Volume-5 Issue-1

 Download Abstract Book

S. No

Volume-5 Issue-1, October 2015, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Nasser. R.A., Hee. H.C., Ervina Junaidi, Martin Anyi

Paper Title:

Hydro Rice Milling Machine

Abstract: It has been reported that 41% of the countryside and isolated areas in Sarawak which still have no electricity coverage, compared to only 10% in Peninsular Malaysia. Furthermore, most of the Sarawak rural communities are farmers and families are feeding on the harvesting of paddies. The harvesting of paddies in rural area of Sarawak is inefficiency as compared to other parts of the world due to insufficient supply of electricity. This study investigates the feasibility of of implementing hydropower generated rice milling machine in rural area of Sarawak through laboratory testing on minimum power required to run the rice milling machine and the power that can be supplied from the open channel. The results show that with the current open channel flume and the structure of the rice milling machine, it is feasible to replace traditional methods (beating or foot husk) and more modern methods (gasoline powered engine or electricity dependence rice miller) with the hydro rice milling machine.

Keywords:
   harvesting of paddies, Hydropower, Open channel, Rice milling machine.


References:

1.       Sarawak Government. (n.d.). Climate and rainfall. Available: http://www.sarawak.gov.my/web/home/article_view/159/176/
2.       S. K. Goyal, S. V. Jogdand, A. K. Agrawal. (2012). Energy use pattern in rice milling industries – a critical appraisal. Journal of Food Science and Technology. Columbia: Springer Science & Business Media, 2012.

3.       M. H. Chaudhry. Open channel flow. Columbia: Springer Science & Business Media, 2007.

1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

A. Chennakesava Reddy

Paper Title:

Effects of Adhesive and Interphase Characteristics between Matrix and Reinforced Nanoparticle of AA2124/AlN Nanocomposites: Mathematical and Experimental Validation

Abstract: Interphase around the reinforcement has significant influence on the interfacial stress, displacement and stiffness of composites. In this article two types of RVE models have been implemented using finite element analysis. Aluminum nitride nanoparticles were used as a reinforcing material in the matrix of AA2124 aluminum alloy. It has been observed that the nanoparticle did not overload during the transfer of load from the matrix to the nanoparticle via the interphase due to interphase between the nanoparticle and the matrix. The maximum tensile strengths of AlN/AA2124 nanocomposite have been found 535.40 MPa without interphase and 561.57 MPa with interphase. The transverse modulus has been established lower than the longitudinal modulus of AA2124/AlN nanocomposites. The results obtained from the finite element analysis were validated with mathematically derived and experimental results.

Keywords:
RVE models, AlN nanoparticle, AA2124, finite element analysis, interphase, transverse modulus.


References:

1.        Chennakesava Reddy, “Mechanical properties and fracture behavior of 6061/SiCp Metal Matrix Composites Fabricated by Low Pressure Die Casting Process,” J. Manuf. Technol. Res., vol.1 (3/4), 2009, pp. 273-286.
2.        A.Chennakesava Reddy and Essa Zitoun, “Tensile properties and fracture behavior of 6061/Al2O3 metal matrix composites fabricated by low pressure die casting process, Int. J. Mater. Sci., vol.6(2), 2011, pp. 147-157.

3.        X. Deng and N. Chawla, “Modeling the effect of particle clustering on the mechanical behavior of SiC particle reinforced Al matrix composites,” J. Mater. Sci., vol.41, 2006, pp.5731–5734.

4.        A.J.Reeves, H.Dunlop and T.W. Clyne, “The effect of interfacial reaction layer thickness on fracture of titanium–SiC particulate composites,” Metall. Trans. A, vol.23, 1992, pp.977–88.
5.        Kotiveerachari and A. Chennakesava Reddy, “Interfacial effect on the fracture mechanism in GFRP composites,} CEMILAC Conference, Ministry of Defense, India. 1999, 1(b), pp.85-87.
6.        Chennakesava Reddy, Analysis of the Relationship Between the Interface Structure and the Strength of Carbon-Aluminum Composites, NATCON-ME, Bangalore, 13-14th March, 2004, pp.61-62.

7.        S. Ren, X. Shen, X. Qu and X. He, “Effect of Mg and Si on infiltration behavior of Al alloys pressureless infiltration into porous SiCp preforms,” Int. J. Miner. Metall. Mater. Vol.18 (6), (2011, pp.703–708.

8.        N. Sobczak, M. Ksiazek, W. Radziwill, J. Morgiel, W. Baliga, and L. Stobierski, “Effect of titanium on wettability and interfaces in the Al/ SiC system,” in: Proceedings of the International Conference High Temperature Capillarity, Cracow, Poland, 29 June–2 July 1997.

9.        A.M. Davidson and D. Regener, “A comparison of aluminium based metal matrix composites reinforced with coated and uncoated particulate silicon carbide. Compos. Sci. & Technol., vol.60(6), 2000, pp.865-869.

10.     M. Romanowicz, “Progressive failure analysis of unidirectional fiber-reinforced polymers with inhomogeneous interphase and randomly distributed fibers under transverse tensile loading,” Compos. A, vol.41, 2010, pp.1829-1838.

11.     R. Hill, “Elastic properties of reinforced solids: some theoretical principles,” J. Mech. Phys. Solids, vol.11, 1963, pp.357-372.

12.     Y.J. Liu and X.L. Chen, “Evaluations of the effective material properties of carbon nanotube-based composites using a nanoscale representative volume element,”
Mech. Mater., vol.35, 2003, pp.69–81.

13.     Chennakesava R Alavala,   “Finite element methods: Basic concepts and applications,” PHI Learning Pvt. Ltd., New Delhi, 2008.

14.     Chenna kesava Reddy, “Cause and Catastrophe of Strengthening Mechanisms in 6061/Al2O3 Composites Prepared by Stir Casting Process and Validation Using FEA,” Int. J. Sci. & Res., vol.4(2), 2015, pp.1272-1281.

15.     Chennakesava Reddy, “Influence of Particle Size, Precipitates, Particle Cracking, Porosity and Clustering of Particles on Tensile Strength of 6061/SiCp Metal Matrix Composites and Validation Using FEA,” Int. J. Mater. Sci.& Manuf. Eng., vol.42(1), 2015, pp. 1176-1186.

16.     Zhengang Liuy, Guoyin Zu, Hongjie Luo, Yihan Liu and Guangchun Yao, “Influence of Mg Addition on Graphite Particle Distribution in the Al Matrix Composites,” J. Mater. Sci. & Technol., vol.26 (3), 2010, pp.244-250.

17.     Chennakesava Reddy and Essa Zitoun, “Matrix alloys for alumina particle reinforced metal matrix composites,” Indian Foundry J., vol.55 (1), 2009, pp.12-16.

18.     Z. Hashin, “Thermoelastic Properties of Fiber Composites With Imperfect Interface,” Mech. of Mater., vol. 8, 1990, pp. 333-348.

19.     C.M. Landis and R.M. McMeeking, “Stress concentrations in composites with interface sliding, matrix stiffness, and uneven fiber spacing using shear lag theory, “. Int. J. Solids Structures, vol.41, 1999, pp. 6289-6313.

5-12

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

David R. Tuigong, Thomas K. Kipkurgat

Paper Title:

Viability of Using Solar Photovoltaic Systems in Textiles Industries in Kenya: a Case of Rivatex East Africa Limited

Abstract: The low supply and the high cost of electricity create a huge gap between demand and supply in Kenya, making industries to look for alternative ways of generating cheap and renewable power. This paper attempts to identify the challenges and drivers of the using solar photovoltaic system in textiles industries with a case of Rivatex East Africa Limited. The study adopted a qualitative research method in order to achieve the intended objectives. Data was collected using interviews. The findings indicates that for textiles industries to operate optimally and cut down on the production cost, there is need for alternative means of generating power and one of the options is to purchase and install solar PVC’s. Another factor that motivates the textiles industry to invest on PVC is the sustainability that solar energy creates. The study also reveals that inadequate policies to encourage subsidies by the government, high cost of installation, challenges to access funding, high and fluctuating interest rates for loans to invest on renewable technology were identified as the major barriers to industries adapting to solar energy. Furthermore, the study revealed other barriers such as lack of awareness and inappropriate information concerning solar energy coupled with poor implementation of policies were also factors that were identified in the study. The study recommends that appropriate structures and policies that encourage subsidies for industries to be put in place to encourage such industries to invest in renewable energy. The government should also give support to industries in terms of funding renewable energy investments.

Keywords:
 Renewable energy, Textiles industries, Photovoltaic, Rivatex, Solar energy


References:

1.        Chaurey A., Kandpal T., (2010). Assessment and evaluation of PV based decentralized rural electrification: and overview. Indian institute of Technology. Renewable and sustainable Energy Reviews Volume 14, Issue 8, pp 2266-2278.
2.        Duffie, J.A., Beckman, W.A. (1991). Solar Engineering of Thermal Processes, John Wiley and Sons, New York.

3.        GOK (Government of Kenya). (2011). Scaling-Up Renewable Energy Program (SREP):               Investment Plan for Kenya. Government Printer, Nairobi.

4.        Haar, N. & Theyel, G. (2006). U.S. electric utilities and renewable energy: drivers for adoption. International Journal of Green Energy, 3,271-28.

5.        Kirui, H. W. (2006). Assessment of Solar and Wind Energy Potential in the Central Rift Valley of Kenya. M.Sc Thesis. Egerton University, Kenya.

6.        Martinot, E. & McDoom, O. (1999). Promoting Energy Efficiency and Renewable       Energy: GEF Climate Change Projects and Impacts Washington, DC.: Global Environmental Facility.

7.        Neville, R. C., (1995). Solar Energy Conversion. Elsevier Science B. V. Publishers, Netherlands.

8.        Randolph J., Masters G. (2008). Energy for sustainability: Technology, Planning,        Policy. Island Press.

13-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Amit J. Modak, H. P. Inamdar

Paper Title:

Optimal Simulated Design of RBF Neural Network Classifier Block for Assessment of State of Degradation in Stator Insulation of Induction Motor

Abstract: In the present work the design of discrete ‘ANN’ simulation model is done for the classification and qualitative assessment of the state of degradation of insulation in the respective phases of three-phase ac induction motor. The extraction of mathematical parameters of stator current data pattern, which are simulating the specific state of degradation of insulation based on Park’s current transformation model, are presented in the previous research papers. The methodology adopted towards the optimal design process of the discrete neural network classifier blocks of discrete ‘ANN’ simulation model , which are designed on the basis of  ‘radial basis function’ (RBF) type of neural network architecture for the qualitative assessment of the state  of degradation of stator insulation is described in the present research paper.

Keywords:
induction motor, stator insulation, radial basis function, artificial neural network, Park’s current transformation


References:

1.        G. C. Stone, H. G. Sedding, B.A. Lloyd and B.K. Gupta, “The ability of diagnostic tests to estimate the remaining life of stator insulation,” IEEE Trans. Energy Conversion, vol.3, no.4, Dec.1988, pp. 833 – 841.
2.        Yoshida, H. and K. Umemoto, “Insulation Diagnosis for Rotating Machine Insulation,” IEEE Trans. Electrical Insulation, vol. 21, no.6, Dec. 1986, pp. 1021-1025.

3.        Tsukui, T., M. Takamura and Y. Kako, “Correlations between Nondestructive and Destructive Tests on High-Voltage Coil Insulations for Rotating Machines,” IEEE Trans. Electrical Insulation, vol. 15, no. 2, April 1980, pp. 118-124.

4.        A.J. Modak and H.P. Inamdar, “Performance Evaluation of Computer Simulated Extracted Features of Induction Motor with Intermediate State of Degradation Present in Any One-Phase,” International Journal of Applied Information Systems (IJAIS), Foundation of Computer Science FCS, New York, USA vol. 1, no.2, January 2012, (ISSN : 2249-0868)

5.        A.J. Modak and H.P. Inamdar, “Performance Evaluation of Computer Simulated Extracted Features of Induction Motor with Healthy State of Insulation Present in Any Two-Phases,” International Journal of Computer and Electrical Engineering (IJCEE), International Association of Computer Science and Information Technology Press (IACSIT), Singapore, vol.4, no.1, February 2012, pp. 65-74, DOI:10.7763/IJCEE.2012.V4.453, (ISSN: 1793-8163)

6.        A.J. Modak and H.P. Inamdar, “Computer Simulated Extracted Parameters of Induction Motor for Unequal Variation in State of Degradation of Insulation in all Three-phases,” Proc. 7th IEEE Int. Conf.  Industrial Electronics and Applications (ICIEA), Singapore, July 2012, pp. 1229-1235, IEEE Catalog Number: CFP1220A-CDR,
(ISBN: 978-1-4577-2119-9/12)

7.        [NEUROSOLUTIONS, 5.0]:  NEUROSOLUTION Version 5.0,http:// www.neurosolutions.com, NeuroDimension, Inc. 3701 NW 40th Terrace, Suite 1, Gainesville, FL 32606.

17-27

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Malini S, Lizy Abraham, R.S. Moni

Paper Title:

Multiresolution Color Denoising using Biorthogonal Wavelets for Satellite Images

Abstract: Satellite images are required to be of high quality since most of the databases created by different countries are using the images especially for Geographical Information System (GIS) applications and military purposes. Recently available high resolution multi spectral imaging sensors facilitate greatly the process of feature extraction which is given as the input to the database systems. But because of the sensor vibrations, different angle of inclinations, influence of clouds & shadows and many unwanted factors create noise in satellite images which ultimately affects the quality of feature extraction process. In this paper a novel method of multiresolution colour image denoising using bi-orthogonal wavelets is discussed. The method is compared with other orthogonal wavelet denoising schemes and existing techniques based on patch processing. Experimental analysis and visual inspection of images validates the superior performance of the proposed method.

Keywords:
 Multispectral, Biorthogonal, Daubechies, Decomposition, Multispec32, Quality Measures


References:

1.       S. Shrestha, “Image Denoising using New Adaptive based Median Filter”, An International Journal of Signal & Image Processing (SIPIJ), Vol.5, NO.4, PP. 1-13, Aug. 2014.
2.       V. Govindaraj and G. Sengottaiyan, “Survey of Image Denoising using Different Filters”, International Journal of Science, Engineering and Technology Research (IJSETR), Vol.2, NO. 2, pp. 344-351, Feb.2013.

3.       B. K. Shreyamsha Kumar, “Image Denoising based on Gaussian/Bilateral Filter and its Method for Noise Thresholding”, Signal, Image and Video Processing , Springer, vol.7, no.6, pp 1159-1172, 2012.

4.       Huaibin Wang, Yuanquan Wang and Wenqi Ren, Image Denoising Using Anisotropic Second and Fourth Order Diffusions Based on Gradient Vector Convolution, ComSIS, Vol. 9, No. 4, Special Issue, pp.1493-1511, Dec.2012.

5.       Seongjai Kim and Hyeona Lim, “Fourth Order Partial Differential Equations for Effective Image Denoising”,  Seventh Mississippi State – UAB Conference on Differential Equations and Computational SIMULATIONS, Conf. 17, PP. 107–121, 2009.

6.       Norouzi, M. Shafry, M.Rahim, A. Altameem, T. Saba, A. Rad, A. Rehman and M. Uddin, “Medical Image Segmentation Methods, Algorithms, and Applications”, IETE Journal of Technical Review, vol.31, no. 3, pp. 199-213,  June 2014.

7.       D. Radford,A. Kurekin, D. Marshall and K. Lever, ”A New DCT-based Multiresolution Method for Simultaneous Denoising and Fusion of SAR Images,” 9th
International Conf. on Information Fusion,Florence, pp. 1-8, 2006.

8.       S. Kother Mohideen, S. Arumuga Perumal, and M. Mohamed Sathik, “Image De-noising using Discrete Wavelet Ttransform”, IJCSNS International Journal of Computer Science and Network Security, VOL.8, No.1, pp. 213-216, Jan.2008.

9.       J. N. Ellinas, T. Mandadelis, A. Tzortzis and L. Aslanoglou, “Image De-noising using Wavelets”, T.E.I. of Piraeus Applied Research Review, vol. IX, no. 1, pp. 97-109, 2004.

10.    L. Abraham and M.  Sasikumar, “Analysis of Satellite Images for the Extraction of Structural Features”, IETE Journal of Technical Review, pp. 118 – 127, vol.31, no.2, APRIL 2014.

11.    M. Vijay and L. Saranya Devi, “Speckle Noise Reduction in Satellite Images Using Spatially Adaptive Wavelet Thresholding”, International Journal of Computer Science and Information Technologies, Vol. 3, NO. 2, PP. 3432-3435, 2012.

12.    Parthasarathy Subashini and Marimuthu Krishnaveni, “Image Denoising Based on Wavelet Analysis for Satellite Imagery, Advances in Wavelet Theory and Their Applications in Engineering, Physics and Technology, Dumitru Baleanu (Ed.), ISBN: 978-953-51-0494-0, INTECH., PP. 449-474, 2012.

13.    Dabov, A. Foi, V. Katkovnik, and K. Egiazarian, “BM3D Image denoising by 3D transform-domain collaborative Filtering”, IEEE Trans. Image Processing, vol. 16, no. 8, pp.2080-2095,  Aug. 2007.

14.    Rajwade,  A. Rangarajan  and A. Banerjee., “Image Denoising Using the Higher Order Singular Value Decomposition”, IEEE Trans. Pattern Analysis and Machine Intel., vol.35 ,  no.4, pp.849 – 862, April 2013.

15.    Kugu, E. , “Satellite Image Denoising using Bilateral Filter with SPEA2 Optimized Parameters”, 6th International Conference on Recent Advances in Space Technologies (RAST), pp. 217 – 223, 2013.

16.    T. Sree Sharmila, K. Ramar, “Efficient Analysis of Hybrid Directional Lifting Technique for Satellite Image Denoising”, Signal, Image and Video Processing , Springer, vol. 8, no. 7, pp. 1399-1404, Aug.2012.

17.    Daubechies, “Ten Lectures on Wavelets”, CBMS, SIAM, 61, 1994.

18.    S.V.Narasimham, Nandini Bazumallick & S. Veena, “Introduction to Wavelet Transform: A Signal Processing Approach”, Naroza Publishing House, New Delhi, 2011.

19.    http://cobweb.ecn.purdue.edu/~biehl/MultiSpec

20.    Nai-Xiang Lian, Zagorodnov, V., Yap-Peng Tan, “Color Image Denoising using Wavelets and Minimum Cut Analysis”, IEEE Signal Processing Letters, vol.12 , no.11 , pp.741 – 744, Nov. 2005.

21.    Chang, S.G.,Bin Yu, Vetterli, M., “Adaptive Wavelet Thresholding for Image Denoising and Compression”, IEEE Trans.Image Processing, vol.9 , no.9, pp.1532 – 1546, Sept. 2000.

22.    Z. Wang, A. C., Bovik, H. R., Sheikh & E. P. Simoncelli, “Image quality assessment: From error visibility to structural similarity”, IEEE Transactions on Image
Processing, vol. 13, no. 4, pp. 600-612, Apr. 2004.

23.    Janwei Ma & Gerlind Plonka, “The Curvelet Transform”, IEEE Signal Processing Magazine, pp.118-133, March 2010.

28-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

ASM Delowar Hossain

Paper Title:

Consolidation of Accreditation Activities to Improve Assessment of Student Learning Outcomes in Technical Disciplines

Abstract: Lack of coordination in accreditation activities results in assessment being a burdensome and inefficient process. This work emphasizes the need of a preemptive and coordinated effort to consolidate various accreditation activities to make the assessment process more streamlined and efficient within the context of technical discipline. Specifically, this work demonstrates common grounds of assessment activities between the regional standards and ABETS accreditation criteria to attain assessment efficiency.

Keywords:
Assessment, Accreditation, Engineering Education


References:

1.        http://chea.org/pdf/Overview%20of%20US%20Accreditation%2003.2011.pdf
2.        http://ope.ed.gov/accreditation/FAQAccr.aspx

3.        http://www.50states.com/college-resources/accreditation.htm#.VRcAdNgtH_s

4.        The Chronicle of Higher Education Almanac, Issue 2010-2011, August 27, 2010

5.        http://www.chea.org/pdf/2014-2015_Directory_of_CHEA_Recognized_Organizations.pdf, 2014

6.        www.msche.org

7.        http://www.abet.org/accrediation

8.        http://www.abet.org/uploadedFiles/Accreditation/Accreditation_Step_by_Step/Accreditation_Documents/Current/2014_-_2015/T001%2014-15%20ETAC%20Criteria%2010-26-13.pdf, 2014

9.        Kuh, G. D., & Ikenberry, S. O., “More than you think, less than we need:  Learning outcomes assessment in American higher education”, Urbana, IL: University of Illinois and Indiana University, National Institute for Learning Outcomes Assessment, October 2009.

10.     “2011 outcomes assessment accreditation handbook”, http://atmae.org/index.php?option, October 24, 2011

11.     Middle States Commission on Higher Education (MSCHE), “Characteristics of excellence in higher education: Requirements of affiliation and standards for accreditation”, http://www.msche.org/publications/CHX06_Aug08REVMarch09.pdf, 2009

12.     Brumm, T., Mickelson, S., Steward, B., & Kaleita, A, “ Competency-based outcomes assessment for agricultural engineering programs. International Journal of Engineering Education”, 22(6), 1163–1172, 2006.

35-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Lakshmi HV

Paper Title:

Detection of Intrusion and Honey Net Architecture Approach to Defend in Virtual Network Systems

Abstract: Security in cloud is one of the most important issues that drawn interest of research and development in past years. Hackers can explore vulnerabilities of cloud system and to deploy large-scale Distributed Denial-of-Service they compromise virtual machines. Distributed Denial-of-Service attacks involve early stage actions as multi-step exploitation, less frequency vulnerability scanning, and compromising insecure virtual machines, and Distributed Denial-of-Service attacks through the compromised VMs. In cloud system, the detection of zombie attacks is difficult. Because users may install insecure applications on their VMs to avoid insecure virtual machines from being compromised in the cloud, we propose a multi-phase distributed vulnerability finding, and Honey Net approach to fight back the attack. Honeypot is a data system resource and its value lies in unauthorized use of that resource of system. Honey nets are “a security resource whose value lies in being attacked”. Honeypots and honey nets are used to collect data about threats that organizations might face and hence protect them.

Keywords:
 Network Security, Honey Pot, Honey Net, Cloud Computing, Intrusion Detection

References:

1.        Cloud Security Alliance, “Top threats to cloud computing v1.0,”  https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, March 2010.
2.        M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Kon- winski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” ACM Commun., vol. 53, no. 4, pp. 2010.

3.        R.Thomas, B. Mark, T. Johnson. NetBouncer: client-legitimacy- based high-performance DDoS filtering [J]. In Pro of DARPA information Survivability Conference and Exposition. Washington, DC, 2003:14-25.

4.        T. Peng, C, Leckie, K. Ramamohanarao. Protection from distributed denial of service attacks using history-based IP filtering [J]. In Pro of IEEE International Conference on Communications (ICC03), Anchorage, Alaska, USA, 2003:482-486.

5.        Zhu Ge Jianwei. Honeypot and honeynet technology description [J].Peking University Institute of Computer Technology, 2006.

6.        Shi Weiqi, Chengjie Ren. Honeypot technologies and applications[J]. Computer Engineering and Design, 2008,29 (22) :5725-5728.

7.        J. Mirkovic, G. Prier, P. Reiher. Source-end DDoS defense [J]. In Pro of IEEE International Symposium on Network Computing and Applications (NCA2003). Ca mbridge, Massachusette, 2003:171-178.1989.

8.        Yang Shangsen, Hu Bei. Based on Intrusion Deception active honeypot technology system design [J]. Computer Applications and Software, 2008,25 (1) :259-260.

38-40

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

M. Jagannadha Rao, B. Gopal Krishna

Paper Title:

Synthesis of Copper Silicate (CuSiO3.H2O) using Copper Oxide, Quartz and Microbes

Abstract: Microbes like bacteria, algae, fungi and virus play an important role to catalyst chemical reactions. In Nature, ores or minerals of different compounds are formed due to microbial environment and other factors like weathering. Microbial environment is also instrumental in forming copper containing silicate minerals. Chemical reactions occur under microbial environment because microbes have the ability to control or modify different factors like pH, chemical potential and temperature during reactions. In this paper, synthesis of copper silicate (CuSiO3.H2O) using copper oxide (CuO) and quartz (SiO2) under microbial environment in the laboratory is being adopted to produce the material. XRD technique is used to confirm the formation of CuSiO3.H2O.

Keywords:
 Copper oxide, Quartz, CuSiO3, microbes, XRD

References:

1.        R . M .Atlas, and R . Bartha, Microbial ecology. Fundamentals and Applications. Benjamin/Cumming Pub. Co., Inc.,1998.
2.        L .Bhatnagar, and B . Z .Fathepure, Mixed cultures in Detoxification of hazardous   waste. In: Mixed Cultures in Biotechnology, Zeikus, G. and Johnson, E. A., eds., McGraw-Hill, Inc. ,   p. 293-340,  1991.

3.        T.D. Brock, Biology of Microorganisms. 2/e. Prentice-Hall, Englewood Cliffs, NJ.,1974.

4.        E.S. Deevey Jr., Mineral cycles. Sci. Amer., 223(3) , p.149-158, 1991.

5.        R.L. Dimmick, H. Wolochow, and M.A. Chatigny, Evidence that bacteria can form new cells in airborne particles. Appl. Environ. Microbiol., 37, p.924-927, 1979.

6.        P.N. Hobson, and N.J.Poole, In: Microorganisms in action: Concepts and applications in Microbial Ecology. Blackwell Sci. Pub., Oxford.,  p.302, 1988.

7.        W.E. Krumbein, On the precipitation of aragonite on the surface of marine bacteria. Naturwissenschafen., 61, p.167, 1970.

8.        S.I. Kuznetsov, M.V. Ivanov, and  N.N. Lyalikova, Introduction to Geological Microbiology. McGraw Hill, New York., p. 26, 1963.

9.        R. Lynd Lee, J. Weimer Paul, H. van Zyl Willem,  and S. Pretorius Isak, Microbial Cellulose Utilization: Fundamentals and Biotechnology. Microbiol. Mol. Biol. Rev., 66 (3), p.506-577, 2000.

10.     R.Y. Morita, Calcite precipitation by marine bacteria. Geomicrobiol. J., 2 , p. 63-82, 1980.

11.     D.M. Webley, R .B. Duff, and W.A. Mitchell,  A plate method for studying the breakdown of synthetic and natural silicates by soil bacteria. Nature , 188,  p.766-767, 1960.

12.     T. Yanagita, Natural Microbial Communities: Ecological and physiological features. Japan Sci. Soc. Press, Tokyo and Spriger-Verlag, Berlin,  p. 417-425, 1990.

13.     R .H. Sillitoe,  Epochs of intrusion-related copper mineralization in the Andes: Journal of South American Earth Sciences, 1,  p. 89–108, 1988.

14.     R.H. Sillitoe, Supergene oxidized and enriched porphyry copper and related deposits: Economic geology, 100 , p. 723–768, 2005.

15.     R.H. Sillitoe, Studies on the controls and mineralogy of the supergene alteration of copper deposits, northern Chile: [Dissertation], London, England, University College London,,p.498, 1969.

16.     C. Mortimer, The Cenozoic history of the southern Atacama desert, Chile: London, Journal of the Geological Society, 129, p. 505–526, 1973.

17.     A.H. Clark, R.M. Tosdal, E. Farrar, and V.A. Plazolles, Geomorphologic environment and age of supergene enrichment of the Cuajone, Quellaveco, and  
Toquepala porphyry copper deposits, southeastern Peru: Economic geology, 85 ,  p.1604–1628, 1990.

18.     D.W. Newberg, Geochemical implications of chrysocolla-bearing alluvial gravels: Economic geology, 62 ,p. 932–956, 1967.

