Volume-4 Issue-6

  • Version
  • Download 139
  • File Size 4.00 KB
  • Create Date September 1, 2017
  • Download

 Download Abstract Book

S. No

Volume-4 Issue-6, August 2015, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Nanditha Nandanavanam

Paper Title:

An Imprint of IC 555 Timer in the Contemporary World

Abstract:    The paper deals with the basic principle of IC 555 Timer, its working and its application in the present world. 555 Timer is part and parcel of almost every electronics project. It is versatile IC whose applications range from simply making a light blink on and off to pulse-width modulation. From the time of its invention, a myriad of several novel and unique circuits have been developed and presented in several trade, professional, and hobby publications.

   Monostable mode, Astable mode, Oscillator, Speed Detector, Hygrometer, Invertor, Patents.


1.        Gupta V., "Speed control of brushed DC motor for lowcost electric cars",Proceedings of IEEE International Conference on Electric Vehicle Conference(IEVC), 4-8 March 2012.
2.        www.circuitstoday.com/555-timer-ramp-generator.

3.        Monika Jain, Praveen Kumar, Priya Singh, Chhavi Narayan Arora, and Ankita Sharma, "Detection of over speeding vehicles on highways", International Journalof Computer Science and Mobile Computing, ISSN 2320-088X, Vol. 4, Issue. 4,pp.613 - 619, April 2015.

4.        DebangshuDey and SugataMunshi, "Simulation studies of a new intelligent scheme for relative humidity and temperature measurement using thermistors in 555 timer circuit", International Journal on Smart sensing and Intelligent systems Vol.3, No.2, June 2010.

5.        http://www.google.com/patents/US6629776.

6.        http://www.google.com/patents/US6037872.

7.        http://www.google.com/patents/US20060001406.

8.        http://www.ti.com, SNAS548D -JANUARY 2015

9.        http://www.sentex.ca/mec1995/gadgets/555/555.html

10.     ZeeshanShahid, Sheroz Khan, AHM ZahirulAlam and MusseMuhamod Ahmed," LM555 Timer-Based Inverter Low Power Pure Sinusoidal AC Output", World Applied Sciences Journal 30, 141-143, 2014 ISSN 1818-4952 © IDOSI Publications.

11.     S.K. Sanyal, U.C. Sarker and R.Nandi, " A Novel Microprocessor-Controlled Active-R Multifunction Network: Design of Programmable Filter, Oscillator, and FSK/PSK Wave Generator", IEEE Transactions on Circuits and Systems, Vol. 37, No.9, 1990.





Monir M. Kamal, Mohamed A. A. Saafan, Noha M. Soliman, Sumaya A. T. M. Helal

Paper Title:

Behavior and Strength of Reinforced Recycled-Aggregate Concrete Beams

Abstract:   In recent years, the world was increasingly attacked by the environmental pollution caused by the wastes out of quarries, building materials industry and construction demolishing besides; the conservation of natural materials resources has become of a top priority in all production sectors. The construction industry faced this challenge and has pioneered the development of new techniques for the reuse of the waste materials that it generates. However, these problems could be partially solved by using these wastes after recycling as coarse aggregate in concrete manufacture. This research was conducted to investigate the behavior and strength of reinforced recycled aggregate concrete beams cast with construction demolition wastes as coarse aggregates under flexural load. The effect of using recycled aggregate (RA) as total or partial replacement of natural aggregate on the behavior of this beams was studied. The main variables of this research were the type of the recycled aggregates (RA) and the percentage of the replacing the dolomite aggregate by recycled aggregates. Among these wastes were ceramics, marble, cement bricks, red bricks and lightweight bricks. Ten beams were cast and tested with dimensions (10×15×120cm). The reinforced recycled aggregate concrete (RRC) beams were divided into two groups according to the percentage of the replacement of the natural aggregate (NA) by recycled aggregates. The performance of the beams was investigated in terms of the initial crack load, ultimate flexural load, load-deflection response, energy absorption capacity, ductility index, load-strain response and cracking patterns. Out of this research wide applications could be achieved in concrete industry in structural applications with special precautions and protection regulations.

  Demolition Wastes, Recycle, Recycle Concrete, Recycle Aggregates, Recycled Concrete and Reinforced Concrete Beam.


1.       Chen HJ et al (2003), "Use of building rubbles as recycled aggregates", Cement Concrete Research; 33(1):125–132.
2.       Katz A. (2003), "Properties of concrete made with recycled aggregate from partially hydrated old concrete", Cement Concrete Research; 33(5):703–711.

3.       Khalaf FM. and Devenny AS. (2004), "Recycling of demolished masonry rubble as coarse aggregate in concrete", Review. J Mater Civil Eng.; 16(4):331–340.

4.       Olorunsogo FT, and Padayachee N. (2002), "Performance of recycled aggregate concrete monitored by durability indexes", Cement Concrete Research; 32(2):179–185.

5.       Rao A, Jha KN, et al. (2007), "Use of aggregates from recycled construction and demolition waste in concrete" Resources, Conservation and Recycling; 50(1):71–81.

6.       Tu T-Y, Chen Y-Y, Hwang C-L . (2006), "Properties of HPC with recycled aggregates", Cement Concrete Research; 36:943–950.

7.       M. Martin-Morales, M. Zamorano, A. Ruiz-Moyano, I. Valverde-Espinosa, (2011), "Characterization of recycled aggregates construction and demolition waste for concrete production following the Spanish Structural Concrete Code EHE-08" Construction and Building Materials, Vol. 25, PP. 742–748  

8.       I. Fatma El-Zahraa; 2009 “Structural Behavior of Reinforced Concrete Beams with Recycled Concrete Aggregate”. M.Sc. Thesis, Faculty of engineering, Cairo University.

9.       Tangchirapat W, Buranasing R, Jaturapitakkul C, Chindaprasirt P. (2008) "Influence of rice husk–bark ash on mechanical properties of concrete containing high amount of recycled aggregates". Construction and Building Materials 2008;22(8):1812–1819.

10.     K.Jankovic (2002), "Using recycled brick as concrete aggregate", in: Proceedings of Fifth Triennial, International Conference on Challenges in Concrete Construction, Dundee,UK, ,pp.231–240. 

11.     F.M. Khalaf (2006), "Using crushed clay brick as aggregate in concrete", Journal of Materials in Civil Engineering 18(4) 518–526.

12.     F. Debieb and S. Kenai (2008), "The use of coarse and fine crushed bricks as aggregate in concrete", Construction and Building Materials 22(5) 518–526.

13.     Mohamed R. Afify and Noha M. Soliman" Improvement Properties of Recycle Concrete using Clay Brick as a Coarse Aggregate" International Journal of Current Engineering and Technology, Vol.4, No.1 (February 2014), PP.(119-127).

14.     J.DeBritto, A.S.Pereira and J.R.Correia (2005), "Mechanical behavior of non-structural concrete made with recycled ceramic aggregates", Cement and Concrete Composites 27(4) 429–433.

15.     J.R.Correia, J.DeBritto and A.S.Pereira(2006), "Effects on concrete durability of using recycled ceramic aggregates ", Materials and Structures 39(2) 169–177.

16.     Yeong-Nain Sheen, Her-Yung Wang, Yi-Ping Juang and Duc-Hien Le (2013), "Assessment on the engineering properties of ready-mixed concrete using recycled aggregates", Construction and Building Materials 45 298–305.

17.     Monir M. Kamal, Mohamed A.A. Safan, Noha M. Soliman and Sumaya A. T. M. Omer, "Production and Properties of Concrete Cast with Construction Demolition Wastes" 1st International Conference on Innovative Building Materials, HBRC., Cairo, Dec. 28-30, 2014

18.     Noha M. Soliman,(December 2013),  " Effect of using Marble Powder in Concrete Mixes on the Behavior and Strength of R.C. Slabs" International Journal of Current Engineering and Technology, Vol.3, No.5 PP.(1863-1870)

19.     Alaa Gamal El Shrief,. Hatem Hamdy Gith, Esraa Emam Ali & Nahla Ali Mohamed Fahmy "  Structural Behavior of Reinforced Concrete Beams Containing Recycled Industrial Waste" 1st International Conference on Innovative Building Materials, Dec. 28-30, 2014

20.     F. Lopez Gayarre, C. Lopez-Colina, M.A. Serrano, A. Lopez-Martinez, (2013), " Manufacture of concrete kerbs and floor blocks with recycled aggregate from C&DW" Construction and Building Materials 40 1193–1199
21.     Egyptian Standard Specifications (E.S.S. 4756 1/2009), 2009, "Egyptian Standard Specification for Ordinary Portland Cement", Egypt.
22.     Egyptian Standard Specifications (E.S.S. 1109/2008), 2008,"Egyptian Standard Specification for Aggregates", Egypt.

23.     ASTM C 33, 2003, "American Society for Testing and Materials: Aggregates", Philadelphia, USA.

24.     ASTM C 494-03, 2003, "American Society for Testing and Materials: Chemical Admixtures", Philadelphia, USA.

25.     Egyptian Standard Specifications (E.S.S. 262/2002), 2002, “ Steel Bars for Concrete Reinforcement", Egypt

26.     E.C.P. 203/2007, 2007, "Egyptian Code of Practice: Design and Construction for Reinforced Concrete Structures", Research Centre for Houses Building and Physical Planning, Cairo, Egypt.  

27.     ACI Committee 363. (2007) “State-of-the-Art Report on high strength concrete (ACI 363R-07)". American Concrete Institute. Detroit.





Munipally Prathibha, M. Satyanarayana Gupta, Simhachalam Naidu

Paper Title:

CFD Analysis on a Different Advanced Rocket Nozzles

Abstract:   The reduction of Earth-to-orbit launch costs in conjunction with an increase in launcher reliability and operational Efficiency is the key demands on future space transportation systems, like single-stage-to-orbit vehicles (SSTO). The realization of these vehicles strongly depends on the performance of the engines, which should deliver high performance with low system complexity. Performance data for rocket engines are practically always lower than the theoretically attainable values because of imperfections in the mixing, combustion, and expansion of the propellants. The main part of the project addresses different nozzle concepts with improvements in performance as compared to conventional nozzles achieved by Different Mach numbers, thus, by minimizing losses caused by over- or under expansion. The design of different nozzle shapes and flow simulation is done in gambit and fluent software’s respectively for various parameters

   launcher reliability, future space transportation systems, theoretically attainable, mixing, combustion, and expansion.


1.       Elements of propulsion – Mattingly
2.       Rocket propulsion elements – Sutton

3.       www.wikipedia.com/propelling_nozzle

4.       www.wikipedia.com/fluid_mechanics

5.       www.aerospaceweb.org





Avinasha P. S, Krishnamurthy K. N, Akash Deep B. N

Paper Title:

Performance and Emission Analysis of Mahua Biodiesel Blends with Diesel Oil using Single Cylinder Diesel Engine

Abstract:    Now a day’s world facing fuel problems because of increasing automobiles, power plants and factories, Increasing of this automobiles, power plants produce the more emissions like CO, HC and NOx. So we need alternative source, in this direction lot of work is going on to find out a suitable alternative to the diesel oil. Biodiesel is one of the main solutions to the global energy crisis. In this present work studied the performances and emission characteristics of Mahua Bio-diesel. The blends of Mahua methyl ester and Diesel in the proportion B10, B25, B50, B75and B100 were prepared analyzed and their performance and emissions characteristics compared with performance and emission characteristics of diesel. In engine performance and Emission test obtained the thermal efficiency, Mechanical efficiency, fuel consumption and indicated thermal efficiency for different blends and also obtain the emissions like CO, HC, NOx and CO2.   The results are compared with pure diesel.

   Mahua oil, Mahua bio-diesel, Diesel oil, Engine performance and engine emissions.


1.        MK Ghosal, DK Das, SC Pardhan and N Sahoo(2008),“performance study of diesel engine by using Mahua methyl ester and its blends with diesel fuel”. 
2.        A. S. Ramdhas, S. jayaraj, C. Muraleedharan, (2004). Use of vegetables oils as IC engine fuels-A review, Renewable Energy, 

3.        Kalbande S. R., More G.R. and Nadre R.G. 2008. Biodiesel production from Non-edible oil from Jatropha and Karanja for utilization in Electrical Generator. Bio-

4.        Shashikant Vilas Ghadge and Hifjur Raheman, (2005), “Biodiesel production from Mahua (Madhuca indica) oil having 

5.        Gvidonas Labeckas, Stasys Slavinskas. “Effect of rapeseed oil methyl ester on 

6.        K. Suresh Kumar, R Velraj, R.Ganesan performance and exhaust emission 

7.        Magin Lapuerta, Octavio Armas, Jose Rodri guez-Fernandez. Effect of biodiesel fuels on diesel engine emissions. 

8.        H. An, W.M. Yang, S.K. Chou, K.J. Chua





Appese S. D, S. B. Prakash, Krishnamurthy K. N

Paper Title:

The Performance and Emission Analysis of Neem Oil Blends with Diesel Fueled in CI Engine

Abstract:    In the present paper, the performances and emission of Neem Bio-diesel are tested. The freely available resources can be used. The blends of Neem methyl ester and Diesel were prepared analyzed and their performance compared with performance of diesel oil. The engine performance intended variables are thermal efficiency, Mechanical efficiency, fuel consumption have been obtaining from different blends and results are compared with pure diesel. In this paper, the emission characteristics of Neem oil have been tested. The blends of varying proportions of Neem oil are B10, B20, B40, B60, B80, B100 with Diesel were prepared analyzed and their emission compared with emission of diesel fuel. The basic engine emissions are CO, CO2, HC, and NOx have been obtained from different blends and results are compared with pure diesel. The goal of this study is to verify the affiliation between engine performances and emission by means of diesel.

   Neem oil, Neem bio-diesel, Diesel oil, Emission


1.        Kandu Kalpatti Chinnaraj Velappan, Less NOx biodiesel: CI engine studies fuelled with rice bran oil biodiesel and its five blends, Journal of scientific and Industrial Research, 66, 2001, 60-71.
2.        A. Siva Kumar, D. Maheswar and K. Vijay Kumar Reddy (2009), comparison of Diesel engine performance and          Emissions from Neat and Transesterified Cotton Seed oil, Jordan Journal of Mechanical and Industrial Engineering. 3(3),        pp.190-197.

3.        Ramesh, D., A. Samapathrajan, and P.Venkatachalam, 2006 “Production of Biodiesel from Jatropha curcas oil by using pilot Biodiesel plant”. The Jatropha Journal 18-19: 1-6.18.

4.        Parametric studies for improving the performance of a jatropha oil-fuelled compression ignition engine by j.                Narayana Reddy, A. Ramesh_, Internal Combustion Engines Laboratory, Mechanical Engineering Department,              Indian Institute of technology Madras, Chennai-600036, India

5.        Allen CAW, Watts K, Ackman RG, Pegg MJ (1999) Predicting the viscosity of biodiesel fuels from their fatty acid composition. Fuel 78:1319-1326.

6.        Srivastava, A., Prasad, R. (2000). Triglycerides based diesel fuel. Renewable sustainable energy reviews, 4(2), 111-133.





Subodha Jalote, R. K. Pandey, C. B. Gupta, C. S. Mishra, Vikas Shrivastav

Paper Title:

Application of Vastu in Construction

Abstract:   Vastu science is applicable to solve the building problems with planetary position and ten directions. Different planets have different directions and have specific effect on the building and persons. Vastu deals the equilibrium balance between the structures.Vastu concept can be applied in construction engineering. It is not only a religious symbol but a scientific solution also. For simple understanding it is applied and related to religion in the  from of temple, forts, town planning astrology and old civilization. The architecture of India is rooted in its history, culture and religion. Indian architecture progressed with time and assimilated the many influences that came as a result of India's global discourse with other regions of the world throughout its millennia-old past. The architectural methods practiced in India are a result of examination and implementation of its established building traditions and outside cultural interactions.Though old, this Eastern tradition has also incorporated modern values as India became a modern nation state. The economic reforms of 1991 further bolstered the urban architecture of India as the country became more integrated with the world's economy. Traditional Vastu Shastra remains influential in India's architecture during the contemporary era. Effort has been made to discuss how to incorporate vastu law in present constructions.

   Vastu, Astrology, Civilization, Green Building, Radiations, Materials, Architecture.


1.       Bharat Gandhi, Unnaty Vastu Consultants(1996) ,the university of Michigan ,20 may 2009 Vastu shashtra and 21st century.
2.       Chandra, Pramod (2008), South Asian arts, Encyclopædia Britannica.

3.       Coomaraswamy, Ananda K. (1914). Viśvakarmā ; examples of Indian architecture, sculpture, painting, handicraft. London.

4.       Evenson, Norma (1989). The Indian Metropolis. New Haven and London: Yale University press. ISBN 0-300-04333-3.

5.       Fletcher, Banister; Cruickshank, Dan, Sir Banister Fletcher's a History of Architecture, Architectural Press, 20th edition, 1996 (first published 1896). ISBN 0-7506-2267-9. Cf. Part Four, Chapter 26.

6.       Foekema, Gerard (1996), A Complete Guide to Hoysaḷa Temples, Abhinav Publications, ISBN 81-7017-345-0.

7.       Gast, Klaus-Peter (2007), Modern Traditions: Contemporary Architecture in India, Birkhäuser, and ISBN 978-3-7643-7754-0.

8.       Havell, E.B. (1913). Indian Architecture, its psychology, structure, and history from the first Muhammadan invasion to the present day. J. Murray, London.





Manjare Chandraprabha A, Shirbahadurkar Suresh D, Patil Prerna R

Paper Title:

Generating Expressive Degree of Emotion in Neutral Speech

Abstract:    This paper proposes a statistical phrase/accent model for speech synthesis. In recent years, the work on expressive speech has increased rather than basic emotions. Our aim is to obtain expressive speech from neutral speech. In this proposed method there are two components one is phrase and other is accent. Expectation-Maximization algorithm is used to train statistical speech data. The output generated by proposed method is compared with TD-PSOLA method. The results generated from proposed work is better than TD-PSOLA method.

   Intonation Modeling, Accent/Phrase, Statistical parametric Speech Synthesis, TD-PSOLA.


1.       Welsey Mattheyses ,Werner Verhelst and Piet Verhoeve, ”Robust pitch marking for prosodic modification of speech using TD-PSOLA”.
2.       Andrej Ljolje ,Frank Fallside,”Synthesis of natural sounding pitch contours in isolated utterances using HMM”, 1986.

3.       Hansjorg Mixdorff, “A novel approach to the full automatic extraction of Fujisaki model parameters”, 2000.

4.       J.A.Louw and E.Barnard,” Automatic intonation modelling with INTSINT”, 2001.

5.       Dimitrios Rentzos, Saeed Vaseghi, Emir Turajlic , Qin Yan, Ching-Hsiang, “Transformation of speaker characteristics for voice conversion”, 2003.

6.       Cedric Boidin,Olivier Boeffard, “Modeling Intonation Variability with HMM for Speech Synthesis”, 2004 .

7.       Jing Zhu, Yibiao Yu, ”Intonation and prosody conversion for expressive Mandarin speech synthesis”, 2012.

8.       Gopala Krishna Anumanchipalliyz Lu´ıs C. Oliveiraz Alan W Blacky,”Heuft Accent group modeling for improved prosody in statistical parametric speech synthesis”, 2013.

9.       Jinfu Ni, Shinsuke Sakai, Tohru Shimizu, and Satoshi Nakamura,” Prosody modeling from  tone to intonation in Chinese using the fundamental F0 model”, 2008.

10.     Jinfu Ni, Yoshinori Shiga, and Chiori Hori,”Superpositional HMM-based intonation synthesis using a fundamental F0 model”, 2014.





Suparna Sreedhar A, Suma Sekhar, Sakuntala S. Pillai

Paper Title:

Improved Preamble Structure for Timing Synchronization in MIMO-OFDM Systems

Abstract:  In Multiple Input Multiple Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM systems, symbol timing synchronization is important inorder to find an estimate of where the symbol starts. In this paper, an efficient preamble structure is proposed for improving the timing synchronization in MIMO-OFDM systems. The proposed short preamble consists of four sub symbols having equal duration. The first and third sub symbols are Constant Amplitude Zero Autocorrelation (CAZAC) sequences while second and fourth are CAZAC sequences weighted by Pseudorandom Noise (PN) sequences. Simulation results show that the proposed preamble structure could provide sharper correlation peak when compared to the conventional Schmidl’s and Minn’s methods in both AWGN and Rayleigh channels. Also the Correct Detection Rate (CDR) of the proposed method is better than the conventional methods at high SNR values. Hence a better timing synchronization can be achieved.

   CAZAC, Correct Detection Rate, MIMO, OFDM, Timing Synchronization.


1.       T.M. Schmidl, D. Cox, “Robust frequency and timing synchronization in OFDM,” IEEE Trans. on Comm., vol. 45, pp. 1613-1621, Dec. 1997.
2.       H. Minn, M. Zeng, and V. K. Bhargava, “On timing offset estimation for OFDM systems,” IEEE Comm. Letters, vol. 4, no. 7, pp. 242-244, July 2000.

3.       Sicong Liu, Fang Yang, Jian Song, Fei Ren, and Jia Li,“OFDM Preamble Design for Synchronization Under Narrowband Interference” 2013 IEEE 17th International Symposium on Power Line Communications and Its Applications.

4.       Leila Nasraoui, Leila Najjar Atallah, Mohamed Siala, “An Efficient Reduced-Complexity Two-Stage Differential Sliding Correlation Approach for OFDM Synchronization in the Multipath Channel”, IEEE Wireless Communications and Networking Conference,2012

5.       Eric M. Silva C., Fredric J. Harris,  G. Jovanovic Dolecek, “Synchronization Algorithms based on Weighted CAZAC Preambles for OFDM Systems”, International Symposium on Communications and Information Technologies (ISCIT),2013

6.       Marey, M.; Steendam, H., "Analysis of the Narrowband Interference Effect on OFDM Timing Synchronization," Signal Processing, IEEE Transactions on , vol.55, no.9, pp.4558,4566, Sept. 2007

7.       B. P. Crow, I. Widjaja, L. G.Kim, and P. T. Sakai, “IEEE 802.11 wireless local area networks,” IEEE Commun. Mag., vol. 35, no. 9, pp. 116-126, Sept. 1997.

8.       C. Eklund, R. B. Marks, K. L. Stanwood, and S. Wang, “IEEE standard 802.16: a technical overview of the wirelessMAN air interface for broadband wireless access,” IEEE Commun. Mag., vol. 40, no. 6, pp. 98-107, Jun. 2002.

9.       R. Frank, S. Zadoff, and R. Heimiller, “Phase shift pulse codes with good periodic correlation properties (corresp.),” Information Theory, IRE Transactions on, vol. 8, no. 6, pp. 381 –382, october 1962.





Divya Dileep, Naveen S

Paper Title:

Differential Video Encoder Design Using Cascaded DWT and DCT

Abstract:    Digital video technology has a wide variety of applications due to its several advantages over its analog counterpart. The use of digital video has been limited by its higher bit rate requirement. In this paper a novel technique for compression of video is proposed. This technique uses difference frames and Discrete Wavelet Transform and Discrete Cosine Transform. Wavelet transform provides approximations at different levels which require very less memory for storage compared to the original data. Cosine Transform represents approximation of signal with fewer coefficients. The algorithm has been implemented using Haar wavelet, Daubechies wavelet and biorthogonal wavelet and the performance in each case is evaluated using parameters such as Mean Square Error and Peak Signal to Noise Ratio.

   Biorthogonal, Daubechies, difference frame, Discrete Cosine Transform, Haar, video compression,  Wavelet transform  


1.       An overview of mpeg family and its applications, S.Vetrivel, M.Gowri, M.Sumaiya Sultana, DrG.Athisha, Indian Journal of Computer Science and Engineering,Vol. 1 No. 4 240-250, December 2010.
2.       Overview of the H.264/AVC Video Coding Standard Thomas Wiegand, Gary J. Sullivan, GisleBjøntegaard, and Ajay Luthra, IEEE Transactions On Circuits And Systems For Video Technology, Vol. 13, No. 7, July 2003.

3.       K. Rao and J. Hwang, Techniques and Standards for Image, Video, and Audio Coding, Prentice Hall, Upper Saddle River, NJ, 1996.

4.       A. Wang, Z. Xiong, P.A. Chou, and S. Mehrotra, “Three-dimensional wavelet coding of video with global motion compensation”, Proc. DCC '99, Snowbird, Utah, March 1999.

5.       B. Pesquet-Popescu and V. Bottreau, “Three-dimensional lifting schemes for motion compensated video compression,” Proc. ICASSP’01, Salt Lake City, UT, May 2001.

6.       P Schelkens, A Munteanu, J Barbariend, M Galca, X Giro-Nieto, J Cornelis,Wavelet coding of volumetric medical datasets. IEEE. Trans. Med. Imaging.22(3), 441–458 (2003).

7.       D. Taubman and A. Zakhor, “Multirate 3-D subband coding of video,” IEEE Trans. Image Processing, vol. 3, pp. 572–588, Sept. 1994.

8.       Y. K. Kim, R. C. Kim, and S. U. Lee, “On the adaptive 3D subbandvideo coding,” in Proc. SPIE, vol. 2727, pp. 1302–1312, Mar. 1993.

9.       C. Podilchuk, N. Jayant, and N. Farvardin, “Three-dimensional subband coding of video,”IEEE Trans. on Image Processing, vol. 4, pp. 125-139, February 1995.

10.     Y Chen, WA Pearlman, in Visual Communications and Image Processing,vol. 2727. Three-dimensional subband coding of video using thezero-tree method (SPIE, Bellingham, 1996), pp. 1302–1309.

11.     B J Kim, Z Xiong, WA Pearlman, Low bit-rate scalable video coding with 3Dset partitioning in hierarchical trees (3D SPIHT). IEEE Trans. Circuits Syst.Video Tech. 10, 1374–1387 (2000).

12.     L Ye, T Karp, B Nutter, S Mitra, J Guo, in Signals, Systems and Computers,2006. ACSSC ’06. Fortieth Asilomar Conference on. Three-dimensionalsubband coding of video with 3-D BCWT (IEEE, NY, 2006), pp. 401–405.

13.     Fast and Memory Efficient 3D-DWT Based Video Encoding Techniques, V. R. Satpute, Ch. Naveen, K. D. Kulat and A. G. Keskar, Proceedings of the International MultiConference of Engineers and Computer Scientists 2014 Vol I, IMECS 2014, March 12 - 14, 2014, Hong Kong.

14.     A Combined DWT-DCT approach to perform Video compression base of Frame Redundancy, Jasmeetkaur, Ms.Rohini Sharma, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 9, September 2012.

15.     Multicore-based 3D-DWT video encoderVicenteGaliano, Otoniel Lopez-Granado, Manuel P Malumbres and Hector Migallon, EURASIP Journal on Advances in Signal Processing 2013.





V. Tapasvi, M. Satyanarayana Gupta, T. Kumaraswamy

Paper Title:

Designing and Simulating Compressible Flow in a Nozzle

Abstract:   Compressible flow is the branch of fluid mechanics that deals with flows having significant changes in fluid density. Gases, but not liquids, display such behavior. To distinguish between compressible and incompressible flow in gases, the Mach number must be greater than about 0.3 before significant compressibility occurs. A nozzle is a device designed to control the direction or characteristics of a fluid flow (especially to increase velocity) as it exits (or enters) an enclosed chamber or pipe. Now we are designing a nozzle by using agambit design software and then converting that into a ansys software for analysis .In that analysis we are giving boundary conditions and inlet and outlet. This analysis totally on c-d nozzle. By using supersonic steam

  fluid mechanics, density, incompressible flow, Mach number, compressibility, fluid flow.


1.        P Manna, D Chakraborty “Numerical Simulation of Transverse H2 Combustion in Supersonic Airstream in a Constant Area Duct”, Vol. 86, November 2005, computational combustion Dynamics Division of Defense Research and Development Laboratory, Hyderabad. 
2.        B.E. Milton and K. Pianthong, “Pulsed, supersonic fuel jets—A review of their characteristics and potential for fuel injection”, International Journal of Heat and Fluid Flow 26 (2005) 656–671, Australia.

3.        Shigeru Aso, ArifNur Hakim, Shingo Miyamoto, Kei Inoue and Yasuhiro Tani “ Fundamental study of supersonic combustion in pure air flow with use of shock tunnel” Department of Aeronautics and Astronautics, Kyushu University, Japan , ActaAstronautica 57 (2005) 384 – 389.

4.        Chadwick C. Rasmussen, Sulabh K. Dhanuka, and James F. Driscoll, “Visualization of flame holding mechanisms in a supersonic combustor using PLIF”, Proceedings of the Combustion Institute 31 (2007) 2505–2512, USA.

5.        P.K. Tretyakov “the problems of combustion at supersonic flow” west-east high speed flow field conference 19-22, November 2007 Moscow, Russia.

6.        Zheng Chen, Xiao Qin, YiguangJu *, Zhenwei Zhao, Marcos Chaos, Frederick L. Dryer, “High temperature ignition and combustion enhancement by dimethyl ether addition to methane–air mixtures”, Proceedings of the Combustion Institute 31 (2007) 1215–1222, USA.

7.        DoyoungByun and SeungWookBaek, “Numerical investigation of combustion with non-gray thermal radiation and soot formation effect in a liquid rocket engine”, International Journal of Heat and Mass Transfer 50 (2007) 412–422, Korea.

8.        Wookyung Kim, Hyungrok Do, M. Godfrey Mungal and Mark A. Cappelli, “Optimal discharge placement in plasma-assisted combustion of a methane jet in cross flow”, Combustion and Flame 153 (2008) 603–615, USA.

9.        Peter Gerlinger, Peter Stoll 1, Markus Kindler , Fernando Schneider c, Manfred Aigner “Numerical investigation of mixing and combustion enhancement in supersonic combustors by strut induced streamwisevorticity”, Aerospace Science and Technology 12 (2008) 159–168, Germany

10.     K. Kumaran, V. Babu “Investigation of the effect of chemistry models on the numerical predictions of the supersonic combustion of hydrogen”, Department of Mechanical Engineering, Indian Institute of Technology, Madras, India, Combustion and Flame 156 (2009) 826–841.

11.     Kenji Miki, Joey Schulz, Suresh Menon “Large-eddy simulation of equilibrium plasma-assisted combustion in supersonic flow”, Proceedings of the Combustion Institute 32 (2009) 2413–2420, Atlanta, GA 30332-0150, USA.

12.     J.X. Wen*, B.P. Xu and V.H.Y. Tam, “Numerical study on spontaneous ignition of pressurized hydrogen release through a length of tube”, Combustion and Flame 2009, UK.





Raju Tayade, Harishchandra Gadekar, Suchita Kadam, Sandesh Bhingardeve

Paper Title:

Engine Analyser Software Version 6.0.0 MPFI Engine by Using Fuel Catalyst for Improving Its Performance

Abstract:   As everyone is aware, the price of fuel keeps on fluctuating from time to time, therefore, oil conservation and saving on fuel is everybody’s concern. We all know that extensive use of petroleum products has left our environment highly polluted, leading to various health hazards, ozone layer depletion and global warming. Therefore, it has become inevitable to have some solution at our disposal so as to conserve fuel, reduce pollution and save our environment. One way to conserve fuel, reduce pollution and save our environment is the use of fuel catalyst. Fuel catalyst is a mixture of compounds which helps in efficient burning of fuel. We have carried out a test on MPFI engine with plain petrol and mixture of plain petrol and fuel catalyst. Work also reports evaluation of thermal performance of plain petrol with 0.38% and 0.79% by mass of fuel catalyst and compared with that of plain petrol. Also fuel properties relevant to the fuel were determined for the various concentrations of fuel catalyst, in a mixture of plain petrol and fuel catalyst and also for plain petrol. In this paper it is shown that higher concentration of fuel catalyst in plain petrol leads to effective combustion of supplied fuel which results in lower air fuel ratio for same speed. There is improvement in the thermal performance of engine due to blending of fuel catalyst with plain petrol. Also effect of fuel catalyst on the environment is noted by the measurement of exhaust emission of plain petrol and mixture of plain petrol & fuel catalyst.

   Work also reports evaluation of thermal performance of plain petrol with 0.38% and 0.79% by mass of fuel catalyst and compared with that of plain petrol.


1.       T. Maxwell, V. Setty, J. Jones and R. Narayan, “The effect of  on the performance and emissions of Internal Combustion Engines”, Society of Automotive Engineers, 1993, Paper No.932804.
2.       P. Anderson and L. Eriksson , “Air-to-Cylinder Observer on a Turbocharged SI-Engine with waste gate”, Society of Automotive Engineers, 2001,Vol-01,262

3.       S.V.Saravanan , Investigation of pollution monitoring and its control for the Indian petrol light duty vehicles applications to meet emission regulations”,
International Journal of Enviromedia, vol.4, 2006 pp.821-826.

4.       P.Govindasamy and S.Dhandapani , “An Experimental Investigation on the effect of Magnetic flux to reduce emissions and improve combustion performance in a four- stroke catalytic coated MPFI ENGINE”, KSAE International Journal of Automotive Technology, 2007, Vol-8, 2006079.





Lini T Koshy, Rini Jones S.B

Paper Title:

A Model Based Maximum Power Point Tracking for PV Panels using Genetic Algorithm

Abstract:    This paper presents a genetic algorithm (GA) based technique in Model Based (MB) maximum power point tracking (MPPT) controller for photo voltaic (PV) system. Maximum power point tracking is the main solution to reduce the power loss in the photo voltaic system when temperature and solar irradiance variation occurs. The PV system has an operating point that can supply maximum power to the load. The point that gathers the power called the maximum-power point (MPP). A model-based MPPT offers a better dynamic performance, because it is relatively easy to obtain an accurate model of a single PV panel, thus predicting the maximum power point voltage for given environmental conditions. Experiments reveal that the existing MB MPPT gives improved tracking error but minimum power extraction. To overcome this disadvantage an optimization algorithm called Genetic Algorithm based MB MPPT is presented. The proposed GA based MB MPPT can reduce the tracking error as well as maximum power is extracted as compared to the existing MB MPPT.

