. June, pp 325-351.