19.     D.B. Johnson, and K.B. Hallberg, The microbiology of acidic mine waters: Research in Microbiology, 154, p. 466–473, 2003.

20.     D.L. Kelley, K.D. Kelley,  W.B. Coker,  B. Caughlin, and M.E. Doherty,  Beyond the obvious limits of ore deposits: The use of mineralogical geochemical, and biological features for the remote detection of mineralization, Economic geology, 101 ,  p. 729–752, 2006.

21.     M.J. Pemberton, and R . Schmidt, Catabolic Plasmids, Encyclopedia of Life Sciences, John Wiley & Sons, Ltd.,2001.

22.     Svetlozar Velizarov, Electrical and Magnetic fields in microbial biotechnology: possibilities, limitations and perspectives, Electro and  Magnetobiology, 18(2) , p.185-212, 1999.

23.     Lukas Fojt, Ludek  Strasak, Vladimir  Vetterl , and Jan Samarda,  Comparison of the low-frequency magnetic field effects on bacteria Escherichia coli, Leclercia adecarboxylata and Staphylococcus aureus, Bioelectrochemistry, 63,  p.337– 341, 2004.

24.     S.R. Gopishetty, M.T. Louie, and M.V. Subramanian, Microbial Transformations of Natural Products, Phytochemistry and pharmacognosy, Encyclopedia of life support systems.

25.     Mohamed,S. Mervat, Degradation of methomyl by the novel bacterial strain Stenotrophomonas maltophilia M1, Electronic Journal of Biotechnology, 12 ()2009.

26.     Naama Shlomovitch, Miryam Bar Matthews, Amit  Segev, and Alan Matthews,  Sedimentary and epigenetic copper mineral assemblages in the Cambrian Timna Formation, southern Israel, Isr. J. Earth Sci., 48,  p.195–208, 1999.

27.     J.E. Bailey, and D.F. Ollis,  Biochemical Engineering Fundamentals, McGraw-Hill, New York, 1986.

28.     E.H. Battley,  Energetics of Microbial Growth, Wiley, NewYork, 1987.

29.     P.L. McCarty,  Stoichiometry of biological reactions, , Prog. Water Technol., 7, pp.157-172.

41-44

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Christy James Jose, Jijo Francis, Rajasree M.S

Paper Title:

Digraph Approximation with an Adaptation Technique for Mobile User Authentication through Keystroke Dynamics

Abstract: Mobile devices have evolved at a proliferating rate and are now used in almost all aspects of life. With these the ability to store potentially private or sensitive information on these devices has also increased. Hence an intrusion detection and prevention system is a necessity for preserving the confidentiality and integrity of users. Keystroke dynamics which refers to detailed typing pattern of a person is used to model user behavior and use the so formed footprint for user identification and intrusion detection. A neural network based system using monograph and digraph timings with digraph approximation and adaptation technique is proposed for keystroke dynamics in mobile devices for free text data.  With adaptation mechanism, the missing monographs and digraphs and also the time bound variations of user keystroke time variations are captured and adapted. The combined use of digraph approximation and adaptation yields a False Acceptance Rate (FAR) and False Rejection Rate (FRR) of 0% for 22 users. The impact of adaptation on other performance measures like accuracy, specificity, sensitivity and Mean Square Error(MSE) is also studied.

Keywords:
 Keystroke Dynamics, Intrusion Detection, Adaptation Mechanism, Keystroke Authentication

References:

1.           G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),”  in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.           Canalys, “Smart phones overtake client PCs in 2011”, http://www.canalys.com/newsroom/smart-phones-overtakeclient-pcs-2011 , Feb. 2012.

3.           Kruegel, Christopher, Fredrik Valeur, and Giovanni Vigna, “Intrusion detection and correlation: challenges and solutions”, Vol. 14, Springer Science & Business Media, 2005.

4.           Clarke, Nathan L., and Steven M. Furnell. “Authentication of users on mobile telephones–A survey of attitudes and practices.” Computers & Security 24, no. 7 (2005): 519-527.

5.           Boatwright, Michelle, and Xin Luo. “What do we know about biometrics authentication?.” In Proceedings of the 4th annual  conference on Information security curriculum development, p. 31. ACM, 2007.

6.           Gaines, R. Stockton, William Lisowski, S. James Press, and Norman Shapiro. “Authentication by keystroke timing: Some preliminary results”, No. RAND-R-2526-NSF. RAND CORP SANTA MONICA CA, 1980.

7.           Deutschmann, Ingo, Peder Nordstrom, and Lina Nilsson. “Continuous authentication using behavioral biometrics.” IT Professional 15, no. 4 (2013): 12-15.

8.           Monrose, Fabian, and Aviel Rubin. “Authentication via keystroke dynamics.” In Proceedings of the 4th ACM conference on Computer and communications security, pp. 48-56. ACM, 1997.

9.           Robinson, John, Vicky M. Liang, J. Chambers, and Christine L. MacKenzie. “Computer user verification using login string keystroke dynamics.” Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on 28, no. 2 (1998): 236-241.

10.        Monrose, Fabian, and Aviel D. Rubin. “Keystroke dynamics as a biometric for authentication.” Future Generation computer systems 16, no. 4 (2000): 351-359.

11.        Ahmed A. Ahmed and Issa Traore, “Biometric Recognition based on free-text Keystroke Dynamics”, IEEE transactions on cybernetics, vol. 44, no. 4, April 2014, 458-472.

12.        Araújo, Lívia CF, Luiz HR Sucupira, Miguel Gustavo Lizarraga, Lee Luan Ling, and João Baptista T. Yabu-Uti. “User authentication through typing biometrics features.” Signal Processing, IEEE Transactions on 53, no. 2 (2005): 851-855.

13.        Campisi, P., E. Maiorana, M. Lo Bosco, and A. Neri. “User authentication using keystroke dynamics for cellular phones.” Signal Processing, IET 3, no. 4 (2009): 333-341.

14.        Pedernera, Gissel Zamonsky, Sebastian Sznur, Gustavo Sorondo Ovando, Sebastían García, and Gustavo Meschino. “Revisiting clustering methods to their application on keystroke dynamics for intruder classification.” In Biometric Measurements and Systems for Security and Medical Applications (BIOMS), 2010 IEEE
Workshop on, pp. 36-40. IEEE, 2010.

15.        Obaidat, M. S., and D. T. Macchairolo. “A multilayer neural network system for computer access security.” Systems, Man and Cybernetics, IEEE Transactions on 24, no. 5 (1994): 806-813.

16.        Obaidat, Mohammad S., and Balqies Sadoun. “Verification of computer users using keystroke dynamics.” Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 27, no. 2 (1997): 261-269.

17.        Syed, Zahid, Sean Banerjee, and Bojan Cukic. “Leveraging variations in event sequences in keystroke-dynamics authentication systems.” In High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on, pp. 9-16. IEEE, 2014.

18.        Chang, J. Morris, Chi-Chen Fang, Kuan-Hsing Ho, Nicholas Kelly, Pei-Yuan Wu, Yixiao Ding, Chris Chu, Stephen Gilbert, Ahmed E. Kamal, and Sun-Yuan Kung. “Capturing cognitive fingerprints from keystroke dynamics.” IT Professional 15, no. 4 (2013): 24-28.

45-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Davood Kaviani, Majid Saghi, Maryam Sabonian, Mohammad Hosein Bigtan, Behzad Padidaran a

Paper Title:

Orthogonal Array Design for the Optimization of Solvent-Assisted Dispersive Solid Phase Extraction for the Determination of Copper Ions in Water and Vegetable Food Samples using Flame Atomic Absorption Spectrometry

Abstract: A simple and efficient dispersive solid -phase micro extraction technique was developed and combined with flame atomic absorption spectrometry, for the extraction and determination of trace amounts of copper in real samples.2-(5Bromo-2-pyridylazol)-5-(diethyl amino)-phenol (5-Br-PADAP) was used as chelating agent and banzophenon was selected as extraction solvent. Several possible influential factors such as the type and amount of extraction solvent, amount of autistic agent, sample pH, were optimized using orthogonal array design (OAD) with OA16(4)5 matrix. Under optimum conditions, an enrichment factor of 13 was obtained. The analytical curves were linear between 5-2000 μg L-1. Based on three SD of the blank, the detection limits was 1.2 μg L-1. The relative SDs for eight replicate measurements of 100 μg L-1 of metal ions was 3.2%. The proposed method was successfully applied for determination of copper in environmental waters and some vegetable samples including Pepper, Tomato, Thyme, Aloe vera gel, Morus.

Keywords:
Solvent-assisted dispersive solid phase extraction, Copper (II), Flame atomic absorption spectrometry, Food and environmental water samples.

References:

1.           C.L. Arthur, Pawliszn, Anal. Chem., 62 (1990) 2145.
2.           J. Pawlyszyn, Anal. Chem., 75 (2003) 2543.

3.           J. Pawlyszyn, Anal. Chem., 75 (2003) 2543.

4.           S.B. Hawthorne, Anal. Chem., 62 (1990) 633 A.

5.           Robert L. Grob, Eugene F. Barry, Modern practice of gas chromatography, Fourth edition, John Wiley & Sons, Inc, 2004.

6.           J.L.Manzoori , A.Bavili.Tabrizi , J.Anal.Chem. , 470(2002) 2150.

7.           M. A, Jeannot. F.F. Cantwell, Anal. Chem., 71 (1999) 388.

8.           Y. He, H.K. Lee, Anal. Chem, 69 (1997) 4634.

9.           H. Lui, P.K. Dasgupta, Anal. Chem, 68 (1996) 1817.

10.        M.A, Jeannot. F.F. Cantwell, Anal. Chem., 68 (1996) 2236.

11.        H. Lord, J. Pawlyszyn, J. Chromatogr, A 902 (2000) 17.

12.        M. A, Jeannot. F.F. Cantwell, Anal. Chem., 70 (1999) 3912.

13.        Francisco Pena-Pereir, Isela Lavill, Carlos Bendicho, Miniaturized preconcentration methods based on liquid–liquid extraction and their application in inorganic ultratrace analysis and speciation: A review, Spectrochimica Acta Part B 64 (2009) 1–15.

14.        Zhefeng Fan, Xuejuan Liu, Determination of methylmercury and phenylmercury in watersamples by liquid–liquid–liquid microextraction coupledwith capillary electrophoresis, Journal of Chromatography A, 1180 (2008) 187–192.

15.        YanLiu,Yuki Hashi, Jin-Ming Lin,Continuous-flow icroextraction and gas romatographic –massspectrometricdetermination of polycyclic aromatichydrocarbon compounds in water, Analytica Chimica Acta 585 (2007) 294–299.

16.        H. Kataoka, H.L. Lord, J. Pawlyszyn, J. Chromatogr., A 880 (2000) 35.

17.        M .Otto, Chemoetrics:Statistical andcomputer Application in Analytical Chemistry ,Johnwiley ,Newyork,1999.

18.        K.Goto,Y.Fukue.H.Watanabe,Talanta ,24(1977)752.

19.        H.Watanabe,H.Talanta, 25(1978)585.

20.        H.Watanabe,Solution behavior of surfactants,Plenmun Press, New York, USA, 1982.

21.        E.Pelizzetti,E.Parmaua,Anal.Chim.Acta,169(1985)1.

22.        Y.Wang, Y.C. Kwok, Y. He, H.K. Lee, Anal. Chem., 70 (1998) 4610.

23.        E.K.Paleogos, D.L.Giokas, M.I.Karayannis, Trend , Anal .Chem, 24(2005)426.

24.        M. A, Jeannot. F.F. Cantwell, Anal. Chem., 71 (1999) 388.

25.        W. Liu, H.K . Lee. Anal. Chem., 72 (2000) 4462.

26.        Z. Mester, R. Sturgeon, J. Pawliszyn, Spectrochim Acta part B 56 (2001) 233.

27.        Przyjazny, J.M. Kokosa, J. Chromatogr., A 977 (2002) 143.

52-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Jeewan V. Tirkey, Amar Kumar Singh, S. K. Shukla

Paper Title:

Performance and Emission Characteristics of CI Engine Operated with Waste Cooking oil Methyl-Ester and Diesel Blends

Abstract: Biodiesel from bio-oils are considered as the promising renewable alternative fuel for CI engine. However the damped waste cooking oil poured in the earth is one of the contributors of water and environmental pollution. In this study, biodiesel from waste cooking oil (WCO) is produced by transesterification reaction and blended with diesel fuel (B10, B20, B30, B40, B50). These blends were tested in single cylinder, 4-stroke, water cooled  CI engine at different loads with 1500rpm constant engine speed to evaluate the performance and emission characteristics. Performance study contains brake thermal efficiency, specific fuel consumption while emission study consider NOx, CO, CO2 emission. During experimentation it was found that an increase of load leads to increase of brake thermal efficiency and decrease in specific fuel consumption. It was also observed that the results using biodiesel have similar characteristics to that of diesel. The NOx emission increases as load increases, while CO emission decreases for B10, B20 as blending increases.CO follows the trend similar to that of diesel. Also CO2 emission increases at partial and medium loading condition.

Keywords:
 Waste cooking oil, waste cooking oil methyl ester, transesterification, emission

References:

1.        .C.Meher,D. VidyaSagar, S.N. Naik, “Technical aspects of biodiesel production by transesterification”,  Renewable and Sustainable Energy Reviews, 10 (2006) 248–268.
2.        Y. Zhang, M.A. Dube, D.D. McLean, M. Kates, “Biodiesel production from waste cooking oil:  2.Economic assessment and sensitivity analysis, Bioresour”, Technol. 90 (2003) 229–240.

3.        Ozer Can, “Combustion characteristics, performance and exhaust emissions of a diesel engine   fueled with a waste cooking oil biodiesel mixture”,  Energy Conversion and Management, 11/2014; 87:676-686.

4.        K. Hamasaki, E. Kinoshita, H. Tajima, K. Takasaki, D. Morita, “Combustion characteristics of diesel engines with waste vegetable oil methyl ester, The fifth International Symposium on Diagnostics and Modeling of Combustion in Internal Combustion Engines” , (COMODIA), 2001, pp. 410–416.

5.        S. Pehan, M. Jerman, M. Kegl, B. Kegl, “Biodiesel influence on tribology characteristics of a   diesel engine”, Fuel 88 (2009) 970–979.

6.        R. Dinkov, G. Hristov, D. Stratiev, V. Aldayri, “Effect of commercially available antioxidants over biodiesel/diesel blends stability”,  Fuel 88(2009) 732–737.

7.        MaginLapuerta, Jose Rodriguez-Fernandez, John R. Agudelo, “Diesel particulate emissions from used cooking oil biodiesel”,  Bioresource Technology, Volume 99, Issue 4 March (2008), PP 731-740

8.        Zafer Utlu , and Mevlüt Süreyya Koçak, “The effect of biodiesel fuel obtained from waste frying oil on direct injection diesel engine performance and exhaust emissions”, Renewable Energy , Volume 33, Issue 8, August (2008), PP: 1936-194.

9.        Drapcho C, Nghiem J, Walker T., “ Biofuels engineering  process technology”,  New York: McGraw-Hill Professional; 2008.

10.     Jagannath Hirkude, Atul S. Padalkar, “ Experimental investigation of the effect of compression ratio on performance and emissions of CI engine operated with waste fried oil methyl ester blend”, Applied Energy 2012, 90: 68-72.

11.     Abu-Jrai, Jehad A. Yaminb, Alaa H. Al-Muhtaseb, Muhanned A. Hararaha, “Combustion characteristics and engine emissions of a diesel engine fueled with diesel and treated waste cooking oil blends”, Chemical Engineering Journal, 172:129-136.

12.     Joonsik Hwang, Donghui Qi, Yongjin Jung, ChoongsikBae, “Effect of injection parameters on the combustion and emission characteristics in a compression ignition engine fueled with waste cooking oil biodiesel”,  Fuel 109 (2013.7) 616-626.

13.     H. An, W.M. Yang, J. Li, S.K. Chou, K.J. Chua, “Performance, combustion and emission characteristics of biodiesel derived from waste cooking oil”, Applied Energy 112, 493-499, 2013.

14.     SukumarPuhan, N. Vedaraman, G. Sankaranarayanan, V. Boppana, Bharat Ram, “Performance and emission study of Mahua oil (Madhucaindica oil) ethyl ester in a 4-stroke natural aspirated direct injection diesel engine”,  Renewable Energy 30 (2005) 1269–1278.

15.     A.A. Reefat, N.K. Attia, H.A. Sibak, S.T. Sheltawy, G.I. Diwani, “Production optimization and quality assessment of biodiesel from waste vegetable oil”,  International Journal of Environmental Science and Technology 5 (2008) 75–82.

16.     Ma F, Hanna MA, “Biodiesel production: a review”,  Bioresour Technol 1999;70:1–15.

17.     Palash SM, Masjuki HH, Kalam MA, Masum BM, Sanjid A,  Abedin MJ,  “State of the art of NOx mitigation technologies and  their effect on the performance and emission characteristics of biodiesel-fueled compression ignition engines”,  Energy Conversion and  Management 2013;76:400–20.

18.     Rakopoulos CD, Antonopoulos KA, Rakopoulos DC, “Multi-zone modeling of diesel engine fuel spray development with vegetable oil, bio-diesel or diesel fuels”,  Energy Conversion and  Management 2006;47:1550–73.

19.     Mueller CJ, Boehman AL, Martin GC “ An experimental investigation of theorigin of increased NOx emissions when fueling a heavy-duty compression–ignition engine with soybiodiesel”,  SAE Paper 2009:01–1792.
20.     Majewski WA, Khair MK, “Diesel emissions and their control” Warrendale(USA): SAE International; 2006.

57-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Jagadishchandra S. Naik, N. K. Misra

Paper Title:

Interactive Terrain Surface Visualization using Haptics Assisted Display

Abstract: In this paper we present a novel method to handle terrain surface features using haptic feedback providing interaction for the purpose of navigation of terrain over a virtual 3D environment. This system uses Phantom Haptics Desktop Device for touch bound interactions using force feedback stylus, which acts as a pointer that allows the user to feel the deformations over the terrain surface. The advantage of haptic feedback is that it works in 3D environment and provides better control with the force compared to mouse and other hardware.

Keywords:
 Haptics Visualization, Navigation, Terrain classification.

References:

1.        , HU, LAHAMY and LICHTI, et al, “Haptic and Gesture-Based Interactions for Manipulating Geological Datasets”  Web: www.uqac.ca/bamenela/papers
2.        ALLISON M. OKAMURA and MARK R. CUTKOSKY, et al, “Haptics Exploration of Fine Surface Features” Web: www-cdr.stanford.edu/html/Touch/publications

3.        BENES, DORJGOTOV, ARNS, BERTOLINE, et al, “Granular Material Interactive Manipulation: Touching Sand with Haptic Feedback” WSCG 2006 conference proceedings, January 30-February 3, Plzen, Czech Republic.

4.        PURCHART, KOLIGEROVA, BENES, et al, “Interactive Sand covered Terrain Surface Model with Haptic Feedback” GIS Ostrava 2012-Surface Models for Geosciences, January23-25.,2012 Ostrava

5.        FAETH, OREN, HARDING, et al, “Combining 3-D geovisualization with force feedback driven user interaction”  Web: www.vrac.iastate.edu/

6.        LECUYER, BURCHARDT, ETIENNE et al,” Feeling Bumps and Holes without a Haptic Interface: the Perception of Pseudo-Haptic Textures” Web: people.rennes.inria.fr/Anatole.Lecuyer/

7.        YOO, JUNG, ROEMMERMANN, RAST, KIRCHNER,ROSSMAN, et al, ”Developing a Virtual Environment for Extraterrestrial Legged Robot with Focus on Lunar Crater Exploration”  i-SAIRAS 2010 August 29-September 1, 2010, Sapporo, Japan

8.        EL-SANA, VARSHNEY, et al, “Continuously-Adaptive Haptic Rendering” Web: wwwold.cs.umd.edu/gvil/papers/

9.        YANNIER, BASDOGAN, TASIRAN and SEN, et al,” Using Haptics to Convey Cause and Effect Relations in Climate Visualization” IEEE Transactions on Haptics Web: network.ku.edu.tr/~stasiran/publications/

10.     NEWCOMB,  et al, A Masters thesis on “A multi-modal interface for road planning tasks using vision, haptics and sound “, 2010

11.     THOMSON, et al, A Doctoral thesis on” The Integration of Visual and Haptic Feedback for Teleoperation” 2001

12.     TSETSERUKOU, KAWAKAMI, TACHI, et al, “iSoRA: Humanoid Robot Arm for Intelligent Haptic Interaction with the Environment”, Advanced Robotics 23 (2009) 1327–1358

13.     SRIKANTH, MATHIAS, NATARAJAN, NAIDU, et al, “Visibility Volumes for Interactive Path Optimization” Web: vgl.serc.iisc.ernet.in/

14.     JORRISEN, BOECK, LAMOTTE, et al,” Bringing haptics and physical simulation together: haptic travel through physical worlds” Computer Animation And  Virtual Worlds Comp. Anim. Virtual Worlds 2006; 17: 179–187 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/cav.121

62-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Harsh Deep, Varsha

Paper Title:

Tabu Search Based General Self-Organized Tree-Based Energy-Balance Routing Protocol (GSTEB) for Wireless Sensor Networks

Abstract: GSTEB has shown quite necessary results over the on the market WSNs protocols. but it’s neglected many issues. thus on beat the constraints of the sooner work a completely unique improved technique is planned throughout this analysis work. The planned technique has the flexibility to beat the constraints of the GSTEB routing protocol by pattern clump and TABU search. The comparison square measure drawn among the current and planned techniques. The comparisons has clearly shown that the planned technique outperforms over the on the market techniques. The experimental results has shown an 20.37% improvement in network time period

Keywords:  GSTEB, PASCCC, WIRELESS SENSOR NETWORK ,TABU SEARCH .

References:

1.           Tang, ShaoJie, et al. “DAWN: energy economical information aggregation in WSN with mobile sinks.” Quality of Service (IWQoS), 2010 eighteenth International Workshop on. IEEE, 2010.
2.           Xibei, Jia, Zhang Huazhong, and Zhang Jingchen. “Research of knowledge aggregation routing protocol in wsn data-related applications.” computing and data Technology (ICCSIT), 2010 third IEEE International Conference on. Vol. 1. IEEE, 2010.

3.           Bista, Rabindra, Kim Hee-Dae, and Jae-Woo Yangtze River. “A new personal information aggregation theme for wireless device networks.” laptop and data Technology (CIT), 2010 IEEE tenth International Conference on. IEEE, 2010.

4.           Xiao, Haitao, et al. “The health observation system supported distributed information aggregation for WSN employed in bridge identification.” SICE Annual Conference 2010, Proceedings of. IEEE, 2010.

5.           Zanjani, Motahareh Bahrami, Reza Monsefi, and Arash Boustani. “Energy efficient/highly secure information aggregation technique victimisation tree-structured orthogonal codes for Wireless device Networks.” code Technology and Engineering (ICSTE), 2010 second International Conference on. Vol. 2. IEEE, 2010.

6.           Hasenfratz, David, et al. “Analysis, comparison, and improvement of routing protocols for energy harvest wireless device networks.” device Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE International Conference on. IEEE, 2010.

7.           Raju, G. T., et al. “Wireless device network time period improvement.” Advances in Recent Technologies in Communication and Computing (ARTCom 2011), third International Conference on. IET, 2011.

8.           Zhu, Liehuang, and Meng Li. “An energy economical and integrity-preserving aggregation protocol in wireless device networks.” Performance Computing and Communications Conference (IPCCC), 2011 IEEE thirtieth International. IEEE, 2011.

9.           Nie, Pin, and Bo Li. “A cluster-based information aggregation design in WSN for structural health observation.” Wireless Communications and Mobile Computing
Conference (IWCMC), 2011 seventh International. IEEE, 2011.

10.        Chu, Hung-Chi, et al. “Design ANd implementation an energy-aware routing mechanism for star wireless device networks.” High Performance Computing and Communications (HPCC), 2011 IEEE thirteenth International Conference on. IEEE, 2011.

11.        Mathapati, Basavaraj S., Siddarama R. Patil, and V. D. Mytri. “Energy economical Reliable information Aggregation Technique for Wireless device Networks.”Computing Sciences (ICCS), 2012 International Conference on. IEEE, 2012.

12.        Tamilselvan, G. M., and S. Kiruthika. “An energy economical information aggregation primarily based medium access management protocol victimisation centre at nearest supply approach for device networks during a lattice topology.” Computing, Communication and Applications (ICCCA), 2012 International Conference on. IEEE,
2012.

13.        Eu, Zhi Ang, and Hwee-Pink Tan. “Adaptive expedient routing protocol for energy harvest wireless device networks.” Communications (ICC), 2012 IEEE
International Conference on. IEEE, 2012.

14.        Mantri, Dnyaneshwar, Neeli Rashmi Prasad, and Ramjee Prasad. “BHCDA: information measure economical heterogeneousness aware cluster primarily based information aggregation for Wireless device Network.” Advances in Computing, Communications and science (ICACCI), 2013 International Conference on. IEEE, 2013.

15.        Said, Adel Mounir Sareh, et al. “Dynamic aggregation protocol for wireless device networks.” Advanced info Networking and Applications (AINA), 2013 IEEE twenty seventh International Conference on. IEEE, 2013.

16.        Wu, Yin, and Wenbo Liu. “Routing protocol supported genetic algorithmic program for energy harvesting-wireless device networks.” IET Wireless device Systems3.2 (2013): 112-118.

17.        Mantri, Dnyaneshwar, Neeli R. Prasad, and Ramjee Prasad. “Grouping of clusters for economical information aggregation (GCEDA) in wireless device
network.”Advance Computing Conference (IACC), 2013 IEEE third International. IEEE, 2013.

18.        Hooman Ghaffarzadeh and Ali Doustmohammadi , “Two-phase information traffic improvement of wireless device networks for prolonging network lifetime”, 2013.

19.        Han, Zhao, Jie Wu, Jie Zhang, Liefeng Liu, and Kaiyun Tian. “A General Self-Organized Tree-Based Energy-Balance Routing Protocol for Wireless device Network.” (2014)

66-72

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Saloni Bindra, Priyanka Karmarkar, Abhishek Kumar Verma, Laxmi Grover

Paper Title:

Social Media Mining for Opinion Analysis

Abstract: Here we describe a method which involves determining the sentiment of a review about Banks by extracting the phrases with a noun-adjective relationship, Identifying if the noun is present in the domain specific Ontology tree and then determining the polarity of the adjective, aggregating the polarity. The results so obtained are thus summarized and then categorized by characteristic feature pertaining to the Bank. This reduces the human efforts to go through them and a result specific to a particular Bank; sub-categorized by Peculiar features of it with polarity alongside each individual characteristic. Thus the fruits of the reviews are gained even without reading them.

Keywords:
Sentiment, Polarity, Domain Ontology, Opinion Mining.

References:

1.           Bing Liu, “Sentiment Analysis and Opinion Mining”, Morgan & Claypool Publishers, May 2012.
2.        WeiWei, Jon Atle Gulla,” Sentiment Learning on Product Reviews via Sentiment Ontology Tree”, Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, pages 404–413, Uppsala, Sweden, 11-16 July 2010.

3.        Vipin Kumar,  Sonajharia Minz, ” Mood Classification of Lyrics using SentiWordNet”, 2013 International Conference on Computer Communication and Informatics (ICCCI – 2013), Jan. 04 – 06, 2013, Coimbatore, INDIA

4.        “Stanford typed dependencies manual”, Marie-Catherine de Marne_e and Christopher D. Manning, September 2008.

5.        Zhongchao Fei,Xuanjing Huang, and Lide wu, “Mining the Relation between Sentiment Expression and Target Using Dependency of Words”, Department of Computer Science and Technology, Fudan University, Shanghai, 200433, China.