   Energy efficiency, Genetic Algorithm (GA), Modeling, Maximum Power Point Tracking (MPPT), Parameter estimation, Photo Voltaic (PV) system.


1.       Loredana Cristaldi and Marco Rossi “An Improved    Model-Based Maximum Power Point Tracker for Photovoltaic Panels”Ieee Trans. Instrumentation and Measurement, Vol. 63, no. 1, January2014.
2.       S. C. T. a. A. C.Larbes, "Genetic algorithms optimized fuzzy logic control for the maximum power point tracking in photovoltaic system," Algeria, 2009. 

3.       Joseph A Jervase, Hadj Bourdoucen and Ali Al- Lawati “Solar cell parameter extraction using genetic algorithms” Published 9 October 2001.

4.       S.Mallika, R.Saravanakumar “Genetics Algorithm Based MPPT Controller for Photo Voltaic System” International Electrical Engineering Journal (IEEJ) Vol. 4 (2013) No. 4, pp. 1159-1164.

5.       J K Maaherchandani,Chitranjan Agarwal,Mukesh Sahi “Estimation of Solar Cell Model Parameter by Hybrid Genetic Algorithm Using MATLAB” International Journal of Advanced Research in Computer Engineering &Technology(IJARCET)Vol .1,Issue 6,August 2012.





Shilpa S. Nair, Naveen S., Moni R.S

Paper Title:

3D Face Recognition Using Weiner Filter and DFT Based On Optimized Directional Faces

Abstract:   Traditional 2D face recognition methods based on intensity or color images, face challenges in dealing with pose variations or illumination changes. The face recognition based on combination of 3D shape information and 2D intensity/color information is a novel approach, which provides an opportunity to improve the face recognition performance. This paper proposes an efficient multimodal face recognition method by combining the textural as well as depth features, extracted from directional faces of input image. To overcome problems occurred due to low quality image, pre-processing is done before extracting features from the image. The directional faces captured using Local Polynomial Approximation (LPA) filters are adaptively optimized. The modified LBP (mLBP) is used for the feature extraction from these directional faces. The spectral transformation of the concatenated block histogram of mLBP feature image acts as the robust face descriptor. Discrete Fourier Transform (DFT) is used as the transformation tool. The fusion of both modalities is performed at score level. The experimental results shows that the proposed method gives better performance than single modality.

   DFT, MLBP, multimodal, ODF, Weiner filter.


1.       R. Mehta n, Jirui Yuan,Karen Egiazarian ―,Face recognition using scale-adaptive directional and textural features‖, Pattern Recognition 47(2014) 1846–1858 
2.       Mathew Turk and Alex Pent land, ―Eigen faces for Recognition‖, Journal of Cognitive Neuroscience Volume 3, Number 1(1991). 

3.       P.N. Belhumeur, J.P. Hespanha, D.J.Kriegman, ―Eigen faces vs. Fisher faces : recognition using class specific linear projection ‖ IEEE Trans. Pattern Anal. Mach. Intell.(1997)

4.       C.Podilchuk, X.Zhang, ―Face recognition using DCT based feature vectors‖, IEEE International Conference on Acoustics, Speech, and Signal Processing ICASSP 96, vol.4, 1996 . 

5.       Chiraz BenAbdelkadera, Paul A. Griffin, Comparing and combining depth and texture cues for face recognition, Image and Vision Computing, Elsevier, (2005) pp.339-352 

6.       Rinky B, Payal Mondal, K Manikantan,, S Ramachandran , ―DWT based feature extraction using edge tracked scale normalization for enhanced face recognition ‖, Procedia Technology 6 ( 2012 ) 344 – 353 

7.       Antonio Rama, Francesc Tarres, P2CA: A New Face Recognition Scheme Combining 2D And 3D Information, IEEE Transactions, Image Processing, Vol.3 (2005)

8.       http://www.frav.es/databases/FRAV3D 

9.       V.Katkovnik, Multiresolution local polynomial regression : a new approach to pointwise spatial adaptation, Digital Signal Process.(2005)73–116. 

10.     Katkovnik., K. Egiazarian, J.Astola, ―Adaptivewindow size image de-noising based on intersection of confidence intervals(ICI)rule‖, J.Math. Imaging Vision (2002)223–235 

11.     P.Liang, S.Li,J.Qin ,Multi resolution local binary patternsfor image classification, in: Proceedings of the Conference on Wavelet Analysis and PatternRecognition,2010,pp.164–169. 

12.     Naveen S. and Dr. R.S Moni, ―Multimodal Approach for face recognition using 3D-2D face feature fusion‖, International Journal of Image Processing Vol.8, No.3 (2014) 

13.     P. S. Hiremath and Manjunatha Hiremath, ―3D Face Recognition Based on Depth and Intensity Gabor Features using Symbolic PCAand AdaBoost‖, International Journal of Signal Processing Vol.6, No.5 (2013)





Sreeja P, Hariharan S

Paper Title:

A Technique for the Detection of Cystic Focal Liver Lesions from Abdominal Images

Abstract:  Computer aided detection of cystic focal liver lesions (FLL) from Computed Tomography (CT), Magnetic Resonance (MR) or ultra sound (US) abdominal images is a challenging task in pattern recognition and image processing. Region of interest (ROI) is taken from unenhanced/enhanced images from different imaging modalities. A simple and novel algorithm is applied in MATLAB platform and the lesions are clearly identified and highlighted. The proposed algorithm is based on template matching, but it overcomes certain difficulties incurred while applying to biomedical images. The new algorithm progresses in a semiautomatic fashion and can be modified to a fully automatic system for the detection of liver lesions. The algorithm was evaluated on different CT, MR and US abdominal images. The results demonstrate the efficiency of the proposed technique for reliable detection of liver lesions from different imaging modalities.

   Imaging modalities, template matching, cystic focal liver lesions and correlation.


1.        Yongbum Lee, Takeshi Hara, Hiroshi Fujita, Shigeki Itoh and Takeo Ishigaki, “Automated detection of pulmonary Nodules in Helical CT images based on an improved template matching Technique” IEEE Transaction on medical Imaging, Vol  20, No.7.July 2001
2.        L. Ding, A Goshtasby,& M. Satter,“Volume Image Registration by template matching”, Elsevier, Image and vision computing, ,821-83219,2001

3.        Sarvaiya J N, Patnaik S and Bombaywala S, “Image Registration by Template Matching Using Normalized Cross-Correlation”, IEEE international conference on Advances in Computing, Control and Telecommunication Engineering, 2009

4.        Lena Costaridou, “Medical Image Analysis Methods” CRC, Taylor and Francis , Taylor and Francis group,2005

5.        Satoshi Kondo, Konica Minolta “Liver Ultrasound Tracking Using Long-term and Short-term Template Matching”, Proc. MICCAI workshop: Challenge on Liver Ultrasound Tracking, 2014

6.        Kinda Anna  Saddi, Mika ̈el Rousson, Christophe Chefd’ hotel, and Farida Cheriet, “Global-to-Local Shape Matching for Liver Segmentation in CT

7.        B.B. Gosnik, S.K. Lemon, W.Scheible, and G.R. Leupold “Accuracy of ultrasonography in diagnosis of hepatocellular disease”, AJR, vol.133, pp. 19-23, 1979.

8.        R.Suganya, S.Rajaram “Classification of Liver Diseases from Ultra sound Images Using a Hybrid Kohonen SOM and LPND Speckle Reduction Method”, IEEE international conf.on signal proc. Comp. and cont., Waknaghat Solan India, pp 1-6, , 2012

9.        Karen M Harton MD, David A Bluemke  MD, Ralphe H Hruben MD, Philippe Soyar MD, PhD Elliote K Fishman MD ,“CT and MR Imaging of benign hepatic and biliary tumors”,vol. 19 Issue 2, March,1999

10.     Atom P Dhawan, “Medical Image Analysis” IEEE Press series in Biomedical Engineering, second edition, 2011

11.     R. M. Pickett: ‘The perception of visual texture. J. of Experimental Psychology.” 68: 13,1964.

12.     A.H. Mir, M. Hanmandlu, S.N. Tandon, “Texture Analysis of CT Images” IEEE Engineering In Medicine And Biology, IEEE 14 (6), 781-786, , Nov Dcec 1995

13.     Roger M. Dufour, Eric L. Miller, Member, IEEE, and Nikolas P. Galatsanos, Senior Member, IEEE, “Template Matching Based Object Recognition With Unknown Geometric Parameters”, IEEE Transactions on Image Processing, vol. 11, no. 12, December 2002

14.     Chin-Sheng Chen, Jian-Jhe Huang, Chien-Liang Huang, “Template Matching using Statistical Model and Parametric Template for Multi-Template ” Journal of Signal and Information Processing, ,4, 52-57, 2013

15.     https://en.wikipedia.org/wiki/Template_matching

16.     Mikhail J. Atallah “Faster Image Template Matching in the Sum of the Absolute Value of Differences Measure” IEEE Transactions on Image Processing, vol. 10, no. 4, April 2001

17.     T.Mahalakshmi, R.Muthaiah and P.Swaminathan School of Computing, SASTRA University, “Review Article, An Overview of Template Matching Technique in Image Processing”, Research Journal of Applied Sciences, Engineering and Technology 4(24): 5469-5473, 2012

18.     Konstantinos G. Derpanis, “Relationship Between the Sum of Squared Difference (SSD) and Cross Correlation for Template Matching”, December 23, 2005

19.     Sarvaiya, J.N.Patnaik, S.; Bombaywala, S. “Image Registration by Template Matching Using Normalized Cross-Correlation”, Advances in Computing, Control, & Telecommunication Technologies, ACT '09. International Conference IEEE, 2009.

20.     D. M. Tsai ,C.T. Lin ,“Fast normalized cross correlation for defect detection”, Pattern Recognition Letters 24, 2625–2631, 2003

21.     www.mathworks.com 

22.     R C Gonzalez,R E Woods, “Digital Image processing”, Prentice Hall 2002

23.     R C Gonzalez,R E Woods, “Digital Image processing using MATLAB”, Prentice Hall 2002





Haider A Abdulkarim, Ibrahim F Alshammari

Paper Title:

Comparison of Algorithms for Solving Traveling Salesman Problem

Abstract:    Travel Salesman Problem is one of the most known optimization problems. While an optimal solution cannot be reached, non-optimal solutions approach optimality and keep running time fast. In this paper, the most used algorithms to solve this problem are comparedin terms of route length, elapsed time and number of iterations. The TSP is simulated using different scenarios examples and the convergence is checked for each case.

   TSP, Nearest Neighbor, Genetic Algorithm.


1.        M. M. Flood, "The Traveling Salesman Problem," Opns. Res., 1956.
2.        C. Nilsson., Tew? k, "Heuristics for the Traveling Salesman Problem," Linkoping University, pp. 473-480, June 1996.

3.        D. Johnson, L. McGeoch, The Traveling Salesman Problem: A Case Study in Local Optimization.

4.        B. Kim, J. Shim, M. Zhang, Comparison of TSP Algorithms, December, 1998.


6.        Corman H. Thomas, Leiserson E. Charles, Rivest L. Ronald, Stein Clifford, "Introduction to Algorithms," Second Edition McGrawHill Book Company.

7.        Del Castillo M. Jose, "A heuristic for the traveling salesman problem based on a continuous approximation," Transportation Research Part B33 (1999) 123-152 .

8.        Valenzuela I. Christine, Jones J. Antonia, "Estimating the Held-Karp lower bound for the geometric TSP ," European Journal of Operational Research 102(1997) 157-175.

9.        Cesari Giovanni, "Divide and Conquer Strategies for Parallel TSP Heuristics," Computers Operations Research , Vol.23, No.7, pp 681-694, 1996 .

10.     Joseph Kirk, MATLAB implementation of nearest neighbor and genetic algorithm for TSP.





Saleh Abd El-Aleem Mohamed, Wafaa Mohamed Morsi

Paper Title:

Performance of Nano–Modified Cement Pastes and Mortars in Caron's Lake Water

Abstract:    Nanomaterials (NMs) are gaining widespread attention to be used in construction sector so as to exhibit enhanced performance in terms of smart functions and sustainable features.  The understanding of complex structure of cement based materials at nano-level will definitely result in a new generation of stronger and more durable concrete; with high range of newly introduced properties. This work aims to study the effect of nano-silica (NS) on hydration characteristics, mechanical, microstructure and durability of OPC-slag-NS cement pastes and mortars subjected to Caron's Lake water. The hydration characteristics were followed by estimation of setting times, chemically combined water, free lime, total chloride and sulphate contents, as well as bulk density, compressive and flexural strengths. The hydration process and durability of cement pastes were monitored using SEM and XRD. The results of these investigations indicate that, NS improves the compressive and flexural strengths of cement specimens subjected to Caron's Lake water up to 12 months. The accumulation of additional hydration products within the pore system enhances the densification of cement paste matrix to form closed structure with narrow pores. NS decrease the accessibility of SO42- and Cl- to penetration into the pore system to form ettringite and chloroaluminate hydrate, hence the total sulfate and total chloride contents decrease with NS content. Mortars containing 4 mass, % NS possess higher values of compressive and flexural strengths than those of the other mortars containing NS. Partial inhibition of chloroaluminate formation and the fine closed microstructure of composite cement containing NS caused an increase of compressive and flexural strengths.

   Slag, Nano-silica, cements, Mechanical properties, Durability


1.        Heikal M, El. Didamony H, Moustafa MA. Hydration characteristics and physico-chemical and mechanical characteristics of ternary blended system. Si Ind 74, (5-6),155-161, (2009).
2.        Singh NB, Middendorf B. Chemistry of blended cements part-I: Natural pozzolanas, fly ashes and granulated blast furnace slags. Cem Inter 6 (4) (2008) 76–91.

3.        Singh NB, Middendorf B. Chemistry of blended cements part-II: Silica fume, metakaolin, reactive ashes from agricultural wastes, inert materials and non-Portland blended cements. Cem Inter 6 (2009) 78–93.

4.        Mukesh K, Singh SK, Singh NP, Singh NB. Hydration of multicomponent composite cement: OPC–FA–SF–MK. Constr Build Mater 36, (2012), 68–686.

5.        Shi C, Qian J. High performance cementing materials from industrial slags: A review Resour Conserv Recycl 29, (2000), 195–207.

6.        Nazari A, Riahi S. Splitting tensile strength of concrete using ground granulated blast furnace slag and SiO2 nano-particles as binders. Energy Build 43 (2011) 864–872.

7.        Li C, Sun H, Li L. A review: the comparison between alkali activated slag (Si+Ca) and metakaoline (Si+Al) cements. Cem Concr Res 40 (2010) 1341–1349.

8.        Chen W. Hydration of slag cement: theory, modeling and application. PhD Thesis, University of Twenty; 2007.

9.        Siddique R. Waste Materials and By-Products in Concrete, Springer-Verlag. Berlin (Heidelberg), 2008.

10.     Sanchez F, Sobolev K. Nanotechnology in concrete – a review. Constr Build Mater 24 (2010), 2060–2071.

11.     Said AM, Zeidan MS, Bassuoni MT, Tian Y. Properties of concrete incorporating nano-silica. Constr Build Mater 36 (2012) 838–844.

12.     Skinner LB, Chae SR, Benmore CJ, Wenk HR, Monteiro PJM. Nanostructure of Calcium Silicate Hydrates in Cements. Physical Review Letters (PRL) 104, 195502 (2010) 1-4.

13.     Constantinides G, Ulm F. The nano-granular nature of       C-S-H. J Mech Phys Solids 2007; 55:64–90.
14.     Nili M, Ehsani A, Shabani K. Influence of nano-SiO2 and micro-silica on concrete performance. In: Proceedings second international conference on sustainable construction materials and technologies, June 28–30, Universita Politecnica delle Marche, Ancona, Italy; (2010).
15.     Singh LP, Karade SR, Bhattacharyya SK, Yousuf MM, Ahalawat S. Beneficial role of nano-silica in cement based materials-A review. Constr Build Mater 47 (2013), 1069-1077.

16.     Heikal M, Abd El-Aleem S, Morsi WM. Characteristics of blended cements containing nano-silica. HBRC Journal (9) (2013), 243–255.

17.     Bjornstrom J, Martinelli A, Matic A, Borjesson L, Panas I. Accelerating effects of colloidal nano-silica for beneficial calcium–silicate–hydrate formation in cement. Chem Phys Lett 392 (2004),   242–8.

18.     Ji T. Preliminary study on the water permeability and microstructure of concrete incorporating nano-SiO2. Cem Concr Res 35 (2005),  1943–7.

19.     Gaitero JJ, Campillo I, Guerrero A. Reduction of the calcium leaching rate of cement paste by addition of silica nanoparticles. Cem. Concr. Res. 2008; 38: 1112–8.

20.     Belkowitz JS, Armentrout D. An investigation of nano-silica in the cement hydration process. In: Proceeding (2010) concrete sustainability conference, national ready mixed concrete association, USA; (2010), 1–15.

21.     Nazari A, Riahi S. The effects of SiO2 nanoparticles on physical and mechanical properties of high strength compacting concrete. Compos Part B Eng 42 (2011) 570–578.

22.     Sobolev K, Flores I, Hermosillo R. Nanomaterials and nanotechnology for high performance cement composites. In: Proceedings of ACI session on nanotechnology of concrete: recent developments and future perspectives, November 7, Denver, USA; (2006), 91–118.

23.     Wee TH, Suryavanshi AK, Wong SF, Rahman AK. Sulfate resistance of concrete containing mineral admixtures. ACI Material Journal 2000, 97, (5) 536–549.

24.     Abd El.Aziz M, Abd El.Aleem S, Heikal M, El. Didamony H. Hydration and durability of sulphate-resisting and slag cement blends in Caron’s Lake water. Cem Concr Res 35 (2005), 1592–1600.

25.     Ghosh SN, Sarkar SL, Harsh S. Progress in cement and concrete, mineral admixtures in cement and concrete. in: M. Moukwa (Ed.), Durability of Silica Fume Concrete, vol. 4, ABI Books, New Delhi, 1993, 467–493.

26.     Amin AM, Ali AH, El-Didamony H. Durability of some Portland cement pastes in various chloride solutions. Zem-Kalk-Gips 50 (3) (1997) 172–177.

27.     Abd-El-Eziz MA,  Heikal M. Hydration characteristics and durability of cements containing fly ash and limestone subjected to Qaron’s Lake Water. Adv Cem Res 21(3); (2009), 91-99.

28.     Quercia G, Spiesz P,  Hüsken G, Brouwers HJH. SCC modification by use of amorphous nano-silica. Cem Concr Compos 45, (2014), 69–81.

29.     Quercia G, Brouwers HJH. Application of nano-silica (nS) in concrete mixtures. In: Gregor Fisher, Mette Geiker, Ole Hededal, Lisbeth Ottosen, Henrik Stang, editors. 8th fib International Ph.D. symposium in civil engineering, June 20–23, Lyngby, Denmark;  2010, 431–6.

30.     Collepardi M, Ogoumah JJ, Skarp U, Troli R. Influence of amorphous colloidal silica on the properties of self-compacting concretes. In: Proceedings of the international conference challenges in concrete construction-innovations and developments in concrete materials and construction, 9-11 September, Dundee, Scotland, UK; 2002, 473–83.

31.     Maghsoudi AA, Arabpour-Dahooei F. Effect of nanoscale materials in engineering properties of performance self-compacting concrete. In: Proceeding of the 7th international congress on civil engineering, Iran; 2007, 1–11.

32.     Khanzadi M, Tadayon M, Sepehri H, Sepehri M. Influence of nano- silica particles on mechanical properties and permeability of concrete. In: Proceedings second international conference on sustainable construction materials and technologies, June 28–30, Universita Ploitecnica delle Marche, Ancona, Italy; 2010, 1–7.

33.     Baomin W, Lijiu W, Lai FC. Freezing resistance of HPC with nano-SiO2.  J  Wuhan Univ Technol, Mater Sci 23 (1) (2008), 85–8.

34.     Wei X, Zhang P. Sensitivity analysis for durability of high performance concrete containing nanoparticles based on grey relational grade. Mod Appl Sci 5(4) (2011), 68–73.

35.     ASTM Designation: C191, Standard method for normal consistency and setting of hydraulic cement, ASTM Annual Book of ASTM Standards, (2008).

36.     Abd-El.Aziz MA, Abd.El.Aleem S, Heikal M. Physico-chemical and mechanical characteristics of pozzolanic cement pastes and mortars hydrated at different curing temperatures. Constr Build Mater 26; (2012), 310–316.

37.     El-Didamony H, Heikal M, Abd. El. Aleem S. Influence of delayed addition time of sodium sulfanilate phenol formaldehyde condensate on the hydration characteristics of sulfate resisting cement pastes containing silica fume. Constr Build Mater 37; (2012), 269–276.

38.     ASTM C109, Strength test method for compressive strength of hydraulic cement mortars, (2007).

39.     Heikal M, Aiad I, Helmy IM. Portland cement clinker, granulated slag and by-pass cement dust composites. Cem Concr Res 32, (2002)1809-1812.

40.     Qing Y, Zenan Z, Deyu K, Rongshen C. Influence of nano-SiO2 addition on properties of hardened cement paste as compared with silica fume. Constr Build Mater 2007; 21:539–45.

41.     Land G, Stephan D. The influence of nano-silica on the hydration of ordinary Portland cement. J. Mater. Sci. 47 (2012), 1011–1017.

42.     Jalal M, Mansouri E, Sharifipour M, Pouladkhan AR. Mechanical, rheological, durability and microstructural properties of high performance self-compacting concrete containing SiO2 micro and nanoparticles. Mater Des, 2012;34:389–400. 

43.     Lotenbach B, Scrivener K, Hooton RD. Supplementary cementitious materials. Cem Concr Res 2001;41:1244–56.

44.     Bonen D, Cohen MD. Magnesium sulphate on Portland cement paste: II. Chemical and mineralogical analysis. Cem Concr Res 22, (1992) 707-718.

45.     Ali AH, El-Didamony H, Mostafa KA.  Sea water attack on sulfate resisting cement containing granulated slag and silica fume. Silicates Industrials; Ceramic Science and Technology. 1997, 62, (11–12), 199–203.

46.     Mondal P, Shah SP, Marks LD, Gaitero JJ. Comparative study of the effects of microsilica and nanosilica  in concrete. Transportation Research Record: Journal of the Transportation Research Board, No. 2141. Washington, DC: Transportation Research Board of the National Academies; 2010, 6–9.

47.     Luo R, Cai Y, Wang C, Huang X. Study of chloride binding and diffusion in GGBS concrete. Cem Concr Res, 33 (2003) 1-7.

48.     Lea FM, the Chemistry of Cement Concrete, China Construction Industry Publishing House, Beijing, 1980, 256– 290.

49.     Glasser FP, Marchand J, Samson E. Durability of concrete – degradation phenomena involving detrimental chemical reactions. Cem Concr Res 2008; 38:226–46.

50.     Goñi S, Lorenzo MP, Sagrera JL. Durability of hydrated Portland cement with copper slag addition in NaCl + Na2SO4 medium. Cem Concr Res 1994; 24(8):1403–12.





Bloomi Rachal Saji, Kanjana G

Paper Title:

A Novel Method for Iris Recognition Using Fusion of Wavelets and DFT

Abstract:    A robust approach for iris recognition using wavelet based feature extraction and decision level fusion is proposed. In this method, circular Hough transform is used for iris segmentation and Daugman’s rubber sheet model for normalization. For feature extraction, a combination of Haar wavelet decomposition and spectral transformation of 1D log Gabor wavelet transform is used. Discrete Fourier transform (DFT) is used as spectral transformation tool. The spectral transformation reduces the redundancy of the feature vectors, which adds the recognition rate.  Euclidean distance classifier is used for classification and decision level fusion is employed. The experimental results shows that the proposed method gives better performance. CASIA database is used for evaluation.

   Iris recognition, Haar wavelet, 1D log gabor wavelet, Euclidean distance, decision level fusion.


1.       J. Daugman, “High confidence visual recognition of persons by a test of statistical independence”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 15. No. 11, pp. 1148-1161 November 1993.
2.       R. Wildes, “Iris recognition: An emerging biometric technology”, Proceedings of IEEE, vol. 85, pp. 1348-1363, 1997.

3.       Dong-Mei Wu and J-N Wang, “An improved iris recognition method based on grey surface matching”, International conference on information assurance and security, vol. 1, pp. 247-249, 2009.

4.       Ali, Salami and Wahyudi, “Iris recognition system using support vector machine”, International Conference on Computer and Communication Engineering, pp. 516-521, 2008.

5.       R. Szewczyk, K. Grabowski, M. Napieralska, W. Sankowski, M. Zubert, and A. Napieralski, “A reliable iris recognition algorithm based on reverse biorthogonal wavelet transform”, Pattern Recognition Letters 33, pp. 1019–1026, 2012.

6.       Himanshu. R and Anamika Y, “Iris recognition using combined support vector machine and Hamming distance approach”, International Journal on Expert systems with Applications, vol. 41, pp. 588-593, 2014.

7.       K. Jyothi and  C.J Prabhakar, “Multi modal face recognition using block based curvelet features”, International Journal of Computer Graphics and Animation, vol. 4, no. 2, April 2014.

8.       L. Masek, “Recognition of human iris patterns for biometric identification”, 2003

9.       CASIA iris image database. http://biometrics.idealtest.org





Resmi H. B, Deepambika V. A, M. Abdul Rahman

Paper Title:

Lifting Based DWT for Object Tracking Using Variance Method

Abstract:    Fast and accurate object tracking is very important for real time applications like video surveillance, traffic monitoring etc. In most of the conventional object tracking methods environmental changes, memory requirement and computation speed are the major constraints. This paper proposes an efficient object tracking method to compensate for all these challenges. Here a Lifting based Discrete Wavelet Transform (LDWT) has been used in order to compensate for fake motions and low memory requirement. Lifting based 9/7 Discrete Wavelet Transform is proposed to reduce the computational cost and preserve fine object boundaries. For fast object tracking variance method is adopted where maximum nonzero pixel value is considered. The experimental results show that the proposed method yields better result on the basis of computational time, memory requirement, speed of operation and environmental changes than the conventional DWT based approach.

   Object detection, Object Tracking, DWT, LDWT, Frame Differencing, Variance Method.


1.       Ya Liu, Haizhou Ai, and Guang-you Xu. “Moving object detection and 
2.       Tracking based on background substraction”.In Multispectral Image Processing and pattern recongnition, pages 62-66.International Society for Optics and Photonics,2001

3.       Muyun Weng Guoce Huang,Xinyu Da, “A New Interframe Difference Algorithm for Moving Target Detection,”3rd International Congress on Image and Signal Processing(CSIP 2010),2010.

4.       Sepehr Aslani, Homayoun Mahdavi-Nasab World Academy of Science,Engineering and Technology International Journal of Electrical, Computer,Electronics and Communication Engineering Vol:7, No:9, 2013

5.       Sugandi, B.; Kim, H.; Tan, J. K. & Ishikawa, S. (2007). Tracking of moving objects by using a low resolution image, International Conference  on Innovative Computing, Information and Control, (September 2007) pp. 408-408.

6.       Cl´audio Rosito Jung. Efficient background subtraction and shadow removal for monochromatic video sequences.Multimedia,IEEE Transactions on, 11(3):571–577, 2009.

7.       Xiaoshi Zheng, Yanling Zhao, Na li, and Huimin Wu, “An Automatic Moving Object Detection Algorithm for Video Surveillance Applications,”International Conference on Embedded Software and Systems, 2009

8.       Arnab Roy, Sanket Shinde, and Kyoung-Don Kang, An Approach for Efficient Real Time Moving Object Detection 

9.       Vishal R. Satpute, Kishor D. Kulat, and Avinash G. Keskar, “A novel approach based on variance for local feature analysis of Facial images,” IEEE-RAICS International Conference on Recent Advances in Intelligent Computational Systems (RAICS), 2011, pp – 210-215

10.     Vishal R. Satpute, Kishor D. Kulat, and Avinash G. Keskar, “Variance Method for Finding Local Feature Points on Facial images,”International Conference on Signal, Image and Video Processing (ICSIVP) 2012, IITPatna, 2012, pp – 148 -153.

11.     For video database: http://groups.inf.ed.ac.uk/vision/ CAVIAR/ CAVIARDATA1/

12.     For video database: http://www.eecs.qmul.ac.uk/~avss2007_d.html

13.     Varshney, H.; Hasan, M. & Jain, S. (2007). Energy efficient novel architecture for the lifting based discrete wavelet transform, IET Image Process, vol. 1, no. 3, (September 2007),pp.305-310.





Sarika S, Deepambika V. A, M. Abdul Rahman

Paper Title:

An Efficient Relative Gradient Based Radiometric Invariant Stereomatching Using Guided Filter

Abstract:   Stereomatching algorithms provide a better disparity map only when the stereo image pairs under consideration are under similar radiometric conditions, but under real world scenarios this condition may not hold. As a result of this corresponding pixels in the left and right image will be at different intensities and most of the state of the art stereomatching algorithm fails to provide a better disparity map. To overcome this issue this paper proposes a relative gradient based approach. Also inorder to have better edge preservation and faster result guided filter based cost aggregation is used. The result shows that the proposed method performs well under varying radiometric conditions where the conventional state of the art stereomatching algorithms fail.

   Stereomatching, Radiometric variations, Relative gradient, Guidedfilter


1.       Scharstein and R. Szeliski, “A taxonomy and evaluation of dense two-frame stereocorrespondence algorithm,” Int. J.Computer.Vision,vol.    47, pp. 7–42, Apr. 2002.
2.       Heiko Hirschmuller And Daniel Scharstein“Evaluation Of Stereo Matching Costs On Images With Radiometric Differences” IEEE    transactions on Pattern Analysis And Machine Intelligence August 2008

3.       Heo, Y.S., Lee, K.M., Lee, S.U.: ‘Robust stereo matching using adaptive normalized cross-correlation’, IEEE Trans. Pattern Anal. Mach. Intell.,2011, 33, (4), pp. 807–822

4.       Ll-lyong jung,Jae-young sim,Chang-Su Kim,Sang-Uk lee:”Robust stereomatching under radiometric variations based on cumulative distribution of gradient.

5.       Ramin Zabih and John Woodfill,”Non –parametric Local Transforms for Computing visual Correspondence”, proceedings of European conference on Computer Vision, May 1994,pages  151-158

6.       Veksler, O.: ‘Fast variable window for stereo correspondence using integral images’. IEEE Conf. Computer Vision and Pattern Recognition,   2003, pp. 556–561

7.       Kang, S.B., Szeliski, R., Chai, J.: ‘Handling occlusions in dense multi-view stereo’. IEEE Conf. Computer Vision and Pattern Recognition,   2001, pp. 103–110

8.       Yoon, K.-J., Kweon, I.S.: ‘Adaptive support-weight approach for correspondence search’, IEEE Trans. Pattern Anal. Mach. Intell.,2006, 28,  (4), pp. 650–656

9.       K. He, J. Sun, and X. Tang, “Guided image filtering,” in ECCV, 2010.

10.     C. Rhemann et al., “Fast Cost-Volume Filtering for Visual Correspondence and Beyond,” Proc. IEEE Int’l Conf. Computer Vision and Pattern Recognition, 2011, pp. 3017–3024.

11.     XiaozhouZhou and Boulanger.:”Radiometric invariant stereo matching based on Relative Gradient “imageprocessing (ICIP)2012 19th IEEE international

12.     Http://vision.middlebury.edu/stereo/





Rakesh R J, Jayasudha J S

Paper Title:

Dynamic Placement of Autonomic Internet Services

Abstract:    The placement of services available in an optimal manner determines the capability of a data network to efficiently support user’s service demands. The paper includes the optimal placement and the dynamic creation of the services. The algorithm described in the paper specifies the enhanced form of service demand concentrator on the basis of traffic aware centrality metric.  The accessing of the services is based on the evaluation of the access points as well as network bandwidth. Broadcast routing is also performed and message as well as file transfer is carried out between the nodes.  The storage of the services is also made possible in the cloud network developed in apache cloudstack. The solution applies to a broad range of networking scenarios in network storage and involvement of the end-user in the creation and distribution of lightweight service facilities.

   Service, Service Migration, Broadcast routing, CloudStack Storage.


1.        L V. Jacobson, D.K. Smetters, J.D. Thornton, M. Plass, N.H. Briggs, and R.L. Braynard, ‘‘Networking Named Content,’’  Proc. 5th ACM CoNEXT, Rome, Italy, Dec. 2009, pp. 1-12.
2.        A. Galis, S. Denazis, A. Bassi, P. Giacomin, A. Berl, A. Fischer, H. de Meer, J. Srassner, S. Davy, D. Macedo, G. Pujolle, J.R. Loyola, J. Serrat, L. Lefevre, and A. Cheniour, ‘‘Management Architecture and Systems for Future Internet Networks,’’  FIA Book: ‘‘Towards the Future InternetVA European Research Perspective,’’ Prague, May 2009,   pp. 112-122.

3.        E. Silva, L.F. Pires, and M. van Sinderen, ‘‘Supporting Dynamic Service Composition at Runtime Based on End-User Requirements,’’ Proc. 1st Int. Workshop User-Gener. Serv., Stockholm, Sweden, 2009, pp. 1-10.

4.        J.C. Yelmo, J.M. del A´ lamo, R. Trapero, and Y.-S. Martın, ‘‘A User-Centric Approach to Service Creation and Delivery over Next Generation Networks,’’ Comput. Commun., vol. 34, no. 2, pp. 209-222, Feb. 2011.

5.        V. Valancius, N. Laoutaris, L. Massoulie´, C. Diot, and P. Rodriguez, ‘‘Greening the Internet with Nano Data Centers,’’ in Proc. 5th ACM , Rome, Italy, 2009, pp. 37-48.

