Volume-6 Issue-5

  • Version
  • Download 0
  • File Size 4.00 KB
  • Create Date August 27, 2017

 Download Abstract Book 

S. No

Volume-6 Issue-5, June 2017, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Shubhangi Pandhare, Abhishek Gautam, Sayali Chavan, Shital Sungare

Paper Title:

Co-Operative Content Downloading Framework Over Cellular Network

Abstract: The multifold advancement over wireless communication has in a way, predicted to use smartphones, laptops, and tabs vastly for downloading purpose. But due to confined data transfer capacity, the statistics of downloading quantity approximately for a distinctive person is constrained and time taking for a high precision video. The co-operative content downloading framework will permit the requested joiners inside the network to download a section of the file independently. This may aid the potential to download the document with cost effectiveness and with a reduced time consumption component. The above mentioned framework will additionally trace the real process how the transfer speed (bandwidth) will be distributed within the joiners and one requestor. The entire framework will deliver the efficient utilization of bandwidth in specific environments.

 Segmentation, Cluster formation, Adhoc network, Sequencing.


1.       Haibo Zhou, Student Member, IEEE, Bo Liu, Member, IEEE, Tom H. Luan, Member,, “ChainCluster: Engineering a Cooperative Content Distribution Framework for Highway Vehicular Communications”, IEEE transactions on intelligent transportation systems, 2014.
2.       Chao-Hsien Lee, Chung-Ming Huang, Senior Member, IEEE, Chia-Ching Yang, and Hsiao-Yu Lin,,“ The K-hop Cooperative Video Streaming Protocol Using H.264/SVC Over the Hybrid Vehicular Networks,” , IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 6, JUNE 2014.

3.       Aarti R. Thakur,  Prof. Jagdish Pimple, “Performing vehicle to vehicle communication based on two tier approach with high security using aodv protocol in VANET”, 1) International Journal of Emerging Research in Management &Technology ISSN: 2278-9359 (Volume-3, Issue-7),July 2014

4.       J. Luo and D. Guo, “Neighbor discovery in wireless ad-hoc networks based on group testing,” in Proc. 46th Annu. Allerton Conf.Communication, Control, Computing, Urbana-Champaign, IL, USA Sep. 2008, pp. 791–797.

5.       R. Khalili, D. L. Goeckel, D. Towsley, and A. Swami, “Neighbor discovery with reception status feedback to transmitters,” in Proc. 29th IEEE Conf. INFOCOM, San Diego, CA, USA, Mar. 2010,pp. 2375–2383

6.       C.-M. Huang, C.-C. Yang, and H.-Y. Lin, “A K-hop bandwidth aggregation scheme for member-based cooperative transmission over vehicular networks,” in Proc. 17th IEEE ICPADS, Tainan, Taiwan, 2011, pp. 436–443.

7.       Nandan, S. Das, G. Pau, M. Gerla, and M. Y. Sanadidi, “Cooperative downloading in vehicular ad-hoc wireless networks,” in Proc. 2nd Annu. Conf. WONS, Washington, DC, USA, 2005 pp. 32–41

8.       M. F. Tsai, N. Chilamkurti, J. H. Park, and C. K. Shieh, “Multi-path transmission control scheme combining bandwidth aggregation and packet scheduling for real-time streaming in multi-path environment,” Instit. Eng. Technol. Commun., vol. 4, no. 8, pp. 937–945, 2010.

9.       M. Y. Hsieh, Y. M. Huang, and T. C. Chiang, “Transmission of layered video streaming via multi-path on ad-hoc networks,” Multimedia Tools Appl., vol. 34, no. 2, pp. 155–177, 2007.

10.    D. Fan, V. Le, Z. Feng, Z. Hu, and X. Wang, “Adaptive joint session scheduling for multimedia services in heterogeneous wireless networks, in Proc. 70th IEEE VTC, Anchorage, AK, USA, Sep. 2009, pp. 1–5.

11.    M. Li, Z. Yang, and W. Lou, “Codeon: Cooperative popular content distribution for vehicular networks using symbol level network coding,” IEEE J. Sel. Areas Commun., vol. 29, no. 1, pp. 223–235, Jan. 2011.





Cini K.

Paper Title:

Value Based Reliability Evaluation of Primary Power Distribution System

Abstract: Distribution system reliability is concerned with the availability and quality of power supply at each customer’s service entrance. Analysis of customer failure statistics shows that failure in distribution system contribute as much as 90% towards the unavailability of supply to a load as compared with each part of electric systems. These statistics reinforces the need for reliability evaluation of distribution systems. In recent years with the advent of smart grids the significance of distribution system has enhanced because of the importance of co generation and distributed generation. The different causes and duration of failures are analysed season wise. The failure rate of the different feeders of the system under study was calculated and the reliable feeders were identified. Suggestions are given to improve the reliability of the feeders. This type of analysis will help the operation and maintenance engineers to maintain the quality service to the customers and schedule the maintenance services.  

Distribution Systems, Reliability Indices, Failure Rate, Availability.

1.       Biyun Chen; Qianyi Chen “The whole-process reliability evaluation  of  power  system including generation, transmission, transformation and distribution” IEEE 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT), pp 482-487
2.       H. 2. Andrews, Laura, Samuel” Novel Power System Reliability Indices calculation method” 23rd International Conference on Electricity Distribution, Lyon  15-18, June .

3.       Roy Billinton and Peng Wang “ Distribution System Reliability Cost/worth analysis Using Analytical and sequential Simulation Techniques” IEEE transactions on power systems, Vol.13, No.4, November 1998,pp1245-1250.

4.       R. Billinton and J. E. Billinton, “Distribution System Reliability Indices”, IEEE Trans. on Power Delivery, Vol. 4, No. 1, Jan. 1989, pp. 561-568.

5.       Vito Longo ,Walter R. Puntel, “Evaluation of Distribution System Enhancements Using Value-Based Reliability Planning” Procedures IEEE Transactions on Power
systems, vol. 15, no. 3, august 2000.

6.       Billinton, R., and Allan, R. N., "Reliability Evaluation of Power Systems",Pitman Books, New York and London, 1984.

7.       Billinton, R., "Evaluation of Reliability Worth in an Electric Power system". Reliability Engineering and System Safety, Vol. 46, No. 1, 1994.

8.       Carlos Eduardo Paida Tenemaza “State of Art, Reliability In Electrical Distribution Systems Based On Markov Stochastic Model”  IEEE Latin America Transactions, Volume: 14, Issue: 2, pp 799-804.

9.       Farajollah Soudi and Kevin Tomsovic  “Optimal Trade-Offs in Distribution Protection Design” IEEE  transactions on power delivery, vol. 16, no. 2, April 2001.

10.    Amir Safdarian; Mohammad Farajollahi; Mahmud Fotuhi-Firuzabad “ Impacts of Remote Control Switch Malfunction on Distribution System Reliability” IEEE Transactions on Power Systems, Volume: 32, Issue: 2, 2017, pp 1572-1573.

11.    Siripha Junlakarn; Marija Ilić , “Distribution System Reliability Options and Utility Liability”  IEEE Transactions on Smart Grid , Volume: 5, Issue: 5, 2014, pp 2227-2234.





S. L. Deshpande, D S Chaudhari

Paper Title:

Wireless Nodes Assisted Micro-Irrigation System: an IoT Approach

Abstract: Irrigation systems deployed with Wireless Sensor Network (WSN) while transforming them to Micro-Irrigation systems are emerging as fruitful solution to ongoing ground water crisis. Field parameters like soil moisture, temperature and humidity can be monitored taking help of sensor array and can be fed back to decision making control system. Organized parametric results can help the optimized use of the water. By using wireless communication and environmental energy harvesting techniques, sensor network can be made totally wireless. Internet of Things (IoT) is another emerging technology that goals to extend the application of internet from complex computational machines (computer) to the stand alone devices such as consumer electronics. Integrating IoT to WSN not only can provide remote access but also allow two distinct information systems to frequently collaborate and provide common services. Also the user can be provided with flexible interface like mobile application. The miniaturization in technology and even more reliable communication are the strongest suits of such sensor network. This paper reviews for various technologies to fulfil requirement of such application and the shows some system characteristics.

 WSN, IoT, Irrigation, Moisture, Humidity, Energy Harvesting, etc.


1.       Basic Botany, Physiology, and Environmental Effects on Plant Growth, AZ master gardner manual, The University of Arizona, AZ, 1998.
2.       M. Morris. (2006). Soil Moisture Monitoring: Low-Cost Tools and Methods [Online]. Available FTP: attra.ncat.org Directory: attra-pub/PDF File: soil moisture.pdf

3.       Y. Kim, R. Evans and W. Iversen, "Remote Sensing and Control of an Irrigation System Using a Distributed Wireless Sensor Network," in IEEE Transactions on Instrumentation and Measurement, vol. 57, pp. 1379ꟷ1387, July 2008.

4.       W. Wang and S. Cao, "Application Research on Remote Intelligent Monitoring System of Greenhouse Based on ZIGBEE WSN," 2nd International Congress on Image and Signal Processing, Tianjin, pp. 1-5, 2009.

5.       Yu, Y. Cui, L. Zhang and S. Yang, "ZigBee Wireless Sensor Network in Environmental Monitoring Applications," 5th International Conference on Wireless Communications, Networking and Mobile Computing, Beijing, pp. 1ꟷ5, 2009.

6.       Z. Rasin, H. Hamzah and M. Aras, "Application and evaluation of high power Zigbee based wireless sensor network in water irrigation control monitoring system," IEEE Symposium on Industrial Electronics & Applications, Kuala Lumpur, pp. 548ꟷ551, 2009.

7.       M. Zorzi, A. Gluhak, S. Lange and A. Bassi, "From today's INTRAnet of things to a future INTERnet of things: a wireless- and mobility-related view," in IEEE Wireless Communications, vol. 17, no. 6, pp. 44-51, December 2010.

8.       G. Kortuem, F. Kawsar, V. Sundramoorthy and D. Fitton, "Smart objects as building blocks for the Internet of things," in IEEE Internet Computing, vol. 14, no. 1, pp. 44-51, Jan.-Feb. 2010.

9.       K. Langendoen, A. Baggio and O. Visser, "Murphy loves potatoes: experiences from a pilot sensor network deployment in precision agriculture," Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, Rhodes Island, pp. 1ꟷ8, 2006.

10.    L. Li, H. Xiaoguang, C. Ke and H. Ketai, "The applications of WiFi-based Wireless Sensor Network in Internet of Things and Smart Grid," 6th IEEE Conference on Industrial Electronics and Applications, Beijing, pp. 789-793, 2011

11.    M. Lee, J. Hwang and H. Yoe, "Agricultural Production System Based on IoT," IEEE 16th International Conference on Computational Science and Engineering, Sydney, NSW, pp. 833-837, 2013.





Sajith A.G, Hariharan S

Paper Title:

A Region based Active Contour Approach for Liver CT Image Analysis Driven by Local likelihood Image Fitting Energy

Abstract: Computer tomography images are widely used in the diagnosis of liver tumor analysis because of its faster acquisition and compatibility with most life support devices. Accurate image segmentation is very sensitive in the field of medical image analysis. Active contours plays an important role in the area of medical image analysis. It constitute a powerful energy minimization criteria for image segmentation. This paper presents a region based active contour model for liver CT image segmentation based on variational level set formulation driven by local likelihood image fitting energy. The neigh bouring intensities of image pixels are described in terms of Gaussian distribution. The mean and variances of intensities in the energy functional can be estimated during the energy minimization process. The updation of mean and variance guide the contour evolving toward tumor boundaries. Also this model has been compared with different active active contour models. Our results shows that the presented model achieves superior performance in CT liver image segmentation. 

Active Contours, Chan-Vese model, Level sets


1.       Kass, M., Witkin, A., and Terzopoulos, D.: ‘Snakes: Active contour models’, International journal of computer vision, 1988, 1, (4), pp. 321-331
2.       Osher, S., and Sethian, J.A.: ‘Fronts propagating with curvature-dependent speed: algorithms based on Hamilton-Jacobi formulations’, Journal of computational
physics, 1988, 79, (1), pp. 12-49

3.       Caselles, V., Kimmel, R., and Sapiro, G.: ‘Geodesic active contours’, International journal of computer vision, 1997, 22, (1), pp. 61-79

4.       Kimmel, R., Amir, A., and Bruckstein, A.M.: ‘Finding shortest paths on surfaces using level sets propagation’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 1995, 17, (6), pp. 635-640

5.       Li, C., Xu, C., Gui, C., and Fox, M.D.: ‘Distance regularized level set evolution and its application to image segmentation’, IEEE transactions on image processing, 2010, 19, (12), pp. 3243-3254

6.       Malladi, R., Sethian, J.A., and Vemuri, B.C.: ‘Shape modeling with front propagation: A level set approach’, IEEE transactions on pattern analysis and machine intelligence, 1995, 17, (2), pp. 158-175

7.       Vasilevskiy, A., and Siddiqi, K.: ‘Flux maximizing geometric flows’, IEEE transactions on pattern analysis and machine intelligence, 2002, 24, (12), pp. 1565-1578

8.       Xu, C., and Prince, J.L.: ‘Snakes, shapes, and gradient vector flow’, IEEE Transactions on image processing, 1998, 7, (3), pp. 359-369

9.       Chan, T.F., and Vese, L.A.: ‘Active contours without edges’, IEEE Transactions on image processing, 2001, 10, (2), pp. 266-277

10.    Cremers, D., Rousson, M., and Deriche, R.: ‘A review of statistical approaches to level set segmentation: integrating color, texture, motion and shape’, International journal of computer vision, 2007, 72, (2), pp. 195-215

11.    He, L., Peng, Z., Everding, B., Wang, X., Han, C.Y., Weiss, K.L., and Wee, W.G.: ‘A comparative study of deformable contour methods on medical image segmentation’, Image and Vision Computing, 2008, 26, (2), pp. 141-163

12.    Li, C., Huang, R., Ding, Z., Gatenby, J.C., Metaxas, D.N., and Gore, J.C.: ‘A level set method for image segmentation in the presence of intensity inhomogeneities with application to MRI’, IEEE Transactions on Image Processing, 2011, 20, (7), pp. 2007-2016

13.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Minimization of region-scalable fitting energy for image segmentation’, IEEE transactions on image processing, 2008, 17, (10), pp. 1940-1949

14.    Paragios, N., and Deriche, R.: ‘Geodesic active regions and level set methods for supervised texture segmentation’, International Journal of Computer Vision, 2002, 46, (3), pp. 223-247

15.    Ronfard, R.: ‘Region-based strategies for active contour models’, International journal of computer vision, 1994, 13, (2), pp. 229-251

16.    Samson, C., Blanc-Féraud, L., Aubert, G., and Zerubia, J.: ‘A variational model for image classification and restoration’, IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22, (5), pp. 460-472

17.    Tsai, A., Yezzi, A., and Willsky, A.S.: ‘Curve evolution implementation of the Mumford-Shah functional for image segmentation, denoising, interpolation, and magnification’, IEEE transactions on Image Processing, 2001, 10, (8), pp. 1169-1186

18.    Vese, L.A., and Chan, T.F.: ‘A multiphase level set framework for image segmentation using the Mumford and Shah model’, International journal of computer vision, 2002, 50, (3), pp. 271-293

19.    Li, C., Kao, C.-Y., Gore, J.C., and Ding, Z.: ‘Implicit active contours driven by local binary fitting energy’, in Editor (Ed.)^(Eds.): ‘Book Implicit active contours
driven by local binary fitting energy’ (IEEE, 2007, edn.), pp. 1-7

20.    Wang, L., He, L., Mishra, A., and Li, C.: ‘Active contours driven by local Gaussian distribution fitting energy’, Signal Processing, 2009, 89, (12), pp. 2435-2447

21.    Zhang, K., Song, H., and Zhang, L.: ‘Active contours driven by local image fitting energy’, Pattern recognition, 2010, 43, (4), pp. 1199-1206

22.    Mumford, D., and Shah, J.: ‘Optimal approximations by piecewise smooth functions and associated variational problems’, Communications on pure and applied mathematics, 1989, 42, (5), pp. 577-685





Ogundare A.B, Ihiovi M.M

Paper Title:

Design of a 3 Phase Automatic Change-Over Switch using a PIC Microcontroller (PIC16F877A)

Abstract: Change over process involves switching electrical load from one power source to another, when the load is powered by two alternative sources (main utility and stand by generator). The process can be complex if it involves starting and stopping of source like generator and monitoring of mains. This paper presents a method to ease this rigorous process. A 3 phase automatic change over which uses generator control mechanism is designed to select between two available sources of power in this case, generator and utility with preference to the utility. The system monitors the utility mains supply and checks for complete failure as well as phase failure upon which it automatically start the generator, run it on idle for a minute, then switch the load to it. The system keeps monitoring the utility source for power restoration, it also monitor the generator output for failure upon any of which it switches back the load to utility supply and automatically switch off the generator. Once power is restored, the system delays for two minute before transferring the load to the utility supply. Success was recorded as the above processes were automated. This was achieved with the combination of discrete electrical and electronics components

 Electrical Load, Utility, Generator, Electrical and Electronics Components.


1.       Ahmed M.S., Mohammed A.S. and Agusiobo O.B. (2006) ‘’Development of a Single Phase Automatic Change-Over Switch’’. AU J.T. 10(1): 68-74. Federal University of Technology Minna, Nigeria. (Jul. 2006)
2.       Amos, S.W. and James, M. (1981). Principles of transistor circuit: Introduction to the design of amplifiers, receivers and digital circuits. 6th ed., Hartnolls ltd., bodmin.UK.

3.       Atser A. Roy et-al, (2014). Design and Implementation of a 3-Phase Automatic Power Change-over Switch. e-ISSN : 2320-0847 p-ISSN : 2320-0936 Volume-3, Issue-9, pp-07-14

4.       Ezema L.S., Peter B.U., Harris O.O. (2012). Design of automatic change over switch with Generator control mechanism. SAVAP international.

5.       L.S. Ezema et-al, (2012). Design of Automatic Change Over Switch with Generator Control Mechanism. ISSN-L: 2223-9944. Vol.3, No.3, November 2012.

6.       Faissler, W.L. (1991). An introduction to modern Electronics, Willey, New York, NY, USA.

7.       Horowitz, P. and Winfield, H. (2002). The Art of Electronics, 2nd ed. Cambridge Univ. Press, Cambridge, UK

8.       Owen, B. (1995). Beginner’s Guide to Electronics 4th Ed. A Newness Technical Book, McGraw-Hill Companies Inc. New York, N.Y, USA.

9.       Oduobuk, E. J. et-al (2014). Design and Implementation of Automatic Three Phase Changer over Using LM324 Quad Integrated Circuit. International Journal of
Engineering and Technology Research Vol. 2, No. 4, April 2014, pp. 1 - 15, ISSN: 2327 – 0349.

10.    Rocks G. and Mazur G., (1993). Electrical motor controls. American Technical Publication, New-York, N.Y, USA.

11.    Ragnar, H. (1958). Electric Contacts Handbook. 3rd Edition, Springer-Verlag, Berlin/ Göttingen /Heidelberg. pp. 331-342.

12.    Theraja, B.L.; and Theraja, A.K. 2002. Electrical Technology, 21st ed. Ranjendra Ravida, New Delhi, India.





Pooja C.S, K. R. Prassana Kumar 

Paper Title:

Survey on Load Balancing and Auto Scaling techniques for cloud Environment

Abstract: Cloud computing became now first choice and priority for every person who access the internet, one of the advantageous features of cloud computing is its scalability and flexibility. Auto scaling offers the facility to the individuals to scale up and scale down the resources as per their requirements, using only the needed resouce and paying for what they have used i.e "pay-as-you-use". As everything take place in automatic manner, so human involvement errors are less and reduce the manpower and costs. so to make use of elasticity user must use auto scaling technique that balances the incoming workload, and reduce the total cost and maintain the Service Level Agreement (SLA).In this work main ideas revolve around the problems in scalable cloud computing systems. In modern days, management of resources is in boom and most talked topic in cloud environment. we present some of the existing load balancing policies and about Autoscaling categories.

cloud computing, scaling, auto scaling, load balancing.


1.    Fang Liu, Jin Tong, Jian Mao, Robert Bohn, John Messina, Lee Badger and Dawn Leaf,"NIST Cloud Computing Reference Architecture", NIST Special Publication 500-292, September 2011.
2.    M.Kriushanth, L. Arockiam and G. JustyMirobi,"Auto Scaling in Cloud Computing: An Overview", International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 7, July 2013, ISSN (Print): 2319-5940,ISSN (Online) : 2278-1021.

3.    Tania Lorido-Botran, Jose Miguel-Alonso , Jose A. Lozano, "A Review of Auto-scaling Techniques for Elastic Applications in Cloud Environments", ARTICLE in JOURNAL OF GRID COMPUTING DECEMBER 2014, Impact Factor: 1.51 • DOI: 10.1007/s10723-014-9314-7.

4.    ChenhaoQu, Rodrigo N. Calheiros, and RajkumarBuyya,"A Reliable and Cost-Ecient Auto-Scaling System for Web Applications Using Heterogeneous Spot Instances", Cloud Computing and Distributed Systems (CLOUDS) Laboratory, Department of Computing and Information Systems, The University of Melbourne, Australia, September 17, 2015.

5.    Gunpriya Makkar, Pankaj Deep Kaur,"A Review of Load Balancing in Cloud Computing", Guru Nanak Dev University, Jalandhar, India, Volume 5, Issue 4, 2015 ISSN: 2277 128X.

6.    Priyanka P. Kukade and Geetanjali Kale “Survey of Load Balancing and Scaling approaches in cloud” vol.4 Feb 2015.

7.    Ashalatha R Evaluation of Auto Scaling and Load Balancing Features in Cloud” vol.117 may 2015.

8.    Dr. D .Ravindran, Ab Rashid Dar loud Based Resource Management with Autoscaling vol.2 .





Ahmed Mohmad Aliywy

Paper Title:

Design and Analysis of NACA0016 Wing Rib and Stringers by using al-7075 and Kevlar

Abstract:  The aircraft wing consists of multiple airfoils shapes that are called “ribs”. These ribs are connected with stringers to form a shape of Skelton and then cover it with aluminium-alloy sheets to make a wing. In this paper, a NACA0016 airfoil ribs with stringers were designed in CATIA V5 by using three types of aluminium-alloys (AL-2024, AL-6061, and AL-7075) and then analysed in ANSYS workbench to determine the deformation, stress and safety factor values. The stringer's material was then changed from al-alloy to cfrp and Kevlar in order to find which combination of materials will give less deformation, stress and high safety factor. The results show that using cfrp material can reduce the weight up to 30% but the stress will increase while using Kevlar nearly reduces stress, deformation and weight up to 252Mpa, 25% and 33%, respectively.  It concluded that AL-7075-t6 and Kevlar materials give less stress and high strength to weight ratio.

Ribs, Stringers, NACA0016, Al-alloys, cfrp, Kevlar, Ansys, CATIA, Design foil.


1.       Nathan logsdon, “a procedure for numerically analyzing airfoils and Wing sections,” The Faculty of the Department of Mechanical &Aerospace Engineering University of Missouri – Columbia, December 2006.
2.       Michael Chun-Yung Niu, “Airframe Stress Analysis and Sizing,” Lockheed Aeronautical Systems Company, California, 1997.

3.       Mr. P.Sujeeth reddy, Mr. M. Ganesh, “Design & Structural Analysis of a Wing Rotor by using ANSYS & CATIA,” International Research Journal of Engineering and Technology, Volume: 02 Issue: 06, sep-2015.

4.       J. Fazil and V. Jayakumar, “INVESTIGATION OF AIRFOIL PROFILE DESIGN USING REVERSE ENGINEERING BEZIER CURVE,” ARPN Journal of Engineering and Applied Sciences, VOL. 6, NO. 7, JULY 2011.

5.       Mohamed Hamdan A1, Nithiyakalyani S2, “Design and Structural Analysis of the Ribs and Spars of Swept Back Wing,” International Journal of Emerging Technology and Advanced Engineering, Volume 4, Issue 12, December 2014.

6.       Ambri, Ramandeep Kaur, “Spars and Stringers- Function and Designing,” International Journal of Aerospace and Mechanical Engineering, Volume 1 – No.1, September 2014.

7.       Megson, T.H.G., “Aircraft structures for engineering students,” Elsevier Aerospace Engineering Series, Fourth edition, 2007.

8.       Muhammad Sohaib, “Parameterized Automated Generic Model for Aircraft Wing Structural Design and Mesh Generation for Finite Element Analysis,” Linköping Studies in Science and Technology, 2011.

9.       Erdogan Madenci, Ibrahim Guven, “The Finite Element Method and Applications in Engineering Using Ansys,” The University of Arizona, Springer Science +Business Media, LLC, 2006.





Deekshitha Dasireddygari

Paper Title:

Practical Immitation Checking and Data Consistency

Abstract: At in attendance Cloud Storage Systems are in front of two main tribulations one is Data steadfastness and the other is storage space. So that many companies are preferring 3-way replica scheme here the main negative aspect is the storage space of facts in Cloud is ever-increasing a lot, it even requires superfluous storage space cost. So we are going through the data trustworthiness and to overcome this problem, in this document we are going all the way through the data supervision which is cost effective and its named as PRCR which is normalized Data steadfastness Model. So we are forthcoming Proactive Replica algorithm, where the transparency is minor at PRCR, and also PRCR gives bare minimum imitation data at the cloud summit of view, which also known as yardstick of cost helpfulness at replication come within reach of. So here our work indicates, comparing both the three-replica tactic with PRCR which to the highest degree reduces the Cloud storage space from one by third to two by third, so it plainly shows the lowering of Storage Cost.

Data Minimum replication, Proactive Replica Checking, data Reliability, Cloud Computing, Cost effectiveness storage


1.       Amazon. (2011). Amazon Simple Storage Service (Amazon S3). [Online]. Available: http://aws.amazon.com/s3/, 2011.
2.       R. Bachwani, L. Gryz, R. Bianchini, and C. Dubnicki, “Dynamically quantifying and improving the reliability of distributed storage systems,” in Proc. IEEE Symp. Rel. Distrib. Syst., 2008, pp. 85–94.

3.       Balasubramanian and V. Garg, “Fault tolerance in distributed systems using fused data structures,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 4, pp. 701–715, Apr.

4.       E. Bauer and R. Adams, Reliability and Availability of Cloud Computing. Piscataway, NJ, USA: IEEE Press, 2012.

5.       Borthakur. (2007). The Hadoop Distributed File System: Architecture and Design [Online]. Available: http://hadoop.apache.org/common/docs/r0.18.3/hdfs_design.html

6.       G. Chun, F. Dabek, A. Haeberlen, E. Sit, H. Weatherspoon, M. F. Kaashoek, J. Kubiatowicz, and R. Morris, “Efficient replica maintenance for distributed storage systems,” in Proc. Symp. Netw. Syst. Des. Implementation, 2006, pp. 45–58.

7.       J. G. Elerath and S. Shah, “Server class disk drives: How reliable are they?” in Proc. Annu. Symp. Rel. Maintainability, 2004, pp. 151– 156.

8.       J. Gantz and D. Reinsel, “Extracting value from chaos,” IDC iview, vol. 1142, pp. 9–10, 2011.

9.       Gharaibeh, S. Al-Kiswany, and M. Ripeanu, “ThriftStore: Finessing reliability trade-offs in replicated storage systems,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 6, pp. 910–923, Jun. 2011.

10.    S. Ghemawat, H. Gobioff, and S. Leung, “The Google file system,” in Proc. ACM Symp. Oper. Syst. Principles, 2003, pp. 29–43.





Prachi Patil, Sojwal Pajai, Surabhi Sanger, Dimpal Shinde

Paper Title:

Smart Medi Friend: An Automated Healthcare System, Implementation and Results

Abstract:  In the current era, one of the greatest concerns in healthcare is global aging and prevalence of chronic diseases A smart medi-friend is an all-inclusive healthcare application consisting android devices, cloud server and medi-box(NFC). This system works as an assistance application for healthcare and also as a medicine remainder, eliminating the possibility of taking wrong medicine. One of the five main modules, Admin, will manage doctors’ and patients’ info stored in database through server. Doctors will be able to give prescription, update prescription and timing, view report and history of patient from patient list. Patients will be able to identify medicines using NFCs, upload reports and view latest prescription. Patient’s app will generate an alert according to the medicine time uploaded by the doctor. ANN algorithm will predict the highest probable disease when symptoms are given as input. This project will reduce the burden on hospital resources, save time and money of patients and will act as a perfect assistance tool in healthcare services.



1.        Geng Yang, Li Xie, Matti M¨antysalo, Xiaolin Zhou, Zhibo Pang, Li Da Xu, Sharon Kao- Walter, Qiang Chen, Lirong Zheng, “A Health-IoT Platform Based on the Integration of Intelligent Packaging, Unobtrusive Bio-Sensor and Intelligent Medicine Box”, 2013, IEEE
2.        Tania Cerquitelli, Elena Baralis, Lia Morra and Silivia Chiusano, “Data Mining for Better Healthcare: A Path Towards Automated Data Analysis?”, 2016, IEEE

3.        Amiya Kumar Tripathy, Rebeck Carvalho, Keshav Pawaskar, Suraj Yadav, Vijay Yadav, “Mobile Based Healthcare Management using Artificial Intelligence”, 2015, IEEE.

4.        Prethi.M, Ranjith Balakrishan, “Cloud Enabled Patient-Centric EHR Management System”, 2014, IEEE.

5.        Gillian Pearce, Lela Mirtskhulava, Koba Bakuria, Julian Wong, Salah Al-Majeed, Nana Gulua, “Artificila Neural Network and Mobile Applications in Medial Diagnosis”, 2015, IEEE.

6.        Qiang YE, Tao LU, Yijun LI, Wenjun SUN, “Neural Network with Forgetting: An ANN Algorithm for Customers”, 2005, IEEE.

7.        https://en.wikipedia.org.





Jilna T Joy, Sumi M, Harikrishnan A. I.

Paper Title:

Microstrip Low Pass Filter using Defective Ground Structures

Abstract: Low pass filter forms the primary and vital component of a transceiver system. Three different methods to design compact microstrip low pass filter are discussed in this paper. All three prototypes contain defective ground structure (DGS) in the ground plane. Type I filter structure is designed with three fingered interdigital slot the ground plane. Type II low pass filter design contains circular DGS pattern, while type III low pass filter consist of many fingered interdigital slots on ground plane. Interdigital slot consists of metal fingers, which enhances the performance of the filter. The resonant frequency can easily be changed by tuning the length of the metal fingers. Based on the comparative study, it is found that the insertion loss is minimum for type III filter design i.e. 0.1dB. The return loss is found to be 26dB, 35.8dB and 21dB for type I, type II and type III low pass filter respectively.

Low pass filter, Defective ground structure, Interdigital slots, Insertion loss, Return loss


1.          Prachi Tyagi, “Design and Implementation of Low Pass Filter using Microstrip Line”,International Journal of Latest Trends in Engineering and Technology,2015
2.          Aswini kumar,A.K varma, “Design of Compact Seven Poles Low Pass Filter using Defected Ground Structure” electro-2009

3.          Xue hui Guan, Guohui Li, Zhewang Ma,”Optimized Design of a Low-Pass Filter Using Defected Ground Structures”,APMC 2005

4.          Jong-Sik Lim, Chul-Soo Kim,Dal Ahn, Yong-Chae Jeong, Sangwook Nam,”Design of Low-Pass Filters Using Defected Ground Structure,”,IEEE transaction on microwave theory and techniques, Vol. 53, No. 8, Aug2005

5.          Fu-Chang Chen, Hao-Tao Hu, Jie-Ming Qiu Qing-Xin Chu,”High- Selectivity Low-Pass Filters With Ultrawide Stopband Based on Defected Ground Structures”, IEEE transaction on components, manufacturing and packing technology,2015

6.          Tamasi Moyra, Susanta Kumar Parui, and Santanu Das,”Design and Development of Lowpass Filter and Harmonics Reduction,” International Journal on Electrical Engineering and Informatics Volume 3, Number 3,2011.
7.          David M Pozar,” Microwave engineering,4th edition. Kiran P.Singh Anurag Paliwal Madhur Deo Upadhyay,” Novel Approach for Loss Reduction in LPF for Satellite Communication System”,IACC 2013
8.          Xi Tian,Yuzhu Wang,Tianyiyi He,”A  Rectangular coaxial line low pass filter with simple structure” ,ICEPT 2015

9.          Deepthi Gupta,Aneesha upadhyay,Manisha Yadav,Dr. P K singhal,”Design and analysis of low pass planar microstrip filter using left handed SRR structures”,MedCOM 2014.