6.        “Reviews” [online] Available         http://www.mouthshut.com/

7.        SentiWordNet”[online]Availablehttp://sentiwordnet.isti.cnr.it

8.        PDFforOWL”Available http://protege.stanford.edu/plugins/owl/publications/DL2004-protege.owl.pdf

9.        “Customer sentiment on bank” Shalu Chopra, Deepshikha Chaturvedi.

10.        Sentiment strength detection in Informal Texts, Thelwall, M., Buckley, K., Paltoglou, G. Cai, D., & Kappas, A. (2010).

73-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Praveen S S, Aparna P R

Paper Title:

Single Digital Image Multi-focusing Using Point to Point Blur Model Based Depth Estimation

Abstract: The proposed paper focuses on Multi-focusing, a technique that restores all-focused images from defocused ones and generates images focused at different depths. The method proposed in the paper can be applied to images taken with an ordinary camera and does not require any specialized hardware. The method deviates from the existing de-convolution process for obtaining multi-focused images and highlights procuring a focused image by using only a single image. Blur map estimation is the core of the proposed method. Initially, a rough blur map is obtained which gives the blur amount at edge locations and by propagating the blur amount at edge locations to the entire image, the full blur map of the scene can be recovered. In order to produce photographs at different depths, a depth map is required. Since the amount of blur is proportional to the distance from the plane of focus, the blur map can be used as a cue for depth. The depth map is calculated using the blur map and the camera parameter information embedded in the defocused image. Using the depth map, multi-focused images can be obtained.

Keywords:
 Multi-focusing, Depth estimation, blur estimation

References:

1.        Y. Cao, S. Fang, and Z. Wang “Digital Multi-Focusing From a Single Photograph taken with an Uncalibrated Conventional Camera”, IEEE Trans. on image processing, vol. 22, no. 9, Sept. 2013
2.        S. Zhuo and T. Sim, “Defocus map estimation from a single image,” Pattern Recognit., vol. 44, no. 9, pp. 1852–1858, 2011.

3.        S. W. Hasinoff and K. N. Kutulakos, “Confocal stereo,” Int. J. Comput. Vis., vol. 81, no. 1, pp. 82–104, 2009.

4.        Levin, D. Lischinski, and Y. Weiss, “A closed form solution to natural image matting,” in Proc. IEEE Comput. Soc. Conf. CVPR, Jun. 2006, pp. 61–68.

5.        V. P. Namboodiri and S. Chaudhuri, “Recovery of relative depth from a single observation using an uncalibrated (real-aperture) camera,” in Proc. CVPR, Jun. 2008, pp. 1–6.

6.        A. Saxena, M. Sun, and A. Ng, “Make3D: Learning 3-D scene structure from a single still image,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, no. 5, pp. 824–840, May 2009.

77-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali

Paper Title:

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Abstract: Identification and verification of a user’s identity in an organization is a big challenge. Earlier, it was done through passwords that had various limitations for example it could be cracked or stolen. Biometric technology has replaced all the existing technologies with greater advantage. Fingerprint technique, so far, is recognised as a better technique than others and is widely used. It provides accurate results and has less false rate as compared to other techniques. This paper aims to analyse the two main methods of fingerprint recognition in biometric security systems which are minutiae based and correlation based methods. An analysis of these two has been summarized and it shows the pros and cons of both the methods, with respect to factors such as computational power, poor quality image evaluation etc. The paper concludes all the features of both these methods and explains the process followed by them

Keywords:
 biometric system, correlation based fingerprint, minutiae based.

References:

1.        K. Mali and S. Bhattacharya, “Comparative study of different biometric features”, international journal of advanced research in computer and communication engineering (IJARCCE) Vol. 2, Issue 7, 2013.
2.        M Kaur, M Singh, A Girdhar and P.S sandhu, “Fingerprint verification system using minutiae extraction technique”, published at world academy of science engineering and technology, issue 46, 2008.

3.        T.Y Jea and V Govndaraaju, “A minutia-based partial fingerprint recognition system”, published at Elsevier in pattern recognition issue, 2005.

4.        J Ravi, K Raja and K. R venugopal, “fingerprint recognition using minutia score matching”, international journal of engineering science and technology, vol. 1,issue 2, 2009.

5.        P Verma, M dubey and P verma, “Correlation based method for identification of fingerprint- A biometric approach” international journal of engineering and advanced technology (IJEAT), vol. 1, issue 4, 2012.

6.        A.M. Bazen, G. T. B Verwaaijen and S.H Gerez et al, “A correlation based fingerprint verification system”, published at Proceedings of the ProRIsc, IEEE workshop, 2000.

82-86

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Anwar Al-Shrouf

Paper Title:

Noise-Immune ECG Classifier Using Wavelet Transform and Neural Networks

Abstract: This paper proposes a novel algorithm for automatic classification of electrocardiogram (ECG) beats recorded by Holter systems. The algorithm is based on a combination of neural network and discrete wavelet transform. Discrete wavelet transform coefficients are used as an input of the neural network to perform the classification task. The proposed classifier wastested by both real ECG signals andartificially generated signals. Five Hermite functionswereused in generating the ECG artificial testing signals. Different levels of noise were added to the signals to examine the noise immunity of the classifier. The main advantage of the proposed classifier is that it is noise immune and accurate. The testing results on the proposed classier show that it is capable of recognising 40 beats, and it works properly in the classification of the ECG signal with a classification ratio of 100% for an SNR of more than 6 dB.

Keywords:
Wavelet transforms, neural networks, ECG beat classification, arrhythmia, white noise, Hermite functions.

References:

1.           M. Hadhoud, M. Eladawy, A. Farag, “Computer aided diagnosis of cardiac arrhythmias,” in IEEE Int. Conf. Computer Engineering and Systems, 2006, pp. 262–265.
2.           R. J. Martis, U. R. Acharya, and L. C. Min, “ECG beat classification using PCA, LDA, ICA and Discrete Wavelet Transform,” Biomed. Signal Process. Control, vol. 8, no. 5, pp. 437–448, 2013.

3.           P. D. C. P. De Chazal, M. O’Dwyer, and R. B. Reilly, “Automatic classification of heartbeats using ECG morphology and heartbeat interval features,” IEEE Trans. Biomed. Eng., vol. 51, no. 7, pp. 1196–1206, 2004.

4.           H. M. Rai, “ECG Signal Classification using Wavelet Transform and Back Propagation Neural Network,” vol. 3, pp. 212–215.

5.           V. Dubey and V. Richariya, “A Neural Network Approach for ECG Classification,” vol. 3, no. 10, pp. 189–196, 2013.

6.           G. K. Jaiswal and R. Paul, “Artificial neural network for ecg classification,” vol. 6, no. 1, pp. 36–38, 2014.

7.           R. E. Klabunde, “Cardiovascular Physiology Concepts.” [Online]. Available: http://www.cvphysiology.com/Arrhythmias/A009.htm.
8.           X. Tang and L. Shu, “Classification of Electrocardiogram Signals with RS and Quantum Neural Networks,” vol. 9, no. 2, pp. 363–372, 2014.
9.           S. Osowski and T. H. Linh, “ECG beat recognition using fuzzy hybrid neural network,” IEEE Trans. Biomed. Eng., vol. 48, pp. 1256–1271, 2001.

10.        M. R. Risk, J. F. Jamil F. Sobh, and J. P. Saul, “Beat Detection and Classification of ECG Using Self Organizing Maps,” in 19th International Conference of the IEEE Engineering in Medicine and Biology, 1997, pp. 89–91.

11.        Z. Frankiewicz and A. AL-Shrouf, “ECG Beat Classification Using Linear Prediction Error Signal,” in Medical Informatics Europe, 1991, pp. 465–470.

12.        M. Javadi, S. A. A. A. Arani, A. Sajedin, and R. Ebrahimpour, “Classification of ECG arrhythmia by a modular neural network

13.        based on Mixture of Experts and Negatively Correlated Learning,” Biomed. Signal Process. Control, vol. 8, no. 3, pp. 289–296, 2013.

13.

14.        S. M. Ahmed, A. Al-Shrouf, and M. Abo-Zahhad, “ECG data compression using optimal non-orthogonal wavelet transform,” Med. Eng. Phys., vol. 22, no. 1, pp. 39–46, 2000.

15.        S. Mallat, “Theory of multiresolution signal decomposition: the wavelet representation,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 2, pp. 674–693, 1989.

16.        Al-Shrouf, M. Abo-Zahhad, and S. M. Ahmed, “A novel compression algorithm for electrocardiogram signals based on the linear prediction of the wavelet coefficients,” Digit. Signal Process., vol. 13, no. 4, pp. 604–622, 2003.

17.        M. S. Hossain, “ECG Signal Compression using Energy Compaction Based Thresholding of the Wavelet Coefficients,” vol. 1, no. 2, pp. 14–18, 2011.

18.        S.-L. Hung, C. S. Huang, and C. M. Wen, “13 th World Conference on Earthquake Engineering,” no. 2580, 2004.

19.        Khaing and Z. Naing, “Quantitative Investigation of Digital Filters in Electrocardiogram with Simulated Noises,” Int. J. Inf. Electron. …, vol. 1, no. 3, pp. 210–216, 2011.

20.        G. Bortolan, I. Christov, I. Simova, and I. Dotsinsky, “Noise processing in exercise ECG stress test for the analysis and the clinical characterization of QRS and T wave alternans,” Biomed. Signal Process. Control, vol. 18, pp. 378–385, 2015.

21.        J. Wang, Y. Ye, X. Pan, and X. Gao, “Parallel-type fractional zero-phase filtering for ECG signal denoising,” Biomed. Signal Process. Control, vol. 18, pp. 36–41, 2015.

22.        M. Lagerholm and G. Peterson, “Clustering ECG complexes using hermite functions and self-organizing maps,” IEEE Trans. Biomed. Eng., vol. 47, no. 7, pp. 838–848, 2000.

23.        Gil, G. Caffarena, G. M. David, and A. Otero, “Hermite Polynomial Characterization of Heartbeats with Graphics Processing Units,” 2014.

24.        T. Kohonen, K. Makisara, O. Simula, and J. Kangas, “Self-organizing maps: Optimization approaches,” Artif. Neural Networks, pp. 981–990, 1991.

25.        M. K. Sarkaleh and A. Shahbahrami, “ClSSIFICATION OF ECG ARRHYTHMIAS USING DISCRETE WAVELET TRANSFORM AND NEURAL NETWORKS,” Int. J. Comput. Sci. Eng. Appl., vol. 2, no. 1, pp. 1–13, 2012.

26.        E. D. Ubeyli, “Implementing wavelet transform/mixture of experts network for analysis of electrocardiogram beats,” Expert Syst., vol. 25, pp. 150–162, 2008.

87-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Esam Elsheh, Saddek Elbendago, Marwan Ali.H.Omer

Paper Title:

On the Security of Image Encryption Using Discrete Fourier Transform and Fractional Fourier Transform

Abstract: Recent developments of different forms of discrete Fourier transform, have encouraged many researchers to design image encryption algorithms based on a discrete fractional or multiple fractional Fourier transforms. One of these algorithms is proposed by Ashutosh and Sharma, (International Journal of Engineering and Advanced Technology, Vo. 2, Issue. 4, 2013). In this paper, we show that this algorithm represents a classic textbook example of insecure cipher; all the building blocks of this scheme are linear, and thus, breaking this scheme, using a known plaintext attack, is equivalent to solving a set of linear equations. We also invalidate several of the security and performance advantages claimed by the authors, namely, the efficiency, key sensitivity, and the complexity.                  

Keywords:
 Image processing, encryption, discrete transforms, linear cipher.


References:

1.        H.M. Ozaktas and D. Mendlovic, “Fractional Fourier transforms and their optical implementation,” Journal of the Optical Society of America A: Optics and Image Science, and Vision. vol. 10, no. 12, pp. 2522-2531, 1993.
2.        B. Zhu, S. Liu and Q. Ran, “Optical image encryption based on multifractional Fourier transforms,” Opt. Lett., vol. 25, pp. 1159-1161, 2000.

3.        Z. Liu and S. Liu, “Random fractional Fourier trans form,” Opt. Letters., vol. 32, pp. 2088-2090, 2007.

4.        R. Tao, J. Lang and Y. Wang, ”Optical image encryption based on the multiple-parameter fractional Fourier transform,” Opt. Letters., vol. 33, pp. 581-583, 2008.

5.        R. Ashutosh and D. Sharma, “Image Encryption Using Discrete Fourier Transform and Fractional Fourier Transform,” International Journal of Engineering and Advanced Technology, vol. 2, no. 4, 2013.

6.        B. W. Dickinson and K. Steiglitz, “Eigenvectors and functions of the discrete Fourier transform,” IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-30, no. 1, pp. 25–31, 1982.

7.        S.C. Pei and W.L. Hsue “The Multiple-Parameter Discrete Fractional Fourier Transform,” IEEE Signal Processing Letters, vol. 13, no.. 6, 2006.

8.        B. Schneier, Applied Cryptography, 2nd edition. New York,Wiley, 1996.

9.        Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptographic Research. Boca Raton, FL: CRC, 1996.

10.     R. Ashutosh and D. Sharma, “Robust Technique for Image Encryption and Decryption Using Discrete Fractional Fourier Transform with Random Phase Masking,”
Procedia Technology, vol. 10, pp. 707-714, 2013.

11.     A.M. Youssef, “On the Security of a Cryptosystem Based on Multiple-Parameters Discrete Fractional Fourier Transform,” Signal Processing Letters, IEEE , vol.15, no., pp.77-78, 2008.

12.     E. Elsheh, and A. Youssef, “On the security of image encryption schemes based on Multiple Parameters Transforms,” Signal Processing and Information Technology (ISSPIT), 2010 IEEE International Symposium on , pp.97-101, 2010.

13.     A.F.Webster and S.E. Tavares, “On the design of S-boxes”, Advances in Cryptology– CRYPTO ’85 (LNCS 218), pp. 523–534, 1986.

14.     National Institute of Standards and Technology, FIPS-197: Advanced Encryption Standard, November 2001.

15.     S. Babbage, C. Canniere, A. Canteaut , C. Cid, H. Gilber, T. Johansson, M. Parker, B. Preneel, V. Rijmen, and M. Robshaw: The eSTREAM Portfolio, 2009.

93-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Athira R, Lekshmy D Kumar

Paper Title:

Secure Data Storage in Cloud using Centralized Access Control with Anonymous Authentication

Abstract: Cloud computing’s multi-tenancy feature which provides privacy, security and access control challenges because of sharing of physical resources among untrusted tenants. Much of the data stored in clouds is highly sensitive particularly in the case of medical records and social networks. Security and privacy are very important issues in cloud computing. In one hand, the user should authenticate itself before initiating any transaction, and on the other hand, it must be ensured that the cloud does not tamper with the data that is outsourced. User privacy is also required so that the cloud or other users do not know the identity of the user. The validity of the user who stores the data is also verified. In order to achieve safe storage, a suitable encryption technique with key management should be applied before outsourcing the data. A new decentralized access control scheme is implemented for secure data storage in clouds, which supports anonymous authentication. In this scheme, the cloud verifies the authenticity of the user without knowing the user’s identity before storing data. The scheme also has the added feature of access control in which only valid users are able to decrypt the stored information. The scheme prevents replay attacks and supports creation, modification and reading data stored in the cloud. User revocation is also addressed. Moreover, the authentication and access control scheme is decentralized and robust, unlike other access control schemes designed for clouds which are centraliz

 Keywords:  Attribute based encryption, Access control, Authentication.

References:

1.           S. Ruj, M. Stojmenovic, and A. Nayak, “Privacy Preserving Access Control with Authentication for Securing Data in Clouds,” Proc.IEEE/ACM Int’l Symp. Cluster, Cloud and Grid Computing, pp. 556-563, 2012.
2.           C. Wang, Q. Wang, K. Ren, N. Cao, and W. Lou, “Toward Secure and Dependable Storage Services in Cloud Computing,”IEEE Trans. Services Computing, vol. 5, no. 2, pp. 220-232, Apr.-June 2012.

3.           J. Li, Q. Wang, C. Wang, N. Cao, K. Ren, and W. Lou, “Fuzzy Keyword Search Over Encrypted Data in Cloud Computing,”Proc. IEEE INFOCOM, pp. 441-445, 2010.

4.           S. Kamara and K. Lauter, “Cryptographic Cloud Storage,”Proc.14th Int’l Conf. Financial Cryptography and Data Security,pp. 136-149, 2010.

5.           C. Gentry, “A Fully Homomorphic Encryption Scheme,” PhD dissertation, Stanford Univ., http://www.crypto.stanford.edu/craig, 2009.D. Chaum and E.V. Heyst, “Group Signatures,” Proc. Ann. Int’lConf. Advances in Cryptology (EUROCRYPT), pp. 257-265, 1991.

6.           H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance,”IACR Cryptology ePrint Archive, 2008.[24] H.K. Maji, M. Prabhakaran, and M. Rosulek, “Attribute-Based Signatures,” Topics in Cryptology – CT-RSA, vol. 6558, pp. 376-392,2011.

7.           Beimel, “Secure Schemes for Secret Sharing and Key Distribution,”PhD thesis, Technion, Haifa, 1996.

8.           Sahai and B. Waters, “Fuzzy Identity-Based Encryption,” Proc.Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT), pp. 457-473,2005.

9.           V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,”Proc. ACM Conf. Computer and Comm. Security, pp. 89-98, 2006.

10.        J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-Policy Attribute-Based  encryption,” Proc. IEEE Symp. Security and Privacy, pp. 321-334, 2007.

11.        X. Liang, Z. Cao, H. Lin, and D. Xing, “Provably Secure and Efficient Bounded Ciphertext Policy Attribute Based Encryption,”Proc. ACM Symp. Information, Computer and Comm. Security (ASIACCS), pp 343-352, 2009.

12.        M. Chase, “Multi-Authority Attribute Based Encryption,” Proc.Fourth Conf. Theory of Cryptography (TCC), pp. 515-534, 2007.

13.        H. Lin, Z. Cao, X. Liang, and J. Shao, “Secure Threshold Multi-Authority Attribute Based Encryption without a Central Authority,”Proc. Progress in Cryptology Conf. INDOCRYPT), pp. 426-436,2008.

14.        M. Chase and S.S.M. Chow, “Improving Privacy and Security in Multi-Authority Attribute-Based Encryption,” Proc. ACM Conf.Computer and Comm. Security, pp. 121-130, 2009.

15.        K. Yang, X. Jia, and K. Ren, “DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems,” IACR Cryptology ePrint Archive, p. 419, 2012.

16.        A.B. Lewko and B. Waters, “Decentralizing Attribute-Based Encryption,” Proc. Ann. Int’l Conf. Advances in Cryptology (EUROCRYPT),pp. 568-588, 2011.

97-101

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Ruchal G. Humbare, Suraj R. Gurav, S. B. Trimbakeac

Paper Title:

Analysis of Heat Transfer Enhancement in Tube-in-tube Helical Coil Heat Exchangers

Abstract: The heat exchangers most widely used are shell and tube heat exchangers which are larger in size and offer lesser heat transfer rate.  Also, in shell and tube heat exchanger dead zone is produced which further reduces heat transfer rate and in order to improve heat transfer rate some active techniques are required. Helical heat exchanger is more compact, offer better heat transfer rates and heat transfer rate can be further improved by passive techniques. Its shape offers advantages such as more fluid contact, elimination of dead zones, and secondary turbulence. An experimental test rig was developed for evaluation of tube-in-tube helical coil heat exchanger. This paper deals with parametric analysis and its effect on performance of tube-in-tube helical coil heat exchanger. 

Keywords: Tube-in-tube helical coil, Dean Number, Dimensionless pitch, Curvature ratio, Effectiveness, Secondary turbulence, Heat transfer coefficient, Nusselt number.

References:

1.           B. Chinna Ankanna, B. Sidda Reddy, “Performance Analysis of Fabricated Helical Coil Heat Exchanger”, International Journal of Engineering Research, Volume 3, Issue no: Special 1, March 2014.
2.           B. S. V. S. R. Krishna, “Prediction of Pressure Drop in Helical Coil with Single Phase Flow of Non-Newtonian Fluid”, International Journal of Applied Research in Mechanical Engineering, Volume-2, Issue-1, 2012.

3.           Bibin Prasad, Sujith V, Mohammed Shaban K, Saju Haneef, Sandeep N, Vishnu Raj, “ Comparison of Heat Transfer Between a Helical and Straight tube Heat exchanger”, International Journal of Engineering Research and Technology, Volume 6, Number 1, 2013.

4.           Dr. Prabhanjan, “Influence of Coil Characteristic on Heat Transfer to Newtonian Fluids”, McGill University, Canada, August 2000.

5.           Hui Zhu, Hanqing Wang, Guangxiao Kou, “Experimental Study on the Heat Transfer Enchancement by Dean Vortices in Spiral Tubes”, International Journal of Energy and Environment, Volume 3, Issue no: Special 1, March 2014.
6.           J. S. Jayakumar, Helically Coiled Heat Exchanger, Heat Exchanger – Basics Design Applications, Dr. Jovan Mitrovic(Ed.), March 2012.
7.           James R. Lines, “Helically Coiled Heat Exchangers Offer Advantages”, Graham Manufacturing Co. Inc.

8.           M. Kannan, S. Ramu, S. Santhanakrishnan, G. Arunkumar, Vivek M., “Experimental and Analytical comparison of Heat Transfer in Double Pipe Heat Exchanger”, Internal Journal of Mechanical Engineering Applications Research, Volume 3, Issue 3, July 2012.

9.           M. Necati Ӧzisik, “Heat Transfer – a Basic Approach”,  McGraw-Hill, New York, 1985

10.        Mrunal P. Kshirsagar, Trupti J. Kansara, Swapnil M. Aher, “Fabrication and Analysis of Tube-in-tube Helical Coil Heat Exchanger”, International Journal of Engineering Research and General Science, Volume 2, Issue 3, April- May 2014.

11.        N. D. Shirgire, P. Vishwanath Kumar, “Review on Comparative Study between Helical Coil and Straight Tube Heat Exchanger”, IOSR Journal of Mechanical and Civil Engineering, Volume 8, Issue 2, August 2013.

12.        Pramod S. Purandare, Mandar M. Lele, Rajkumar Gupta, “ Parametric Analysis of Helical Coil Heat Exchanger”, International Journal of Engineering Research and Technology, Volume 1, Issue 8, October 2012.

13.        Prof. Jung Yang San, “Type of Heat Exchanger and LMTD Design Method”, Mechanical Engineering Dept, National Chung Hsing University

14.        R. Thundil Karuppa Raj, Manoj Kumar S., Aby Mathew C. and T. Elango,“ Numerical Analysis of Helically Coiled Heat Exchanger Using CFD Technique”, ARPN Journal of Engineering and Applied Sciences, Volume 9, Number 3, March 2014.
15.        Ramachandra K. Patil, B. W. Shende, Prasanta K. Ghosh, “Designing a Helical Coil Heat Exchangers”, December 1982.
16.        Ramesh K. Shah, Dušan P. Sekulić, “Fundamentals of Heat Exchangers Design”, John Wiley and Sons Inc.,2003.

17.        Sadik Kakac, Hongtan Liu “Heat Exchangers: Selection, Rating and Thermal Design”, CRC Press, Second Edition.

18.        Shinde Dijvijay D., Dange H.M., “Heat Transfer Analysis of a Cone Shaped Helical Coil Heat Exchanger”, International Journal of Innovations in Engineering and Technology, Volume 3. Issue 1, October 2013.

19.        Souyma Ranjan Mohanty, “CFD Analysis of Heat Exchanger Using Fluent”, National Institute of Technology, 2013. (M. Tech Report)

20.        Yong Ju Hong, Seong Je Park, Young-Don Choi, “A numerical Study of the Performance of a Heat Exchanger for a Miniature Joule-Thomson Refrigeration”, International Cryocooler Conference, Inc. Boulder Co., 2009.

21.        Timothy J. Rennie, “Numerical Experimental Studies of Double Pipe Helical Heat Exchanger”, Department of Bioresearch Engineering, McGill University, Montreal, August 2004.

102-108

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

A. A. Elsayed

Paper Title:

Structural Behavior of High Strength Self – Compacting Concrete Beams

Abstract: This research presents an experimental and theoretical studies on the structural behavior of high strength self- compacted concrete I-beams. The main objective is to arrive the mode of failure of I beams which reinforced with and without web reinforcement. The experimental program presents the obtained results of tested eight high strength self compacting concrete I- beams specially reinforced to ensure a shear failure.  All  beams were tested simply supported along span 2400mm and subjected to four lines loadings until failure. The main variables were web thickness. The presence of web reinforcement in concrete beams increases its shear capacity and improves the ductility of the beam. Increasing the loading span to depth ratio decreased the failure load of concrete beams with web reinforcement, increasing the loading span to depth ratio decreased the failure load of concrete beams with web reinforcement, increasing (a/d) ratio from 2.4 to 2.9 led to a decrease in failure load by 33.3%. The effect of the studied variables are presented and discussed.

Keywords:
  High strength concrete; Self compacting concrete; Beams; Shear failure; Stirrups; Cracking.

References:

1.           Hajime Okamura, Masahiro Ouchi, “Self Compacting Concrete” Journal of Advanced Concrete Technology Vol. 1, No.1, 5-15, April 2008.
2.           Ahmad, S.H., Khaloo, A.R., and Poveda, A. (1986): “Shear Capacity of Reinforced High Strength Concrete Beams.”ACI J., v. 83, no. 2, Mar.-Apr. 1986, pp. 297-305.

3.           Bernhardt, C. J. and Fynboe, C. C. High strength concrete beams. Nordic Concrete Research Publication No. 5, Nordic Concrete Federation, Oslo, 1996. pp. 19-26.

4.           B. K. Teoh, M. A. Mansur, and T. H. Wee: “Behavior of High-Strength Concrete I-Beams with Low Shear Reinforcement” ACI J., V. 99, no. 3, May.-June. 2002,       pp. 299-307.

5.           Egyptian Code of Design and construction of reinforced concrete structures,        ECP-203 2010.

6.           American Concrete Institute, ACI building code requirements for reinforced concrete, ACI 318-08.

7.           British Standard BS 8110: 97 Structural use of concrete, code of practice for design and construction.

8.           Michael P. Collins, Evan C. Bentz, and Edward G. Sherwood (2008), “Where is Shear Reinforcement Required? Review of Research Results and Design Procedures”, ACI Structural Journal, Vol.105, No. 5, Sept.-Oct. 2008. pp.590-600.

9.           Ozcebe, G., Ersoy, U., and Tankut, T., Evaluation of Minimum Shear Reinforcement Requirements for Higher Strength Concrete, American Concrete Institute Structural Journal, V. 96, No. 3, May-Jun. 2009, pp. 361-368

10.        Roller, J. J. and Russell, H. G. Shear strength of high-strength concrete beams with    web reinforcement. ACI Structural Journal, Vol. 87, No. 2, March-April 1990, pp. 191-8.

11.        Thorenfeldt, E., and Drangsholt, G. (2011):” Shear Capacity of Reinforced High Strength Concrete Beams.” ACI 2nd Int. Symp. on HSC, ACI SP 121.8, pp. 129-154.

12.        Youssef Choulli, Antonio R. Mari and Antoni Cladera, “Shear behaviour of full-scale prestressed I-beams made with self compacting concrete” Materials and Structures (2008) 41:131–141.

13.        A.Cladera, A.R.Mari “Experimental Study on high strength concrete beams failing in shear” Engineering Structures 27 (2012).

14.        BASF Construction Chemicals, product reference Glenuim C315. Web site: www.basfcc.co.uk

15.        The European guidelines for self compacting concrete, www.efnarc.org

16.        Egyptian Code of Design and construction of reinforced concrete structures,        ECP-203 2007.

17.        American Concrete Institute, ACI building code requirements for reinforced concrete, ACI 318-08.

18.        British Sta Shiny Sara Jacob, P Sandhyandard BS 8110: 97 Structural use of concrete, code of practice for design and construction.