6.        D. Trossen, M. Sarela, and K. Sollins, ‘‘Arguments for an Information-Centric Internetworking Architecture,’’ SIGCOMM Comput. Commun. Rev., vol. 40, no. 2, pp. 26-33, Apr. 2010.

7.        P. Mirchandani and R. Francis, Discrete Location Theory. Hoboken, NJ: Wiley, 1990.

8.        R. Solis-Oba, Approximation Algorithms for the k-Median Problem, New York, NY, USA: Springer-Verlag, 2006, 3484.

9.        M.E.J. Newman, ‘‘The Structure and Function of Complex Networks,’’Society of International and Applied Mathematics  Review, vol. 45, no. 2, pp. 167-256, 2003.

10.     P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, ‘‘CentralityDriven Scalable  Service Migration,’’  Proc. 23rd  ITC, San Francisco, CA, USA, 2011, pp. 127-134.

11.     P. Pantazopoulos, I. Stavrakakis, A. Passarella, and M. Conti, ‘‘Efficient Social  Aware Content Placement for Opportunistic Networks,’’ in  IEEE , Kranjska Gora, Slovenia, Feb. 3-5, 2010, pp. 17-24.

12.     T. Kanungo, D.M. Mount, N.S. Netanyahu, C.D. Piatko, R. Silverman, and A.Y. Wu, ‘‘A Local Search Approximation Algorithm for k-Means Clustering,’’ Computational  Geometry  Theory Application, vol. 28, no. 2/3, pp. 89-112, June 2004.

13.     A.L. Barabasi and R. Albert, ‘‘Emergence of Scaling in Random Networks,’’ Science, vol. 286, no. 5439, pp. 509-512, Oct. 1999.

14.     T. Sproull and R. Chamberlain, ‘‘Distributed Algorithms for the Placement of   Network Services,’’ Proc. ICOMP, Las Vegas, NV, USA, July 2010, pp. 1-8.

15.     J.-J. Pansiot, P. Me´rindol, B. Donnet, and O. Bonaventure, ‘‘Extracting Intra-Domain Topology From mrinfo Probing,’’ in Proc. Passive and Active Measurement Conference, Apr. 2010, pp. 81-90.

16.     R.M. Karp and R.E. Tarjan, ‘‘Linear Expected-Time Algorithms for Connectivity Problems,’’ Proc. ACM , 1980, pp. 368-377.

17.     G. Smaragdakis, N. Laoutaris, K. Oikonomou, I. Stavrakakis, and A. Bestavros, ‘‘Distributed Server Migration for Scalable Internet Service Deployment,’’ IEEE/ACM Trans. Networks, doi: 10.1109/ TNET.2013.2270440,2013.

18.     K. Oikonomou and I. Stavrakakis, ‘‘Scalable Service Migration in Autonomic  Network Environments,’’ IEEE J. Sel. Areas Commun., vol. 28, no. 1, pp. 84-94, Jan. 2010.

19.     S. Martello and P. Toth, Knapsack Problems: Algorithms and Computer Implementations. New York, NY, USA: Wiley, 1990.

20.     T. Moscibroda and R. Wattenhofer, ‘‘Facility Location: Distributed Approximation,’’ Proc. ACM Principles of  Distributed Computing, 2005, pp. 108-117.

21.     K. Jain and V.V. Vazirani, ‘‘Approximation Algorithms for Metric Facility Location and k-Median Problems Using the Primal-Dual Schema and Lagrangian Relaxation,’’ ACM, vol. 48, no. 2, pp. 274-296, Mar. 2001.

22.     J. F. Gantz et al. IDC - The Expanding Digital Universe: A Forecast of Worldwide Information Growth through 2010. Technical report, March 2007. 

23.     Open Mobile Alliance, OMA Service Provider Environment Requirements, OMA-RD-OSPE-V1_0-20050614-C, Candidate version 1.0, Jun. 2005.

24.     Lefèvre, L., “Heavy and lightweight dynamic network services”- The 7th International Symposium on Autonomous Decentralized Systems, Chengdu,  Jiuzhaigou, China, April 05.

25.     Apache CloudStack Cloud Computing By Navin Sabharwal,Ravi Shankar, 2014.





A. N. Afandi

Paper Title:

The New Opportunity for Carrying Out a Dynamic Economic Dispatch using the Latest Evolutionary Computation Method

Abstract:    Practically, a power system is operated by combined various types of generating units for determining a committed power schedule to meet load demand changes at all period times of the operation in order to reach the most economical operation. The committed power schedule of generating units is obtained by allocating power outputs based on the given load demand at a certain period time for minimizing the total cost considered some constraints. The total cost changes of operation are expressed by dynamic economic dispatch (DED) problems with considering load demand changes for each period time of the operation. In this paper, the harvest season artificial bee colony (HSABC) algorithm is used to solve the DED problem for 24 hours of operating times using IEEE-30 bus system. Simulation results show that the best solution of the problem is obtained by HSABC within the shortest iteration step. The computations used load demand changes for all period times are quick and smooth with stable characteristics of convergences. The DED problem is solved using HSABC in different convergence speeds, power outputs and total operating costs for 24 hours.

   dispatch, dynamic, economic, HSABC, power.


1.       H. Chahkandi Nejad, 1R. Jahani, 1M. Mohammad Abadi, “GAPSO-based Economic Load Dispatch of Power System”, Australian Journal of Basic and Applied Sciences, 2011, pp. 606-611.
2.       M.A. Abido : “Multiobjective Evolutionary Algorithms for Electric Power Dispatch Problem”, IEEE Transactions on Evolutionary Computation, Vol. 10, 2006, pp. 315-329.

3.       Samir Sayah, Khaled Zehar. “Economic Load Dispatch with Security Constraints of the Algerian Power System using Successive Linear Programming Method”. Leonardo Journal of Science. July-December, 2006, pp.73-86.

4.       Yunzhi Cheng, Weiping Xiao, Wei-Jen Lee and Ming Yang, “A New Approach for Missions and Security Constrained Economic Dispatch”, Proc. NAPS, IEEE Conference Publication, 2009, pp. 1-5.

5.       M.A. Abido, “Environtment/Economic Power Dispatch using Multiobjective Evolutionary Algorithms”, IEEE Transactions on Power System, Vol. 18, 2003, pp. 1529-1539.

6.       Fahad S. Abu-Mouti, M. E. El-Hawary, “Optimal Distributed Generation Allocation and Sizing in Distribution System Via Artificial Bee Colony Algorithm”, IEEE Journal & Magazines, Vol. 26, 2011, pp. 2090-2101.

7.       A.A. El-Keib, H.Ma, and J.L. Hart, “Environmentally Constrained ED using the Lagrangian Relaxation Method”, IEEE transactions on Power Systems, Vol. 9, 1994, pp. 533-534.

8.       K. Sathish Kumar, V.Tamilselvan, N.Murali, R.Rajaram, N.Shanmuga Sundaram and T.Jayabarathi, “Economic load dispatch with emission constraints using various PSO algorithm,” WSEAS Transaction on Power System, vol. 9, Sept. 2008, pp. 598-607.

9.       R.Gopalakrishnan, A.Krishnan, “A novel combined economic and emission dispatch problem solving technique using non-dominated ranked genetic algorithm,” European Journal of Scientific Research, vol. 64, Nov. 2011, pp. 141-151.

10.     Yong Fu, Mohammad Shahidehpour, Zuyi Li, “AC Contingency Dispatch Based on Security Constrained Unit Commitment”, IEEE Transactions on Power Systems, Vol. 21, 2006, pp. 897-908.

11.     Yong Fu, Mohammad Shahidehpour, Zuyi Li, “Security constrained unit commitment with AC constraints,” IEEE Trans. Power Systems, vol. 20, Aug. 2005, pp. 1538-1550.

12.     Devendra Bisen, Hari Mohan Dubey, “Dynamic economic load dispatch with emission and loss using GAMS”, IJERT, vol.1, Issue 3, May 2012, pp.1-7.

13.     H. Shayeghi, A. Ghasemi, “Application of MOFSO for economic load dispatch solution with transmission losses”, IJTPE Journal, vol. 4, no. 1, March 2012, pp.27-34.

14.     S. Hemamalini, Sishaj P. Simon, “Dynamic economic dispatch using artificial bee colony algorithm for units with valve-point effect”, Euro. Trans. Electr. Power, vol.21, Feb. 2011, pp.70-81.

15.     M. Basu, “Artificial immune system for dynamic economic dispatch”, Int. Jour. Electr. Power Energy Syst., vol.33, no.1, 2011, pp.131-136.

16.     R.H. Liang, “A neural based redispatch approach to dynamic generation allocation”, IEEE Trans. Power Systems, vol.14, no.4, Nov. 1999, pp.1388-1393.

17.     X.S. Han, H.B. Gooi, D.S. Kirschen, “Dynamic economic dispatch: feasible and optimal solutions”, IEEE Trans. Power Syst., vol.16, no.1, Feb. 2001, pp.22-28.

18.     Z.L. Gaing, et al. “Constrained dynamic economic dispatch solution using particle swarm optimization”, IEEE Power Eng. Soc. Gen. Meet., vol.1, 2004, pp.153-158.

19.     Dervis Karaboga, “An Idea Based on Honey Bee Swarm for Numerical Optimization” Erciyes University, Turkey, Technical Report-TR06. 2005. 

20.     Efren Mezura Montes, Mauricio Damian Araoz, Omar Centina Dominges, “Smart Flight and Dynamic Tolerances in the Artificial Bee Colony for Constrained Optimization”, Proc. IEEE Congress on Evolutionary Computation CEC , 2010, pp. 1-8. 

21.     Milos Subotic, “Artificial Bee Colony Algorithm with Multiple Onlookers for Constrained optimization Problems”, Proc. ECC XI, European Computing Conference, 2011, pp. 242-652.

22.     X.T. Li, X.W. Zhao, J.N. Wang, M.H. Yin, “Improved Artificial Bee Colony for Design of a Reconfigurable Antenna Array with Discrete Phase Shifters”, Progress in Electromagnetics Research, Vol. 25, 2012, pp. 193-208.

23.     A.N. Afandi, Hajime Miyauchi, “Multiple Food Sources for Composing Harvest Season Artificial Bee Colony Algorithm on Economic Dispatch Problem”, In Proc. The 2013 Annual Meeting of the IEEJ, No. 6-008, 2013, pp. 11-12.

24.     Karaboga D, Basturk B, “A Powerful and Efficient Algorithm for Numerical Function Optimization: ABCAlgorithm,” in J. of Global Optimization, vol. 39, no. 0925-5001, Apr. 2007, pp. 459-471.





S. K. Senthil Kumar, P. Balasubramnie

Paper Title:

Healthcare-As-A-Services – Hospit One – A Cloud Based Healthcare System

Abstract:    Our objective of this proposed research is to improve the reliability of cloud services and availability of cloud resources to efficiently provide services to all patients belongs to the cloud based Healthcare system. With the existing paper and hand written for of patient2,3 records, there are some consequences such as lack of accessibility of historical health and medical details about patient, unnecessary loss of time and money for collecting and /or analysing of patient’s health details repeatedly and lack of access the patients’ details by other Healthcare institutions even with patient’s permission.  We propose a new bio-inspired dynamic cloud framework derived from Ruminant Digestive System from Ruminant Animals, called RDS Framework with a set of two algorithms. The first is a LPP-TP (Linear Programming Problem-Transportation Problem) based resource selection algorithm for efficiently identify and select the number of resources are actually available, second 3 Dimension Hybrid Modified Bin Packing with Task Grouping (3DHBPTG) scheduling algorithm for making the maximum utilization of cloud resources for making it highly available and improves reliable cloud Our framework guide and optimize the cloud process to improve the reliable cloud service and availability of cloud resources. With the above framework, we can achieve a cloud based, device independent, platform independent, Language independent, utility based collaborative healthcare system named as HospitOne.

   Healthcare System, Healthcare-as-a-service, HospitOne, Cloud Computing, Reliability, Availability of cloud.


1.       http://en.wikipedia.org/wiki/Health_care, definition of Healthcare, 16/06/2015.  
2.       Sanjay AP, Mani S, and Zambrano J, "A survey of the state of cloud computing in healthcare", Network and Communication Technologies 1, no. 2: p12, 2012.

3.       Oberdan RC, Koch FL, Westphall CB, Werner J, Fracalossi A, and Salvador GS. "A cloud computing solution for patient's data collection in health care institutions." In eHealth, Telemedicine, and Social Medicine, ETELEMED'10. Second International Conference on, pp. 95-99. IEEE, 2010.

4.       Yan H and Guohua Bai. "A systematic literature review of cloud computing in eHealth." arXiv preprint arXiv: 1412.2494, 2014.

5.       http://www.planningcommission.nic.in/reports/genrep/bkpap2020/26_bg2020.pdf, NIST cloud Definition, 2011, 11/05/2015.

6.       Rao H. Madhusudhana, MdRahmathulla, and B. Rambhupal Reddy. "Survey of adapting cloud computing in healthcare." International Journal of Advanced Research in Engineering and Applied Sciences 3.3: 11-20, 2014.

7.       Shyamala, K., and T. Sunitha Rani. "An Analysis on Efficient Resource Allocation Mechanisms in Cloud Computing." Indian Journal of Science and Technology 8, no. 9: 814-821, 2015.

8.       Uddin, Mueen, JamshedMemon, RaedAlsaqour, Asadullah Shah, and Mohd Zaidi Abdul Rozan. "Mobile Agent based Multi-layer Security Framework for Cloud Data Centers." Indian Journal of Science and Technology 8, no. 12 (2015)

9.       Mell P., &Grance, T. “The NIST definition of cloud computing”. NIST Special Publication, 145–800, 2011.

10.     Chatman, C., “How cloud computing is changing the face of health care information technology”, Journal of Health Care Compliance, 12(3), 37–70, 2010.

11.     Kuo, Alex Mu-Hsing. "Opportunities and challenges of cloud computing to improve health care services." Journal of medical Internet research 13, no. 3, 2011.

12.     LianJiunn-Woei, David C. Yen, and Yen-Ting Wang. "An exploratory study to understand the critical factors affecting the decision to adopt cloud computing in Taiwan hospital." International Journal of Information Management 34.1: 28-36, 2014.

13.     Kagadis George C., Christos Kloukinas, Kevin Moore, Jim Philbin, Panagiotis Papadimitroulas, Christos Alexakos, Paul G. Nagy, Dimitris Visvikis, and William R. Hendee. "Cloud computing in medical imaging." Medical physics 40, no. 7: 070901, 2013.

14.     Poulymenopoulou M., F. Malamateniou, D. Papakonstantinou, and G. Vassilacopoulos, "Cloud-based information support for emergency healthcare",23rd International Conference of the European Federation for Medical Informatics User Centred Networked Health Care - A. Moen et al. (Eds.) MIE 2011.

15.     Currie Wendy and Jonathan Seddon. "A Cross-Country Study of Cloud Computing Policy and Regulation in Healthcare." Twenty Second European Conference on Information Systems, Tel Aviv 2014.

16.     Nikhita RG, and Reddy G. J. "Study of Cloud Computing in HealthCare Industry." arXiv preprint arXiv: 1402.1841, 2014.

17.     Jui-chien H, and Hsu MW. "A cloud computing based 12-lead ECG telemedicine service." BMC medical informatics and decision making 12, no. 1: 77, 2012.

18.     Jordi V, Solsona F, Abella F, Filgueira R, and Rius J. "The cloud paradigm applied to e-Health." BMC medical informatics and decision making 13, no. 1: 35, 2013.

19.     BernauerJochen. "Towards the Automated Generation of Expert Profiles for Rare Diseases through Bibliometric Analysis." EHealth2014–Health Informatics Meets EHealth: Outcomes Research: The Benefit of Health-IT 198: 47, 2014.

20.     Wan Jiafu S. Ullah, C-F. Lai, Ming Zhou, and Xiaofei Wang. "Cloud-enabled wireless body area networks for pervasive healthcare." Network, IEEE 27, no. 5: 56-61, 2013.

21.     Sanjay AP., Mani S, and Zambrano J. "A survey of the state of cloud computing in healthcare." Network and Communication Technologies 1, no. 2: p12, 2012.

22.     Mu-Hsing K, Kushniruk A, and Elizabeth Borycki. "Can cloud computing benefit health services?-a SWOT analysis." Studies in health technology and informatics 169: 379-383, 2010.

23.     ZaslavskyArkady, CharithPerera, and DimitriosGeorgakopoulos. "Sensing as a service and big data." arXiv preprint arXiv:1301.0159 (2013).





Manoj Kr. Agrawal, Surender Kumar

Paper Title:

Change Management in a Lean Manufacturing Environment

Abstract:   Today change is normal. How the industry deals with the change can mean the difference between success & failure. The overall improvement depends upon the implementation of a prioritized change programme, with concentration of effort on change projects, a few at a time, and with frequent measurement of results to determine the extent to which success was being achieved. Managers and executives must be trained for the same. After giving a brief about the change trilogy, change cycle and stages of acceptance, the paper highlights a proven path an integrated approach that identifies an improvement cycle, in order to achieve maximum output after implementing a project for improvement. Before launching a new effort, it is important to evaluate what’s working well today, what is not and then to recommend what the correct actions are for improving the company/ professional practice. The concept and hazard of neutral zone which is time of great uncertainly and fear has also been explained briefly along with success ratio and dynamic stability.  A case study of change management has been discussed.

   Change, improvement, neutral zone, change trilogy, change cycle, proven path.


1.        Charles Standard and Dale Davis, Running Today’s Factory’ Hanser Gardner publications, Cincinnati, 1999. 
2.        W. J. Hopp and Spearman M.L, “Factory Physics: Foundation of Manufacturing Management, “Chicago, Irwin, 1996.

3.        W. Davis John, Fast Track to Waste Free Manufacturing, Productivity Press, Portland, USA, 1999.

4.        Michael J. Termini, “The New Manufacturing Engineer”, Society of Manufacturing Engineers, Dearborn, Michigan 48121, 1996. 

5.        Kumar Surender, Khan, B.K., “Computer Aided Manufacturing”, Satya Prakashan, New Delhi, 2011.





Girish H, Shashi Kumar D. R

Paper Title:

A Survey on the Performance Analysis of FinFET SRAM Cells for Different Technologies

Abstract:    This paper presents a survey on the performance analysis of FinFET SRAM Cells for different technologies. Industry requires high performance low power devices and memories. CMOS devices scaled down to reduce the size. As CMOS devices are scaled down the variation in the design metrics like SNM, Leakage power and delay increases. FinFET is an emerging technology in the VLSI design to overcome the drawbacks of CMOS. FinFET has become the most promising alternatives to conventional CMOS. In this paper, comparison of conventional CMOS, Independent-Gate (IG) and Tied Gate (TG) FinFET SRAM standard cells performance analysis is done with respect to leakage power, Static Noise Margin (SNM) and delay.

   FinFET, SRAM, SNM, Leakage Power, Delay.


1.        E. J. Nowak, I. Aller, T. Ludwig, K. Kim, R. V. Joshi, C. T., and R. Bernstein, K. and Puri. Turning silicon on its edge. Circuits and Devices Magazine, IEEE, 20(1):20–31, 2004. 8755-3996.
2.        Satish Kumar, Rajiv V. Joshi , C. T. Chuang, K. Kim, J. Y. Murthy,  “Leakage Analysis for FinFET Devices using Self- Consistent Electro-Thermal Modeling” , 1-4244
0757-5/07©2007 IEEE ICICDT07.

3.        Jin Ouyang, Yuanxie, “Power Optimization for FinFET-based Circuits Using Genetic Algorithms” 978-1-4244-2596-9/08 ©2008 IEEE.

4.        Sherif A. Tawfik, Zhiyu Liu, and Volkan Kursun, “Independent-Gate and Tied-Gate FinFET SRAM Circuits: Design Guidelines for Reduced Area and Enhanced Stability”, 978-1-4244-1847-3/07 IEEE ICM - December 2007.

5.        Z. Liu and V. Kursun, “High Read Stability and Low Leakage Cache Memory Cell,” Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 2774-2777, May 2007.

6.        V. Kursun, S. A. Tawfik, and Z. Liu, “Leakage-Aware Design of Nanometer SoC,” Proceedings of the IEEE International Symposium onCircuits and Systems, pp. 3231-3234, May 2007.

7.        B. Giraud et al., “A Comparative Study of 6T and 4T SRAM Cells in Double-Gate CMOS with Statistical Variation,” Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 3022-3025, May 2007.

8.        O. Thomas, M. Reyboz, and M. Belleville, “Sub-1V, Robust and Compact 6T SRAM cell in Double Gate MOS Technology,” Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 2778-2781, May 2007.

9.        E. Seevinck, F. J. List, and J. Lohstroh, “Static-Noise Margin Analysis of MOS SRAM Cells,” IEEE Journal of Solid-State Circuits, Vol. 22, No. 5, pp. 748-754, October 1987.

10.     Sherif A. Tawfik and Volkan Kursun, “Low Power and Stable FinFET SRAM with Static Independent Gate Bias for Enhanced Integration Density”, 1-4244-1378-8/07 ©2007 IEEE.

11.     VandnaSikarwar, Saurabh Khandelwal, Shyam Akashe,  “Optimization of Leakage Current in SRAM Cell UsingShorted Gate DG FinFET”, Third International Conference on Advanced Computing & Communication Technologies, 2012.

12.     Kaushik Roy, Saibal Mukhopadhyay, and Hamid Mahmoodi-Meimand, “Leakage Current Mechanisms and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits,” Proceedings of IEEE, vol.91, pp. 305-327, 2003.

13.     Shyam Akashe, Deepak Kumar Sinha and Sanjay Sharma, “Alow-leakage current power 45-nm CMOS SRAM,” Indian Journal of Science and Technology, Vol. 4, p-
4 April 2011.1704.

14.     Balwinder Raj, A.K. Saxena, and S. Dasgupta, “Nanoscale FinFET Based SRAM Cell Design: Analysis of Performance Metric, Process Variation, Underlapped FinFET and Temperature Effect,” IEEE journals magazine circuits and systems, vol.11, pp.38-50, 2011.

15.     Datta A., Goel A., Cakici R. T., Mahmoodi H., Lekshmanan D., and Roy k., “Modeling and Circuit Synthesis for Independently Controlled Double Gate FinFET Devices,”IEEE transactions on computer-aided design of integrated circuits and systems,vol.26,pp.1957-1966,2007.

16.     http://www.google.com/patents/US20070183185.

17.     Pragya Kushwaha and Amit Chaudhrya, “A Comparative Study of Single and Dual-Threshold Voltage SRAM Cells”, journal of telecommunications and information technology November 2011.

18.     Abhishek Agal, Pardeep, BalKrishan, “6T SRAM Cell: Design and Analysis” et al Int. Journal of Engineering Research and Applications ISSN: 2248-9622, Vol. 4, Issue 3(Version 1), March 2014, pp.574-577.

19.     “Lourts Deepak A and Likhitha Dhulipalla” “Performance comparison of CMOS and FINFET based SRAM for 22nm Technology” International Journal of Conceptions on Electronics and Communication Engineering Vol. 1, Issue. 1, Dec’ 2013; ISSN: 2357 – 2809.

20.     DongjinSeo and Filip Maksimovic, “Analysis of 6T FinFET SRAM Assist Techniques and Variability”, EE241 Final Report.

21.     SHRUTI OZA, “FinFET based SRAM Design for Low Power Applications” International Journal of Electrical, Electronics and Data Communication, ISSN: 2320-2084, Volume-2, Issue-3, and March-2014.

22.     D.Sathya1, N.Logeshwari2, M.Devisuriya3, “MODELING AND SIMULATION OF FinFET SRAM FOR NANOSCALE DEVICES”, The International Journal of Computer
Science & Applications (TIJCSA), Volume 2, No. 03, May 2013 ISSN – 2278-1080.

23.     C. Shin, M. H. Cho, Y. Tsukamoto, B.-Y. Nguyen, C. Mazuré, B. Nikolić, and T.-J. King Liu, “Performance and area benefits of FD-SOI technology for 6-T SRAM cells at the 22nm node,” IEEE Trans. Electron Devices, vol. 57, no. 6, pp. 1301-1309, Jun. 2010.

24.     D.Sathya, N.Logeshwari, M.Devisuriya, “MODELING AND SIMULATION OF FinFET SRAM FOR NANOSCALE DEVICES”, The International Journal of Computer Science & Applications (TIJCSA), Volume 2, No. 03, May 2013 ISSN – 2278-1080.

25.     SAURABH KHANDELWAL, DR BALWINDER RAJ , DR R D GUPTA, “Leakage Current And Dynamic Power Analysis Of Finfet Based 7t Sram At 45nm Technology”, The International Arab Conference on Information Technology (ACIT’2013).

26.     Gourav Arora , Poonam , Anurag Singh, “SNM Analysis of Sram Cells at 45nm, 32nm and 22nm Technology”, International Journal of Engineering Research and General Science Volume 2, Issue 4, June-July, 2014 ISSN 2091-2730.

27.     Loveneet Mishra,” Analysis of Conventional Sram 6t at Low Power and High Perfomamce 32nm Technologies “, Int. Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 4, Issue 4( Version 9), April 2014, pp.42-45.

28.     Young Bok Kim, Fabrizio Lombardi , “New SRAM Cell Design for Low Power and High Reliability using 32nm Independent Gate FinFET Technology”,http://www.ece.neu.edu/fac-ece/ybk/publication/NANO_MEMORY_NDCS.

29.     Alireza Shafaei, Yanzhi Wang, Xue Lin, and Massoud Pedram “FinCACTI: Architectural Analysis and Modeling of Caches with Deeply-scaled FinFET Devices”, 2014 IEEE Computer Society Annual Symposium on VLSI.

30.     Kaushik Roy, Jaydeep P. Kulkarni and Sumeet Kumar Gupta, “Device/Circuit Interactions at 22nm Technology Node”, DAC’09, July 26-31, 2009,

31.     X. Huang et al., IEDM Tech. Dig., p.67, 1999.
32.     W. Haensch et al., IBM J. Res. Dev., vol. 50, p. 339, 2006.





Sruthin R V, Jayasudha J S

Paper Title:

Protection Against Power Depletion Attack in WLAN

Abstract:    Power depletion attacks in internet are mainly affecting the Wireless LANs, since they are working on battery power which is the main resource of interest. The attack is performed by generating and routing unnecessarily packets in the network there by consuming the nodes battery power. The vulnerable packet movement in the network is identified using entropy estimation model which is different from the packet marking scheme. The vulnerable nodes in the network are identified by a packet routing scheme, which improves efficiency while using the entropy estimation model. The system is scanned for possible attack virus presence in the host node, which in turn spread the virus to the vulnerable nodes in the network. A novel hybrid method is proposed by combining three existing method which is used to protect the WLANs from power depletion attacks.

   Entropy value, bounce packet, vulnerable host.


1.       Anthony D. Wood and John A. Stankovic, ” Denial of service in sensor networks”,  IEE Computer Society, Computer, vol.  35, no. 10., pp. 54-62, Oct 2002.
2.       John Bellardo and Stefan Savage, “802.11 denial-of-service attacks: real vulnerabilities and practical solutions”, SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium, vol. 12, pp 2-2, Aug. 2003.

3.       Frank Stajano and Ross Anderson, “The resurrecting duckling: security issues for ad-hoc wireless networks”, International workshop on security protocols, vol. 7, pp. 172-182, April 1999.

4.       Haowen Chan and Adrian Perrig,” Security and privacy in sensor networks”, IEE Computer Society, Computer, vol. 36, no. 10. Oct 2003.

5.       Bryan Parno, Mark Luk, Evan Gaustad, and Adrian Perrig, “Secure sensor network routing: A clean-slate approach”, ACM CoNEXT conference, 2006.
6.       Sheetalkumar Doshi, Shweta Bhandare, and Timothy X. Brown, “An on demand minimum energy routing protocol for a wireless adhoc network”, ACM SIGMOBILE
Mobile Computing and Communications Review, vol. 6, no. 3, 2002.

7.       Jae-Hwan Chang and Leandros Tassiulas, Maximum lifetime routing in wireless sensor networks, IEEE/ACM Transactions on Networking, vol.12, no. 4, 2004.
8.       Wenke Lee and Dong Xiang, ” Information-theoretic measures for anomaly detection”,  In Proceedings of the IEEE Symposium on Security and Privacy , IEEE Computer Society, pp. 130. 2001.
9.       Staniford,  Hoagland and Mcalerney. “Practical automated detection of stealthy portscans”. Proceedings of the IDS Workshop of the 7th Computer and Communications Security Conference , 2000.

10.     Yu Gu, Andrew McCallum, Don Towsley. “Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation”.  Proceedings of the 5th ACM SIGCOMM conference on internet measurement, page 32-32, 2005.

11.     Sharon Goldberg, David Xiao, Eran Tromer, Boaz Barak and JenniferRexford,” Path-quality monitoring in the presence of adversaries”, Proceedings of the  ACM SIGMETRICS international conference on Measurement and modeling of computer systems, vol. 36, no. 1, pp. 193-204,  2008.

12.     Mina Guirguis, Azer Bestavros, Ibrahim Matta and Yuting Zhang, “Reduction of quality (RoQ) attacks on Internet end-systems”, Infocom’05: The IEEE International Conference on Computer Communication, vol. 2, pp. 1362-1372, 2005.

13.     Yu-Kwong Kwok, Rohit Tripathi, Yu Chen, and Kai Hwang, ‘HAWK: Halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks”, Networking and mobile computing, 2005.

14.     Mr.T.Bharath Manohar, Mrs.E.V.N.Jyothi, Mrs.B.Rajani, Mr.I.Rajesh Kumar, “A Novel Entropy Based Detection of DDoS Attacks”, International Journal of Emerging Trends & Technology in Computer Science, Volume 1, Issue 2, July – August 2012.

15.     Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Packet leashes: A defense against wormhole attacks in wireless ad hoc networks”, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, vol. 3, pp. 1976-1986, April 2003.

16.     Yih-Chun Hu, Adrian Perrig and David B. Johnson, “Rushing attacks and defense in wireless ad hoc network routing protocols”, WiSe  Proceedings of the 2nd ACM workshop on Wireless security, pp. 30-40, September 2003.

17.     Eugene Y. Vasserman and Nicholas Hopper, “Vampire attacks: Draining life from wireless ad-hoc sensor networks”. IEEE Transactions on Mobile Computing, volume 12, issue 2, pp. 318-332, 2012.





Shani S. Das, Rejimoan.R

Paper Title:

A Novel Approach for Finding Optimal Query Plan in RDBMS

Abstract:    Information must be organized in such a way that it is able to access, update and manage. Database is a collection of such information that is organized in a well structured manner. Since databases allow flexible data storage, huge amount of information can be stored in it. Structured Query Language (SQL) is used to do database operations especially the retrieval of data inside database. The database operations must not be too time consuming. Hence the database operations must be done in an efficient and effective manner. The existing optimizer relies on cost as well as heuristic approach. Our focus is to find an optimal execution plan for a query.

   SQL Query, Query Optimizer, Optimal Query Plan.


1.       P. Prof.M.A.Pund, S.R.Jadhao, “A role of query optimization in relational database,” International Journal of Scientific & Engineering Research, Volume 2, Issue 1,pp - 1-7, January2011.
2.       Dr. G. R. Bamnote, “Introduction to query processing and optimization,” International Journal of Advanced Research in Computer Science and Software Engineering , Volume 3, Issue 7, pp : 6-13, July 2013.

3.       Y.Ioannidis, “Query optimization,” in Proc ACM Computer Survey,vol. 28, pp. 121–123, 1998.

4.       S. Chaudhuri, “An overview of cost-based optimization of queries with aggregates,” IEEE DE Bulletin pp : 34-43, Sep1995.

5.       An oracle white paper november 2010 “sql plan management in oracle database 11g” 2013.

6.       Volker Markl Mokhtar Kandil Michael Stillger, Guy Lohman. Leo – db2’s learning optimizer. Proceedings of the 27th VLDB Conference, Roma, Italy,, 2001.

7.       Sakshi Mathur Pragya Shukla. Optimizing complex queries using casebased reasoning with dynamicity management. IEEE Proceedings, 2014.

8.       V. Raman V. Markl, G. M. Lohman. Leo: An autonomic query optimizer for db2. IBM SYSTEMS JOURNAL, VOL 42, NO 1,, 2003.

9.       C. A. van den Berg and M. L. Kersten. “Analysis of a dynamic query optimization technique for multijoin queries” Elsevier Science Inc., 2010.





P. Ranjith Reddy, Shireesha.V, V. Malapat, K. Venkateswara Rao, Y. Aparna

Paper Title:

Degradation of Methylene Blue from Water Under Sunlight using SnO2/Graphene Oxide Composite

Abstract:  Tin oxide (SnO2) nanoparticles (NP) has been intensely investigated as photo catalyst for water purification and environment decontamination, while the photon generated electron and hole pair (EHP) recombination is one of factors limiting its efficiency. Tin oxide/Graphene oxide (SnO2/GO) nanocomposite is very promising to overcome this limitation for photo catalytic applications. GO, with its unique electronic properties, large specific surface area and high transparency, contributes to facile charge separation and adsorptivity in this hybrid structure. The SnO2/GO composite under sunlight photo catalytic degradation of methylene blue (MB) has been investigated in aqueous heterogeneous suspensions. It may be used either alone or in combination with   H2O2 to enhance their performance and control of bio growth (slime). The hydrogen peroxide may also be used to speed up catalysts reactions for complete degradation. The SnO2/GO composite showed an enhanced photo catalytic degradation activity for the organic dye methylene blue under sunlight compared to bare H2O2. Degradation of methylene blue under sunlight is fast with in 10min with the combination of SnO2/GO and H2O2 as a photo catalyst. The study of the prepared SnO2/GO composite under the sunlight photo catalytic activity of photo catalyst was investigated by the colorimeter by observing the optical density with reference of distilled water.