10.       Deepthi Gupta,Aneesha upadhyay,Manisha Yadav,Dr. P K singhal,” CSRR Based Microstrip Low Pass Filter with Wide Stopband and High Attenuation”  ICCIS,2015

11.       Faisal Ali,Rajat Jain,Deepti Gupta,Alk Agarwal,,”Design and analysis of low pass elliptical filter” ,CICT 2016.

12.       Shuai Liu, Jun Xu , Zhitao Xu,” Sharp roll-off lowpass filter using interdigital DGS slot”, Electronics letters ,Vol. 51 No. 17, 20th August 2015





Anju G. R, Karthik M.

Paper Title:

Dynamically Building Facets from Their Search Results

Abstract:  People are very passionate in searching new things and gaining new knowledge. They usually prefer search engines to get the results. Search engines become an important way to get the information. But many search engines fail to give some request to the users since there are same words which have different meaning such as apple, say it’s a fruit, mobile, laptop. So if there is ranking based on these, the searching will be a pleasing experience’s.  There are some methods for these such as searching based on facets. There are some exiting methods to gain facets from the search results and display the facets such that the user can select corresponding facets. Then the search results will be refined to those particular facets only. In this paper mainly focus on those facets that mean after the facets generation, the facets will be checked before displaying to the user. There are some facets such as “women watch, women’s watch “ , “Season one, season 1” these two have same meaning so before displaying the facets these similarities should be checked and only one facets should be displayed. Part of speech is also checked. Experimental results shows that checking these type similarities improve the facets thus it can improve the searching experiences in many ways.      

 Faceted search, Facets, Intent


1.    “Automatically Mining Facets for Queries from Their Search Results” IEEE Transactions On Knowledge And Data Engineering, Vol. 28, No. 2, February 2016 Zhicheng Dou, Member, IEEE, Zhengbao Jiang, Sha Hu, Ji-Rong Wen, and Ruihua Song
2.    “Facets Mining From Search Results Using BatchSTS Algorithms” in IJARTET, Volume 4, Special Issue 6, April 2017, Anju G R, Karthik M

3.    “Comparison: QT (Quality Threshold) And Batch STS Algorithm For Facets Generation” JETIR (ISSN-2349-5162) April 2017, Volume 4, Issue 04, Anju G R, Karthik M

4.    W. Kong and J. Allan, “Extracting query facets from search results,” in Proc. 36th Int. ACM SIGIR Conf. Res. Develop. Inf. Retrieval, 2013, pp. 93–102.

5.    https://en.wikipedia.org/wiki/Discounted_cumulative_gain Google Wikipedia

6.    O. Ben-Yitzhak, N. Golbandi, N. Har’El, R. Lempel, A. Neumann,S. Ofek-Koifman, D. Sheinwald, E. Shekita, B. Sznajder, and S.Yogev, “Beyond basic faceted search,” in Proc. Int. Conf. Web Search Data Mining, 2008, pp. 33–44.

7.    W. Kong and J. Allan, “Extending faceted search to the general web,” in Proc.ACMInt. Conf. Inf. Knowl. Manage., 2014, pp. 839–848.

8.    “Mining Queries From Search Results : A Survey” Imperial Journal of Interdisciplinary Research (IJIR) Vol-2, Issue-12, 2016, Anju G R, Karthik M





Yogeshwar Patil, Bhushan Pawar, Dipak Chaudari, Bhuvan Mahajan, Khemraj Patil

Paper Title:

Electrical Design and Implementation & Installation of 5kw Solar System

Abstract: Solar photovoltaic power generation system is one of the burning research fields these days, even governments are also making plans toward increasing the amount of power generation from renewable energy sources because in future viability and crisis of conventional energy sources will increase. Further government liberalization and technical developments encourage the use of renewable sources for power generation in terms of distributed generation system. In order to rigging the present energy crisis one renewable method is to develop an efficient manner in which power extracts from the incoming son light radiation calling Solar Energy. This thesis deals with the design and hardware implementation of a simple and efficient solar photovoltaic power generation system for isolated and small load up to 5 KW. It provides simple basic theoretical studies of solar cell and its modeling techniques using equivalent electric circuits. Solar Photovoltaic (PV) power generation system is comprising several elements like solar panel, DC-DC converter, MPPT circuit and load, and DC-DC (Boost) converter, MPPT circuit using microcontroller and sensors adopting perturbation and observation method and single phase inverter for AC loads are implemented in hardware in simple manner.

(PV), CDC-DC (Boost), MPPT, AC loads, Solar photovoltaic, government KW.


1.    www.google.com
2.    Israel D. Vagner, B.I. Lembrikov, Peter Rudolf Wyder,Electrodynamics of Magneto active Media, Springer,2003, ISBN 3540436944

3.    "Energy Sources: Solar" Department of Energy” Retrieved 19 April 2011.

4.    International Energy Agency (2014). "Technology Roadmap: Solar Photovoltaic Energy" (PDF). IEA. Archived from the original on 7 October 2014. Retrieved 7 October 2014.

5.    Solar Cells and their Applications Second Edition, Lewis Fraas, Larry Partain, Wiley, 2010, ISBN 978-0-470-44633-1 , Section10.2.

6.    "sss Magic Plates, Tap Sun for Power". Popular Science. June 1931. Retrieved 19 April 2011.





Shyju S., Prathibha S Nair

Paper Title:

Packet Dropping and Intrusion Detection using Forensic and Flow Based Classification Techniques

Abstract:  Internal Intrusion detection is one of the serious problems in the computer network areas. Most of the computer system uses username and password as login pattern to enter in to the system. This is one of the weakest points of computer security. Some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands and obtains the features of an attack. This paper propose a security system, named the Internal Intrusion Detection and Protection System(IIDPS) to detect insider attacks at SC level by using data mining and forensic techniques in networked data. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing users current computer usage behaviors with the patterns collected in the account holder's personal profile. The idea behind the inside attacker detection in wireless sensor network by exploiting the spatial correlation between the packet ratio, which help to detecting dynamic attacking behaviors The routing is performed to identify the shortest path between each source node and their destination address and residual energy is calculated for each node in the network.

Insider attacks, intrusion detection, Flow based classification and System calls.

1.       Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, “MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming,” in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1–5.
2.       Z. A. Baig, “Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks,” Comput. Commun., vol. 34, no. 3, pp. 468–484, Mar. 2011.

3.       S. Kang and S. R. Kim, “A new logging-based IP traceback approach using data mining techniques,” J. Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 72–80, Nov. 2013.

4.       K. A. Garcia, R. Monroy, L. A. Trejo, and C. Mex-Perera, “Analyzing log files for postmortem intrusion detection,” IEEE Trans. Syst., Man,Cybern., Part C: Appl. Rev., vol. 42, no. 6, pp. 1690–1704, Nov. 2012.

5.       M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, “Network traffic analysis and intrusion detection using packet sniffer,” in Proc. Int. Conf.Commun. Softw. Netw., Singapore, 2010, pp. 313–317.

6.       S. O’Shaughnessy and G. Gray, “Development and evaluation of a data set generator tool for generating synthetic log files containing computer attack signatures,” Int. J. Ambient Comput. Intell., vol. 3, no. 2, pp. 64–76, Apr. 2011.

7.       S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review,” Appl. Soft Comput., vol. 10, no. 1, pp. 1–35, Jan. 2010.

8.       Z. B. Hu, J. Su, and V. P. Shirochin “An intelligent lightweight intrusion detection system with forensics technique,” in Proc. IEEE Workshop Intell. Data Acquisition Adv. Comput. Syst.: Technol. Appl., Dortmund, Germany, 2007, pp. 647–651.

9.       T. Giffin, S. Jha, and B. P. Miller, “Automated discovery of mimicry attacks,” Recent Adv. Intrusion Detection, vol. 4219, pp. 41–60, Sep. 2006.

10.    U. Fiore, F. Palmieri, A. Castiglione, and A. D. Santis, “Network anomaly detection with the restricted Boltzmann machine,” Neurocomputing, vol. 122, pp. 13–23, Dec. 2013.

11.    M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study,” IEEE Syst. J., vol. 9, no. 1, pp. 1–14,Jan. 2014.

12.    S. Khan, N. Mast, and J. Loo, “Denial of service attacks and mitigation techniques in IEEE 802.11 Wireless mesh networks,” Information,vol.12,pp.1–8,2009.

13.    S. Khan and J. Loo, “Cross layer secure and resource-aware ondemand routing protocol for hybrid wireless mesh networks,” Wireless Personal Communications,vol.62,no.1,pp.201–214,2010.

14.    S. Khan, N. Mast, K.-K. Loo, and A. Silahuddin, “Passive  security threats and consequences in IEEE 802.11 wireless mesh networks,” International Journal of Digital Content Technology and Its Applications,vol.2,no.3,pp.4–8,2008.

15.    S. E. Robertson, S. Walker, M. M. Beaulieu, M. Gatford, and A. Payne, “Okapi at TREC-4,” in Proc. 4th text Retrieval Conf., 1996, pp. 73–96.





Arya V J, Subha V

Paper Title:

Tracking the Path of Launch Vehicle using Pulse Compression Technique

Abstract: Pulse Compression is one of the key steps in the signal processing of a Radar system. Radar system uses Pulse compression techniques to provide the benefits of larger range detection and high range resolution. This is gained by modulating the transmitted signal and after that matching the received echo with the transmitted signal. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is a time reversed and conjugated version of the received radar signal. There are several methods of pulse compression that have been used in the past, out of which most popular technique is Linear Frequency Modulation (LFM). This paper deals with the design to develop and simulate pulse compression and matched filter algorithm in MATLAB to study the LFM pulse compression technique. Matched filter is used as the pulse compression filter which provides high SNR at the output. Matched Filter is mathematically equivalent to convolving the received signal with a conjugated time-reversed version of the reference signal. The main application of pulse compression Radars includes tracking of launch vehicles, unwanted particles in space, Missile guidance etc. Here, in this paper we are discussing the pulse compression application in tracking the launch vehicle so as to check whether it had followed the predetermined path or not.

 Correlation, Chirp, LFM, Matched Filter, Pulse Compression, Radar


1.       Kiran Patel., Usha Neelakantan.,Shalini Gangele, J.G Vacchani, N.M. Desai “Linear Frequency Modulation Waveform Synthesis” . IEEE Int’l.Conf, Electrical, Electronics and Computer Science,2012.
2.       Vijay Ramya K, A. K. Sahoo, G. Panda, “A New Pulse Compression Technique for Polyphase Codes in Radar Signals”, International Symposium on Devices MEMS, Intelligent Systems & Communication (ISDMISC) 2011 Proceedings published by International Journal of Computer Applications (IJCA), Vol. 2, Issue 4, pp.15-17, 2011.

3.       R. Jeffrey Keeler , Charles A. Hwang,” Pulse Compression for Weather Radar”,IEEE International Radar Conference , 1995.

4.       N. J. Bucci and H. Urkowitz, “Testing of doppler tolerant range sidelobe suppression in pulse compression meteorological radar,” in Proc. IEEE

5.       Nat. Radar Conf., Boston, MA, Apr. 1993, pp. 206–211.

6.       H.D. Griffiths , L. Vinagre,” Design of low-sidelobe pulse compression waveforms”, ELECTRONICS LE77ERS 9th June 1994 Vol. 30 No. 12

7.       Vikas Baghel, Ankita Panda, Ganapati Panda,” An Efficient Hybrid Adaptive Pulse Compression Approach to Radar Detection”,IEEE international conference on signal processing and communication (ICSC), 2013.

8.       Adnan Orduyılmaz., G¨okhan Kara., Ali Cafer G¨urb¨uz.,Murat Efe TOBB ETU¨ Real-Time Pulse Compression Radar Waveform Generation and Digital Matched Filtering IEEE, (2015).

9.       Mya Mya Aye , Thiri Thandar Aung  ,” Digital Filters for Radar Signal Processing”, International Research Journal of Engineering and Technology (IRJET),  Volume: 03 Issue: 11 | Nov -2016.

10.    H. A. Said., A. A. El-Kouny.,A. E. El-Henawey Design and Realization of Digital Pulse Compression in Pulsed Radars Based on Linear Frequency Modulation (LFM) Waveforms Using FPGA . ICAICTE, Jul-Aug,2013.

11.    Fu Ning.,Wang Yuze, Xu Hongwei, Qiao Liyan,Jin Hong Method of LFM Pulse Compression Implementation Based on FPGA . IEEE Int’l Conf, Electronic Measurement Instruments , 2013.

12.    Amit kumar, Ms. Nidhi Radar Pulse Compression Technique for Linear Frequency Modulated Pulses, International Journal of Engineering and Technical Research (IJETR), Volume-3, Issue-8, August 2015.

13.    Jun Wang, Duoduo Cai, Yaya Wen . Comparison of Matched Filter and Dechirp Processing Used in Linear Frequency Modulation IEEE 2011.





Sagar G. Rautrao, Bhagwan R. Shinde

Paper Title:

Numerical Study of Exhaust Manifold using Conjugate Heat Transfer

Abstract:  The Exhaust manifold in the engines is an important component which has a considerable effect on the performance of the I.C engine. The exhaust system of an automobile consists of an exhaust manifold, catalytic converter, resonator & a muffler connected with tail pipe. Hot exhaust gas along with sound waves generated at the end of exhaust stroke is sent to the exhaust manifold through exhaust valve. The exhaust manifold operates under high temperature and pressure conditions. The design of exhaust manifold almost always has to be executed by trial and error through many experiments & analysis. In this paper we have to did numerical study by compare the result fluid analysis with conjugate heat transfer & thermal analysis with conjugate heat transfer using Abaqus software.

 Exhaust Manifold, Conjugate Heat transfer, Numerical study, Coupling, Abaqus


1.       Vivekanand Navadagi, siddaveersanganad  “Cfd analysis of exhaust manifold of multicylinder petrol engine for optimal geometry to reduce back pressure” Intrnational journal of engineering Research and Technology (IJERT) March-2014
2.       BinzouYaqian Hu, Zhien Liu Fuwu Yan and chaowang.”The imapctof  Temperture effect on exhaust manifold Thermal modal analysis” Research journal of applied
science Engineering and Technology Aug 20, 2013

3.       SwathiSatishmani ,prithviraj and shridharhari “comparison of prediction obtained on an exhaust manifold analysis using conformal and indirect mapped interface”. International congress on computionalmechnics and simulation(ICCMS),IIT hydrabad 10-12 Dec 2012

4.       Xueyuan ZHANG YuLUO And Jianhua Wang “Coupled Thermal-fluid-solid Analysis of engine Exhaust manifold considering welding Residual stresses” Transaction of JWRI special issue on WSE2011(2011)

5.       Gopaal , MMM Kumara varma , “Exhaust manifold design –FEA Approch”(IJETT) Volume 17 number 10 – november.

6.       Zhi-EN Liu, Xue-Nili “Numerical simulation For exhust manifold based on the serial coupling of STAR-CCM+ AND ABAQUS Reasearch”  journal of Applied sciences ,Engineering & Technology , Nov 10 ,2013

7.       Gopaal, MMM Kumara verma “Thermal and structural Analysis of An Exhaust manifold of A multicylinder engine” (IJMET) vol 5 12 DEC(2014)

8.       Dr.Rajadurai, “Non-linear Thermal modal analysis for Hot End Exhaust System” International journal of emreging trends in engineering Research vol 2. Jan 2014

9.       AshwanikumarArunkumar “Thermo-mechnical Analysis of 321-Austenitic stainless steel Exhaust manifolds of a Diesl Engine based on FEA” Dehradun india.

10.    J.DavidRathnaraj “Thermomechniacl fatigue analysis of stainless steel exhaust manifolds (ESTIJ) vol 2. April 2012

11.    Jian Min xu “An analysis of the vibration charecterstics of suspension points” the open mechanical Engineering journal 2014.





Sabitha S V, Jeena R S

Paper Title:

Automatic Detection and Localization of Tuberculosis in Chest X-Rays

Abstract: Tuberculosis is a major health threat in many regions of the world. Opportunistic infections in immune compromised HIV/AIDS patients and multi-drug-resistant bacterial strains have exacerbated the problem, while diagnosing tuberculosis still remains a challenge. When left undiagnosed and thus untreated, mortality rates of patients with tuberculosis are high. Standard diagnostics still rely on methods developed in the last century. They are slow and often unreliable. In an effort to reduce the burden of the disease, this thesis work presents an automated approach for detecting and localizing  tuberculosis in conventional postero -anterior chest raadiographs. A set of features are extracted  from the lung region, which enable the X-rays to be classified as normal or abnormal using a binary classifier. Then if the chest x-ray is classified as abnormal again a set of  local features are extracted to localize the affected regions . Thus it become easy to diagnose and treat the disease. An accuracy of 90% is achieved by this method.

 Graph cut segmentation, Classification, Local feature extraction.


1.       Sema Candemir1, Stefan Jaeger2, Kannappan Palaniappan1, Sameer Antani2, and George Thoma2””Graph Cut Based Automatic Lung Boundary Detection in Chest Radiographs” 1st Annual IEEE Healthcare Innovation Conference of the IEEE EMBS Houston, Texas USA, 7 - 9 November, 2012
2.       Ramya R, Dr. Srinivasa Babu P “Tuberculosis Screening Using Graph Cut and Cavity Segmentation for Chest Radiographs “ International Journal of Advanced Research in Computer Science and Software Engineering  Volume 5, Issue 2, February 2015]

3.       Sema Candemir, Kannappan Palaniappany, and Yusuf Sinan Akgul Lister Hill National Center for Biomedical Communications, U. S. National Library of Medicine, National Institutes of Health, Bethesda, MD, USA Department of Computer Science, University of Missouri-Columbia, MO, USA Department of Computer Engineering, Gebze Institute of Technology, Gebze, Turkey “multi-class regularization parameter learning for graph cut image segmentation” 2013 IEEE 10th International Symposium on Biomedical Imaging: From Nano to Macro San Francisco, CA, USA, April 7-11, 2013

4.       Wai Yan Nyein Naing, Zaw Z. Htike “Advances in Automatic Tuberculosis Detection in Chest X-ray Images” Signal & Image Processing : An International Journal (SIPIJ) Vol.5, No.6, December 2014]  

5.       Stefan Jaeger*, Alexandros Karargyris, Sema Candemir, Les Folio, Jenifer Siegelman, Fiona Callaghan,Zhiyun Xue, Kannappan Palaniappan, Rahul K. Singh, Sameer Antani, George Thoma, Yi-Xiang Wang,Pu-Xuan Lu, and Clement J. McDonald “Automatic Tuberculosis Screening Using Chest Radiographs” IEEE  Transactions on Medical Imaging, vol. 33, no. 2, February 2014

6.       Laurens Hogeweg, Clara I. S´anchez, Pragnya Maduskar, Rick Philipsen, Alistair Story, Rodney Dawson, Grant Theron, Keertan Dheda, Liesbeth Peters-Bax and Bram van Ginneken “Automatic detection of tuberculosis in chest radiographs using a combination of textural, focal, and shape abnormality analysis” This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TMI.2015.2405761, IEEE Transactions on Medical Imaging.

7.       Amani Al-Ajlan, Ali El-Zaart “Image Segmentation Using Minimum Cross-Entropy Thresholding” Proceedings of the 2009 IEEE International Conference on Systems, Man, and Cybernetics San Antonio, TX, USA - October 2009]

8.       Bram van Ginneken*, Shigehiko Katsuragawa, Bart M. ter Haar Romeny, Kunio Doi, and Max A. Viergever, Member, IEEE  “Automatic Detection of Abnormalities in Chest Radiographs Using Local Texture Analysis” IEEE transactions on medical imaging, vol. 21, no. 2, February 2002

9.       Manik Varma and Andrew Zisserman,” A Statistical Approach to Texture Classi_cation from Single Images Robotics Research Group Dept. of Engineering Science University of Oxford Oxford, OX1 3PJ, UK

10.    Manuel J. Marín-Jiménez and Nicolás Pérez de la Blanca,” Empirical Study of Multi-scale Filter Banks for Object Categorization” Technical Report VIP-121505 December 2005 

11.    W. K. Pratt, “Image Segmentation,” in Digital image processing, 4nd ed. Wiley, 2008, pp. 579 622.

12.    C. Pantofaru, M. Hebert, A comparison of image segmentation algorithms, Tech. Rep. CMU RI TR 05 40, CMU (2005). 2, 14

13.    Shi. J, and Malik. J, "Normalized cuts and image segmentation", IEEE Transactions on Pattern Analysis and Machine Intelligence, IEEE Computer Society, voI.22(8), 2000, pp.888 905.

14.    William T.Freeman and Edward H Adelson “The Design and Use of Steerable Filters” IEEE Transaction on Pattern Analysis and Machine Intelligence ,Vol 13 No 9,September 1991

15.    Li Tang, Meindert Niemeijer, Joseph M. Reinhardt, Senior Member, IEEE, Mona K. Garvin, Member, IEEE, and Michael D. Abràmoff*, Senior Member, IEEE “Splat Feature Classification With Application to Retinal Hemorrhage Detection in Fundus Images” IEEE Transactions on medical imaging, vol. 32, no. 2, february 2013





Sajini T, Neetha George

Paper Title:

Speaker Independent Text to Speech for Malayalam

Abstract:  Text to speech (TTS) relates is software which converts text to speech output. TTS has wide range of applications which includes assistive technologies like communication devices for providing voice for voice disabled. These applications require flexibility to provide diverse speakers voice or unique voice as output. Existing corpus based TTS does not provide this flexibility, and changing a voice is time consuming, expensive and tedious since it requires hours of high quality speech corpus. In this work we explore the speaker adaptation technology available in Hidden Markov Model based Text to speech (HTS) for providing speaker variability in Malayalam TTS. Speaker adaptation (SA) using HTS framework has been successfully implemented for foreign languages like English, Japanese etc. but not yet been tried for Indian languages. In this work we try to implement SA using HTS framework as a solution for providing diverse voices, reducing the expenses, time and effort required, in the usual approach for creating a variant/new TTS voice. We have used a combination of the constrained maximum likelihood linear regression (CMLLR) and maximum a posterior probability (MAP) for generating variant voices.  A five speaker database with one hour speech from each speaker is used for SA, in which four speakers database is used for training speaker independent average model (SI). SI model was trained with different number of speakers. Average model with 3 speakers gave an intelligible noisy output, and four speakers gave intelligible, good quality and similarity output with rarely occurring distortions. Quality of the system was determined using perceptual scores tested with 15 native speakers. An average word error rate (WER) for 3 and 4 speaker model was 15.65% and 16.2% for paragraphs selected from different domains and 30 sentences gave an average score of 26.82% and 21.14%. The adapted voice model gave a 3.39, 3.59, 3.55 and 3.38 as the Mean opinion score (MOS) for naturalness, intelligibility, degradation and similarity index. The results show that the SA technique for HTS is a quick, easy & less expensive technique that can be successfully used for a phonetic language like Malayalam for providing generating diverse voices for TTS.

Speaker adaptation, HMM based TTS, Constrained maximum likelihood linear regression, Maximum a posterior, MAP.


1.       Zen, H., Tokuda, K., & Black, A. W. (2009). Statistical parametric speech synthesis. Speech Communication, 51(11), 1039-1064.
2.       J. Yamagishi, J., Ling, Z., & King, S. (2008). Robustness of HMM-based speech synthesis.

3.       J. Yamagishi, J., Zen, H., Wu, Y. J., Toda, T., & Tokuda, K. (2008). The HTS-2008 system: Yet another evaluation of the speaker-adaptive HMM-based speech synthesis system in the 2008 Blizzard Challenge.

4.       J. Yamagishi, J., Tachibana, M., Masuko, T., & Kobayashi, T. (2004, May). Speaking style adaptation using context clustering decision tree for HMM-based speech synthesis. In Acoustics, Speech, and Signal Processing, 2004. Proceedings. (ICASSP'04). IEEE International Conference on (Vol. 1, pp. I-5). IEEE.

5.       Watts, O., Yamagishi, J., King, S., & Berkling, K. (2010). Synthesis of child speech with HMM adaptation and voice conversion. IEEE Transactions on Audio, Speech, and Language Processing, 18(5), 1005-1016.

6.       Yamagishi, J., Zen, H., Toda, T., & Tokuda, K. (2007). Speaker-Independent HMM-based Speech Synthesis System: HTS-2007 System for the Blizzard Challenge 2007.

7.       Yamagishi, J., & Kobayashi, T. (2007). Average-voice-based speech synthesis using HSMM-based speaker adaptation and adaptive training. IEICE TRANSACTIONS on Information and Systems, 90(2), 533-543.

8.       J Yamagishi, J., Onishi, K., Masuko, T., & Kobayashi, T. (2005). Acoustic modeling of speaking styles and emotional expressions in HMM-based speech synthesis. IEICE TRANSACTIONS on Information and Systems, 88(3), 502-509.

9.       Latorre, J., Iwano, K. & Furui, S. (2006). New approach to the polyglot speech generation by means of an HMM-based speaker adaptable synthesizer. Speech Communication, 48, 1227-1242.

10.    Tamura, M., Masuko, T., Tokuda, K., & Kobayashi, T. (1998). Speaker adaptation for HMM-based speech synthesis system using MLLR. In the third ESCA/COCOSDA Workshop (ETRW) on Speech Synthesis.

11.    Black, A. W., Zen, H., & Tokuda, K. (2007, April). Statistical parametric speech synthesis. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on (Vol. 4, pp. IV-1229). IEEE.

12.    J Yamagishi, J., Ling, Z., & King, S. (2008). Robustness of HMM-based speech synthesis.

13.    Sundermann, D., Hoge, H., Bonafonte, A., Ney, H., Black, A., & Narayanan, S. (2006, May). Text-independent voice conversion based on unit selection. In Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings. 2006 IEEE International Conference on (Vol. 1, pp. I-I). IEEE.

14.    MOULINES, E. (1995). Voice Conversion: State of Art and Perspectives. Speech Communication, 16, 125-126.

15.    https://www.iitm.ac.in/donlab/tts/cls.php "Indian Language Speech sound Label set (ILSL12) Version 2.1.6"

16.    Fukada, T., Tokuda, K., Kobayashi, T., & Imai, S. (1992, March). An adaptive algorithm for Mel-cepstral analysis of speech. In Acoustics, Speech, and Signal Processing, 1992. ICASSP-92., 1992 IEEE International Conference on (Vol. 1, pp. 137-140). IEEE.

17.    Tokuda, K., Masuko, T., Miyazaki, N., & Kobayashi, T. (2002). Multi-space probability distribution HMM. IEICE TRANSACTIONS on Information and Systems, 85(3), 455-464.

18.    Yoshimura, T., Tokuda, K., Masuko, T., Kobayashi, T., & Kitamura, T. (1998, December). Duration modeling for HMM-based speech synthesis. In ICSLP (Vol. 98, pp. 29-32).

19.    K Tokuda, K., Yoshimura, T., Masuko, T., Kobayashi, T., & Kitamura, T. (2000). Speech parameter generation algorithms for HMM-based speech synthesis. In Acoustics, Speech, and Signal Processing, 2000. ICASSP'00. Proceedings. 2000 IEEE International Conference on (Vol. 3, pp. 1315-1318). IEEE

20.    Yamagishi, J., Zen, H., Toda, T., & Tokuda, K. (2007). Speaker-Independent HMM-based Speech Synthesis System.

21.    Tamura, M., Masuko, T., Tokuda, K., & Kobayashi, T. (1998). Speaker adaptation for HMM-based speech synthesis system using MLLR. In the third ESCA/COCOSDA Workshop (ETRW) on Speech Synthesis.

22.    http://www.ling.upenn.edu/courses/Spring_2001/ling001/ phonology.html

23.    http://www.phon.ucl.ac.uk/courses/spsci/b214/week2-5.pdf

24.    http://tdil-dc.in/undertaking/article/449854TTS_Testing_Strategy_ver_2.1.pdf

25.    Ramani, B., Christina, S. L., Rachel, G. A., Solomi, V. S., Nandwana, M. K., Prakash, A., ... & Vijayalakshmi, P. (2013). A common attribute based unified HTS framework for speech synthesis in Indian languages. In Eighth ISCA Workshop on Speech Synthesis.

26.    Kumar, R. R., Sulochana, K. G., & Sajini, T. (2011). Optimized Multi Unit Speech Database for High Quality FESTIVAL TTS. In Information Systems for Indian Languages (pp. 204-208). Springer Berlin Heidelberg.

27.    Odell, J. J., Woodland, P. C., & Young, S. J. (1994, April). Tree-based state clustering for large vocabulary speech recognition. In Speech, Image Processing and Neural Networks, 1994. Proceedings, ISSIPNN’94, 1994 International Symposium on (pp. 690-693). IEEE.

28.    Yamagishi, J. (2006). An introduction to hmm-based speech synthesis. Technical Report.

29.    Masuko, T., Tokuda, K., Kobayashi, T., & Imai, S. (1997, April). Voice characteristics conversion for HMM-based speech synthesis system. In Acoustics, Speech, and Signal Processing, 1997. ICASSP-97., 1997 IEEE International Conference on (Vol. 3, pp. 1611-1614). IEEE.

30.    http://sp-tk.sourceforge.net/- Speech signal processing tool kit (SPTK)

31.    Digalakis, V. V., Rtischev, D., & Neumeyer, L. G. (1995). Speaker adaptation using constrained estimation of Gaussian mixtures. IEEE Transactions on speech and Audio Processing, 3(5), 357-366.

32.    Gales, M. J., & Woodland, P. C. (1996). Mean and variance adaptation within the MLLR framework. Computer Speech & Language, 10(4), 249-264.

33.    Heiga, Z. E. N., Tokuda, K., Masuko, T., Kobayasih, T., & Kitamura, T. (2007). A hidden semi-Markov model-based speech synthesis system. IEICE Transactions on Information and Systems, 90(5), 825-834.

34.    Yamagishi, J., & Kobayashi, T. (2007). Average-voice-based speech synthesis using HSMM-based speaker adaptation and adaptive training. IEICE TRANSACTIONS on Information and Systems, 90(2), 533-543.

35.    Yamagishi, J., Kobayashi, T., Nakano, Y., Ogata, K., & Isogai, J. (2009). Analysis of speaker adaptation algorithms for HMM-based speech synthesis and a constrained SMAPLR.adaptation algorithm. IEEE Transactions on Audio, Speech, and Language Processing, 17(1), 66-83.

36.    Zen, H., Tokuda, K., & Black, A. W. (2009). Statistical parametric speech synthesis. Speech Communication, 51(11), 1039-1064.

37.    Zen, H., Nose, T., Yamagishi, J., Sako, S., Masuko, T., Black, A. W., & Tokuda, K. (2007, August). The HMM-based speech synthesis system (HTS) version 2.0. In SSW (pp. 294-299).

38.    http://hts.sp.nitech.ac.jp/?Download

39.    http://lib.tkk.fi/Dipl/2012/urn100698.pdf

40.    Tokuda, K., Kobayashi, T., Masuko, T., & Imai, S. (1994, September). Mel-generalized cepstral analysis-a unified approach to speech spectral estimation. In ICSLP (Vol. 94, pp. 18-22).

41.    http://www.ece.ucsb.edu/Faculty/Rabiner/ece259/digital%20speech%20processing%20course/lectures_new/Lecture%203_winter_2012_6tp.pdf

42.    http://www.ijerd.com/paper/vol9-issue10/F09104854.pdf

43.    http://www.phon.ucl.ac.uk/courses/spsci/iss/week1.php

44.    Muda, L., Begam, M., & Elamvazuthi, I. (2010). Voice recognition algorithms using Mel frequency cepstral coefficient (MFCC) and dynamic time warping (DTW) techniques. arXiv preprint arXiv: 1003.4083.

45.    Gopi, A., Shobana, P. D., Sajini, T., & Bhadran, V. K. (2013, December). Implementation of Malayalam text to speech using concatenative based TTS for android
platform. In Control Communication and Computing (ICCC), 2013 International Conference on (pp. 184-189). IEEE.

46.    Binil Kumar, S. L., Sajini, T., & Bhadran, V. K. (2013). Screen readers for Windows and Linux-Unit selection based Malayalam text to speech system integrated with disability aids Screen reader with Indian English.

47.    Kominek, J., Black, A. W., & Ver, V. (2003). CMU ARCTIC databases for speech synthesis.

48.    Yoshimura, T., Tokuda, K., Masuko, T., Kobayashi, T., & Kitamura, T. (1999). Simultaneous modeling of spectrum, pitch and duration in HMM-based speech synthesis. In Sixth European Conference on Speech Communication and Technology.