109-115

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Shiny Sara Jacob, P Sandhya

Paper Title:

Postion Sensorless Direct Torque With Indirect Flux Control Of BLDC Motor In Three Phase Conduction Mode

Abstract: In this work, an analysis on position sensorless direct torque control of BLDC Motor with indirect flux control have been studied using two level, six switch Voltage Source Inverter (VSI). By adopting the indirect flux control in direct torque control, the stator flux can be effectively controlled in the constant torque region. This scheme is adapted to three phase conduction mode of VSI. Maximum torque efficiency can be obtained in this method since the torque is estimated in the dq reference frame. In direct torque with indirect flux control of BLDC in three phase conduction mode, the commutation torque ripple can be minimized as well as torque ripple can be effectively reduced. Since the scheme is position sensorless, the electrical rotor position is estimated using stator winding inductance, stationary reference frame currents and flux linkages. The voltage vector selection is set up in the look-up table so that fast torque response is possible. Since the neutral point of the motor is not available, conventional 2×3 matrix is replaced by 2×2 Park’s and Clarke’s transformations for the balanced systems. The experimental results are validated in MATLAB/SIMULINK

Keywords:
Brushless DC (BLDC) Motor, Constant torque region, Direct Torque Control (DTC), Three phase conduction mode, Voltage Source Inverter (VSI).


References:

1.        Ozturk, Salih Baris. “Direct torque control of permanent magnet synchronous motors with non-sinusoidal back-EMF.” PhD diss., Texas A&M University, 2008.
2.        Anitpal Singh, Shakti Singh, “Direct Torque Control of PMSM with a Two-Level Inverter  Matlab/Simulink”,IJEIT,Vol.2,pp.10-15,2010.

3.        Y. Liu, Z. Q. Zhu and D. Howe, “Direct torque control of brushless DC drives with reduced torque ripple,” IEEE Trans. on Industry Applications, Vol.41, No.2, March/April, 2005, pp.599-608.

4.        S. B. Ozturk and H. A. Toliyat, “Direct torque control of brushless dc motor with non-sinusoidal back-EMF,” in Proc. IEEE IEMDC Biennial Meeting, Antalya, Turkey, May 3–5, 2007, vol. 1, pp. 165–171.

5.        S. Baldursson, ―BLDC Motor Modeling and Control – A MATLAB/Simulink Implementation, Master Thesis, May, 2005.

6.        S.B.Ozturk and H.A.Toliyat,“”Sensor less direct torque and indirect flux control of brushless dc motor with non-sinusoidal back-EMF,”in Proc.IEEE IECON,Orlando,FL,Nov.9-11,2008,pp.1373-178.

7.        P. Vas. Sensorless Vector and Direct Torque Control. London, U.K.: Oxford Univ. Press, 1998.

8.        http://www.microsemi.com/document-portal/doc_view/130909-sf-foc-pmsm-hall-ug

116-120

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Michael A. Gragasin, Romualdo C. Martinez

Paper Title:

Design and Testing of Improved Village-Type Dehuller- Degerminator for Dry-Milling Process of Corn

Abstract: Majority of the available village-type corn mills in the Philippines have failed to fully satisfy the minimum product recovery and degerminator efficiency of 64% and 80%, respectively, as set by the Philippine Agricultural Engineering Standard (PAES). This resulted in the production of poor quality corn grits with high postharvest losses. Vital in improving the performance of existing village-type corn mills is the development of efficient dehuller-degerminator that responsible in the separation of germ and hull including the tip cap from the endosperm. The major part of the corn kernel that causes irritation when cooked corn grits are served in the table is primarily the tip cap and not the hull alone.  The results of laboratory and field trials revealed that the developed dehuller-degerminator has a milling capacity of 367 kg/h and capable of providing milling recovery of 79.2% and degerminator efficiency of 83.8%.  Significant reduction in aflatoxin level was also observed once corn kernels with high level of aflatoxin have pass through the developed dehuller-degerminator. The innovative design features a hexagonal-dented screen-huller with counter-flow auger and suction blower to efficiently separate the tip cap, germ, and hull from the endosperm.

Keywords:
  Corn dehuller-degerminator, Corn mill, Dry-milling process, Postharvest


References:

1.        DA-Corn Program, “White Corn Industry Development Roadmap”, Department of Agriculture, Philippines, 2014.
2.        F.R. Earle, J.J. Curtis, and J.E. Hubbard, “Composition of the Component Parts of the Corn Kernel”, Cereal Chemistry, vol. 23, pp.504-511, 1946.

3.        AMTEC, “Philippine Agricultural Engineering Standard Specification for Cornmill (PAES 210:2000)”, Agricultural Machinery Testing and Evaluation Center, University of the Philippines at Los Banos, Laguna, Philippines, 2001.   

  

121-126

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

A. A. Elsayed

Paper Title:

Study of Isolation Methods of Underground Structures By using Concrete Admixtures

Abstract:  Waterproofing of underground structures is frequently a problem and a range of solutions have been tried in the last two decades. Dominating the market are PVC and HDPE (high density poly ethylene) sheet membranes, but recently the alternative, is concrete admixtures for water permeability reducing and so that use in concrete isolation (waterproofing), the longevity of a concrete structure is influenced by the permeability of the concrete. The main objectives of the research are to study the mechanical properties of concrete and the improvement these properties by adding waterproofing using various mount percentages and two types of waterproofing (ADDICRETE DM2-PLASTOCRET-N) series of experimental studies were carried out on plain concrete with added, ADDICRETE DM2 and PLASTOCRETE-N in order to investigate their properties and influence on the water permeability of concrete. In this study, it has been addition ADDICRETE   DM2 and PLASTOCRETE N to the mixture by difference ratio. 1%, 0.5%, 0.45% ,0.35% of cement weight, constant ratio from , sand, gravel, cement and water W/C equal to 0.45  in all tests that used in the research . The study of these tests by measuring the permeability of concrete specimens prepared in the laboratory. Many tests were carried out and the results were presented.

Keywords:
  waterproofing; ADDICRETE DM2, PLASTOCRETE-N, permeability, concrete.

References:
1.           AASHTO T277-89 “Standard Method of Test for Rapid Determination of the Chloride Permeability of Concrete”, American Association of State Highway and Transportation Officials, AASHTO T277-89, Washington, DC.
2.           ACI 211.4R-93. “Guide for Selecting Properties for High-Strength Concrete with Portland Cement and Fly Ash,” ACI Manual of Concrete Practice, Part 1. American Concrete Institute, Detroit, Michigan, 1996.

3.           Astad U, Heimi P: Waterproofing of tunnels by the use of shotcrete Proc.Tunnels Water,Madrid Serrano(ed),Balkema 1988

4.           ASTM C618-92a. “Standard Specification for Fly Ash and Raw or Calcined Natural Pozzolan For Use as Mineral Admixture in Portland Cement Concrete,” American Society for Testing and Materials, Annual Book of ASTM Standards, Volume 04.02, West Conshohocken, Pennsylvania, 2004

5.           Ball, D. (1999) “New Ultra-Low Permeable Concrete” Proceedings of International Congress on Creating with Concrete University of Dundee, (ed. Dhir & McCarthy) pp. 265- 278.

6.           Darmawan ludirdja , Richard l . berger, and j . francis young “simple method for measuring water permeability of concrete ” ACI Materials journal , v. 86, N0 .1989

7.           Dr. Dieter Schmid,Gorge Blendermann, “Evolution of Drainage and Waterproofing Systems in Tunnels around Neuchatel,” 16 TH CONGRESS OF IABSE, LUCERNE, 2000

8.           Egyptian standard specifications; concrete aggregate from natural sources, No.1109, 2011.

9.           ELE International, “civil and Engineering Test Equipment-9th Edition catalogue”, I.T.C., CAIRO-EGYPT, 1993

10.        Eng. Emrah Ertin,”Sprayed Applied waterproof For Underground structures”, Egyptian tunneling society, 29/11/2005.

11.        Figg, j w., Method of measuring the air and water permeability of concrete, magazine of concrete research , (London) ,v. 25, no.85, Dec.2003 , pp. 213-219.

12.        Gomes A R. A.: waterproofing and drainage systems for transport tunnels- a review of current practices. Felsbau 23,No 3, 2005

13.        Gouda M.Ghanem; Tarek E1-Sayed; Mona E1-Hamid,”Notes of Experiments for PROPERTIES AND STRENGTH OF MATERIALS LABORATORY”, Helwan university, 1996.

14.        Holland, T.C.,1988, “practical Considerations for Using silica Fume in Field Concrete, ” Portland Cement Concrete Modifiers, Transportation Research Record 1204,Transportation Research Board, washington D.C.,PP.1-7.

15.        K.Mostsfa, B.Nassif& partners “ADDICRETE DM2 waterproofing and anti-chemical agent for concrete and mortar”, chemicals for modern building.

16.        Lemke S.Bracher G, Klapperich H:Technologies for waterproofing systems of underground structures. Felsbau 23, No3, 2005.

17.        LYDON F.D, “CONCRETE MIX DESIGN-2nded”, department of civil Engineering and Building Technology, University of Wales Institute of science and Technology
Cardiff, 2002.

18.        Martin.J.Roach, BSc, CEng, MICE ,,The strengthening of Brunl,s thames tunnel,, Proc.Instn Civ. Engrs Transp.,1998,129,May.

19.        Miao-Buquan; Chern-Jenn Chuan; Yang-ChenAn ,,Influences of fiber content on properties of self-compacting steel fiber reinforced concrete,, ,Journal of the Chinese Institute of Engineers, v 26,n 4, p 523-530,July, 2013.

20.        Mc Grath,P.F.,2000.Water permeability vs.waterproof Xypex chemical Corporation, Richmond B.C., Canda.

21.        Mott MacDonald,”Product Evaluation of MASTERSEAL 345,”Application and Specification, March 2004.

22.        Naoyuki YAGUCHI, Masaru TATEYAMA,”Adhesive waterproof sheeting for preventing water leakage into underground structures “, Railway Technology Avalanche No.March 1, 2005

23.        Song-PS; Hwang-S,”Mechanical properties of high-strength steel fiber-reinforced concrete”, construction and Building Materials, v 18,n 9,p669-673, November 2008.

24.        Sika Egypt for construction chemicals s.a.e “plastocrete- N waterproofing concrete Admixture, Edition 10. 2003.

127-131

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Swapna P S, Sakuntala S. Pillai

Paper Title:

Downlink Resource Allocation Scheme for OFDMA System

Abstract:   Orthogonal Frequency Division Multiple Access (OFDMA) is a promising multiple access technique for next generation wireless communication such as WiMAX, LTE, IMT-A etc because of its high spectral efficiency and inherent robustness against frequency selective fading. Inclusion of relays into the system further improves the system performance. The asymmetric radio resource allocation problem for cooperative relay assisted OFDMA wireless networks with the objective of maximizing the data rate is addressed in this paper. In cooperative communication the transmission from base station to mobile stations is assisted by decode-and-forward relays. To reduce the computational complexity of its optimal solution, the proposed scheme is sub-divided into three subsections. The first section is to select the relays and then the subcarrier is allocated to the selected relays. As the next step,  power is allocated to each subcarrier. Simulation results shows that the proposed scheme achieves better performance than the existing techniques.

Keywords:
Hungarian algorithm, Interference computation, OFDMA, Resource Allocation, Water filling algorithm. .

References:
1.           Md Shamsul Alm, Xuemin Shen, “Relay Selection and Resource Allocation for multiuser Cooperative OFDMA Networks, IEEE Transactions on Wireless Communications, Vol 12, No. 5, May 2013.
2.           Nidhal Odeh, Mehran Abolhasan and Farzad Safaei, “Low Complexity Interference Aware Distributed Resource Allocation for Multi-Cell OFDMA Cooperative Relay Networks”, WCNC 2010 proceedings.        

3.           Long Gao, Shuguang Cui and Feifei Li, “A Low-complexity Adaptive Subcarrier, Bit, and Power Allocation Algorithm for OFDMA Systems”,IEEE GLOBECOM 2006 proceedings.

4.           Bo Bai, Wei Chen and Khaled B. Lataief, “Achieving High Frequency Diversity with Subcarrier Allocation in OFDMA Systems”, IEEE GLOBECOM 2008 proceedings, pp. 1-5.

5.           Shenghong Li and Ross D. Murch, “Realizing Cooperative Multiuser OFDMA Systems with Subcarrier Resource Allocation”, IEEE Transactions on Wireless Communications Vol.12, No.4, April 2013,pp 1923-1935.

6.           Ahmad M. El-Hajji and Zaher Dawy, “Dynamic Joint Switching Point Configuration and Resource Allocation in TDD-OFDMA Wireless Networks”, IEEE GLOBECOM 2011 proceedings.

7.           Lukai Xu, Guanding Yu and Yuhuan Jiang, “Energy-Efficient Resource Allocation in Single-Cell OFDMA Systems:ulti-Objective Approach, IEEE Transactions on Wireless Communications,2015.

8.           Zheng, Chang, Tapani, Restaniemi, “Asymmetric resource allocation for OFDMA networks with collaborative relays”, The 10th Annual IEEE CCNC-Wireless Networking track, 2013.

9.           Dapeng, Zhang, Laurie, Cuthbert, ”Dynamic subcarrier and power allocation in LTE networks”, IEEE 5th International Conference on Wireless Communication,
Networking and Mobile Computing, pp 1-4,

10.        Lihan Liu, Zhuwei Wang, Xing Zhang and Hong Wu, “Radio Resource Management for the Uplink OFDMA System with Imperfect CSI”, 2015 IEEE Wireless Communications and Networking Conference.

11.        C. Y. Ng and C. W. Sung, “Low Complexity Subcarrier and Power Allocation for Utility Maximization in Uplink OFDMA Systems”, IEEE Transactions in Wireless Communication, Vol.7, No.5, pp. 1667- 1675,May 2008.

12.        Hojoong Kwon and Byeong Gi Lee,” Distributed Resource Allocation through Noncooperative Game Approach in Multi-cell OFDMA Systems,” IEEE conference publications,2006.

13.        P Xu, X Fang, M Chen, Y Xu, “A Stackelberg game-based spectrum allocation scheme in macro/femtocell hierarchical networks” Computer Communication 36, 1552–1558 (2013)

132-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Anita Ganpati, Jyoti Sharma

Paper Title:

A Hybrid Implementation of K-Means and HAC Algorithm and Its Comparison with other Clustering Algorithms

Abstract: There is a huge amount of data which is being produced everyday in Information Technology industry but it is of no use until converted into useful information. Data mining is defined as the process of extracting of hidden predictive information from large databases. Data mining provides an easy and timesaving concept to extract the useful information from large database instead of going through the whole database. There are various data mining techniques and clustering is one of them. Clustering algorithms especially draws significant attention of researchers all around the world because it makes an easy availability of the same data in form of clusters. There are various types of clustering algorithms available in the literature, with each algorithm having its own pro and cons. In this research paper, a hybrid implementation of k-Means and HAC clustering algorithm is presented. Also, the hybrid approach is compared with four other clustering algorithm namely k-Means, DT, HAC, VARCHA. The hybrid implementation has been done using Python scripting language and SCIKIT LEARN open source tool was used for the performance comparison of the algorithms. The various parameters used for comparison were accuracy, precision, recall and f-score. The results show that the performance of hybrid algorithm is found to be quite better than the existing ones.   

Keywords:
  Data Mining, Clustering, k-Means, DT, HAC, VARCHA, Python and SCIKIT


References:

1.           http://www.tutorialspoint.com/data_mining/dm_cluster_analysis.html.
2.           Lior Rokach, Oded Maimon, “Clustering Methods”, http://www.ise.bgu.ac.il/faculty/liorr/hbchap15.pdf.

3.           Aastha Joshi, “A Review: Comparative Study of Various Clustering Techniques in Data Mining”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 3, March 2013.

4.           Bhavani Thuraisingham, “Data Mining-Technologies, Techniques, Tools and Trends”, CRC, 1999.
5.           Jyoti Sharma and Anita Ganpati, “An Analysis of Grid Based Clustering Algorithms In Data Mining”, National Seminar on Web Based Technologies: Present & The Future, St. Bede’s College, Aptil 30th 2015- May 1st 2015, Shimla.
6.           M.Sathya Deepa, “Comparative Studies of Various Clustering Techniques and Its Characteristics”, International Journal Advanced Networking and Applications, Vol. 5, Issue 6, 2014.

7.           Margaret H. Dunham,“Data mining Introductory and Advanced Topics”,  Pearson Publication, 2005.

8.           Pang-Ning-Tan, Michael Steinbach, Vipin Kumar, “Introduction to Data Mining”, Pearson Publication, 2009.

9.           Ravindra Jain, “A Hybrid Clustering Algorithm for Data Mining”, IEEE Transaction on Neural Networks, June 2012.

10.        Manju Kaushik and Mrs. Bhawana Mathur, “Comparative Study of K-Means and Hierarchical Clustering Techniques”, International Journal of Software & Hardware Research in Engineering (IJSHRE), Vol. 2, Issue 6, 2014.

11.        Bharat Chaudhari and Manan Parikh, “A Comparative Study of Clustering Algorithms Using Weka Tool , International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 1, Issue 2, October 2012.

12.        S. Revathi, “Performance Comparison of Various Clustering Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering,  Vol. 3, Issue 2, February 2013.

13.        T. Kanungo, D. Mount, N. Netanyahu, C. Piatko, R. Silverman, and A. Wu, “An efficient k-Means Clustering Algorithm: Analysis and Implementation”, IEEE Transaction Pattern Analysis and Machine Intelligence, Vol. 24, No. 7, July 2000.

14.        Yuhua Feng, “Analysis on Algorithm and Application of Cluster in Data Mining”, Journal of Theoretical and Applied Information Technology, Vol. 46, No.1, December 2012.

15.        http://gerardnico.com/wiki/data_mining/cluster, Accessed on 15.09.2015 at 21:10.

136-138

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Nikita Lemos, Kavita Sonawane, Bidisha Roy

Paper Title:

Novel Approach to Secure Data Transmission using Video

Abstract: Internet is being widely used for transmitting sensitive data. The data transferred online is prone to attacks. This paper presents a novel technique where steganography and cryptography are clubbed together to get achieve dual level security. Steganography hides the existence of data and cryptography scrambles the data and makes it difficult to interpret it even if the attacker gets hold of the data. Since videos are used widely today and are a popular on social media we have used video as a cover to the hide the secret data Text data is stored in video frames. The data is subjected to steganography and cryptography which are simple and novel techniques and then stored in the video frames using a random fashion using simple linear probing techniques.

Keywords:
   Steganography, cryptography, cover, security threats


References:

1.           Petitcolas, F.A.P.: “Introduction to Information Hiding”. In: Katzenbeisser, S and Petitcolas, F.A.P (ed.) (2000) Information hiding Techniques for Steganography and Digital Watermarking. Norwood: Artech House, INC.
2.           Ashish T. Bhole, Rachna Patel, “Design and Implementation of Steganography Over Video File”, The Indian Journal of Technical Education, Special Issue for NCEVT’ 12, pp. 69-72, April 2012.

3.           Natarajan Meghanathan, Lopamudra Nayak, “Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio And Video Cover Media”, International Journal of Network Security and its Applications (IJNSA),Vol.2, No.1,pp. 43-55, January 2010.

4.           R. Balaji and G. Naveen,” Secure Data Transmission Using Video Steganography”, Electro/Information Technology IEEE International Conference , 2011

5.           Nikita lemos, Kavita sonawane and Bidisha Roy,”Secure data transmission using video”, Eight International Conference on Contemporary Computing (IC3)  IEEE ,2015

139-140

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Hakeemuddin Ahmed, N. Seetha Ramaiah, M. Manzoor Hussain

Paper Title:

Experimental Investigation of Surface Integrity of End milled CFRP Composites

Abstract: In general, the quality of the surface produced during machining is affected by the process variables and the vibrations of the tool. The surface finish is affected by the undesired vibrations that occur especially   when a rotating tool like drill/ milling cutter is involved. Machining of fiber reinforced composites plays a vital role in obtaining fine tolerances on their components so as to assemble and integrate them with the other components. Carbon Fiber Reinforced Polymer (CFRP) composites are rapidly substituting the conventional materials as they meet high performance requirements due to their high specific stiffness, strength and corrosion resistance. In this study, the effect of process parameters on the dimensional accuracy and surface finish of the slots produced by end milling on CFRP laminate is studied. Experimental investigation is carried out to determine the relationship between spindle speed and feed which minimizes the surface roughness and delamination factor. The variation of the cutting forces involved is also studied in relation with the process variables to derive the regression equations

Keywords:
  CFRP, Delamination factor, End Milling, Surface Integrity


References:

1.           Azmi, A.I., R.J.T. Lin, and D. Bhattacharyya, “Experimental Study of Machinability of glass fibre reinforced composites by End milling”, Materials and Manufacturing Processes, Vol 27, 2012, pp1045-1050
2.           Calzada, K.A., J. Samuel, S.G. Kapoor, and R.E. Devor, “Failure mechanisms encountered in micro-milling of aligned carbon fiber reinforced polymers”.Transaction of NAMRI/SME 2010, 38, pp 221-228.

3.           Carlos Santiuste , Xavier Soldani , Maria Henar Miguélez, “Machining FEM model of long fiber composites for aeronautical components”, Composite Structures  92 (2010)  pp 691–698

4.           H.Y. Puw and H. Hocheng, “Machinability test of carbon fiber reinforced plastics in milling”. Materials and Manufacturing Processes, 1993 pp 103-108.

5.           J.Paulo Davim, Pedro Reis, C.Conceicao Antonio, A study on milling of GFRP by hand layup using ANOVA, Composite Structures, Vol. 64, 2004. pp 493-500

6.           Karpat, Y., O. Bahtiyar, and B. Değer, “Mechanistic force modeling for milling of unidirectional carbon fiber reinforced polymer laminates”. International Journal of Machine Tools and Manufacture. Vol 56, 2012, pp 79-93

7.           Kalla, D., J. Sheikh-Ahmad, and J. Twomey, “Prediction of cutting forces in helical end milling fiber reinforced  polymers”. International Journal of Machine Tools and Manufacture, Vol 50, 2010 pp 882-891

8.           Koplev, A., A. Lystrup, and T. Vorm, “The cutting  process, chips, and cutting forces in machining CFRP Composites”, Composites,1983, Vol14, pp 371-376

9.           N.Feito, J.Lopez-Puente Numerical prediction of  delamination in CFRP drilling, Composite Structures, Vol 108, 2014, pp 677-683

10.        Rahman, M., S. Ramakrishna, J.R.S. Prakash, and      D.C.G. Tan, “Machinability study of carbon fiber reinforced composite”. Journal of Materials Processing Technology, 1999, pp 292-297.

11.        Rawat, S. and H. Attia, “Wear mechanisms and tool life management of WC-Co drills during dry high speed drilling of woven carbon fibre composites”. Wear 2009, 267 (5-9), pp 1022-1030.

12.        R.Madoliat, S.Hayati, A.Ghasemi Galebahman        “Investigation of chatter suppression in slender end mill via a frictional damper”, Scientia Iranica B, Vol.18,
2011, pp 1069-1077

13.        Takeyama, N. Ijima, “Machinability of GFRP and application of Ultrasonic machining”, Annals of CIRP, 1998,37(1), pp 93-96

14.        Tsao, C.C., “Investigation into the effects of drilling parameters on delamination by various step-core drills”, Journal of Materials Processing Technology, 2008. 206(1-3), pp. 405-411.

141-145

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Rashmi Kalia

Paper Title:

Persistent Organic Pollutants: A Review

Abstract: Persistent organic pollutants (POPs) are toxic chemicals that adversely affect human health and the environment around the world. Most of the POPs are released due to anthropogenic activities, while others are produced as a result of secondary emission. Because they can be transported by wind and water, most POPs generated in one country can and do affect people and wildlife far from where they are used and released. They persist for long periods of time in the environment and can accumulate and pass from one species to the next through the food chain.

Keywords:
Persistent Organic Pollutants, Pesticides, Hazards

 References:
1.        Beyer, A., Mackay, D., Matthies, M., Wania, F., Webster, E. (2000). Assessing Long-Range Transport Potential of Persistent Organic Pollutants. Environmental Sciences & Technology. 34(4), 699–703.
2.        Dewan, Jain V,; Gupta P; Banerjee BD. (February 2013). “Organochlorine pesticide residues in maternal blood, cord blood, placenta, and breastmilk and their
relation to birthsize”. Chemosphere 90 (5): 1704-1710

3.        Damstra, T. (2002). Potential Effects of Certain Persistent Organic Pollutants and Endocrine Disrupting Chemicals on Health of Children. Clinical Toxicology. 40(4), 457–465

4.        El-Shahawi, M.S., Hamza, A., Bashammakhb, A.S., Al-Saggaf, W.T. (2010). An overview on the accumulation, distribution, transformations, toxicity and analytical methods for the monitoring of persistent organic pollutants. Talanta. 80, 1587–1597

5.        Francis, O., A, 2004. Boon or Bane? The Environmental and Health Impacts of Persistent Organic Pollutants (POPs), Human Ecology Review, Vol. 11, No. 1, 27-35

6.        Wania, F., Mackay, D. (1996). Tracking the Distribution of Persistent Organic Pollutants. Environmental Science & Tech
nology. 30 (9), 390A–396A.

146-148

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Zuhair Issa Ahmed, Ali Malik Saadoon

Paper Title:

Optimization Process Parameters of Submerged Arc Welding Using Taguchi Method

Abstract: Submerged arc welding (SAW) process is an essential metal joining processes in industry. The quality of weld is a very important working aspect for the manufacturing and construction industries, the challenges are made optimal process environment. Design of experimental using Taguchi method (L9 orthogonal array (OA)) considering three SAW parameter are (welding current, arc voltage and welding speed) and three levels (300-350-400 Amp. , 32-36-40 V and 26-28-30 cm/min). The study was done on SAW process parameters on the mechanical properties of steel type comply with (ASTM A516 grade 70). Signal to Noise ratio (S/N) was computed to calculate the optimal process parameters. Percentage contributions of each parameter are validated by using analysis of variance (ANOVA) technique. The experimental results were analyzed by using Minitab 16 software.

Keywords:
  ANOVA, SAW, S/N, Taguchi Method, Welding Process Parameters

 References:
1.           Syarul Asraf Mohamata, Izatul Aini Ibrahima, Amalina Amira and Abdul Ghaliba, “The Effect of (FCAW) processes on different Parameters”, 2012 (IRIS 2012), 1497 – 1501.
2.           Shahnwaz Alam and Mohd.Ibrahim Khan, “Prediction of the Effect of SAW Process Parameters on Weld Bead Width for M.S. 1018 Steel”, (IJEIT) Volume 1, Issue 5, may 2012, 2277-3754.

3.           R. S. Chandel, H. P. Seow and F. L. Cheong, J Mater Process Technol, 72 (1997)124-128.

4.           L. J. Yang, R. S. Chandel and M. J. Bibby, J. Weld, 72 (1993) 11s-18s.

5.           Saurav Datta, Asish Band and Pradip Kumar Pal, “Modeling and optimization of features of bead geometry including percentage dilution in SAW using mixture of fresh flux and fused slag”, IJAMT, 2008 DOI 10.1007/s00170-006-0917-4, 36:1080–1090.