   SnO2/GO Composite, methylene blue, Sunlight, Graphene Oxide, Photo catalyst.


1.       Zuoli He., Jiaqi Zhou “Synthesis, Characterization, and Activity of Tin  Oxide Nanoparticles: Influence of Solvothermal Time on Photocatalytic Degradation of Rhodamine B” Modern Research in Catalysis, 2013, 2, PP: 13-18.
2.       N.P.Mohabansi, V. B. Patil1 and N.Yenkie2N.P.Mohabansi, V. B. Patil1 and N.Yenkie2 “A comparative study on photo degradation of methylene blue dye effluent by advanced oxidation process by using TiO2/ZnO photocatalyst.” Vol.4, No.4 2011, 814-819 ISSN: 0974-1496CODEN: RJCABP.

3.       AndreaCHLADOVA, Jakub WIENER, Martina POLAKOVA “Testing the photocatalytic activity of TiO2 nanoparticles with potassium permanganate solution”, . 2011, pp: 21. – 23. 9, Brno, Czech Republic, EU.

4.       Divya K. S, Umadevi T. U, Suresh Mathew, “Graphene-based semiconductor nanocomposites for photocatalytic applications “J. Nanosci. Lett. 2014, 4: 21.

5.       Rafatullah M, Sulaiman O, Hashim R and Ahmad A “ Adsorption of methylene blue on low cost adsorbents” a review J. Hazard Mater. 177 70, 2010.

6.       Forgacs E, Cserhati T and Oros G  “Removal of synthetic dyes from wastewaters” a review Environ. Int. 30 953,2004.

7.       Robinson T, McMullan G, Marchant R and Nigam P  “Remediation of dyes in textile effluent: a critical review on current treatment technologies with a proposed alternative Bioresource “Technol. 77 247, 2001.

8.       Kuang Q, Jiang Z-Y, Xie Z-X, Lin S-C, Lin Z-W, Xie S-Y, Huang R-B and Zheng L-S “Tailoring the opticalproperty by a three-dimensional epitaxial heterostructure: a case of ZnO/SnO2 “ J. Am. Chem. Soc. 127 11777, 2005.

9.       Hoffman M R, Martin S T, Choi W and Bahnemann D W” Environmental applications of semiconductor photocatalysis” Chem. Rev. 95 69,1995.

10.     Ohko Y, Fujishima A and Hashimoto K” Kinetic analysis of the photocatalytic degradation of gas-phase 2-propanol under mass transport-limited conditions with a TiO2 film photocatalyst” J. Phys. Chem. B 102 1724,1998.

11.     Ashok K. Singh, Umesh T. Nakate “Microwave Synthesis, Characterization and Photocatalytic Properties of SnO2 Nanoparticles”Advances in Nanoparticles, 2013, 2, 66-70.

12.     Humaira Seema, K Christian Kemp, Vimlesh Chandra and Kwang S Kim “Graphene–SnO2 composites for highly efficient photocatalytic degradation of methylene blue under sunlight” Nanotechnology 23 (2012) 355705 (8pp). 

13.     Krivetskiy, A. Ponzoni, E. Comini, S. Badalyan, M. Rumyantseva and A. Gaskov, “Selectivity Modification of Sno2-Based Materials for Gas Sensor Arrays,” Elec-Troanalysis, VOL. 22, NO. 23, 2010, PP. 2809-2816.

14.     Xuan Pan, Yong Zhao, Shu Wang, and Zhaoyang Fan “TiO2/graphene nanocomposite for photocatalytic application” Materials and processes for communicationg current research and technological developments (A. Mendez-Vilas, Ed).

15.     N. G. Deshpande, Y. G. Gudage, R. Sharma, J. C. Vyas, J. B. Kim and Y. P. Lee, “Studies on Tin Oxide-intercalated Polyaniline Nanocomposite for Ammonia Gas Sensing Applications,” Sensors and Actuators B: Chemical, Vol. 138, No. 1, 2009, pp. 76-84.

16.     Liang Shi, and Hailin Lin “Facile Fabrication and Optical Property of Hollow SnO2 Spheres and Their Application in Water Treatment” Published on Web 11/10/2010 Langmuir 2010, 26(24), 18718–18722.

17.     ANKITA AMETA, RAKSHIT AMETA and MAMTA AHUJA “Photocatalytic degradation of methylene blue over ferric tungstate” Sci. Revs. Chem. Commun.: 3(3), 2013, 172-180ISSN 2277-2669.

18.     YuLin Min, Kan Zhang, Wei Zhao, FangCai Zheng, YouCun Chen ,YuanGuang Zhang ,“Enhanced chemical interaction between TiO2 and graphene oxide for photo catalytic decolorization of methylene blue” Chemical Engineering Journal 193–194 (2012) 203–210.

19.     Jian-Hui Sun, Shu-Ying Dong, Jing-Lan Feng, Xiao-Jing Yin, Xiao-Chuan Zhao “Enhanced sunlight photocatalytic performance of Sn-doped ZnO for Methylene Blue degradation” Journal of Molecular Catalysis A: Chemical 335 (2011) 145–150.

20.     Fawzi Banat a, Sameer A1-Asheh b, Ma'moun A1-Rawashdeh% Mohammad Nusair  “Photodegradation of methylene blue dye by the UV/H2O2 and UV/acetone oxidation processes”  F. Banat et al. / Desalination 181 (2005) 225-232.

21.     XIA Hui-li, ZHUANG Hui-sheng_, ZHANG Tao, XIAO Dong-chang “Photocatalytic degradation of Acid Blue 62 over CuO-SnO2 nanocompositephotocatalyst under simulated sunlight” Journal of Environmental Sciences 19(2007) 1141–1145.

22.     Abdullah M. Al-Hamdi , Mika Sillanpa ,Joydeep Dutta “Photocatalytic degradation of phenol in aqueous solution by rareearth-doped SnO2 nanoparticles”  J Mater Sci (2014) 49:5151–5159.

23.     Ali Bumajdad and Metwally Madkour “Understanding the superior photocatalytic activityof noble metals modified titania under UV andvisible light irradiation” Cite this: Phys.Chem.Chem.Phys, 2014, 16, 7146.

24.     Jintao Zhang, Zhigang Xiong and X. S. Zhao “Graphene–metal–oxide composites for the degradation of dyes under visible light irradiation” Cite this: J. Mater. Chem., 2011, 21, 3634.

25.     X.Q. An, J.C. Yu, “Graphene-based photocatalytic composites”, RSC Adv. 1 (2011) 1426–1434.

26.     C.C. Lin, Y.J. Chiang, “Preparation of coupled ZnO/SnO2 photocatalysts using a rotating packed bed”, Chemical Engineering Journal 181–182 (2012) 196–205.

27.     K. Vinodgopal, P.V. Kamat, “Enhanced rates of photocatalytic degradation of an azo dye using SnO/TiO2 coupled semiconductor thin films”, Environmental Science and Technology 29 (1995) 841–845.

28.     M.L. Zhang, T.C. An, X.H. Hu, C. Wang, G.Y. Sheng, J.M. Fu, “Preparation and photocatalytic properties of a nanometer ZnO–SnO2 coupled oxide”, Applied Catalysis General 260 (2004) 215–222.

29.     M.L. Zhang, G.Y. Sheng, J.M. Fu, T.C. An, X.M. Wang, X.H. Hu,” Novel preparation of nanosized ZnO–SnO2 with high photocatalytic activity by homogeneous co-precipitation method”, Materials Letters 59 (2005) 3641–3644.

30.     Williams G, Seger B, Kamat PV. “TiO2-graphene nanocomposites. UV-assisted photocatalytic reduction of graphene oxide”. ACS Nano. 2008;2:1487-1491.

31.     Woan K, Pyrgiotakis G, Sigmund W.” Photocatalytic carbon-nanotube-TiO2 composites”. Advanced Materials. 2009;21:2233- 2229.

32.     Forgacs E, Cserh´ati T and Oros G” Removal of synthetic dyes from wastewaters”: a review Environ. Int. 30 953,2004.

33.     Dodd A, McKinley A, Saunders M and Tsuzuki T” Mechanochemical synthesis of nanocrystalline SnO2–ZnO Photocatalysts” Nanotechnology 17 692,2006.

34.     Zhang L L, Xiong Z and Zhao X S “Pillaring chemically exfoliated graphene oxide with carbon nanotubes for photocatalytic degradation of dyes under visible light irradiation” ACS Nano 4 7030,2010.

35.     C. Wang, B.Q. Xu, X.M. Wang, J.C. Zhao, “Preparation and photocatalytic activity of ZnO/TiO2/SnO2 mixture”, Journal of Solid State Chemistry 178 (2005) 3500–3506.

36.     Xu C, Wang X and Zhu J W 2008 “Graphene-metal particle nanocomposites” J. Phys. Chem. C 112 19841

37.     Zhou X Z, Huang X, Qi X Y, Wu S X, Xue C, Boey F Y C, Yan Q Y, Chen P and Zhang H 2009 In situ “synthesis of metal nanoparticles on single-layer graphene oxide and reduced graphene oxide surfaces” J. Phys. Chem. C 113 10842

38.     Xiong Z G, Zhang L L, Ma J Z and Zhao X S “Photocatalytic degradation of dyes over graphene–gold nanocomposites under visible light irradiation” Chem. Commun. 46 6099,2010.

39.     Zhang J, Xiong Z and Zhao X S  “Graphene–metal–oxide composites for the degradation of dyes under visible light irradiation” J. Mater. Chem. 21 3634, 2011.

40.     Wang G X, Wang B, Wang X L, Park J, Dou S X, Ahn H and Kim K  “Sn/graphene nanocomposite with 3D architecture for enhanced reversible lithium storage in lithium ion batteries” J. Mater. Chem. 19 8378,2009.

41.     Gu F, Wang S F, Song C F, Lu M K, Qi Y X, Zhou G J, Xu D and Yuan D R “Synthesis and luminescence properties of SnO2 nanoparticles” Chem. Phys. Lett. 372 451 Tuinstra F and Koenig J L 1970 Raman spectrum of graphite J. Chem. Phys. 53 1126, 2003.

42.     Wang A R and Xiao H  “Controllable preparation of SnO2 nanoplates and nanoparticles via hydrothermal oxidation of SnS2 nanoplates” Mater. Lett. 63 1221,2009.

43.     Wang C, Wang X M, Xu B Q et al ” Enhanced photocatalytic performance of nanosized coupled ZnO/SnO2 photocatalysts for methyl orange degradation” [J]. J Photochem Photobiol A: Chem, 168(1/2): 47–52, 2004.

44.     Carren˜o NLV, Fajardo HV, Maciel AP, Valentini A, Pontes FM, Probst LFD, Leite ER, Longo E  “Selective synthesis of vinyl ketone over SnO2 nanoparticle catalysts doped with rare earths”. J Mol Catal A 207:89–94, (2004).

45.     51. Jinkawa T, Sakai G, Tamaki N, Yamazoe N “Relationship between ethanol gas sensitivity and surface catalytic property of tin oxide sensors modified with acidic or basis oxides”. J Mol Catal A 155:193–200, (2000).

46.     Robertson J, Clark SJ “Limits to doping in oxides”. Phys Rev B 8:075205,(2011).





Munusamy Rani,  Srinivasan Sathiya,  MaheswaranVimala

Paper Title:

Synthesis, Characterization and Biological Activity of Transition Metal Complexes Supported

Abstract:   Mn (II) and vanadium (II) complexes were synthesized purified by repeated recrystallisation and characterized by IR data. Metal complexes were also tested for their antimicrobial activity. Analysis reveals that all the ligands showed its greater activity against S.Typhi & B.cereus, complex showed moderate activity against p. argeniosa.    N (hydroxybenzylidene) 2- chloro aniline found to be moderate against s.typhi and less active against B.cereus. Analysis reveals that all the ligands showed its greater activity against P.aeruginosa and S.typhi,

  Schiff base,N (2hydroxy benzylidene) 2-amino phenol and N (hydroxybenzylidene) 4-amino azo benzene (2hydroxy benzylidene) Para Toluene sulphonamide


1.       Emsley, John (2001). "Manganese". Nature's Building Blocks: An A-Z Guide to the Elements. Oxford, UK: Oxford University Press. pp. 249–253. 
2.       Silva Avila, Daiana; LuizPuntel, Robson; Aschner, Michael (2013). "Chapter 7. Manganese in Health and Disease". In Astrid Sigel, Helmut Sigel and Roland K. O. Sigel. Interrelations between Essential Metal Ions and Human Diseases. Metal Ions in Life Sciences Springer. pp. 199–227. 

3.       Dismukes, G. Charles; Willigen, Rogier T. van (2006). "Manganese: The Oxygen-Evolving Complex & Models". Manganese: The Oxygen-Evolving Complex & Models. Encyclopedia of Inorganic Chemistry. 

4.       Bauer AW, Kirby WM, Sherris JC, Turck M. Antibiotic susceptibility testing by a standardized single disk method. Am J ClinPathol. 1966 Apr;45(4):493–496





Chitra Raju I, Lizy Abraham

Paper Title:

Detection of Lesions in Color Fundus Images for Diabetic Retinopathy Grading

Abstract:    Advancement in technology has its impact in many areas especially in the field of medicine. Analysis of medical images have great significance in non-invasive treatment and clinical studies. In the context of computer aided diagnosis of diabetic retinopathy, a new algorithm for the detection of lesions is presented and discussed. The regions where these lesions are present determines the severity of diabetic retinopathy. Thus, the detection of these lesions plays a vital role in computer aided diagnosis. Detection of fovea is indispensable for this approach. Fovea is detected by means of morphological operations. The method has been tested on publicly available databases and the results are better than the conventional approaches.

   Diabetic Retinopathy (DR), exudates, fovea, hemorrhages


1.       Vision 2020: The Right to Sight – Diabetic Retinopathy [Online]. Available:http://www.vision2020.org/main.cfm?type=WIBDIABETIC.
2.       The Emerging Epedemic of Diaberic Retinopathy in India [Online]. Availbale : http://www.iapb.org/resources/data-and-surveys.

3.       D. Vallabha, R. Dorairaj, K. Namuduri and H. Thompson, “Automated detection and classification of vascular abnormalities in diabetic retinopathy”, Proceedings of the 13th IEEE Signals, Systems and Computers 2:1625-1629, 2004.

4.       C. Sinthanayothin,  J. Boyce,  T. Williamson,  H. Cook, E. Mensah,  S. Lal and D. Usher, “Automated detection of diabetic retinopathy on digital fundus images.”
Diabet. Med. 19, 105-112, 2002.

5.       J. M. Cree, J. J. Leandro, J.V. B.Soares, R. M. Jr. Cesar, H. F. Jelinek and D. Cornforth, “Comparison of various methods to delineate blood vessels in retinal images”, Proceedings of the 16th Australian Institute of Physics Congress, Canberra, 2005.

6.       H. Wang, W. Hsu, K. G. Goh and M. Lee, “An effective approach to detect lesions in color retinal images”, Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 181-187, 2000.

7.       A. Hunter, J. Lowell, J. Owens and L. Kennedy, “Quantification of diabetic retinopathy using neural networks and sensitivity analysis”, Proceedings of Artificial Neural Networks in Medicine and Biology, pp. 81-86, 2000.

8.       A. Osareh, M. Mirmehdi, B. Thomas and R. Markham, “Comparative exudate classification using support vector machines and neural networks”, The 5th international Conf. on Medical Image Computing and Computer Assisted Intervention, pp. 413-420, 2002.

9.       B. M. Ege, O. K. Hejlesen, O. V. Larsen, K. Moller, B.Jennings, D. Kerr and D. A. Cavan, “Screening for diabetic retinopathy using computer based image analysis and statistical classification.” Comput. Methods Programs Biomed. 62(3):165-175,2000.

10.     C. Sinthanayothin, J. F. Boyce, T. F. Williamson and H. L. Cook, “Automated detection of diabetic retinopathy on digital fundus image.” Diabet. Med. 19(2):105-112, 2002.

11.     C. Sinthanayothin, V. Kongbunkiat, S. Phoojaruenchanachai and A. Singalavanija, “ Automated screening system for diabetic retinopathy, 3rd International Symposium on Image and Signal Processing and Analysis”, 44(2) : 767-771, 2003.

12.     M. Larsen, J. Godt, N. Larsen, H. Lund- Andersen, A. K. Sjolie, E. Agardh, H. Kalm, M Grunkin and D. R. Owens, “ Automated detection of fundus photographic red lesions in diabetic retinopathy.” Ophthalmol. Vis. Sci. 44(@):761-766, 2003.

13.     M. Niemeijer, B. van Ginnekan, J. Staal, M. Suttorp-Schulten and M. Abramoff, “Automatic detection of red lesions in digital color fundus photographs.” IEEE Trans. Med. Imag. 24(5) : 584-592, 2005.

14.     X. Zhang and O. Chutatape, “Top-down and bottom-up strategies in lesion detection of background diabetic retinopathy.” IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2:422-428, 2005.

15.     J. M. Shivaram, R. Patil and H. S. Aravind, "Automated detection and quantification of hemorrhages in diabetic retinopathy images using image arithmetic and mathematical morphology methods", International Journal of Recent Trends in Engineering (IJRTE), pp.l74-176, Vol. 2, 2009.

16.     DIARETDB: Diabetic Retinopathy Ratabase and Evaluation Protocol, [Online]. Available: http://www.it.lut.fi/project/imageret/diaretdb1

17.     T. P. Karnowski , V. P. Govindasamy, K. W. Tobin, E. Chaum, M. D. Abramoff, "Retina lesion and microaneurysm segmentation using morphological reconstruction methods with ground-truth data". Conf. Proc. IEEE Eng. Med. BioI. Soc. 1:5433-5436, 2008. 

18.     X. Zhang and G. Fan, “ Retinal spot lesion detection using adaptive multi-scale morphological processing,” in Proc. ISVC (2), pp.490-501, 2006.





Dhanya R, Smitha K S

Paper Title:

A Hybrid Approach for Speaker Tracking using Time of Arrival with Concave-Convex Procedure

Abstract:    Single source localization problem using Time f Arrival (ToA ) technique is described here.Time of Arrival is the travel time of a radio signal from a single transmitter to a remote single receiver.  Among various models for localization measurement of ToA is relatively direct since by identifying and locating known samples from transmitted source signal, the signal arrival time can be determined. The corresponding unknown source-measurement associations can be incorporated into optimization.  An efficient three step algorithm is used to solve this optimization problem which includes the steps of course location estimation, determination of source-measurement association and source location refinement. This approach simplify the problem with convex relaxation and approximation techniques. Here a popular optimization package like CVX is used.  The proposed algorithm has low computational complexity and is feasible for real time applications.

  Time of Arrival measurement, Voice Activity Deduction(VAD), optimization, convex relaxation, course location estimation


1.       N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, III, R. L. Moses, and N. S. Correal, “Locating the nodes: Cooperative localization in wireless sensor networks,” IEEE Signal Process. Mag., vol. 22, no. 4, pp. 54–69, Jul. 2005.
2.       H. Sayed, A. Tarighat, and N. Khajehnouri, “Network-based wireless location: Challenges faced in developing techniques for accurate wireless location information,” IEEE Signal Process. Mag., vol. 22, no.4, pp. 24–40, Jul. 2005.

3.       N. Patwari, A. O.Hero, III, M. Perkins,N. S.Correal, andR. J.O’Dea, “Relative location estimation in wireless sensor networks,” IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2137–2148, Aug. 2003.

4.       K. Yang, G. Wang, and Z.-Q. Luo, “Efficient convex relaxation methods for robust target localization by a sensor network using time differences of arrivals,” IEEE
Trans. Signal Process., vol. 57, no. 7, pp. 2775–2784, Jul. 2009.

5.       X. Li, “Collaborative localizationwith received-signal strength inwireless sensor networks,” IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3807–3817, Nov. 2007.

6.       D. Niculescu and B. Nath, “Ad hoc positioning system (APS) using AOA,” in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM’03), San Francisco, CA, Mar./Apr. 2003, vol. 3, pp. 1734–1743.

7.       L. Cong andW. Zhuang, “Hybrid TDOA/AOAmobile user location for wideband CDMA cellular systems,” IEEE Trans. Wireless Commun., vol. 1, no. 3, pp. 439–447, Jul. 2002.

8.       Dempster, N. Laird, and D. Rubin, “Maximum likelihood from incomplete data via the EM algorithm,” Journal of the Royal Statistical Society. Series B (Methodological), vol. 39, no. 1, pp. 1–38, 1977.

9.       Ofer Schwartz, Sharon Gannot, “Speaker tracking using Recursive EM Algorithms”, IEEE transactions on audio, Speech And Language Processing, Vol. 22, No.2, Month 2014.

10.     H Shen, Zhi Ding, Soura Dasgupta, Chunming Zhao, “Multiple Source Localization in Wireless Sensor Networks Based on Time of Arrival Measurement”, IEEE Transactions on Signal Processing, Vol.62, No.8, April 15 2015                   






Ansi R R, Anusree L

Paper Title:

Advanced Bio-Crypto System with Smart Card

Abstract:    Biometric cryptosystems has widespread applications in this era. Generally associated to a personal device for privacy protection, biometric references are stored in secured electronic devices such as smart cards, and systems are using cryptographic tools to communicate with the smart card and securely exchange biometric data. The biometrics used in this paper is fingerprint. In many areas, fingerprint recognition is used to improve the security and privacy. In this paper, we propose a novel system for protecting fingerprint privacy by combining two different fingerprints into a new identity called combined minutiae template, stored in both database and smart card. Smart cards are widely acknowledged as one of the most secure and reliable forms of electronic identification. Combining smart card technology with biometrics provides the means to create a positive binding of the smart card to the cardholder thereby enabling strong verification and authentication of the cardholder’s identity. Biometric cryptosystems combine cryptography and biometrics to benefit from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the need to remember a memorable password or passphrase etc. Fingerprint has been integrated in the RSA algorithm for biometric public/private key generation. Using RSA algorithm, we can generate a biometric based asymmetric keys from the biometric template of a user stored in the database. We grant authentication and using these keys we can encrypt/decrypt message. New approaches have endeavored towards merging biometrics with cryptography, so as to increase overall security of the system.

   Combination, fingerprint, minutiae, privacy, RSA,  Key generation, MATLAB


1.       Sheng L and Alex C. Kot, “Fingerprint Combination For privacy        Protection,” in Proc. IEEE transactions on information forensics and security, vol. 8, no. 2, February 2013
2.       A. Othman and A. Ross, “Mixing fingerprints for generating virtual identities,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.

3.       Safnitha P Y and Sheena Kurian K, “Fingerprint image enhancement with emphasis on histogram equalization adaptively”, UGC sponsored national conference on information and communication technologies at BPC college piravom, march 2014.

4.       T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005.

5.       Sayani Chandra, Sayan Paul, Bidyutmala Saha and Sourish Mitra, “Generate an Encryption Key by Using Biometric Cryptosystems to Secure Transferring of Data over  a network” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 12, Issue 1 (May. - Jun. 2013), PP 16-22 

6.       K. Nilsson and J. Bigun, “Localization of corresponding points in fingerprints by complex filtering,” Pattern Recognit. Lett., vol. 24, no. 13,pp. 2135–2144, 2003.

7.       Arun Rossa, Anil Jaina, James Reismanb, “A hybrid Fingerprint matcher”, 2003 Published by Pattern Recogninition, Elsevier Science Ltd 36 (2003) 1661 – 1673, Elsevier Publication

8.       X. Jiang andW.Yau, “Fingerprint minutiae matching based on the local and global structures,” in Proc. 15th Int. Conf. Pattern Recognition, 2000, vol. 2, pp. 1038–1041.

9.       J. G. Jo, J. W. Seo, and H. W. Lee, “Biometric digital signature key generation and cryptography communication based on fingerprint," First Annual International Workshop 2007, LNCS 4613, pp. 38-49, Springer Verlag, 2007. 

10.     L. Hong, Y. F. Wan, and A. Jain, “Fingerprint image enhancement: Algorithm and performance evaluation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 20, no. 8, pp. 777–789, Aug. 1998.

11.     Fingerprint Verification competition, For accessing fingerprint    database, http://bias.csr.unibo.it/fvc2004/download.asp, accessed on 20.05.2014.

12.     Shweta Malhotra, Chander Kant Verma , “A Hybrid Approach for Securing Biometric Template”, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013.

13.     Vincenzo Contiand, Salvatore Vitabile and Filippo Sorbell, “Fingerprint Traits and RSA Algorithm Fusion Technique”, 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems.

14.     ANSI INCITS 378. Information technology - Finger Minutiae Format for Data Interchange,2004.

15.     Christian Rathgeb, Andreas Uh, “A survey on biometric cryptosystems and cancelable biometrics”, EURASIP Journal on Information Security 2011, 2011:3, http://jis.eurasipjournals.com/content/2011/1/3, 2011:3,

16.     Kai Xi, Jiankun Hu, “Bio-Cryptography”, Handbook of Information and Communication, Peter Stavroulakis,Mark Stamp (Eds.) Security, pp. 129-157, c Springer 2010[3] Feng Hao, Ross Anderson, John Daugman, “Combining cryptography with biometrics effectively”, Technical Report No. 640, 2005, UCAM-CL-TR-640, ISSN 1476-2986





Abdulhussein M. Abdullah, Miaad Raisan

Paper Title:

Building a Core Arabic Ontology About Iraqi News

Abstract:   Nowadays, Iraqi newspapers spread on the WWW in a great and remarkable form. All of these Websites are belonging to traditional Web. Therefore, the search results are not perfect. In order to move with these Websites to Semantic Web generation, ontology must be created. Unfortunately, there is a lack in ontologies written in Arabic language because it is a difficult language. If some attempts in different domains exist, it is not available on the World Wide Web as Linked Data. This paper aimed to build a core ontology in Arabic language interested in Iraqi News domain to be used as a source data for Iraqi’s newspapers. Through the study the proposed ontology includes classes in hierarchical form depend essentially on class called Event class which play with other classes also, these classes may play with each other. Predicates on classes are relationships between these classes, thus among their individuals. An inference feature is enabled by adding restrictions on predicates. ORM (Object Role Modeling) approach is used to design the verbalization conceptual model for our ontology. Ontology mapping is used for populating the proposed ontology by converting XML documents to OWL using XSLT.

   Arabic Ontology, OWL, ORM, semantic web, XSLT, ontology population.


1.       T. B. Lee, J. Hendler, and O. Lassila, "The semantic web," Scientific American, vol. 284, pp. 34-43, 2001.
2.       T. R. Gruber, "A translation approach to portable ontology specifications," Knowledge acquisition, vol. 5, pp. 199-220, 1993.

3.       W3C.OWL Web Ontology Language Use Cases and Requirements. Available: http://www.w3.org/TR/webont-req/

4.       Wikipedia. Ontology (information science). Available: http://en.wikipedia.org/wiki/Ontology_%28information_science%29

5.       J. Martinez-Gil, E. Alba, and J. F. Aldana-Montes, "Statistical Study about Existing OWL Ontologies from a Significant Sample as Previous Step for their Alignment," in Complex, Intelligent and Software Intensive Systems (CISIS), 2010 International Conference on, 2010, pp. 980-985.

6.       A. M. Al-Zoghby, A. S. E. Ahmed, and T. T. Hamza, "Arabic Semantic Web Applications–A Survey," Journal of Emerging Technologies in Web Intelligence, vol. 5, pp. 52-69, 2013.

7.       M. Jarrar, "Building a Formal Arabic Ontology (Invited Paper)," Alecso, Arab League. Tunis, 2011.

8.       S. Zaidi, M. Laskri, and K. Bechkoum, "A cross-language information retrieval based on an Arabic ontology in the legal domain," in Proceedings of the International Conference on Signal-Image Technology and Internet-Based Systems (SITIS’05), 2005, pp. 86-91.

9.       P. Castells, F. Perdrix, E. Pulido, M. Rico, R. Benjamins, J. Contreras, et al., "Neptuno: Semantic web technologies for a digital newspaper archive," in The Semantic Web: Research and Applications, ed: Springer, 2004, pp. 445-458.

10.     R. García, F. Perdrix, and R. Gil, "Ontological infrastructure for a semantic newspaper," in Semantic Web Annotations for Multimedia Workshop, SWAMM, 2006.

11.     N. Fernández, D. Fuentes, L. Sánchez, and J. A. Fisteus, "The NEWS ontology: Design and applications," Expert Systems with Applications, vol. 37, pp. 8694
8704, 2010.

12.     L. M. B. Saleh and H. S. Al-Khalifa, "AraTation: an Arabic semantic annotation tool," in Proceedings of the 11th International Conference on Information Integration and Web-based Applications & Services, 2009, pp. 447-451.

13.     W3C. OWL 2 Web Ontology Language Primer. Available: http://www.w3.org/TR/2009/PR-owl2-primer-20090922/

14.     J. Hebeler, M. Fisher, R. Blace, and A. Perez-Lopez, Semantic web programming: John Wiley & Sons, 2011.

15.     N. F. Noy and D. L. McGuinness, "Ontology development 101: A guide to creating your first ontology," ed: Stanford knowledge systems laboratory technical report KSL-01-05 and Stanford medical informatics technical report SMI-2001-0880, 2001.

16.     H. Bohring and S. Auer, "Mapping XML to OWL Ontologies," Leipziger Informatik-Tage, vol. 72, pp. 147-156, 2005.





Geethu A M, Smitha K S

Paper Title:

A Fuzzy Logic Based Acoustic Echo Cancellation System

Abstract:    Although a handful of inter channel decorrelation procedures have been proposed in the past to mitigate the non-uniqueness and lower the misalignment of adaptive filter, introduced audible distortion limits the performance of adaptive filtering algorithm. In this paper fuzzy based adaptive resampling algorithm has been proposed. The power of fuzzy adaptive resampling is that the amount of de-correlation can be finely controlled by applying fuzzy logic in adaptive filtering algorithm. The proposed procedure expands on the idea of fuzzy based adaptive resampling in the frequency domain that efficiently mitigates the non-uniqueness problem for a multichannel acoustic echo cancellation (AEC) system while introducing minimal distortion to the signal quality. The performance of the system can be evaluated by the true echo return loss enhancement and signal to noise ratio (SNR) per sub-band, to better demonstrate the superiority of proposed procedure over other methods.

   fuzzy adaptive resampling, multi-channel acoustic echo cancellation (AEC), non-uniqueness problem, resampling


1.       T. S.Wada andB.-H. Juang, “Multi-channel acoustic echo cancellationbased on residual echo enhancement with effective channel decorrelation via resampling,” in Proc. IWAENC, 2010.
2.       E. Robledo-Arnuncio, T. S. Wada, and B.-H. Juang, “On dealing with sampling rate mismatches in blind source separation and acoustic echo cancellation,” in Proc. IEEE WASPAA, 2007, pp. 34–37.

3.       T. S.Wada, J.Wung, and B.-H. Juang, “Decorrelation by resampling in frequency domain for multi-channel acoustic echo cancellation based on residual echo enhancement,” in Proc. IEEE WASPAA, 2011.

4.       J.Wung, T. S.Wada, and B.-H. Juang, “Inter-channel decorrelation by sub-band resampling in frequency domain,” in Proc. IEEE ICASSP, 2012.

5.       J. Wung, T. S. Wada, and B.-H. Juang, “On the performance of the robust acoustic echo cancellation system with decorrelation by subband resampling,” in Proc. IEEE ICASSP, 2013.

6.       J. Herre, H. Buchner, and W. Kellermann, “Acoustic echo cancellation

7.       for surround sound using perceptually motivated convergence enhancement,” in Proc. IEEE ICASSP, 2007, pp. 17–20.

8.       T.S. Wada and B.-H. Juang, “Acoustic echo cancellation based on independent component analysis and integrated residual echo enhancement,” Proc. IEEE ICASSP, pp. 205–208, 2009.

9.       Naga Swaroopa Adapa, Sravya Bollu “Performance Analysis of   different Adaptive Algorithms based on Acoustic Echo Cancellation”.

10.     Jason Wung, Ted S. Wada, Inter-Channel Decorrelation by Sub-Band Resampling for Multi-Channel Acoustic Echo Cancellation, IEEE Transactions On Signal Processing, Vol. 62, No. 8, April 15, 2014.

11.     Sathya Jose S L (2009). Introduction To Fuzzy Systems.

12.     Li-Xin Wang and Jerry M Mendel “ Generating fuzzy    rules by learning from examples IEEE Transactions On System,man And Cybernetics, vol22 No 6,1992





Nikhil Ranjan, Braj Bihari Soni, Brahmi Shraman

Paper Title:

Review on Efficient Image Mosaicing Using Corner Detection Techniques

Abstract:    In image processing, mosaic images are made by adding together small images. Creation of mosaic images from a sequence of partial views is a powerful means of obtaining a larger view of a scene than available within a single view, and it has been used in wide range of applications. A general framework for images is proposed in this paper. This paper also discusses a review on different applications of image mosaicing mainly in the area of image mosaicing using corner detection technique.

   Image Mosaicing, Image Processing, Panorama, Image Fusion.


1.       S. Battiato, G. Di Blasi, G.M. Farinella and G. Gallo, “A survey of Digital Mosaic Techniques ”, Eurographics Italian chapter conference, pp. 129-135, 2006.
2.       “Seamless image stiching in the gradient domain”, Anat Levin, Assaf Zomet, Shmuel Peleg and Yair Weiss in 8th European Conference On Computer Vision, May 2004, vol. 4, pp. 377-389

3.       Melvin Sze-Ming Ni, Three-Dimensional Mapping and Navigation with Stereo Vision”, Thesis of Aeronautics and Astronautics of Stanford University, December 2000.

4.       Agarwala, M. Agrawala, M. Cohen, D. Salesin and R. Szeliski, “Photographing long scenes with multi-viewpoint panoramas ,” in ACM Transactions on Graphics (TOG), vol.25,pp. 853-861, ACM, 2006.