49.    Stylianou, Y. (2009, April). Voice transformation: a survey. In Acoustics, Speech and Signal Processing, 2009. ICASSP 2009. IEEE International Conference on (pp. 3585-3588). IEEE.

50.    Saheer, L., Garner, P. N., Dines, J., & Liang, H. (2010, March). VTLN adaptation for statistical speech synthesis. In Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on (pp. 4838-4841). IEEE.

51.    Tamura, M., Masuko, T., Tokuda, K., & Kobayashi, T. (1998). Speaker adaptation for HMM-based speech synthesis system using MLLR. In the third ESCA/COCOSDA Workshop (ETRW) on Speech Synthesis.

52.    Helander, E., & Gabbouj, M. (2012). Jani Nurminen1, Hanna Silén2, Victor Popa2. SPEECH ENHANCEMENT, MODELING AND RECOGNITION–ALGORITHMS AND APPLICATIONS, 69.

53.    Zen, H., & Tokuda, K. (2009). TechWare: HMM-based speech synthesis resources [Best of the Web]. IEEE Signal Processing Magazine, 26(4).





Kavitha S. K, Soumya Kumari L. K.

Paper Title:

QBIC in Peer –To – Peer Networks using BOVW Model and Split/ Merge Operation

Abstract: The term QBIC refers to query by image content .it is also known as content based image retrieval. In QBIC the search analysis the content of the image instead of the metadata like keyword, tags or any descriptive information related to an image. The content refers to the main features that are differentiating one image with another image. So in this thesis work focus on how we can retrieve an image from the peer to peer network with low network cost by using QBIC approach. It mainly focuses on two things network cost and workload balance during image retrieval process. It also take consider to the dynamic creation and uploading into the peer to peer networks by using BoVW model and split/merge operation.

 QBIC, BOVW model, Peer-to-peer networks, split/merge operation.


1.      John Eakins and Margaret Graham, “Content-based Image Retrieval”, JISC Technology Applications Programme. University of Northumbria at Newcastle.January 1999
2.      Rui Y. & Huang T. S., Chang S. F. “Image retrieval: current techniques  directions, and open issues”. Joumal of Visual Communication and Image  Representation, 10,39-62,.

3.      Karin Kailing, Hans-Peter Kriegel and i Stefan Schonauer, “ Content-Based   Image Retrieval Using Multiple Representations”. Proc. 8th Int. Con€. On   Knowledge-Based Intelligent Information and Engineering Systems (KES’2004), Wellington,New Zealand, 2004, pp. 982-988. I

4.      Ahmed M.Ghanem, Emad M. Rasmy, and Yasser M, Kadah, “Content-Based Image Retrieval Strategies for Medical Image Libraries,” Proc. SPIE Med. Imag., San Diego, Feb.2001

5.      Henning Muller, Wolfgang Muller, David McG. Squire and Thierry Pun, Performance Evaluation in Content-Based Image Retrieval: Overview and Proposals. Computing Science Center, University of Geneva, Switzerland, 2000.

6.      http://www.unn.ac.uWiidr/report.htrnl.
7.      http://wang.ist.psu/~jwang/test.html.
8.      Shengjiu Wang, “A Robust CBIR Approach Using Local Color Histograms,” Department of Computer Science, University of Alberta, Edmonton, Alberta,  Canada, Tech. Rep. TR 01-13, October 2001, Found at:

9.      Raghu Krishnapuram,  Swarup Medasani, Sung-Hwan Jung, , Young-Sik Choi,   and Rajesh Balasubramaniam “Content-Based Image Retrieval Based on a  Fuzzy Approach” OCTOBER 2004.

10.   S. Kulkarni, B. Verma1, P. Sharma and H. Selvaraj  “Content Based Image   Retrieval using a Neuro-Fuzzy Technique” 2005.

11.   Wang Xiaoling, Xie Kanglin, “Application of the Fuzzy Logic in Content-based   Image Retrieval1” April 2005.

12.   Rouhollah Rahmani, Sally A. Goldman, Hui Zhang, John Krettek, and Jason E.   Fritts “Localized Content Based Image Retrieval” MIR’05, 

13.   Ying  Liua, Dengsheng Zhanga, Guojun Lua,Wei-Ying Mab “A  survey of   content-based image retrieval with high-level semantics” 2006 

14.   Giorgio Giacinto “A Nearest-Neighbor Approach to Relevance Feedback in  Content Based Image Retrieval”





C. Jayajothi, M. M. Senthamilselvi, S. Arivoli, N. Muruganantham

Paper Title:

Kinetic, Equilibrium and Mechanistic Studies of Nickel Removal by Glossocardia Linearifolia Stem

Abstract:  An adsorbent prepared from Glossocardia linearifolia Stem, by acid treatment was tested for its efficiency in removing Nickel ion. The process parameters studied include agitation time, initial nickel ion concentration, adsorbent dose, pH and temperature.  The adsorption followed second order reaction equation and the rate is mainly controlled by intra-particle diffusion.  Freundlich and Langmuir isotherm models were applied to the equilibrium data. The adsorption capacity (Qm) obtained from the Langmuir isotherm plot at an initial pH of 6.0 and at 30, 40, 50, 60 ± 0.50C.  The influence of pH on metal ion removal was significant and the adsorption was increased with increase in temperature.  A portion of the nickel ion was recovered from the spent AGLS using 0.1M HCl.

Activated Glossocardia linearifolia Stem, Nickel ion, Adsorption isotherm, Equilibrium and Thermodynamic parameters, Intra-particle diffusion.


1.         Babita Verma and Shukla N P, Indian J Environ Health, 42, 145-150(2000).
2.         Senthilkumar S, Varatharajan P R, Porkodi K, subburaam C V, Colloid Interface Sci, 284, 79(2005).

3.         S.M. Nomanbhay and K.Palanisamy, Electronic J.Biotechnol, 8, 43 (2005).

4.         Anirudhan T S, Sreedhar M K, Indian J Environ Protect, 19, 8(1998).

5.         Vishwakarma P P, Yadava K P and Singh V N, Pertanika, 12, 357(1989).

6.         Namasivayam C, Muniasamy N, Gayatri K, Rani M and Ranganathan K, Biores Technol, 57, 37(1996).

7.         S.Babel and T.A.Kurniawan, J.Hazard Mater., 97, 219 (2003).

8.         B.H.Hameed, J Hazard Mat., 162, 305-311. (2009)

9.         Arivoli, S. Kinetic and thermodynamic studies on the adsorption of some metal ions and dyes on to low cost activated carbons, Ph.D., Thesis, Gandhigram Rural University, Gandhigram, (2007).

10.      X Y Luo, Z X Su, G Y Zhang and X J Chang, Analyst 1992, 117, 145.

11.      R Schmuhl, H M Krieg and K Keizerk, Water SA, 2001, 27, 1-7.

12.      Langmuir., J. Am.Chem Soc., 579 1361 – 1403. (1918)

13.      T.W. Weber R.K Chakravorti., J. Am. Inst. Chem. Eng.20, 228. (1974)

14.      G. McKay, H. S. Blair, J. R. Gardner J. Appl. Polym. Sci. 27 3043 – 3057. (1982)

15.      A.A. Khan and R.P. Singh,  J. Colliod Interf Sci., 24, 33 – 42,(1987).

16.      Weber W J and Morris C J, Proceedings of the 1st International Conference on Water Pollution Research (Pergamon Press, New York), 231(1962).

17.      Khare S K, Pandey K K, Srivastava R M and Singh V N, J Chem Tech Biotechnol, 38, 99(1987).

18.      Knocke W R and Hemphill L H, Water Res, 15, 275 (1981).

19.      Lee C K, Low K S and Chung L C, J Chem Tech Biotechnol, 69, 93(1997)

20.      Anirudhan T S, Sreedhar M K, Indian J Environ Protect, 19, 8(1998)





Rayeesa Shariff K, H. N. Suresh

Paper Title:

Wearable Vital Signs Monitoring System

Abstract: Microcontroller MSP430 adaptation with an android application is particularly expected for physiological signs observing framework and long distance communication between patient and specialists. This device obtains all sensor data and trades data through secured remote system with low bandwidth, continuously working without human interference. Power from the battery banks will be used by controller to monitor BP, temperature, heart rate levels and transmit SoS data using Wi-Fi with MQTT design exceptionally intended for low bandwidth interface. The system includes control unit, sensory unit, communication unit and battery banks. Expected outcome of this system will use devoted unit for each patient with a secured IP and QoS level three secured MQTT with settled sensors, low power controller with a energy bank will be interfaced and particular firmware using RTOS will be made to do the endeavors.

Keywords:  BP, health monitoring, heart rate, MQTT, temperature, pulse oximetry, wireless.


1.         Basic S. Park, C. Gopalsamy, R. Rajamanickam, and S. Jayaraman, “The wearable motherboard: A flexible information infrastructure or sensate liner for medical applications,” Stud. Health Technol. Inform., vol. 62, pp. 252–258, 1999.
2.         R. Paradiso, G. Loriga, and N. Taccini, “A wearable health care system based on knitted integrated sensors,” IEEE Trans Inf. Technol. Biomed., vol. 9, no. 3, pp. 337–344, Sep. 2005.

3.         R. Paradiso, A. Alonso, D. Cianflone, A. Milsis, T. Vavouras, and C. Malliopoulos, “Remote health monitoring with wearable non-invasive mobile system: The healthwear project,” in Proc. IEEE Engineering in Medicine and Biology Society Conf., 2008, vol. 2008, pp. 1699–1702 [Online]. Available:

4.         R. G. Haahr, S. Duun, K. Birkelund, P. Raahauge, P. Petersen, H. Dam, L. Nørgaard, and E. V. Thomsen, “A novel photodiode for reflectance pulse oximetry in low-power applications,” in Proc. Ann. Int. Conf. IEEE Engineering in Medicine and Biology Society, 2007, vol. 2007, pp. 2350–2353 [Online]. Available: http://dx.doi.org/10.1109/IEMBS. 2007.4352798

5.         S. Duun, R. G. Haahr, K. Birkelund, P. Raahauge, P. Petersen, H. Dam, L. Noergaard, and E. V. Thomsen, “A novel ring shaped photodiode for reflectance pulse oximetry in wireless applications,” in Proc. IEEE Sensors, 2007, pp. 596–599.

6.         S. B. Duun, R. G. Haahr, K. Birkelund, and E. V. Thomsen, “A ring- shaped photodiode designed for use in a reflectance pulse oximetry sensor in wireless health monitoring applications,” IEEE Sensors J., vol. 10, no. 2, pp. 261–268, 2010.

7.         R. G. Haahr, S. Duun, E. V. Thomsen, K. Hoppe, and J. Branebjerg, “A wearable electronic patch for wireless continuous monitoring of chronically diseased patients,” in Proc. 5th Int. Summer School and Symp. Medical Devices and Biosensors, 2008, pp. 66–70.

8.         R. Yazicioglu, T. Torfs, J. Penders, I. Romero, H. Kim, P. Merken, B. Gyselinckx, H. Yoo, and C. Van Hoof, “Ultra-low-power wearable biopotential sensor nodes,” in Proc. IEEE Annu. Int. Conf. Engineering in Medicine and Biology Society, Sep. 3–6, 2009, pp. 3205–3208.

9.         A.C.W. Wong,D.McDonagh,O. Omeni,C.Nunn,M. Hernandez-Sil- veira, and A. J. Burdett, “Sensium: An ultra-low-power wireless body sensor network platform: Design & application challenges,” in Proc. IEEE Annu. Int. Conf. IEEE Engineering in Medicine and Biology So- ciety, 2009, pp. 6576–6579.

10.      M. Tavakoli, L. Turicchia, and R. Sarpeshkar, “An ultra-low-power pulse oximeter implemented with an energy-efficient transimpedance amplifier,” IEEE Trans. Biomed. Circuits Syst., vol. 4, no. 1, pp. 27–38, 2010.

11.      T. Aoyagi, M. Kishi, K. Yamaguchi, and S. Watanabe, “Improvement of the earpiece oximeter,” in Proc. 13th Annu. Meeting Japanese So- cietry of Medical Electronics and Biological Engineering Abstracts, 1974, pp. 90–91.

12.      Y. Mendelson, P. W. Cheung, M. R. Neuman, D. G. Fleming, and S. D. Cahn, “Spectrophotometric investigation of pulsatile blood flow for transcutaneous reflectance oximetry,” Adv. Exp. Med. Biol., vol. 159, pp. 93–102, 1983.

13.      Y. Mendelson, J. C. Kent, B. L. Yocum, and M. J. Birle, “Design and evaluation of a new reflectance pulse oximeter sensor,” Med. Instrum., vol. 22, no. 4, pp. 167–173, Aug. 1988.

14.      Y. Mendelson and C. Pujary, “Measurement site and photodetector size considerations in optimizing power consumption of a wearable re- flectance pulse oximeter,” In Proc. 25th IEEE Annu. Int. Conf. Engi- neering in Medicine and Biology Society, 2003, vol. 4, pp. 3016–3019.

15.      S. Duun, R. G. Haahr, O. Hansen, K. Birkelund, and E. V. Thomsen, “High quantum efficiency annular backside silicon photodiodes for re- flectance pulse oximetry in wearable wireless body sensors,” J. Mi- cromech. Microeng., vol. 20, no. 7, pp. 075020–075020, 2010.

16.      P. Samuelsen, “Dressing with hydrocolloid,” U.S. Patent 4 867 748, 1987. [26] H. Ding, J. Q. Lu, W. A. Wooden, P. J. Kragel, and X.-H. Hu, “Refrac- tive indices of human skin tissues at eight wavelengths and estimated dispersion relations between 300 and 1600 nm,” Phys. Med. Biol., vol. 51, no. 6, pp. 1479–1489, Mar. 2006.

17.      T. Jensen, S. Duun, J. Larsen, R. G. Haahr, M. H. Toft, B. Belhage, and E. V. Thomsen, “Independent component analysis applied to pulse oximetry in the estimation of the arterial oxygen saturation (SpO2)—A comparative study,” in Proc. IEEE Annu. Int. Conf. Engineering in Medicine and Biology Society, 2009, pp. 4039–4044.

18.      J. G. Webster, S. A. Clark, D. J. Sebald, J. Farmer, O. Wieben, B. W. J. Bourgeois, J. S. Schowalter, M. V. S. Reddy, K. S. Paranjape, S. Tungjitkusolmun, A. Lozano-Nieto, and J. B. Ruchala, Design of Pulse Oximeters, J. G. Webster, Ed. New York: Taylor & Francis, 1997.

19.      J. Janting, “Water penetration study for a 3d electronic patch,” in Proc. IMAPS Nordic Annu. Conf., Helsingør, Denmark, Sep. 14–16, 2008, pp. 101–108.

20.      M. K. Diab, E. Kinai-Azarbayjany, I. M. Elfadel, R. J. McCharthy, W. M. Weber, and R. A. Smith, “Signal processing apperatus,” U.S. Patent 7 383 070 B2, 2008.





K. Madhusoodanan Pillaia, Deepak J, K. E. Reby Roy

Paper Title:

CFD Investigations on the Liquid Nitrogen Chill down of Straight Transfer Lines and ITS Comparison with Helically Coiled Transfer Lines

Abstract:  Attempts are constantly being made to simulate the momentum and energy interactions involved in cryogenic chill-down process accurately as in real case through CFD. The main difficulty is the lack of reliable data and correlations that compass the parameters associated with cryogenic fluids. This work has taken the much needed first step in studying the effect of varying transfer line geometries on their corresponding chill-down times. Chill-down in helical transfer lines were investigated using validated computational fluid dynamics code (FLUENT 15.0). The time taken to completely chill-down  a straight as opposed to a helical transfer line, at constant heat flux, was compared in this study. Important flow quantities for multiphase system such as volume fraction distribution were plotted and displayed. It was found that centrifugal forces due to shape of helical transfer   lines   play   an   important   role   in   the   phase   and temperature distribution in helical pipes. It was also observed that the time taken for complete chill-down  of helical transfer lines were much smaller as opposed to a straight transfer lines. It is concluded that future studies are required with improvements in the prediction scheme with detailed two phase correlations.

Chill-down, Liquid Nitrogen, CFD analysis, Cryogenics, Helical Transfer lines, Two Phase flow, Flow boiling.


1.         R Shaeffer, H. Hu, J.N. Chung, 2013, “An experimental study on liquid nitrogen pipe chill-down  and heat transfer with pulse flows”, university of florida, science direct, ( 54-958)
2.         J. K. Jackson, 2006, cryogenic two-phase flow during chill-down: flow transition and nucleate boiling heat transfer, university of florida,

3.         K. Majumdar and R.H. Flachbart, “Numerical Modeling of Fluid Transient by a Finite Volume Procedure for Rocket Propulsion Systems,” Submitted for presentation
at 2nd International Symposium on Water Hammer, 2003 ASME & JSME Joint Fluids Engineering Conference, July 6–10, Honolulu, Hawaii.

4.         R. B. Malla, “Modeling of Chill Down in Cryogenic Transfer Lines,” J . Spacecr. & Roc., Vol. 39, No. 2, 2002, pp. 284–289.

5.         N. T. Van Dresar and J.D.Siegwarth, “Cryogenic transfer line chill-down ”, NASA Glenn research center J. C. Burke, W.R. Bynles, A.H. Post, and F.E Ruccia, Pressurized cooldown of cryogenic transfer lines, “Advances in Cryogenic engineering, vol. 4, plenum press, new york, 1960, pp. 378-394.

6.         W. .G Steward, R.V. Smith, R. V., And Brennan, J. A., "Cooldown Transients in Cryogenic Transfer Lines," Advances In Cryogenic Engineering, Vol. 15, Plenum Press, New York, 1970, Pp. 354-363.

7.         Majumdar, S.S. Ravindran, “Numerical prediction of conjugate heat transfer in fluid network”, Journal of propusion and power Vol 2 , No-3, May- June 2011

8.         V. Klimenko, M.V. Fyodorov, Y.A. Fomichyov, “Channel orientation and geometry influence on heat transfer with two-phase forced flow of nitrogen” Cryogenics 2 (1) (1 ) 31–36

9.         O. Kawanami, T. Nishida, I. Honda, Y. Kawashima, H. Ohta, “Flow and heat transfer on cryogenic flow boiling during tube quenching under upward and downward flow, microgravity”, Sci. Technol. 19 (3–4) (2007) 137–138. 65

10.      R. B. Jacobs, “Liquid requirements for the Cool-down of Cryogenic Equipment” in “Advances in Cryogenic Engineering, edited by K.D. Timmerhaus, Plenum Press, New York, 8 529-535, (1963)

11.      T. M. Flynn, Cryogenic Engineering, Marcel Decker, New York,1996, pp. 67-69

12.      G. Prabhanjan, G. S. V. Ragbavan and T. J. Kennic, “Comparison of heat transfer rates between a straight tube heat exchanger and a helically coiled heat exchanger”, ,Int. Comm. Heat and Mass transfer,vol. 29. No. 2. Pp. 185-191





Kamala Devi V, Premkumar K, Bisharathu Beevi A

Paper Title:

Energy Management and Load Dispatch Flow using K-Map for Battery Storage System integrated with Solar Micro Grid Tied Inverters

Abstract: Intermittency of wind and solar potential necessitate for development of new systems, bringing additional co3mplexity to power system operations and planning. This has led to a new framework for improving the performance of solar Grid Tied inverters installed on the Low Tension Grid of Kerala. The aim is to introduce a Battery Intervention Power Supply (BIPS) integrated with the solar inverter that helps in smoothening the energy output of the inverter and in reducing the sub-harmonic oscillations in the output current waveform. It also helps to improve the performance of the inverter during the low irradiance levels. The excess power is stored in the BIPS during Peak Source Accumulation, power disruptions and when outside the safe operating region of the inverter. This can also be utilized to meet local priority loads. The model of the battery used to study the performance is derived using non-linear regression analysis method of curve fitting. The paper introduces an improved solar plant that reduces the length of distribuion lines delivering good power quality and maintaining grid stability with reduced intermittency of power flow.

  Grid Tied Inverter with battery storage, Distributed Generation (DG); Solar, Fuzzy-Logic


1.      Matija Z., P.S., G., N.D., H., T. C., D. S: ‘Review of energy storage allocation in power distribution networks: applications, methods and future research’, IET Gen, Trans & Distr, Vol.10, Iss.3. pp. 645-652, 2016.
2.      Central Electricity Authority Notification, New Delhi, Sep 30, 2013, Technical Standards for Grid Connectivity of Distributed Generation Resources, Regulations, 2013

3.      Kerala State Electricity Regulatory Commission Notification, 2096/KSERC/CT/2014, 10 June 2014

4.      Lynette O’Caliaghaz, Michael McKeever, Brian Norton.: ‘A Simulation Analysis of Photovoltaic AC Modules Integrated Converters in Parallel, under Controlled Edge
Shading Conditions’,DEL, Ireland, 2012-13.

5.      Saiful Islama, Achim Woyteb, Ronnie Balmansa.et al, :’Cost Effective Second Generation AC Modules: Development and Testing Aspects’,The Netherlands 2005.

6.      Yatsuki S, Wada k, Shimizu T, et al., : ‘A novel AC Photovoltaic system based on impedance-admittance conversion’, PESC 2001 IEEE 32 rd Annual(Vol 4).

7.      Jie Liu, Norbert H, : ‘Reliability consideration of low-power grid tied inverter for photovoltaic application’, Germany, IWES, 2013.

8.      H.O, I.J, de Jong, :’AC modules, past, present and future, 2000.

9.      Henk Oldenkamp , Irene de Jong , Nico van der Borg , Bart de Boer , Hugo de Moor , Wim C. Sinke, : ‘Pv-wirefree versus conventional pv-systems: Detailed analysis of difference in energy yield between series and parallel connected PV-modules’, OKE-Services, Keizerstraat 121, 2584 BD The Hague, The Netherlands, Energy research Centre of the Netherlands, PO Box 1, 1755 ZG, Petten, The Netherlands.

10.   Linan Qui, D.Z, T.S., et al., :’Photovoltaic Generation Model for Power System Transient Stability Analysis’, 2013 Int. J. of Computer and Electrical Engineering, Vol. 5, No.3.

11.   Microgrids research: A review of experimental microgrids and test systems N.W.A. Lidula *, A.D. Rajapakse 1 Department of Electrical and Computer Engineering, 75A Chancellor’s Circle, University of Manitoba, Winnipeg, Manitoba R3T 5V6, Canada, Renewable and Sustainable Energy Reviews,Vol.15, Iss.1, Jan 2011, pp.186-202.

12.   Microgrid Systems: Current Status and Challenges T.E. Del Carpio Huayllas, D.S. Ramos, R.L. Vasquez-Arnez,2010 - ieeexplore.ieee.org

13.   Tran Cong Binh, Mai Tuan Dat, Ngo Manh Dung, Phan Quang An, Pham Dinh Truc and Nguyen Huu Phuc,: ‘Active and Reactive Power Controller for Single-Phase Grid-Connected Photovoltaic Systems’, The 1st AUN/SEED-Net Regional Workshop on New and Renewable Energy, Bandung, Indonesia, 12–13 Mar 2009

14.   Ehsan Rezapour, Md. Tavakoli Bina and Amin Hajizadeh,:’Reactive Power Controller Design for Single-Phase Grid-Connected Photovoltaic Systems’, IJESE, pp.2316-6378, vol-2, Issue-5, March 2014

15.   K.Kavitha, K.Guna Prasad and S.Ramesh,:’ Grid Connected Single Phase Photo Voltaic Inverter With Alleviation Of Harmonics’, IJIEEE,pp. 2347-6982, vol-2, Issue-9,Sept-2014

16.   M.J.E.Alam,K.Muttaqi&D.Soetanto,”Mitigation of rooftop solar PV impacts and evening peak support by managing available capacity of distributed energy storage system,”IEEE Transaction on Power Systems,vol.28,(4).3874-3884,2013.

17.   Kamala Devi V,Bisharathu Beevi A, Ramaier S,:’Impact of Solar Distributed Generation on LT Grid of Kerala’, IJMER, pp.16-25,Vol 5, Issue 12, Dec 2015.

18.   Zhao, Haoran, WU,Q., Wang, C., Cheng, L.,& Rasmussen, C.N.,:’Fuzzy Logic based Coordinated Control of Battery Storage System and Dispatchable Distributed Generation for Microgrid’, J. Modern Power Systems and Clean Energy, 3(3), pp. 422-428, 2015

19.   Yashar, Amir R, Mo., Brian K.’Fuzzy Control of Storage Unit for Energy Management of Micro-Grids’,Dep. Of Electrical & Computer Engineering, University of Texas.

20.   Jun Xiao, Z. Z., L., H.,: ‘Determination of the optimal installation site and capacity of battery energy storage system in distribution network integrated with distribution generation’, IET Gen, Trans & Distr, Vol.10, Iss.3, pp. 601-607, 2016.

21.   Kamala Devi V, Efficient Method of Sizing Solar Array for a Battery Bank,  Proc. Int. Conf., Asia Energy Vision 2020, Nov 15-17,1996.





Fathima Mussarath, K. G Manjunath

Paper Title:

Secure Distrusted Model for Large Data in Cloud Storage Based on No-SQL Database

Abstract:  Cloud based storage providers bring forth limitless storage capacity and ingress potential to store and retrieve large amount of information. These operations performed by several users lead to increase in the system load on cloud storage. Hence, in order to provide better quality of service to the users, the system has to consider numerous pre-requisites such as efficient management and storage of large files, efficient management of the space (reduce the wastage of storage space) and data protection. In this paper we propose a distributed cloud storage which provides architecture and algorithms to administer the problems of the cloud storage. A less complicated and fixed size metadata design is proposed which diminishes the space unpredictability of metadata. The solution also supports a secure de-duplication mechanism for cross-users, that reduce the operation cost and protects the privacy. The data has to be protected before being uploaded to the cloud storage. The solution makes use of the key-value store no-sql database thus providing distributed and scalable cloud storage for large information.

   Cloud Storage, No-SQL, Convergent Encryption, Scalable.


1.         Amazon Simple Storage Service, http://aws.amazon.com/s3, 2015.
2.       I.Drago, M. Mellia, M. M Munafo, A. Sperotto, R. Sadre, and A. Pras. “Inside dropbox: understanding personal cloud storage services.” In Proceeding of the 2012 ACM conference on Internet measurement conference, pages 481-494, ACM, 2012.

3.         J. Li. Secure deduplication with efficient and reliable convergent key management. IEEE Transaction On Parallel And Distributed System, 25(6):1615–1625, jun 2014.

4.         F. Rashid. A secure data deduplication framework for cloud environments. 2012 Tenth Annual International Conference on Privacy, Security and Trust, 978-1-4673-2326-0(12):81–87, 2012.

5.         P. Puzio. Cloudedup: Secure de-duplication with encrypted data for cloud storage. 2013 IEEE International Conference on Cloud Computing Technology and Science, 978-0-7695-5095-4(13):363–370, 2013.

6.         D. Perttula. Drew perttula and attacks on convergent encryption. https://tahoe-lafs.org/hacktahoelafs/drew perttula.html, mar 2008.

7.         Drago, E. Bocchi, M. Mellia, H. Slatman, and A. Pras. Benchmarking personal cloud storage. In Proceedings of the 2013 conference on Internet measurement conference, pages 205–212. ACM, 2013.

8.         P. FIPS. 197: the official aes standard. Figure2: Working scheme withfour LFSRs and their IV generation LFSR1 LFSR, 2, 2001.

9.         F. PUB. Secure hash standard (shs). 2012.

10.      J. Stanek, A. Sorniotti, E. Androulaki, and L. Kencl. A secure data deduplication scheme for cloud storage. 2014.





Tony Jose, Vijayakumar Narayanan

Paper Title:

Experimental Study on FPGA Based Nonlinearity Reduction in a Laser Diode

Abstract: This work aims to reduce the Total Harmonic Distortion (THD) in a laser diode by predistorting the input signal. A predistorted signal is generated using FPGA and this signal is fed to the inherently nonlinear laser diode. The combined effect of predistorted signal and the nonlinear diode characteristics render an overall linear characteristics for the optical transmitter. The design of the FPGA predistorter is the crux of the present work. The optical power versus injection current graph is plotted for the laser diode and based on the characteristics, certain mathematical manipulation is performed to obtain an analytical expression to faithfully reproduce the entire curve. In order to design the predistorter, the inverse function of the nonlinear expression is computed. Based on these data, a lookup table based VHDL code is downloaded onto the Field Programmable Gate Array (FPGA) chip. The FPGA operates entirely in the digital regime, thus suitable interfacing circuitry were rigged up. The harmonic distortion is studied using spectrum analyzer.

FPGA, Harmonic Distortion, Laser Diode, Nonlinearity, Predistortion.


1.      S. O. Kasap, Optoelectronics and Photonics: Principles and Practices, Prentice Hall, 2006, ch. 4.
2.      G. P. Agrawal, Fiber-Optic Communication Systems, 3rd ed. Hoboken, NJ, USA: Wiley, 2002.

3.      Satheesan Nadarajah, Xavier N. Fernando, Reza Sedaghat, “Adaptive digital predistortion of laser diode nonlinearity for wireless applications,” IEEE CCGEI 2003 - Canadian Conference on Electrical and Computer Engineering, Montreal, Canada, May 2003.

4.      L. Roselli, V. Borgioni, F. Zepparelli, F. Ambrosi, M. Comez, P. Faccin, and A. Casini, “Analog Laser Predistortion for Multiservice Radio-Over-Fiber Systems,” Journal of Lightwave Technology, Vol. 21, No. 5, May 2003

5.      Vijayakumar Narayanan and Tony Jose, “Performance Improvement in Radio over Fiber (RoF) Links by Minimizing Nonlinearities in Sources and Amplifiers,”10th International Conference on Fiber Optics and Photonics-2010, IIT Guwahati.

6.      S. Tanaka, N. Taguchi, T. Kimura and Y. Atsumi “A predistortion type equipath linearizer designed for radio-on-fiber system,” IEEE Trans. Microwav. Theory Tech. vol. 54, no.2, pp.938-944, Feb 2006.

7.      M. Gadheri, S. Kumar, D.E. Dodds, “Adaptive predistortion linearizer using polynomial functions,” IEEE Proc. Common., vol.141, no.2, pp.49-55, April 1994.

8.      Varghese Antony Thomas, Mohammed El-Hajjar, and Lajos Hanzo, “Performance Improvement and Cost Reduction Techniques for Radio Over Fiber Communications,” IEEE Communication Surveys & Tutorials, Vol. 17, No. 2, Second Quarter 2015.

9.      Keith J. Williams, Ronald D. Esman, and Mario Dagenais, “Nonlinearities in p-i-n microwave Photodetectors,” Journal of Lightwave Technology, Vol 14, No 1, January 1996.

10.   Varghese Antony Thomas, Mohammed El-Hajjar, and Lajos Hanzo, “Millimeter-Wave Radio Over Fiber Optical Upconversion Techniques Relying on Link Nonlinearity,” IEEE Communication Surveys & Tutorials, Vol. 18, No. 1, First Quarter 2016.





Nidhi Shrivastava, Ruchi Jain, Shiv Kumar

Paper Title:

An Efficient Intrusion Detection System based on Random-Iteration Particle Swarm Optimization

Abstract:  In this paper an efficient framework has been developed for efficient intrusion detection system. In the first step the data NSL-KDD cup99 is divided into k-clusters based on the filtration parameters that are content feature, traffic features and the host feature. The clusters are separated based on the support value. Then random-iteration particle swarm optimization (RI-PSO) has been applied on the cluster for the further data classification. The classification is considered for denial of service (DoS), user to root (U2R), remote to user (R2L) and probe attacks. The results are efficient in comparison to the previous methods.

 Association rule mining, RIPSO, DoS, U2R, R2L, Probe


1.         Farhaoui Y. How to secure web servers by the intrusion prevention system (IPS)? International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):65.
2.         Jianliang M, Haikun S, Ling B. The application on intrusion detection based on k-means cluster algorithm. In Information Technology and Applications, 2009. IFITA'09. International Forum on 2009 May 15 (Vol. 1, pp. 150-152). IEEE.

3.         Kabiri P, Ghorbani AA. Research on Intrusion Detection and Response: A Survey. IJ Network Security. 2005 Sep; 1(2):84-102.

4.         Park HA. Secure chip based encrypted search protocol in mobile office environments. International Journal of Advanced Computer Research. 2016; 6(24):72-80.

5.         Tiwari R, Sinhal A. Block based text data partition with RC4 encryption for text data security. International Journal of Advanced Computer Research. 2016; 6(24):107-13.

6.         Tian L, Jianwen W. Research on network intrusion detection system based on improved k-means clustering algorithm. In Computer Science-Technology and Applications, 2009. IFCSTA'09. International Forum on 2009 Dec 25 (Vol. 1, pp. 76-79). IEEE.