6.           Keshav Prasadand and D. K. Dwivedi, “Some investigations on microstructure and mechanical properties of SAW HSLA steel joints”, IJAMT, 2008 DOI 10.1007/s00170-006-0855-1.
7.           S. Kumanan, J. K. Gowthaman and Edwin Raja Dhas, “Determination of SAW process parameters using Taguchi method and regression analysis”, IJEMS, vol. 14, June 2007, 177-183

8.           Ravinder Pal Singh, R.K. Garg and D.K. Shukla, “Parametric Effect on Mechanical Properties in Submerged arc welding process – A review”, (IJEST) Feb.2012, Vol.
4 No.02 0975-5462.

9.           N. Murugan, V. Gunaraj and J. Mater Process Technology, 168 (2005) 478-487.

10.        Y. S.Tarng,; W.H. Yang, studies the “Application of the Taguchi Method to the Optimization of the SAW’. Materials and Manufacturing Processes. 13 (3), 455-467 (1998).

11.        Ankita Singh; Saurav Datta; Siba Sankar Mahapatra; Tapan Singha and Gautam Majumdar.: “Optimization of bead geometry of SAW using fuzzy based
desirability function approach. J Intell Manuf. DOI 10.1007/s10845-011-0535-3.

12.        R.S. Chandel; H.P. Seow; F.L. Cheong, studies the “Effect of increasing deposition rate on the bead geometry of SAW’. (JMPT). 72,124-128 (1999).

13.        R.S. Parmar, “Welding Processes and Technology”, third edition, Khanna publishers, Delhi, India, P. 221, 2012.

149-152

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-5 Issue-2

 Download Abstract Book

S. No

Volume-5 Issue-2, December 2015, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Ahmed M. Bagabir

Paper Title:

Effects of Rib Configuration on Cooling of Gas-Turbine Blades

Abstract:  This study aims to investigate the effects of rib configuration on cooling gas turbine blades. Three-dimensional ribbed square-channel of gas turbine blades are simulated with the Reynolds averaged Navier-Stokes equations. Air flow in periodical transverse and 45o inclined rib arrays, mounted in inline and staggered arrangements on the lower and upper walls of the channel. The governing equations are discretized by the second order upwind differencing scheme, decoupling with the SIMPLE algorithm. The turbulence effect is modeled with the RNG k-ε model. The present numerical results show excellent agreement with published experimental data. The presented results are streamtraces, velocities, local and area-averaged Nusselt numbers over ribbed walls for the Reynolds numbers ranging from 2104 to 4104..

Keywords:
  heat transfer, numerical simulation, ribbed channel, turbine blade.


References:

1.        Han, J.C., Dutta, S., and Ekkad, S., 2000. Gas Turbine Heat Transfer and Cooling Technology, Taylor and Francis, New York.
2.        Bagabir A., Khamaj J. A. and Hassan A. S., 2013. Turbulent periodic flow and heat transfer in a square channel with different ribs. Journal of Applied Mathematics and Physics, Vol. 1, No. 6, pp. 65-73.

3.        Khamaj, J., 2002. An experimental study of heat transfer in the cooling channels of gas turbine rotor blades. PhD Thesis, University Wales, UK.

4.        Manca, O., Nardini, S. and Ricci, D., 2011. Numerical study of air forced convection in a channel provided with inclined ribs, Frontiers in Heat and Mass Transfer, Vol. 2.

5.        Han J.C., Zhang Y.M., Lee C.P., 1991. Augmented heat transfer in square channels with parallel, crossed and V-shaped angled ribs. ASME, Journal of Heat Transfer, Vol 113, pp. 590–596.

6.        Promvonge P., Changcharoen W., Kwankaomeng S. and Thianpong C., 2011. Numerical heat transfer study of turbulent square-duct flow through inline V-shaped discrete ribs.

7.        International Communications in Heat and Mass Transfer, Vol 38, pp. 1392–1399.

8.        Kamali R. and Binesh A.R., 2008. The importance of rib shape effects on the local heat transfer and flow friction characteristics of square ducts with ribbed internal surfaces. International Communications in Heat and Mass Transfer, Vol. 35, pp. 1032–1040.

9.        Tanda, G., 2011.  Effect of rib spacing on heat transfer and friction in a rectangular channel with 45 angled rib turbulators on one/two walls. Int. J. Heat Mass Transfer, Vol. 54, pp. 1081–1090.

10.     Wu, H.-W.,  and Lau, C.-T., 2005. Unsteady turbulent heat transfer of mixed convection in a reciprocating circular ribbed channel. International Journal of Heat and Mass Transfer, Vol. 48, pp. 2708–2721.

11.     Dutta, S., Han, J.-C., and Lee, C.P., 1996. Local heat transfer in a rotating two-pass ribbed triangular duct with two model orientations. Int. J. Heat Mass Transfer, Vol. 39, pp. 707–715.

12.     Chang, S.W. and Gao, J.Y. 2014. Heat transfer enhancement by skewed wavy sidewall for two-pass ribbed channels with different aspect ratios. International Journal of Heat and Mass Transfer, Vol. 73, pp. 217–230.

13.     Lawson, S.A., Thrift, A.A., Thole, K.A. and Kohli, A., 2011. Heat transfer from multiple row arrays of low aspect ratio pin fins. Int. J. Heat Mass Transfer, Vol. 54, pp. 4099–4109.

14.     Promvonge, P., Chompookham, T., Kwankaomeng, S., and Hianpong C., 2010. Enhanced heat transfer in a triangular ribbed channel with longitudinal vortex generators. Energy Conversion and Management, Vol. 51, pp. 1242–1249.

15.     Moon, M-A, Park, M-J, and Kim, K-Y, 2014. Evaluation of heat transfer performances of various rib shapes. International Journal of Heat and Mass Transfer, Vol. 71, pp. 275–284.

16.     Wright, L.M., Fu, W.-L. and Han, J.C., 2004. Thermal performance of angled, V-shaped, and w-shaped rib turbulators in rotating rectangular cooling channels AR4:1. ASME J. Heat Transfer, Vol. 126, pp. 604–614.

17.     Sampath A. R. Effect of rib turbulators on heat transfer performance in stationary ribbed channels, PhD Thesis, Cleveland State University, USA 2009.

18.     Jenkins, S.C., Zehnder, F., Shevchuk, I.V., Wolfersdorf, J., Weigand, B., and Schnieder, M., 2012. The effects of ribs and tip wall distance on heat transfer for a varying aspect ratio two-pass ribbed internal cooling channel. ASME J. Turbomach., Vol. 135.

19.     Liu H. and Wang J. 2011. Numerical investigation on synthetical performances of fluid flow and heat transfer of semiattached rib-channels. International Journal of Heat and Mass Transfer, Vol. 54, pp. 575–583.

20.     Ahn, J. and Lee J. S., 2010. Large eddy simulation of flow and heat transfer in a channel with a detached rib array. International Journal of Heat and Mass Transfer, Vol. 53, pp. 445–452.

21.     Promvonge, P., Sripattanapipat, S. and Kwankaomeng, S., 2010. Laminar periodic flow and heat transfer in square channel with 45o inline baffles on two opposite walls. International Journal of Thermal Sciences, Vol. 49, pp. 963-975.

22.     Yakhot V. and Orszag, S. A., 1986. Renormalization Group Analysis of Turbulence: I. Basic Theory. Journal of Scientific Computing. Vol. 1, No. 1, pp. 1–51.

23.     Hirsh, C., 1989. Numerical Computation of Internal and External Flow. Wiley-Interscience, Series in Numerical Methods in Engineering Vol. 1-2.

24.     Ferziger, J. H. and Peric, M., 1997. Computational Methods for Fluid Dynamics. Springer 1997.

1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Sreejith K.M., K. Suresh, K. Rajeev

Paper Title:

Color Segmentation Based Resolution Enhancement of Depth Image and Stereoscopic Image Synthesis

Abstract: In this paper a color segmentation based resolution enhancement of depth image is proposed. The resolution enhancement technique is combined with depth image based rendering (DIBR) method to generate stereo images. The major problem in transmission of stereo images is bandwidth. By using DIBR the transmission efficiency can be increased. Also if we are using low resolution depth map for transmission, the bandwidth for transmission can be further reduced. A color segmentation based interpolation procedure is used to enhance the resolution of the depth map. This depth resolution enhancement method sharpens depth image using the color information from the high resolution color image. From this resolution enhanced depth image the stereoscopic images are synthesized using DIBR method. For more textured region, we are using an edge-guided image interpolation algorithm to enhance the performance of the color segmentation based interpolation algorithm.

Keywords:
  DIBR, depth image, enhanced depth map, color segmentation


References:

1.        K. Gomi, Y. Nishino, K. Tai, M. Yasuda, and N. Tetsutani, “Stereoscopic video transmission and presentation system for ISDN,” IEEE Transactions on Consumer Electronics, vol. 36, no. 3, pp. 759–766, 1990.
2.        J.Flack, P.V.Harman, and S.Fox,“Low-bandwidth stereoscopic image encoding and transmission,” in Proceedings of SPIE Conference on Stereoscopic Displays and Virtual Reality Systems X, 2003, vol.5006,pp. 206–214.

3.        C.  Fehn,“A    3D-TV system  based  on  video  plus  depth  information,” Conference Record of the Thirty-Seventh Asilomar Conference on Signals, Systems and Computers, 2003. IEEE, 2003, vol. 2, pp. 1529–1533. in

4.        C. Fehn, “Depth-image-based rendering (DIBR), compression, and transmission for a new approach on 3D-TV,” in Proceedings of SPIE, 2004, vol. 5291, p. 93.

5.        Q. Wei, “Converting 2D to 3D: A survey,” in International Conference on Information and Communication Theory, 2005, vol. 7, p. 14.

6.        H. Hou and H. Andrews, “Cubic splines for image interpolation and digital filtering,” IEEE Transactions on Acoustics, Speech and Signal Processing, vol. 26, no. 6, pp. 508–517, 1978.

7.        Q.H. Nguyen, M.N. Do, and S.J. Patel, “Depth image-based rendering with low resolution depth,” in 16th IEEE International Conference on Image Processing (ICIP), 2009, 2009, pp. 553–556.

8.        L. Zhang and X. Wu, “An edge-guided image interpolation algorithm via directional filtering and data fusion,” IEEE Transactions on Image Processing, vol. 15, no. 8, pp. 2226–2238, 2006.

9.        L. Zhang and W.J.Tam, “Stereoscopic image generation based on depth images for 3D TV,” IEEE Transactions on Broadcasting, vol. 51, no. 2, pp. 191–199, 2005.

10.     W.Y. Chen, Y.L. Chang, S.F. Lin, L.F. Ding, and L.G. Chen, “Efficient depth image based rendering with edge dependent depth filter and interpolation,” in IEEE International Conference on Multimedia and Expo, 2005. ICME 2005., 2005, pp. 1314–1317.

11.     M. Schmeing and X. Jiang, “Time-consistency of disocclusion filling algorithms in depth image based rendering,” in 3DTV Conference: The True Vision-Capture, Transmission and Display of 3D Video (3DTV-CON), 2011. IEEE, 2011, pp. 1–4.

12.     F. Malgouyres and F. Guichard, “Edge direction preserving image zooming: a mathematical and numerical analysis,” SIAM Journal on Numerical Analysis, pp. 1– 37, 2002.

13.     D. Comaniciu and P. Meer, “Mean shift: A robust approach toward feature space analysis,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.
24, no. 5, pp. 603–619, 2002.

14.     “Middlebury stereo datasets,” http://vision.middlebury.edu/stereo/data/

15.     D. Scharstein and C. Pal, “Learning conditional random fields for stereo,” in IEEE Conference on Computer Vision and Pattern Recognition, 2007. CVPR’07., 2007, pp. 1–8.

16.     H. Hirschmuller and D. Scharstein, “Evaluation of cost functions for stereo matching,” in IEEE Conference on Computer Vision and Pattern Recognition, 2007. CVPR’07., 2007, pp. 1–8.

17.     “Depth image of ’chairs’, http://www.dofpro.com/cgigallery.htm

7-14

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Hariharan.S, Parvathy.B.H, Aruna.N.S

Paper Title:

A Pictorial Review and an Algorithm for the Determination of Sickle Cell Anemia

Abstract:  Sickle cell anemia (SCA) is a heritable blood disorder which is caused by lack of red blood cells in the blood. In sickle cell anemia, red blood cell shape is changed to sickle shape or half-moon shape, which blocks the flow of blood in small blood vessels in the body. In this disease the characteristics of red blood cell will change and they become sticky and bind together. In some cases it elongates and becomes elliptical in shape. In this paper a brief pictorial review of sickle cell anemia is presented to attract the attention among researchers to work with a common goal for the elimination of this disease from this world. We have collected few SCA affected blood images and an effort is made for the analysis of these images. An algorithm is proposed to detect the presence of SCA.

Keywords:
Computer processing of Red blood corpuscles, Image processing of blood cells, Cell image analysis, Sickle cell anemia.


References:

1.        Shashi Bala, Amit Doegar, “Automatic detection of  sickle cell in red blood cell using watershed segmentation” International Journal of Advanced Research in Computer and Communication Engineering, Vol-4, Issue-6, June 2015, pp488-491.
2.        Menika Sahu, Amit kumar Biswas, K.Uma, “Detection of sickle cell anemia in Red blood cell: A review” International Journal of Engineering and Applied Sciences, Vol-2, Issue-3, March 2015, pp45-48.

3.        Kriti Bhowmik, Pranatic Rakshit, “Detection of abnormal findings in human RBC in diagnosing sickle cell anemia using image processing”, International Conference on  Computational Intelligence: Modelling technique and Application, 2013, pp28-36.

4.        Athira sreekumar, Ashok  Bhattachariya, “Identification of Sickle Cells from  Microscopic Blood Smear Image using Image Processing” International Journal of  Emerging Trends in Science and Technology, Vol-1, July 2014,pp783-787.

5.        Pranati Rakshit, Kriti Bhowmik,”   Detection of abnormal findings in human RBC in diagnosing G’6PD deficiency huemolxtic anemia using image processing”  IEEE 1st International Conf. on Condition AssessmentTechniques in Electrical systems, CATCON 2013, pp  297- 302.

6.        H.Inaba,M.Greaves and C.Mullighan “Acute Lymphoblastic Lukemia” Lancet,vol-381, No-381, June 2013, pp1943-1955.

7.        F.Sadeghian,Z.Seman,A.Ramli,B.Kahar and M.Sharipan, “A frame work for white blood cell segmentation in microscopic blood images using digital image
processing” Biol, procedures on line, Vol-11, no-1, pp 196-206, June 2009.

8.        H.Ramoser, V.Laurain, H.Bischof and R.Ecker, “Leukocyte segmentation and classification in blood smear images”, in proc.IEEE EMBS 2006, pp 3371-3374.

9.        Sos Agaian,Monica Madhukar, Anthony, T.Chronopoulos, “Automatic screening for acute leukemia detection in blood microscopic images, IEE systems journal, Vol8,no-3,PP 995-1003 September 2014.

10.     S.Mohapatra, D.Patra, “Automated lukemia detection using hausdorff dimension in blood microscopic images”’ in proc of.Int.Conf. on Emerg. Trend Robot communi.Technology.2010, PP 64-68.

11.     N. R. Pal, S. K. Pal,”A Review on Image Segmentation Techniques”, Pattern Recognition, Vol. 26, No. 9, 1993, pp. 1277- 1294,

12.     ASH image bank:American Society of Hematology. [On line] Available: http://image bank.hematology.org/ Default.aspx

15-20

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Abdulnaser M. Alshoaibi

Paper Title:

Adaptive Finite Element Simulation of Fatigue Crack Propagation

Abstract: An adaptive finite element interactive program has been developed for fatigue crack propagation simulation under constant amplitude loading condition. The purpose of this model is on the determination of 2D crack paths and surfaces as well as on the evaluation of components Lifetimes as a part of the damage tolerant assessment. As part of a linear elastic fracture mechanics analysis, the determination of the stress intensity factor distribution is a crucial point. The fatigue crack direction and the corresponding stress-intensity factors are estimated at each small crack increment by employing the J-integral technique.  The propagation is modeled by successive linear extensions, which are determined by the stress intensity factors under linear elastic fracture mechanics assumption. The stress intensity factors range history has to be recorded along the small crack increments. Upon completion of the stress intensity factors range history recording, fatigue crack propagation life of the examined specimen is predicted. Verification of the predicted fatigue life is validated with relevant experimental data and numerical results obtained by other researchers. The comparisons show that this model is capable of demonstrating the fatigue life prediction results as well as the fatigue crack path satisfactorily.

Keywords:
  Finite element, Fatigue, Crack growth, Stress intensity factor, Adaptive mesh

References:
1.           Alshoaibi M. Abdulnaser, 2010. Finite Element Procedures for the Numerical Simulation of Fatigue Crack Propagation under Mixed Mode Loading. Structural Engineering and Mechanics. Vol. 35, No.3, pp.283-299.
2.           Atluri, S.N., 1982. Path-independent integrals in finite elasticity and inelasticity, with body forces, inertia, and arbitrary crack-face conditions”, Engineering Fracture. Mechanics, 16, pp.341-364.

3.           Belytschko T, Gu L, Lu YY. Fracture and crack growth by element-free Galerkin methods. Model Simul Mater Sci Eng 1994;2:519–34.

4.           Bittencourt, T.N., P.A. Wawrzynek, A.R. Ingraffea and J.L. Sousa, 1996. Quasi-automatic simulation of crack propagation for 2D LEFM problems. Engineering Fractrue Mechanics, Volume 55, pp. 321-334.

5.           Cho, J.U,  Xie, L., Cho, C.,  Lee, S., 2012. Crack propagation of CCT foam specimen under low strain rate fatigue. International Journal of Fatigue, 35, pp. 23–30

6.           Duflot, M. and Dang, H.N. A meshless method with enriched weight functions for fatigue crack growth. Int J Numer Methods Eng 2004;59:1945–61.

7.           Duflot, M., Dang, H.N. Fatigue crack growth analysis by an enriched meshless method. J Comput Appl Math 2004;168:155–64.

8.           Erdogan, F. and G. Sih, 1963. On the crack extension in plates under plane loading and transverse shear. Journal of Basic Engineering 85: 519–27.

9.           Erdogan, F. and G. Sih, 1963. On the crack extension in plates under plane loading and transverse shear. Journal of Basic Engineering 85: 519–27.

10.        Portela A, Aliabadi M, Rooke D. The dual boundary element method: effective implementation for crack problem. Int J Numer Methods Eng,1991;33:1269–87.

11.        Rice, J.R., 1968. A path independent integral and the approximate analysis of strain concentration by notches and cracks”, J. App. Mech., 35, pp.379-386.

12.        Singh, I.V., Mishra, B.K.,  Bhattacharya, S.,  Patil, R.U.,  The numerical simulation of fatigue crack growth using extended finite element method, 2012,
International Journal of Fatigue, 36, 109–119

13.        Yan AM, Nguyen-Dang H. Multiple-cracked fatigue crack growth by BEM. Comput Mech 1995;16:273–80.

14.        Yan, X. A boundary element modeling of fatigue crack growth in a plane elastic plate. Mech Res Commun 2006;33:470–81.

15.        Yung-Li Lee, Y.L, Pan, J.,   Hathaway, R.  Barkey, M.E., 2005. Fatigue testing analysis theory and practice, Elsevier Butterworth–Heinemann.

21-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Yamuna K. Moorthy, Sakuntala S. Pillai

Paper Title:

Performance Analysis of Cooperative Spectrum Sensing for Cognitive Radios in Nakagami-m Fading Channels

Abstract: This paper studies and presents the effect of different hard fusion schemes applied to a cooperative cognitive radio system. The fading channel considered is the Nakagami-m channel. The hard fusion rules are the OR rule, AND rule and the majority fusion rule. Receiver Operating Characteristic (ROC) curves for cooperative sensing using the abovementioned fusion rules are plotted. The simulation results show that the OR fusion scheme gives superior performance compared to other fusion schemes. The paper also studies the effect of different number of co-operating users.

Keywords:
  spectrum sensing, data fusion, cooperative sensing

References:
1.           Federal Communications Commission, “Spectrum Policy Task Force,”Rep. ET Docket no. 02-135, Nov. 2002.
2.           F. F. Digham, M. S. Alouini, and M. K. Simon ”On the energy detection ofunknown signals over fading channels,” Proceedings of IEEE, pp. 3575-3579,May 2003.

3.           G. Ganesan and Y. Li, “Cooperative spectrum sensing in cognitive radio, part I: Two user networks,” IEEE Transactions on Wireless Communications, vol. 6, no. 6, pp. 2204–2213, June 2007.

4.           G. Ganesan and Y. Li, “Cooperative spectrum sensing in cognitive radio, part II: Multiuser networks,” IEEE Transactions on WirelessCommunications, vol. 6, no. 6, pp. 2214–2222, June 2007.

5.           J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEETransactions on Information Theory, vol. 50, no. 12, pp. 3062–3080,Dec. 2004.

6.           P. Varshney and C. Burrus, Distributed Detection and DataFusion, New York, NY, USA: Springer-Verlag, 1997.

7.           H. Urkowitz, ―Energy detection of unknown deterministic signals,‖ in Proceedings of the IEEE, vol. 55, no. 4, pp. 523–531, 1967. 6.

8.           F.F. Digham, M.-S. Alouini, M.K. Simon, On the energy detection of unknown signals over fading channels, IEEE Transactions on Communications 55 (1) (2007) 21-24. 7.

9.             J. Ma and Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” in Proc. IEEE Global Telecomm. Conf., 2007, pp. 3139-3143.

10.        N. C. Beaulieu and C. Cheng. An Efficient Procedure for Nakagami-m Fading Simulation. In IEEE Proc. of Globecom2001, volume 6, pages 3336–3342, Nov 2001.

11.        K. W. Yip and T. S. Ng. A simulation model for nakagami-m fading channels, m < 1. IEEE Transactions on Communications, 48(2):214–221, Feb 2000.

12.        F. F. Digham, M. S. Alouini and M. K. Simon, “On the energy detection of unknown signals over fading channels”, in Proc. of IEEE International Conference on Communications (ICC’03), (2003) May, pp. 3575– 3579..

13.        M. Grinstead and J. L. Snell, Introduction to probability. American Mathematical Soc., 1998. 10. J. Ma and Y. Li, ―Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,‖ in Proc. IEEE Global Telecomm. Conf., 2007, pp. 3139–3143. 11.

14.        E. Visotski, S. Kuffner and R. Peterson, “On Collaborative Detection of TV Transmissions in Support of Dynamic Spectrum Sharing”, Proceedings of IEEEDySPAN 2005, Nov. 2005.

15.        A. Gashemi and E. Sousa, ‘Collaborative Spectrum Sensing for Opportunistic Access in Fading Environments’, Proceedings of IEEE DYSPAN 2005B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

26-29

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

J. Thirumaran    , Nethra

Paper Title:

Role of Digital Marketing in Innovative Business Practices

Abstract: Digital marketing is an umbrella term for the targeted, measurable, and interactive marketing of products or services using digital technologies to reach and convert leads into customers. The key objective is to promote brands, build preference and increase sales through various digital marketing techniques. It is embodied by an extensive selection of service, product and brand marketing tactics, which mainly use the Internet as a core promotional medium, in addition to mobile and traditional TV and radio.

Keywords:
 Digital marketing, Mobile marketing, Facebook, Twitter, LinkedIn

References:
1.           Chaffey, D. & Ellis-Chadwick, F., 2012. Digital Marketing: Strategy, Implementation and Practice. 5 ed. Harlow: Pearson Education Ltd.
2.           WPPCM 2011, ‘’The Advantages of Pay Per Click Advertising’’ [Online] Available at: http://www.webrageous.com/blog/pay-per-click-advertising-advantages.

3.           Alloza, A. (2008), “Brand engagement and brand experience at BBVA, the transformation of a 150 years old company”, Corporate Reputation Review, Vol. 11 No. 4, pp. 371-379.

4.           Berger, J. (2013), Contagious: Why Things Catch On, Simon & Schuster, New York, NY. Bowden, J.L.H. (2009), “The process of customer engagement: a conceptual framework”, Journalof Marketing Theory and Practice, Vol. 17 No. 1, pp. 63-74.

5.           Bridgen, L. (2011), “Emotional labour and the pursuit of the personal brand: public relations practitioners’ use of social media”, Journal of Media Practice, Vol. 2 No. 1, pp. 61-76.

6.           Cheema, A. and Kaikati, A.M. (2010), “The effect of need for uniqueness on word of mouth”,Journal of Marketing Research, Vol. 47, June, pp. 553-563.

7.           Chelminski, P. and Coulter, R.A. (2007), “On market mavens and consumer self-confidence:a cross-cultural study”, Psychology & Marketing, Vol. 24 No. 1, pp. 69-91.

8.           Chena, Y., Fay, S. and Wang, Q. (2011), “The role of marketing in social media: how online consumer reviews evolve”, Journal of Interactive Marketing,  Vol. 25 No. 2, pp. 85-94.

9.           Christodoulides, G., Jevons, C. and  Bonhomme, J.  (2012),  “Memo to marketers: quantitative evidence for  change  how  user-generated  content  really  affects  brands”,  Journal  of Advertising Research, Vol. 52 No. 1, pp. 53-64.

10.        Court, D., Gordon, J. and Perrey, J. (2012), “Measuring marketing’s worth”, McKinsey Quarterly, Vol. 3, pp. 113-118.

11.        http://www.emarketingandcommerce.com/section/digital-marketing.

12.        http://www.emarketingandcommerce.com/section/digital-marketing.

30-33

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Shazeeda, Monika Sharma D

Paper Title:

Design and Implementation of an N bit Vedic Multiplier using DCT

Abstract:  One of the basic and fundamental functions in arithmetic operation is multiplication. Many of the application such as convolution and Fourier transform in digital signal processing, in microprocessors multiplication is very frequently used operation. In this paper we propose a fast multiplication method based on ancient Indian Vedic mathematics. The Vedic mathematics demonstrate the unified structure of mathematics by the 16 formulas. The generalized multiplication formula which is applicable in all cases is called Urdhava Triyakbhyam. In this paper we designed a Vedic multiplier in VHDL (Very High Speed Integrated circuit Hardware Description Language) and synthesis is done in Xilinx ISE series. The combinational delay of this multiplier is estimated and compared with that of Wallace tree multiplier. The results showed a significant improvement in the propagation delay. The  Vedic multiplier showed a propagation delay of 10.295 ns and 25.236 ns for 4 and 8 bit multiplication, respectively.a

Keywords:
Vedic multiplier, Wallace tree multiplier, Urdhva Tiryakbhyam, Discrete cosine transform.  


References:

1.        Ancient Indian Vedic Mathematics based 32-Bit Multiplier Design for High Speed and Low Power Processors, Nishant G. Deshpande, RashmiMahajan, International Journal of Computer Applications (0975 – 8887) Volume 95– No.24, June 2014.
2.        Haveliya, Asmita. “A Novel Design for High Speed Multiplier for Digital Signal Processing Applications (Ancient Indian Vedic mathematics approach).”International Journal of Technology and Engineering System (IJTES) 2, no. 1 (2011): 27-31.

3.        Purushottam D. Chidgupkar ,Mangesh T. Karad “The Implementation of Vedic Algorithms in Digital Signal Processing” , Vol.8, 2004.

4.        Badal Sharma, “Design and Hardware Implementation of 128-bit Vedic Multiplier” International Journal for Advance Research in Engineering and  Technology, Vol.3, 2013.

5.        Saha P., A. Banerjee, A. Dandapat, P. Bhattacharyya, “Vedic Mathematics Based 32-Bit Multiplier Design for High Speed Low Power Processors” International Journal on Smart Sensing and  Intelligent  Systems, Vol. 4, 2011.

6.        Kavita, UmeshGoyal “Performance Analysis of Various Vedic Techniques for Multiplication” International Journal of Engineering Trends and Technology, Vol.4, 2013.

7.        Sherif T. EID, “VLSI Design and Implementation of Different DCT Architectures for Image Compression”, 1999-2000.