5.       Digital image processing, Gonzalez R. C and Wintz P, New York academic, 1977.

6.       Battiato, G. Di Blasi, G. M. Farinella and G. Gallo,” Digital mosaic framework: An overview,” Eurograph-comput. Graph. Forum, vol.26, no.4, pp. 794-812, Dec.2007.

7.       Tt A. Can, C. V. Stewart and B. Royasm, “Robust hierarchical algorithm for constructing a mosaic from images of the curved human retina”, Computer Vision and Pattern Recognition, vol.2, 1999, pp.286-292.

8.       Rav- Acha, G. Engel and S. Peleg, “Minimal aspect distortion mosaicing of long scenes” International Journal of Computer Vision, vol. 78, no. 2-3, pp. 187-206, 2008.

9.       http://www.library.unsw.edu.au/thesis/adt ADFA/uploads/approved/adt-ADFA20051007.144609/public/o3chapter2.pdf, 18th October 2007.

10.     Zhou Wang, Alan Conrad Bovik, Hamid Rahim Sheikh, Eero P. Simoncelli, “Image Quality Assessment: from error visibility to structural Similarity ” IEEE transaction on image processing Vol 13, No.4, PP 600- 612, April 2004.

11.     Ging Li, quan Pan, Tao Yang, Stan. Z.Li, “Automated Feature Point management for video mosaic construction”, proceeding of the third International Conference on Information Technology and Application (ICITA05), 2005.

12.     M.Brown, D.G.Lowe, “Recognising Panoramas”, Proceddings of Ninth IEEE International Conference on Computer Vision (ICCV-03).

13.     Achala Pandey, Umesh C. Pati, “A novel technique for Non-Overlapping image mosaicing based on pyramid method” IEEE, 2013.

14.     Achala Pandey, Umesh C. Pati, “A novel technique for mosaicing of medical images” IEEE, 2014.





P. Nandhakumar, S. Dinesh Kumar

Paper Title:

Methodical Technique for Denoise Salt & Pepper and Gaussian Noise in Gray Scale Image

Abstract:    In this paper, a adaptive technique for reduction of an salt & pepper noise and Gaussian noise using a filters. Noise can degrade the image at the time of capturing or transmission of the image. Before applying image processing tool to an image, noise removal from the image is done at highest priority. Median   filters are preferred for removing salt & pepper noise because of their simplicity and less computational complexity and also Wiener filter was preferred for removing an Gaussian noise. Extensive Simulation have been carried out on gray scale images with median filter and Wiener filter. This paper presents the result of applying different noise type and various noise reduction techniques.

   Before applying image processing tool to an image, noise removal from the image is done at highest priority.


1.       Dr.V.Kavitha, Mythili, “Efficient Technique for Color Image Noise Reduction” The Research Bulletin of Jordan ACM, ISSN: 2078-7960Vol.II (III).
2.       Rafael.C.Gonzalez,  Richard E.Woods.2008. Digital Image Processing, 3rd edition, Pearson education.

3.       http://homepages.inf.ed.ac.uk/rbf/HIPR2/gryimage.html.

4.       https://www.clear.rice.edu/elec431/projects95/lords/wiener.html.

5.       https://en.wikipedia.org/wiki/Pixel.

6.       Rohit Verma, Jahid Ali“ A Comparative Study of Various Types of Image Noise and Efficient Noise Removal Techniques.





Shamila. N, Manju. M. S

Paper Title:

Implementation of Max Log BCJR Algorithm in Turbo Decoder Architecture for Wireless Sensor Networks

Abstract:    The transmission of signal in a compressed form can cause a high sensitivity of error in wireless sensor networks.  Error control coding (ECC) is used to determine the error occurring in the communication networks during the transmission of information from one point to another. It provides gain and energy reduction during transmission at the cost of decoder power consumption. The BCJR algorithm named after its inventors: Bahl,Cocke, Jelnik and Raviv is critical to iteratively  decoded error correcting codes including turbo codes and parity check codes. The turbocodes used in the algorithm helps in the modification of the original BCJR algorithm and helps in the simplification of calculations. In this paper Max-Log-BCJR (Bahl, Cocke, Jelnik and Raviv) Algorithm is used. This algorithm appears to lend itself to both low complexity energy-constrained scenarios, as well as to the high-throughput scenarios. The Algorithm is very sensitive to SNR mismatch and requires accurate estimation of noise variation. This algorithm simply finds the minimum of the LLRs (Logarithmic Likelihood Ratios),so it uses only one ACS Operation.

   Error Control Coding, Logrithamic Likelihood Ratios, Max-Log BCJR Algorithm, Turbocodes.


1.       C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon Limit Error Correcting Coding and Decoding: Turbo Codes,” in Proceedings of the IEEE International Conference on Communications, vol. 2,Geneva, Switzerland, 1993, pp. 1064–1070
2.       L. Li, R. G. Maunder, B. M. Al-Hashimi, and L. Hanzo, “An Energy efficient error correction scheme for IEEE 802.15.4 wireless sensor networks,” Transactions on Circuits and Systems II, vol. 57, no.3, pp. 233–237, 2010.

3.       P. Robertson, P. Hoeher, and E. Villebrun, “Optimal and Sub-Optimal Maximum A Posteriori Algorithms Suitable for Turbo Decoding,”European Transactions on Telecommunications, vol. 8, no. 2, pp. 119–125, 1997.

4.       A LowComplexity Turbo Decoder Architecture for Energy-Efficient Wireless Sensor Networks ,IEEE Transactions on Very LargeScale Integration (VLSI) Systems Volume: 21 , Issue: 1 ,2013

5.       F. Jelinek L.R. Bahl, J. Cocke and J. Raviv. Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. on Inform., Vol. IT-20., pages 284–287, March 1974.

6.       Claude Berrou and Alain Glavieux. Near optimum error-correcting coding and de-coding: Turbo Codes. IEEE Transactions on Communications, 44(10):1261–1271, October 1996.

7.       Y. Sun and J. R. Cavallaro, “Efficient hardware implementation of a highly-parallel 3GPP LTE, LTE-advance turbo decoder,” Integr., VLSI J., vol. 44, no. 1, pp. 1–11, 2010.





Md. Tusar Ali, Kazi Md. Shorowordi

Paper Title:

Synthesis and Structural Characterization of Magnesium Matrix In-Situ Composites

Abstract:    Magnesium matrix in-situ composites were synthesized using commercially pure Mg ingot, coarse Ti and B4C powder as starting materials. Ti and B4C powders are mixed with zirconia balls in a plastic bottle in Ar atmosphere and the resulting mixture of these powders were compacted into a cylindrical perform. The infiltration of Mg as a matrix metal into the Ti-B4C preform by capillary forces was done under Ar atmosphere in an electric furnace for different temperatures and holding time. Samples were prepared for phase identification and microstructural investigation. The phases formed during infiltration were analyzed using X-ray diffraction technique with Cu K radiation and morphology of the structure was carried out using FESEM equipped with EDX. Different types of compounds TiC, TiB2, TiB, MgB2, MgB4, B13C2 are formed in Mg matrix during synthesis process. The dissolution of Ti and B4C is found incomplete even at the highest synthesis temperature and holding time used in this study. The relative density is found to increase with temperature and decrease with time.

   In-situ composites, Ti and B4C powders, infiltration, X-ray diffraction


1.       M. Kulekci. Magnesium and its alloys applications in automotive industry, The International Journal of Advanced Manufacturing Technology, Vol. 39, No. 9, 2008, pp. 851-865 
2.       S.F. Hassan and M. Gupta, Development of a novel magnesium-copper based composite  with improved mechanical properties, Materials Research Bulletin, Vol. 37, No. 2, 2002, pp. 377-389 

3.       Q.C. Jiang, X.L. Li, and H.Y. Wang. Fabrication of TiC particulate reinforced magnesium matrix composites, Scripta Materialia, Vol. 48, No. 6, 2003, pp. 713-717 

4.       B.L. Mordike and T. Ebert. Magnesium: Properties-applications-potential, Materials Science and Engineering A, Vol. 302, No. 1, 2001, pp. 37-45 

5.       H.Y. Wang, Q.C. Jiang, X.L. Li, J.G. Wang, Q.F. Guan and H.Q. Liang. In-situ synthesis of TiC   from nanopowders in a molten magnesium alloy, Materials Research Bulletin, Vol. 38, No.     8, 2003, pp. 1387-1392. 232  

6.       Y. Wang, H.Y. Wang, K. Xiu, H.Y. Wang and Q. C. Jiang. Fabrication of TiB2 particulate  reinforced magnesium matrix composites by two-step processing method, Materials          Letters, Vol. 60, No. 12, 2006, pp. 1533-1537

7.       L.Q. Chen, Q. Dong, M.J. Zhao, J. Bi and N. Kanetake. Synthesis of TiC/Mg composites    with interpenetrating networks by in-situ reactive infiltration process, Materials Science           and Engineering: A, Vol. 408, No. (1-2), 2005, pp. 125-130 

8.       G. Wen, S.B. Li, B.S. Zhang and Z.X. Guo. Reaction synthesis of TiB2-TiC composites with  enhanced toughness, Acta Materialia, Vol. 49, No. 8, 2001, pp. 1463-1470

9.       W.J. Li, R. Tu, and T. Goto, Preparation of directionally solidified TiB2-TiC eutectic composites by a floating zone method, Materials Letters, Vol. 60, No. 6, 2006, pp. 839-               843

10.     X. Zhang, H. Wang, L. Liao, and N. Ma. New Synthesis Method and Mechanical Properties   of Magnesium Matrix Composites, Journal of ASTM International, 2005, Vol. 3, No. 10.               Paper No: JA1100618

11.     B. Ma, H. Wang, Y. Wang, and Q. Jiang. Fabrication of (TiB2−TiC)p/AZ91 magnesium  matrix hybrid composite, Journal of Materials Science, Vol. 40, No. 17, 2005, pp. 4501-             4504

12.     W. Cao, C. Zhang, T. Fan, and D. Zhang. In-Situ Synthesis and Compressive Deformation   Behaviors of TiC Reinforced Magnesium Matrix Composites, Materials Transactions, Vol.          49, No. 11, 2008, pp. 2686-2691

13.     A. Chaubey, B. Mishra, N. Mukhopadhyay, and P. Mukherjee. Effect of compact density  and preheating temperature of the Al–Ti–C preform on the fabrication of in-situ Mg–TiC               composites, Journal of Materials Science, Vol. 45, No.  6, 2010, pp. 1507-1513 

14.     D. Qun, L. Chen, Z. Mingjiu, and B. Jing. Analysis of in-situ reaction and pressureless  infiltration process in fabricating TiC/Mg composites, Journal of Materials Science and     Technology, Vol. 20, 2004, pp. 3-7

15.     L. Chen, J. Guo, , B. Yu, , and Z. Ma. Compressive Creep Behavior of TiC/AZ91D Magnesium-matrix Composites with Interpenetrating Networks, Journal of Materials       Science and Technology, Vol. 23, No. 2, 2007, pp. 207-212   

16.     V. Kevorkijan, and S.D. Skapin. Mg-B4C composites with a high volume fraction of fine eramic reinforcement, Journal of Materials and Manufacturing Processes, Vol. 24, 2009, pp. 1337-1340

17.     S. Brutti, G. Balducci, G. Gigli, A. Ciccioli, P. Manfrinetti, and A. Palenzona. Thermodynamic and kinetic aspects of decomposition of MgB2 in vacuum: Implications for optimization of synthesis conditions, Journal of Crystal Growth,  Vol. 289, No.2, 2006,              pp. 578-586 

18.     P. Shen, B. Zou, S. Jin, and Q. Jiang. Reaction mechanism in self-propagating high temperature synthesis of TiC-TiB2/Al composites from an Al-Ti-B4C system, Materials Science and Engineering: A, Vol. 454-455, 2007, pp. 300-309 

19.     D. Emin. Structure and single-phase regime of boron carbides, Journal of Review Letters B, Vol. 38, 1988, pp. 6041-6055





Ansila Henderson, Kavitha K V

Paper Title:

Scalable Image Search System

Abstract:    Several applications such as fingerprint identification, biodiversity information systems, digital libraries, crime prevention, medicine, historical research, among others uses the image search system for searching similar images. The goal of the scalable image search system is to support image retrieval based on content properties such edge and texture, encoded into feature vectors. Hashing technique is used to embed high dimensional image features into hamming space. The image search can be performed in real-time based on Hamming distance of compact hash codes. An extensive experiment on flickr image dataset demonstrates the performance of the proposed methods.

  Gray-Level Co-Occurrence Matrix (GLCM), Homogeneous Texture Descriptor (HTD, The Edge Histogram Descriptor (EHD)).


1.       P Maheswary, Dr. N Srivastava, “Retrieval of Remote Sensing Images Using  Colour & Texture Attribute”,(IJCSIS) International Journal of Computer Science and Information Security, Vol. 4,No. 1&2, 2009.
2.       S. Oraintara, T. T. Nguyen, “Using Phase and Magnitude Information of the Complex directional Filter Bank for Texture Image Retrieval”, IEEE International Conference on Image Processing, Vol. 4, Pages 61-64, Oct. 2007.

3.       Datta. R, Joshi. D, Li.J, and Wang .J.Z, “Image retrieval: Ideas, influences, and trends of the new age,” ACM Comput. Surveys, vol. 40, no.2, 2008.

4.       Yu-Gang Jiang, Jun Wang, Xiangyang Xue, and Shih-Fu Chang, “Query-Adaptive Image Search with Hash Codes” IEEE transactions on multimedia, VOL. 15, NO. 2, Feb 2013.

5.       J.Zobel and A. Moffat, “Inverted files for text search engines,” ACM Comput. Surveys, 2006. 

6.       M. D. H. Jegou and C. Schmid, “Packing bag-of-features,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2009.

7.       J. L. Bentley, “Multidimensional binary search trees used for associative searching,” Commun. ACM, vol. 18, no. 9,  pp. 509–517, 1975.

8.       M. Muja and D. G. Lowe, “Fast approximate nearest neighbors with automatic algorithm configuration,” in Proc. Int. Conf. Computer Vision Theory and Applications, 2009, pp. 331–340.

9.       D. Nister and H. Stewenius, “Scalable recognition with a vocabulary tree,” in Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2006.

10.     C. Silpa-Anan and R. Hartley, “Optimised kd-trees for fast image descriptor matching,” Proc. IEEE Conf. Computer Vision and Pattern Recognition, 2008.

11.     M. Kan and S. Shan, “Semisupervised Hashing via Kernel Hyperplane Learning for Scalable Image Search,” IEEE trans. circuits and systems for video technology,
vol. 24, 2014.

12.     P. Indyk and R. Motwani, “Approximate nearest neighbors: Towards removing the curse of dimensionality,” in Proc. Symp. Theory of Computing, 1998.

13.     Y.Weiss, A. Torralba, and R. Fergus, “Spectral hashing,” in Adv. Neural Inf. Process. Sys., 2008.

14.     B. Kulis and T. Darrell, “Learning to hash with binary reconstructive embeddings,” in Adv. Neural Inf. Process. Syst., 2009.

15.     R.-S. Lin, D. A. Ross, and J. Yagnik, “Spec hashing: Similarity preserving algorithm for entropy-based coding,” in Proc. IEEE Conf. Computer Vision and Pattern
Recognition, 2010.

16.     J. Wang, S. Kumar, and S.-F. Chang, “Sequential projection learning for hashing with compact codes,” in Proc. Int. Conf.Machine Learning, 2010.

17.     M. M. Mushrif and Y.K. Dubey, “Texture Classification Using Cosine-modulated Wavelets,” International Journal of Computer and Electrical Engineering, Vol. 4, No. 3, June 2012.

18.     M. M. Mushrif and Y.K. Dubey, “Extraction of Wavelet Based Features for Classification of T2-Weighted MRI Brain Images,” Signal & Image Processing: An International Journal (SIPIJ) Vol.3, No.1, February 2012.

19.     G. Duan, J. Yang and Y. Yang,” Content-Based Image Retrieval Research,” International Conference on Physics Science and Technology, Science Direct, 2011.

20.     Huang, Ying Hou, “Segmentation of Textures using PCA Fusion Based Gray-Level Co-Occurrence Matrix Features”, IEEE, 2009.

21.     D.K.Park, Y.S.Jeon,C.S.Won, “Efficient Use of Local Edge Histogram Descriptor”,  ACM Multimedia Proceedings, November 2000, pp.51-54.

22.     J. Wang, S. Kumar, and S.F. Chang, “Semi-supervised hashing for large-scale search,” IEEE transactions on pattern analysis and machine intelligence, Vol. 34, No. 12, December 2012.

23.     T.-S. Chua, J. Tang, R. Hong, H. Li, Z. Luo, and Y.T. Zheng, “Nus- Wide: A Real-World Web Image Database from National University of Singapore,” Proc. ACM Conf. Image and Video Retrieval, July 2009.





Adarsh S S, Kavitha K V

Paper Title:

Online Human Detection using HOG and RSCBFD Algorithm

Abstract:   Human detection has many applications in many fields such as robotics, surveillance, user interface design, Human Activity Recognition etc. Many approaches are available for human detection. A new approach for human detection is introduced here, a combination of two algorithms like HOG and RSCBFD algorithm. The combined algorithm helps the system to be faster than previous systems and provides better accuracy also. Since it is fast, the method can use for real time systems. The performance of the system is compared and analyzed with some previous methods.

   gradient, HOG, RSCBFD, cosine similarity.


1.       G N. Dalal and B. Triggs, “Histograms of oriented gradients for human detection,” INRIA France.
2.       Amit Satpathy, Xudong Jiang and How-Lung Eng, “Human detection using discriminative and robust local binary pattern,” IEEE Int. Conf. Acoustics, Speech and Signal Processing, May 2013.

3.       Jianxin Wu, Christopher Geyer and James M. Rehg, “Real-time human detection using contour cues,” ICRA, p. 860–867, 2011.

4.       Z. Kalal, J. Matas, and K. Mikolajczyk, “Online learning of robust object detectors during unstable tracking,” in Proc. IEEE OLCV, 2009, pp. 1417–1424.

5.       Sanjay Kr. Singh, D. S. Chauhan, Mayank Vasta and Richa Singh “A robust skin color based face detection algorithm,” Tamkang Journal of Science and Engineering, vol. 6, pp. 227–234, 2003.





Saranya C.G., Lizy Abraham

Paper Title:

An Automated System for Glaucoma Diagnosis

Abstract:    Glaucoma is one among the major eye diseases which, if not treated, can lead to permanent blindness. Diagnosis of glaucoma in early stages plays a key role in preventing vision loss. The optic cup-to-disc ratio (CDR) in retinal fundus images is one of the principle physiological characteristics in the diagnosis of glaucoma. Currently, CDR is computed manually by specially trained clinician which is a time consuming and resource intensive process. This drew the attention of researchers in developing an automated system to aid ophthalmologists in glaucoma diagnosis. A new method for glaucoma screening based on CDR measurement is presented and discussed here. Active contour is used to find optic disc boundary and there by optic disc diameter is computed. Blue channel intensity profile is plotted to calculate optic cup diameter. Higher value of CDR indicates glaucoma whereas normal eyes have small CDR value. The method was tested on publicly available database HRF and has attained better results than conventional approaches.

   Active contour, Cup-to-disc ratio (CDR) Glaucoma, Optic disc.


1.             World Health Organization, VISION2020: The Right to Sight, Global Initiative for the Elimination of Avoidable Blindness: Action Plan 2006 –2011, World Health Organization, Geneva, Switzerland; 2007; page no.1–2.
2.             Quigley H.A., Broman A.T., The number of people with glaucoma worldwide in 2010 and 2020. Br J Ophthalmol. 2006; 90:262-267. Available: http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1856963.

3.             Adam Hoover and Michael Goldbaum, “Locating the Optic Nerve in a Retinal Image Using the Fuzzy Convergence of the Blood Vessels” IEEE Transactions on Medical Imaging, Vol. 22, No. 8, August 2003.
4.             Jun Cheng, Jiang Liu, Yanwu Xu, Fengshou Yin, Damon Wing Kee Wong, Ngan-Meng Tan, Dacheng Tao, Ching-Yu Cheng, Tin Aung, and Tien Yin Wong, “Superpixel Classification Based Optic Disc and Optic Cup Segmentation for Glaucoma Screening”, IEEE Transactions on Medical Imaging, Vol. 32, No. 6, June 2013.
5.             N.M. Tan, J. Liu, D.W.K. Wong, F. Yin, J.H. Lim, and T.Y. Wong, “Mixture Model-based Approach for Optic Cup Segmentation”, 32nd Annual International Conference of the IEEE EMBS.

6.             Yanwu Xu, Jiang Liu, Jun Cheng, Fengshou Yin, Ngan Meng Tan, Damon Wing Kee Wong, Mani Baskaran, Ching Yu Cheng and Tien Yin Wong, “Efficient Optic Cup Localization Using Regional Propagation Based on Retinal Structure Priors”, 34th Annual International Conference of the IEEE EMBS, San Diego, California USA, 28 August - 1 September, 2012.

7.             Gopal Datt Joshi, Jayanthi Sivaswamy, S. R. Krishnadas, “Depth Discontinuity-Based Cup Segmentation from Multiview Color Retinal Images”, IEEE Transactions on Biomedical Engineering, Vol. 59, No. 6, June 2012.

8.             R. C. Gonzales and R. E. Woods, Digital Image Processing, 2002 Prentice Hall.
9.             T. Chan and L. Vese, Active contours without edges, IEEE transactions on image processing 10 (2) (2001), pp. 266-277.
10.          Yuji Hatanaka, Atsushi Noudo, Chisako Muramatsu, Akira Sawada,  Takeshi Hara, Tetsuya Yamamoto, and Hiroshi Fujita, “Automatic Measurement of Cup to Disc Ratio Based on Line Profile Analysis in Retinal Images”, 33rd Annual International Conference of the IEEE EMBS Boston, Massachusetts USA, August 30 - September 3, 2011.

11.          High-Resolution Fundus (HRF) Image Database. Available: https://www5.cs.fau.de/research/data/fundus-images.





Aswathy R P, Resmi R

Paper Title:

Analysis of The Effects of Microstrip Configurations on RF MEMS Tunable Transformation Filters

Abstract:    In this paper an RF microelectromechanical (MEMS) tunable bandpass to bandstop transformation filter designed for 3-4.2 GHz with low insertion and return loss and the effect of substrate thickness was analyzed. The bandpass to bandstop transformation is achieved by adjusting the coupling parameters of microstrip resonator. The microstrip resonator is designed by coupling more than one microstrip lines resulting in the independent tuning of centre frequency and the bandwidth. The simulative analysis of the effect of different microstrip configurations in microstrip bandpass to bandstop tunable filter is performed using COMSOL Multiphysics software.  

   Micro Electro Mechanical Systems (MEMS), Bandpass to Bandstop Tunable Filter, Microstrip Resonator,S parameter.


1.             Two and Four pole Tunable 0.7-1.1-Ghz Banpass to Bandstop Filters With Bandwidth Control, Young-Ho Cho,Member,IEEE, AND Gabriel M. Rebiez, Fellow, IEEE
2.             David M. Pozar, “Microwave Engineering” 2nd ed. John Wiley and Sons,Inc. 1998.

3.             A.A. Sulaiman, M.F. Ain, “A Design of Microwave Resonator”, DNCOCO 2008, pp.18-21.
4.             Mudrik Alaydrus, “Designing Microstrip Bandpass Filter at 3.2 GHz”, International Journal on Electrical Engineering and Informatics - Volume 2, Number 2, 2010.

5.             Hong, J. S. and M. J. Lancaster, “Microstrip Filters for RF/microwave Applications”, Wiley, New York, 2001.

6.             G.M. Rebeiz, K. Entesari, I. C. Reines, S.-J. Park, M. A. El-Tanani, A. Grichener, and A. R.Brown, “Tuning in to RFMEMS,” IEEE Microw. Mag., vol. 10, no. 6, pp. 55–72, Oct. 2009.

7.             M.A. El-Tanani and G. M. Rebeiz, “Corrugated microstrip coupled lines for constant absolute bandwidth tunable filters,” IEEE Trans. Microw. Theory Techn, vol. 58, no. 4, pp. 956–963, Apr. 2010.

8.             M.Sanchez-Renedo, “High-selectivity tunable planar combline filter with source/load-multiresonators coupling,” IEEE Microw. Wireless Compon. Lett, vol. 17, no. 7, pp. 513–515, Jul. 2007.

9.             M. A. El-Tanani and G. M. Rebeiz, “A two-pole two-zero tunable filter with improved linearity,” IEEE Trans. Microw. Theory Techn, vol. 57, no. 4, pp. 830–839,
Apr. 2009.
10.          H. Joshi, H. H. Sigmarsson, S. Moon, D. Peroulis, and W. J. Chappell, “High- fully reconfigurable tunable bandpass filters,” IEEE Trans. Microw. Theory Techn. vol. 57, no. 12, pp. 3525–3533, Dec. 2009.
11.          A.K. Tiwary and N. Gupta, “Design of Compact Coupled Microstrip Line Bandpass Filter with Improved Stopband Characteristics”, Progress In Electromagnetics
Research C, Vol.24, 97–109, 2011.

12.          Y.-C. Chiou and G.M. Rebeiz, “A tunable three-pole 1.5–2.2-GHz bandpass filter with bandwidths and transmission zero control,” IEEE Trans. Microw. Theory Techn, vol. 59, no. 11, pp. 2872–2878, Nov. 2011.

13.          Abunjaileh and I. C. Hunter, “Tunable bandpass and bandstop filters based on dual-band combline structures,” IEEE Trans. Microw. Theory Techn.vol. 58, no. 12, pp. 3710–3719, Dec. 2010.

14.          Jayaseelan Marimuthu, Amin M. Abbosh, and Bassem Henin “Planar Microstrip Bandpass Filter”, Progress In Electromagnetics Research C, Vol. 35, 2013.

15.          C.-C.Cheng and G.M.Rebeiz, “High- 4–6-GHz suspended stripline RF MEMS tunable filter with bandwidth control,” IEEE Trans. Microw. Theory Techn.vol. 59, no. 10, pp. 2469–2476, Oct. 2011.





Arathy U S, Resmi R

Paper Title:

Analysis of Pull-in Voltage of a Cantilever MEMS Switch with Variable Beam Parameters

Abstract:    Micro Electro Mechanical Systems (MEMS) Switches have become very popular in the Electronics industry and we need to carefully select beam material for reliability and better performance. A variety of materials are available to be used as bridge material in RF MEMS switches. A cantilever beam is used to change the state and actuation of RF MEMS switch. It is made mostly using aluminum, copper or gold. This paper investigates which is the best material to be used as beam material  for achieving lower pull-in voltage . The effect of different beam parameters on the RF and DC performance of MEMS series switches are also analyzed. Characterization of cantilever MEMS switches have been carried out by means of 3D simulation using COMSOL Multiphysics based on Finite Element Method [FEM]. Pull-in voltage can be reduced by carefully selecting beam material and it can further be reduced by modifying beam parameters. These parameters are also having a main role in improving RF performance of switches.

   Micro Electro Mechanical Systems (MEMS), MEMS Switch, Pull-in voltage,  COMSOL.


1.             Rebeiz G M,“RF MEMS: Theory, Design and Technology”2003 IEEE International Conference.
2.             Jae Y. Park, Jong U. Bu, Joong W. Lee,“RF MEMS Devices for Wireless Applications”, Journal of semiconductor technology and science, Vol. 1,   No. 1, March 2001.

3.             Liang Lv, Zhongliang Dengl, Fu Zhao,Yude Liu, Ke Han,“Analysis and Simulation of RE MEMS Switch for  Wireless Communication”, 2005.

4.             Rekha Yadav, Rajesh Yadav, Vijay Nehra, K j Rangara, “RF MEMS Switches: Fabrication, Key Features, Application & Design Tools” on International Journal of Electronics Engineering, 3 (2), 2011, pp. 179– 183.

5.             Y.Liu,“MEMS and BST Technologies for Microwave Applications”, Ph.D. Thesis, University of California, Santa Barbara, 2002.

6.             Dennis L. Polla,“MEMS technology for biomedical applications”, 2001.

7.             Leland, E.S., Sherman, C.T., Minor, P., White, R.M., Wright, P.K.,“A new MEMS sensor for AC electric current”, Nov. 2010.
8.             W.Simon, B.Schauwecker, A.Lauer, A.Wien,“Designing a Novel RF MEMS SWITCH for Broadband Power Applications”, June 2002.
9.             M. Manivannan, R. Joseph Daniel, and K. Sumangala, “Low Actuation Voltage RF MEMS Switch Using Varying Section Composite Fixed-Fixed Beam”International Journal of Microwave Science and Technology, Volume 2014, Article ID 862649

10.          Tejinder Singh, “Effective Stress Modeling of Membranes Made of Gold and Aluminum Materials Used in Radio-Frequency Micro Electro Mechanical System Switches”, Transactions on Electrical and Electronic Materials, Vol. 14, No. 4, pp. 172-176, August 25, 2013.

11.          Gholamhosein Moloudian, Asghar Ebrahimi, Nemat allah Monsef and Arman Aghajeri, “Analysis high frequency of RF MEMS switches with electrostatic actuation” International Research Journal of Applied and   Basic Sciences © 2013 Vol, 4 (10): 3220-3225.

12.          Rinky Sha, Rowdra Ghatak and Rajat Mahapatra, “Impact of Beam Thickness and Air Gap on the Performance of Cantilever Mems Switch” in IJECT Vol. 4, Issue Spl – 1, Jan – March 2013.

13.          Rinky Sha, Rajat Mahapatra and Rowdra Ghatak, “Study of  Microwave Behaviors of Cantilever RF MEMS Switch” in 2014 International Conference on Control, 
14.          R. A. Dahleh, R. R. Mansour,“A novel wraped beam design that enhances RF performance of capacitive MEMS”.





Lekshmi Balakrishnan, Soja Salim

Paper Title:

Achieving Efficient Ranked Multikey word Search over Outsourced Cloud Data 

Abstract:    With the arrival of cloud computing, sensitive data are being centralized into the cloud. Data owners are allowed to store their complex data from their local systems to the public cloud. For the protection of data privacy, sensitive information is encrypted using any of the cryptographic algorithms before outsourcing it to cloud. Data owners outsource their data in encrypted form onto the cloud which makes effective data utilization based on plain text keyword search a challenging task. There are many traditional searchable encryption schemes which allow users to search over the encrypted data but most of them only support single keyword search. In this paper, multikeyword ranked searching technique is used which supports multikeyword searching. This method uses the concept of coordinate matching which captures the similarity between query and documents. This paper proposes a ranking method which uses the principle of coordinate matching and adds additional security functions to protect the data stored in the cloud. The proposed scheme introduces low overhead on computation and communication.

   Cloud computing, Coordinate matching, Searchable encryption, Ranked Search.


1.                L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, “A break in the clouds: towards a cloud definition,” ACM SIGCOMM Comput. Commun. Rev., vol. 39, no. 1, pp. 50–55, 2009.
2.                S. Kamara and K. Lauter, “Cryptographic cloud storage,” in RLCPS, January 2010, LNCS. Springer, Heidelberg.

3.                R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of ACM CCS’06, 2006.

4.                M. S. I. M. K. Mehmet Kuzu, “Efficient similarity search over encrypted data,” IEEE 28th International Conference on Data Engineering, 2012.

5.                D. W. D. Song and A. Perrig, “Practical techniques for searches on encrypted data,” in Proc. of S&P, 2000.

6.                S. Zittrower and C. C. Zou, “Encrypted phrase searching in the cloud,” in IEEE Symposium on Security and Privacy, 2012.

7.                Y. Z. G. X. J. Y. P. Lu and M. Li, “Toward secure multikeyword top-k retrieval over encrypted cloud data,” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, vol. 10, Aug 2013.

8.                O. R. P. G. Boneh D, Crescenzo G, “Public key encryption with keyword search,” In: Proceedings of Eurocrypt,, 2004.

9.                J. L. K. R. C. Wang, N. Cao and W. Lou, “Secure ranked keyword search over encrypted cloud data,” Proc. IEEE 30th Int’l Conf. Distributed Computing Systems (ICDCS ’10), 2010.

10.             H. Witten, A. Moffat, and T. C. Bell, “Managing gigabytes: Compressing and indexing documents and images,” Morgan Kaufmann Publishing, San Francisco, May 1999.

11.             S. Zerr, D. Olmedilla, W. Nejdl, and W. Siberski, “Zerber+r: Top-k retrieval from a confidential index,” in Proc. of EDBT, 2009





Linsa M L, Resmi R

Paper Title:

The Effect of Variable DC Gap and Various Piezo Electric Materials on Resonant Frequency in MEMS EVATunable Filters

Abstract:    Micro Electro Mechanical Systems (MEMS) are systems based on a variety of technologies whereby tiny mechanical elements with excellent system properties can be implemented. Evanescent Mode (EVA) tunable cavity filters for RF/microwave frequencies shows potential components in communication system because of its extensive tuning range, elevated unloaded quality factor, reduced size and weight. The application of bring in voltage create electric field within the cavity. The electric field is produced in the gap connecting post and diaphragm. The effect of DC applied gap on electric field distribution for different values of input DC voltage in an EVA tunable MEMS structure is analyzed. The validation of scattering parameter (S21 parameter) is also done which indicates a shift in the resonant frequency with both negative and positive applied voltage. The resonant frequency shifts more in case of negative bias supply voltage. The various materials used for piezoelectric diaphragm varies the resonant frequency. The materials having similar chemical compositions results in identical frequency while having different engineered  domain configuration have variable resonant frequency.

   Micro Electro Mechanical Systems(MEMS), Evanescent Mode Cavity Filter, DC Gap, S21 Parameter, Piezoelectric Diaphragm


1.              H. Joshi, H. H. Sigmarsson, D. Peroulis, and W. J. Chappell,    “Highlyloaded evanescent cavities for widely tunable high-Q filters,” in 2007IEEE MTT-S Int. Microw.
Symp. Dig., Jun. 2007, pp. 2133–2136.