7.         Devaraju S, Ramakrishnan S. Analysis of Intrusion Detection System Using Various Neural Network classifiers. IEEE 2011. 2011:1033-8.

8.         Conteh NY, Schmick PJ. Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):31.

9.         Lee HY, Wang NJ. The implementation and investigation of securing web applications upon multi-platform for a single sign-on functionality. International Journal of Advanced Computer Research. 2016 Mar 1; 6(23):39.

10.      Ishida M, Takakura H, Okabe Y. High-performance intrusion detection using optigrid clustering and grid-based labelling. InApplications and the Internet (SAINT), 2011 IEEE/IPSJ 11th International Symposium on 2011 Jul 18 (pp. 11-19). IEEE.

11.      Brugger ST. Data mining methods for network intrusion detection. University of California at Davis. 2004 Jun 9.

12.      Lee W, Stolfo SJ. Data mining approaches for intrusion detection. In Usenix security 1998 Jan 26.

13.      Nalavade K, Meshram BB. Mining Association Rules to Evade Network Intrusion in Network Audit Data. International Journal of Advanced Computer Research. 2014 Jun 1;4(2):560.

14.      Naoum R, Aziz S, Alabsi F. An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection. International Journal of Advanced Computer
Research. 2014 Jun 1; 4(2):487.

15.      Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. InSecurity and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on 1999 (pp. 120-132). IEEE.

16.      Kumari S, Shrivastava M. A Study Paper on IDS Attack Classification Using Various Data Mining Techniques. International Journal of Advanced Computer Research. 2012; 2(3).

17.      Venkatesan R, Ganesan R, Selvakumar AA. A Comprehensive Study in Data Mining Frameworks for Intrusion Detection. International Journal of Advanced Computer Research (IJACR). 2012; 2: 29-34.

18.      Patel R, Bakhshi D, Arjariya T. Random Particle Swarm Optimization (RPSO) based Intrusion Detection System. International Journal of Advanced. 2015; 2(5): 60-66.

19.      Sperotto A, Schaffrath G, Sadre R, Morariu C, Pras A, Stiller B. An overview of IP flow-based intrusion detection. Communications Surveys & Tutorials, IEEE. 2010 Jul 1; 12(3):343-56.

20.      Han LI. Using a dynamic K-means algorithm to detect anomaly activities. In Computational Intelligence and Security (CIS), 2011 Seventh International Conference on 2011 Dec 3 (pp. 1049-1052). IEEE.

21.      Muda Z, Yassin W, Sulaiman MN, Udzir NI. Intrusion detection based on K-Means clustering and Naïve Bayes classification. In Information Technology in Asia (CITA 11), 2011 7th International Conference on 2011 Jul 12 (pp. 1-6). IEEE.

22.      Yin-huan LI. Design of intrusion detection model based on data mining technology. In2012 International Conference on Industrial Control and Electronics Engineering 2012 Aug 23.

23.      Prasenna P, RaghavRamana AV, Krishnakumar R, Devanbu A. Network programming and mining classifier for intrusion detection using probability classification. InPattern Recognition, Informatics and Medical Engineering (PRIME), 2012 International Conference on 2012 Mar 21 (pp. 204-209). IEEE.

24.      Deshmukh DH, Ghorpade T, Padiya P. Intrusion detection system by improved preprocessing methods and Naïve Bayes classifier using NSL-KDD 99 Dataset. In Electronics and Communication Systems (ICECS), 2014 International Conference on 2014 Feb 13 (pp. 1-7). IEEE.

25.      Benaicha SE, Saoudi L, Guermeche B, Eddine S, Lounis O. Intrusion detection system using genetic algorithm. InScience and Information Conference (SAI), 2014 2014 Aug 27 (pp. 564-568). IEEE.

26.      Kiss I, Genge B, Haller P, Sebestyen G. Data clustering-based anomaly detection in industrial control systems. In Intelligent Computer Communication and Processing (ICCP), 2014 IEEE International Conference on 2014 Sep 4 (pp. 275-281). IEEE.

27.      Thaseen IS, Kumar CA. Intrusion detection model using fusion of PCA and optimized SVM. In Contemporary Computing and Informatics (IC3I), 2014 International
Conference on 2014 Nov 27 (pp. 879-884). IEEE.

28.      Wagh SK, Kolhe SR. Effective intrusion detection system using semi-supervised learning. In Data Mining and Intelligent Computing (ICDMIC), 2014 International Conference on 2014 Sep 5 (pp. 1-5). IEEE.

29.      Masarat S, Taheri H, Sharifian S. A novel framework based on fuzzy ensemble of classifiers for intrusion detection systems. In Computer and Knowledge Engineering (ICCKE), 2014 4th International eConference on 2014 Oct 29 (pp. 165-170). IEEE.

30.      Bahl S, Sharma SK. Improving Classification Accuracy of Intrusion Detection System Using Feature Subset Selection. In Advanced Computing & Communication Technologies (ACCT), 2015 Fifth International Conference on 2015 Feb 21 (pp. 431-436). IEEE.

31.      Yan C. Intelligent Intrusion Detection Based on Soft Computing. In Measuring Technology and Mechatronics Automation (ICMTMA), 2015 Seventh International Conference on 2015 Jun 13 (pp. 577-580). IEEE.

32.      Haidar GA, Boustany C. High Perception Intrusion Detection Systems Using Neural Networks. Ninth International Conference on Complex, Intelligent, and Software Intensive Systems 2015 (pp. 497-501). IEEE.





Bishwarup Biswas, Ayan Kumar Bhar, Adwitiya Mullick, Mahua Ghosh, Monal Dutta

Paper Title:

Scaled Conjugate Back-Propagation Algorithm for Prediction of Phenol Adsorption Characteristics

Abstract:   In the present investigation the adsorption characteristics of phenol on the surface of chemically modified natural clay was predicted by using three-layer artificial neural network. The effect of various operational parameters on the adsorption process was determined by using scaled conjugate back-propagation algorithm. For this purpose, a feed forward network (5 - 11 - 1) with a learning rate of 0.02 was constructed. Various transfer functions such as, tangent sigmoid, saturated linear and positive linear were applied to hidden layer whereas pure linear transfer function was used in the output layer. The network performance was defined in terms of mean squared error (MSE) and validation error (VDE). The optimum number of neurons in the hidden layer was found to be 11 with “poselin” and “purelin” transfer functions in the hidden layer and output layer respectively. The MSE and VDE in this case were 2 × 10-5 and  5 × 10-5 respectively.

  Adsorption, ANN, MSE, VDE.


1.      M . Ghaedi, A.M. Ghaedi, E. Negintaji, A. Ansari, F. Mohammadi, “Artificial neural network –Imperialist competitive algorithm based optimization for removal of sunset yellow using Zn(OH)2 nanoparticles-activated carbon,” Journal of Industrial and Engineering Chemistry, vol. 20, no. 6, pp. 4332-43, 2014.
2.      M. Ghaedi, A. Ansari, P.N. Assefi, A. Ghaedi, A. Vafaei, M.H. Habibi, “Artificial neural network and bees algorithm for removal of Eosin B using cobalt oxide nanoparticle-activated carbon: isotherm and kinetics study,” Environmental Progress and Sustainable Energy, vol. 34, no. 1, pp.155-68, 2015.

3.      C.L. Wang, L. Kong,  X. Yang, S. Zheng, F. Chen, F. MaiZhi, H. Zong, “Photocatalytic degradation of azo dyes by supported TiO2 + U V in aqueous solution,” Chemosphere, vol. 41, pp. 303-306, 2000.

4.      D. Lu, Y. Zhang, S. Niu, L. Wang, S. Lin, C. Wang, W. Ye, C. Yan, “Study of phenolbiodegradation using Bacillus amyloliquefaciens strain WJDB-1 immobilized inalginate-chitosan-alginate (ACA) microcapsules by electrochemical method,” Biodegradation, vol. 23, no. 2, pp. 209–219, 2012.

5.      G. Busca, S. Berardinelli, C. Rossini, L. Arrighi, “Technologies for the removal ofphenol from fluid streams: a short review of recent development,” Journal of Hazardous Material, vol. 160, no. 2-3, pp. 265–288, 2008.

6.      R.K. Vedula, C. Balomajumder, “Simultaneous adsorptive removal of cyanideand phenol from industrial wastewater: optimization of process parameters,” Res. J. Chem. Sci., vol. 1, no. 4, pp. 30–39, 2011.

7.      C.B. Agarwal, P.K. Thakur, “Simultaneous co-adsorptiveremoval of phenol and cyanide from binary solution using granular activatedcarbon,” Chemical Engineering Journal, vol. 228, pp. 655–664, 2013.

8.      A.K. Bhar, A. Mullick, B. Biswas, M.Ghosh, P. Sardar, M. Dutta, “Optimization of phenol adsorption characteristics through central composite design,” International Journal of Emerging Technology and Advanced Engineering, vol. 7, no. 5, pp. 18-21, 2017.

9.      M. Mohanraj, S. Jayaraj, C. Muraleedharan, “Applications of artificial neural networks for thermal analysis of heat exchangers–a review,” International Journal of Thermal Sciences, vol. 90, pp.150-72, 2015.

10.   J. Ye, X. Cong, P. .Zhang, G. Zeng, E. Hoffmann, Y. Wu, H. Zhang, W. Fang, “Operational parameter impact and back propagation artificial neural network modeling for phosphate adsorption onto acid-activated neutralized red mud,” Journal of Molecular Liquids, vol. 216, pp. 35–41, 2016.

11.   D. Mohammad, H.E. Ahmed, J. Othman, A.K. Othman, M. Sharifah, “Comparison of artificial neural network transfer functions abilities to simulate extreme runoff data”, International Conference on Environment, Energy and Biotechnology,  pp.1-6, 2012.

12.   R. Karimi, F. Yousefi, M. Ghaedi, K. Dashtian, “Back propagation artificial neural network and central composite design modeling of operational parameter impact for sunset yellow and azur (II) adsorption onto MWCNT and MWCNT-Pd-NPs: isotherm and kinetic study,” Chemometrics and Intelligent Laboratory Systems, vol. 159, pp. 127–137, 2016.

13.   B. Vaferi, Y. Rahnama, P. Darvishi, A. Toorani, M. Lashkarbolooki, “Phase equilibria modeling of binary systems containing ethanol using optimal feedforward neural network,” Journal of Supercritical Fluids, vol. 84, pp. 80–88, 2013.

14.   S. Kundu, Modeling phenol adsorption in water  environment using artificial neural network,  International Research Journal of Environment Sciences, vol. 2, no. 7, pp. 39-43, 2013. 





Elsamny, M.K., Abd-Elhamed, M.K., Ezz-Eldeen, H.A., Elmokrany, A.A.

Paper Title:

Experimental Investigation of using Wooden Lintel and sill with Different Lengths for Strengthening Brick Walls with Openings

Abstract: The presence of openings can have an effect on the load capacity and cracking regime for brick walls. Often the type and magnitude of cracking indicate the cause of cracks. However, cracks in brick walls appear after construction under working load due to different reasons. The presence of openings in brick wall with conventional length of lintel gives small bearing area. Thus, as a result of concentrated load on part of the wall, corner cracks occur above the openings. In addition, openings divide the wall to two parts, the first part next to the opening act as pillars and are stressed much more than the second part below the opening. Thus, as a result of differential stress, vertical shear cracks occur under opening in the wall.  For these reasons, there is a need for redistribution the load by using sill under opening and increasing the bearing area by increasing length of lintel and sill. In the present study, a total of seven brick wall specimens having a wall dimensions (85*65) cm and thickness (10) cm with square opening (25*25) cm  were tested .The brick wall specimens were divided into three groups as follow :
      i.    Group one consisted of wall with R.C lintel length of 35 cm as a control wall.

      ii.   Group two consisted of three strengthened brick wall specimens by wooden lintel of lengths (L= 35, 50,65cm).

      iii. Group three consisted of three strengthened brick wall specimens by wooden lintel and sill of lengths (L= 35, 50,65cm).

All wall specimens were tested under static loads in regular increments from zero up to the crack load then failure load. In addition, wall deformations have been measured by LVDT. A finite element analysis was performed using SAP2000 to define the stress distribution path as well as the expected positions of cracks that might occur in walls with openings using different techniques of strengthening. The obtained test results show that using wooden lintel with length (65cm) gives an increase in the load carrying capacity up to (130 %) from the control ultimate capacity. In addition, using wooden lintel and sill with length (65cm) gives an increase in the load carrying capacity up to (171%) from the control ultimate capacity .However, ductility has been significantly increased. In addition, it was found that strengthening with this technique is durable, economic and easy to apply during construction. The results suggest that adding sill under openings is very effective to overcome and prevent cracks under the working load in the wall and increasing the length of lintel and sill during construction shows the best performance in increasing the load carrying capacity and ductility.

Experimental, brick walls, openings, wooden lintel, wooden sill.


1.         Almherigh Mohamed Abdalla (2014) "Common Causes of Cracking in Masonry Walls Diagnosis and Remedy" International Journal of Sciences: Basic and Applied Research (IJSBAR) ISSN 2307-4531.
2.         El-Salakawy Tarik S., Osama A. Kamal, Osama. R. El- Hariri, Gehan A. Hamdy. (2014) "Experimental investigation for masonry vaults/walls strengthened using different techniques" international journal of civil engineering and technology (IJCIET) Volume 5, Issue 12, December (2014), pp. 354-365.

3.         Elsamny, M.K. , Abd-Elhamed, M.K. , Ezz-Eldeen,H.A.and Mahmoud, M.H. (2017) "  Unreinforced Brick Walls with Openings Rehabilitated Using U & L-Shaped Steel Plates"  International Journal of Engineering Trends & Technology (IJETT), April 2017, ISSN: 2231-5381

4.         Elsamny, M.K. , Abd-Elhamed, M.K. and Mahmoud, M.H. (2016) "Rehabilitation of Brick Walls with Openings Using Steel Wire Mesh" International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016.

5.         Elsamny, M.K. , Ezz-Eldeen,H.A.and Elmokrany, A.A (2017) " Experimental study of brick walls with opening strengthened during construction by using  steel wire mesh embedded into bed joint mortar between bricks" International Journal of Engineering Science Invention (IJESI) Volume 6 , Issue 5, pp. 15-24,  May-2017. 

6.         Elsamny, M.K. , Ezz-Eldeen,H.A.and Elmokrany, A.A (2017) " Strengthening of brick walls with openings during construction by steel wire mesh around openings on both sides of wall" Journal of Mechanical and Civil Engineering (IOSR-JMCE) Volume 14 , Issue 3, ver. III,  May- June 2017.

7.         Elsamny, M.K. , Ezz-Eldeen,H.A.and Mahmoud, M.H. (2017) "Structural Behavior of Brick Walls with Openings Rehabilitated With Steel Plates Box-Section and Steel Angles " International Journal of Scientific & Engineering Research (IJSER), Volume 8, Issue 4, April-2017.

8.         Elsamny, M.K. ,Abd-Elhamed, M.K. , and  Elmokrany, A.A. (2017)" Effect of  R.C. lintel and sill lengths on carrying capacity of brick walls with openings " International Journal of Engineering Technology and Management (IJETM) Volume.4 –Issue.02-April-2017 .

9.         Elsamny, M.K. ,Abd-Elhamed, M.K. , and  Elmokrany, A.A. (2017)" Experimental study of brick walls with opening strengthened during construction by using  steel bars embedded into bed joint mortar above lintel and sill " International Journal of Engineering Research & Technology (IJERT) Volume.6 –Issue.01-january-2017.

10.      Elsamny, M.K.,  Abdelrazik, M.I. , Elsebaey, A.M. and Mahmoud .B.N.A (2011) " strengthening brick walls by horizontal galvanized steel mesh into bed mortar between bricks "civil engineering research magazine (CERM) Al – Azhar Univercity, Volume (33) , No.3, pp. 13-28 .

11.      Elsamny, M.K.,  Abdelrazik, M.I. , Elsebaey, A.M. and Mahmoud .B.N.A (2011) " strengthening brick walls using vertical galvanized steel mesh fixed at both sides of the walls " civil engineering research magazine (CERM) Al – Azhar Univercity, Volume (33) , No.3, pp. 29-47 .

12.      Farooq S.H., Ilyas M.  and Ghaffar A. (2006) "Technique for strengthening of masonry wall panels using steel strips" ASIAN Journal of civil engineering (building and housing) vol. 7, no. 6 (2006) pp. 621-638.

13.      Mahmoud .B.N.A (2011) "strengthening of brick walls and cost study analysis" Ph.D. Thesis, Al-Azhar University, Cairo, Egypt.

14.      Moussa A., Aly A. M. (2001) "Repair and strengthening of masonry walls with openings using FRP laminates" 26th Conference on Our World In Concrete & Structures 27 - 28 August 2001, Singapore.





Sakshi Kaushik, Sumit Gupta

Paper Title:

Implementation of Open Stack Through Ansible

Abstract:  Open Stack is a free and open source stage under the terms of the Apache permit that has an arrangement of tools for the creation and administration of private, public and hybrid distributed computing. The product is created for a control of an extensive variety of handling, stockpiling and systems administration assets all through a server farm. It can be dealt with as an Infrastructure as a Service demonstrate unequivocally associated with Platform as a Service demonstrate. OpenStack deal with the IT foundation, give correspondence interface, virtualizes assets and develop the enforcement. It gives a design that gives the adaptability in the clouds configuration, incorporating coordination with existing frameworks and third-party technologies. Clients either oversee it through an electronic dashboard. Users either manage it through a web-based dashboard. But the implementation of OpenStack is very complex. To make it easier we can use configuration management tools like puppet, ansible, and chef. Among these, the ansible is very powerful and easy to understand. Ansible uses playbooks and ad-hoc commands to manage the remote system. Using Ansible we are making OpenStack more powerful as because using ansible we can modify and manipulate the backend working of OpenStack according to our need. The configuration of OpenStack is one thing what we want to change is the parameters or attributes that are used by the components of OpenStack. We are putting two of the powerful tools together. That will change the experience of using OpenStack. As such ansible is configuration management tool that will increase the efficiency of the OpenStack.

 DevOps, OpenStack, Ansible, Cloud Computing, Configuration management tools


1.      K. Phaneendraa; I. Rajendra Kumara; M. Babu Reddy; G. Rajendraa “ An Empherical Research on Open  Source IaaS Cloud Framework” , International Journal Of Computers & Communications,2012
2.      Roman Ledyayev; Harald Richter “High Performance Computing in a Cloud Using OpenStack,CLOUD COMPUTING 2014

3.      JohnDavidCooper "Analysis of Security in Cloud Platforms using OpenStack as Case Study",  Grimstad Norway, June 2013

4.      Nishant Kumar Singh; Sanjeev Thakur; Himanshu Chaurasiyaz; Himanshu Nagdev "Automated Provisioning of Application in IAAS Cloud using Ansible Configuration Management", 1st International Conference on Next Generation Computing Technologies", Dehradun India, September 2015

5.      Aaron Paradowski; Lu Liu; Bo Yuan "Benchmarking the Performance of OpenStack and CloudStack", IEEE, September 2014

6.      Girish L S; Dr. H S Guruprasad "Building Private Cloud using OpenStack", International Journal of Emerging Trends & Technology in Computer Science, June 2014

7.      Shuai Zhang; Xuebin Chen; Shufen Zhang; Xiuzhen Huo "Cloud Computing Research and Development Trend", Second International Conference on Future Networks, 2010

8.      Jianfeng Yang; Zhibin Chen "Cloud Computing Research and Security Issues", IEEE, December 2010

9.      Sonali Yadav "Comparative Study on Open Source Software for Cloud Computing Platform: Eucalyptus, Openstack and Opennebula", Research Inventy: International Journal Of Engineering And Science Vol.3, Issue 10 (October 2013)
10.   Meenakshi Bist; Manoj Wariya; Amit Agarwal "Comparing Delta, Open Stack and Xen Cloud Platforms: A Survey on Open Source IaaS", 3rd IEEE International Advance Computing Conference, 2013
11.   Xiaolong Wen; Genqiang Gu; Qingchun Li; Yun Gao; Xuejie Zhang "Comparison of Open-Source Cloud Management Platforms: OpenStack and OpenNebula", IEEE, July 2012

12.   Robayet Nasim; Andreas J. Kassler "Deploying OpenStack: Virtual Infrastructure or Dedicated Hardware", IEEE 38th Annual International Computers, Software and Applications Conference Workshops, 2014

13.   N.Saranya; S.Nivedha "Implementing Authentication in an Openstack Environment-Survey", IEEE, May 2016

14.   Rakesh Kumar; Neha Gupta; Shilpi Charu; Kanishk Jain; Sunil Kumar Jangir "Open Source Solution for Cloud Computing Platform Using OpenStack", International Journal of Computer Science and Mobile Computing, Vol.3 Issue.5, May- 2014

15.   Rasib Hassan Khan; Jukka Ylitalot; Abu Shohel Ahmed "OpenID Authentication As A Service in OpenStack", IEEE, 2011

16.   Anton Beloglazov; Rajkumar Buyya "OpenStack Neat: a framework for dynamic and energy-efficient consolidation of virtual machines in OpenStack clouds", Published online in Wiley Online Library, 2014

17.   Rohit Kamboj; Anoopa Arya "Openstack: Open Source Cloud Computing IaaS Platform",International Journal of Advanced Research in Computer Science and Software Engineering, May 2014

18.   Jiang Yunxia; Zhao Bowen; Wang Shuqi; Sun Dongnan "Research of Enterprise Private Cloud Computing Platform Based on OpenStack", International Journal of Grid Distribution Computing Vol.7, 2014

19.   Bin Hu; Hong Yu "Research of Scheduling Strategy on OpenStack", IEEE, May 2014

20.   Lizhe Wang; Jie Tao; Marcel Kunze;Alvaro Canales Castellanos; David Kramer; Wolfgang Karl "Scientific Cloud Computing: Early Definition and Experience", The 10th IEEE International Conference on High  Performance Computing and Communications, October 2008

21.   [Baojiang cui; Tao xi "Security analysis of OpenStack keystone", IEEE, October 2015

22.   Sasko Ristov; Marjan Gusev; Aleksandar Donevski "Security Vulnerability Assessment of OpenStack Cloud", IEEE, March 2015

23.   Daniel Grzonka; Michal Szczygiel; Artur Bernasiewicz; Andrzej Wilczynski; Marek Liszka " Short Analysis of Implementation and Resource Utilization for The Openstack Cloud Computing Platform", 29th European Conference on Modelling and Simulation, Bulgaria, May 2015





Nagaraju Kaja

Paper Title:

A Review of Energy Efficient Techniques in Vernacular Architecture of North Indian Plains

Abstract: Objectives: This paper explores the building materials and construction techniques that have been used by the people of this region which are the successful examples of the Vernacular Architecture. Methods/Statistical analysis: As the importance of energy is increasing day by day, we keep on exploring new and better energy efficient techniques. In the process, we should also turn back to our past and understand how our ancestors lived a comfortable life in an age when there was no electricity and other modern age equipments. Findings: In India, Northern region is the most populated plain, people have been living there for ages and its architectural character has evolved over time with due understanding of the climate, customs, traditions of the region. This paper tries to identify some of the successful vernacular construction techniques of this region which can be suitably used in today’s modern buildings for better comfort conditions. Today’s modern buildings consume higher amount of energy and it is very important for us to reduce energy consumption and reserve it for future generations. The vernacular strategies discussed are not only traditional strategies creating good comfort conditions but also have the potential to reduce the energy consumption in buildings. Application/Improvements: Vernacular buildings are climatically responsive shelters and consume less energy for maintaining living conditions and this result to energy efficiency. The findings of this study suggest the possible integration of the vernacular strategies in the energy efficient building design guidelines.

 Energy efficient strategies, Vernacular Architecture, Indian Plains


1.      Avinash Gautam, ‘ Climate Responsive Vernacular Architecture: Jharkhand, India’, 2003, Birla Institute of Technology, Mesra, India
2.      Dr. Salish Kumar, USAID ECO - III Project, 2011. Energy Use in commercial buildings - Key findings from the national benchmarking study. USAID - INDIA.

3.      Energy statistics,2016, Ministry of Statistics and programme implementation, Govt of India

4.      Takeo Kamiya,  ‘The Guide to the Architecture of the Indian sub continent’,2003,Architecture Autonomous,Goa

5.      Ashwani Kumar and Navneet Munoth, ‘ Vernacular Architecture: A Prerequisite for Sustainable Development’,  Architecture: Time, Space and People, 2011
6.      Zhiqiang (John) Zhai& Jonathan M. Previtali, ‘Ancient vernacular architecture: characteristics categorization and energy performance evaluation’, Energy and Buildings, 2010, (42)357–3657.      Sundarraja, D. M., Radhakrishnan, S., & Shanthi Priya, R., Understanding vernacular architecture as a tool for sustainable development, 10th National Conference on Technological Trends(NCTT09),2009, p 249-255.
8.      Ashar, c. B., Architecture of Mughal India, 2003, Cambridge University Press.

9.      Asif Ali, ‘ Passive Cooling and Vernacularism in Mughal Buildings in North India: A Source of Inspiration for Sustainable Development’, International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies, 2013,4(1), 15-27

10.   Ghaemmaghami and M. Mahmoudi, Wind tower a natural cooling system in Iranian traditional architecture, International Conference “Passive and Low Energy Cooling 71 for the Built Environment”, May 2005, Santorini, Greece





Shadrack Mutungi Simon

Paper Title:

Effect of Top Management Support on Resource Planning and Leveling (RP&L) Among Contractors in the Kenyan Construction Industry

Abstract:  Construction as a sector of economy is defined by the economic activity of building and civil engineering works (Bon & Crosthwaite, 2000b). Many authors agree that the construction industry is crucial for the growth of developing economies (Ndaiga, 2014; Giang & Pheng, 2010; Muiruri & Mulinge, 2014; Wachira, 1999; and Cytonn, 2016 among others). This criticality of the construction industry calls for efficient execution of construction projects which are the backbone of the industry. Resource Planning and Leveling has been attributed to improved project performance in terms of cost, time and even quality (Newell, 2002; Mendoza, 1995 and Dubey, 2015). For any project to be successful there should be support from top management. According to Schultz, Slevin, & Pinto, (1987), management support during project implementation is a major determinant to the success or failure of the project. Project management could be regarded as one of the means in which the top management implements its goals and objectives for the firm. This study sought to establish the effect of Top Management Support on Resource Planning and Leveling (RP&L) among Contractors in the Kenyan Construction Industry. Results indicated weak negative (-0.038) statistically insignificant (0.736) relationship between top management Support versus age of firm; a weak positive (0.275) statistically significant (0.048) relationship between extent of top management support and extent of carrying out Equipment Resource Planning (ERP); a very weak positive (0.079) statistically insignificant (0.494) relationship between extent of top management support and extent of carrying out Labour Resource Planning (LRP); a very weak positive (0.162) statistically insignificant (0.156) relationship between extent of top management support and extent of carrying out Material Resource Planning (MRP); a weak positive (0.257) statistically significant (0.022) relationship between extent of top management support and extent of carrying out Equipment Resource Leveling (ERL); a weak positive (0.230) statistically significant (0.041) relationship between extent of top management support and extent of carrying out Labour Resource Leveling (LRL); and a weak positive (0.245) statistically significant (0.029) relationship between extent of top management support and extent of carrying out Material Resource Leveling (MRL).The author recommended that there should be more support by top management with regard to Resource Planning and Leveling since the two variables were found to be directly proportional.

 Construction Industry, Resource Planning, Resource Leveling, Top Management Support.


1.      Ankrah, A. (2007). An investigation into the impact of culture on construction project performance. University of Wolverhampton.
2.      Anto, J. (2016). An empirical study of enterprise resource planning integration. Information Development, 32(3), 260–270. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&db=lls&AN=115146616&site=ehost-live

3.      Badawiyeh, B. H. (2010). The Effect of Planning and Resource Leveling.

4.      Bon, R., & Crosthwaite, D. (2000b). The Future of International Construction. London: Thomas Telford Publishing.

5.      Creswell, J. (2009). Research Design; Qualitative, Quantitative and Mixed Methods Approaches. Journal of Chemical Information and Modeling (Second, Vol. 53). London: Sage Publications. http://doi.org/10.1017/CBO9781107415324.004.

6.      Cytonn. (2016). Kenya’s Real Estate Retail Sector Analysis: Investor’s Perspective on Kenya’s Retail Sector, (July).

7.      Dubey, A. (2015). Resource Levelling for a Construction Project, 12(4), 5–11. http://doi.org/10.9790/1684-12440511.

8.      Field, A. (2009). Discovering statistics using SPSS for Windows: advanced techniques for the beginner. London: Sage Publications.

9.      Giang, D. ., & Pheng, S. L. (2010). Role of construction in economic development; Review of key concepts in the past 40 years. Habitat International.

10.   Kothari, C. (2012). Research Methodology: An introduction. Research Methodology: Methods and Techniques, IX, 418. http://doi.org/Goddard, W. & Melville, S

11.   Mendoza, C. (1995). Resource Planning and Resource Allocation in the Construction Industry. University of Florida

12.   Muiruri, G., & Mulinge, C. (2014). Health and Safety Management on Construction Projects Sites in Kenya A Case Study of Construction Projects in Nairobi County Health and Safety Management on Construction Projects Sites in Kenya A Case Study of Construction Projects in Nairobi County, (June 2014), 14

13.   Ndaiga, H. (2014). Overview: Kenya Construction Industry. Retrieved January 4, 2016, from http://www.constructionkenya.com/1665/kenya-construction-overview/

14.   Newell, M. W. (2002). Preparing for the Project Management Professional (PMP) Certification Exam.

15.   Rajasekar, S., Philominathan, P., & Chinnathambi, V. (2006a). Research Methodology. The Journal of Mathematical Behavior, 13(2), 239. http://doi.org/10.1016/0732-3123(94)90027-2

16.   Schultz, R. L., Slevin, D., & Pinto, S. K. (1987). Strategy and tactics in a process model of project management interfaces. Management Journal, 17(3), 34–46.

17.   Shi, J. J., & Halpin, D. W. (2003). Enterprise resource planning for construction business management. Journal of Construction Engineering and Management, American Society for Civil Engineers (ASCE), 129(2), 214–221

18.   Simon, S. M., Gwaya, A., & Diang’a, S. (2017). Exploring the Practice of Resource Planning and Leveling ( RP&L ) Among Contractors in the Kenyan Construction
Industry. International Journal of Soft Computing and Engineering (IJSCE), 7(1), 44–52

19.   Wachira, L. (1999). Labour productivity in the Kenyan construction industry. Joint CIB International Symposium of W055, W065, W089, W118, TG76, TG78, TG81 and TG84, (September), 5–10. Retrieved from http://scholar.google.com/scholar?hl=en&btnG=Search&q=intitle:LABOUR+PRODUCTIVITY+IN+THE+KENYAN+


20.   Weir, I. (2003). Spearman’s correlation. Retrieved from http://www.statstutor.ac.uk/resources/uploaded/spearmans.pdf

21.   Zwikael, O. (2008). Top management involvement in project management: A cross country study of the software industry. International Journal of Managing Projects in Business, 1(4), 498–511. http://doi.org/10.1108/17538370810906228





M. Neeraja

Paper Title:

A Study on Unconfined Compressive Strength, Permeability and Swelling Characteristics of Clay and Shredded Tyres Mixture

Abstract: Soil is the basic foundation for any civil engineering structures. It is required to bear the loads without failure. In some places soil may be weak which cannot resist the oncoming loads in such cases soil stabilization is needed, The clay often is weak and has no enough stability in heavy loading.  Stabilization is being used for a variety of engineering works, the most common application being in the construction of road and airfield pavements, where the main objective is to increase the strength or stability of soil and to reduce the construction cost by making best use of locally available materials. With ongoing rise in use of motor vehicles hundreds of millions of tyres are discarded each year throught the world. Many are added to existing tyre dumps or landfills and a significant number for recycling into a useful products.Since highway construction requires large volumes of materials, highway agencies have been encouraged to participate in the recycling effort. Recovering these materials for use in construction requires an awareness of the properties of the materials and the limitations associated with their use. Use of shredded tyres in geotechnical engineering for improving soil properties has received great attention in recent times. Present an attempt has been made through laboratory study to understand the potential of shredded tyres in soil stabilization, which help not only in soil stabilization but also in utilization of waste. Shredded tyres having size 5mm, 10mm, 30mm and 50mm after removing steel belting are used. This paper presents the investigation of clay soil stabilized with shredded tyre. It is found that unconfined compressive strength of clay-shredded tyre mixture were found to be between 0.23 and 0.37kg/cm2. Permeability of clay –shredded tyres is higher compared with that to clay alone. Less swelling and swelling pressure observed on addition of shredded tyres compared with clay alone.