8.        N.J.R. Muniraj,N.Senathipathi, “High Speed DCT Design Using Vedic Mathematics”,2011.

9.        Badal Sharma, “Design and Hardware Implementation of 128-bit Vedic Multiplier” International Journal for Advance Research in Engineering and  Technology, Vol.3, 2013.

10.     P. Saha, A. Banerjee, A. Dandapat, P. Bhattacharyya, “Vedic Mathematics Based 32-Bit Multiplier Design for High Speed Low Power Processors” International Journal on Smart Sensing and  Intelligent  Systems, Vol. 4, 2011.

11.     Michael Moeng, Jason Wei, “Optimizing Multipliers for the CPU: A ROM Based Approach” Electrical Engineering and Computer Science University of California: Berkeley.

12.     NavpreetSaroya, PrabhpreetKaur, “Analysis of Image Compression Algorithm Using  DCT and DWT Transforms”,  International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, 2014.

34-41

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Moayyad M. Al-Nasra

Paper Title:

The Use of Recycled Steel Bars as Shear Reinforcement Swimmer Bars in Reinforced Concrete Beams

Abstract: The discarded steel reinforcement bars can be either sent to steel plant to be melted and reproduced, or reused as steel reinforcement again. The main sources of the recycled steel bars are the demolished structures, damaged bars or collapsed structures. There is little evidence to trust the use of the recycled steel bars as a replacement of new steel bars. Engineers often question the safety of the structures built with recycled steel bars. In order to address the concern of the engineers, the recycled bars must be evaluated and categorized and eventually given an equivalent new bar label. Additional factor of safety could be used for uncertainty. In this study the recycled steel bars are used as spliced swimmer bars for shear reinforcement in reinforced concrete beams. The used bars in this study are classified as class-A recycled bars. There are several alternatives to the traditional stirrups in reinforced concrete beams. This study focuses on providing other options other than the stirrups. Due to the unsafe mode of shear failure in reinforced concrete beams, designers may find themselves reluctant to use higher factor of safety. Shear failure in reinforced concrete beams is one of the most undesirable modes of failure due to its rapid progression. This sudden type of failure made it necessary to explore more effective ways to design these beams for shear. The cost and safety of shear reinforcement in reinforced concrete beams led to the study of other alternatives. In this study two different types of shear reinforcements are used to study the effect of each type of shear reinforcement on the shear performance of reinforced concrete beams. The first type is reinforced by traditional stirrups, while the other type is reinforced by spliced swimmer bars. Two beams were prepared with spliced swimmer bars; the first is made from recycled steel bars, and the other is made from brand new bars. The beam made from recycled spliced swimmers is compared with the other two beams. Beam shear strength as well as beam deflection are the main two parameters considered in this study. The swimmer bar system is a new type of shear reinforcement. Splicing swimmer bars concept is a solution to the welding problem associated with old types of swimmer bars. Special shapes of swimmer bars are used for in this study such that the swimmer bars are spliced with the longitudinal flexural bars. Regardless of the number of swimmer bars used in each inclined plane, the swimmer bars form plane-crack interceptor system instead of bar-crack interceptor system when stirrups are used. The results of the three tested beams will be presented and discussed in this study. Also the deflection of the beams due to the gradual applied load is monitored and discussed. Cracks will be monitored and recorded during the beam test as the applied load increases.

Keywords:
  Deflection, Shear, Stirrup, swimmer bars

References:
1.        Al-Nasra, M.M., and Wang, L.R.L., 1994, Parametric Study of Slab-On-Grade Problems: Due to Initial Warping and Point Loads.  ACI Structural Journal, Vol. 91 No. 2. http://www.concrete.org/PUBS/JOURNALS/OLJDetails.asp?Home=SJ&ID=4596.
2.        Moayyad Al-Nasra, Naeim Asha, “The Use of Bolted U—Link Swimmer Bars in the Reinforced Concrete Beams,”  International Organization of Scientific Research, Journal of Engineering (IOSRJEN), Vol. 3 , Issue 10 , Version 5, ISSN Print: 2278-8719, ISSN Online: 2250-3021, DOI: 10.9790/3021-031052632, ANED: 0.4/3021-031052632, http://www.iosrjen.org, Pages 26-32, October, 2013.

3.        Moayyad Al-Nasra, Naeim Asha, “ Investigating the Use of Spliced Swimmer Bars as Shear Reinforcement in Reinforced Concrete Beams”, ,”  International Organization of Scientific Research, Journal of Engineering (IOSRJEN), Vol. 05 , Issue 02 , Version 02, ISSN Print: 2278-8719, ISSN Online: 2250-3021, DOI:- 05224754, ANED: 0.4/3021-05224754, ESCI-MML 3021-0502-4754, http://www.iosrjen.org, Pages 47-54, February 2015.

4.        Piyamahant, (2002) ,  Shear behavior of reinforced concrete beams with small amount of web reinforcement, M. Eng. Dissertation, Kochi University of Technology, Japan.

5.        Lesley H. Sneed and Julio A. 2008, Effect of Depth on the Shear Strength of  Concrete Beams without Shear Reinforcement, USA Portland and cement Association. http://www.cement.org/exec2/11-03-08.htm

6.        Noor  Hamid (2005). The Use of Horizontal and Inclined Bars as Shear  Reinforcement , Master Thesis, University of Technology , Malaysia, http://sunzi.lib.hku.hk/hkuto/record/B26643352

7.        ACI 318-11, 2011.  Building Code Requirements for Structural Concrete Commentary. http://www.concrete.org/pubs/newpubs/31811.htm

8.        Edward G.Nawy, 2009. Reinforced Concrete: A Fundamental Approach,   Prentice Hall International,  US, PP 120-315,  ISBN 0132417030, 9780132417037

42-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

9.

Authors:

Muthana Najim Abdulleh

Paper Title:

A Review of Network Virtualization (NV): A Brief Description of the Requirements, Objectives and Technology of Network Virtualization

Abstract:  In the past few years, network virtualization (NV) has been growing steadily among other network communities. NV offers an alternative advancement of the future internet by utilizing protocols and architectures through shared physical infrastructure and control architectures in the network. The frequent usage of NV demands new requirements that focus on the control and management of the given network. The existing process that combines software network resources and network functionality and hardware has even made NV more important in the network field (e.g., virtual networks have become important resources in information technology). Virtual network has taken the importance of NV from the original hardware while server virtualization supersedes virtual machines from the original server hardware. Therefore, the aim of the current paper is to provide a review of related studies on virtualization and NV concepts as well as aims or objectives and the requirements of such NV. It provides a brief description of technology and outlines its current and future applications. Finally, the study discusses the difficulties in implementing this technology.

Keywords:
   Network Virtualization, virtualization, Software-Defined Networks, Virtual Private Network


References:

1.           Web site (2013) “Virtualization –basic “ retrieved from   http://www .vmware. com/virtualization/what-is-virtualization.html /  accessed on August 9.
2.           Rouskas , G.N. (2012). “Network Virtualization: A Tutorial” , Optical Fiber communication conference and exposition (OFC/NFOEC), 2012 and national Fiber Optic Engineers Conference ,  pp. 1-15 , IEEE conference Publications.

3.           Website (2013). “Network Virtualization”, retrieved from  http://www.Baselinemag.com/c/a/Projects-Networks-and-Storage/Network-Virtualization-A-Primer/
accessed on August  9.

4.           N. M. Mosharaf Kabir Chowdhury & Raouf Boutaba (2009). University of Waterloo  , “Network Virtualization: State of the Art and Research Challenges” , IEEE Communications Magazine ,pp. 20-26, July.

5.           N.M. Mosharaf Kabir Chowdhury & Raouf Boutaba (2008).  “A Survey of Network Virtualization” , University of Waterloo, Computer Science dep., Technical Report:pp.1-22.

6.           Jorge Carapinha & Javier Jiménez (2009). “Network Virtualization – a View from the Bottom” , conferences.sigcomm.org/sigcomm , pp73.

7.           Network Virtualization Study Group (NVSG) White Paper “Advanced Network Virtualization: Definition, Benefits, Applications, and Technical Challenges” ,pp.1-35, Version 1.0 , January 2012.

8.           Anjing Wang, “Network Virtualization: Technologies, Perspectives, and Frontiers “, journal of light wave technology, vol. 31, no. 4, February 15, 2013.

9.           Margaret Chiosi,“Network Functions Virtualization” , at the “SDN and OpenFlow World Congress”, Darmstadt-Germany,  pp. 1-16 , October 22-24, 2012

10.        Jiradett Kerdsri, Komwut Wipusitwarkun ,“Network Virtualization for Military Application: Review and Initial development of conceptual design”, Defense Technology Institute, Thailand, 2012.

11.        Kundu , Raju Rangaswami Kaushik Dutta,and  Ming Zhao,  “Application Performance Modeling in a Virtualized Environment”, College of Business Administration Florida International University , 2009 .

12.        Mao Yang, Yong Li, Lieguang Zeng, Depeng Jin, Li Su , “Parallel Selection Algorithm for Multiple Applications in Network Virtualization “ , Tsinghua National Laboratory for Information Science and Technology , 2011.

13.        Li Yan ,  “Development and Application of Desktop Virtualization Technology “ , Computer Studies Department,Anhui University , 2011.

14.        Michael Beham, Marius Vlad, Hans P. Reiser, “Intrusion Detection and Honeypots in Nested Virtualization Environments” , University of Passau, Germany, 2013.

15.        Rami Co Renato Recio and Vinit Jain hen , “An Intent-based Approach for Network Virtualization “, IBM Austin, USA , IFIP, 2013.

16.        Xavier Costa-Pérez and Joerg Swetina, ,  “Radio Access Network Virtualization for Future Mobile Carrier Networks  “IEEE Communications Magazine , July 2013.

17.        Yang Yang, Xiang Long, Xiaoqiang Dou, Chengjian Wen,  “Impacts of Virtualization Technologies on Hadoop “,Third International Conference on Intelligent System Design and Engineering Applications, 2013.

18.        Blenk, A., Basta, A., Reisslein, M., & Kellerer, W. (2015). Survey on Network Virtualization Hypervisors for Software Defined Networking. arXiv preprint arXiv:1506.07275.

19.        Websit (2013), What is Network Virtualization from http://bradhedlund.com/2013/05/28/what-is-network-virtualization.

20.        K. Fall, “A delay-tolerant network architecture for challenged internets,” in Proceedings of the 2003 conference on Applications, 2003.

21.        L. V¨olker, D. Martin, I. E. Khayat, C. Werle, and M. Zitterbart, “ANode Architecture for 1000 Future Networks”, in Proceedings of the International Workshop on the Network of the Future 2009. Dresden,Germany: IEEE, Jun. 2009.

22.        Muntasir Raihan Rahman and Raouf Boutaba, “SVNE: Survivable Virtual Network Embedding Algorithms for Network Virtualization  “ ,  IEEE transactions on network and service management, vol. 10, no. 2, June 2013. 

23.        Masaki Fukushima, Kohei Sugiyama, Teruyuki Hasegawa, Toru Hasegawa ,“Minimum Disclosure Routing for Network Virtualization and Its Experimental Evaluation” , article,  IEEE, 2013.

24.        J´anos Tapolcai, G´abor R´etv´ari , “Router Virtualization for Improving IP-level Resilience “ , Proceedings IEEE infocom, 2013.

25.        Rafael Pereira Esteves and Lisandro Zambenedetti Granville, Federal University of Rio Grande do Sul Raouf Boutaba, University of Waterloo “On the Management of Virtual Networks” , IEEE Communications Magazine • July 2013.

26.        Yasusi Kanada and Toshiaki Tarui, Kei Shiraishi, “Federation-less-federation of Network-virtualization Platforms” Hitachi, Ltd., Central Research Laboratory Yokohama, Japan , 2013.

27.        Md. Faizul Bari, Raouf Boutaba, Rafael Esteves, Lisandro Zambenedetti Granville, Maxim Podlesny, Md Golam Rabbani, Qi Zhang, and Mohamed Faten Zhani “Data Center Network Virtualization: A Survey” , IEEE communications surveys & tutorials, vol. 15, no. 2, second quarter 2013.

28.        Dmitry Drutskoy, “Scalable Network Virtualization in Software- Defined Networks “ , IEEE internet computing, 2013.

29.        Lu Liu, Osama Masfary Jianxin Li, “Evaluation of Server Virtualization Technologies for Green IT “,Proceedings of The 6th IEEE International Symposium on Service Oriented System Engineering (SOSE 2011).

30.        Jiradett Kerdsri, Komwut Wipusitwarkun “Network Virtualization for Military Application Review and Initial development of conceptual design” , Sirindhorn International Institute of Technology, Thailand, ICACT, 2012.

31.        Jiradett Kerdsri, Komwut Wipusitwarkun , “Data-wise Routing in Virtualization Environment (DRIVE) with multiple level of security for tactical network , IEEE/SICE International Symposium on System Integration (SII) , 2012.

32.        Hongyan Cui, Fangjie Kong, Yunjie Liu , “A new algorithm of virtual network embedding based on minimum node stress and adjacent principle “The 4th IEEE International Workshop on Management of Emerging Networks and Services, 2012.

33.        Xin Wang, Prashant Krishnamurthy, and David Tipper , “Wireless Network Virtualization “International Conference on Computing, Networking and Communications, Invited Position Papers , 2013.

34.        Mike Redford,“Full Virtualization by Re-imaging Cloud Hardware  “University of Fairfax, Vienna, Virginia. USA , 2011.

48-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

10.

Authors:

Ilhem Hawachi, Habib Sammouda

Paper Title:

Modeling of Mechanical Behavior of Concretes with Organic Matrices

Abstract:  work is devoted to the study mechanical characteristics of polymer concrete. In order to improve the resistance of concretes in environmental attacks under mechanical pressures, the cement matrix can be replaced by an organic one. The addition of fibers allows moreover obtaining a better strength of these materials. We here simulate the mechanical behavior of this composite. These mechanical properties of composite material depend on the manufacturing processes employed in the present paper we will study the manufacturing processes by LRI resin infusion (Liquid Resin Infusion). The infusion process has been developed to be a cost-effective technique for the fabrication of large and complex composite structures, a strong coupling between resin flow and reinforcement deformation takes place in infusion processes. A model which describes the mechanical interaction between the deformations of the porous medium and the resin flow during infusion has been developed. The model developed is based on an ALE formulation of the liquid flow across the deformable porous medium

Keywords:
  Liquid Resin Infusion (LRI), Numerical model, Polymer concrete, Saturation

 References:
1.        Peng, W.  Sylvain, D., Jérôme, M. and Alain,V., Numerical and experimental analyses of resin infusion manufacturing processes of composite materials, Journal of Composite Materials,2012, Voluml 46, pp. 1617-1631.
2.        Fowler DW, Polymers in concrete: a vision for the 21 st centry, Cement and Concrete Composites, 1999, Volume 21, pp.449-452.

3.        Park J Kang MK.A.,Numerical simulation of the resin film infusion process, Composites Structures, 2000, Volume 60,pp.431–7.

4.        Antonucci V.,Giordano M., Nicolais L., Calabro` A.  Cusano A., Culoto A.and al., Resin flow monitoring in the resin film infusion process, Journal of Materials Processing Technology, 2003, pp. 687– 92

5.        Ambrosi D. and Preziosi L.,  Modelling matrix injection through elastic porous performs, Compos Part A, 1998, Volume 29, pp.5–18.

6.        Loos AC and MacRae JD A, Process simulation model for the manufacture of a blade stiffened panel by the resin infusion process, Composites Science and Technology, 1996, Volume 56, pp.273–88

7.        Blest DC, McKee S., Zulkifle AK, and Marshall P., Curing simulation by autoclave resin infusion, Composites Science and Technology, 1999,  pp. 2297–313.

8.        Correia NC, Robitaille F.  Long AC, Rudd CD, Simacek P.and Advani SG, Analysis of the vacuum infusion moulding process: I. Analytical formulation.Compos Part A, Applied Science and Manufacturing, 2005, Volume.36, pp.1645–56.

9.        Lopatnikov S., Simacek P., Gillespie J., Advani SG., A closed form solution to describe infusion of resin under vacuum in deformable fibrous porous media, Modellig and Simulation in Materials Science and Engineering, 2004, Volume 12, pp.191–204.

10.     Sommer JL and Mortensen A., Forced unidirectional infiltration of deformable porous media, Journal of Fluid Mechanics, 1996,  Volume 22, pp.1205–22.

11.     Danis M. and Del Borrello C., Lacoste E., Mantaux O., Infiltration of fibrous perform by a liquid metal: modelization of the perform deformation. In, Proceedings of ICCM-12 Conference.Paris,1999.

12.     Lacoste E., Mantaux O. and Danis M., Numerical simulation of metal matrixcomposites and polymer matrix composites processing by infiltration: a review, Composites Part A, 2002, Volume 33, pp.1605–14.

13.     Michaud VJ, Sommer JL, Mortensen A., Infiltration of fibrous preforms by a pure metal: Part V. Influence of preform compressibility,Metallurgical and Materials Transactions A,1999, Volume 30, pp.471–82.

14.     Celle P., Drapier S. and Bergheau JM., Numerical Modelling of Liquid Infusion into Fibrous Media Undergoing Compaction, European Journal of Mechanics – A/Solids, 2008, Volume 27, pp.647- 661.
15.     Celle P., Drapier S., Bergheau JM., Numerical Aspects of Fluid infusion inside a Compressible Porous Medium Undergoing Large Strains, European Journal of Computational Mechanics,2008, Volume 17, pp.19-827.
16.     Celle P.  Luca P., Drapier S. and Bergheau JM., Numerical Modelling of Infusion Processes (LRI and RFI), In: 52nd International Technical Conference, SAMPE,
Baltimore, 3-7 June, 2007, B287.

17.     Rabier and Medale, Computation of free surface flows with a projection FEM in a moving mesh framework, Computer. Methods in Applied, Mechanics Engineering, 2003, Volume.192, pp.4703–4721.

18.     Yang C., Grattoni C.A and Muggeridge A.H., Flow of water through channels filled with elastically deformable polymer gels.In European Conference on the Mathematics of Oil  Recovery, Italy;13: 8.2000.

53-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

11.

Authors:

Geeta, Puja Kumari Singh

Paper Title:

Electromagnetic Frequency Induced Stress Responses in Vernonia Cinerea

Abstract:  The Electromagnetic frequency (EMF) pollution around the living world has gripped it to such an extreme that it has potentially become unavoidable to live without it. As the development of mankind has become a slave of technology, it has to bear the brunt also. The stress created by the exposure of electromagnetic pollution on plants is a completely novice field. The stress expression in plants may be displayed by their developmental and biochemical responses. Since chlorophyll is one of the strong antioxidants   known, variation in its amount has been taken up as an established symptom of oxidative stress. The initiation of stress responses on Vernonia cinerea at different distances from cell towers having ascending number of antennae has been evaluated and found to be positively correlated with the cumulative intensities of Electromagnetic frequencies. In all the cases perceived it was decreasing significantly with increasing distances.                                            

Keywords:
   antioxidants, antennae, chlorophyll, EMF, Pollution.

 References:
1.        Hart F.X. and Marino A.A. (1977), Energy flux along high voltage transmission lines. IEEE Trans. Biomed. Eng. 24, 493-495. 
2.        Hiscox, J.D., Israelstam, G.F., a method for the extraction of chlorophyll from leaf tissue without maceration , Canadian journal of botany;57:1332-1334,(1979).

3.        Arnon, D.I., copper enzymes in isolated chloroplasts, polyphenoxidase in beta vulgeris. Plantphysiology 24;1-15,(1949).

4.        Krick ,J.T.O; and R.L. Allen,1965.Dependence of chloroplast pigments synthesis on protein synthetic effects on actidione. Biochemical , Biophysical Research communication.21:523-530.

5.        Choudhary, N.K., P. K. Behra, 2001.”Photoinhibition of Photosynthesis : Role of carotenoids in Photoprotection of chloroplast constituents.” Journal of Photosynthetica 39 (4):481-488.

6.        Thrash, R.J., H.L.B. Fang and G.E. Leroi, 1979. “On the role of forbidden low-intensity excited states of light – harvesting carotenoids in energy transfer in Photosynthesis.” Photochemistry and Photobiology 29 (5) :1049-1050.

7.        Ami Ben- Amotz and Mordhay Avron,1983.” On the factors which determine massive β-carotene accumulation in the halotolerant alga Dunaliella bardawil”,Plant Physol.72,593-597.

8.        Frank, H.A. , and Cogdell, R. J. , 1996, Photochem . photobiology,63 ,257-264.

9.        Young, A. and Britton ,G ,1993. Carotenoids in photosynthesis , Champen and Hall ,Londen  . 

57-63

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

12.

Authors:

D. Mondal, R. Bera, P. Dey, S. Hazra, M. Mitra

Paper Title:

Digital Beam Forming Vehicular Radar at 77 GHz

Abstract: In this paper Authors are trying to develop Digital Beam Forming Vehicular Radar at 77 GHz. At the transmitter side antenna beam pattern is digitally controlled by the DBS Transmitter having DBF planar structure 4X4 elemental patch antenna and at the receiver end receiving antenna beam pattern is digitally controlled by DBS Receiver having identical 4X4 elemental antennas. From this model we are able to measure the target motion and accurate ranging in presence of hostile environment successfully. The performance of this innovative model in range and velocity resolution are better with respect to other conventional Radar system.

Keywords:
DBF (Digital Beam Forming), CSWAP (Cost Size Weight And Power), CALM (Continuous Air interface for Long and Medium distance), DS-SS (Direct Sequence Spread Spectrum), RCS (Radar Cross Section)


References:

1.       SKOLNIK,M.I: ‘Introduction to radar systems’(McGraw-Hill Book Company, Singapore,1980,2nd edn) & Radar Signal Processing by Bassem R. Mahafza Huntsville , Alabama
2.       D. Mondal, et.all ,”Vehicular Communication and Safety in Realization of Intelligent Transport System”IEEE international conference on.[Computer and Devices for Communication, 2009 held in Kolkata, INDIA]

3.       NICKEL,U., and WIRTH,W.D.:”Beam forming and array processing with active arrays”. IEEE Antennas and propagation symposium, Ann Arbor, USA, 1993,pp.1540-1543

4.       A MULTI-BEAM AND MULTI-RANGE RADAR WITH FMCW AND DIGITAL BEAM FORMING FOR AUTOMOTIVE APPLICATIONS S.-H. Jeong , H.-Y. Yu, J.-E. Lee , J.-N. Oh, and K.-H. Lee -Progress In Electromagnetics Research, Vol. 124, 285{299, 2012

5.       ETSI EN 302 264-1 v1.1.1 (2009-06) Europen Standard ( Telecommunications series) Short Range Radar equipment operating in the 77 GHz to 81 GHz band, Part-1: Technical requirements and methods of measurement,

6.       CEPT Report 37 , Report from CEPT to the European Commission in response to Part 2 of the Mandate on “ Automotive Short-Range Radar Systems(SRR), Electronic Communication Committee(ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT)

7.       Source: http://www.who.int/violence_injury_prevention/road_safety_status

8.       World Health Organization (WHO),“World report on road traffic injury prevention”, Geneva,2004

9.       Spread Spectrum Digital Beam forming (SSDBF) Radar Dr. Marcos A. Bergamo Applied Radar Inc. 200 Wheeler Road Burlington, MA 01803, USA

10.    C. Andren, “Short PN Sequences for Direct Sequence Spread Spectrum Radios”, Harris Semiconductor, November 1997.

11.    S. Hara and R. Prasad, Overview of multicarrier CDMA, “IEEE Comm. mag., no. 12, Vol. 35, pp 126-133, Dec 1997.

12.    M. A. Habib, M. Barkat ,B. A¨ıssa and T. A. Denidni, CA-CFAR DETECTION PERFORMANCE OF RADAR TARGETS EMBEDDED IN “NON CENTERED CHI-2 GAMMA” CLUTTER Progress In Electromagnetics Research, PIER 88, 135–148, 2008

64-67

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

 

13.

Authors:

S. Santhosh Kumar, Monisha Menon A

Paper Title:

NEC2 Based Optimum Design of Circularly Polarized Axial Mode Helical Antenna with Non-linear Pitch Profile Modeled using Catmull–Rom Spline and Particle Swarm Optimization

Abstract: This paper presents a novel method for design of circularly polarized axial mode helical antenna with maximum directive gain. In this work helical antenna is modeled by eight parameters – helix radius (a), number of turns (N) and nonlinear pitch profile represented by a Catmull-Rom spline curve. This spline curve consists of six pitch angles, α1, α2, α3, α4, α5 and α6 at six equidistant points along the axial length of the helix. For a given number of turns optimum value of radius and pitch profile is determined for maximizing the gain subject to unity axial ratio. The gain and axial ratio are determined using NEC2 (Numerical Electromagnetics Code) simulation and optimization is performed using Particle Swarm Optimization (PSO). The original NEC2++ source code has been modified to incorporate Catmull-Rom spline modeling and PSO to suite the requirement of this work. Simulated and experimental results show that there is significant   improvement in gain characteristics compared to design based on Kraus method which uses constant pitch profile. 

Keywords: Helical Antenna, Axial mode, Catmull-Rom spline, Method of Moments, Particle Swarm Optimization, NEC2.

References:
1.     J.D Kraus, “Antennas”, McGraw Hill, 2nd ed, 1988
2.     C. A. Balanis, “Antenna Theory analysis and Design”, John Wiley and Sons, Inc., 3rd ed., 2005

3.     G. Zhou, “A non-uniform pitch dual band Helix antenna”, Proceedings of 2000 IEEE Antennas and Propagation Symposium, Salt  Lake City,      UtahVol.1

4.     Egorov, I. Zhinog Ying, “A non-uniform Helical antenna for dual band cellular phones”, IEEE Antennas and Propagation society International      symposium, vol.2 pp. 652-655, 2000

5.     www.nec2.org

6.     www.swarmintelligence.org

7.     Donald Hearn, M. Pauline Baker, “Computer Graphics”, Pearson  Education., 2nd ed., 2002

8.     Antonije. R. Djordjevic, Dragan. I. Olcan, Alenka. G. Zajic and Milan. M. Ilic.  “Optimization of helical antennas”, Proceedings of 1st European Conference on Antennas and Propagation (EuCAP),  November 2006   

9.     http://www.opengl.org    

68-72

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Wilander Testone Pereira da Silva andJoão Viana da Fonseca Neto

Paper Title:

On the LMS Algorithm Performance for Interference Elimination in Smart Antennas Array

Abstract: Theefficient use of limited radio frequency spectrum is possible due tothe s¬mart antenna arrays.These antennas arrays incorporateadaptive algorithms, such as: Least Mean Square (LMS) algorithm, whichfinds the spatial temporal filtergains or weights according to the signal environment behavior. In terms of the mean error and mean squared error convergences of the LMS algorithm, the performance evaluationofthealgorithm is oriented by its convergence properties and the improvements in  the mobile communication systems.In this paper is presented the LMS algorithm to solve  the beamforming problem and antenna array concepts, as well as, it is presented general performance  analysis,in terms of the LMSbeamformer to eliminate interference in  antennas array.The potentialities of adaptive design are verified in modelsof smart linear antenna arrays. These antenna arrays   models are connected to the beamformer model. The integration of these models allows todesign the adaptive beamformer. The results obtained from simulations of themodels showsthat the LMS algorithm is a good alternative for smart antenna design in mobile communication environment, due to the directivity improvement promoted in the antenna array.                                         

Keywords:
Smart Antenna Array, Adaptive Filter, LMS Algorithm, Algorithm Convergence,  Beamforming, InterferenceElimination, Mobile Communication, Wireless communications.

 References:
1.        B. Farhang-Boroujeny, Adaptive Filters: Theory and Applications, 1st ed. Baffins Lane Chichester, U.K.: John Wiley& Sons, 1999.
2.        Diniz, P. Adaptive Filtering Algorithms and Practical Implementation, 4rd ed. New York, EE.UU: Springer, 2013.