2.              X. Liu, L. P. B. Katehi, W. J. Chappell, and D. Peroulis, “A 3.4–6.2 GHz continuously tunable electrostatic MEMS resonator with qualityfactor of 460–530,” in IEEEMTT-S Int.Microw. Symp.Dig., Jun. 2009,pp. 1149–1152.

3.              S. Park, I. Reines, and G. Rebeiz, “High-Q RF MEMS tunable evanescent-mode cavity filter,” in IEEEMTT-S Int. Microw. Symp. Dig., Jun.2009, pp. 1145–1148.

4.              G. M. Rebeiz, RF MEMS, Theory, Design and Technology.NewYork: Wiley, 2003.

5.              X. Liu, L. P. B. Katehi, W. J. Chappell, and D. Peroulis, “Power Handling of Electrostatic MEMS Evanescent-Mode (EVA) Tunable Band pass Filters” IEEE
Transactions on Microwave theory and Techniques, vol. 60, no. 2, February 2012.

6.              Y. Lu, “RF MEMS devices and their applications in reconfigurable   RF/microwave circuits,” Ph.D. dissertation, Dept. Electr. Eng. Comput. Sci., Univ. of Michigan, Ann Arbor, 2005.

7.              X. Liu, L. P. B. Katehi, W. J. Chappell, and D. Peroulis, “High-Q TunableMicrowave Cavity Resonators and Filters using SOI-based RF MEMS Tuners”, IEEE/ASME Journal of Microelectromechanical System, vol. 19, no. 4, pp. 774-784, Aug. 2010.

8.              X. Liu, L. P. B. Katehi, W. J. Chappell, and D. Peroulis, “High-Q continuously tunable electromagnetic cavity resonators and filters using SOI-based RF MEMS actuators,” IEEE/ASME J. Microelectromech. Syst.,vol. 19, no. 4, pp. 774-784, July 2010.

9.              D. Girbau, N. Otegi, L. Pradell, and A. Lazaro, “Study of       intermodulation in RF MEMS variable capacitors,” IEEE Trans. Microw. Theory Tech., vol. 54, no. 3, pp. 1120–1130, Mar. 2006.

10.           L. Dussopt and G. M. Rebeiz, “Intermodulation distortion and powerhandling in RF MEMS switches, varactors, and tunable filters,” IEEETrans. Microw. Theory Tech., vol. 51, no. 4, pp. 927–930, Apr. 2003.

11.           J.Johnson, G. G. Adams, and N. E. McGruer, “Determination of intermodulation distortion in a MEMS microswitch,” in IEEE MTT-S Int.Microw. Symp. Dig., Jun. 2005, pp. 2135–2138.

12.           Xiaoguang Liu, Eric Naglich and DimitriosPeroulis, “Non-linear Effects in MEMS Tunable Bandstop Filters”, 978-1-4673-1088-8/12/$31.00 ©2012 IEEE

13.           Pierre Blondy and DimitriosPeroulis“ Handling RF Power”  IEEE Microwave Magazine 1527-3342/13/$31.00©2013 IEEE January/February 2013.





Shima V M, Lekshmy D Kumar

Paper Title:

Public Auditing of Data Stored in Cloud By Preserving Privacy

Abstract:    In cloud computing users can store their data into a cloud server which is located remotely so that users can use high quality applications and services by using available computing resources. The overhead of storing and maintaining local data can be avoided. The problem is that the users no control over their outsourced data makes the integrity of data in cloud server a difficult task. The task is very difficult for users with constrained computing resources. The benefit of cloud computing are those users can use the cloud storage as if it is local. For providing integrity to the data that stored in cloud, users can enable public auditability for cloud storage. Users can resort to a third party auditor (TPA) to check the correctness of their outsourced data and no need to worry about their data integrity. For effective auditing TPA should not introduce any vulnerability. That is user require privacy from the TPA.  The auditing method uses homomorphic encryption with random masking technique which provides greater privacy. This paper is based on a secure cloud storage system supporting privacy preserving public auditing.

   Cloud computing, Auditing, Batch signature, Multicast authentication etc.


1.              W. L. C.Wang, “Privacy-preserving public auditing for storage security in cloud computing,” in Proc of IEEE INFOCOM, 2013.
2.              .W. H Shacham, “Compact proofs of retrievability,” in Proc of Asiacrypt, 2008.

3.              G. Ateniese, S. Kamara, and J. Katz, “Proofs of Storage from Homomorphic Identification Protocols,” Proc. 15th Int’l Conf. Theory and Application of Cryptology and Information Security: Advances in Cryptology (ASIACRYPT), pp. 319-333, 2009.

4.              Q. N. S Marium, “Implementation of eap with rsa for enhancing the security of cloud computing,” International Journal of Basic and Applied Science, 2012.

5.              G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, “Provable Data Possession at Untrusted Stores,” Proc. 14th ACM Conf. Computer and Comm. Security (CCS ’07), pp. 598-609, 2007

6.              Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 5, pp. 847-859, May 2011.

7.              Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud Computing,  http://www.cloudsecurityalliance.org, 2009.

8.              V. R. D. P K Deshmukh, “Investigation of tpa for cloud data security,” International Journal of Scientific and Engineering Research, 2013.

9.              C. Wang, Q. Wang, K. Ren, and W. Lou, “Towards Secure and Dependable Storage Services in Cloud Computing,” IEEE Trans. Service Computing, vol. 5, no. 2, 220-232, Apr.-June 2012

10.           R.C. Merkle, “Protocols for Public Key Cryptosystems,” Proc. IEEE Symp. Security and Privacy, 1980.

11.           Y. Zhou, X. Zhu, and Y. Fang, “MABS: Multicast Authentication Based on Batch Signature,” IEEE Trans.Mobile Computing, vol. 9, pp. 982-993, July 2010

12.           12. K.D. Bowers, A. Juels, and A. Oprea, “HAIL: A High-Availability and Integrity Layer for Cloud Storage,” Proc. ACM Conf. Computer and Comm. Security (CCS ’09), pp. 187-198, 2009.





Anish S, Preeja V

Paper Title:

A Novel Method on Malayalam Handwritten Character Recognition

Abstract:   Handwritten Character Recognition (HCR) is one of the most challenging and active areas of research in the field of pattern recognition. It has a wide range of applications like preservation of documents into digital form, managing rare books etc. HCR is a difficult process due to the variants of handwriting styles of different individuals. Thus the success rate of any HCR system greatly depends upon the language that these systems are working on, and the amount of character sets in each language. Malayalam, a south Indian language and official language in the state of Kerala has a rich amount of character sets. Recognizing all those characters is a difficult task. In any types of character recognition systems, recognition rates play a vital role in the overall efficiency of the system. Several researches are going on this field to improve recognition rates. This paper deals with texture extraction model for character recognition process. In this model co-occurrence matrix and Euclidean distance are used to recognize the characters in an image.

   Binarization, Co-occurrence Matrix, Euclidean Distance, Segmentation


1.             Abdul Rahiman M, M S Rajasree “Printed Malayalam character recognition using back propagation neural networks” International Advanced Computing Conference ,IACC 2009.
2.             Gaurav Kumar, Pradeep Kumar Bhatia “Neural Network based approach for recognition of text images” International Journal of Computer Applications, 2013.

3.             Lajish V.L “” Handwritten Character recognition using perpetual fuzzy zoning and class modular neural networks,”Proc.Of 4th Int.National Conf.on Innovations in IT,pp.188-192,2007.

4.             G.Raju, “Wavelet transform and projection profiles in handwritten character recognition-a performance analysis” Proc.Of 16th International Conference on Advanced Computing and Communications,pp.309-314,2008.

5.             G.R John, D.Guru “1-D wavelet transform of projection profiles for isolated handwritten character recognition” Proc.Of ICCIMA07, Sivakasi, pp.481-485, 2007.

6.             Jomy John, Pramod K.V, Kannan Balakrishnan “Unconstrained Handwritten Malayalam Recognition using Wavelet Transform and Support Vector Machine Classifier” International Conference on Communication Technology and System Design 2011.

7.             Abdul Rahiman M, M S Rajasree “Recognition of  Handwritten Malayalam Characters using Vertical and Horizontal Line Positional Analyzer Algorithm” International Conference on Machine Learning and Computing(ICMLC 2011).

8.             Ostu.N “A threshold selection method from gray level histograms” IEEE Trans.Systems, Man and Cybernetics, Vol.9, pp.62-66, 1979.

9.             Lajish V.L “Handwritten character recognition using gray scale based state space parameters and class modular neural networks ” Proc.Of 4th Int.National Conf.on Innovations in IT,pp.374-379,2007.

10.          A. Materka and M. Strzelecki, “Texture analysis methods – a review,” http://www.eletel.p.lodz.pl, 2010.





Beena J Stuvert, Soniya B

Paper Title:

Bots C&C Traffic Detection Using Decision Tree Based Classifier

Abstract:    In recent years, the root cause of many security problems on the Internet are botnets.  A botnet is a network of compromised computers under the control of bot code. When accessing a bot infected sites, these bot code are installed into the victim machine.  Once the bot code affects a victim machine, it became part of the botnet. These botnets are the major cause of cyber-crimes such as spamming, phishing, click fraud etc. Bot is a type of malware and it differ from other class of malware is its command and control (C&C) channels.  Thus the effective way to detect botnet is based on the command and control channels. This work presents a system that detects botnet based on the statistical features of the communication between bot and its botmasters without performing packet payload inspection. The proposed system uses machine learning technique to identify the features of the command and control channel. Based on the extracted feature a model is created to detect unknown bot traffic.  Both classification and clustering methods are used to create the models and the detection accuracy and false positive rate of these methods are compared. The detection accuracy of the model is evaluated on standard real dataset, CTU-13 dataset.  The experimental result shows that, both algorithms provide very good detection rate in CTU-13 dataset. Also, the false positive rate of the model is evaluated using another standard dataset, LBNL dataset.  The evaluation results shows that the classification algorithm has less false positive rate compared to clustering.

   Bot, Botnet, Command and control, Machine learning, Malware.


1.          P.V. Amoli M. Safari M. Zamani H.R. Zeidanloo, M.J. Shooshtari. A taxonomy ofbotnet detection techniques. in: 3rd IEEE International Conference on ComputerScience and Information Technology (ICCSIT), 2:158–162, 2010
2.          M. Dacier F. Pouget. Honeypot-based forensics. Asia Pacific Information technology Security Conference, 2004.R. Curtmola, J. A. Garay, S. Kamara, and R. Ostrovsky, “Searchable symmetric encryption: improved definitions and efficient constructions,” in Proc. of ACM CCS’06, 2006.

3.          T. Holz J. Goebel. Rishi: identify bot contaminated hosts by irc nickname evaluation. Proceedings of the first conference on First Workshop on Hot Topics in
Understanding Botnets, USENIX Association, Berkeley, CA, USA, page 8, 2007.

4.          T. Holz J. Goebel C. Kruegel E. Kirda P. Wurzinger, L. Bilge. Automatically generating models for botnet detection. in: M. Backes, P. Ning (Eds.), ComputerSecurity – ESORICS 2009, Lecture Notes in Computer Science, vol. 5789,Springer, Berlin/Heidelberg,, page 232–249, 2009.

5.          L. Khan B. Thuraisingham K. Hamlen M. Masud, T. Al-khateeb. Flow-based identification of botnet traffic by mining multiple log files. First InternationalConference on Distributed Framework and Applications,,page 200–206, 2008 .

6.          T. Limmer T. Holz K. Rieck, G. Schwenk and P. Laskov. Botzilla: Detecting the phoning home of malicious software. In Proceedings of the 25th ACM Symposiumon Applied Computing (SAC), March 2010.

7.          W. Lee G. Gu, J. Zhang. Botsniffer – detecting botnet command and control channels in network traffic. in: 15th Annual Network & Distributed System SecuritySymposium, The Internet Society (ISOC), San Diego, 2008.

8.          J. Zhang W. Lee G. Gu, R. Perdisci. Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. in: Proceedings ofthe 17th Conference on Security Symposium, USENIX Association, Berkeley, CA,USA, page 139– 154, 2008.

9.          William Robertson EnginKirdaLeyla Bilge, DavideBalzarotti. Disclosure: Detectingbotnet command and control servers through large-scale netflow analysis.ACM, 2012.

10.       Norbert PohlmannChristainJ.Dietrich, ChristainRossow. Cocospot: Clustering and recognizing botnet command and control using traffic analysis. Computernetworks, Elsevier, 2012.

11.       Giovanni Vigna Christopher Kruegel Florian Tegeler, Xiaoming Fu. Botfinder: Finding bots in network traffic without deep packet inspection. ACM, 2012.

12.       J. R. Quinlan, “C4.5: Programs for Machine Learning”, San Mateo CA:Morgan Kaufman, 1993.





Adnan Hussein Ali, Begared Salih Hassen, Aassia Mohammed Ali Jassim

Paper Title:

FPGA Based 12-Tuple Fast Packet Classification IP Core for SoC Design

Abstract:    Due to increased demand for the speed of communication over Internet. Packet header analysis and classification needs to be performed at same speed in network devices to provide Quality of Service (QoS). As network speed is increasing quickly, high speed packet classification is required at wire speed. In this paper, we propose a novel FPGA based pipelined architecture intended for 12-tuple packet classification on gigabit networks such as 1G/10G/40G/100G. Our solution also enables wire speed packet classification which can be used in Ethernet based SoC designs. It takes one clock cycle to classify the packet after arrival of required information. The proposed method has been designed and synthesized on FPGA using VHDL and can be reused in powerful high speed Ethernet based communication devices. The architecture is optimized for high speed processing and consumes only small amount of FPGA resources. More than 85% throughput can be achieved.

   IP, FPGA, Packet Classification. Router, SoC.


1.              Wang Yong-gang; Zhang Tao; Zheng Yu-feng; Yang Yang "Realization of FPGA-based packet classification in embedded system",  Instrumentation and Measurement Technology Conference, 2009. I2MTC '09. IEEE, On page(s): 938 – 942
2.              A Configurable FPGA-Based Traffic Generator for High-Performance Tests of Packet Processing Systems Andreas Tockhorn, Peter Danielis, Dirk Timmermann ICIMP 2011 : The Sixth International Conference on Internet Monitoring and Protection

3.              Yeim-Kuan Chang, Yi-Shang Lin, and Cheng-Chien Su “A High-Speed and Memory Efficient Pipeline Architecture for Packet Classification” 2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines

4.              Y.K. Chang, “Efficient Multidimensional Packet Classification with Fast Updates,” IEEE Transactions on Computers, Vol. 58, No. 4, pp. 463-479, Apr. 2009.

5.              S. Dharmapurikar, H. Song, J. Turner, and J. Lockwood, “Fast Packet  Classification Using Bloom Filters,” In ACM/IEEE ANCS, 2006.

6.              W. Jiang and V. K. Prasanna, “Large-Scale Wire-Speed Packet Classification on FPGAs,” In ACM/SIGDA FPGA, 2009.

7.              Raja Jitendra Nayaka, R.C.Biradar “High Performance Ethernet Packet Prcocessor Core for Next      Gention network” International Journal of Next-Generation Networks (IJNGN) Vol.4, No.3,September 2012.pp.89

8.              W. Jiang and V. K. Prasanna, “A Memory-Balanced Linear Pipeline Architecture for Trie-Based IP Lookup,” In IEEE HOTI, 2007

9.              Kennedy, X. Wang, Z. Liu, and B. Liu, “Low Power Architecture for High Speed Packet Classification,” In ACM/IEEE ANCS, 2008.

10.           Yu  Lei,  Deng  Ya-Ping, Wang  Jiang-Bo,  Jiang  Chao-Yong,“A Novel  IP Packet Classifcation Algorithm Based on Hierarchical Intelligent Cuttings”, The 6th International Conference on ITS Telecommunication Proceedings, 2006,pp. 1033-1036.

11.           Zheng  Kai,  Liang  Zhiyong,  Ge  Yi,“Parallel  Packet Classifcation  via  Policy Table  Pre-Partitioning”,  IEEE Globecom, 2005, pp. 73-78.

12.           Xuehong Sun, Sartaj K. Sahni, Yiqiang Q Zhao,“Packet Classifcation Consuming Small Amount of Memory”, IEEE/ ACM TRANSACTIONS ON NETWORKING, 2005, Vol.13(5), pp. 1135-1145.

13.           Zhen Xu, Jun Sun, Jun Zhang,“A Novel Hash-based Packet Classifcation Algorithm”, ICICS 2005, pp. 1054-1059.

14.           D. E. Taylor, “Survey and Taxonomy of Packet Classification Techniques,”  ACM Computing Surveys, vol. 37, no.3, pp. 238-275, Sep. 2005.

15.           D. E. Taylor and J. S. Turner, “ClassBench: A Packet Classification Benchmark,” IEEE/ACM Transations on Networking, vol. 15, no. 3,  pp. 499-511, June 2007.

16.           W. Jiang and V. K. Prasanna, “Parallel IP Lookup using Multiple SRAM-based Pipelines,” In IEEE IPDPS,  2008 .

17.           Yeim-Kuan Chang, Yi-Shang Lin, and Cheng-Chien Su “A High-Speed and Memory Efficient Pipeline Architecture for Packet Classification “2010 18th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines.

18.           Andreas Tockhorn, Peter Danielis, Dirk Timmermann “A Configurable FPGA-Based Traffic Generator for High-Performance Tests of Packet Processing Systems “ ICIMP 2011 : The Sixth International Conference on Internet Monitoring and Protection.

19.           Nitesh Guinde, Sotirios G. Ziavras and Roberto Rojas-Cessa “Efficient Packet Classification on FPGAs also Targeting at  Manageable Memory Consumption “ Department of Electrical and Computer Engineering,New Jersey Institute of Technology ,Newark, NJ 07102, USA

20.           Marwan Salim Mahmoud,   Awos Khazal Ali  “Comparison Study Of Packet Classification Algorithms In Wired Networks “J. Edu. &  Sci., Vol. (25),  No. (1)  2012.

21.           Alan Kennedy, Xiaojun Wang ,Bin Liu “Energy Efficient Packet Classification Hardware    Accelerator “978- 1-4244-1694-3/08©2008 ,IEEE

22.           Maged Attia  and  Ingrid  Verbauwhede “Programmable Gigabit Ethernet Packet Processor Design  Methodology  “  ECCTD’01 - European Conference on Circuit Theory and Design, August 28-31, 2001, Espoo, Finland

23.           Raja Jitendra Nayaka, R. C. Biradar.  “Ethernet Packet Processor for SoC Application" International Workshop Of Information Technology, Control And Automation (Itca-2012), Sl.No.27. Proceedings In Computer Science & Information Technology (Cs & It) Series Airccse Conferences

24.           Maysam Lavasani,Larry Dennison”Compiling High Throughput Network Processors” FPGA’12, February 22–24, 2012, Monterey, California, USA.2012 ACM 978-1-4503-1155-7/12/02





Anu K P, BinuRajan

Paper Title:

A Novel Approach for Improving Software Quality Prediction

Abstract:    Software quality prediction is a process of utilizing software metrics such as code-level measurements and defect data to build classification models that are able to estimate the quality of program modules. These kinds of estimations can help software managers to effectively allocate potentially limited project resources, focusing on program modules that are of poor quality or likely to have a high number of faults. However, the effectiveness of such models depends on the quality of training data and also the underlying classification technique used for model calibration. The major problem that affects the quality of training datasets is high dimensionality and class imbalance. These problems can be alleviated by choosing necessary data preprocessing techniques before performing the classification. This paper presents an approach for using feature selection and data sampling together to deal with the problems. In this paper a wrapper based feature selection approach is used as the feature selection method and the ensemble learning method used is RUSBoost, in which random undersampling (RUS) is integrated into a boosting algorithm. The main purpose of this paper is to investigate the impact of  feature selection along with RUSBoost approach, on the classification performance in the context of software quality prediction.

   Software Quality Prediction, Feature Selection, RUS Boost.


1.              IEEE recommended practice on software reliability. IEEE STD 1633-2008, pages c1–72, June 2008.
2.              Cara Stein, Letha Etzkorn, Dawn Utley (2004) ‘Computing Software Metrics from Design Documents.’ ACMSE.

3.              Yi Liu, jeng-Foung Yao, Gita Williams and Gerald Adkins (2007) ‘Studying Software Metrics Based on Real-World Software Systems.’ Journal of Computing Sciences in Colleges 22.

4.              Stephen H. Kan (2002) Software Quality Metrics Overview [Online] 2nd ed. Boston: Addison Wesley Professional.

5.              KehanGao , TaghiKhoshgoftaar and Amri Napolitano ‘Improving Software Quality Estimation by Combining Boosting’and Feature Selection’ 2013 12th International Conference on Machine Learning and Applications

6.              Huanjing Wang, Taghi M. Khoshgoftaar and NaeemSeliya ‘How Many Software Metrics Should be Selected for Defect Prediction?’ Proceedings of the Twenty-Fourth International Florida Artificial Intelligence Research Society Conference.

7.              T. M. Khoshgoftaar and A. Napolitano, ‘An empirical study of feature ranking techniques for software quality prediction,’ International Journal of Software
Engineering and Knowledge Engineering, 2012.

8.              KehanGao and Taghi M. Khoshgoftaar ,’Software Defect Prediction for High-Dimensional and Class-Imbalanced Data,’ Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), Eden Roc Renaissance, Miami Beach, USA, July 7-9, 2011.

9.              T. M. Khoshgoftaar and K. Gao, ‘A novel software metric selection technique using the area under roc curves,’ in Proceedings of the 22nd International Conference on Software Engineering and Knowledge Engineering, San Francisco, CA, July 1-3 2010, pp. 203–208.

10.           N. V. Chawla, A. Lazarevic and K. Bowyer, ‘Smoteboost: Improving prediction of the minority class in boosting,’ Proceedings of Principles of Knowledge Discovery in Databases, 2003.

11.           N. V. Chawla, K.W. Bowyer, ‘Smote: Synthetic minority over-sampling technique,’ Journal of Artificial Intelligence Research, 2002.

12.           Shulong Liu, Xiang Chen, Wangshu Liu, Jiaqiang Chen, Qing Gu, Daoxu Chen, ‘Fecar: A feature selection framework for software defect prediction,’ IEEE 38th Annual International Computers, Software and Applications Conference, 2014.

13.           Taghi M. Khoshgoftaar, Edward B. Allen and S. J. Aud, ‘Application of neural networks to software quality modeling of a very large telecommunications system,’ IEEE Transactions On Neural Networks, 1997.

14.           K. Pandey . N. K. Goyal, ‘Fuzzy model for early software fault prediction using process maturity and software metrics,’ International Journal of Electronics Engineering, 2009.

15.           Jiaqiang Chen, Shulong Liu, Wangshu Liu, Xiang Chen, Qing Gu, Daoxu Chen, ‘A two-stage data preprocessing approach for software fault prediction,’ IEEE Conference on Software Security and Reliability, 2014.

16.           K. Gao, T. M. Khosgoftaar, and A. Napolitano, " Improving Software Quality Estimation by Combining Boosting and Feature Selection ", in 2013 12th International Conference on Machine Learning and Applications.

17.           R. Varshavsky, A. Gottlieb, M. Linial, D. Horn, Novel unsupervised feature filtering of biological data, Bioinformatics 22 (14) (2006) e507–e513.

18.           Md. SaeedSiddik Md. HabiburRahman Shah MostafaKhaled Mohammad ShoyaibJobaer Islam Khan, AlimUlGias. An attribute selection process for software defect prediction. 3rd International Conference On Informatics,Electronics & Vision, 2014.

19.           C. Seiffert, T. M. Khoshgoftaar, J. Van Hulse, and A. Napolitano, “Rusboost: A hybrid approach to alleviating class imbalance,” IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 40, no. 1, pp. 185–197, January 2010.

20.           R. Varshavsky, A. Gottlieb, M. Linial, D. Horn, Novel unsupervised feature filtering of biological data, Bioinformatics 22 (14) (2006) e507–e513. W.-K. Chen, Linear Networks and Systems (Book style).           Belmont, CA: Wadsworth, 1993, pp. 123–135.





Florina-Cristina Filip, Vladimir Mărăscu-Klein

Paper Title:

Management of Production Processes and Products Release Procedure

Abstract:    This paper describes the production process and product release procedure used by supplier as a management method of proving that all product requirements agreed with the customer are being met. This method applies to the processes involved in the manufacture of products (raw material, semi-finished products, components and chemical operating materials). The release comprises an assessment of the production process or service based on the relevant documents, records and initial production samples, to ensure that the requirements associated with the production process of products which conform to specification are met. The supplier must to ensure that he agreed with the customer on changes of production process or deviations from specifications, at an early stage.

   initial production, inspection reports, release, supplier.


1.             F.C. Filip, L. Neagoe, and L. Stan, “Basic Element for Organization of Industrial Production,” Bulletin of the Polytechnic Institute of Iasi, Published by Technical University Gheorghe Asachi, Vol. LVI (LX), 2010, pp.141-148.
2.             F.C. Filip, L. Neagoe, and I. Petre, Basic Elements for the Design of Pull Production System,” Bulletin of the Polytechnic Institute of Iasi, Published by Technical University Gheorghe Asachi, Vol. LVI (LX), 2010, pp.149-156.

3.             N. Selvaraj, “Performance Evaluation of Single Parameter Pull Production Control Systems,” International Journal of Engineering Studies, Vol. 1, No. 1, 2009, pp. 47–58.

4.             F.C. Filip and V. Mărăscu-Klein, “Efficient Optimization Methods of All Technological Process by Development the Production Transfer Process,” Ovidius University
Annals Economic Sciences Serie, Vol. 11, No. 2, 2011, pp. 432-436.

5.             B. Verspagen, and G. Duysters, “The small worlds of strategic technology alliances,” Technovation, Vol. 24, 2004, pp. 563-71.

6.             J. Jabar, C. Soosay, and R. Santa, “Organizational learning as an antecedent of technology transfer and new product development. A study of manufacturing firms in Malaysia,” Journal of Manufacturing Technology Management, Vol. 22, No. 1, 2011, pp. 25-45.

7.             C.J. Jaeckle, and J.F. MacGregor, “Product Transfer Between Plants Using Historical Process Data,” AIChE Journal, Vol. 46, No. 10, 2000, pp. 1989-1997.

8.             F.C. Filip, and V. Mărăscu-Klein, “Description of Continuous Improvement Process for Efficient Management of Production Systems,” Proceedings of the 16th International Conference Modern Technologies, Quality and Innovation, 2012, pp. 365-368.

9.             Marin-Garcia, J.A., Pardo del Val, M. and Martin, T.B. (2008). Longitudinal Study of the Results of Continuous Improvement in an Industrial Company. Team Performance Management, Vol. 14, No. 1/2, pp. 56-69.

10.          N. Bateman, “Sustainability: The Elusive Element of Process Improvement,” International Journal of Operations & Production Management, Vol. 25, No. 3, 2005, pp. 261-276.

11.          N. Bhuiyan, and A. Baghe, “An Overview of Continuous Improvement: From the Past to the Present,” Management Decision, Vol. 43, No. 5, 2005, pp. 761-771.

12.          C. Lejeune, “Is Continuous Improvement Through Accreditation Sustainable? A Capability-Based View,” Management Decision, Vol. 49, No. 9, 2011, pp. 1535-1548.

13.          F.C. Filip, and V. Mărăscu-Klein, “Analysis of Process and Product Quality Assurance,” Proceedings of the 6th International Conference on Manufacturing
Engineering, Quality and Production Systems and Proceedings of the 4th International Conference on Automotive and Transportation Systems, 2013, pp. 75-81, 2013.

14.          R. Fantina, Practical Software Process Improvement, Publishing Artech House, Norwood, MA, USA, 2005.

15.          X. Zhang, Z. He, and L. Shi, “Process Quality Metrics for Mechanical and Electrical Production Line,” Procedia Engineering, Vol. 24, 2011, pp. 6-11.

16.          P. Maeyer, and H. Estelami, “Consumer perceptions of third party product quality ratings,” Journal of Business Research, Vol. 64, No. 10, 2011, pp. 1067-1073.

17.          Dasgupta, Power Transformers Quality Assurance, Publishing New Age International, Daryaganj, Delhi, IND, 2009.

18.          G.G. Schulmeyer, Handbook of Software Quality Assurance, Publishing Artech House, Norwood, MA, USA, 2007.

19.          T. Kasse, Practical Insight into CMMI, Publishing Artech House, Norwood, MA, USA, 2008.

20.          F.C. Filip, and H. Shirvani, “Method and Analyze of the Production Capacity Calculation,” Recent Journal, Vol. 12, No. 2(32), 2011, pp. 125-130.

21.          Z. Sebestyén, and V. Juhász, “The Impact of The Cost of Unused Capacity on Production Planning of Flexible Manufacturing Systems,” Periodica Polytechnica
Ser. Soc. Man. Sci., Vol. 11, No. 2, 2003, pp. 185 – 200.

22.          M. Jin, and S.D. Wu, Modelling Capacity Reservation in High-Tech Manufacturing, Department of Industrial and Systems Engineering. P.C. Rossin College of Engineering, Lehigh University, Bethlehem, Available: http://www.lehigh.edu/~sdw1/jin3.pdf





Jeeshna P.V, Kuttymalu V.K.

Paper Title:

A Technique for Object Movement Based Video Synopsis

Abstract:    Video synopsis is the process of preserving key activities and eliminates the less important parts to create a short video summary from the long original videos. These techniques are used for fast browsing, extracting big data, effective storing and indexing. The main application of video synopsis is video surveillance. Video synopsis techniques are broadly classified into two types: object based approaches and frame based approaches. Important frames and objects are extracted and viewed as the basic building block of the synopsis, while other less important frames and objects are removed. But these approaches cannot handle the complexity of the dynamic videos. The object movement based video synopsis method focus on the movement of a single video object, and removes the redundancies present in the object movement. It helps to generate the video synopsis. The proposed method is the combination of frame based and object movement based video synopsis will generate more accurate and compact video synopsis. First frame based method will remove the nonmoving frames and object movement based video synopsis handles the moving objects. In object movement based video synopsis method the moving parts are considered as important and nonmoving parts are less important parts. The moving parts are preserved and nonmoving parts are to be eliminated. The basic aim is to work at the level of object part, and to remove the nonmoving parts. This method consists of three stages: Object Movement Partition, Assembling and Stitching. In object partition first segment and track the moving objects with the help of Kalman Filter algorithm and extracts the parts. Partition each object into several semantic parts, which produces several part movement sequences. Remove the object and repair the hole by structure completion method. In assembling select the same number of part movements from each part sequence and moving parts are then assembled frame by frame and nonmoving parts are removed. Finally stitch the assembled parts to eliminate the gaps between the frames, thus the synopsized video is produced. Many researches are going on this computer graphics and computer vision area related to video synopsis.

   Video Synopsis, Frame and Object based method, Object movement based method (OMBVS), Kalman filter, MRF, Object movement based method.


1.           Truong and S. Venkatesh, “Video abstraction: A systematic review and classification,” ACM Trans. Multimedia Computing, Comm., and Applications, 2007.
2.           R.-A. Y. Pritch and S. Peleg, “Nonchronological video synopsis and indexing,” IEEE Trans. Pattern Analysis and Machine Intelligence, Nov. 2008.

3.           H. S. Y. Nie, C. Xiao and P. Li, “Compact video synopsis via global spatiotemporal optimization,” IEEE Trans. Visualization and Computer Graphics, Oct. 2013.

4.           W. X.Li, K.Wang and Y.Li, “A multiple object tracking method using kalman filter,” IEEE Int. Conf. on Information and Automation, 2010.

5.           P. C. Y.Nie, H.Sun and K. Ma, “Object movements synopsis via part assembling and stitching,” IEEE Trans. on Visualization and Computer Graphics, 2014.

6.           J. F. T. Liu, X. Zhang and K. Lo, “Shot reconstruction degree: A novel criterion for key frame selection,” Sciencedirect,Pattern Recognition Letter, 2004.

7.           J. L. J. Ouyang and Y. Zhang, “Replay boundary detection in mpeg compressed video,” Proc. Int’l Conf. Machine Learning and Cybernetics, 2003.

8.           N. O. C. Panagiotakis and E. Michael, “Video synopsis based on a sequential distortion minimization method,” Springer-Verlag Berlin Heidelbarg, 2013.

9.           Y. C. J. Assa and D. Cohen-Or, “Action synopsis: Pose selection and illustration,” ACM Trans. Graphics, 2005.

10.        R. C. M. A. J. Wang, P. Bhat and M. Cohen, “Interactive video cutout,” ACM Trans. Graphics, 2005.

11.        J. Wang and M. Cohen, “Image and video matting: A survey,” Foundations and Trends in Computer Graphics and Vision, 2008.

12.        S. A. Agarwala, A. Hertzmann and S. Seitz, “Keyframe based tracking for rotoscoping and animation,” ACM Trans. Graphics, 2004.

13.        J. J. J. Sun, L. Yuan and H. Shum, “Image completion with structure propagation,” ACM Trans. Graphics, 2005.

14.        S. R. D. Sun and M. Black, “Secrets of optical flow estimation and their principles,” IEEE Conf. Computer Vision and Pattern Recognition (CVPR ’10), 2010.

15.        S. X. Bai, J. Wang and G. Sapiro, “Video snapcut: Robust video object cutout using localized classifiers,” ACM Trans. Graphics, 2009.

16.        D. R. Bull nad C. N. Canagarajah S. A. Vigus. Video object tracking    using region split and merge and a kalman filter tracking algorithm. In proceedings of ICIP, 2001.

17.        Al. Hamadi.A Pathan, S.S and Michaeelis. B. Intelligent feature guided multi object tracking using kalman filter. Int. Conference on Computer control and communication, 2009.