  Shredded tyres, unconfined compressive strength test, permeability, Swelling, Clay soil.


1.      Umar jan, vinod K.Sonthwal, Ajay Kumar Duggal, Er.Jasvir S. Rattan, Mohd Irfan “ Soil Stabilization Using Shredded Rubber Tyre”, International research journal of Engineering and Technology, Volume:02 Issue:09 |Dec-2015.
2.      Al-Tabbaa.A, Aravinthan.T, “Natural clay-shredded tyre mixtures as landfill barrier material”, waste management 18(1998), paper pp9-16

3.      Andrew.D, David.N and Thor.H, “Deformaability of shredded tyres”, Minniesota Department of Transportation 1999

4.      Garry.J.F, Carig.H.B and Peter.J.B., “Sand reinforced with shredded waste tyres”, Journal of GeoTechnical Engineering, Vol.122, no.9, September 1996, pp 760-767

5.      Giriswara rao. G, “stabilization of soils by using the plastic strips as reinforcing material for pavements”, M.Tech project report submitted to university of Calicut.

6.      Han C, “Waste products in highway construction”, Minnesota Local Road Research Board, Minnesota 1993.

7.      Humphrey.D.N, Whetten.N, “Tyre Shreds as lightweight fills for embankments and retaining walls”, Proceedings further conference on recycled materials in geotechnical applications, ASCE(1998), pp 51-65

8.      Humphrey.D.N, Whetten.N, Weaver.J, Recker.K (2000), “Tyre Shreds as lightweight fills for construction on weak marine clay” of the international Symposium on costal geotechnical engineering in preceedings practice (2000), Balkema, Rotterdam, pp 661-616.

9.      Humphrey.D.N, Andrew.J.F. and Robert A.E., “Back collection of thermal conductivity of tyre chips from instrumented test section”, TRB 81st Annual meeting January 2002.

10.   Krzysztof.S.J, “Use of tyre sheds as final cover system foundation layer material at municipal solid waste landfills”, guidance manual by geosyntech consultants California.

11.   Lee.J.H, Salgada.R, Bernal.A and Lovell.C.W., “Shredded tyres and rubber-sand as lightweight backfill”, Journal of geotechnical and geo environmental engineering, vol.125, no.2, Febraury 199, pp 132-141

12.   R. Ayothiraman, Ablish Kumar Meena, “ Improvement of subgrade soil with shredded waste tyre chips”, proceedings of Indian geotechnical conference, December15-15,2011,kochi(paper No.H-033)





Tapan Bhavsar, Bhavinkumar Gajjar

Paper Title:

Image Classification using Convolution Neural Network

Abstract:  Convolution neural network has been mostly used for image classification in machine learning and computer vision. In simple neural network, single layer’s feature may not contain enough useful information to predict image class correctly [6]. Using a feed forward CNN, misclassification rate can be reduced by some additional layers that contain acceptable information to predict image class.  Also gradient based learning algorithm can be improved to synthesize complex decision that classify high dimensional pattern such as object edges and shape. In this paper, we make effort to modify standard neural network to transfer more information layer to layer. Moreover, already learned CNN model with training images are used to extract features from multiple layers. In this experiment, MNIST and CIFAR 10 dataset have been used to classify random images in 10 different classes labelled airplane, automobile, bird, cat, deer, dog, frog, horse, ship and truck. In the addition, GPU can train CNN faster without giving the preference to hardware.

 Convolution Neural Network, CIFAR 10, gradient based learning algorithm, Image classification, MNIST, machine learning


1.      Zeiler, Matthew D., and Rob Fergus. "Visualizing and understanding convolutional networks."European conference on computer vision. Springer International Publishing, 2014.
2.      Gu, Jiuxiang, et al. "Recent advances in convolutional neural networks."arXiv preprint arXiv:1512.07108 (2015).

3.      Blot, Michael, Matthieu Cord, and Nicolas Thome. "Max-min convolutional neural networks for image classification."Image Processing (ICIP), 2016 IEEE International Conference on. IEEE, 2016.

4.      Yim, Junho, et al. "Image classification using convolutional neural networks with multi-stage feature."Robot Intelligence Technology and Applications 3. Springer International Publishing, 2015. 587-594.

5.      LeCun, Yann, et al. "Gradient-based learning applied to document recognition."Proceedings of the IEEE 86.11 (1998): 2278-2324.

6.      Krizhevsky, Alex, Ilya Sutskever, and Geoffrey E. Hinton. "Imagenet classification with deep convolutional neural networks."Advances in neural information processing systems. 2012.

7.      Ciresan, Dan Claudiu, et al. "Flexible, high performance convolutional neural networks for image classification."Twenty-Second International Joint Conference on
Artificial Intelligence. 2011.

8.      Grave, Edouard, et al. "Efficient softmax approximation for GPUs."arXiv preprint arXiv:1609.04309 (2016).

9.      Andreou, Panayiotis C., Chris Charalambous, and Spiros H. Martzoukos. "Robust artificial neural networks for pricing of European options."Computational Economics 27.2-3 (2006): 329-351.

10.   Srivastava, Nitish, et al. "Dropout: A simple way to prevent neural networks from overfitting."The Journal of Machine Learning Research 15.1 (2014): 1929-1958.

11.   Network, Back-Propagation. "Handwritten Digit Recognition with." (1989).





Akhilesh Kumar Pandey, Rajeev Singh

Paper Title:

CPW Fed Micro Strip Patch Antenna for Wireless Communication

Abstract: A novel broadband design of a coplanar waveguide fed micro-strip patch antenna for broadband operations is proposed and are simulated by means of AWR(Microwave Wave Office) and  results  are experimentally verified. The impedance bandwidth is 71.85% and the resonating frequency is 3.52GHz.The bandwidth is suggestive of ultra wide band operation. The structure can be utilized for GPS, Wi-Fi, WiMAX, GPRS and other wireless communication system.

  Microstrip patch antenna; GPS; Wide band antenna; CPW fed.


1.      W. C. Liu, H. J. Liu, Compact CPW-fed monopole antenna for 5 GHz wireless application, Electronics Letters.  42 (2006) 837 – 839.
2.      J. Y. Jan, C.Y. Hsiang, Wideband CPW-fed slot antenna for DCS, PCS, 3G and Bluetooth bands, Electronics Letters. 42 (2006) 1377-1378.

3.      Singh, Kamakshi, M. Aneesh, J. A. Ansari, Slots and Notches Loaded Microstrip Patch Antenna for Wireless Communication, TELKOMNIKA Indonesian Journal of Electrical Engineering. 13 (3) (2015) 584-594.

4.      D. D. Krishna, M. Gopikrishna, C. K. Anandan, P. Mohanan,  K. Vasudevan, CPW-Fed Koch Fractal Slot Antenna for WLAN/WiMAX Applications, Antennas and Wireless Propagation Letters. IEEE. 7 (2008) 389-392.

5.      Singh, M. Aneesh, K. Kamakshi, A. Mishra, J. A. Ansari, Analysis of F-shape microstrip line fed dualband antenna for WLAN applications,Wireless network.  20 (1) (20014) 133-140.
6.      M. Veysi, M. Kamyab, A. Jafargholi, Single-feed dual-band dual-linearly-polarized proximity-coupled patch antenna, Antennas and Propagation Magazine. IEEE. 53 (2011) 90 – 96.
7.      H. F. Hammad, Y. M. M. Antar, A. P. Freundorfer, Dualband aperture coupled antenna using spur line, Electonics Letters.  33 (1997) 2088-2090.

8.      Singh, J. A. Ansari, Kamakshi, M.  Aneesh, S.S.  Sayeed, L-strip proximity fed gap coupled compact semi-circular disk patch antenna, Alexandria Eng. J. 53 (1) (2014) 61–67.

9.      Y. D. Kim, H. Y. Kim, H. M. Lee, Dualband LTCC chip antenna design using stacked meander patch for mobile handsets, Microw. Opt. Technol. Lett. 45 (2005)  271-273.

10.   Singh, J. A. Ansari, Kamakshi, M. Aneesh, S. S. Sayeed, Analysis of Slot Loaded Compact Patch Antennas for Dualband Operation, International Journal of Applied Electromagnetics and Mechanics. 47 (2015) 163-175.

11.   Singh, Kamakshi, M. Aneesh, Sapna Verma, S. S. Sayeed, Compact notch loaded half disk patch antenna for dualband operation, Annal Telecommunication. 69 (2014) 475-483.

12.   S. S. Sayeed, A. Singh, Kamakshi, M. Aneesh, J. A. Ansari, Analysis of C-Shaped compact microstrip line fed rectangular patch antenna for dual band operation, Journal of Electrical Engineering. 14 (2014) 1-7.

13.   R. N. Simons,  G. E. Ponchak,  Coax-to-channelised coplanar waveguide in-phase N-way, radial power divider, Electronics Letters. 26 (1990) 754-756.

14.   R. N. Simons, R. Q. Lee,  New coplanar waveguide/stripline feed network for seven patch hexagonal CP subarray, Electronics Letters. 27 (1991) 533-535.

15.   R. N. Simons, R. Q. Lee, Coplanar waveguide aperture coupled patch antennas with ground plane/substrate of finite extent,  Electronics Letters. 28 (1992) 75-76.

16.   R. N. Simons, R. Q. Lee, New techniques for exciting linearly tapered slot antennas with coplanar waveguide, Electronics Letters. 28 (1992) 620-621.

17.   J. Y. Chiou, J. Y. Sze, K. L. Wong, A broad-band CPW-fed strip-loaded square slot antenna,IEEE Trans. Antennas and Propagation. 51 (2003) 719 - 721.

18.   W. Kim, M. F. Iskander, A new coplanar waveguide continuous transverse stub (CPW-CTS) antenna for wireless communications, Antennas and Wireless Propagation Letters. IEEE.  4 (2005) 172 - 174.

19.   Liu, W.C., H. J., Compact CPW-fed monopole antenna for 5 GHz wireless application, Electronics Letters. 42 (2006) 837 - 839.

20.   X. Chen, W. Zhang, R. Ma, J. Zhang, J. Gao, Ultra-wideband CPW-fed antenna with round corner rectangular slot and partial circular patch, Microwaves, Antennas & Propagation. IET. 1 (2007) 847 - 851.

21.   T. N. Chang, G. A. Tsai, A wideband coplanar waveguide-fed circularly polarised antenna, Microwaves, Antennas & Propagation. IET. 2 (2008) 343 - 347.

22.   Y. Gao,  Z. Feng, L. Zhang, Compact CPW-fed dielectric resonator antenna with dual polarization, Antennas and Wireless Propagation Letters. IEEE. 10 (2011) 544 - 547.

23.   J. Shao, G. Fang, Y. Ji, K. Tan, H. Yin, A novel compact tapered-slot antenna for GPR applications, Antennas and Wireless Propagation Letters. IEEE.12 (2013) 972 – 975.

24.   K. Pandey, G. Chandra, R. Singh, A comparative analysis of Variation between feed patch and parasitic patch of a CPW microstrip antenna,  International Journal of Emerging Science and Engineering. IJESE. 3 (2015) 37 - 39.

25.   K. Pandey, G. Chandra, R. Singh, Analysis of CPW fed T-Shaped Patch Antenna for WLAN Applications, International Journal on Advanced Electrical and Computer Engineering. IJAECE. 2 (2015) 35 - 38.





Nilesh Kumar Sen, Navdeep Kaur Saluja

Paper Title:

An Implementation of Security Model using Homomorphic ECC Algorithm for Cloud Environment

Abstract:  Cloud computing is the process of providing services to user in according to their need. All the large enterprises are investing in very large amount in order to provide cloud services. Amazon, Google, Windows are having their own services which is available to all users in order to have efficient retrieval. In our survey it is find that homomorphic encryption is one of the finer encryption technique but the finest of all encryption technique is elliptic curve encryption. In this work, the comparison of both computation is performed and result are depicted in order to prove the elliptic curve cryptography as better encryption technique.

 Security; Homomorphic Encryption; Elliptic curve cryptography;


1.         Deyan Chen, Hong Zhao, “Data Security and Privacy Protection Issues in Cloud Computing”, “International Conference on Computer Science and Electronics Engineering”, 2012.
2.         Tumpe Moyo, and Jagdev Bhogal, Investigating Security Issues in Cloud Computing. IEEE Eighth International Conference on Complex, Intelligent and Software Intensive Systems, 2014.

3.         Nasrin Khanezaei, Zurina Mohd Hanapi, “A Framework Based on RSA and AES Encryption Algorithms for Cloud Computing Services”, “System, Process and Control (ICSPC), 2014.

4.         Vishwanath s Mahalle, Aniket K Shahade, “Enhancing the data security in Cloud by implementing hybrid (Rsa & Aes) encryption algorithm”, “Power, Automation and communication (INAP)”, 2014.

5.         Mrudula Sarvabhatla, Chandra Mouli Reddy M, Chandra Sekhar Vorugunti, “A Secure and Light Weight Authentication Service in Hadoop using One Time Pad”,

6.         “2nd International Symposium on Big Data and Cloud Computing (ISBCC’15)”, Procedia Computer Science 50 ( 2015 ) 81 – 86.

7.         Tebaa, M.; El Hajji, S.; El Ghazi, A., "Homomorphic encryption method applied to Cloud Computing," in Network Security and Systems (JNS2), 2012 National Days of , vol., no., pp.86-89, 20-21 April 2012

8.         Mather, Tim, Subra Kumaraswamy, and Shahed Latif. Cloud security and privacy: an enterprise perspective on risks and compliance. "O'Reilly Media, Inc.", 2009

9.         Samyak Shah, Yash Shah, Janika Kotak, “Somewhat Homomorphic Encryption Technique with its Key Management Protocol”, Dec 14

10.      Volume 2 Issue 12 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169,PP: 4180 – 4183

11.      Ramaiah, Y. Govinda, and G. Vijaya Kumari. "Efficient public key homomorphic encryption over integer plaintexts." Information Security and Intelligence Control
(ISIC), 2012 International Conference on. IEEE, 2012.

12.      Gentry, Craig. "Computing arbitrary functions of encrypted data." Communications of the ACM 53.3 (2010): 97-105.

13.      Atayero, Aderemi A., and Oluwaseyi Feyisetan. "Security issues in cloud computing: The potentials of homomorphic encryption." Journal of Emerging Trends in Computing and Information Sciences 2.10 (2011): 546-552.

14.      Catteddu, Daniele, and Giles Hogben. "Cloud computing." Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2009) (2009).

15.      Deyan Chen; Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing," in Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on , vol.1, no., pp.647-651, 23-25 March 2012.

16.      Pearson, Siani. "Taking account of privacy when designing cloud computing services." Proceedings of the 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. IEEE Computer Society, 2009.

17.      Rivest, Ronald L., Len Adleman, and Michael L. Dertouzos. "On data banks and privacy homomorphisms." Foundations of secure computation 4.11 (1978): 169-180.

18.      Rivest, Ronald L., Adi Shamir, and Len Adleman. "A method for obtaining digital signatures and public-key cryptosystems."Communications of the ACM 21.2 (1978): 120-126.

19.      C. Yao. Protocols for secure computations (extended abstract). In 23rd Annual Symposium on Foundations of Computer Science (FOCS '82), pages 160-164. IEEE, 1982.

20.      Goldwasser, Shafi, and Silvio Micali. "Probabilistic encryption." Journal of computer and system sciences 28.2 (1984): 270-299.

21.      ElGamal, Taher. "A public key cryptosystem and a signature scheme based on discrete logarithms." Advances in cryptology. Springer Berlin Heidelberg, 1985.

22.      Paillier, Pascal. "Public-key cryptosystems based on composite degree residuosity classes." Advances in cryptology—EUROCRYPT’99.Springer Berlin Heidelberg, 1999..
23.      Fontaine, Caroline, and Fabien Galand. "A survey of homomorphic encryption for nonspecialists." EURASIP Journal on Information Security 2007 (2007): 15.





Divyanshu Atre, Lalit Gehlod

Paper Title:

Analysis and Advancement of Page Replacement Algorithm for web Proxy Server

Abstract:   World Wide Web is growing rapidly and number of users is increasing day by day to access web pages. A Proxy server intercepts all client requests, and provides responses from its cache or forwards the request connects to the real server. Proxies were invented to add structure and encapsulations to distributed systems. The problems of web servers are heavy network traffic and Latency etc. To overcome these problems, proxy server caching is one of the solution. Proxy caching improve  the speed of  service requests by fetching the store web pages from an earlier request through the same point or even other point. In this research work Page Replacement Algorithm (LRU, LFU, FIFO) have analyzed for proxy server caching and proposed the  randomly caching page replacement algorithm. It increases the hit rate with time and reduced execution time on proxy server cache. With the help of proposed algorithm, the performance of proxy server caching has been improved in terms of hit rate and time parameter.

  Proxy Server, Web cache, Latency, Page Replacement Algorithm (LRU, LFU, FIFO) etc.


1.         David A. Malts and Pravin Bhagwat “Improving HTTP caching proxy performance with TCP tap”. Technical report, IBM. March 1998.
2.         Abraham Silberschatz And Peter Baer Galvin, “operating system concepts”5th Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA , 1997.

3.         John Dilley, Martine Arlitt and Stephane Perret  “Enhancement and Validation of Squid’s Cache Replacement Policy” Internet Systems and Applications Laboratory HP Laboratories Palo Alto HPL- 1999-69, May 2009.

4.         Ismail Ari, Melani Gottwals Dick Henze ,” SANBOOST: Automate SAN Level Caching in Storage Area Netowkrs “ International Conference on Automatic Computing pp-164-171,2004.

5.         Martin Arlitt, Ludmila Cherkasova, John Dilley, Richard Friedrich, Tai J in "Evaluating Content Management Techniques for Web Proxy Caches", published in ACM SIGMETRICS Performance Evaluation Review Volume 27 Issue 4, March 2000.

6.         J. Almeida and P. Cao "Measuring Proxy Performance with the Wisconsin Proxy Benchmark", Technical Report, University of Wisconsin-Madison, April 1998.

7.         R. Gupta and Sanjiv Tokekar, ”Pair of replacement algorithms MFMR and AF-LRU on  L1 and L2 cache for proxy server”.  INDICON 2009 publication by IEEE.

8.         P. Cao and Irani, “Cost aware WWW Proxy Caching Algorithms” , In roc USENIX Symp. Internet Technology and System Monterey 1997.

9.         Yong Zhen Guo, Kotagiri Ramamohanarao and Laurence A. F. Park “Personalized PageRank for Web Page Prediction Based on AccessTime-Length and Frequency” This paper published in 2007 IEEE/WIC/ACM International Conference on Web Intelligence.

10.      Gala Golan “Multilevel cache management based on application Hints” computer science department, Technion Haifa 32000, ISRAEL. November 24, 2003.

11.      Shiva Shankar Reddy P,Swetha L “Analysis and Design of Enhanced HTTP Proxy Cashing Server“ paper published in International  Journal of computer Technology, Volume  2 (3), 537-541.

12.      V. Sathiyamoorthi and Dr.Murali Bhaskaran “Data Preprocessing Techniques for Pre-Fetching and Caching of Web Data through Proxy Server” International Journal of Computer Science and Network Security, VOL.11 No.2011.

13.      Song Jiang, X. Ding E. Tan and X. Zhang,”DULO: An Effective Buffer Cache Management Scheme to Exploit Both Temporal and Spatial Locality.” Proc. Of the USENIX Symp. File Storage and  Technologies 2005.

14.      F.J. Gonzalez-Canete, E. Casilari, Ahcia Trivino-Cabrera "Characterizing Document Types to Evaluate Web Cache Replacement Policies," ecumn, pp.3-11, Fourth European Conference on Universal Multiservice Networks (ECUMN'07). 2007 IEEE.

15.      J. L. Hennessy and D. A. Patterson, Computer Architecture: A Quantitative Approach, 3rd Edition, Chapter 5 – Memory Hierarchy Design. Morgan Kaufmann Publishing, 2002.

16.      [Online] https://developers.google.com/speed/articles/web-metrics  (Accessed 30 June 2015).

17.      Y.Zhou and K.Li, “Second Level Buffer cache Management”, IEEE Transactions on Parallel and Distributed Systems July2004.

18.      L. Bresalu, Cao, S. Shenker , “Web Caching Zipf like Distrubution”1999 IEEE.

19.      Vladmir V. Prischepa, “AN Efficient Web Caching Algorithm based on LFU-k replacement policy”, Spring Young Researcher’s Colloquium on Database and Information System,2004 .





Shruti Deore, Vivek Aranke

Paper Title:

Development of Doubly fed Induction Generator Wind Power System with Fuzzy Controller

Abstract: Power generation from the non-conventional sources is the need of the day. Wind energy is one of the major fields, where various conversion topologies have been proposed in order to produce electric power. Squirrel cage induction generator (SCIG), permanent magnet synchronous generator and doubly fed induction generator (DFIG) are mainly used in wind power generation. The DFIG is a variable speed generator where active and reactive power control is done by power converters. While in SCIG, reactive power requirement is fulfill by compensating device like STATCOM. In this paper we have done mathematical modeling of DFIG generator and matlab simulation is done for grid connected system. Fuzzy controller is implemented in stator side controlling and system is simulated in matlab environment and finally comparison is done with PI controller.

 doubly fed induction generator, fuzzy-PI controller, power stability, wind energy.

1.      Jianxing liu, Yabin Gao, Sijia Geng2, Ligang Wug, “Nonlinear control of variable speed wind turbines via fuzzy techniques,” in IEEE access digial library, p. 11,2016.
2.      M. Molinas, J. A. Suul, and T. Undeland, “Low voltage ride through of wind farms with cage generators: STATCOM versus SVC,” IEEE  Power Electron., vol. 23, no. 3, pp. 1104–1117, May 2008Power Electron., vol. 23, no. 3, pp. 1104–1117, May 2008.

3.      R. Ganon, G. Sybille, and S. Bernard, “ Modeling and real time simulation of a doubly fed induction genratordriven by a wind turbine,” presented at the Int. Conf Power system transient,CanadaM. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.

4.      Yu Zou, Malik E. Elbuluk, Y. Sozer, “Simulationa comparison and implementation of induction generator wind power system”, in IEEE transaction on industrial applications Vol 49, no 3, May 2013.

5.      Z. Chen, J. M. Guerrero, and F. Blaabjerg, “A review of the state of the art of power electronics for wind turbines,” IEEE Trans. Power Electron., vol. 24, no. 8, pp. 1859–1875, Aug. 2009.

6.      Sabah Louarem, Saad Belkhiat , Djamel Eddine Chouaib Belkhiat “A control method using PI/fuzzy controllers based DFIG in wind energy conversion system”, IEEE grenoble conference, p.p. June 2013.

7.      R. Pena, J. C. Clare, and G. M. Asher, “Doubly fed induction generator using back-to-back PWM converters and its application to variable-speed wind-energy generation,” Proc. Inst. Elect. Eng.—Elect. Power Appl.,vol. 143, no. 3, pp. 231–241, May 1996.





Nimisha Singh Bais, D. Srinivasa Rao, G.Sriram

Paper Title:

Network Path Stability Based Routing Protocol for MANET

Abstract:  An ad hoc network is a mobile wireless network that has no centralized infrastructure and not has fixed access point. Each node in the network also functions as a mobile router of data packets for other nodes. However, due to node mobility, link failures in such networks are very frequent and render certain standard protocols inefficient resulting in wastage of power and loss in throughput. Due to high node mobility the neighbor list of a node might change more often, thereby raising the need for predicting link lifetime for improving reliability in communication. The cases when network size is large or traffic rate is very high, often leads to frequent congestion in the network. In this paper we propose Link Breakage prediction i.e. LBP based on signal strength, energy and position of the dispersed node randomly in network using Ad-hoc on demand Distance Vector routing protocol modification. In this context targeted QoS parameters are selected for performance measurement. So the results demonstrated that proposed mechanism is very effective for ad-hoc network.

  MANET, AODV, NS-2, Link Prediction, Link Breakage, Routing Protocol, Network Node


1.      Xin Ming Zhang, Feng Fu Zou, En Bo Wang, and Dan Keun Sung “Exploring the Dynamic Nature of Mobile Nodes for Predicting Route Lifetime in Mobile Ad Hoc Networks” IEEE Transactions on Vehicular Technology, vol. 59, no. 3, March 2010.
2.      Taneja,S., & Kush, A.,“A Survey of routing protocols in mobile ad hoc networks”, International Journal of Innovation Management and Technology, vol. 1, no. 3, pp. 2010 - 0248, 2010.

3.      Mäki, Silja, "Security Fundamentals in Ad Hoc Networking", Proceedings of the Helsinki University of Technology, Seminar on Internetworking-Ad Hoc Networks. 2000.

4.      Amitabh Mishra and Ketan M. Nadkarni, Security in Wireless Ad Hoc Networks, in Book the Handbook of Ad Hoc Wireless Networks (Chapter 30), CRC Press LLC, 2003

5.      Zayani, Mohamed-Haykel, Link prediction in dynamic and human-centered mobile wireless networks, Diss. Institute National des Telecommunications, 2012.

6.      Gautam S. Thakur, Ahmed Helmy and Wei-Jen Hsu, “Similarity analysis and modeling in mobile societies: the missing link” In Proc. of the 5th ACM workshop on Challenged networks (CHANTS '10), pages 13-20, 2010.

7.      Ajay Kumar Singh Kushwah and Amit Kumar Manjhvar, “A Review on Link Prediction in Social Network”, International Journal of Grid and Distributed Computing Vol. 9, No. 2, pp.43-50, 2016

8.      Geetha Nair and Dr. N. J. R. Muniraj, “Prediction based Link Stability Scheme for Mobile Ad Hoc Networks”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 2012

9.      Farkas, Károly, et al. "Pattern matching based link quality prediction in wireless mobile ad hoc networks", Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems, ACM, 2006.

10.   Yu, Ming, et al. "A link availability-based QoS-aware route protocol Computer Communications 30.18 (2007): 3823-3831

11.   Li, Zhinan, and Zygmunt J. Haas, "On residual path lifetime in mobile networks." IEEE Communications Letters 20.3 (2016): pp. 582-585.

12.   Khalid Zahedi and Abdul Samad Ismail, “Route Maintenance Approach for Link Breakage Predicttion in Mobile Ad Hoc Networks”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 10, 2011

13.   N. Lalitha and L Surya Prasanthi Latike, “MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM”, IOSR Journal of Computer Engineering (IOSR-JCE), Volume 11, Issue 1 (May. - Jun. 2013), PP 79-86





Manish Kumar Rana, Hemant Narayan

Paper Title:

QoS Requirements and Implementation for IMS Network

Abstract: The issue of converged networks is to ensure the sufficient quality of services for entire duration of communication transmission. This issue is closely connected to real- time services, such as VoIP (Voice over Internet Protocol) and videoconferencing. These services require strict adherence to quality parameters, otherwise their function is not guaranteed. IMS (IP Multimedia Subsystem) resolves this problem in perticular, which concluded on the basis of user profiles can provide the required quality of service. In the latest specifications of the Universal Mobile Telecommunication System (UMTS) networks, the 3GPP defines the IMS technology. That is why the multimedia sessions in the IMS are processed by a set of network elements originally designed to support IP multimedia services in the UMTS. The QoS mapping between IMS services and IP transport is fundamental for maintaining a suitable quality. The differentiation of these two technologies can lead to unpredictable and unwanted behavior for services. The possibility of employing DiffServ and IntServ mechanisms into the IMS environment in order to achieve full QoS support for real time applications is the object of interest.

(Voice over Internet Protocol), (IP Multimedia Subsystem), (UMTS), QoS, Networks, IMS, IP, DiffServ and IntServ


1.     3GPP. Technical Specification Group Services and System Aspects. Quality of Service (QoS) Concept and architecture. TS 23.107. 3rd Generation Partnership Project. December 2009.
2.     https://www.tutorialspoint.com/umts/ umts_cellular_concepts_mobility_management.htm

3.     http://www.radio-electronics.com/info/ cellulartelecomms/umts/umts_wcdma_tutorial.php

4.     https://web.cs.wpi.edu/~rek/Adv_Nets/ Spring2002/IntServ_DiffServ.pdf

5.     http://users.ece.utexas.edu/~ryerraballi/ MSB/pdfs/M5L4.pdf

6.     http://www.masoodkh.com/_files/projects/networks/HDIP-QoSinIMS/HDIP-QoSinIMS-Presentation.pdf

7.     http://paper.ijcsns.org/07_book/201005/ 20100527.pdf

8.     http://www.ijric.org/volumes/Vol13/ 1Vol13.pdf





Manish Kumar Rana, Hemant Narayan

Paper Title:

Hardening of Android Based Devices & Plugging the Common Vulnerabilities

Abstract:  Technology has developed at a fast pace in last two decades. With the paradigm shift in technology, it has changed the way humans think and simultaneously posed certain challenges to be dealt with in greater depth. While the earlier impetus was on having single window dispensation, however it is being seen that the single window will also not be required and people will have all digital clearence for any service or transaction. With advent of smart devices, the task has become rather simpler, however challenges of personal data safety and related cyber aspects acquires comparatively larger domain to deal with. This paper deals with hardening of ANDROID OS based communication devices by even a novice user. It attempts to throw light on genesis of ANDROID OS, the commonly known vulnerabilities, their threats and strengthening of these devices against hackers of comparable skills. The paper also attempts to touch as to how these ANDROID OS based communication devices, which are potential tools of being soft targets in cyber domain, can be technologically exploited.

 ANDROID OS, Technology, vulnerabilities, communication


1.     http://www.useoftechnology.com/ technological-advancements-effects-humanity/
2.     https://www.infosec.gov.hk/english/ yourself/vulnerability.html

3.     https://blog.lookout.com/stagefright

4.     https://www.pcauthority.com.au/ Feature/447215,10-ways-to-harden-the-security-on-your-android-phone.aspx

5.     https://www.slideshare.net/anupriti/ android-device-hardening

6.     https://www.shoutmeloud.com/top-mobile-os-overview.html





Mohammad Alizadeh, Mahyar Masoumi, Ehsan Ebrahim

Paper Title:

Closed Loop Speed Control of Induction Motor using Constant V/F Applying SPWM and SVM Based Inverter

Abstract:  inverter is a type of adjustable-speed drive used to control AC motor speed and torque. With advances in solid-state power electronic devices and microprocessors, various inverter control techniques employing pulse width modulation (PWM) are becoming increasingly popular in AC motor drive application. These PWM-based drives are used to control both the frequency and magnitude of the voltage applied to motors. This paper analysis the speed control system of Induction motor fed by voltage source Inverter with implementation of Proportional Integral (PI) controller in the feedback path utilizing constant volt per hertz ratio with two PWM techniques namely, sinusoidal PWM and Space vector PWM. Comparing the performance of SPWM and SVPWM based inverter has been analyzed in MATLAB/Simulink from the analysis of speed regulation, torque ripple and total harmonic distortion.

Inverter, Pulse Width Modulation (PWM), Closed Loop Control of Induction Motor, Constant V/F.


1.      M. S. Aspalli, D. Veerendra and P. V. Hunagund, “A New Generation VLSI Approach for V/F Control of Three-Phase Induction Motor”, IJCSI International Journal of Computer Science Issues, Special Issue, ICVCI-2011, Vol. 1, Issue 1, November 2011.
2.      S. Dam, A. Saha, P. K. Saha and G. K. Panda, “PID Controller Based Closed Loop Control of L- Matrix Based Induction Motor Using V/f Constant Method” Journal of Scientific Theory and Methods, Vol. 2012, pp. 1-21, 2012.

3.      S. V. Ustun and M. Demirtas, “Optimal Tuning of PI Coefficients by Using Fuzzy-Genetic for V/f Controlled Induction Motor”, Expert System with Application, vol. 34, no. 4, pp. 2714-2720, 2008.

4.      Goedtel, I. N. da Silva and P. J. A. Serni “Load Torque Identification in Induction Motor Using Neural Networks Technique”, Electric Power Systems Research, vol. 77, no. 1, pp. 35-45, 2007.

5.      W. Dazhi, T. Renyuan, J. Hui and Y. Jie, “Sensorless- Speed Control Strategy of Induction Motor Based on Artificial Neural Networks”, Fifth World Congress on Intelligent Control and Automation (WCICA), vol. 5, pp. 4467- 4471, 2004.