3.        P. S. R. Diniz, Adaptive Filtering: Algorithms and Practical Implementation, 3rd ed. Boston, MA: Springer, 2008.

4.        Orozco, W., Nakano, M., and Pérez, H, (2013). Adaptive Cascade Hybrid Configurations for Array Beamforming,(I.J. Communications, Ed.) Retrieved 23 of March, 2015, from International Journal of Communications: http://www.naun.org/main/NAUN/communications/c012006-109.pdf

5.        Balanis, C. Introduction to Smart Antennas, 1rd ed. Arizona: Morgan and Playpool publishers, 2007.

6.        Rao, A., and Sarma, N. (2014). Adaptive Beamforming Algorithms for Smart Antenna Systems. Índia. Retrieved 19 of January, 2015, from http://www.wseas.org/multimedia/journals/communications/2014/b105704-189.pdf

7.        Van Veen, B., and Buckley, K., “The Digital Signal Processing Handbook”.1rd ed., Wisconsin of University, VillanovaUniversity, 1999.

8.        Mozingo, R., Haupt, R., and Miller, T. “Introduction to AdaptiveArrays”. 2rd ed., SciTech PublishingInc., 2011.

9.        D. Poularikas and Z. M. Ramadan, Adaptive Filtering Primer with MATLAB, 1st ed. Boca Raton, FL: Taylor & Francis Group, 2006.

10.     H. Sayed, Adaptive Filters, 1st ed. Hoboken, NJ: John Wiley & Sons, 2008.

11.     S. Haykin, Adaptive Filter Theory, 4th ed. Upper Saddle River, 2002.

73-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Sheetal Shelke, Mangal Patil, J. S. Chitode

Paper Title:

DWT-FFT Based Audio Watermarking Algorithm for Copyright Protection

Abstract:  In this proposed method a new technique is introduced to secure audio communication. Discrete Wavelet Transforms (DWT) and Fast Fourier Transform (FFT) are used in this proposed method. Separation of high frequency component and low frequency component from original audio signal is performed by applying DWT. High frequency component is then passed through Fourier Transform (FFT). Digital watermark is generated using PN sequence. The digital watermark is embedded in low amplitude high frequency region of magnitude spectrum of FFT. DWT-FFT based proposed algorithm can be used for Copyright protection of audio signals. Proposed algorithm is evaluated using SNR and NC parameters with various attacks including volume scaling, low pass filter, resampling, requantization, MP3 compression, Echo addition, time stretching and additive noise.

Keywords:
  Audio watermarking, Discrete Wavelet Transforms, Fast Fourier Transform

 References:
1.        Siwar Rekik, Driss Guerchi, Sid-Ahmed Selouani and Habib Hamam, “Speech steganography using wavelet and Fourier Transforms”, EURASIP Journal on Audio, Speech and music processing 2012.
2.        B.Chen and G.W.Wornell, “Quantization index modulation: A class of provably good methods for digital watermarking and information embedding,” IEEE Trans. Inform. Theory, vol. 47 (4), pp. 1423–1443, 2001.

3.        T.Cedric, R.Adi, and I.Mcloughlin, “Data concealment in audio using a non- linear frequency distribution of PRBS coded data and frequency-domain LSB insertion,” IEEE Region 10 International Conference on Electrical and Electronic Technology, Kuala Lumpur, Malaysia, pp. 275-278, September 2000.

4.        P.K.Dhar, M.L.Khan and J.M.Kim, “A New Audio Watermarking System using Discrete Fourier Transform for Copyright Protection,” International Journal of Computer Science and Network Security, vol.10 (6), June 2010.

5.        Pranab Kumar Dhar, Jong-Myon Kim, “Digital Watermarking Scheme Based on Fast Fourier Transformation for Audio Copyright Protection” International Journal of Security and Its Applications Vol. 5 No. 2, April, 2011.

6.        K.Fitz and L.Haken, “On the Use of Time-Frequency Reassignment in Additive Sound Modeling,” Journal of the AES, vol. 50, no. 11, pp. 879-893, Nov. 2002.

7.        Ali Al-Haj, Ahmad Mohammad and Lama Bata, “DWT–Based Audio Watermarking”, the International Arab Journal of Information Technology, Vol. 8, No. 3, July 2011.

8.        N.Cvejic and T.Seppänen, “Increasing robustness of LSB audio steganography by reduced distortion LSB coding,” Journal of University Computer Science, vol. 11(1), pp. 56-65, 2005.

9.        Y.Yoshitomi, T.Asada, Y.Kinugawa and M.Tabuse, “An Authentication Method for Digital Audio Using a Discrete Wavelet Transform,” Journal of Information Security, Vol. 2 No. 2, pp. 59-68. doi: 10.4236/jis.2011.22006, 2011.

10.     Harleen Kaur, Usvir Kaur, “Blind Audio Watermarking schemes: A Literature Review”, IRACST – Engineering Science and Technology: An International Journal (ESTIJ), ISSN: 2250-3498, Vol.3, No.2, April 2013.

11.     J.Cooley and J. Tukey, “An algorithm for the machine calculation of the complex Fourier series,” Math. Comput., vol. 19, pp. 297-301, 1965.
12.     B.P.Bogert, M.J.R.Healy and J.W.Tukey, “The Quefrency Alanysis of Time Series for Echoes: Cestrum, Pseudo-Auto covariance, Cross-cestrum and Shape Cracking,” in Proceedings of the Symposium on Time Series Analysis, by M. Rosenblatt, pp. 209-243, Wile N.Y.  1963.
13.     J.Cooley and J.Tukey, “An algorithm for the machine calculation of the complex Fourier series,” Math. Comput., vol. 19, pp. 297-301, 1965.

14.     S.Murata, Y.Yoshitomi and H. Ishii, “Audio Watermarking Using Wavelet Transform and Genetic Algorithm for Realizing High Tolerance to MP3 Compression,” 
Journal of Information Security, Vol. 2 No. 3, pp. 99-112. doi: 10.4236/jis.2011.23010, 2011.

15.     ZhengLiuandAkiraInoue, “Audio Watermarking Techniques Using Sinusoidal Patterns Based on Pseudorandom Sequence”, IEEE Transactions On Circuits And Systems For Video Technology,Vol.13,NO.8,pp.801-812,August2003.

16.     Komal Shedge, Mangal Patil, J.S.Chitode ,”A new facet in Robust Audio Watermarking in DWT-SVD Domain”, International Journal Of Engineering Research & Technology(IJERT),ISSN:2278-0181,Vol-3 Issue 5,May-2014.

17.     Wei Li, Xiangyang Xue, and Peizhong Lu, “Localized Audio Watermarking Technique Robust Against Time-Scale Modification” IEEE transactions on multimedia, vol. 8, no. 1, February 2006.

18.     I.J.Cox, J.Kilian, and T.Leighton, “T. Shammoon, Secure Spread Spectrum Watermarking for Multimedia,” IEEE Trans. Image Process, vol. 6(12), pp. 1673-1687, 1997.

19.     P.Bassia and I.Pitas, “Robust audio watermarking in the time domain”, IEEE transactions onMultimedia,Vol.3,Issue:2,pp.232–241,2001..

79-83

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

K. Rani Hepsiba, S. M. Shariff, P. Saileshbabua

Paper Title:

Analysis of UPQC under Unbalanced and Distorted Load Conditions using Synchronous-Reference-Frame Method

Abstract: This paper presents a new synchronous reference-frame (SRF)-based control method to compensate power-quality (PQ) problems through a three-phase four-wire unified PQ conditioner (UPQC) under unbalanced and distorted load conditions. The proposed UPQC system can improve the power quality at the point of common coupling on power distribution systems under unbalanced and distorted load conditions. The simulation results based on Matlab/Simulink are discussed in detail to support the SRF-based control method presented in this paper.

Keywords:
Active power filter (APF), harmonics, phase-locked loop (PLL), power quality (PQ), synchronous reference frame (SRF), unified power-quality (PQ) conditioner (UPQC).

 References:
1.        L. Gyugyi and E. Strycula, “Active AC power filters,” in       Conf. Rec. IEEEIAS Annu. Meeting, Chicago, IL, Oct. 1976, pp. 529–535.
2.        H. Akagi and H. Fujita, “A new power line conditional for harmonic compensation in power systems,” IEEE Trans. Power Del., vol. 10, no. 3, pp. 1570–1575, Jul. 1995.

3.        H. Fujita and H. Akagi, “The unified power quality conditioner: The     integration of series and shunt-active filters,” IEEE Trans. Power Electron.,vol. 13, no. 2, pp. 315–322, Mar. 1998.KESLER AND OZDEMIR: SRF-BASED CONTROL METHOD FOR UPQC 3975

4.        H. Akagi, E. H. Watanabe, and M. Aredes, Instantaneous Power Theoryand Applications to Power Conditioning. Hoboken, NJ: Wiley-IEEE  Press, Apr. 2007.

5.        D. Graovac, V. Katic, and A. Rufer, “Power quality problems compensation with universal power quality conditioning system,” IEEE Trans.Power Del.,      vol. 22,
no. 2, pp. 968–976, Apr. 2007.

6.        Han, B. Bae, H. Kim, and S. Baek, “Combined operation of unifiedpower-quality conditioner with distributed generation,” IEEE Trans.Power Del., vol. 21, no. 1, pp. 330–338, Jan. 2006.

7.        M. Aredes, “A combined series and shunt active power filter,” in Proc.IEEE/KTH Power Tech Conf., Stockholm, Sweden, Jun. 1995, pp. 18–22.

8.        Y. Chen, X. Zha, and J. Wang, “Unified Power Quality Conditioner(UPQC): The theory, modeling and application,” in Proc. PowerCon,2000, vol. 3, pp. 1329–1333.

9.        F. Z. Peng, J. W. McKeever, and D. J. Adams, “A power line conditionerusing cascade multilevel inverters for distribution systems,” IEEE Trans.Ind. Appl., vol. 34,
no. 6, pp. 1293–1298, Nov./Dec. 1998.

10.     Esfandiari, M. Parniani, A. Emadi, and H. Mokhtari, “Application of the unified power quality conditioner for mitigating electric arc furnace disturbances,” Int. J. Power Energy Syst., vol. 28, no. 4, pp. 363–371,2008.

11.     M. Aredes, H. Akagi, E. H. Watanabe, E. V. Salgado, and L. F. Encarnacao, “Comparisons between the p−q and p−q−r theories in three-phase four-wire systems,” IEEETrans. Power Electron., vol. 24,no. 4, pp. 924–933, Apr. 2009.

12.     K. H. Kwan, Y. C. Chu, and P. L. So, “Model-based H∞ control of a unified power quality conditioner,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2493–2504, Jul. 2009

13.     S. Bhattacharya, D. M. Divan, and B. Banerjee, “Synchronous reference frame harmonic isolator using series active filter,” in Proc. 4th EPE,Florence, Italy, 1991, vol. 3, pp. 030–035.

14.     S. Bhattacharya, T. M. Frank, D. M. Divan, and B. Banerjee, “Active filters ystem implementation,” IEEE Ind. Appl. Mag., vol. 4, no. 5, pp. 47–63,Sep./Oct. 1998.

15.     S. Bhattacharya and D. Divan, “Synchronous frame based controller implementation for a hybrid series active filter system,” in Conf. Rec. IEEEIAS Annu. Meeting, 1995, pp. 2531–2540.

16.     G. D. Marques, V. F. Pires, M. Malinowski, and M. Kazmierkowski, “An improved synchronous reference frame method for active filters,” in Proc.Int. Conf. Comput. Tool, EUROCON, Sep. 2007, pp. 2564–2569.

84-91

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

M. A. Kounain, F. Al-Sulaiman, Z. Khan

Paper Title:

Low Velocity Impact and Post Impact Tensile Properties of Plain Weave Woven GFRP Composite Laminates

Abstract:  Instrumented drop weight impact tests at different impact energies were performed to investigate the effect of ply stacking sequence and thickness in plain weave glass fiber reinforced composite laminates with 0º and 0/90º ply orientations. Post impact tensile tests were performed to predict the residual strength of the material. It was found that the stacking sequence did not significantly affect the impact behavior of the composite laminates. The peak load increased with increase in the number of plies. Residual tensile strength, strain at failure and elastic modulus of the laminates decreased with the increase in the impact energy due to increase in the impact damage area.

Keywords:
  GFRP laminates, Low velocity impact, post impact tensile properties

 References:
1.        N. Razali, M.T.H. Sultan, Y. Aminanda, “The Study of Impact Behavior of Two Types of Glass Fibre Reinforced Polymer (GFRP) Subjected to Low Velocity Impact”, Advanced Materials Research, Vols. 1044-1045, 2014, pp. 153-157
2.        Alessandro Pegoretti, Elena Fabbri, Claudio Migliaresi and Francesco Pilati, Intraply and interply hybrid composites based on E-glass and poly(vinyl alcohol) woven fabrics: tensile and impact properties, Polymer International, 2004, Vol. 53, pp. 1290–1297.

3.        N. Mathivanan and J. Jerald, “Interlaminar Fracture Toughness and   Low-Velocity Impact Resistance of Woven Glass Epoxy Composite Laminates of EP3 Grade,” Journal of Minerals and Materials Characterization and Engineering, Vol. 11 No. 3, 2012, pp. 321-333

4.        W.H. Choong, K.B. Yeo and M.T. Fadzlita, 2011. Impact Damage   Behavior of Woven Glass Fibre Reinforced Polymer Composite. Journal of Applied Sciences, 11, 2011, pp. 2440-2443.

5.        Ben Jar, Gros X E, Takahashi K, Kawabatta K, Murai J, Shinagawa Y,  Evaluation of Delamination Resistance of Glass Fibre Reinforced  Polymers Under Impact Loading, Journal of Advanced Materials, July 2000, Vol. 32, No. 3, pp. 35-45.

6.        Berketis K, Tzetzis D, Hogg P.J, The influence of long term water immersion ageing on impact damage behaviour and residual compression strength of glass fibre reinforced polymer (GFRP), Materials and Design, Vol. 29, Issue 7, 2008, pp.1300–1310 .

7.        Balasubramani and S. Rajendra Boopathy, Prediction Of Residual Tensile Strength Of Laminated Composite Plates After Low Velocity Impact, Engineering Applied Science, Vol. 9, No. 3, 2014, pp. 320-326

8.        Caprino G, Lopresto V, On the penetration energy for fibre-reinforced    plastics under low-velocity impact conditions, Composites Science and Technology, 2001, Vol. 61, pp. 65-73.

9.        Seunghan Shin, Jyongsik Jang, Fractographical analysis on the mode II delamination in woven carbon fiber reinforced epoxy composites, Journal of Materials Science, 1999, Vol. 34, pp. 5299–5306.

10.     Shaw Ming Lee, Mode II delamination failure mechanisms of polymer matrix composites, Journal of Materials Science, 1997, Vol. 32, pp. 1287–1295.

11.     Cesim Atas, Dahsin Liu, Impact response of woven composites with small weaving angles, International Journal of Impact Engineering, 2008, Vol. 35, pp. 80–97.

12.     Dahsin Liu, Delamination resistance in stitched and unstitched composite plates subjected to Impact Loading, Journal of Reinforced Plastics and Composites, January 1990, Vol. 9.

13.     David Trudel Boucher, Martin Bureau N, Johanne Denault and Fisa Bo, Low-Velocity Impacts in Continuous Glass Fiber/Polypropylene Composites, Polymer Composites, August 2003, Vol. 24, No. 4.

14.     Edgar Fuoss, Thesis: Effects of Stacking Sequence on the Impact Damage Resistance of Composite Laminates, Carleton University, December 1996.

15.     Jang-Kyo Kim, Man-Lung Sham, Impact and delamination failure of woven-fabric composites, Composites Science and Technology, 2000, Vol. 60, pp. 745-761.

16.     Morais W.A de, Monteiro S.N, d’ Almeida J.R.M, Effect of the laminate thickness on the composite strength to repeated low energy impacts, Composite Structures,
2005, Vol. 70, pp. 223–228.

17.     Rohchoon Park and Jyongsik Jang, Impact Behavior of Aramid Fiber/Glass Fiber Hybrid Composites: The Effect of Stacking Sequence, Polymer Composites, February 2001, Vol. 22, No. 1.

18.     Shaw Ming Lee, Mode II delamination failure mechanisms of polymer matrix composites, Journal of Materials Science, 1997, Vol. 32, pp. 1287–1295.

19.     Siow Y.P, Shim V.P.W, An Experimental Study of Low Velocity Impact Damage in Woven Fiber Composites, Journal of Composite Materials, 1998, Vol.32, No.12. pp. 1178-1202

92-99

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Abdisalam Issa-Salwe

Paper Title:

A Comparison of Information Systems Programmes Taught to Undergraduates at Saudi Arabian Colleges

Abstract: This paper presents a comparison of information systems (IS) programmes taught to undergraduates at 20 Saudi Arabian colleges. The colleges were divided into two groups: one group of 10 colleges and programmes focused on management information systems (MIS) and another group of 10 colleges and programmes on computerized information systems (CIS). Despite a shared core focus on IS, the two programme types differ in terms of where they are taught (at either business or science colleges) and the types of courses they offer. Regardless of type, all programmes tend to be internationally accredited. Programmes of the first type seek accreditation from the Accreditation Board for Engineering and Technology (ABET), whereas programmes of the second type seek accreditation from the Association to Advance Collegiate Schools of Business (AACSB).

Keywords:
Information Systems (IS), Curriculum Comparison, ABET, AACSB, Accreditation, IS Environment, IS Specialisation.

 References:
1.        G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.        W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135.

3.        H. Poor, An Introduction to Signal Detection and Estimation.   New York: Springer-Verlag, 1985, ch. 4.

4.        B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

5.        E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

6.        J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

7.        C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

8.        Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate ABET Computing Accreditation Commission. (215-2016) Criteria for accrediting computing programmes, effective for evaluations during the 2015-2016 accreditation cycle.

9.        ABET Computing Accreditation Commission. (2004) Criteria for accrediting computing programmes, November 1, 2004.

10.     Business Dictionary. [online] http://www.businessdictionary.com/definition/information-system.html (Accessed 7 February 2015).

11.     Gorgone, J.T., Gray, P., Stohr, E. A., Valacich, J.S. and Wigand, R. T. (2006) MSIS 2006. Model curriculum and guidelines for graduate degree programmes in information systems, ACM, AIS, January 2006.

12.     Reichgelt, H., Lunt, B., Ashford, T., Phelps, A., Slazinski, E. and Willis, C. (2004) ‘A comparison of baccalaureate programmes in information technology with baccalaureate programmes in computer science and information systems’, Journal of Information Technology Education Vol. 3 No. 1, pp. 19-34.

13.     Sauter, V.L. [online] (2000): Systems Theory. http://www.umsl.edu/~sauter/analysis/intro/system.htm, (Accessed 14 January 2015)

14.     Topi, H., Valacich, J.S., Wright, R.T., Kaiser, K.M., Nunamaker, Jr. J.F., Sipior, J.C. and de Vreede, G.J. (2010) “IS2010 model curriculum and guidelines for
undergraduate degree programmes in information systems”, Association for Computing Machinery, New York, NY, and Association for Information Systems, Atlanta, GA. http://www.acm.org/education/curricula/IS%202010%20ACM%20final.pdf

15.     Yaverbaum, G.J, Feinstein, F., Gorgone, J., Htopi, H., Kasper, G.M., Valacich, J.S. and Zant, R.F. (2004) The information systems environment, SBA Working Paper Series, #35

100-103

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Nikita Ingle

Paper Title:

Triplen Harmonics in Electrical Distribution Systems

Abstract:  In an AC circuit, a resistance behaves in exactly the same way as it does in a DC circuit. That is, the current flowing through the resistance is proportional to the voltage across it. This is because a resistor is a linear device and if the voltage applied to it is a sine wave, the current flowing through it is also a sine wave. But most electronic power supply switching circuits such as rectifiers, silicon controlled rectifier (SCR’s), power transistors, power converters and other such solid state switches which cut and chop the power supplies sinusoidal waveform to control motor power, or to convert the sinusoidal AC supply to DC. Theses switching circuits tend to draw current only at the peak values of the AC supply and since the switching current waveform is non-sinusoidal the resulting load current is said to contain Harmonics. we can say that “harmonics” are multiples of the fundamental frequency and can therefore be expressed as: 2ƒ, 3ƒ, 4ƒ, etc. Positive sequence harmonics (4th, 7th, 10th, …) causes overheating of transformer ,conductor power lines whereas negative sequence harmonics ( 2nd, 5th, 8th, …) circulates between phases producing additional problems in motor as opposite phasor rotation weakens rotating magnetic field required by  the motor. There is another harmonics set called triplen means odd multiple of third harmonics ( 3rd, 6th, 9th, …), etc zero rotational sequence hence therefore zero sequence harmonics circulates between phase and neutral or ground.

Keywords:
  AC circuit, DC circuit, (SCR’s), AC supply to DC, “harmonics”, as: 2ƒ, 3ƒ, 4ƒ, ( 2nd, 5th, 8th, …),( 3rd, 6th, 9th, …)

 References:
1.     ‘Electric Utility Power System”. A text book by John Smith& McGraw-Hill.
2.     “ Harmonics Made Simple” by R.Fehr , P.E.

3.     J.Arillaga,et al,”Power System Harmonics”

4.     R.C. Dugan, D.T. Rizy, “Harmonic Considerations for Electrical Distribution Feeders”


104-109

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

T. Amaranatha Reddy, K. Krishna Reddy

Paper Title:

Direct Aerosol Radiative Forcing Over Three Different Environments

Abstract: In the present report, we have utilised the inversion products of AERONET to study the aerosol optical properties and to estimate their direct adiative forcings over three different environments (Re Union, Nainital and Pune). Derived aerosol optical properties over all stations showed significant temporal (seasonal) and spatial variation. These properties have been used in SBDART model for the assesment of direct aerosol radiative forcing. The estimated averaged radiative forcings at top of the atmosphere are -2 ± 1, -7 ± 4 and -8 ± 2 Wm-2, and the surface aerosol radiative forcings are -6 ± 3, -18 ±14 and -36 ± 8 Wm-2 over Re Union, Nainital and Pune respectively. Subsequntly the atmospheric forcings are 3 ± 2, 11 ± 11 and 28 ± 7 Wm-2 over Re Union, Nainital and Pune respectively. Moreover, we found that higher the aerosol loading or aerosol optical depth the more aerosol radiative forcing. The estimated atmospheric aerosol radiative forcing will heats the lower atmosphere and leads modification of the thermal structure of the atmosphere. Hence, our study emphasized the importance of optical properties of aerosols in the estimation of direct aerosol radiative forcing.

Keywords:
   optical properties of aerosols; radiative transfer.

 References:
1.        ACKERMAN, A. S., TOON, O. B., STEVENS, D. E., HEYMSFIELD, A.J., RAMANATHAN, V., and WELTON, E.J., 2000, Reduction of tropical cloudiness by soot. Science, 288(5468), pp. 1042-1047.
2.        ANGSTROM A., 1964. The parameters of atmospheric turbidity. Tellus. 16: 64–75.

3.        CHATRAPATTY, BHUGWANT., EMMANUEL RIVIERE, PHILIPPE KECKHUT and JEAN LEVEAU., 2001, Variability of carbonaceous aerosols, ozone and radon at Piton Textor, a mountain site on Re´union island (south-western Indian Ocean), Tellus, 53B, 546–563.

4.        CHATRAPATTY, B., MILOUD, B., OLIVIER, F., LAURA, C., BRUNO, S., EVA, L., 2013, High Contribution of Sea Salt Aerosols on Atmospheric Particles Measured at an Urban Tropical Location in Reunion Island, Journal of Environmental Protection, 2013, 4, 828-842.

5.        CHIEN, WANG., 2013, Impact of anthropogenic absorbing aerosols on clouds and precipitation: A review of recent progresses. Atmospheric Research, 122, 237–249.

6.        DEVARA, P. C. S., VIJAYA KUMAR,  K., PRAMOD, D., SAFAI, M., RAJU, P., RAO, P. S. P, Celebration-induced air quality over a tropical urban station, Pune, India, Atmospheric Pollution Research, 6, 511520

7.        DUMKA, U. C., SATHEESH, S. K., PANT, P., HEGDE, P., and KRISHNA MOORTHY, K., 2006, Surface changes in solar irradiance due to aerosols over central Himalayas. Geophysical Research Letters, 33, L20809: doi: 10.1029/2006GL027814.

8.        DUMKA,, U.C., MOORTHY, K. KRISHNA., SATHEESH, S. K., SAGAR, R., and PANT, P., 2008. Short- Period Modulations in Aerosol Optical Depths over Central Himalayas: Role of Mesoscale Processes. J. Climate Appl. Meteor. 47: 1467-1475.

9.        DUMKA, U. C., SAGAR, R., PANT, P., 2009, Retrieval of Columnar Aerosol Size Distributions from Spectral Attenuation Measurements over Central Himalayas. Aerosol and Air Quality Research, 9, pp. 344-351.

10.     ECK, T.F., B.N. HOLBEN., J.S. REID., O. DUBOVIK., A. SMIMOV., N.T. O’NEILL., I. SLUTSKERA., and S. KINNE., 1999. Wavelength dependence of the optical depth of
biomass burning, urban, and desert dust aerosols. J. Geophys. Res.,104, 31,333-31,349.

11.     ERNEST RAJ, P., DEVARA, P C S., MAHESH KUMAR, R S., PANDITHURAI, G  DHANI, K K., 1997, Lidar measurements of aerosol column content in an urban nocturnal boundary layer, J. Atmospheric Research, 45, 201 – 216.  

12.     GADHAVI, H. and JAYARAMAN, A., 2010, Absorbing aerosol: contribution of biomass burning and implications for radiative forcing. Journal of Annales Geophysicae, 28, pp. 103-111.

13.     HEGDE, P., PANT, P. and BHVANI KUMAR, Y., 2009, An integrated analysis of Lidar observations in association with optical properties of aerosols from a high altitude location in central Himalayas. Atmospheric Science Letters, 10, pp. 48–57.

14.     HOLBEN, B.N., et al. (1998). AERONET – A federated instrument network and data archive for aerosol characterization. Remote Sens. Environ., 66, 1-16.

15.     HOLBEN, B. N., et al. (2001). An emerging ground-based aerosol climatology: Aerosol optical depth from AERONET. J. Geophys. Res., 106, 12,067– 12,097.

16.     KRISHNA, P., KUNHIKRISHNAN, P. K., 2004. Temporal variations of ventilation coefficient at a tropical Indian station using UHF wind profiler. Current Science, 86, No. 3.

110-117

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

M.Y. Abdollahzadeh Jamalabadi

Paper Title:

Forecasting the Economic Impact of Fuel Cells

Abstract: Fuel cells are promising energy carrier whose adoption would signify a radical change in which energy is produced, distributed and consumed. Growing attention is being devoted to this energy cycle in order to explore the possibilities offered to alleviate the susceptibilities and weaknesses of the present schemes. Hydrogen does not normally exist naturally in the world, but it can be used as an energy course to extract or store energy from relic fuels or intermittent renewable energy sources (RES) and then change it into electrical power and heat using fuel cells or combustion engines. It is therefore expected to play a key role in integrating future energy systems, bridging the transition from a largely fossil-based to a more RES-based European energy economy – with the advantages of diversified sources and sustainability. Used in conjunction with fuel cells for stationary, mobile, small portable or micro-power applications, hydrogen opens the real prospect of a paradigm shift in the provision of heat and power to the transport, residential and commercial sectors.