18.        K. Chen C. Shen, H. Fu and S. Hu. Structure recovery by part assembly. ACM Trans. Graphics, 2012.

19.        Doulamis C. Panagiotakis and G. Tziritas. Equivalent key fframe selection based on iso content principles. IEEE Trans. on Circuits and systems for video technology, 2009.





Sruthi S, Suma Sekhar, Sakuntala S Pillai

Paper Title:

Robust Optimal PSO based Wavelet Feature Selection in MIMO OFDM Systems

Abstract:   Orthogonal Frequency Division Multiplexing (OFDM) when combined with multiple-input multiple output (MIMO) technology offers attractive bandwidth efficiency and higher link reliability in future 4 G wireless technologies. However the major disadvantage of OFDM is, the signals transmitted through multiple antennas suffer from high peak to average power ratio (PAPR) which affects the transmission efficiency.  A scheme for PAPR reduction in wavelet packet OFDM based on discrete cosine harmonic wavelet packet transform (DCHWPT) using particle swarm optimization (PSO) is proposed. The optimization technique selects a best wavelet tree from fully decomposed wavelet packet tree structure with minimum PAPR is selected for transmission. Results show that PAPR is considerably reduced as the level of decomposition is increased for the wavelet packet structure.



1.              Mahonen, A.J.P.: ‘Wavelet packet modulation for wireless    communications’, Wirel.  Commun.  Mob. Comput. J.,  2005, 5, (2), pp. 1–18.
2.              Kumbasar, V., Kucur, O.: ‘Better wavelet packet tree structures for PAPR reduction in WOFDM systems’, Digital Signal Process.,   2008, 18, pp. 885–891.

3.              Baro, M., Ilow, J.: ‘PAPR reduction in wavelet packet modulation using tree pruning’. 2007. IEEE explore-IEEE CCNC 2008 Proc. 1-4244-1457-1/08© IEEE.

4.              Mohan Baro and Jacek Ilow, “PAPR Reduction in OFDM using wavelet packet Pre-processing”, 1-4244-1457-1, IEEE, 2008

5.              Liu, M., Wang,K., Huang, Y., Li, X,: ‘Reducing PAPR by selecting optimal wavelet tree structure in  WOFDM’, Comput Electr. Eng., 2011,37,pp.253-260.

6.              Suma, M.N., Narasimhan, S.V., Kanmani, B.: ‘The OFDM system based on discrete harmonic.wavelet transform’. National Communications Conf – NCC2012, Indian Institute of Technology.kharagpur India, February 2014.

7.              Basumallick, N., Narasimhan, “A discrete cosine adaptive harmonic wavelet packet and its application to signal compression,” J. Signal Inf. Process., 2010 , 1, pp. 63-76, November 2010

8.              Manuvinakurike  Narasimhasastry  Suma, Somenahalli Venkatarangachar  Narasimhan,  Buddhi Kanmani, “Orthogonal frequency division multiplexing peak-to-average power ratio reduction by best tree selection using coded discrete cosine harmonic wavelet packet transform,” in IET communications, 2014, vol 8.

9.              Zakaria, J., salleh , M.F.M .: ‘ Wavelet – based OFDM analysis : ‘BER performance and PAPR profile …for various wavelets’.  IEEE Symp on Industrial Electronics and Applications, 23-26 September 2012, Bandung, Indonesia, pp. 29-33.

10.           Qinghai Bai,”Analysis of Particle Swarm Optimization Algorithm,” Computer and Information Science Vol.3, No.1 February 2010.

11.           Manish Kumar, Prof.Nishat Kanvel, “A New Image Compression Scheme with Wavelet Packets for Best Basis Selection Using Improved PSO,” International Journal of Computational Engineering Research (IJCER).

12.           Daoud, O,: ‘Performance improvement of wavelet packet transform over fast Fourier transform in …multiple-input multiple – output orthogonal frequency division multiplexing systems’, IET Commun.,    2012,6,(7),pp. 765-773.





Parvathi R, Syama R

Paper Title:

Search As You Type in Database

Abstract:    A search-as-you-type system computes answers on-the-fly as a user types in a keyword query character by character. Search-as-you-type support study on data residing in a relational DBMS. And also focus on how to support this type of search using the native database language, SQL. A main challenge is how to leverage existing database functionalities to meet the high-performance requirement to achieve an interactive speed. Study on how to use auxiliary indexes is stored as tables to increase the search performance. Solutions for both single-keyword queries and multi-keyword queries are presented, and develop novel techniques for fuzzy search using SQL by allowing mismatches between query keywords and answers. Experiments on large, real data sets show that techniques enable DBMS systems on a commodity computer to support search-as-you-type on tables with millions of records. The main consideration was to increase the speed by using auxiliary indexes stored as tables. The search is done based on both single and multi-keyword. Exact search for single keyword queries are done using UDF, LIKE predicate and inverted-index table and the prefix table. Exact  search  for multi keyword queries are done using UDF, LIKE predicate,  full-text  indexes and UDF (called  “FI+UDF”),  full-text  indexes  and  the LIKE predicate  (called  “FI+LIKE”),  the  inverted-index  table with prefix  table and word-level  incremental method. Fuzzy search for single keyword queries are implemented using UDF, gram-based method, neighborhood-generation-based method, character-level incremental algorithms. Fuzzy search for multi keyword queries are implemented using word-level incremental algorithms, called NGB+ and Incre+. The approach using inverted index tables and prefix tables supports prefix, fuzzy search and achieve the best performance. The experimental results on large, real data sets showed that the proposed techniques can enable DBMS systems to support search-as-you-type on large tables.

   Fuzzy Search, Type Ahead, Prefix search, edit distance


1.              Guoliang Li, JianhuaFeng, “Supporting Search-As-You-Type Using SQL in Databases”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 25, NO. 2, FEBRUARY 2013
2.              G. Bhalotia, A. Hulgeri, C. Nakhe, S. Chakrabarti, and S. Sudarshan, “Keyword Searching and Browsing in Data Bases Using Banks,” Proc. 18th Int’l Conf. Data Eng. (ICDE ’02), pp. 431- 440, 2002.

3.              Hristidis and y. Papakonstantinou, “DISCOVER: Keyword Search In Relational Data Bases,” PROC. 28TH INT’L CONF. Very Large Data Bases (VLDB ’02), PP. 670
681, 2002.

4.              S. Ji, G. Li, C. Li, and J. Feng, “Efficient Interactive Fuzzy Keyword Search,” Proc. 18th ACM SIGMOD Int’l Conf. World Wide Web (WWW), pp. 371-380, 2009.

5.              L. Gravano, P.G. Ipeirotis, H.V. Jagadish, N. Koudas, S.Muthukrishnan, and D. Srivastava, “Approximate String Joins in a Data Base (Almost) for Free,” Proc. 27th Int’l Conf. Very Large Data Bases (VLDB ’01), pp. 491-500, 2001.

6.              J. Wang, G. Li, and J. Feng, “Trie-Join: Efficient Trie-Based String Similarity Joins with Edit-Distance Constraints,” Proc. VLDB Endowment, vol. 3, no. 1, pp. 1219-1230, 2010.

7.              S. Chaudhuri and R. Kaushik, “Extending Autocompletion to Tolerate Errors,” Proc. 35th ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’09), pp. 433-439, 2009.

8.              C. Li, J. Lu, and Y. Lu, “Efficient Merging and Filtering Algorithms for Approximate String Searches,” Proc. IEEE 24th Int’l Conf. Data Eng. (ICDE ’08), pp. 257-266, 2008.

9.              H. Lee, R.T. Ng, and K. Shim, “Extending Q-Grams to Estimate Selectivity of String Matching with Low Edit Distance,” Proc. 33rd Int’l Conf. Very Large Data Bases (VLDB ’07), pp. 195-206, 2007.

10.           G. Li, S. Ji, C. Li, and J. Feng, “Efficient Type-Ahead Search on Relational Data: A Tastier Approach,” Proc. 35th ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’09), pp. 695-706, 2009.





Sanket P. Jadhav, V. G. Sayagavi, N. G. Gore, P. J. Salunke

Paper Title:

Comparative Study of Machine Foundation and Position of Vibration Isolator

Abstract:    The present investigation is aimed at comparative study of machine foundation and position of vibration isolator. Heavy machinery with reciprocating, impacting, or rotating masses requires a support system that can resist dynamic forces and the resulting vibrations. When excessive, such vibrations may be detrimental to the machinery, its support system, and any operating personnel subjected to them. For satisfactory performance of machine foundation system, the requirement such as permissible amplitude, allowable soil pressure, permissible stresses of concrete & steel given by IS 2974 should be fulfilled. For this one has to obtain the natural frequency of the system and amplitude of foundation during machine operation. The most important parameters for design of a machine foundation are: 1) natural frequency of machine-foundation-soil system; and 2) amplitude of motion of machine at its operating frequency.

   Machine foundation, Vibratory Isolator, Comparative Study.


1.             “IS: 2974 (Part I to V) “Code of practice for design and construction of machine foundation.
2.             “Swami Saran”,”Soil Dynamics and Machine Foundation “Galgotia Publication pvt. Ltd. 2nd edition,1994.

3.             “Py. Srinivasulu and Vaidyanathan “Hand Book of Machine foundations”, Tata McGrawhill,2005.

4.             ” “William E. Saul”, Ph.D.,P .E. Member, ACI Professor and Chairman Department of Civil and Environmental Engineering University of Wisconsin-Madison Madison, Wisconsin 53706.

5.             “SukantaAdhikari” ,“Applications For New Research For Pile Supported Machine Foundations “Turbo-Generator foundation”.

6.             “D.D.Barken Tata”, “Dynamics of Bases and foundations” By Mcgraw-Hill Publication New York, U.S.A.

7.             ” K.G. Bhatia”, “Foundations For Industrial Machines And Earthquake Effects”, “28th ISET Annual Lecture”.

8.             ” K.G. Bhatia”, “Machine Foundation Design—A State of the Art”, Journal of Structural Engineering, SERC, Vol. 33, No. 1, pp. 69–80,(2006).





Vinza V. Suthan, Chitharanjan K.

Paper Title:

Dynamic Multi-Service Load Balancing System in Cloud-Based Multimedia

Abstract:    Load balancing is a process to distributing the workload across many computers or instruction data centres to maximize throughput and minimize work load on resources. In the case of cloud computing environments there were various challenges are there in the load balancing techniques like data security, and proper distribution etc. This is an efficient dynamic load balancing algorithm for cloud workload management by which the load can be distributed not only in a balancing approach, but also it allocate the load systematically and uniformly by checking certain parameters like number of requests the server is handling currently. It balances the load on the overloaded node to under loaded node so that response time from the server will decrease and performance of the system is increased. Here to considering a centralized hierarchical cloud-based multimedia system(CMS) consisting of a resource manager, cluster heads, and server clusters, in which the resource manager assigns clients’ requests for multimedia service tasks to server clusters according to the job features, and then each cluster head gives the assigning job to the servers within its server cluster. For this complicated CMS, however, it is a challenging to design an effective load balancing algorithm which spreads the multimedia service job load on servers with the minimal cost for transmitting multimedia data between server clusters and clients, while not violating the maximal load limit of each server cluster. New genetic algorithm can be minimizing the response time and minimizing the communication cost. Simulation results explained that the proposed new genetic algorithm can efficiently cope with dynamic multiservice load balancing.

   Cloud computing, Genetic algorithm, Dynamic load balancing.


1.             W. Zhu, C. Luo, J. Wang, and S. Li, “Multimedia cloud computing: An emerging technology for providing multimedia services and applications,” IEEE Signal Processing Magazine, vol. 28, no. 3, pp. 59–69,2011.
2.             W. Hui, H. Zhao, C. Lin, and Y. Yang, “Effective load balancing for cloud-based multimedia system,” in Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology. IEEE Press, 2011, pp. 165–168.
3.             X. Nan, Y. He, and L. Guan, “Optimal resource allocation for multimedia cloud based on queuing model,” in Proceedings of 2011 IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011).IEEE Press, 2011, pp. 1–6.

4.             M. Garey and D. Johnson, Computers and Intractability - A Guide to the Theory of NP-Completeness. Freeman, San Francisco, 1979.

5.             S. Kirkpatrik, C. Gelatt, and M. Vecchi, “Optimization by simulated annealing,” Science, vol. 220, pp. 671–680, 1983.

6.             J. H. Holland, Adaptation in Natural and Artificial Systems. University of Michigan Press, 1975.

7.             J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of IEEE International Conference on Neural Networks. IEEE Press, 1995, p. 1942V1948.

8.             Y. Shi and R. Eberhart, “A modified particle swarm optimizer,” in Proceedings of IEEE International Conference on Evolutionary Computation.IEEE Press, 1998,
pp. 69–73.

9.             R. Van den Bossche, K. Vanmechelen, and J. Broeckhove, “Cost-optimal scheduling in hybrid IaaS clouds for deadline constrained workloads,” in Proceedings of 2010 IEEE 3rd International Conference on Cloud Computing. IEEE Press, 2010, pp. 228–235.

10.          K.-P. Chow and Y.-K. Kwok, “On load balancing for distributed multiagent computing,” IEEE Transactions on Parallel and Distributed Systems, vol. 13, no. 8, pp. 787–801, 2002.

11.          X. Qin, H. Jiang, A. Manzanares, X. Ruan, and S. Yin, “Communication aware load balancing for parallel applications on clusters,” IEEE Transactions on Computers, vol. 59, no. 1, pp. 42–52, 2010.

12.          Y. Zomaya and Y.-H. Teh, “Observations on using genetic algorithms for dynamic load-balancing,” IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 9, pp. 899–911, 2001.





Singh Th. S.

Paper Title:

Application of Multi-objective Optimization Techniques on Optimal Groundwater Remediation Design

Abstract:    Aquifer parameters such as hydraulic conductivity, effective porosity and hydraulic head etc. play significant roles in groundwater remediation and management systems. They generally comprise multiple often conflicting objectives. This paper proposes a multi-objective groundwater remediation and management methodology based on pump-and-treat technology to determine optimal strategies for cleaning up the affected portion of a contaminated aquifer. Two objectives are considered namely (i) minimization of remediation cost and (ii) maximization of clean water extraction rate. Multi-objective optimization code NSGA II is employed along with MODFLOW and MT3DMS to obtain a remediation cost-extraction tradeoff. The Pareto front thus obtained consists of several optimal solutions to the problem. Sensitivity analyses on some important input parameters have been carried out to account for the effects of variability of these parameters on the model result.

   groundwater remediation, pump-and-treat, multi-objective optimization, Pareto front.


1.              Ahlfeld, D.P., Mulvey, J.M., Pinder, G.F. and Wood, E.F., 1988, Contaminated groundwater remediation design using simulation, optimization, and sensitivity theory: 1. Model development. Water Resources Research, 24, 431−441.
2.              Askoy, A. and Culver, T.B., 2000, Effect of sorption assumptions on aquifer remediation designs. Ground Water, 38, 200−208.

3.              Bayer, P. and Finkel, M., 2004, Evolutionary algorithms for the optimization of advective control of contaminated aquifer zones. Water Resources Research, 40, W06506, doi:10.1029/2003WR002675.

4.              Culver, T.B. and Shenk, G.W., 1998, Dynamic optimal groundwater remediation by granular activated carbon. . Journal of Water Resources Planning and Management, 124(1), 59−64.

5.              Deb, K. (2001). Multi-Objective Optimization using Evolutionary Algorithms, John Wiley and   Sons, Limited, Chichester.

6.              Deb, K., Pratap, A., Agarwal, S., and Meyarivan, T. (2002). “A Fast and Elitist Multi-Objective Genetic Algorithm: NSGA-II” IEEE Trans. Evol. Comput., 6(2),182-197.

7.              Gorelick, S.M., 1983, A review of distributed parameter ground water management modeling method. Water Resources Research, 19, 305−309.

8.              Haggerty, R. and Gorelick, S.M., 1994, Design of multiple contaminant remediation: Sensitivity to rate-limited mass transfer. Water Resources Research, 30,

9.              Harbaugh, Banta, Hill and McDonald 2000, User’s documentation for MODFLOW-96, an update to the U.S. Geological Survey modular finite-difference ground-water flow model. U.S. Geo- logical Survey Open-File Report 00-92.

10.           Huang, C. and Mayer, A.S., 1997, Pump-and-treat optimization using well locations and pumping rates as decision variables. Water Resources Research, 33,

11.           McKinney, D.C. and Lin, M.-D., 1994, Genetic algorithms solution of groundwater management models. Water Resources Research, 30, 1897−1906.

12.           McKinney, D.C. and Lin, M.-D., 1996, Pump-and-treat ground-water remediation system optimization. Journal of Water Resources Planning and Management, 122, 128−136.

13.           Ritzel , B.J.,Eheart, J.W., and Ranjithan, S., 1994,  Using genetic algorithms to solve multi-objective groundwater pollution containment-problem. Water Resources Research, 30(5), 1589-1603.

14.           Seshadri,A. (2005). “Multi-objective Optimization using Evolutionary Algorithms”, http://www.mathworks.com/matlabcentral/fileexchange/load-File.do?objectId=10351.

15.           Wang, M. and Zheng, C., 1997, Optimal remediation policy selection under general condition. Ground Water, 35, 757−764.

16.           Zheng, C. and Wang, 1999, MT3DMS: A modular three-dimensional transport model for simulation of advection, dispersion, and chemical reactions of contaminants in groundwater systems. Report to the U. S. Army Corps of Engineers, Contract Report SERDP-99-1, December 1999.





K. Dhanaraju, I. Srinu, K. Satyanarayana

Paper Title:

Performance Improvement of Fuzzy PID Controller Based Process Control System

Abstract:    In this paper proposes an intelligent approach (Fuzzy logic) for the design of PID controller for better disturbance rejection. The proposed PID controller is designed using pessen’s tuning algorithm for rejection of different disturbances. The proposed intelligent controller has got so many advantages/features over the conventional methods. Sudden ability to reject non linear disturbances arch occur in the system during operation ,speed of operation and PID gains are altered online in accordance with   the disturbances to reject. To show the efficacy of the proposed method a liquid control of process tank is considered and intelligent PID controller is designed .The designed intelligent controller is simulated under different disturbance using MATLAB/Simulink. The results are successfully verified.

   Fuzzy–PID Controller, Liquid level system, PID Tuning methods MATLAB/ Simulink


1.          Rahul kannan, P.Ananthachristu raj, P.Poongodi. “Design of Fuzzy Immune PID Controller for Liquid Level Control Systems”IEEE Transaction on Second International Conference on Computer and Network Technology, pp.566-570, 2010.
2.          The Control Handbook.CRC Press, 1999.

3.          Comparing PI Tuning Methods in a Real Benchmark Temperature Control System by Finn Haugen, 2008.

4.          Wolfgang Altman, “Practical Process Control for Engineers and Technics,”IDC Technologies, 2005.

5.          Caminos P and Munro N.PID controllers: recent tuning methods and design to specification, LEE Proceedings Control Theory and Applications, 2002, pp.46-53.

6.          Satish .R. Vaishnav. Zafar. J.Khan.; “Performance of tuned PID controller”, ACADAMIC World Journal of Modeling and Simulation, No 2, vol.6, pp.141-149, 2010.

7.          I.Nagrath, M.Gopal. Control Systems Engineering, 3rd Edition New Age International Publishers, New Delhi, India, 2002.

8.          Curtis. Johnson, “Process Control Instrumentation  Technology,” Pearson Education, 2009.

9.          Hao Zhengqing, Shi Xinmin,”Fuzzy Control and Its MATLAB Simulation [M],”Tsinghua University Press, Beijing Jiao tong University Press, Beijing,2008:89-126.

10.       Gang Feng, “Analysis and Synthesis of Fuzzy Control Systems:” “A Model Based Approach, Automation and Control Engineering Series” , CRC Press, Taylor, 2010





Shreelekshmi R, Sruthi S

Paper Title:

An Adaptive Video Compression Technique for Resource Constraint Systems

Abstract:    As display devices become more and more vivid, and people demand more perfection in video quality, it is necessary to maintain the natural colors, which is in RGB domain.  Because of its huge size, managing videos in RGB color space is not practical. Recent years witnessed a rapid evolution in the area of Video Compression Technology. Most of them use complex algorithms to handle Temporal Redundancy and as a result they are very time consuming. Accordingly, there is a high demand for less complex video compression techniques for handling RGB videos. This paper presents a new RGB video compression technique developed with less time complexity while ensuring an acceptable level of perceptual quality and bandwidth requirements. The proposed system performs Intra-Frame compression for removing Spatial Redundancy followed by Run-Length Encoding and an additional level of bit reduction on the resultant data. This system needs very less processing time, due to the simplicity of techniques used. As compared to the latest and most efficient compression standard HEVC, the proposed system takes much less time for its execution.

   Bit-Plane Slicing, Bit-Plane Reduction, Run-Length Encoding


1.             Gonzalez, R. C., Woods, R. E. Digital Image Processing. Prentice Hall, Upper Saddle River, NJ , 3rd edition,2008
2.             Khalid Sayood, Introduction to Data Compression, 3rd edition, Morgan Kaufmann Series in Multimedia Information and Systems, Elsevier 2006, pp 1-680, 2006.

3.             Guy Cote, Lowell Winger, Recent Advances in Video Compression Standards, IEEE Canadian Review Spring / Printemps 2002, pp 21-24, 2002

4.             Karel Rijkse, H.263: Video Coding for Low Bit-Rate Communication, IEEE Communications Magazine, December 1996, , pp 42-48, 1996

5.             Jorn Ostermann, Jan Bormans, Peter List, Detlev Marpe, Matthias Narroschke, Fernando Pereira, Thomas Stockhammer, and Thomas Wedi, Video coding with H.264/AVC: Tools, Performance, and Complexity, IEEE Circuits and Systems Magazine 2004, pp 7-28, 2004

6.             Gary A. Sullivan and Thomas Wiegand, Video compression—from concepts to the H.264 /AVC standard, IEEE International Conference on image processing, Vol. 93, pp. 521-524, January 2005.

7.             Detlev Marpe, Thomas Wiegand, Gary J. Sullivan The H.264/MPEG4 Advanced Video Coding Standard and its Applications, IEEE Communicationss Magazine, August 2006, , pp 134-143, 2006

8.             Mahsa T. Pourazad, Colin Doutre, Maryam Azimi, and Panos Nasiopoulos  HEVC: The new Gold Standard for Video Compression, IEEE Consumer Electronics Magazine July 2012, pp 36-46, 2012

9.             Jens Reiner Ohm, Gary A. Sullivan, Heiko Schwarz, Thiow Keng Tan, Thomas Wiegand.Comparison of Coding Efficiency of Video Coding Standards – Including High Efficiency Video Coding (HEVC). IEEE transactions on circuits and systems for video technology, Vol. 22, No. 12, December 2012, pp.1669-1684, 2012

10.          Shivam Bindal, Udit Khanna, Manoj Sharma, Trends in Video Compression Technologies and Detailed Performance Comparison of H.264/MPEG-AVC and H.265/MPEG-HEVC, International Journal of Engineering Research & Technology (IJERT) Vol. 3 IJERT Issue 12, pp 748-754, December-2014.

11.          Shreelekshmi R, Baby Vijilin , Color Image Compression Using Bit Plane Reduction, Elsevier Proceedings of International Conference on Advances in Computing , Communications, and Information Science , June 2014.

12.          Shreelekshmi R, Baby Vijilin, Quality Enhancement of Adaptively Compressed Images using Bit Plane Removal, First International Conference on Computational Systems and Communications (ICCSC), IEEE, pp 260-265 December 2014

13.          Haider Al-Mahmood Selective Bit Plane Coding and Polynomial Model for Image Compression, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014, pp 797-801





Sreejith S., Sujitha S.

Paper Title:

An Enhanced Approach for Privacy Preservation in Anti-Discrimination Techniques of Data Mining

Abstract:    Data mining is an important area for extracting useful information from large collections of data. There are mainly two threats for individuals whose information is published: privacy and discrimination. Privacy invasion occurs when the values of published sensitive attributes is linked to specific individuals.  Discrimination is the unfair or unequal treatment of people based on their membership to a specific category, group or minority. In data mining, decision models are mainly derived on the basis of records stored by means of various data mining methods. But there may be a risk that the extracted knowledge may impose discrimination. Many organizations collect a lot of data also for decision making. The sensitive information of the individual whom the published data relate to, may be revealed, if the data owner publishes the data directly. Hence, discrimination prevention and privacy preservation need to be ensured simultaneously in the decision making process. In this paper, discrimination prevention along with different privacy protection techniques have been proposed and the utility measures have been evaluated.

   Discriminatory attribute, direct discrimination prevention, indirect discrimination prevention, rule generalization, rule protection, k-anonymity, l- diversity, t-closeness


1.             D. Pedreschi, S. Ruggieri, and F. Turini, “Discrimination-Aware Data Mining,”    Proc. 14th ACM Int’l Conf.  Knowledge Discovery and Data Mining (KDD ’08), pp. 560-568, 2008.
2.             F. Kamiran and T. Calders, “Classification without Discrimination,” Proc. IEEE Second Int’l Conf. Computer, Control and Comm. (IC4 ’09), 2009.

3.             D. Pedreschi, S. Ruggieri, and F. Turini, “Integrating Induction and Deduction for Finding Evidence of Discrimination,” Proc. 12th ACM Int’l Conf. Artificial Intelligence and Law (ICAIL ’09), pp. 157- 166, 2009.

4.             S. Ruggieri, D. Pedreschi, and F. Turini, “DCUBE: Discrimination Discovery in Databases,” Proc. ACM Int’l Conf. Management of Data (SIGMOD ’10), pp. 1127-1130, 2010.

5.             T. Calders and S. Verwer, “Three Naive Bayes Approaches for Discrimination-Free Classification,” Data Mining and Knowledge Discovery, vol. 21, no. 2, pp. 277-292, 2010.

6.             D. Pedreschi, S. Ruggieri, and F. Turini, “Discrimination-Aware Data Mining,” Proc. 14th ACM Int’l Conf. Knowledge Discovery and Data Mining (KDD ’08), pp. 560-568, 2008.

7.             S. Hajian, J. Domingo-Ferrer, and A. Martı´nez-Balleste´, “Rule Protection for Indirect Discrimination Prevention in Data Mining,” Proc. Eighth Int’l Conf. Modeling Decisions for Artificial Intelligence (MDAI ’11), pp. 211-222, 2011.

8.             F. Kamiran and T. Calders, “Classification without Discrimination,” Proc. IEEE Second Int’l Conf. Computer, Control and Comm. (IC 4 ’09), 2009.

9.             F. Kamiran, T. Calders, and M. Pechenizkiy, “Discrimination Aware Decision Tree Learning,” Proc. IEEE Int’l Conf. Data Mining (ICDM ’10), pp. 869-874, 2010.

10.          Sweeney L., “Achieving k-anonymity privacy protection using generalization and suppression”, International Journal of Uncertainty, Fuzziness and Knowledge
Based Systems 2002, 10: 571- S88.

11.          Li Z, Ye X. “Privacy protection on multiple sensitive attributes”.[Cl// Proceedings of the 9th international conference on information and communications security. Zhengzhou, China: Springer-Verlag; 2007: 141-152.

12.          Zhong S, Yang Z, Chen T. “k-Anonymous data coliection”[J]. Information Sciences 2009, 179: 2948-2963.

13.          L. Sweeney, “k-Anonymity: A model for protecting privacy”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(5):557-570, 2002.

14.          Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam,” l-Diversity: privacy beyond k-anonymity,” ACM Transactions on Knowledge Discovery from Data (TKDD), 1(1), Article 3, 2007.

15.          Wong R C, Li J Y, Fu A W, Wang K, ” (,k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing”,Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '06, ACM, New York, USA, 2006. 754-759.106-115.

16.          N. Li, T. Li and S. Venkatasubramanian.” t-Closeness: privacy beyond k-anonymity and l-diversity”, In IEEE ICDE 2007, pp. 106-115. IEEE, 2007.

17.          P. Samarati. “Protecting respondents' identities in microdata release”, IEEE Transactions on Knowledge and Data Engineering, 13(6):1010-1027, 2001.

18.          P. Samarati and L. Sweeney, “ Generalizing data to provide anonymity when disclosing information”, In Proc. of the 17th ACM SIGACTSIGMOD-SIGART Symposium on Principles of Database Systems (PODS 98), Seattle, WA, June 1998, p. 188.

19.          Sara Hajian and Josep Domingo- Ferrer, “A methodology for Direct and     Indirect Discrimination Prevention in Data Mining,” IEEE Trans. Knowledge and Data Eng., vol. 25, no. 7, pp. 1445-1459, July 2013.

20.          R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases, pp.487-499, 1994.

21.          D.J. Newman, S. Hettich, C.L. Blake, and C.J. Merz, “UCI Repository of Machine Learning Databases,” http://archive. ics.uci.edu/ml,1998.

22.          R. Kohavi and B. Becker, “UCI Repository of Machine Learning Databases,” http://archive.ics.uci.edu/ml/datasets/Adult, 1996.





Safeera N, Chitharanjan K

Paper Title:

Intelligence Based Electric Vehicle Route Planning System

Abstract:    Now a day’s Electric Vehicles (EVs) are popular all over the world. The drift towards electric vehicles is a result of severe environmental problems caused by the Internal Combustion Engine Vehicles (ICVs). EV posses performance weaknesses in case of transportation efficiency, such as low energy density of batteries, scarcity of public charging stops, long waiting and charging time, wastage of energy due to traffic, accident and blocking conditions. EV Routing Problem (EVRP) is relevant in the recent scenario to get the efficient route, assisted by coordinating distance travelled and availability of charging stops. Besides, it incorporates the traffic parameters, blocking conditions and accidents to bring this application in real world logistics. To make EVs as the future of personal transportation and to increase the user’s acceptance, these problems should be considered. In congested areas, the concurrent and frequent recharging demands lead to high waiting time at the charging area, thus affecting both charging network and vehicle travel time. In this work, optimal route for the electric vehicles is computed that minimizes the associated cost, which is a combination of travel time, charging time and the energy consumption along the route. Inputs to the route planning system are the distance to be travelled, vehicle speed, states of charge and even sometimes the information about traffic conditions, blocks and accidents. The output of the energy management controller is to provide an optimal route that achieves best performance and overall system efficiency. As the stated problem is non-polynomial, the proposed work uses metaheuristic algorithms for finding an optimal route in a reasonable time. Genetic algorithm(GA) and Particle Swarm Optimization (PSO) are then used to solve the energy efficient routing problem for electric vehicles. These two metaheuristic methods are analyzed and studied and the results and performance of each are then compared and contrasted.

   EVRP, charging stations, GA, PSO


1.                . Touati and V. Jost, “About green vehicle routing and scheduling problem, in proc. 2,” in 4th European conf. operational research, Lisbon, Portugal, July 2010.
2.                C. G. A. M. C. G. V. Pillac, “Dynamic vehicle routing problems: State of the art and prospects,” 2011.

3.                X. Yang, Engineering Optimization: An Introduction with Metaheuristic Applications. Wiley, 2010.

4.                M. Zbigniew, and D. Fogel. How to solve it: modern heuristics. Springer, 2004.

5.                J. Brownlee, Clever Algorithms: Nature-Inspired Programming Recipes.Jason Brownlee, 2011

6.                Y. Shi, "Particle swarm optimization: developments, applications and resources." Evolutionary Computation, 2001. Proceedings of the 2001 Congress on. Vol. 1. IEEE, 2001.

7.                R. S. F.Goncalves, S.R Cardoso and A. P. Barbosa, “Optimization of distribution net-work using electric vehicles: A vrp problem.technical report,ceg-ist,utl,lisboa,” 2011.

8.                N. Touati-Moungla and V. Jost, “Combinatorial optimization for electric vehicles management,” in Proc. Int. Conf. Renewable Energies Power Quality, 2011.

9.                M. L. A. Artmeier, J. Haselmayr and M. Sachenbacher, “The optimal routing problem in the context of battery-powered electric vehicles,” in Proc. Workshop: CROCSCPAIOR-10, 2nd Int. Workshop Constraint Reasoning Optimization ComputationalSustainability, Bo- logna, Italy, 2010.

10.             E.-H. S.Erdogan, “A green vehicle routing problem,transportation research parte:logistic and transportation review 48 100–114.,” (2012).

11.             S. M. Schneider and D. Goeke, “The electric vehicle routing problem with time windows and recharging stations,” Univ. Kaiserslautern, Germany, Tech. Rep., Jan. 30, 2012.

12.             A. H. Z. Ma, D. S. Callaway, “Decentralized charging control of large populations of plug-in electric vehicles, ieee transactions on control systems technology 21 (1) (2013) 67 –78, issn 1063-6536, doi: 10.1109/tcst.2174059.,” 2011.

13.             S. H. L. L. Gan, U. Topcu, “Optimal decentralized protocol for electric vehicle charging, ieee transactions on power systems pp (99) 1–12, issn 0885-8950,doi:10.1109/tpwrs.2012.2210288.,” (2012).

14.             D. E. Goldberg et al. Genetic algorithms in search, optimization, and machine learning. vol. 412. Reading, MA: Addison-Wesley, 1989.

15.             Adam Marczyk. Genetic algorithms and evolutionary computation. April 23, 2004.

16.             J. Kennedy, Swarm intelligence, in Handbook of Nature-Inspired and Innovative Computing, 2006, pp. 187-219.

17.             P. Engelbrecht, Computational intelligence: An Introduction, 2nd ed. West Sussex: John Wiley & Son, 2007.

18.             K. E. Parsopoulos and M. N. Vrahatis, Parameter selection and adaptation in unified particle swarm optimization, Mathematical and Computer Modelling, vol.46, 2007, pp. 198-213.

19.             C. Trelea, The particle swarm optimization algorithm: convergence analysis and parameter selection," Information Processing Letters, vol. 85, 2003, pp. 317-325.

20.             A. R. Guner and M. Sevkli, A Discrete Particle Swarm Optimization Algorithm for Uncapacitated Facility Location Problem, Journal of Artificial Evolution and Applications, vol. 2008, pp. 1-9, 2008.