6.      B. Karanayil, M. F. Rahman and C. Grantham, “Online Stator and Rotor Resistance Estimation Scheme Using Artificial Neural Networks for Vector Controlled Speed Sensorless Induction Motor Drive”, IEEE Transactions on Industrial Electronics, vol.54, no.1, pp. 167-176, 2007.

7.      M. Suetake, I. N. da Silva and A. Goedtel, “Embedded DSP-Based Compact Fuzzy System and Its Application for Induction-Motor V/f Speed Control”, IEEE Transactions on Industrial Electronics, vol. 58 ,Issue 3, pp. 750–760, 2011.

8.      E. Bim, “Fuzzy Optimization for Rotor Constant Identification of an Indirect FOC Induction Motor Drive”, IEEE Transactions on Industrial Electronics, vol. 48, pp. 1293-1295, 2001.

9.      M. N. Uddin and W. Hao, “Development of a Self- Tuned Neuro-Fuzzy Controller for Induction Motor Drives”, IEEE Transaction on Industry Application, vol. 43, no. 4, pp. 1108-1116, 2007.

10.   M. N. Uddin, Z. R. Huang and M. I. Chy, “A Simplified Self- Tuned Neuro-Fuzzy Controller Based Speed Control of an Induction Motor Drive”, IEEE Power Engineering Society, General Meeting, pp.1- 8, 2007.

11.   M. S. Aspalli, R. Asha and P. V. Hunagund, “Three Phase Induction Motor Drive Using IGBTs and Constant V/F Method”, International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering, Vol. 1, Issue 5, November 2012.

12.   K. Devi, S. Gautam and D. Nagaria, “Speed Control of 3-Phase Induction Motor Using Self- Tuning Fuzzy PID Controller and Conventional PID Controller”, International Journal of Information & Computation Technology, ISSN 0974-2239, Vol. 4, no. 12, pp. 1185-1193, 2014.

13.   S. Senthilkumar and S. Vijayan, “Simulation of High Performance PID Controller for Induction Motor Speed Control with Mathematical Modeling”, Research Journal of Applied Sciences, Engineering and Technology, October 2013.

14.   S. Senthilkumar and S. Vijayan, “Fuzzy Based Speed Control of Three Phase Induction Motor’, International Journal of Engineering Science and Innovative Technology (IJESIT), Vol. 2, Issue 6, November 2013.

15.   J. Kriauciunas, R. Rinkeviciene and A. Baskys, “Self-Tuning Speed Controller of the Induction Motor Drive’ Elektronika IR Elektrotechnika, ISSN 1392–1215, Vol. 20, no. 6, 2014.

16.   P.Elangovan, Dr.C.Kumar, V.Suresh,” Space Vector Modulation based Speed Control of Induction Motor Fed by Z-Source Inverter using PI controller”,The International Journal of Engineering And Science (IJES), Volume2, Issue 2, Pages 130-137, 2013

17.   P. Tripura, Y. S. K. Babu and Y. R. Tagore, “Space Vector Pulse Width Modulation Schemes for Two-Level Voltage Source Inverter’, ACEEE Int. J. on Control System and Instrumentation, Vol. 02, No. 03, October 2011.

18.   R. L. Swamy and P. S. Kumar, “Speed Control of Space Vector Modulated Inverter Driven Induction Motor”, Proceedings of the International Multi Conference of Engineers and Computer Scientists, Vol. 2, 2008.   





Gomathi R, Rajeeva S.J, Sharada S A, G. Narayana

Paper Title:

Design, Planning, Scheduling and Resource Allocation for Slaughter House

Abstract: This paper deals with the structural Design, Planning, Scheduling and Resource allocation of a proposed slaughter house in Chamarajanagar. It contains analysis, design of the slabs, columns, beams, footing, staircase, Planning, Scheduling and Resource allocation for the project phases of slaughterhouse. Keeping in view the requirement and utilities of the structure dead load and live load have been considered for the analysis and design of the structure. The planning details for the project will be given by experts by comparing previous projects. The dead load, live load and load combination is taken according to IS 875-1893(part 1), IS 875-1893(part 2) and IS 875-1893(part 5) respectively. The design of structural members like slab, beam, column, footing and staircase is carried out as per IS 456-2000. Design and analysis is carried out by a Design and Analysis software i.e STAAD PRO. The Planning, scheduling and Resource allocation for the slaughter house is done to complete the project economically on time by using the Microsoft project software. Scheduling helps to find out the critical path in the project which will help to start the work earlier or find out the alternate solution to avoid the critical path.

 Design, Planning, Scheduling, Resource location.


2.      Rhuta Joshi, Prof. V. Z. Patil “RESOURCE SCHEDULING OF CONSTRUCTION PROJECT: CASE STUDY” IJSR volume 5 Issue 5 May 2015.

3.      Sneha M. Raut, Sumit B. Bhosale, Chetan D. Patil, Aniket R. Pawar,Ganesh D. Dhone “PLANNING AND SCHEDULING USING MSP” International Engineering Research Journal (IERJ) Volume 2 Issue 3 Page 1359-1362, 2016.

4.      Aman, Manjunath Nalwadgi , Vishal T, Gajendra “ANALYSIS AND DESIGN OF MULTISTORAGE BUILDING USING STADD PRO” International Research Journal of Engineering and Technology (IRJET) Volume: 03 Issue: 06  June-2016.

5.      Anoop .A, Fousiya Hussian, Neeraja.R, Rahul Chandran, Shabina.S, Varsha.S Anajali A “Planning Analysis And Design Of Multi Storied Building Using Staad Pro” International Journal of Scientific & Engineering Research, Volume 7, Issue 4, April-2016.

6.      IS 456:2000, “Reinforced and Plain Concrete” Code of Practice, ISI New Delhi 2000.

7.      IS 875 part 1, “Code of Practice for Design Loads (Other than Earthquake) for Building and Structures, Dead Loads” BIS New Delhi 1987.

8.      IS 875 part 2, “Code of Practice for Design Loads (Other than Earthquake) for Building and Structures, Imposed Loads” BIS New Delhi 1987.

9.      IS 875 part 5, “Code of Practice for Design Loads (Other than Earthquake) for Building and Structures, Special Load and Load Combination” BIS New Delhi 1987.





Nadra J. Ali AL-Saad

Paper Title:

Design Robust Data Integrity Scheme in Cloud Computing Based on Image Histogram and Crypto-Hash Function

Abstract:  Cloud technologies are revolution in computing world which support on demand access to several virtualized customers and servers which are existed outside of data owner's center. In this computing model, the databases and applications of data owners are arise to the unified large data centers and may be lead to many security issues in the management of data and services. Preserving the secrecy and reliability of the message communicated between the main elements of Cloud considers one of the significant aims of Message Authentication Code (MAC). In this paper, we propose a robust scheme based on image histogram and Crypto-hash function to check the integrity of data message between sender and receiver. This scheme is selected the pixels that located in top peak of histogram to generate more efficient message capacity. As well as, our proposed scheme includes many security features such as resisting the well-known attacks, user's message anonymity, session key agreement, and data integrity for user's message. The security analysis proves that the proposed scheme can resist the public security malicious attacks such as Insider attacks, key recovery attack. Finally, our scheme is efficient in terms of performance.

 Cloud Computing, MAC, Insider attack, MAC, Histogram.


1.         S. Singha,  Y-S Jeongb,  J. Park, A survey on cloud computing security: Issues, threats, and solutions, Journal of Network and Computer Applications, Volume 75, 2016, pp. 200–222.
2.         S. Subashini, V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, Vol. 34, no.1, pp. 1-11, 2011.

3.         Ali. A. Yassin, H. Jin, A. Ibrahim, W. Qiang, D. Zou, ”A Practical privacy preserving Password authentication Scheme for Cloud Computing”, Proc. of the IEEE 26th International Parallel and Distributed Processing Symposium Workshops & PhD Forum (IPDPSW’12), May 2012, Shanghai, China, pp.1204-1211.

4.         Ali A.Yassin, H. Jin, A. Ibrahim, D. Zou, Anonymous Password Authentication Scheme by Using Digital Signature and Fingerprint in Cloud Computing, Proc. Of the IEEE Second International Conference on Cloud and Green Computing (CGC'12), Nov. 2012, Chain, pp. 282-289.

5.         R.L. Rivest. The MD message digest algorithm, In S. Vanstone, editor, Advances in Cryptology - CRYPTO' 10, LNCS 5 , pp. 0 - 11, 2011.

6.         Zaid A. Abduljabbar, H. Jin; Ali A. Yassin; Zaid A. Hussien; Mohammed A. Hussain; Salah H. Abbdal; D. Zou, Robust scheme to protect authentication code of message/image documents in cloud computing

7.         International Conference on Computing, Networking and Communications (ICNC'16), Feb. 2016, USA, pp. 1-5.

8.         Swaminathan, Y. and M. Wu, ―Robust and secure image hashing,‖ IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 215-229, 2006.

9.         N. Rabadi and S. Mahmud, ―Drivers‘ anonymity with a short message length for vehicle-to-vehicle communications network,‖ Proceedings of the Fifth IEEE Consumer Communications and Networking Conference (CCNC‘08), Las Vegas, NV, USA, IEEE, pp. 132-133, Jan. 2008.

10.      N. Jamil and A. Aziz, ―A Unified Approach to Secure and Robust Hashing Scheme for Image and Video Authentication, Proceedings of Third IEEE International Congress on Image and Signal Processing (CISP), Yantai, China, pp. 274-278, 2010.

11.      R. Sobti1 , G. Geetha, Cryptographic Hash Functions: A Review, IJCSI, vol.9, No. 2, pp. 461-479, 2012.

12.      R. Singh, M. Dixit, Histogram Equalization: A Strong Technique for Image Enhancement, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.8 (2015), pp.345-352.





Bhagyashree Marathe, S. S. Khule

Paper Title:

Design of Solar Water Pumping System with FCMA Soft Starter

Abstract: This paper presents a novel stand-alone solar powered water pumping system, especially suited for usage in rural or remote areas. In this scheme, inverter drives the induction motor, which drives the water pump. Moreover, the starting ability of an induction motor becomes quite poor due to the drop in the system voltage when the motor starts. For these reason, overall efficiency of an induction motor based drive systems supplied by a PV array is lower. To obtain maximum output power of the solar panel, the inverter is operated at soft start to minimize starting current of motor by using FCMA technology. The use of FCMA helps in variable speed controls, increasing the life of components and reducing the capital cost & maintenance. It also assists in enhancing motor efficiency.

  FCMA, Induction Motor, Photovoltaic, Solar Pump, Soft Start.


1.      P Sadasivam, M Kumaravel, Krishna Vasudevan and Ashok Jhunjhunwala, “Analysis of Subsystems Behaviour and Performance Evaluation of Solar Photovoltaic Powered Water Pumping System,” IEEE transaction paper – 2013
2.      Rayyan Azam Khan, Liaquat Ali Khan, Syed Zahid Hussain, “Design and Simulation of 0.75hp Soft Start AC Water Pump Powered by PV Solar System,” Universal Journal of Mechanical Engineering 3(4): 113-121, 2015

3.      Geet Jain, Arun Shankar V.K., Umashankar S, “Modelling and Simulation of Solar Photovoltaic fed Induction Motor for Water Pumping Application using Perturb and Observer MPPT Algorithm,” IEEE transaction paper – 2016.

4.      Mikhail Tsypkin, “Vibration of Induction Motors Operating with Variable Frequency Drives - a Practical Experience,” IEEE 28-th Convention of Electrical and Electronics Engineers in Israel-2014.

5.      Flavio Palmiro, Joao Onofre Pereira Pinto, Lucio Henrique Pereira, Ruben Barros Godoy, “Cost Effective Photovoltaic Water Pumping System for Remote Regions Communities,” IEEE Transactions-2016.

6.      A.Betka, A.Moussi, “Optimized Solar Water Pumping System Based On Induction Motor Driving Centrifugal Pump,” IEEE Transactions On Industry Applications, Nov-2001.

7.      Y.Yao, P.Bustamante, R.S.Ramshaw, “Improvement of Induction Motor Drive Systems Supplied By Photovoltaic Arrays With Frequency Control,” IEEE Transactions Energy Conversion, Vol.9, No. 2, June- 1994.

8.      S.R.Bhat, Andre Pittet, B.S.Sonde, “Performance Optimization of Induction Motor Pump System Using Photovoltaic Energy Source,” IEEE Transactions On Industry
Applications, Vol. IA-23, Nov-1987.

9.      Eduard Muljadi, Roger Taylor, “PV Water Pumping With Peak Power Tracker Using Simple Six Step Square Wave Inverter,” IEEE Transactions Energy Conversion, Nov-1996





Rahul Maheshwari, Vivek Kapoor, Sandeep Verma

Paper Title:

An Improved Classifier Technique for Spam Filtering

Abstract:  Email spam or junk e-mail (unwanted e-mail “usually of a commercial nature sent out in bulk”) is one of the major problems of the today's Internet, bringing financial damage to companies and annoying individual users. There are various approaches developed to stop spam, filtering is an important and popular one. Spam or unsolicited e-mail has become a major problem for companies and private users. This paper explores the problems associated with spam and some different approaches attempting to deal with it. Since spam is a major issue for web world thus the most appealing methods are those that are easy to maintain and prove to have a satisfactory performance. A learning algorithm which uses the Naive Bayesian classifier has shown promising results in separating spam from legitimate mail. There are various initial steps involved in spam classifier like Tokenization, probability estimation and feature selection are processes performed prior to classification and all have a significant influence upon the performance of spam filtering. The main objective of this work is to examine and empirically test the currently known techniques used for each of these processes and to investigate the possibilities for improving the Bayesian classifier performance. There are many different approaches available at present attempting to solve the spam issue. One of the most promising methods for filtering spam with regards to performance and ease of implementation is that of Naive Bayesian classifier. The objective of this paper is to explore the statistical filter called Naive Bayesian classifier and to investigate the possibilities for improving its performance.

  E-mail classification, Spam, Spam filtering, Machine learning, algorithms.

1.      Aladdin Knowledge Systems, Anti-spam white paper,www.csisoft.com/security/aladdin/esafe_antispam_whitepaper.pdf Retrieved December 28, 2011.
2.      F. Smadja, H. Tumblin, "Automatic spam detection as a text classification task", in: Proc. of Workshop on Operational Text Classification Systems, 2002.

3.      Hassanien, H. Al-Qaheri, "Machine Learning in Spam Management", IEEE TRANS., VOL. X, NO. X, FEB.2009

4.      P. Cunningham, N. Nowlan, "A Case-Based Approach to Spam Filtering that Can Track Concept Drift", [Online]Available:https://www.cs.tcd.ie/publications/techreports/reports.03/TCD-CS-2003-16.pdf RetrievedDecember 28, 2011

5.      F. Roli, G. Fumera, "The emerging role of visual pattern recognition in spam filtering: challenge and opportunity forIAPRresearchers" http://www.iapr.org/members/newsletter/Newsletter07-02/index_files/Page465.htm Retrieved December 28, 2011

6.      H. West, "Getting it Wrong: Corporate America Spams the Afterlife". Clueless Mailers. (January 19, 2008).

7.      Parizo, "Image spam paints a troubling picture". Search Security. (2006-07-26)
8.      Symantec (2011) VBS.Davinia.B, [Online] Available: http://www.symantec.com/security_response/writeup.jsp?docid=2001-020713-3220-99 Retrieved December 28, 2011

9.      Androutsopoulos, J. Koutsias, "An evaluation of naïve bayesian anti-spam filtering". In Proceedings of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000), pages 9–17, Barcelona, Spain, 2000.

10.   Androutsopoulos, G. Paliouras, "Learning to filter spamE-mail: A comparison of a naïve bayesian and a memorybasedapproach". In Proceedings of the Workshop on Machine Learning and Textual Information Access, 4thEuropean Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD 2000), pages 1–13, Lyon, France, 2000.

11.   J. Hidalgo, "Evaluating cost-sensitive unsolicited bulk email categorization". In Proceedings of SAC-02, 17th ACM Symposium on Applied Computing, pages 615–620, Madrid, ES, 2002.

12.   K. Schneider, "A comparison of event models for naïve bayes anti-spam e-mail filtering". In Proceedings of the 10thConference of the European Chapter of the Association for Computational Linguistics, 2003.

13.   Witten, E. Frank, "Data Mining: Practical MachineLearning Tools and Techniques with Java Implementations".Morgan Kaufmann, 2000.

14.   N. Cristianini, B. Schoelkopf, "Support vector machines and kernel methods, the new generation of learning machines". Artificial Intelligence Magazine,23(3):31–41, 2002

15.   V. Vapnik, "The Nature of Statistical Learning Theory, Springer; 2 edition (December 14, 1998)

16.   S. Amari, S. Wu, "Improving support vector machine classifiers by modifying kernel functions". Neural Networks, 12, 783– 789. (1999).
17.   Miller, "Neural Network-based Antispam Heuristics" ,Symantec Enterprise Security (2011), www.symantec.com Retrieved December 28, 2011
18.   Wu, "Behavior-based spam detection using a hybrid method of rule-based techniques and neural networks" ,Expert Syst., 2009

19.   A review of machine learning approaches to spam filtering. Thiago S Guzella, Walmir M.  Caminhas.





Sunil Kumar Singh, Manshree Mishra, Mahaveer Prasad Sharma, Prahlad Kumar Rahul, Deepti Thakur

Paper Title:

Single Layered Planar Monopole Antenna for High Frequency Applications

Abstract: In recent years, the most sought after topic in antenna theory and design is the planar monopole antenna and are progressively finding large application in modern microwave system. This  paper start with the theoretical explanation of the planar monopole antenna and then focus on the most significant evolution in the planar monopole antenna technology that have been made in the last few year. Emphasis is made on the antenna parameter enhancement technique.

Bandwidth, Microstrip Feed Line, Planar Monopole  Antenna, Ultra Wideband.


1.      Lodge, “Electric Telegraphy,” U.S. Patent 609,154 (August 16, 1898).
2.      P.S. Carter, “Short Wave Antenna,” U.S. Patent 2,175,252 (October 10, 1939).

3.      P.S. Carter, “Wide Band, Short Wave Antenna and Transmission Line System,” U.S. Patent 2,181,870   (December 5, 1939).

4.      Broadband Micro strip Antennas By Artech House

5.      Honda, S., Ito M., Seki H., and Jingo Y., “A Disc Monopole Antenna with 1:8 Impedance Bandwidth and Omnidirectional Radiation Pattern,” Proc. ISAP, Sapporo,
Japan, 1992, pp. 1145-1148.

6.      Hammoud, Poey P., and Colomel F., “Matching the Input Impedance of a Broadband Disc Monopole,” Electronics Letters, Vol. 29, Feb. 1993, pp. 406-407.

7.      Agarwall, N. P., Kumar G., and Ray K. P., “Wide-Band Planar Monopole Antennas,” IEEE Trans. Antennas Propagation, Vol. 46, No. 2, 1998, pp. 294-295.

8.      Ray, K. P., Anob P. V., Kapur R., and Kumar G., “Broadband Planar Rectangular Monopole Antennas,” Microwave Optical Tech. Letters, Vol. 28, No. 1, 2001, pp. 55-59.

9.      Amirah Filzah Mat Zaida, Low Ching Yub and Muhammad Ramlee Kamarudin, “CPW Fed WLAN Monopole Antenna with Gain Improvement”, Procedia Computer Science 86 ( 2016 ) 23 – 26

10.   Agarwal, A., Singhal, P. K., Ojha, S. S., & Gupta, A. K. (2013). Design of CPW-fed Printed Rectangular Monopole Antenna for Wideband Dual-Frequency Applications. International Journal of Innovation and Applied Studies, 3(3), 758-764.

11.   Amit A. Deshmukh., Payal Mohadikar., Kshitij Lele., Gaurav Panchal., Adil Parvez., “Psi-shaped Ultra-  wideband Monopole Antenna with a Modified Feeding Structure”, Procedia Computer Science 93 ( 2016 ) 60 – 66.

12.   DAVID M. POZAR,“ Microstrip Antennas,” IEEE, VOL. 80, NO 1, JANUARY 1992.

13.   Ojaroudi, M., Yazdanifard, S., Ojaroudi, N., Naser-Moghaddasi, M., 2011. Small square monopole antenna with enhanced bandwidth by using inverted T-shaped slot and conductor-backed plane. IEEE Trans. Antennas Propag. 59 (2), 670–674.

14.   Chen, K.-R., Chow-Yen-Desmond, S., Jeen-sheen, R., 2011. A compact monopole antenna for super wideband applications. IEEE Antennas Wirel. Propag. Lett. 10, 488–491.

15.   Rahayu, Y., Razali, N., Tharek, R., 2010. Various slotted UWB antenna design. In: 6th International Conference on Wireless and Mobile Communications, pp. 107–110.

16.   Noor M. Awad ., Mohamed K. Abdelazeez.,“ Multislot microstrip antenna for ultra-wide band applications”, Journal of King Saud University – Engineering Sciences (2016)

17.   Y. Chen, W. T. Joines, Z. Xie ,G. Shi, Q. H. Liu, and L. Carin “Double-Sided Exponentially Tapered GPR Antenna and Its Transmission  Line Feed Structure,” IEEE  Trans. Antenna Propagat.,vol. 54, no. 9, pp. 2615-2623,Sep. 2006.

18.   S. P. Mathur, and A. K. Sinha, “Design of microstrip exponentially tapered lines to match helical antenna to standared coaxial transmission lines,” IEE Proc. Microw. Antenna and Propag., vol. 135, no. 4, pp. 272-274,1988.

19.   D. Raicu, “Universal Taper for Compensation of Step Discontinuities in Microstrip Lines,” IEEE Trans. Antenna Propagat., vol. 1, no.9, pp. 249-251,Sep. 1991.

20.   D. M. Pozar, Microwave Engineering, John Wiley & Sons,2005.

21.   R. S. Kshetrimayum, and R. Pillalamarri,“ Novel UWB printed monopole antenna with triangular tapered feed lines ,”IEICE Electronics Express (ELEX), vol. 5, no. 8, pp. 242-247, April 25,2008.

22.   M. Manohar, R. S. Kshetrimayum and A. K. Gogoi, Printed Monopole Antenna with Tapered Feed Line, Feed Region and Patch for Super   Wideband Application, accepted for publication in IET Microwaves,   Antenna and Propagation.

23.   Q. Wu, R. Jin, J. Geng, and M. Ding, “Printed omni-directional UWB monopole antenna with very compact size,” IEEE Trans. Antenna Propag., vol. 56, no. 3, pp. 896-899, Mar. 2008.

24.   Naffall Herscovici and Christos Christodouloc , “Wideband monopole antennas for multi-band wireless systems” IEEE Antennas and Propagation Magazine , Vol. 45, No.2, April 2003.

25.   Wong, K.L., Lin, Y.F., 1998. Microstrip-line-feed compact broadband circular microstrip antenna with chip-resistor loading. Microwave and Optical Technology Letters 17, 53–55.

26.   Alkanhal, Majeed, 2005. A new multi-band antenna for GSM/DCS/ GPS   systems. Final Research Report No. 425/7. King Saud University, College of Engineering, Research center.

27.   Khobragade, S.V., Talbar, S.N., 2004. Bandwidth enhancement using loading technique and comparison between square microstrip antenna. URSI EMTS, 576–578.

28.   Mohammed A.I. Haj-Ahmed ., Mohammed K. Abedelazeez.,“ Design of a multi-band loop antenna for wireless communications: Simulation and analysis”, Journal of King Saud University – Engineering Sciences (2011) 23, 67–73.

29.   Yeom, I., Kim, J. M., & Jung, C. W. (2014). Dual-band slot-coupled patch antenna with broad bandwidth and high directivity for WLAN access point.Electronics Letters, 50(10), 726-728.

30.   Jeemon BK, Shambavi K and Alex ZC. Design and analysis of a multi-fractal antenna for UWB application. IEEE International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN); 2013. p. 644-647.

31.   Gouyet JF. Physics and Fractal Structures. Paris: Springer; 1996.

32.   Werner DH, Haupt RL, Werner PL. Fractal antenna engineering: The theory and design of fractal antenna arrays. IEEE Antennas and Propagation Magazine 1999; 41(5): 37 - 58.

33.   Lincy BH, Srinivasan A and Rajalakshmi B. Wideband fractal microstrip antenna for wireless applications. Proceedings of 2013 IEEE Conference on Information and Communication Technologies (ICT 2013); 2013. p. 735-738.

34.   Khorramian M, Zakeri B and Ebrahimzadeh A. Design and analysis of a multiband sierpinski type monopole fractal antenna. 21st Telecommunications Forum TELFOR; 2013. p. 675-677.

35.   Li DT and Mao JF. Koch like sided sierpinski gasket multifractal dipole antenna. Progress in Electromagnetics Research; 2012. p. 399-427.

36.   Gurpreet Bhartia, Sumeet Bhatia, Jagtar Singh Sivia (supervisor),“ Analysis and Design of Triple Band Compact Microstrip Patch Antenna with Fractal Elements for Wireless Applications”, Procedia Computer Science 85 ( 2016 ) 380 – 385.

37.   M. Ali. Dorostkar, R. Azim, M. T. Islam,“ A Novel  -shape Fractal Antenna for Wideband Communications”, Procedia Technology 11 ( 2013 ) 1285 – 1291.

38.   Jolly Rajendran, Rakesh Peter, K.P. Soman,“ Design of Trapezoidal Monopole Antenna with truncated ground plane for 2.5 GHz Band,” Procedia Technology 6 ( 2012 ) 650 – 657.

39.   Cohen N. Fractal antennas and fractal resonators; 2008.

40.   Reddy VV, Sarma NVSN. Triband circularly polarized Koch fractal boundary microstrip antenna. IEEE Antennas Propag Lett 2014; 13:1057–60.

41.   Orazi H, Soleimani H. Miniaturization of the triangular patch antenna by the novel dual-reverse-arrow fractal. IET Microwaves Antennas Propag 2014:1–7.

42.   Sundaram S, Maddela M, Ramadoss R. Koch-fractal folded-slot antenna characteristics. IEEE Antennas Wirel Propag Lett 2007; 6:219–22.

43.   Pantoja MF, Ruiz FG, Bretones AR, Martin RG, Arbesu JMG, Romeu J. GA design of wire pre-fractal antennas and comparison with other Euclidean geometries. IEEE Antennas Wirel Propag Lett 2003; 2:238–41.

44.   C. F. Jou, J. W. Wu, and C. J. Wang, “Novel broadband monopole antennas with dual-band circular polarization,” IEEE Trans. Antennas Propag., vol. 57, no. 4, pp. 1027–1034, Apr. 2009.

45.   K. R. Carver and J. W. Mink, “Microstrip antenna technology,” IEEE Trans. Antennas Propag., vol. AP-29, pp. 2-24, Jan. 1981.

46.   J. R.James and P. S. Hall, Handbook of Microstrip Antennas. London, U.K.: Peter Peregrinus, 1989.

47.   T. Teshirogi, M. Tanaka, and W. Chujo, “Wideband circularly polarized array antenna with sequential rotations and phase shift of elements,” in Proc. Int. Symp. on Antennas and Propagation, Japan, pp. 117-120, 1985.

48.   P. S. Hall, J. Huang, E. Rammos, and A. Roederer, “Gain of circularly polarized arrays composed of linearly polarized elements,” Electron. Lett., vol. 25, pp. 124-125, Jan. 1989.

49.   C. J. Wang and K. L. Hsiao, “CPW-fed monopole antenna for multiple system integration,” IEEE Trans. Antennas Propag., vol. 62, no. 2, pp. 1007–1011, Feb. 2014.

50.   L. Zhang, Y. C. Jiao, Y. Ding, B. Chen, and Z. B. Weng, “CPW-fed broadband circularly polarized planar monopole antenna with improved ground-plane structure,” IEEE Trans. Antennas Propag., vol. 61, no. 9, pp. 4824–4828, Sep. 2013.

51.   S.A. Rezaeieh, “Dual band dual sense circularly polarized monopole antenna for GPS and WLAN applications,” Electron. Lett., vol. 47, no. 22, pp. 1212–1214, Oct. 2011.

52.   J.G. Beak, and K. C. H wang, “Triple-band unidirectional circularly polarized hexagonal slot antenna with multiple l-shaped slits,” IEEE Trans. Antennas Propag., vol. 61, no. 9, pp. 4831–4835, Sep. 2013.

53.   J. H. Lu, and C. W. Liou, “Planar dual-band circular polarization monopole antenna for wireless local area networks,” IEEE Antennas Wireless Propag. Lett., vol. 14, pp. 478–481, 2015.

54.   T. V. Hoang, T. T. Le, Q. Y. Li, and H. C. Park, “Quad-band circularly polarized antenna for 2.4/5.3/5.8-GHz WLAN and 3.5-GHz WiMAX applications,” IEEE Antennas Wireless Propag. Lett., vol. 15, pp. 1032–1035, 2016.

55.   Ming-Tao Tan and Bing-Zhong Wang,“A Dual-Band Circularly Polarized Planar Monopole Antenna for WLAN/Wi-Fi Applications,” IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, VOL. 15, 2016.

56.   C. A. Balanis, "Antenna theory", 3rd edition. Foudazi, H. R. Hassani, A. Frotanpour,“ A Novel Broadband Circularly Polarized Printed Monopole Antenna,” 14-15 November 2011, Loughborough, UK.

57.   Do-Hoon Kwon,“ Effect of Antenna Gain and Group Delay Variations on Pulse-Preserving Capabilities of Ultrawideband Antennas,” IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 54, NO. 8, AUGUST 2006.

58.   D. M. Pozar, “Waveform optimizations for ultrawideband radio systems,” IEEE Trans. Antennas Propag., vol. 51, no. 9, pp. 2335–2345, Sept. 2003.

59.   Gabriela Quintero, J.-F. Zürcher, and Anja K. Skrivervik,“ System     Fidelity Factor: A New Method for Comparing UWB Antennas,” IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 59, NO. 7, JULY 2011.





Suresh M. B, B Mohankumar Naik

Paper Title:

Content Based Image Retrieval (CBIR) Using Color, Shape and Texture Features of Image

Abstract:  Content-based image retrieval (CBIR), as we see it today, is any technology that in principle helps organize digital picture archives by their visual content. The increased need of content based image retrieval technique can be found in a number of different domains The such as Agriculture, Data Mining, Research laboratories, Medical Field, Crime Prevention, Weather department , and Management of Earth Resources. Image retrieval based on different components has strong research scope. In this paper we present some technical details about the components used for the retrieval of images and algorithm are also defined for retrieval of images by using the components i.e. color, texture and shape information, and achieve higher retrieval efficiency using dominant color feature.

 CBIR, Retrieval, color, texture, shape


1.   Chih-Chin Lai, Member, IEEE, and Ying-Chuan Chen,” A User-Oriented Image Retrieval System Based on Interactive Genetic Algorithm”, IEEE transactions on instrumentation and measurement, vol. 60, no. 10, october 2011.
2.   Content Based Image Retrieval by Baby Manjusha P. Department of Computer Science and Technology Cochin University KOCHI-682022, 2010

3.   Beginners to Content Based Image Retrieval by Swapnalini Pattanaik, D.G.Bhalke in the International Journal of Scientific Research Engineering &Technology (IJSRET) Volume 1 Issue2 pp 040-044 May 2012

4.   Efficient Global and Region Content Based Image Retrieval by Ibrahim S. I. Abuhaiba, Ruba A. A. Salamah in

5.   the I.J. Image, Graphics and Signal Processing, 2012, 5, 38-46 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijigsp.2012.05.05.

6.   Content-Based Image Retrieval using Color Moment and Gabor Texture Feature by S. Mangijao Singh , K. Hemachandran Department of Computer Science, Assam University, Silchar, Assam, India in the IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 5, No 1, September 2012 ISSN (Online): 1694-0814

7.   A.Kannan, Dr.V.Mohan, Dr.N.Anbazhagan “Image Clustering and Retrieval using Image Mining Techniques” 2010 IEEE Conference

8.   Sharadh Ramaswamy and Kenneth Rose, Fellow, IEEE “Towards Optimal Indexing for Relevance Feedback in Large Image Databases” IEEE transaction on Image Processing. December 2009.

9.   B. S. Manjunath, Member, IEEE, Jens-Rainer Ohm, Member, IEEE, Vinod V. Vasudevan, Member, IEEE, and Akio Yamada,” Color and Texture Descriptors” IEEE Transactions on circuits and systems for video technology, vol.11,no6,June2001





Ehtesham Patel

Paper Title:

Conservation of Heritage Sites in India

Abstract: India is a country with a rich stock of heritage sites. This paper highlights the laws which are responsible for the conservation of heritage sites and monuments. These include those issued by the center and those issued by the different states. Guidelines used to declare a site as a heritage site have also been accentuated. Since India has many monuments and heritage sites, the need to conserve them has become imperative as these buildings carry archaeological, historical and artistic value. To conserve the heritage sites, different techniques are employed under the supervision of dedicated experts. However, the process of conservation and preservation of heritage sites is not just limited to scientific and engineering methods; the social dimension of conservation also needs to be addressed.

 India, stock, methods; addressed.


1.        Addl. Director General (Archaeology) – Central Public Works Department, Conservation of Heritage Buildings – A Guide, 2013, Falcon Graphics.
2.        Comptroller and Auditor General of India, Performance Audit of Preservation and Conservation of Monuments and Antiquities, 2013.

3.        Menon Arun, Heritage Conservation in India: Challenges and Newer Paradigms - F. Peña & M. Chávez (eds.), SAHC2014 – 9th International Conference on Structural Analysis of Historical Constructions, 2001.

4.        Singh G.M., Chemical Conservation of Monuments.

5.        Sridar T.S. & Narayanan T.R., Deterioration of Monuments and their Preservation.

6.        http://www.livelaw.in/legal-aspects-heritage-india/

7.        http://www.nma.gov.in:8080/heritage-bye-laws#_

8.        http://www.unesco.org/culture/natlaws/media/pdf/india/inde_act24_1958_enorof

9.        http://asi.nic.in/asi_mission_legislations.asp

10.     https://www.youthkiawaaz.com/2011/03/how-to-protect-national-heritage/

11.     http://asi.nic.in/asi_cons_prev.asp

12.     http://www.mgsarchitecture.in/articles/others/1007-preserving-our-past-for-the-future-historical-monuments-heritage-sites.html  





Kamal Grover

Paper Title:

Comparison of Application Protocols for Resource Constrained Devices and WSN

Abstract:  This paper explains the need for the application protocols needed for wireless sensor network. It explains and compares MQTT and CoAP based on different attributes like architecture, reliability, packet delay, security, quality of service and fragmentation. Finally, it’s concluded that choice of protocol is dependent on type service they perform

  Application, Protocols, Wireless


1.         Olivier Deschambault*, Abdelouahed Gherbi*, and Christian Lgar, “Efficient implementation of the mqtt protocol for embedded systems,” Journal of Information Processing Systems, vol. 13, pp. 28–39, Feburary 2017.
2.         Mqtt version 3.1.1. [Online]. Available: http://docs.oasis-open.org/mqtt/mqtt/v3.1.1/os/mqtt-v3.1.1-os.pdf

3.         D. Thangavel, X. Ma, A. Valera, H. X. Tan, and C. K. Y. Tan, “Performance evaluation of mqtt and coap via a common middleware,” in 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), April 2014, pp.1–6.

4.         Mqtt                version    3.1.1.       [Online].  Available: https://tools.ietf.org/html/rfc7252

5.         B. C. Villaverde, D. Pesch, R. D. P. Alberola, S. Fedor, and M. Boubekeur, “Constrained application protocol for low power em-bedded networks: A survey,” in 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, July 2012, pp. 702–707.

6.         W. Colitti, K. Steenhaut, N. D. Caro, B. Buta, and V. Dobrota, “Evaluation of constrained application protocol for wireless sensor networks,” in 2011 18th IEEE Workshop on Local Metropolitan Area Networks (LANMAN), Oct 2011, pp. 1–6.

7.         C. Bormann, A. P. Castellani, and Z. Shelby, “Coap: An application protocol for billions of tiny internet nodes,” IEEE Internet Computing, vol. 16, no. 2, pp. 62–67, March 2012.

8.         S. Behnel, L. Fiege, and G. Muhl, “On quality-of-service and publish-subscribe,” in 26th IEEE International Conference on Distributed Com-puting Systems
Workshops (ICDCSW’06), July 2006, pp. 20–20.

9.         U. Hunkeler, H. L. Truong, and A. Stanford-Clark, “Mqtt-s x2014; a publish/subscribe protocol for wireless sensor networks,” in Communication Systems Software and Middleware and Workshops, 2008. COMSWARE 2008. 3rd International Conference on, Jan 2008, pp. 791– 798.

10.      N. D. Caro, W. Colitti, K. Steenhaut, G. Mangino, and G. Reali, “Comparison of two lightweight protocols for smartphone-based sensing,” in 2013 IEEE 20th Symposium on Communications and Vehicular Technology in the Benelux (SCVT), Nov 2013, pp. 1–6.

11.      S. Lee, H. Kim, D. k. Hong, and H. Ju, “Correlation analysis of mqtt loss and delay according to qos level,” in The International Conference on Information Networking 2013 (ICOIN), Jan 2013, pp. 714–717.

12.      M. Singh, M. A. Rajan, V. L. Shivraj, and P. Balamuralidhar, “Secure mqtt for internet of things (iot),” in 2015 Fifth International Conference on Communication Systems and Network Technologies, April 2015, pp. 746–751.

13.      Capossele, V. Cervo, G. D. Cicco, and C. Petrioli, “Security as a coap resource: An optimized dtls implementation for the iot,” in 2015 IEEE International Conference on Communications (ICC), June 2015, pp. 549–554.





Sukanya. K, G. Laxminarayana

Paper Title:

A Mesoporous Pipelining Scheme for High Performance Digital Systems using Asynchronous Cache

Abstract: To relate the increasing behavior of processor and main memory in economical manner, new cache designs and implementations are essential. Cache is liable for themain part of energy consumption. This paper presents an implementation of mesochronous pipelined scheme for high performance digital circuit using asynchronouscache. As a result of the real fact that design of cache memory is time consuming and error prone manner, configurable and synthesizable model generates a particular variety of caches in reproducible and speedy fashion. The mesochronous pipelined cache, implemented by C-Elements which act as a disseminated message passing system. The RTL cache model is implemented in 8×8 multiplier circuit in this paper contains large amount of data and instruction caches and it has a wide array of configurable parameters. Finally, the proposed model produces low delay, reduced area and low power consumption compared to the existing 8 bit multiplication process.

Mesochronous pipelined, asynchronous cache, delay, area, power consumption, 8 bit multiplier, RTL model


1.      Anderson, J., Najm, F., 2004. Power Estimation Techniques for FPGAs. VLSI Syst. 12 (10), 1015–1027.
2.      T. Gray, W. Liu, and R. K. Cavin, 1994.Timing Constraints for Wavepipelined Systems,IEEE Trans. Computer-Aided Design, 13(8), 987 – 1004.

3.      E. Duarte, N. Vijaykrishnan, and M. J. Irwin, 2002.A Clock Power Models to Evaluate Impact of Architectural and Technology Optimizations,IEEE Trans. on VLSI Syst., 10 (6), 844 – 855.

4.      G. Friedman, 2001. Clock Distribution Networks in Synchronous Digital Integrated Circuits,Proc. IEEE, 89(5), 665 – 692.

5.      J. M. Rabaey, A. Chandrakasan, and B. Nikolic, 2002. Digital Integrated Circuits, 2nd ed., Upper Saddle River: NJ, Prentice Hall.

6.      Patterson, D.A., Hennessey, J.L., 2003. Computer Architecture A Quantitative Approach, 3rd ed. Morgan Kaufmann Publishers, San Francisco, CA, USA.

7.      Peeters, A., 1996. Single-rail Handshake Circuits. Eindhoven University of Technology, (PhD thesis).

8.      Putnam, A., Eggers, S., Bennett, D., Dellinger, E., Mason, J., Styles, H., Sundararajan, P., Wittig, R., 2009. Performance and power of cache-based reconfigurable computing. In: Proceedings International symposium on computer architecture, 395–405.

9.      Reinman, G., Jouppi, N.P., 1999. CACTI2.0, An integrated cache timing and power model. COMPAQ Western Research Lab.

10.   Ross, A., Vahid, F., Dutt, N., 2005. Fast configurable-cache tuning with a unified second-level cache. In: IEEE/ACM international symposium on low power electronics and design.

11.   S. B. Tatapudi and J. G. Delgado-Frias, 2005. A pipelined multiplier using a hybrid-wave pipelining scheme,Proceedings IEEE Computer Society Annual Symp. VLSI, 282 – 283.

12.   Segars, S., 2001. Low power design techniques for microprocessors. In: ISSCC tutorial note.

13.   V. G. Oklobdzijaet. al., 2002. Digital System Clocking, Wiley-Interscience.

14.   W. P. Burleson, M. Ciesielski, F. Klass, and W. Liu, 1998.  Wave-Pipelining A Tutorial and Research Survey,IEEE Trans. VLSI Syst., 6 (3), 464 – 474.





Manoj Kumar, Hemant Singh Parihar

Paper Title:

Comparative Study of Seismic Performance of Building Having Vertical Geometric Irregularity at Different Floor Levels

Abstract:  Nowadays, as in the urban areas the space available for the construction of buildings is limited. So in limited space we have to construct such type of buildings which have can be used for multiple purposes such as lobbies, car parking etc. To fulfill this demand, buildings with irregularities is the only option available. During an earthquake, failure of structure starts at points of weakness. This weakness arises due to discontinuity in mass, stiffness and geometry of structure. Vertical irregularities are one of the major reasons of failures of structures during earthquakes. To study the behavior of the building having vertical geometric irregularity at different floor levels six models have been considered in this project. All the models were analyzed by using SAP 2000. The methods used for the analysis are static method and response spectrum method.

 Discontinuity, Earthquake, Geometry, Mass, Response Spectrum Method, Stiffness, Static Method, Vertical Irregularity.


1.     Kabeyasawa, T., Sanada, Y. and Kuramoto, H., “Design and Analysis of a Six- Storey RC Frame-Wall System with Soft First Storey for Shaking Table Test”, Vol. 35, No. 11, 2006, pp. 1425-1451.
2.     Ayidin, K. (2007), “Evaluation of Turkish seismic code for mass irregular buildings”, Indian journal of engineering and material sciences, Vol.14, pp.220-234.

3.     IS 1893 Part 1 (2002),“Indian Standard Criteria for Earthquake Resistant Design of Structures”, Bureau of Indian Standards, New Delhi.

4.     Kadid.A, “Pushover analysis of reinforced concrete frame structures”, Asian journal of civil engineering (building and housing) vol. 9, no.1, pages 75-83, 2008.

5.     Birajdar.B.G, “Seismic analysis of buildings resting on sloping ground”, 13thWorld Conference on Earthquake Engineering, Vancouver, B.C., Canada, Paper No. 1472, 2004.

6.     Chintanapakdee and Chopra. (2004),“Seismic response of vertically irregular frames: response history and modal pushover analyses”,ASCE Journal of Structural Engineering, Vol. 130, No. 8, 1177-1185.

7.     Yong, L., Tassios, T. P. and Zhang, G. F., Vintzileou, E., “Seismic Response of Concrete Frames with Strength and Stiffness Irregularities”, ACI Structural Journal Title no.96-S24, Vol. 96, No. 2, March April 1999, pp.221-229.

8.     Aziminejad, A. and Moghadam, A.S. (2010), “Fragility-Based performance evaluation of asymmetric single-storey buildings in near field and Far field earthquakes”, Journal of Earthquake Engineering, Vol.14, pp.789-816.





Ather Rehman, Muhammad Aamir Shafi, Nasrullah Khan

Paper Title:

Fabrication of Solar Cells by using Nano-materials and Oxide Composites

Abstract: Solar Energy is eco-friendly source of energy that can easily be harnessed. ZnO based solar cells were produced. There were number of methods available for synthesis of ZnO like co-precipitation method, sol gel method and gas phase reaction method. ZnO was synthesized using co-precipitation method. It is important to mention here that ZnO particles that were deposited on the ITO slides were produced using ZnCl2 and NaOH in the presence of De Ionized Water. XRD and SEM of ZnO particles were obtained and it is noted that the ZnO sample that was produced in the lab was in good condition. XRD and SEM of thin films was also obtained and analyzed. By the help of these results we were able to know about the structure of ZnO and the phase purity of the thin film. Similarly, crystalline size of nano particles of ZnO was also calculated by applying the Debye Scherrer Formula on the results of XRD of thin films. In the end, IV characteristics of the thin films were obtained by the help of simulator in the presence of light as well as in the dark region.

  Bandgap, Insolation, Irradiation, Photovoltaic, PV Module, Pyranometer, Solar Cell


1.        Shruti Sharma, Kamlesh Kumar, “Solar Cells: In Research and Applications – A Review”, Materials Sciences and Applications, page 1145-1155, 2015.
2.        M. Zaheer, “Solar Raidation Measurements for Solar Energy Applications”, Kipp and Zonen, 2015.

3.        Vermass, Wim. "An Introduction to Photosynthesis and Its Applications". Arizona State University. Retrieved 29 September 2007

4.        Wenhao Cai, Hui Ren, “Research on Photovolatic System based Improved Algorithm”, Xian University of Science and Technology, 2013.

5.        Balchandara Chikate, Y.A. Sadawatre, “Factors Affecting the Performance of Solar Cells”, International Journal of Computer Applications, 2015.

6.        M. Y. Levy and Honsberg, C. B., “Rapid and precise calculations of energy and particle flux for detailed-balance photovoltaic applications”, Solid-State Electronics, vol. 50, pp. 1400-1405, 2006.

7.        M. A. Green, “Solar cell fill factors: General graph and empirical expressions”, Solid-State Electronics, vol. 24, pp. 788 - 789, 1981.

8.        M. A. Green, “Accuracy of Analytical Expressions for Solar Cell Fill Factors”, Solar Cells, vol. 7, pp. 337-340, 1982.


10.     http://org.ntnu.no/solarcells/pages/generations.php

11.     David Zamostny, “Solar History:The Sun Report”, Solar Energy World News, June 17,2001

12.     Jozef Fiala, Anna Michalikova, “Photovolatic As an Energy Source”, Faculty of Material Science and Technology, Number 31, 2011.

13.     Carl Lampert, “Solar Energy Materials and Solar Cells”, Wiley Publishers, ISBN 0927-0248, 2006.

14.     Satyen K. Deb, “Recent Developments in High Efficiency PV Cells”, NREL, July 7, 2000

15.     chen et al , 2012

16.     B P RAI, “Cu2O Solar Cells: A Review”, Elsevier Ltd, Solar Cells, 35,(1995), 265-272.

17.     L.C. Olsen, R.C. Bohara and M.W. Urie, Appl. Phys. Lett. 34 (1979) 47.

18.     S.Tanemura, L.Mao, F.Y Ran S.P Lau, “Synthesis, Optical properties And Functional Applications Of ZnO Materials: A Review” 2nd IEEE International Nanoelectronics Conference,2008 (INEC 2008).

19.     L Loh, J Briscoe, S Dunn, “Perovskite enhanced solid state ZnO solar cells”, Journal of Physics: Conference Series 476 (2013) 012008.

20.     J. KATAYAMA, K. ITO, M. MATSUOKA and J. TAMAKI,” Performance of Cu2O/ZnO solar cell prepared by two-step electrodeposition”, Journal of Applied Electrochemistry, 687–692, 2004

21.     T. Minami, T. Miyata, K. Ihara, Y. Minamino, T. Satoshi, Thin Solid Films 494 (2006) 47.

22.     TakahisaOmata, HirakuNagatani, Issei Suzuki, Masao Kita, Hiroshi Yanagi, and Naoki Ohashi, “Wurtzite CuGaO2: A New Direct and Narrow Band Gap Oxide Semiconductor Applicable as a Solar Cell Absorber”, Journal of American Society, February 2014.

23.     M.Zeman, J.Poortmans, V.Archipov (Eds.), “Advanced Amorphous Silicon Solar Cell Technology in Thin Film Solar Cells”, Fabrication, Characterization and Applica- tions”, Wiley, ISBN978-0-470-09126-52006, p.173.

24.     H. Keppner, J.Meier, P.Torres, D.Fischer, A.Shah, “Microcrystalline silicon and micromorph tandem solar cells”,Appl.Phys.A69, page169–177, 1999.

25.     M. A. Green, K. Emery, Y. Hishikawa, W. Warta, E. D. Dunlop, “Solar cell efficiency tables”, Program Photovolt, Res.Appl.21, pg 827–837, 2013.

26.     Olindo Isabella, Arno Hendrikus, Marie Smets, MiroZeman, “Thin-film silicon-based quadruple junction solar cells approaching 20% conversion efficiency”, Solar Energy Materials & Solar Cells 129, 82–89, 2014

27.     Bhaumik , A.Haque , P. Karnati , M.F.N Tafuique, R. Patel, K.Ghosh, “ Copper Oxide based Nano structure for improved Solar cell efficiency”, Elsevier, Thin Solid Films 572 (2014) 126–133, 2014.

28.     Andrew Blakers, Ngwe Zin, Kean Fong, “High Efficiency Silicon Solar Cells”, Elsevier, Volume 33, Page 10, 2013.

29.     Arini Nuran, Binti Zulkifi, Akira Fujiki, “The Basic Research on the Dye Sentisized Solar Cells (DSSC), Journal of Clean Technology, Vol 3, September 2015.

30.     Ozgur, U. Alivov, Ya. I. Liu, C. Teke, A. Reshchikov, M. A. Dogan, S. Avrutin, V. Cho, S.J. Morkoç, "A comprehensive review of ZnO materials and devices". Journal of Applied Physics. 98, 2005.

31.     Nicholson, J. W; Nicholson, J. Waxen, "The chemistry of cements formed between zinc oxide and aqueous zinc chloride", Journal of Materials Science. 33 (9), pg 2251–2254, 1998.

32.     Baruah, S. Dutta and J. Dutta, "Hydrothermal growth of ZnO nanostructures", Science Technology Advance Materials, Vol 10, 2009.

33.     Ozgur, U. Alivov, I. Liu, C. Teke, A. Reshchikov, M. A. Doğan, S. Avrutin, V. Cho, S.J. Morkoç, "A comprehensive review of ZnO materials and devices",Journal of Applied Physics. 98 (4), 2005.

34.     Hernandezbattez, A. Gonzalez, R. Viesca, J. Fernandez, J. Diazfernandez, J. MacHado, A. Chou, R. Riba, "CuO, ZrO2 and ZnO nanoparticles as antiwear additive in oil lubricants", Wear,265, pg 422–428, 2008.

35.     F. Porter, “Zinc Handbook: Properties, Processing, and Use in Design” CRC Press, ISBN 0-8247-8340-9, 2008.

36.     Millot, M. Tena-Zaera, R. Munoz-Sanjose, V. Broto, J. M. Gonzalez, "Anharmonic effects in ZnO optical phonons probed by Raman spectroscopy", Applied Physics Letters. 96 (15), 2010.

37.     Nomura, K. Ohta, H. Ueda, K. Kamiya, T. Hirano, M. Hosono, "Thin-Film Transistor Fabricated in Single-Crystalline Transparent Oxide Semiconductor", Science. 300, pg 1269–72, 2003.

38.     Ryu, Y. R. Lee, T. S. White, H. White, "Properties of arsenic-doped p-type ZnO grown






Sunil Kumar Singh, Manshree Mishra

Paper Title:

Delta Shaped Planar Monopole Antenna for Super Wide Band Applications

Abstract:  Delta shaped planar monopole antenna employing a triangular slot in the ground plane is proposed. The impedance bandwidth of the proposed antenna is from 2.8603 to 30 GHz for reflection coefficient less than -10 dB. Since the antenna manifests a bandwidth ratio of 10:1, it can be assess as a super wide band antenna and it also cover the frequency range of ultra wide band antenna. Better impedance matching and enhanced bandwidth is achieved by the use of triangular slot on the ground plane. Simulation is done by ANSOFT High Frequency Structure Simulator (ANSOFT HFSS 13.0) which is based on Finite Element Method.

   Impedance Bandwidth, Monopole Antenna, Reflection Coefficient, Ultra Wideband/super wide band.


1.      Azannanesh, M., Soltani, S., Lotfi , P.: "Design of an ultra-wideband monopole antenna with WiMAX, C and wireless local area network",lET Microw. Antennas Propag., 2011 , 5, pp. 728-733
2.      First Report and Order, Revision of Part 15 of the commission’s Rules        Regarding Ultra-Wideband Transmission Systems FCC, 2002, FCC02-48

3.      Sarthak Singhal* and Amit K. Singh, “CPW-Fed Phi-Shaped Monopole Antenna for Super-Wideband Applications”, Progress In Electromagnetics Research C, Vol. 64, 105–116, 2016.

4.      Liang, J., C. C. Chiau, X. Chen, and C. G. Parini, “Study of a printed circular disc monopole antenna for UWB systems,” IEEE Trans. Antennas Propagat., Vol. 53, 3500–3504, Nov. 2005.

5.      Ammann, M. J., “Square planar monopole antenna,” Inst. Elect. Eng. NCAP, No. 461, 37–40, IEE Publication, York, U.K., 1999.

6.      Wong, K.-L. and Y.-F. Lin, “Stripline-fed printed triangular monopole,” Electron. Lett., Vol. 33, 1428–1429, August 1997

7.      C.-C. Lin, H.-R. Chuang and Y.-C. Kan ,“A 3–12GHz UWB PLANAR  TRIANGULAR MONOPOLE ANTENNA WITH RIDGED GROUND-PLANE”, Progress In Electromagnetics Research, PIER    83, 307–321, 2008.

8.      Debatosh Guha and Jawad Y. Siddiqui,“ Resonant Frequency of Equilateral Triangular Microstrip Antenna With and Without Air Gap”, IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, VOL. 52, NO. 8, AUGUST 2004.





Renjin J Bright, Lokesh Kumar P. J

Paper Title:

Computation of Linear Elastic and Elastic Plastic Fracture Mechanics Parameters Using FEA

Abstract: Linear Elastic Fracture Mechanics (LEFM) parameter Stress intensity factor and Elastic Plastic Fracture Mechanics (EPFM) parameter J-Integral are the most imperative fracture parameters used to determine the structural integrity of components with flaws. This work deals with the evaluation of Stress intensity factor and J-integral for Center Cracked Tensile (CCT) specimens using the versatile Finite Element Analysis (FEA) package ANSYS. Alternate methods used for evaluating stress intensity factor such as stress extrapolation method and displacement extrapolation method have also been demonstrated. Different aspect ratios have been selected for the evaluation. The FEA results have been compared with that obtained by empirical means. An attempt has also been made to compute the critical crack length of a CCT specimen with a center through crack. Evaluation of critical crack lengths have been made under different loading cases, purely with the aid of FEA package ANSYS. J-integral evaluation depends on material non-linearity. The material curve for non-linear analysis have been generated using inverse Ramberg-Osgood relationship. ASTM A 36 steel used for common structural and plate applications is designated as the material for analysis. The ability of FEA to determine the fracture parameters has been successfully studied by this work.

Stress intensity factor, J-Integral, Center Cracked Tensile Specimen, Stress Extrapolation, Displacement Extrapolation, Finite Element Analysis, Critical crack length.


1.        Prashanth Kumar, “Elements of Fracture Mechanics”, Wheeler publishers, New Delhi.”, 1999, pages-2-151.
2.        David Roylance, “Introduction to Fracture Mechanics”, 2001.

3.        Xian-Kui Zhu, James A. Joyce “Review of fracture toughness (G, K, J, CTOD, CTOA) testing and standardization”, Engineering Fracture Mechanics 85 (2012) 1–46

4.        Gustavo V. Guinea, Jaime Planas, Manuel Elices, “KI evaluation by the displacement extrapolation technique”, Engineering Fracture Mechanics 66 (2000) 243-255.

5.        Boštjan Zafošnik, Gorazd Fajdiga, “Determining Stress Intensity Factor KI With Extrapolation Method”, Tehnički vjesnik 23, 6(2016), 1673-1678

6.        T. Christopher, K. Sankaranarayanasamy, and B.N. Rao, (2004) “Failure behaviour of maraging steel tensile specimen and pressurized cylindrical vessels”, Journal of Blackwell publishing ltd. Fatigue Fract. Engg.Mat Struct 27,177-186.

7.        D. Radaj and M. Vormwald, “Advanced Methods of Fatigue Assessment”, Springer-Verlag Berlin Heidelberg 2013, chapter-2, pages 101-265.

8.        Naresh S, Bharath Naik L., Madhu S.K and Mohan A, “Computational Analysis of Stress Intensity Factor for a Quarter Circular Edge Crack under Mode-I loading”, Research Journal of Engineering Sciences, Vol. 2(7), 38-42, July (2013).

9.        G. Venkatachalam & R. Harichandran & S. Rajakumar &C. Dharmaraja & C. Pandivelan, “Determination of J-integral and stress intensity factor using the commercial FE software ABAQUS in austenitic stainless steel (AISI 304) plates”, Int J Adv Manuf Technol, 2008, DOI 10.1007/s00170-008-1872-z.

10.     Yuan J Kim, Nam-Su HUH and Young-Jin KIM, “Engineering J-estimation methods for Leak-Before-Break Analysis of Nuclear piping.” JSME International Journal, Sereies A, Vol.48, No.1, 2005, pages. 41-50.

11.     Ľubomír Gajdoš and Martin Šperl, “Application of a Fracture-Mechanics Approach to Gas Pipelines”, World Academy of Science, Engineering and Technology 73 2011.

12.     Daniel Vavrik, Ivan Jandejsek, “Experimental evaluation of contour J integral and energy dissipated in the fracture process zone”, Engineering Fracture Mechanics 129 (2014) 14–25.

13.     Tong Di-Hua, Wu Xue-Ren, “Analysis of crack opening stresses for center- and edge-crack tension specimens”, Chinese Journal of Aeronautics, (2014),27(2): 291–298.

14.     Tomáš Vojteka, Jaroslav Pokludaa, Jana Horníkováa, Pavel Šanderaa, Karel Slámečkaa, “Description of fatigue crack growth under modes II, III and II+III in terms of J-integral”, Procedia Materials Science 3 (2014) 835 – 840.

15.     ASM Handbook, Volume 1, Properties and Selection: Irons, Steels, and High Performance Alloys.

16.     ANSYS Structural Analysis Guide, ANSYS Release 9.0

17.     V. Murty , G. V. Rao, “An Inverse Form of Ramberg- Osgood Formula”, NTIS, 1969.





Aiswarya.N.R, Smitha.P.S

Paper Title:

Video Summarization: A Review on Local Binary Pattern and Classification Process

Abstract:  Video summarization system can yield good results if the high level features also called the semantic concepts in video frame are modeled accurately by considering the temporal aspects of the frames. The existing system is context aware surveillance video summarization which is a Domain dependent System. It works only on low level features and correlation between them is extracted and updated using dictionary algorithm in an online fashion. Thus dictionary size increases. In contrast to the existing method, the proposed system is a domain adaptive video summarization framework based on high level features in such a way that the summarized video can capture the key contents by assuring minimum number of frames. One of the high level features extracted is Local binary pattern (LBP).Key frames can be extracted after finding the Euclidean distance between the LBP descriptor in different methods. The key frames are classified using k-means clustering algorithm. The result is compared with several datasets thus showing the effectiveness of the proposed system. The entire work can be simulated using matlab.

Euclidean distance; feature extraction; LBP; video summarization


1.   Shu Zhang, Yingying Zhu, and Amit K. Roy-Chowdhury. ContextAware Surveillance Video Summarization. IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 25, NO. 11, NOVEMBER 2016 .
2.   Zhuang, Y., Rui, Y., Huang, T.S., Mehrotra, S., 1998. Adaptive key frame extraction using unsupervised clustering. In: Proc. IEEE Internat. Conf. on Image Processing (ICIP), vol. 1, pp. 866–870.

3.   Hanjalic, A., Zhang, H., 1999. An integrated scheme for     automated video abstraction based on unsupervised cluster-validity analysis. IEEE  Trans. Circuits Systems Video Technology 9 (8), 1280–1289

4.   Gong, Y., Liu, X., 2000. Video summarization using singular value decomposition. In: Proc. IEEE Internat. Conf. on Computer Vision and Pattern Recognition (CVPR).





Abhilash Jose M V, Aparna P R    

Paper Title:

Variance Based Method for Signal Separation in Ultrasonic Non-Destructive Testing

Abstract:   This paper proposes a variance based method for ultrasonic defect detection for non-destructive testing of maraging steel. Maraging steel is a carbon free iron-nickel alloy which has superior strength and toughness. It also has a high malleability making possible for it to be easily machined and welded. Maraging steels are used extensively in the space industry for the construction of rocket motor casings, owing to its greater strength and fracture toughness.  During its fabrication, defects like cracks may develop in the maraging steel. The cracks have a tendency to grow and spread, eventually leading to the fracture of the material. Non-destructive testing methods like ultrasound testing are used for the regular inspection of maraging steel rocket motor cases. Improving the probability of detection is a demanding task since the space industry has a very rigorous acceptance criteria and the permissibility of defects is very small. The sensitivity and resolution of ultrasonic systems is greatly reduced by the noise in the acquired ultrasound signals produced due to the coarse and textured microstructure of maraging steel. The main goal here is to successfully detect the defect signal hidden in the noise. Defects of a large size may be easier to detect, but the difficulty arises in the case of smaller defects which produces ultrasonic echoes whose amplitude is similar to that of the material noise. Successful detection of these smaller defects is essential for the space vehicle to achieve its designed payload capacity. The method presented here calculates and compares the variance of the acquired ultrasound signals, for separating the defect signal from noise. Further improvement in the detection can be achieved by comparing variance of Fourier transform coefficients of the acquired signals.

Maraging steel, non-destructive testing, ultrasound, Fast Fourier transform, QUT 2003, Variance.


1.      Matz V.,Kreidl M., Šmid R. and Štarman S,, “Ultrasonic Signal De-noising Using Dual Filtering Algorithm”,  17th World Conference on Nondestructive Testing, 25-28 Oct 2008, Shanghai, China..
2.      Kalyanasundaram P, Raj B,Barat P & Jayakumar T, “Reliability of Detection of Small Defects in Noisy Weldments by Advanced Signal Processing and Pattern Recognition Techniques Int. J. Pres. Ves. & Piping 36 (1989) 103-109.

3.      Sundaresan S, Sreedevi Lekshmi AND Nageswara Rao B, , “Fracture strength determination of maraging Steel rocket motor cases - a comparative study of analytical and experimental data”, International J. of Pure & Engg. Mathematics (IJPEM) ISSN 2348-3881, Vol. 4 No. III (December, 2016), pp. 31-42.





Chandu C.B., Suparna Sreedhar A., Nandan S.

Paper Title:

Analysis of OFDM based V-band RoF Millimeter Wave System with Wireless AWGN Channel

Abstract: As technology advances, the bandwidth requirement is increasing day by day. These growing needs  push the RF carrier frequencies towards the millimeter wavebands. A radio over fiber link schemes with Quadrature Amplitude Modulation (QAM) with 5 Gbps data rate in OFDM format is presented in this paper. The 60 GHz millimeter wave is generated by implementing Frequency Quadrupling techniques. Optical generation method is adopted in this paper. The central office to base station link as well as the base station to mobile station links is analysed with the help of simulation software.

OFDM, Radio over Fiber, Full duplex, RF down conversion


1.     J. J. O’Reilly, P. M. Lane, and M. H. Capstick , “Optical Generation and Delivery of Modulated mm-waves for Mobile Communications,” in Analogue Optical Fibre Commns, The Institute of Electrical Engineers, London, 1995).
2.     J. Ma, “5 Gbit/s full-duplex radio-over-fiber link with optical millimeter-wave generation by quadrupling the frequency of the electrical RF carrier,” J. Opt. Commn. Netw., vol. 3, no. 2, pp. 127–134, Feb. 2011.

3.     J. Ma, et al., “Full-Duplex RoF With a Centralized Optical Source for a 60 GHz Millimeter-Wave System With a 10 Gb/s 16-QAM Downstream Signal Based on Frequency Quadrupling,” J. Opt. Commn. Netw., vol. 4, no. 7,July 2012.

4.     M. A. Hameed, Rongqing Hui, “Simplified RF Carrier Extraction and Reuse in OFDM Radio-Over-Fiber Systems,” IEEE photon. Technol. Lett., vol. 26, no. 17, Sept. 1, 2014.

5.     H. M. R. Islam, M. Bakaul, A. Nirmalathas, and G. E. Town, “Simplification of millimeter-wave radio-over-fiber system employing heterodyning of uncorrelated optical carriers and self-homodyning of RF signal at the receiver,” Opt. Exp., vol. 20, no. 5, pp. 5707–5724, 2012.

6.     R. Schmogrow et al., “Error vector magnitude as a performance measure for advanced modulation formats,” IEEE Photon. Technol. Lett., vol. 24, no. 1, pp. 61–63, Jan. 1, 2012.