Amol Bansod

Paper Title:

Efficient Big Data Analysis with Apache Spark in HDFS

Abstract: With the size of data increasing each day, the traditional methods of data processing have become inefficient and time consuming. Today, Facebook, Google, Twitter are generating Petabytes of data each day. This large amount of data is given the term ‘Big Data’. To overcome this inefficiency, the processing of Data can be performed using Apache spark. Apache Spark is a fast, in-memory processing of large amount of data. In this research paper, the author discusses an efficient way of analyzing Big Data stored in Hadoop Distributed File System HDFS using Apache Spark framework, and its advantages over Hadoop MapReduce framework.

  Big Data, Hadoop MapReduce, Spark


1.    Understanding The Various Sources of Big Data, https://datafloq.com/read/understanding-sources-big-data-infographic/338
2.    Big data Analytics, http://www.sas.com/en_us/insights/analytics/big-data-analytics.html.

3.    Hadoop Tutorial,YahooInc., https://developer.yahoo.com/hadoop/tutorial/index.html

4.    Big Data Analytics, http://searchbusinessanalytics.techtarget.com/definition/big-data-analytics

5.    J. Shafer, S. Rixner, A.L. Cox, “The Hadoop Distributed Filesystem: Performance versus Portability”, IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS 2010), White Plains, NY (March 2010).

6.    https://databricks.com/blog/2014/01/21/spark-and-hadoop.html.

7.    Apache Spark, http://spark.apache.org/

8.    Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. Franklin, S. Shenker, and I. Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. Technical Report UCB/EECS-2011-82, EECS Department, University of California, Berkeley, 2011

9.    Apachespark,https://www.mapr.com/products/product-overview/apache-spark.





Seena Thomas, Anjali Vijayan

Paper Title:

Automated Colon Cancer Detection Using Kernel Sparse Representation Based Classifier

Abstract: Colon cancer causes deaths of about half a million people every year. Common method of its detection is histopathological tissue analysis, which correlated to the tiredness, experience, and workload of the pathologist. Researchers have been working since decades to get rid of manual inspection, and to develop trustworthy systems for detecting colon cancer. Lesion detection can be difficult due to low contrast between lesions and normal anatomical structures. Lesion characterization is also challenging due to similar spatial characteristics between the tumor and abnormal nodes. To tackle this problem, Gabor wavelet filter algorithm is proposed. The detection of cancerous tissue in tissue image is divided into three main stages. The feature extraction and selection using the Gabor algorithm plays a critical role in the performance of the classifier. Higher accuracy of the classifier can be also achieved by the selection of optimum feature set. Features like the time (spatial) and frequency information can be extracted by using t-test algorithm and the tunable kernel size allows it to perform multi-resolution analysis.

   Feature Extraction and Selection, Graph Cut Segmentation, Gabor Filter.


1.       Saima Rathore, Mutawarra Hussain, Ahmad Ali, and Asifullah Khan, (2013), “A Recent Survey   on Colon Cancer Detection Techniques” IEEE/ACM Transactions on Computational Biology and Bioinformatics, Vol. 10, No.3.
2.       Ashiya,(2013)  “Notes on the Structure and Functions of Large Intestine of Human Body,” http://www.preservearticles.com/ 201105216897/notes-on-the-structure-and-functions-of-large- intestine-of-human-body.html/

3.       PubMed Health, “Colon Cancer,” http://www.ncbi.nlm.nih.gov/ pubmedhealth/PMH0001308/, Feb. 2013.

4.       Ju Han, Hang Chang, Leandro Loss, Kai Zhang, Fredrick L. Baehner, Joe W. Gray, Paul Spellman, and Bahram Parvin, (2011) “Comparison of Sparse Coding and
Kernel Methods for Histopathological Classification of Gliobastoma Multiforeme ”, Proc IEEE Int Symp Biomed Imaging.

5.       Sufan Y Ababneh, Jeff W Prescott, Metin N,(2011),” Automatic Graph Cut Based Segmentation of bones from knee magnetic resonance image for osteoarthritics research”, Elseviar/Medical Image Analysis 15,438-448

6.       John G Daugman, (2009), “ Uncertainly relation for resolution in space, spatial frequency and Orientation optimised by Two Dimensional visual cortical filters”, J.Opt.Soc.Am A/Vol 2.No.7/July.

7.       Deqip Wang, Hui Zhang, Rui Liu, Weifcng Lv, Dutao Wang, (2014), “ t-Test feature selection approach based on term frequency for text categorization”,  Elseviar/Pattern Recognition Letters,45,1-10

8.       D. Belsare  and M. M. Mushrif , (2012), “Histopathological Image analysis using Image Processing Techniques : An Overview”, Signal & Image Processing : An International Journal (SIPIJ) Vol.3, No.4

9.       Cigdem Gunduz- Demir, Melih Kandemir, Akif Burak Tosun, Cenk  Sokmensuer, (2010),  “automatic segmentation of colon glands using object- graphs,” Elsevier Medical Image Analysis,vol. 14pp.1-12.

10.    Erdem Ozdemir, Cigdem Gunduz-Demir, (2013), “A hybrid classification model for digital pathology using structural and statistical pattern recognition,” IEEE Trans. Knowledge Medical Imaging., vol. 32, no. 2, pp. 474-483.





Khaja Mahabubullah, Syed Abdul Sattar

Paper Title:

Optimizing Operational Lifetime in Manet by Network Topology Control Mechanism

Abstract: Recent developments in mobile networks have gained much importance because of their improved edibility and reduced costs. In addition to device portability MANET does not require a pre-established network arrangement and hence can be easily install in conditions like emergency rescue and disaster management but there are someproblemswhich are inherent to MANET such as hidden and exposed terminal problems. Routing in this kind of network is much more challenging than in conventional network because of their limited bandwidth, limited processing power and restricted hardware resources. More important the Nodes in MANET are mostly operated by battery and the batteries are limited in capacity and sometime it is midcult to replacer re-charge the battery and this reduces the network lifetime. To enhance the operational lifetime of Adhoc network the nodes in the network should use the minimal power during communication and some beneficial energy saving skills must be applied at the hardware level as well as protocol level. In this paper, we have focused our concern on energy conservation technique and proposed a topology control mechanism to enhance the operational life time in MANET our method will consume considerably least possible power while transmitting the packet from source to destination.



1.        Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing Jun- Zhao Sun MediaTeam, Machine Vision and Media Processing Unit.
2.        Krishna Moorthy Sivalingam, Tutorial on Mobile Ad Hoc Networks 2003.

3.        Elizabeth M. Royer and Chai-Keong Toh. A review of current routing protocols forAdhoc mobile wireless networks.Technical report, University of California andGeorgia Institute of Technology, USA, 1999.

4.        Tutorial for Simulation-based Performance Analysis of MANET Routing Protocols in Ns-2By Karthik sadasivam.

5.        Stojmenovic, I. and Lin, X., “Power-Aware Localized Routing in Wireless Networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 12, no. 11, pp. 1122–1133, 2001.

6.        Sheu, J Tu, S. and Hsu C. “Location-Free Topology Control Protocol in Wireless Ad hoc Networks,” Computer Communications, vol. 31, no. 14, pp. 3410–3419, 2008.

7.        Narayanaswamy, S., Kawadia, V., Sreenivas, R., and Kumar, P., “Power Control in Ad-hoc Networks: Theory, Architecture, Algorithm and Implementation of the COMPOW Protocol,” in European Wireless Conference, vol. 2002, 2002.

8.        Woo, K., Yu, C., Lee, D., Youn, H. Y., and Lee, B., “Non-Blocking, Localized Routing Algorithm for Balanced Energy Consumption in Mobile Ad hoc Networks,” in Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2001. Proceedings.Ninth International Symposium on, pp. 117 –124, 2001.

9.        Avudainayagam, A., Lou, W., and Fang, Y., “DEAR: A Device and Energy Aware Routing Protocol for Heterogeneous Ad hoc Networks,” Journal of Parallel and
Distributed Computing, vol. 63, no. 2, pp. 228–236, 2003.

10.     Gomez, J., Campbell, A., Naghshineh, M., and Bisdikian, C., “Conserving Transmission Power in Wireless Ad hoc Networks,” in Network Protocols, 2001. Ninth International Conference on, pp. 24–34, IEEE, 2001.

11.     Chen, B., Jamieson, K., Balakrishnan, H., and Morris, R., “SPAN: An Energy-Ecient Coordination Algorithm for Topology Maintenance in Ad hoc Wireless Networks,” Wireless Networks, vol. 8, no. 5, pp. 481–494, 2002

12.     Chang, J. and Tassiulas, L., “Energy Conserving Routing in Wireless Ad-hoc Networks,” in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEEComputer and Communications Societies.Proceedings.IEEE, vol. 1, pp. 22–31, IEEE, 2000.

13.     Kirousis, L., Kranakis, E., Krizanc, D., and Pelc, A., “Power Consumption in Packet Radio Networks,” Theoretical Computer Science, vol. 243, no. 1, pp. 289–305, 2000.

14.     Krunz, M., Muqattash, A., and Lee, S., “Transmission Power Control in Wireless Ad hoc Networks: Challenges, Solutions and Open Issues,” Network, IEEE, vol. 18, no. 5, pp. 8–14, 2004.

15.     Li, N. and Hou, J., “Localized Fault-Tolerant Topology Control in Wireless Ad hoc Networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 17, no. 4, pp. 307–320, 2006.





Ramaprasad P, Shruthi K, Srishti Agarwal, Sanjana Jayaraj, Sowmya K

Paper Title:

An Experimental Study and Design of A System and App To Measure Pulse Rate

Abstract: The amalgamation of electronics with healthcare has been an inevitable and positive development that continues to aid people in leading longer and healthier lives. However, one of the major obstacles facing the penetration of these facilities into the third tier cities and villages in India is the cost that these systems entail. The research work aimed to provide a platform for economical and easy access to the usage of such devices. It entails the calculation of pulse rate of human beings using an oximeter probe and interpretation of the results obtained via a mobile application, thereby eliminating the need for expensive interpreters such as ECG machines. Further, information derived from these devices could be used as further health indicators like haemoglobin count and glucose levels. In this paper, the pulse rate is measured using a pulse oximeter probe. The photo detector current signals from the oximeter probe are converted to voltage. The signal is then processed by filtering out noise and by amplification. The microcontroller is responsible for peak detection and calculation of number of peaks in the processed signal. The result in beats per minute is displayed on a user friendly Graphical User Interface along with the interpretation of the reading. The results were then tested for accuracy.

 Pulse rate measurement, ECG, Oximeter, Microcontroller.


1.       Shruthi. K, SuvirMulky, Venkatesh Kumar, RajarshiSaha, “An Experimental Study and Design of a System to Measure Haemoglobin, Blood Glucose and Pulse rate”, International Conference on Communication and Computing(ICCC), Bangalore, India, August 21-23, 2014.
2.       Naazneen M. G., SumayaFathima, SyedaHusnaMohammadi, Sarah Iram L. Indikar, Abdul Saleem, Mohamed Jebran, “Design and Implementation of ECG Monitoring and Heart Rate Measurement System”, International Journal of Engineering Science and Innovative Technology (IJESIT), ISSN: 2319-5967, Volume 2, Issue
3, May 2013.

3.       Pulse Oximeter Probes, Available: https://energymicroblog.wordpress.com /2012/11/21/create-a-simple-pulse-oximeter-with-tiny-gecko/

4.       M.M.A. Hashem, Rushdi Shams, Md. Abdul Kader, Md. Abu Sayed, "Design and Development of a Heart Rate Measuring Device using Fingertip", International Conference on Computer and Communication Engineering, 11-13 May, 2010.

5.       Santiago Lopez, "Pulse Oximeter Fundamentals and Design", Freescale Semiconductor Document Number:AN4327, Application Note, Rev. 2, November 2012.

6.       Pulse Oximeter Working, Available:http://www.howequipmentworks.com/ pulse_oximeter/

7.       J.G. Webster, “Design of Pulse Oximeters”, Institute of Physics Publishing, ISBN 0750304677.

8.     Ramakant A. Gayakwad, “Op-amps and Linear Integrated Circuits”, Prentice-Hall of India Pvt. Limited, 2000, Edition 4, ISBN 0132808684.

9.       AVR ATmega16 Datasheet, Available: http://www.alldatasheet.com/ datasheet-pdf/pdf/78532/ATMEL/ATMEGA16.html

10.    AVR Timers, Available: http://maxembedded.com/2011/06/avr-timers-timer0/

11.    AVR USART, Available:http://extremeelectronics.co.in/avr-tutorials/ using-the-usart-of-avr-microcontrollers/

12.    VISUAL BASIC, Available: https://msdn.microsoft.com/ens/ library/aa733721%28v= vs.60%29.aspx

13.    VISUAL BASIC Controls, Available:  http://www.tutorialspoint.com/ vb.net/





Zhivko Kiss’ovski, Vasil Vachkov

Paper Title:

Model of a Miniature Plasma Antenna

Abstract: In this work we report results from theoretical modeling of miniature plasma antenna at low gas pressure working at a frequency of 2.45 GHz. The plasma antenna is investigated for the first time as a cylindrical dielectric resonator antenna (DRA) with known electric and magnetic fields on the wall surfaces. The plasma column in a finite length vessel is sustained by azimuthally symmetric surface wave (TM00-mode) and this plasma antenna works as an asymmetrical electrical dipole above the metal plane. The dispersion relation of the surface waves in the plasma column is solved numerically and their wavelength, damping rate and field distribution are obtained. Antenna radiated power depends on the value of the axial component of the electric field on the boundary plasma-air. Results show that the antenna radiation from cylindrical plasma column at low gas pressure is similar to a dielectric resonator antenna.

antenna, dielectric resonator, plasma, surface waves 


1.       T.  Anderson ”Plasma Antennas”, Artech House; 2011.
2.       G.G.  Borg, J.H. Harris, D.G.  Miljak, N.M. Martin, 1999 “Application of plasma columns to radiofrequency antennas”, Appl. Phys. Let., 1999; 74: 3272.

3.       J.P. Rayner, A.P. Whichello, A.D.  Cheetham. “Physical characteristics of plasma antennas”, IEEE Trans. Plasma Sci., 2004; 32: 269.

4.       R. Kumar, D. Bora, “Wireless communication capability of  a reconfigurable plasma antenna” J Appl. Phys. 2011; 109: 063303.

5.       E.N.  Istomin,  D.M.  Karfidov, I.M.  Minaev, A.A.  Rukhadze,  V.P. Tarakanov, K.F. Sergeichev, A.Yu. Trefilov, “Plasma asymmetric dipole antenna excited by a surface wave” Plasma Physics Reports, 2006; 32: 388-400.

6.       Z. Chen, A. Zhu, J. LV. “Two-dimensional models of cylindrical monopole plasma antenna excited by surface wave” WSEAS Trans on Com 12(2):63, 2013.

7.       J. Rayner and A. Cheetham “Travelling models in wave-heated plasma sources”,  IEEE Trans. Plasma Sci. 2010; 38: 62.

8.       Minaev, A.A Rukhaze   et. al, Priklanaya Radioelecyronika 2012 v.11, p 476.

9.       N. N. Bogachev, L. L. Bogdankevich, N. G. Gusein-zade, V. P. Tarakanov “Computer simulation of plasma vibrator antenna” Acta Polytechnica 53(2):1-3, 2013.

10.    NN Bogachev et al.. Acta Polytevhnica 55, 2015 , p.34.

11.    Zh. Kiss’ovski,  V. Vachkov, S. Iordanova, I. Koleva, “Microwave discharges in a finite length vessel”, Journal of Physics: Conference Series, 2012; 356: 012009.

12.    Zh. Kiss’ovski, M. Kolev,  A. Ivanov,  St. Lishev and  I. Koleva, 2009 ”Small surface wave discharge at atmospheric pressure”; J Phys. D: Appl. Phys. 2009; 42: 182004.

13.    C. Boisse-Laporte, “Wave propagation in bounded plasmas” In: C.M. Ferreira, M. Moisan editors, “Microwave Discharges: Fundamentals and Applications”,  Plenum Press, New York and London, 1993.

14.    Yu. M. Aliev, H. Schlüter and A. Shivarova, Guided-wave-produced plasmas, Springer, Berlin, 2000

15.    K-M Luk and K-W Leung, Dielectric Resonator Antennas, Institute of Physics PUBLISHING, Dirac House Bristol, 2003

16.    Balanis C, Antenna theory,  John Wiley & Sons, New Jersey, 2005





Salwa A. Al-agha, Hilal H. Saleh, Rana F. Ghani

Paper Title:

Analyze Features Extraction for Audio Signal with Six Emotions Expressions

Abstract: Audio feature extraction plays an important role in analyzing and characterizing audio content. Auditory scene analysis, content-based retrieval, indexing, and fingerprinting of audio are few of the applications that require efficient feature extraction. The key to extract strong features that characterize the complex nature of audio signals is to identify their discriminatory subspaces. The audio information analysis for emotion recognition generally comprises linguistic and paralinguistic measurements. The linguistic measurement conforms to the rules of the language whereas paralinguistic measurement is the meta-data; i.e. related to how the words are spoken based on variations of pitch, intensity and spectral properties of the audio signal. This paper presents a technique for analyzing the features which extracted from recording audio signals in time domain and frequency domain by using statistical methods.

 Audio Signals, Audio Feature Analysis, Feature Extraction, Emotion Expression, MFCC, Pitch Extraction


1.       X. Chao, D. Pufeng, F. Zhiyong, M. Zhaopeng, C. Tianyi, and D. Caichao, “Multi-Modal Emotion Recognition Fusing Video and Audio”, Applied  Mathematics & Information Sciences An International Journal, No. 2, p. 455-462, March 2013.
2.       Joshi, “Speech Emotion Recognition Using Combined Features of  HMM & SVM Algorithm”, International Journal of Advanced Research  in Computer Science and Software Engineering (IJARCSSE), Vol 3, No. 8, pp. 387-393, ISSN: 2277 128X, August 2013. 

3.       S. Chen, “Joint Processing of Audio-Visual Information for the Recognition of Emotional Expressions in Human-Computer Interaction”, Thesis for the degree of
Doctor of Philosophy in Electrical Engineering  in the Graduate College of the University of Illinois at Urbana- Champaign, 2000.

4.       M.Alnadabi, “Speech/Music Discrimination: Novel Features in Time Domain”, Thesis for the degree of Doctor of Philosophy in the University of Durham, April 2010.

5.       Y. Wang, Z. Liu, and J.-C. Huang, “Multimedia Content Analysis: Using Both Audio and Visual Clues”, in IEEE Signal Processing Magazine, p. 12-36, 2000.

6.       Panagiotakis, and G. Tziritas, “A Speech-Music Discriminator Based On RMS and Zero-Crossings”, IEEE Transactions on Multimedia 7(1), p. 155-166, 2005.

7.       J.G. Proakis, and D.G. Manolakis, “Digital Signal Processing: Principles, Algorithms, and Applications”, 3rd New Delhi: Prentice-Hall India, 2000.

8.       W.Q. Wang, W. GaO, and D.W. Ying, “A Fast and Robust Speech/Music Discrimination Approach”, in ICICS-PCM Singapore, 2003.

9.       Kedem, “Spectral Analysis and Discrimination by Zero-Crossings”,  Proceedings ofthe IEEE, 74(11), p. 1477-1493, 1986.

10.    Datta, M. Shah, and N. V. Lobo, "Person-on-Person Violence Detection in Video Data", IEEE International Conference on Pattern Recognition, Canada, 2002.

11.    K. Ishizuka, and N. Miyazaki, “Speech Feature Extraction Method Using Subband -Based Periodicity and Non periodicity Decomposition”, Journal of Acoustical Society of America 120(1), p. 443–452, 2006.

12.    Ross, H. Shaffer, A. Cohen, R. Freudberg, H. Manley, “Average Magnitude Difference Function Pitch Extractor”, Proceedings of IEEE Transactions Lon Speech and Audio, pp. 353-362, 1974.

13.    J. Cioffi, “Limited-Precision Effects in Adaptive Filtering”, IEEE Transactions on Circuits and Systems, Vol. 34, No. 7, pp. 821­833, 1987.

14.    Sondhi, “New Methods of Pitch Extraction”, IEEE Trans. on Audio and Electro Acoustics, Vol. 16, No. 2, pp. 262­266, 1968.

15.    Saad, “A Multi-feature Speech/Music Discrimination System”, in  Nineteenth National Radio Science Conference, Alexandria: URSI, 2002.

16.    Scheirer, and M. Slaney, “Construction and Evaluation of a Robust Multi-feature Speech/Music Discriminator”, International Conference on Acoustics, Speech, and Signal Processing (ICASSP'97), 1997.

17.    R. Hasan, M. Jamil, G. Rabbani, and S. Rahman, “Speaker Identification using Mel Frequency Cepstral Coefficients”, 3edInternational Conference on Electrical &
Computer Engineering ICECE, ISBN 984-32- 1804-4, p. 565-568, December 2004.

18.    M. E. Safi, “Speech Recognition based Microcontroller for Wheelchair Movements”, Thesis for the degree of Master of Science in Electronic Engineering in the University of Technology, August 2013.





Youssef Saadi, Bouchaib Nassereddine, Soufiane Jounaidi, Abdelkrim Haqiq

Paper Title:

VLANs Investigation in IEEE 802.11s Based Wireless Mesh Networks

Abstract: The virtual local area network (VLAN) technology is a convenient concept to improve the wireless mesh networks performance by eliminating the unnecessary rebroadcasts flooded from stations located outside the mesh BSS. Hundreds or even thousands of stations may be located at a IEEE 802 LAN segment which leads to think about broadcasting cost if such segment is bridged to the wireless mesh BSS. The latter is seen as a single broadcast domain from external networks. Consequently, flooding may hinder the transmission of data frames due the broadcasting storm problems. VLANs is a logical concept that aims to segment a network into different broadcast domains by compartmentalizing users and devices. A bridging solution that carry VLANs traffic along the mesh BSS may reduce the flooding impact on data frames transmission. In this paper, we investigate the VLAN support for IEEE 802.11s. We were motivated by the fact that no specification of VLAN integration has been defined in the draft of IEEE 802.11s.

   Flooding, IEEE 802.11s, Multicasting, VLAN, Wireless Mesh Network.


1.       X. Wang, and A.O.  Lim, IEEE 802.11s wireless mesh networks: Framework and challenges, Ad Hoc Networks 6 (2008) 970–984.
2.       Hiertz, G.R.; Denteneer, D.; Max, S.; Taori, R.; Cardona, J.; Berlemann, L.; Walke, B., "IEEE 802.11s: The WLAN Mesh Standard," Wireless Communications, IEEE , vol.17, no.1, pp.104,111, February 2010. doi: 10.1109/MWC.2010.5416357               

3.       IEEE 802.11 Standard Working Group, Draft Standard for Information Technology –Telecommunications and Information Exchange Between Systems – LAN/MAN Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE P802.11-REVma/D9.0, January 2007.

4.       Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, J.-P. Sheu, The broadcast storm problem in a mobile ad hoc network, Wireless Networks 8 (2/3) (2002) 153–167.

5.       G.  Prakash Pal, S.  Pal, “Virtual Local Area Network (VLAN)”, International Journal of Scientific Research Engineering & Technology (IJSRET), Volume 1 Issue10 pp 006-010 January 2013. ISSN 2278 - 0882

6.       IEEE 802.11s Task Group HWMP Specification doc.:  IEEE 802.11-06/1778r1 November 2006.

7.       C.E. Perkins, E.M. Belding-Royer, S.R. Das, Ad hoc on-demand distance vector (aodv) routing, IETF RFC3561, July 2003.

8.       Bahr, M., "Update on the Hybrid Wireless Mesh Protocol of IEEE 802.11s," Mobile Adhoc and Sensor Systems, 2007. MASS 2007. IEEE International Conference on, vol., no., pp.1, 6, 8-11 Oct. 2007

9.       doi: 10.1109/MOBHOC.2007.442872.

10.    Sung-Jun Bae; Young-Bae Ko, "Efficient layer-2 multicasting for IEEE 802.11s based wireless mesh networks," Ubiquitous and Future Networks (ICUFN), 2010 Second International Conference on, vol., no., pp.109,114, 16-18 June 2010.

11.    doi: 10.1109/ICUFN.2010.5547223

12.    S Y. Ameen, S W. Nourildean, “Wireless Local Area Network VLAN Investigation and Enhancement Using Routing Algorithms”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-3, Issue-2, December 2013, ISSN: 2249 – 8958.

13.    Clausen T, Jacquet P, RFC 3626-“Optimized Link State Routing Protocol (OLSR)”, Oct 2003.

14.    Rajul Chokshi and Dr. Chansu Yu, “Study on VLAN in Wireless Networks”, 2007.

15.    T. Gamer, “Differentiated security in wireless mesh networks”, SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. (2009). DOI: 10.1002/sec.163

16.    Tzu-Chiang Chiang, Ching-Hung Yeh, Yueh-Min Huang, “A virtual subnet protocol for mobile ad hoc networks using forwarding cache scheme”, International Journal of Computer Science and Network Security, Vol. 6  No. 1  pp. 108~115.

17.    D. Raychaudhuri, I. Seskar, M. Ott, S. Ganu, K. Ramachandran,

18.    H. Kremo, R. Siracusa, H. Liu, M. Singh, Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC ’05), 2005, pp. 1664–1669.

19.    J. Robinson, E. Knightly, A performance study of deployment factors in wireless mesh networks, in: Proceedings of the IEEE International Conference on Computer Communications (INFOCOM ’07), 2007, pp. 2054–2062.

20.    Kelvin Fall, “The ns manual (formerly ns Notes & Documentation)”, US Berkerley LBL USC/ISI and Xerox PARC, 2010.





Abhaya D S, Remya Annie Eapen

Paper Title:

Energy Efficient Transmission in Random Clustered Wireless Sensor Networks Using Cooperative MISO

Abstract: Wireless sensor networks are composed of many wireless sensing devices called sensor nodes. These nodes are small in size, limited in resources and randomly deployed in harsh environment. The replacement or recharging of battery is difficult; therefore energy consumption is necessary for WSN. Employing Multi Input Single Output (MISO) links can improve energy efficiency in Wireless Sensor Networks (WSN). Although a sensor node is likely to be equipped with only one antenna, it is possible to group several sensors to form a virtual MISO link. Such grouping can be formed by means of clustering. Cooperative MISO is considered here which aims at reducing energy consumption in multi hop WSNs. In order to improve the energy efficiency a sleep technique is also considered

 Random wireless sensor networks, cooperative multi-input-single-output, multi input single output


1.    Bin li , Senior, Wenjie Wang and HuiLui, “Performance analysis and   optimization for energy-efficient cooperative transmission in random wireless sensor network”, IEEE Transactions on Wireless Communications, vol.12, no. 9, pp. 4647-4656, Sept. 2013.
2.    C. Cheng, C. Tse, and F. Lau, “An energy-aware scheduling scheme for  wireless sensor networks”, IEEE Trans. Veh. Technol., vol. 59, no. 7, pp. 3427–3444, Sept. 2010.

3.    S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks,” IEEE J. Sel. Areas Commun., vol. 22, no. 6, pp. 1089–1098, Aug. 2004.

4.    M. Ahmed and S. Vorobyov, “Collaborative beamforming for wireless sensor networks with Gaussian distributed sensor nodes,” IEEE Trans. Wireless Commun., vol. 8, no. 2, pp. 638–643, Feb. 2009.

5.    Y. Jing and H. Jafarkhani, “Network beamforming using relays with perfect channel information,” IEEE Trans. Inf. Theory,, vol. 55, no. 6, pp. 2499–2517, June 2009.

6.    D. Wu, Y. Cai, L. Zhou, and J. Wang, “A cooperative communication scheme based on coalition formation game in clustered wireless sensor networks,” IEEE Trans. Wireless Commun. vol. 11, no. 3, pp. 1190– 1200, Mar. 2012.

7.    J. Zhang, L. Fei, Q. Gao, and X. Peng, “Energy-efficient multihop cooperative MISO transmission with optimal hop distance in wireless ad hoc networks,” IEEE Trans.
Wireless Commun., vol. 10, no. 10, pp. 3426–3435, Oct. 2011.

8.    M. Z. Siam, M. Krunz, and O. Younis, “Energy-efficient clustering/ routing for cooperative MIMO operation in sensor networks,” in Proc. 2009 IEEE INFOCOM, pp. 621–629.

9.    S. K. Jayaweera, “Virtual MIMO-based cooperative communication for energy-constrained wireless sensor networks,” IEEE Trans. Wireless Commun., vol. 5, no. 5, pp. 984–989, May 2006.

10. Z. Zhou, S. Zhou, S. Cui, and J. Cui, “Energy-efficient cooperative communication in a clustered wireless sensor network,” IEEE Trans. Veh. Technol., vol. 57, no. 6, pp. 3618–3627, Nov. 2008.





Rustom Mamlook, Omer Fraz Khan

Paper Title:

Advanced Security System using Web Remote

Abstract: Our paper proposes a design of an Advanced Security System using Web Remote (ASSWR). Our system uses an embedded system module interfaced with an Alarm device.  A web Computer Controller for registering and routing the alert signals issued by the monitored devices to multiple monitoring sites was used. Our Embedded system module design was tested using software simulator. The hardware was constructed to simulate a real security system. Web Service was implemented and devices were controlled over World Wide Web Network using windows Forms as well as a Web Application interface. The used Communication channel in our paper is Web Sockets and Http over TCP/IP along with integration of communication within microcontrollers over UART (Universal Asynchronous Receive/Transmitter).

 Web Remote Security System; Embedded System; Software based security system simulator; Web application for security; Security over Web Sockets and Http.


1.       Sheikh Izzal Azid and Sushil Kumar, 2011, “Performance of a Low Cost Based Home Security system”, International Journal of Smart Home, The University of South Pacific, Fiji.
2.       Wireless Technologies retrieved from: http://docwiki.cisco.com/wiki/Wireless_Technologies, last accessed on 2015.

3.       Intelligent residential security alarm and remote control system based on single chip computer, Authors: Liu Zhen-ya; Sci. Sch., Jiangxi Inst. of Educ., Jiangxi ;
Wang Zhen-dong ; Chen Rong ; Wu Xiao-feng, published in Industrial Electronics and Applications, 2008. ICIEA 2008. 3rd IEEE Conference.

4.       Web based remote security system (WRSS) model development, Wanaka, S.V. ; Dept. of Electr. & Comput. Eng., Florida Int. Univ, Miami, FL, USA; De La Cruz, M. Published in Southeastcon 2000. Proceedings of the IEEE

5.       Microsoft .NET framework retrieved from: http://www.microsoft.com/net Last accessed on: 2014

6.       Web ASMX Service .NET Microsoft Technology retrieved from https://msdn.microsoft.com/en-us/magazine/cc163674.aspx last accessed on: 2015.

7.       http://www.mikroe.com/ a website for development tools, compilers for programming microcontrollers and related hardware components, last accessed on: 2015.

8.       http://www.labcenter.com/index.cfm source of simulator for PIC and other types of microcontrollers, Last accessed on: 2015.

9.       http://www.bitpipe.com/tlist/Internet.html, last accessed on 2015.

10.    Retrieved from: http://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/26704-nat-faq-00.html Last accessed on: Nov 10, 2014.

11.    DNS Concepts and facilities retrieved from http://tools.ietf.org/html/rfc882 , Domain Names: Implementation & Specification retrieved from http://tools.ietf.org/html/rfc883, last accessed on Dec 25, 2014.
12.    Retrieved from http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm Article explaining the algorithm released for the public domain called as TEA. With XTEA and XXTEA both modified versions of TEA against crypto-attacks are also explained, last accessed on Dec 25, 2014.

13.    Y. Zhao and Z. Ye, 2008,”A Low Cost GSM/GPRS Based Wireless Home Security System”, IEEE Transactions on Consumer Electronics, 54(2), pp. 567-572, 2008.

14.    Jun Zhang, Hui Wang, Tianhua Meng and Guangming Song, 2011,“Design of a Wireless Sensor Network Based Monitoring System for Home Automation”, International Conference on Future Computer Sciences and Application (ICFCSA), pp. 57-60, Nanjing, June 2011.

15.    UART communication document retrieved from: https://www.freebsd.org/doc/en_US.ISO8859-1/articles/serial-uart/, Last Accessed on Dec 2015.

16.    Grain of Salt: An Automated Way to Test Stream Ciphers through SAT Solvers, Mate Soos, Research paper available at http://gforge.inria.fr/frs/download.php/27285/grainofsalt-1.1-desc.pdf, Last accessed on Feb, 14 2015.

17.    Chun-Liang HSU, Sheng-Yuan Yang and Wei-Bin Wu, 2009,“Constructing Intelligent Home- Security System Design With Combining Phone-Net And Bluetooth Mechanism”, Proceedings of the Eighth International Conference on Machine Learning and Cybernetics, St. John’s University, Taiwan.

18.    Mega lingam R.K, Nair R.N, Prakhya S.M, Mohan M,2011 “ Low Power, intelligent, wireless, home security system for elderly people”, Third International Conference
on Electronics Computer Technology (ICECT) Proceedings , Volume 4, Page 320 -324.
19.    WIRELESS HOME SECURITY SYSTEM WITH MOBILE, Prof. (Dr.) Khanna SamratVivekanand Omprakash, Published in  International Journal of Advanced Engineering Technology

20.    Using Security Logs for Collecting and Reporting Technical Security Metrics, Risto Vaarandi and Mauno Pihelgas,  published in  2014 IEEE Military Communications Conference and also included in Proceedings of the 2014 IEEE Military Communications Conference

21.    A study of the compliance of alarm installations in Perth, Western Australia: Are security alarm systems being installed to Australian Standard AS2201.1 - "systems installed in a client's premises." , Originally published in the Proceedings of 7th Australian Information Warfare and Security Conference, Edith Cowan University, Perth Western Australia, 4th - 5th December, 2006.