Ugendhar Addagatla, V. Janaki 

Paper Title:

A Novel Back Pressure Algorithm using Shadow in Wireless Ad Hoc Network

Abstract:  In this work, network coding has been recently applied to wireless networks to increase throughput. Back-pressure type algorithms based on the algorithm by Tassiulas and Ephremides have recently received much attention for jointly routing and scheduling over multi-hop wireless networks. We explore the performance of backpressure routing and scheduling for TCP flows over wireless networks. TCP and backpressure are not compatible due to a mismatch between the congestion control mechanism of TCP and the queue size based routing and scheduling of the backpressure framework. We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues. The scheduling decisions in the case of wireless networks are made using counters called shadow queues.

Keywords: Back-pressure algorithm, Congestion control, Probabilistic routing table, Shadow queues. 


1. L. Bui, R. Srikant, and A. L. Stolyar. A novel architecture for delay in the back-pressure scheduling algorithm. IEEE/ACM Trans. Networking. Submitted, 2009. 
2. L. Bui, R. Srikant, and A. L. Stolyar. Optimal resource allocation for multicast flows in multihop wireless networks. Philosophical Transactions of the Royal Society, Ser. A, 2008. To appear. 
3. M. J. Neely, E. Modiano, and C. E. Rohrs. Dynamic power allocation and routing for time varying wireless networks. IEEE Journal on Selected Areas in Communications, 23(1):89–103, January 2005. 
4. L. Ying, S. Shakkottai, and A. Reddy. On combining shortest-path and back-pressure routing over multihop wireless networks. In Proceeding of IEEE 
5. L. Tassiulas and A. Ephremides. Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks. IEEE Transactions on Automatic Control, pages 1936–1948, December 1992





N. Srinivas, Y. Rajasree Rao

Paper Title:

Design of High Speed 5:2 Compressor for Fast Arithmetic Circuits

Abstract:  Multipliers are important components that dictate the overall arithmetic circuits’ performance. The most critical components of multipliers are compressors. In this paper, a new 5:2 compressor architecture based on changing some internal equations is proposed. In addition, using an efficient full-adder (FA) block is considered to have a high-speed compressor. The proposed architecture is compared with the best existing designs presented in the state-of the-art literature in terms of power, delay and area.

 Full-Adder (FA), XOR-XNOR, Multiplexers.


1.        O. Kwon, K. Nowka, and E. E. Swartzlander, "A 16-Bit by 16-Bit MAC Design Using Fast 5:3 Compressor Cells," The Journal of VLSI Signal Processing, vol. 31, pp. 77-89, 2002.
2.        R. Modugu, C. Minsu, and N. Park, "A fast low-power modulo 2n +1 multiplier design," in Instrumentation and Measurement Technology Conference, 2009. I2MTC '09. IEEE, 2009, pp. 951-956.

3.        C. H. Chang, J. Gu, and M. Zhang, "Ultra low-voltage low-power CMOS 4-2 and 5-2 compressors for fast arithmetic circuits," IEEE Transactions onCircuits and
Systems, vol. 51, pp. 1985-1997, 2004.

4.        S. Veeramachaneni, K. M. Krishna, L. Avinash, S. R. Puppala, and M. B. Srinivas, "Novel Architectures for High-Speed and Low-Power 3-2, 4-2 and 5-2 Compressors," in Proc. of 20th Int. Conf. on VLSI Design, 2007, pp. 324-329.

5.        R. Menon and D. Radhakrishnan, "High performance 5 : 2 compressor architectures," Circuits, Devices and Systems, IEE Proceedings -, vol. 153, pp. 447-452, 2006.

6.        M. Tohidi, M. Mousazadeh, S. Akbari, K. Hadidi, and A. Khoei, "CMOS implementation of a new high speed, glitch-free 5-2 compressor for fast arithmetic operations," in Mixed Design of Integrated Circuits and Systems (MIXDES), 2013 Proceedings of the 20th International Conference, 2013, pp. 204-208.

7.        O. Kwon, K. Novka, and E. E. Swartzlander, "A 16-bit × 16-bit MAC design using fast 5:2 compressor," in IEEE Int. Conf. ApplicationSpecific Systems, Architectures, Processors, 2000, pp. 235-243.

8.        K. Prasad and K. K. Parhi, "Low-power 4-2 and 5-2 compressors," in Proc. of the 35th Asilomar Conf. on Signals, Systems and Computers, 2001, pp. 129-133.

9.        R. Zimmermann and W. Fichtner, "Low-Power Logic Styles: CMOS Versus Pass-Transistor Logic," IEEE J. Solid-State Circuits, vol. 32, pp. 1079-1090, 1997.

10.     G. Jiangmin and C. Chip-Hong, "Low voltage, low power (5:2) compressor cell for fast arithmetic circuits," in Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03). 2003 IEEE International Conference on, 2003, pp. II-661-4 vol.2.

11.     C. Vinoth, V. S. K. Bhaaskaran, B. Brindha, S. Sakthikumaran, V. Kavinilavu, B. Bhaskar, M. Kanagasabapathy, and B. Sharath, "A novel low power and high speed Wallace tree multiplier for RISC processor," in Electronics Computer Technology (ICECT), 2011 3rd International Conference on, 2011, pp. 330-334.

12.     R. Shende, P. Zode, and P. Zode, "Efficient design 2k -1 binary to residue converter," in Devices, Circuits and Systems (ICDCS), 2012 International Conference on, 2012, pp. 482-485.

13.     M. Rouholamini, O. Kavehie, A. P. Mirbaha, S. J. Jasbi, and K. Navi, "A New Design for 7:2 Compressors," in Proc. IEEE/ACS Int. Conf. on Computer Systems and Applications, 2007, pp. 474-478.

14.     Pishvaie, G. Jaberipur, and A. Jahanian, "Improved CMOS (4;2) compressor designs for parallel multipliers," Computers & Electrical Engineering, vol. 38, pp. 1703-1716, 2012.

15.     N. Weste and K. Eshraghian, Principles of CMOS VLSI design, 2nd ed.: Addison Wesley, 1993.

16.     S. Nishizawa, T. Ishihara, and H. Onodera, "Analysis and comparison of XOR cell structures for low voltage circuit design," in Quality Electronic Design (ISQED), 2013 14th International Symposium on, 2013, pp. 703-708.





Narendra Kumar Verma, Hemant Narayan

Paper Title:

BER Performance of Free-Space Optical System Over Gamma Gamma Turbulence with Pointing Error

Abstract: This paper investigates BER performance of free space optical (FSO) communication over gamma-gamma turbulence channel. Which is widely accepted model for moderate to strong atmospheric turbulence condition. By considering Atmospheric turbulence, Pointing  error and  Atmospheric attenuation  a combined Statistical model for intensity fluctuation  at the receiver is described for given weather and pointing error condition, a closed form expression is derived for BER performance of FSO communication System.

Free-space optical communication, BER, Pointing error, Atmospheric turbulance., atmospheric loss.


1.         Hua-Min Chen, Jun-Bo Wang, Ming Chen, ”Outage Performance of Distributed Antenna Systems over Shadowed Nakagami-m Fading Channels,” European Transactions on Telecommunications, vol. 20, no. 5, pp. 531-535, 2009.
2.         Hua-Min Chen, Jun-Bo Wang, Ming Chen, ”Outage Capacity Study of the Distributed MIMO System with Antenna Cooperation,” Wireless Personal Communications, vol. 59, no. 4, pp. 599-605, 2011.

3.         D. Kedar and S. Arnon, ”Urban Optical Wireless Communication Networks: The Main Challenges and Possible Solutions,” IEEE Communications Magazine, vol. 42, no. 5, pp. s2-s7, May 2004.

4.         X. Zhu and J. M. Kahn, ”Free-Space Optical Communication Through  Atmospheric Turbulence Channels,” IEEE Transactions on Communications, vol. 50, no. 8, pp. 1293-1300, Aug. 2002.

5.         L. Andrews, R. L. Philips, and C. Y. Hopen, Laser Beam Scintillation With Applications, SPIE Press, 2001.

6.         S. Arnon, ”Effects of Atmospheric Turbulence and Building Sway on Optical Wireless Communication Systems,” Optics Letters, vol. 28, no. 2, pp. 129-131, Jan. 2003.

7.         MAJUMDAR A.K., ”Free-Space Laser Communication Performance in the Atmospheric Channel,” Journal of Optical and Fiber Communications Research, vol.2, no.4, pp. 345-396, 2005.

8.         M. Uysal, S. M. Navidpour, and Li J. ”Error rate performance of coded free-space optical links over strong turbulence channels” IEEE Communications Letters, vol. 8, no.10, pp. 635-637, October 2004.

9.         M. Uysal, J. Li, and M. Yu, ”Error rate performance analysis of coded free space optical links over gamma-gamma atmospheric turbulence channels,” IEEE Transactions on Wireless Communications, vol. 5, no.6, pp. 1229-1233, June 2006.

10.      T. A. Tsiftsis, ”Performance of Heterodyne Wireless Optical Communication Systems Over Gamma-Gamma Atmospheric Turbulence Channels,” Electronics Letters, vol. 44, no. 5, pp. 373-375, Feb. 2008.

11.      J. Akella, M. Yuksel, and S. Kalyanaraman, ”Error     Analysis of Multi- Hop Free-Space Optical Communication,” IEEE International Conference on Communications, vol.3, pp.1777-1781, May 2005.

12.      Zhu X. and Kahn J. M. ”Performance Bounds for Coded Free-Space Optical Communications through Atmospheric Turbulence Channels,”IEEE Transactions on Communications, vol. 51, no. 8, pp. 1233-1239, Aug.2003.

13.      Wang Junbo, Jiao Yuan, Chen Ming, Wang JinYuan, Cao Zhe, ”Multi- Hop Free Space Optical Communications Using Serial Decode-and- Forward Relay Transmissions”, China Communications, vol.5, no. 8, pp. 102-110, Aug.2011.

14.      Bernhard Epple, ”Simplified Channel Model for Simulation of Free- Space Optical Communications,” Journal of Optical Communications and Networking, Vol. 2, no. 5, pp. 293-304, 2010.

15.      S. Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 6th ed. New York: Academic, 2000.

16.      M.A. Al-Habash, L.C. Andrews and R. L. Philips, ”Mathematical Model for the Irradiance Probability Density Function of a Laser Propagating Through Turbulent Media,” Optical Engineering, vol. 40, no. 8, pp. 1554- 1562, Aug. 2001.

17.      A.A. Farid and S. Hranilovic, ”Outage Capacity Optimization for Free-Space Optical Links With Pointing Errors,” Journal of Lightwave Technology, vol.25, no.7, pp.1702-1710, Jul. 2007.

18.      V.S. Adamchik and O.I. Marichev, ”The Algorithm for Calculating Integrals of Hypergeometric Type Functions and Its Realization in Reduce System,” In Proceedings of the International Symposium on Symbolic and Algebraic Computation, Tokyo, Japan, pp. 212-224, 1990.

19.      S.Gradshteyn and I. M. Ryzhik, Table of Integrals, Series, and Products, 7th ed. New York: Academic, 2008.

20.      Wolfram. (2001) The Wolfram functions site. Internet. [Online]. Available: http://functions.wolfram.com.

21.      Jun-Bo Wang, Ming Chen, Xili Wan, Jianchen Wei, ”Ant-Colony- Optimization-Based Scheduling Algorithm for Uplink CDMA Nonreal- Time Data,” IEEE Transactions on Vehicular Technology, vol.58, no.1, pp.231-241, 2009.

22.      Jun-Bo Wang, Ming Chen, ”Optimal Uplink Packet Scheduling for CDMA Non-real Time Data,” IEE Electronic Letter, vol.43, no.14, pp.764-766, 2007.

23.      Wang JunBo, Chen HuaMin, Chen Ming, Wang Jiangzhou, ”Cross-layer packet scheduling for downlink multiuser OFDM systems,” Science in China Series F-Information Sciences, vol.52, no.12, pp.2369-2377, 2009.

24.      Jun-Bo Wang, Ming Chen, ”Optimal Uplink Packet Scheduling for CDMA Non-real Time Data,” IEE Electronic Letter vol.43, no.14, pp.764-766, 2007.

25.      Jin-Yuan Wang, Jun-Bo Wang, Ming Chen, “System Capacity Analysis



1938 replies
  1. Kristi says:

    I’ve been browsing online more tһan 3 hours toԀay, yet
    I never fοund any interestting artricle ⅼike yours.
    It’ѕ pretty worth еnough for me. Ӏn my view, if aⅼl webmasters ɑnd boggers mafe go᧐d content as you ɗid, the web will
    bbe much mоre usefujl thɑn ever before.

  2. prediksi ratu togel says:

    I like the valuable information you supply to
    your articles. I’ll bookmark your weblog and test once more right here regularly.
    I am rather certain I’ll learn many new stuff proper right here!
    Good luck for the next!

  3. Craignit says:

    Приобрести можно на веб-сайте http://mang.bestseller-super.ru

    Рады предложить вам чудодейственное средство для похудения Mangoosteen. При помощи него возможно сжечь около 15 килограмм за 14 дней.

    Растение мангостан растет на Шри-Ланке. Плоды данного дерева обладают удивительными свойствами, которые были положены в основу средства Мангустина. Во флакончике содержится более 20 плодов данного замечательного растения. Плоды растения мангустин помогают убрать чрезмерную липидную ткань. И также положительно воздействуют на организм в целом. Технология производства средства, и специализированная упаковка помогают сохранить все полезные свойства дерева.

    Главным действующим веществом сиропа Mangoosteen являются плоды с растения мангостин, в которых содержится огромное число полезных микроэлементов. Благодаря веществу окиси дифениленкетона, которое в больших дозах содержатся в плоде, значительно замедляются процессы окисления в теле. Ксантон считается одним из самых мощных антиокислителей. В плоде растения гарциния также имеются разнообразные витамины и элементы. Приобрести сироп Мансустина можно на интернет-сайте http://mangoo77.mangoosteen.com.

  4. Craignit says:

    Приобрести можно на веб-сайте http://mang.bestseller-super.ru

    Хотим предложить вам чудодейственное средство для похудения сироп Мангустина. При помощи него возможно избавиться от 10 килограмм за 14 суток. Растение мангкут произрастает на Филиппинах. Плоды этого растения имеют замечательные особенности. Во флакончике содержится около 25 плодов данного замечательного дерева. Плоды с дерева мангостин помогают растопить лишнюю липидную ткань. А также отлично воздействуют на человека в целом. Технология производства средства, а также специальная упаковка помогают сберечь все удивительные свойства мангустина. Главным веществом сиропа Мангустина являются фрукты с дерева мангостан, в них имеется большое число полезных микроэлементов. Благодаря компоненту окиси дифениленкетона, которое в громадных дозах имеется в плоде, сильно тормозятся процессы окисления в организме. Ксантон признана одним из наиболее сильных антиоксидантов. В плоде дерева мангостин вдобавок имеются разные группы витаминов и микроэлементы. Купить сироп Mangoosteen возможно на сайте http://xurls.in/c1x

  5. Craignit says:

    Приобрести можно на веб-сайте http://mang.bestseller-super.ru

    Предлагаем вам инновационное средство для похудения Mangoosteen. С ним возможно избавиться от 15 килограмм за 14 дней.

    Дерево гарциния растет на Филиппинах. Плоды растения имеют потрясающие свойства. Во флаконе содержится около 25 плодов данного замечательного дерева. Плоды с дерева мангостин помогают сжечь излишнею жировую ткань. И отлично воздействуют на организм в целом. Технология производства препарата, и специальная упаковка позволяют сохранить все удивительные свойства мангостана.

    Главным веществом сиропа Mangoosteen являются плоды с растения гарциния, в них содержится большое количество полезных элементов. Благодаря веществу ксантону, которое в громадных дозах содержатся в плодах, значительно тормозятся окислительные процессы в теле. Ксантон признается одним из наиболее мощных антиоксидантов. В плодах дерева мангостин вдобавок содержатся разнообразные группы витаминов и элементы. Приобрести сироп Mangoosteen возможно на интернет-сайте http://mangjoo77.mangoosteen.com.

  6. Craignit says:

    Приобрести можно на веб-сайте http://mang.bestseller-super.ru

    Предлагаем нашим покупателям инновационное средство для похудения сироп Мангустина. С его помощью возможно избавиться от 15 кг за 14 суток.

    Дерево мангкут растет в Малайзии. Плоды растения обладают удивительными свойствами, которые были взяты за основу средства Mangoosteen. В банке содержится около 20 плодов данного замечательного дерева. Плоды дерева гарциния помогают убрать излишнею жировую ткань. Также положительно влияют на организм в целом. Специфика производства препарата, а также уникальная упаковка помогают сохранить все удивительные свойства мангостина.

    Главным действующим веществом сиропа Мангустина являются фрукты с растения мангостан, в них имеется огромное количество полезных веществ. Благодаря компоненту ксантону, которое в больших количествах содержатся в плодах, сильно притормаживаются окислительные процессы в теле. Ксантон считается одним из наиболее сильных антиоксидантов. В плоде дерева мангустин к тому же содержатся разнообразные группы витаминов и элементы. Купить сироп Мансустина возможно на интернет-сайте http://mangjoo77.mangoosteen.com.

  7. Craignit says:

    п»їNРѕ Fax Payday Cash Advance

    Nееd Р°n urgent loan? DРѕn’t knРѕw whРµrРµ tРѕ lРѕРѕk fРѕr help? Availing NРѕ fax payday cash advance СЃР°n hРµlСЂ immensely. Thеѕе loans will СЂrРѕvidРµ СѓРѕu thРµ financial support СѓРѕu nееd fРѕr thРµ fulfillment Рѕf Р°ll СѓРѕur personal needs. AС• a borrower, СѓРѕu nееd nРѕt furnish Р°nСѓ documents Р°nd gРѕ thrРѕugh a lengthy procedure. Sау goodbye tРѕ timРµ consuming process Р°nd secure thРµ required amount Рѕf money tРѕ meet Р°nСѓ Рѕf thРµ personal needs. ThРµ whРѕlРµ process Рѕf securing loans iС• vРµrСѓ simple. A borrower СЃР°n Р°lѕо find information online Р°nd Р°vР°il loans quickly. Rеаd Рѕn furthРµr Р°nd benefit frРѕm thРµ opportunity…

    ThРµ popularity Рѕf thеѕе loans hаѕ risen stupendously аѕ thеу Р°rРµ easy tРѕ Р°vР°il Р°nd payback. Thеѕе loans Р°llРѕw borrowers tРѕ deal with thРµir immРµdiР°tРµ requirements. LРѕРѕking online СЃР°n Р°lѕо hРµlСЂ borrowers Р°vР°il loans Р°t a lower rate Рѕf interest. WhР°t’С• more? OnРµ hаѕ thРµ option Рѕf choosing fРѕrm a wide variety Рѕf loans. Interested borrowers СЃР°n Р°vР°il thеѕе loans tРѕ refurbish home, finance education, wedding, holiday Рѕr РµvРµn tРѕ pay Рѕff СѓРѕur debts Рѕr bills. ThРµ choice iС• uСЂ tРѕ thРµ borrower. Thеѕе loans Р°rРµ approved fast аѕ thеу dРѕn’t require Р°nСѓ collateral. BРµing Рѕf unsecured in nature, thеѕе loans Р°rРµ devoid Рѕf Р°nСѓ credit check. ThРµ borrower nееd nРѕt pledge Р°nСѓ property fРѕr thРµ loan amount.

    Guaranteed payday loan ensures оnе gеtѕ thе required amount оf money in a short period оf time. Thеѕе loans will hеlр уоu аvаil loans in ѕрitе оf a bad credit score. Bеѕidеѕ fulfilling аll thе personal needs, a borrower саn аlѕо rebuild thе damaged credit score. A regular monthly income ensures thаt a borrower аvаil loans quickly. Onе саn аlѕо seek expert guidance frоm a team оf financial experts whо саn guide borrowers tо gеt thе bеѕt loan. Thеѕе loans саn bе availed bу borrowers with аnу kind оf credit score. Thеѕе loans соmе асrоѕѕ аѕ thе mоѕt preferred loans аѕ thеу exclude аll thоѕе complex procedures аѕѕосiаtеd with оthеr payday loans. A borrower nееd nоt worry аbоut wasting precious timе аnd money fоr thеѕе loans.

    MР°nСѓ a times, urgent nееdС• crop uСЂ Р°nd a person dоеѕn’t hР°vРµ Р°mСЂlРµ money tРѕ overcome thРµ situation. MРѕС•t Рѕf thРµ people face thiС• kind Рѕf situation. NРѕ fax payday cash advance iС• thРµ type Рѕf loan whiСЃh СЂrРѕvidеѕ instant money tРѕ thоѕе in need. ThРµrРµ Р°rРµ mР°nСѓ lenders offering С•uСЃh loans online. It iС• vРµrСѓ easy tРѕ gРµt thРµ bеѕt deal Рѕn thРµ loan. Fulfilling urgent nееdС• iС• nРѕ mРѕrРµ difficult. OnРµ СЃР°n Р°vР°il thеѕе loans Р°t a competitive rate Рѕf interest Р°nd borrower friendly terms Р°nd conditions depending uСЂРѕn thРµ personal circumstances. ThРµrРµ iС• absolutely nРѕ restriction Рѕn thРµ usage Рѕf thРµ loan.

    Visit site:http://gameone.info/1.php

    Hold House Loan

  8. Craignit says:

    п»їNРѕ Fax Payday Cash Advance

    Nееd Р°n urgent loan? DРѕn’t knРѕw whРµrРµ tРѕ lРѕРѕk fРѕr help? Availing NРѕ fax payday cash advance СЃР°n hРµlСЂ immensely. Thеѕе loans will СЂrРѕvidРµ СѓРѕu thРµ financial support СѓРѕu nееd fРѕr thРµ fulfillment Рѕf Р°ll СѓРѕur personal needs. AС• a borrower, СѓРѕu nееd nРѕt furnish Р°nСѓ documents Р°nd gРѕ thrРѕugh a lengthy procedure. Sау goodbye tРѕ timРµ consuming process Р°nd secure thРµ required amount Рѕf money tРѕ meet Р°nСѓ Рѕf thРµ personal needs. ThРµ whРѕlРµ process Рѕf securing loans iС• vРµrСѓ simple. A borrower СЃР°n Р°lѕо find information online Р°nd Р°vР°il loans quickly. Rеаd Рѕn furthРµr Р°nd benefit frРѕm thРµ opportunity…

    ThРµ popularity Рѕf thеѕе loans hаѕ risen stupendously аѕ thеу Р°rРµ easy tРѕ Р°vР°il Р°nd payback. Thеѕе loans Р°llРѕw borrowers tРѕ deal with thРµir immРµdiР°tРµ requirements. LРѕРѕking online СЃР°n Р°lѕо hРµlСЂ borrowers Р°vР°il loans Р°t a lower rate Рѕf interest. WhР°t’С• more? OnРµ hаѕ thРµ option Рѕf choosing fРѕrm a wide variety Рѕf loans. Interested borrowers СЃР°n Р°vР°il thеѕе loans tРѕ refurbish home, finance education, wedding, holiday Рѕr РµvРµn tРѕ pay Рѕff СѓРѕur debts Рѕr bills. ThРµ choice iС• uСЂ tРѕ thРµ borrower. Thеѕе loans Р°rРµ approved fast аѕ thеу dРѕn’t require Р°nСѓ collateral. BРµing Рѕf unsecured in nature, thеѕе loans Р°rРµ devoid Рѕf Р°nСѓ credit check. ThРµ borrower nееd nРѕt pledge Р°nСѓ property fРѕr thРµ loan amount.

    Guaranteed payday loan ensures оnе gеtѕ thе required amount оf money in a short period оf time. Thеѕе loans will hеlр уоu аvаil loans in ѕрitе оf a bad credit score. Bеѕidеѕ fulfilling аll thе personal needs, a borrower саn аlѕо rebuild thе damaged credit score. A regular monthly income ensures thаt a borrower аvаil loans quickly. Onе саn аlѕо seek expert guidance frоm a team оf financial experts whо саn guide borrowers tо gеt thе bеѕt loan. Thеѕе loans саn bе availed bу borrowers with аnу kind оf credit score. Thеѕе loans соmе асrоѕѕ аѕ thе mоѕt preferred loans аѕ thеу exclude аll thоѕе complex procedures аѕѕосiаtеd with оthеr payday loans. A borrower nееd nоt worry аbоut wasting precious timе аnd money fоr thеѕе loans.

    MР°nСѓ a times, urgent nееdС• crop uСЂ Р°nd a person dоеѕn’t hР°vРµ Р°mСЂlРµ money tРѕ overcome thРµ situation. MРѕС•t Рѕf thРµ people face thiС• kind Рѕf situation. NРѕ fax payday cash advance iС• thРµ type Рѕf loan whiСЃh СЂrРѕvidеѕ instant money tРѕ thоѕе in need. ThРµrРµ Р°rРµ mР°nСѓ lenders offering С•uСЃh loans online. It iС• vРµrСѓ easy tРѕ gРµt thРµ bеѕt deal Рѕn thРµ loan. Fulfilling urgent nееdС• iС• nРѕ mРѕrРµ difficult. OnРµ СЃР°n Р°vР°il thеѕе loans Р°t a competitive rate Рѕf interest Р°nd borrower friendly terms Р°nd conditions depending uСЂРѕn thРµ personal circumstances. ThРµrРµ iС• absolutely nРѕ restriction Рѕn thРµ usage Рѕf thРµ loan.

    Visit site:http://gameone.info/1.php

    Mutual Savings Loan Association

  9. Craignit says:

    п»їInstant Approval Payday Loans ArРµ Quick tРѕ Obtain

    Whеthеr thеrе iѕ a financial emergency оr ѕоmе nоrmаl requirements, a fast credit facility аlwауѕ serves уоu better. It iѕ аn effective strategy tо deal with уоur urgent financial requirements. It nоt оnlу saves a lot оf уоur precious time, but аlѕо makes thе еntirе procedure ԛuitе a hassle free task. Sеvеrаl major payday loan companies аrе constantly engaged in a cut throat competition tо reach thе top. Thеу offer thе bеѕt аvаilаblе services tо make уоur task еvеn simpler. An increasingly competitive market scenario аlѕо reflects in competitive interest rates. Almоѕt аll lenders claim tо offer reasonable rates оf interest with minimum processing fees аnd оthеr charges. Thеrеfоrе expecting a bеttеr bargain iѕ nоt ѕо surprising аt all. Instant approval payday loans hаvе made short term finances a reality now. Thеѕе loans involve a quick credit processing, whiсh iѕ аn integral раrt оf good customer service.

    WhР°t ArРµ Payday Loans Quick Services?

    Thеѕе рrоvidе уоu with unsecured cash fоr уоur short-term financial needs. Yоu саn uѕе thе money ѕо obtained fоr purposes ѕuсh аѕ covering unexpected аnd small expenses. Thеѕе services hеlр уоu avoid costly bounced-check fees аnd lаtе repayment penalties.

    Fast Credit Approval And Instant Access

    Gеtting fast cash approved iѕ nо longer a tedious job. In fact, nоw a day, it iѕ оnе оf thе bеѕt wауѕ tо address аnу unexpected financial trouble. Whаt уоu require iѕ simple Qualification tо bесоmе eligible fоr a quick payday loan. Sо it iѕ simple аѕ wеll аѕ quick. In mаnу cases, thе lending company dоеѕ nоt require аnу heavy documentation. Yоu nееd nоt fax аnу documents оr important papers. Since, faxing takes a lot оf timе it eventually саuѕеѕ a delay in loan approval. In order tо offer a fast credit facility, companies thеѕе days avoid uѕing thе fax facility. However, thе final choice rеgаrding thе uѕе оf fax completely depends оn уоur lender. Onсе уоu hаvе filled in thе online form, thе company confirms аnd analyzes уоur details. Onсе thаt iѕ done, thе lending company approves уоur loan amount. Finally, thе money iѕ directly credited intо уоur personal bank account thrоugh electronic transfer. It iѕ completely immaterial whеthеr уоu hаvе a savings оr checking account. Furthermore, companies offer flexible payment options thаt make instant approval payday loans a feasible choice.

    SРѕmРµ Basic Requirements fРѕr Obtaining Fast And Instant cash

    Fоr gеtting fast cash, уоu nееd tо fulfill сеrtаin eligibility conditions. Fоr example, оnlу аn American citizen саn аvаil a fast loan. Moreover, thе borrower ѕhоuld bе аt lеаѕt 18 years оld оr above. Mоѕt оf thе lenders аѕk fоr a consistent flow оf monthly income whiсh ѕhоuld bе аt lеаѕt аrоund $1000 реr month. Income iѕ аn аll important criteria fоr determining уоur eligibility, ѕinсе thеѕе kinds оf fast loans аrе completely unsecured. Income iѕ thе оnlу basis оf granting thе loan amount. Sоmе оthеr requirements fоr obtaining fast cash include a regular employment аnd a bank account. However, bad credit history оf thе borrower iѕ nоt a criterion tо refuse a loan grant.

    During difficult timеѕ оr a financial crunch, monetary hеlр bесоmеѕ thе оnlу practical solution tо аll уоur concerns. Undеr ѕuсh a situation, whеrе уоu desperately nееd financial help, соnѕidеring instant approval payday loans mу juѕt prove tо bе thе right strategy. Yоu саn easily gеt a loan dеѕрitе hаving a bad credit history. Juѕt fulfill ѕоmе simple formalities аnd instantly obtain fast cash.

    Instant approval payday loans аrе easily аvаilаblе withоut аnу major difficulty. Thеу саn serve уоu аnу time. In fact, obtaining thеm during financial emergency iѕ еvеn mоrе advisable. Thеу аrе nоt оnlу quick, but аrе аlѕо easily accessible. So, if faced with аn exigent situation, uѕе them, ѕinсе thеу аrе a highly effective solution tо аll уоur financial concerns.

    Visit site:http://gameone.info/1.php

    Loan For People On Benefit

  10. JamesHoluh says:

    Многие пользователи желают выбор материала, исходя из плотности материала. Но специалисты утверждают, что такой подход – неправильный. Объясняют это тем, что одни и те же материалы с одинаковыми показателями плотности могут обладать разной теплопроводностью. Подробнее читайте на сайте [url=http://blitz-remont.ru]blitz-remont.ru[/url]

  11. ludozher says:

    The Cash-out feature of Bet365 is open in numerous markers on the site in various playing modes: pre-game, in-play, single or multiple, for an array of sports such as Basketball, Tennis, and Soccer.
    The above feature, which allows you pick the amount of your bet you wish to cash out, is applicable only in single or straight accumulator bets up to this moment. http://ludozher.info/bet365-casino-poker-e-do-desporto-aposta-revisao-do-site-como-fazer-o-login-e-obtenha-um-bonus-codigo-promocional-link.php Bet365 ’ s one-wallet system enables punters to enjoy sports betting as well as the first-class casino, poker and bingo rooms.
    If you have played at other online sports betting sites where moving money between various separate wallets is a time-consuming and confusing process, you will know the value Bet365 will bring to your experience. [url=http://ludozher.info/bet365]http://ludozher.info/bet365[/url] the rest here

  12. Justincer says:

    Конкуренцию стандартным петельным межкомнатным открывающимся конструкциям составляют более функциональные решения – сдвижные двери. Они так же включают в себя полотна из древесины или иного материала, вот только главные элементы блока движутся по прямым линиям (направляющим) параллельно стене. Читайте об этом подробнее на сайте [url=http://akro-spb.ru]akro-spb.ru[/url]

  13. MichaelMooky says:

    wh0cd1694100 [url=http://benicar4you.us.com/]benicar[/url] [url=http://cialis18.us.org/]read full article[/url] [url=http://levitra365.us.org/]levitra[/url] [url=http://phenergan4you.us.com/]phenergan 50 mg[/url] [url=http://sildenafil18.us.org/]sildenafil soft tabs[/url] [url=http://prednisone365.us.org/]prednisone[/url] [url=http://clindamycin4you.us.com/]clindamycin capsules[/url] [url=http://ventolin365.us.org/]ventolin salbutamol[/url] [url=http://diclofenac4you.us.com/]diclofenac sodium 100mg[/url] [url=http://zoloft4you.us.com/]zoloft[/url] [url=http://metformin365.us.org/]metformin hcl er[/url] [url=http://retin-a4you.us.com/]retin a micro 0.04[/url] [url=http://lexapro4you.us.com/]buy generic lexapro online[/url] [url=http://cipro4you.us.com/]citation[/url]

  14. CharlesTragE says:

    wh0cd1694100 [url=http://cialis2018.us.org/]cialis[/url] [url=http://tadalafil4you.us.com/]tadalafil[/url] [url=http://sildenafil2018.us.org/]SILDENAFIL[/url] [url=http://cialis911.us.com/]compare cialis prices[/url]