Keywords:
    Social impact, economic analysis, solid oxide fuel cell, clean energy

 References:
1.        Abdollahzadeh Jamalabadi, M.Y. (2015). Effects of micro and macro scale Viscous Dissipations with Heat Generation and Local Thermal Non-Equilibrium on Thermal Developing Forced Convection in saturated porous media, Journal of Porous Media, 18(9), 843-860.   
2.        Abdollahzadeh Jamalabadi, M.Y. (2015). Joule Heating in Low-Voltage Electroosmotic with Electrolyte containing nano-bubble mixtures through Microchannel Rectangular Orifice, Chemical Engineering Research and Design, 102, 407-415.

3.        Abdollahzadeh Jamalabadi, M.Y., Ghasemi, M., & Hamedi, M.H.  (2012). Two-dimensional simulation of thermal loading with horizontal heat sources, Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science, 226, 1302-1308.

4.        Abdollahzadeh Jamalabadi, M.Y., Park, J.H., & Lee, C.Y. (2015). Optimal Design of MHD Mixed Convection Flow in a Vertical Channel with Slip Boundary Conditions and Thermal Radiation Effects by using Entropy Generation Minimization Method, entropy, 17(2), 866-881.

5.        Abdollahzadeh Jamalabadi, M.Y., & Park, J.H., (2014). Effects of Brownian motion on Freezing of PCM Containing Nanoparticles, Thermal Science, OnLine-First Issue, 00 94-94.

6.        Abdollahzadeh Jamalabadi, M.Y., Park, J.H., & Lee, C.Y. (2014). Thermal Radiation effects on the Onset of Unsteadiness of Fluid Flow in Vertical Microchannel Filled with Highly Absorbing Medium, Thermal Science, OnLine-First Issue 00, 124-124.

7.        Abdollahzadeh Jamalabadi, M.Y., Ghasemi M., & Hamedi M.H. (2013). Numerical Investigation of Thermal Radiation Effects on Open Cavity with Discrete Heat Sources, International Journal of Numerical Methods for Heat and Fluid Flow, 23(4), 649-661.

8.        Abdollahzadeh Jamalabadi, M.Y. (2013).  Electrochemical and exergetic modeling of a CHP system using tubular solid oxide fuel cell and mini gas turbine , Journal of Fuel Cell Science Technology, 10(5), 051007.

9.        Abdollahzadeh Jamalabadi, M.Y. (2016). Optimal Design of Cylindrical PBX by Entransy Dissipation Extremum Principle, International Journal of Energetic Materials and Chemical Propulsion, accepted for publication, 15.

10.     Abdollahzadeh Jamalabadi, M.Y. (2016). Thermal Radiation Effects on Creep Behavior of the Turbine Blade, Multidiscipline Modeling in Materials and Structures, minor revision.

11.     Abdollahzadeh Jamalabadi, M.Y., Park, J.H., Rashidi, M.M., & Chen J.M. (2015). Effects of Thermal Boundary Conditions on the Joule Heating of Electrolyte in a Microchannel, Journal of Hydrodynamics, Ser. B, accepted for publication.

12.     Abdollahzadeh Jamalabadi, M.Y., (2015). Entropy generation in boundary layer flow of a micro polar fluid over a stretching sheet embedded in a highly absorbing medium, Frontiers in Heat and Mass Transfer, 6(1), 1-13.

13.     Abdollahzadeh Jamalabadi, M.Y. (2014). The frequency response of a cavitating hydrofoil, Noise and Vibration Worldwide, 45(8), 21-27.

14.     Abdollahzadeh Jamalabadi, M.Y. (2014). Analytical study of Magnetohydrodynamic propulsion stability, Journal of Marine Science and Application, 13(3), 281-290.

15.     Abdollahzadeh Jamalabadi, M.Y. (2014). Experimental investigation of thermal loading of a horizontal thin plate using infrared camera, Journal of King Saud University – Engineering Sciences, 26(2), 159-167.

16.     Abdollahzadeh Jamalabadi, M.Y., Park, J.H., & Lee, C.Y. (2014). Economic and environmental modeling of a micro gas turbine and solid oxide fuel cell hybrid combined heat and power system, International Journal of Applied Environmental Sciences, 9(4), 1769-1781.

17.     Abdollahzadeh Jamalabadi, M.Y. (2014). Simulation of electrochemical impedance spectroscopy of a solid oxide fuel cell anodes, World Applied Sciences Journal, 32(4), 667-671.

18.     Abdollahzadeh Jamalabadi, M.Y., & Park, J.H. (2014). Investigation of property variations on freezing of pcm containing nanoparticles, World Applied Sciences Journal, 32(4) 672-677.

19.     Abdollahzadeh Jamalabadi, M.Y. (2014). Economic and environmental modeling of a MGT-SOFC hybrid combined heat and power system for ship applications, Middle-East Journal of Scientific Research, 22(4), 561-574.

20.     Abdollahzadeh Jamalabadi, M.Y. (2015). MD simulation of Brownian motion on trapping of Buckminsterfullerene in nano-Optical tweezers, International Journal of Optics and Applications, 5(5), 161-167.

21.     Abdollahzadeh Jamalabadi, M.Y. (2015). Numerical investigation of thermal radiation effects on electrochemical impedance spectroscopy of a solid oxide fuel cell anodes, Materials  Performance and Characterization, DOI: 10.1520/MPC20140062.

22.     Abdollahzadeh Jamalabadi, M.Y. (2015). Effect of fuel inject angle on the thermal behavior of a 2D axisymmetric non-premixed methane–air flame in vertical cylinder filled by porous media, International Journal of Energy Engineering, 5,1, 1-8. 

23.     Abdollahzadeh Jamalabadi, M.Y., & Park, J.H.  (2014). Thermal radiation, joule heating, and viscous dissipation effects on mhd forced convection flow with uniform surface temperature, Open Journal of Fluid Dynamics, 4(2), 125-132.

24.     Abdollahzadeh Jamalabadi, M.Y. (2014). Effect of fuel inject angle on non-premixed combustion of air/methane mixtures in vertical cylinder, International Journal of Multidisciplinary Research and Development, 1(5), 1-4.

25.     Abdollahzadeh Jamalabadi, M.Y., & Park, J.H. (2014). Electro-Magnetic Ship Propulsion Stability under Gusts, International Journal of Sciences: Basic and Applied Research Sciences, 1, 421-427. 

26.     Abdollahzadeh Jamalabadi, M.Y., Hooshmand, P., Khezri, B., & Radmanesh, A. (2014).  Investigation of using different fluids for using in gas turbine- Rankine cycle, Indian journal of Scientific Research, 2, 74-81.

27.     Bita, S., Abdollahzadeh Jamalabadi, M.Y., & Mesbah, M. (2015). Toxicity study of silver nanoparticles synthesized using seaweed Sargassum angustifolium in common carp, Cyprinus carpio, Journal of Chemical and Pharmaceutical Research, accepted for publication.

28.     Dadgostari, F., Hosseininia, M. (2012). Phasing of Traffic Lights in Urban Intersections. Graph Theory for Operations Research and Management: Applications in Industrial Engineering: Applications in Industrial Engineering, 257.

29.     Dousti, S., Cao, J., Younan, A., Allaire, P., & Dimond, T., (2012). Temporal and Convective Inertia Effects in Plain Journal Bearings With Eccentricity, Velocity and Acceleration, Journal of tribology, 134(3), 031704,8.

30.     Dousti, S., & Fittro, R.L. (2015). An Extended Reynolds Equation Including the Lubricant Inertia Effects: Application to Finite Length Water Lubricated Bearings, ASME Turbo Expo 2015: Turbine Technical Conference and Exposition.

31.     Dousti, S., Kaplan, J.A., He, F., & Allaire, P.E., (2013).Elastomer O-Rings as Centering Spring in Squeeze Film Dampers: Application to Turbochargers, ASME Turbo Expo 2013: Turbine Technical Conference and Exposition.

118-125

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Th. Kiranbala Devi, S. Elizabeth

Paper Title:

Seismic Protection of Non-Engineered Building in North East India

Abstract:  Northeast India is regarded as one of the most seismically six  active regions worldwide. Moreover, rapid urbanization in the region have provided a higher level of man-made constructions deviating from the typical traditional houses to multistoried structures but most of these structures are non engineered construction. Even though engineered, more emphasis is given to architectural concept than the structural design, which is indeed very important.  So the implementation of earthquake resistant building design and construction code at the local level has been more of an exception than the rule, thereby implicating increased vulnerability to earthquake disasters. That’s why there is a need for the construction of a simple construction practices for use by the community. This paper deals with the different types of non engineering building construction that are practiced in Northeast India and the ways for strengthening these building to make them a low cost earthquake resistant building.

Keywords:
Community, Construction code, Disaster resistant, Non- engineered building, Strengthening technique.

 References:
1.        Affordable bamboo housing in earthquake prone areas, An international workshop organised by Cane and Bamboo Technology Centre (CBTC), Government of Mizoram, International network for bamboo and rattan, Aizawl, Mizoram, India, 2001.
2.        Alam, M.J., Ahsan, R., Akhter, F., and Paul, A.(2008),  “Earthquake Resistant Non-Engineered Building Construction for Rural Area in Bangladesh” Proc: 14WCEE, 12-17 October, 2008, pp. 1-8.

3.        Arya, A.S. (2000) “Non-Engineered Construction in Developing Countries –An Approach Toward Earthquake Risk Reduction.”12 WCEE2000, Jan .30th -4th Feb.2000, Auckland, Newzealand, Paper No. 2824

4.        Bahadur, M. (1994) “Cane and bamboo crafts of Manipur” Mutua Museum

5.        Elizabeth, S., Datta, A.K. (2012) “Bamboo as a Construction Material in Seismic Zone Area of Developing Countries – A Review” Proc. Fifth Cusat National Conference on Recent Advances in Civil Engineering,  29th  November, 2012, Cochin.

6.        Hemant B. Kaushik, Kaustubh Dasgupta, Dipti R. Sahoo, Gayatri Kharel (2006)” Performance of structures during the Sikkim earthquake of 14 February 2006,”Current Science, Vol. 91, Issue  No. 04, 25th  August, 2006, pp.449-455.

7.        IAEE Committee (1986), “Guidelines for Earthquake Resistant Non-Engineered Construction.”The International Association for Earthquake Engineering, Tokyo

8.        IS: 13828 (1993) `Improving Earthquake Resistance of Low Strength Masonry Buildings –Guidelines’. Bureau of Indian Standards, New Delhi.

9.        IS: 13827 (1993) `Improving Earthquake Resistance of Earthen Buildings – Guidelines’. Bureau of Indian Standards, New Delhi.

10.     Manik D. Kakkad, Capt.C.S. Sangvi, (2011), “Comparative Study of Bamboo (Ikra) Housing System with Modern Construction Practice”  Proc. National Conference  on Recent Trends in Engineering and Technology, 13-14 May, 2011, B.V.M. Engineering College, Gujarat.

11.     Mitch D. R. (2010) “Structural behavior of grouted-bar bamboo column bases” Doctoral thesis, University of Pittsburgh, 2010.

12.     Ozcebe, G., Ersoy, U., Tankut, T,,Akyuz, U., and Erduran, (2004), E. “Rehabilitation of existing RC structures using CFRP fabrics”. Proceedings of the 13th World
Conference on Earthquake Engineering, Vancouver, Canada, August 1-6, 2004, Paper No. 1393.

13.     Teddy  Boen, (2001), “ Earthquake Resistant Non – Engineered in Indonesia” presented during EQTAP Workshop – IV, Kamakura, Japan, December 3-4, 2001.

14.     Th. Kiranbala (2011), “Earthquake Disaster Mitigation”. Proceedings of International Conference on Advances in Materials and Techniques for Infrastructure Development (AMTD 2001), NIT Calicut, India 28-30 September 2011, pp 1-8

15.     Tiwari, R.P. (2000). “Earthquake hazards and mitigation in India with special reference to Northeastern India”, ENVIS Bulletin, 8(2): pp. 15-22.

16.     Tiwari, R.P., 2002. “Status of seismicity in the northeast India and earthquake disaster mitigation”, ENVIS Bulletin. Himalayan Ecology and Development, 10(1):pp. 11–21

125-129

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Atul Sharma, R.K. Agarwal

Paper Title:

Simulation of Rectangular Duct for Performance Analysis of   Trapezoidal Transverse Rib of Different Top Faced Tapered Angle

Abstract: In this paper Authors are trying to develop Digital Beam Forming Vehicular Radar at 77 GHz. At the transmitter side antenna beam pattern is digitally controlled by the DBS Transmitter having DBF planar structure 4X4 elemental patch antenna and at the receiver end receiving antenna beam pattern is digitally controlled by DBS Receiver having identical 4X4 elemental antennas. From this model we are able to measure the target motion and accurate ranging in presence of hostile environment successfully. The performance of this innovative model in range and velocity resolution are better with respect to other conventional Radar system.

Keywords:
   DBF (Digital Beam Forming), CSWAP (Cost Size Weight And Power), CALM (Continuous Air interface for Long and Medium distance), DS-SS (Direct Sequence Spread Spectrum), RCS (Radar Cross Section)


References:

1.           Hans V.S., Saini, R.P.,  Saini, J.S. , “Performance of artificially roughened solar air heaters-A review”, Renewable and Sustainable Energy Reviews, 13, 18541869,2009.
2.           Varun, Saini R.P., Singal S.K., “A review on roughness geometry used in solar air heaters”, Solar Energy, 81,1340-1350, 2007.

3.           Bhushan B., Singh R., “A review on methodology of artificial roughness used in duct of  air heaters”, Energy,  35, 202-212, 2010

4.           A.K. Patil, J.S. Saini, K.Kumar,” A Comprehensive Review on Roughness Geometries and Investigation Techniques Used in Artificially Roughened Solar Air Heaters”,  International journal of Renewable Energy Research, Vol-2,2012 .

5.           Han J.C., Glicksman L.R., Rohsenow W.M., “Heat transfer and friction for rib roughened surfaces”  International journal of Heat mass transfer, 21, 11431156,1978.

6.           Han J.C., “Heat transfer and friction in channels with opposite rib roughened walls”, Trans. ASME Journal of Heat Transfer, 106, 774-781, 1984.

7.           Han, J.C., Park, J.S., Lei, C.K., “Augmented heat transfer in rectangular channel of narrow aspect ratios with rib turbulators”, International journal of Heat mass transfer, 32/9, 1619-1630, 1989.

8.           Ravigururajan T.S., Bergles A.E., “General correlations for pressure drop and heat transfer for single phase  turbulent flow in internally ribbed tubes”, J. ASME, 52, 9-20, 1985.

9.           L. Wang, B. Sundén, Experimental investigation of the effect of rib shape on local heat transfer in a square duct by means of liquid crystal thermography, Proceedings of the sixth World Conference on Experimental Heat Transfer, Fluid Mechanics, and Thermodynamics, Matsushima, Miyagi, Japan, 2005.

10.        Y.J. Hong, S.S. Hsieh, Heat transfer and friction factor measurements in ducts with staggered and in-line ribs, ASME J. Heat Transfer 115 (1993) 58–65.

11.        M.E. Taslim, T. Li, D.M. Kercher, Experimental heat transfer and friction in channels roughened with angled, V shaped, and discrete ribs on two opposite walls, ASME J. Turbomach. 118 (1998) 20–28.

12.        Murata, S. Mochizwki, Comparison between laminar and turbulent heat transfer in a stationary square duct with transverse or angled rib turbulators, Int. J. Heat Mass Transfer 44 (11) (2001) 1127–1141.

13.        T.M. Liou, J.J. Hwang, Effect of ridge shapes on turbulent heat transfer and friction in rectangular channel, Int. J. Heat Mass Transfer 36 (4) (1993) 931–940.

14.        P.R. Chadra, M.L. Fontenot, J.C. Han, Effect of rib profiles on turbulent channel flow heat transfer, AIAA J. Thermophys. Heat Transf. 12 (1) (1998) 116–118.

15.        B. Arman, T.J. Rabas, Disruption shape effect on the performance of enhanced tubes with the separation and reattachment mechanism, ASME Symposium,
HTD-202, Enhanced Heat Transfer, 1992, pp. 67–75.

16.        Karwa R, Solanki SC, Saini JS. Heat transfer coefficient and friction factor correlations for the transitional flow regime in rib-roughened rectangular ducts. International Journal of Heat and Mass Transfer 1999;42:1597–615.

17.        S.W. Ahn, The effect of roughness type on friction factors and heat transfer in roughened rectangular duct, Int. Commun. Heat Mass Transf. 28 (7) (2001)933–942.

18.        Ooi, G. Iaccarino, P.A. Durbin, M. Behnia, Reynolds averaged simulation of flow and heat transfer in ribbed ducts, Int. J. Heat Fluid Flow 23 (2002) 750–757.

19.        T.-M. Liou, J.-J. Hwang, S.-H. Chen, Simulation and measurement of enhanced turbulent heat transfer in a channel with periodic ribs on one principal wall, Int. J.Heat Mass Transf. 36 (2) (1993) 507–517.

20.        Chaube A, Sahoo P.K., Solanki S.C., “Analysis of heat transfer augmentation and flow characteristics of a solar air heater”, Renew Energy, 31,317-331, 2006

21.        Karmare S.V., Tikekar A.N., “Analysis of fluid flow and heat transfer in a rib grit roughened surface solar air heater using CFD”, Solar Energy, 84, 409-417, 2010.

22.        Kumar S., Saini R.P., “CFD based performance analysis of a solar air heater duct provided with artificial roughness”, Renewable Energy, 34, 1285-1291, 2009.

23.        S. Yadav and J. L. Bhagoria, “A CFD analysis of a solar airheater having triangular rib roughness on the absorber plate,”International Journal of ChemTech Research,vol.5,no.2,pp.964–971, 2013.

24.        S. Yadav and J. L. Bhagoria, “A CFD based heat transfer and fluid flow analysis of a solar air heater provided with circular transverse wire rib roughness on the absorber plate,” Energy,vol. 55, pp. 1127–1142, 2013.

25.        S. Yadav and J. L. Bhagoria, “A CFD based heat transfer and fluid flow analysis of a conventional solar air heater,” Journal of Engineering Science and Management Education,vol.6,no.2, pp.137–146,2013.

26.        S. Yadav and J. L. Bhagoria, “Numerical investigation of flow through an artificially roughened solar air heater,” International  Journal of Ambient Energy,2013.

27.        S. Yadav and J. L. Bhagoria, “A numerical investigation of turbulent flows through an artificially roughened solar air heater,” Numerical Heat Transfer A. In press.

28.        R. Kamali and A.R. Binesh, “ The importance of rib shape effects on local heat transfer and flow friction characteristics of square ducts with ribbed internal surfaces.” Journal of International communications in heat and mass transfer 35(2008) 1032-1040.

29.        R. L. Webb and E. R. G. Eckert, “Application of rough surfaces to heat  exchanger design,” International Journal of Heat and MassTransfer,vol.15,no.9,pp.1647–1658,1972.W. H. McAdams, Heat Transmission, McGraw-Hill, NewYork.

30.        Md. Shaukat Ali, Karmveer and B.K.Gandhi, “ Measurement of heat transfer coefficient in a rectangular duct with array of rib using liquid crystal photography” International journal of engg. Trends, Issue2, vol.5 july 2012.ISSN 2249-6149

130-140

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Wiwik Sudarwati, Meri Prasetyawati, Anwar Ilmar Ramadhan

Paper Title:

Creative Industry Development Model Starter In Efforts To Improve Competitiveness

Abstract:  In order to support the presidential instruction No. 6 of 2009 on the development of the creative economy in 2009-2015, the city government to make-culture and technology as a basis for the development of creative economy. Jakarta, especially in districts kemayoran creative industries are not developed, could be called as a beginner. In an effort to support the president’s instructions and help the city government to achieve its goals it is Necessary for the development of creative industries beginners so that the creative industry has a competitive edge. A method to be used in achieving the objectives of this research is to use the SWOT analysis and the strategy canvas. Where the steps in this SWOT analysis is to provide questionnaires to the Creative Industries Beginners. The contents of this questionnaire include Strengths, weaknesses, opportunities and threats faced by the manager of the IKP over the years. Then the Data Obtained from the questionnaires was processed in the Matrix of Internal and External. Based matrix and SWOT matrix is made known to the quadrant position in order to obtain creative industries development strategy beginners. These strategies in the 9 blocks describe the strategy canvas. Created 4 step frameworks that are to Eliminate, increase of, Decrease and create to create new innovations. The results Obtained from this study is the strategy of diversification combined with a strategy canvas and blue ocean strategy in order to obtain results that IKP need to add new partners and optimize the old partners, need to create a new product innovations include service courses of make souvenirs, improve customer relationships, and reach by making the website.

Keywords:
  Creative Industries Starter, Development, SWOT, Strategy Canvas, Blue Ocean Strategy


References:

1.    Alexander Osterwalder and Yves Pigneur, 2013, Business Model Generation, PT. Elex Media Komputindo, Jakarta
2.    Satria Dias, 2011, Creative Industries Development Strategy To Enhance The Competitiveness Of The Local Economy, Journal Management Application, Vol. 9, No 1

3.    F. M. Royan, 2014, The Business Model Canvas Distributor, PT. Gramedia Pustaka Sciences, Jakarta

4.    F. Rangkuti, 2014, SWOT Analysis, PT. Gramedia Pustaka Sciences, Jakarta

5.    J. D. Fitrianto,—-, Implementation Of The Strategic Plan For The Empowerment Diskoperindag Small Industries Tanggulangin Post Disaster Mudflow, Journal of Public Administration Research (JOPAR), Vol 1, No. 1

6.    M. E. Pangestu, 2007, Indonesia’s Creative Industry Study In 2007, the Ministry of Trade Republic of Indonesia, Jakarta

7.    M. E. Pangestu, 2008, Creative Industries Development Towards a Creative Economy Indonesia Vision 2025, the Ministry of Trade Republic of Indonesia, Jakarta

8.    T. M. Amir, 2015, Questionnaire Design Concepts and Guidelines for Research, PT Prenadamedia Group, Jakarta

9.    M. A. Jerusalem ,2011, Small Industry Development Model Of The Fashion, Journal Proceedings of the National Seminar on ICT, UNESA, Surabaya

10. T. T. Tambunan, 2012, Micro, Small and Medium Enterprises in Indonesia, Publisher Members LP3ES IKAPI, Jakarta

11. —————————- ,2012, Creative Economic Development In Order To Create Jobs And Alleviate Poverty In The Context Of National Security, Journal of Studies LEMHANAS RI 14.

141-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-5 Issue-3

 Download Abstract Book

S. No

Volume-5 Issue-3, February 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Baha Ali Nasir

Paper Title:

Performance Comparison between SCFDMA and OFDMA in 4G-LTE under Two Subcarrier Mapping within Variable Channel Cases

Abstract:     The mobile communication is occupied by extra and extra facilities with information speed from little Kilobits per second reach to numerous Megabits per second. Amain choice in the communication system is the select of the multiple access structures. A selection may be the “Orthogonal Frequency Division Multiple Access” (OFDMA). Even with moreprofitsingreatflowin formation facilities, SCFDMA has bring excessive care as an smart substitution to OFDMA and nowrecommendedinportable uplink communications in fourth generation (4G) “Long Term Evolution” (LTE).in this paper the comparison between these two techniques is done in order to prove the powerful points of using the SCFDMA in LTE under two subcarrier mapping that are localized and interleaved style in dual channel kinds that are ITU and LTE channels. The results demonstrate that the SCFDMA provides the lesser “bit error rate” as compare to OFDMA in all cases of channels. Also the interleaved mode gives lower BER than localized mode.

Keywords:
    OFDMA, SCFDMA, 4G, LTE, BER, ITU.


References:

1.                 D. Kumar, S. arulmozhi and r. Muthaiah (2011), “FPGA implementation of scalable bandwidth Single carrier frequency domain multiple Access transceiver for the fourth generation Wireless communication”, Journal of Theoretical and Applied Information Technology JATIT, Vol. 28 No.2, 30th June 2011, ISSN: 1992-8645, E-ISSN: 1817-3195, Page(s): 88-95
2.                 Christian Rom (2008), “Physical Layer Parameter and Algorithm Study in a Downlink OFDM-LTE Context”, Ph.D. thesis,  Department of Electronic Systems, Faculty of Engineering, Science and Medicine, Aalborg University, Denmark

3.                 Dan J. Dechene and Abdallah Shami (2014), “Energy-Aware Resource Allocation Strategies for LTE Uplink with Synchronous HARQ Constraints”, IEEE Transactions on Mobile Computing,Volume: 13 , Issue: 2, DOI: 10.1109/TMC.2012.256, Page(s): 422 – 433

4.                 Hyung G. Myung (2007), “Single Carrier Orthogonal Multiple Access Technique for Broadband Wireless Communications”, Ph.D. thesis, Electrical Engineering Department, Polytechnic University 

5.                 Hyung G. Myung and David J. Goodman (2008), “Single Carrier FDMA: A New Air Interface for Long Term Evolution”, first edition, John Wiley & Sons, Ltd. Publication, website at www.wiley.com , ISBN 978-0-470-72449-1  

6.                 Huan Cong Nguyen (2008), “Synchronization for the uplink of OFDMA-based systems”, Ph.D. thesis, Aalborg University, Aalborg, Denmark

7.                 Amitabha Ghosh and Rapeepat Ratasuk (2011), “Essentials of LTE and LTE-A”, Published in the United States of America by Cambridge University Press, New York, Information on this title: www.cambridge.org/9780521768702, ISBN 978-0-521-76870-2

8.                 Andrea Ancora, Calogero Bona and Dirk T.M. Slock (2007), “Down-Sampled Impulse Response Least-Squares Channel Estimation for LTE OFDMA”, IEEE International Conference on Acoustics Speech and Signal Processing ICASSP2007, Volume: 3, DOI: 10.1109/ICASSP.2007.366530, Page(s): 293-296

9.                 Seong-Ho Hur and Bhaskar D. Rao (2012), “Sum Rate Analysis of a Reduced Feedback OFDMA Downlink System Employing Joint Scheduling and Diversity”, IEEE Transactions on Signal Processing, Volume: 60, Issue: 2, DOI: 10.1109/TSP.2011.2173335, Page(s): 862 – 876

10.              Mustafa E. Sahin, Ismail Guvenc, Moo-Ryong Jeong and Huseyin Arslan (2008), “Opportunity Detection for OFDMA Systems with Timing Misalignment”, IEEE Global Telecommunications Conference IEEE GLOBECOM2008, DOI: 10.1109 /GLOCOM. 2008. ECP.751, Page(s): 1 – 6

11.              Stefania Sesia, Issam Toufik and Matthew Baker (2011), “LTE – The UMTS Long Term Evolution From Theory to Practice”, Second Edition, A John Wiley & Sons, Ltd., Publication, ISBN: 9780470660256

12.              Farooq Khan (2009), “LTE for 4G Mobile Broadband: Air Interface Technologies and Performance”, First edition, Cambridge University Press, ISBN-13 978-0-521-88221-7, www.cambridge.org

13.              Abdul Basit Syed (2009), “Dimensioning of LTE Network Description of Models and Tool, Coverage and Capacity Estimation of 3GPP Long Term Evolution radio interface”, M.Sc. thesis, Department of Electrical and Communications Engineering, Helsinki University of Technology

14.              Chung Him Yuen and Behrouz Farhang-Boroujeny (2012), “Analysis of the Optimum Precoder in SC-FDMA”, IEEE Transactions on Wireless Communications, Volume: 11, Issue: 11, DOI: 10.1109/TWC.2012.090412.120105, Page(s): 4096 – 4107 

15.              Chao Zhang, Zhaocheng Wang, Zhixing Yang, Jun Wang and Jian Song (2010), “Frequency Domain Decision Feedback Equalization for Uplink SC-FDMA”, IEEE Transactions on Broadcasting, Volume: 56 , Issue: 2, DOI: 10.1109/TBC.2010.2046972, Page(s): 253 – 257

16.              Jin Xinzhu (2007), “Channel Estimation Techniques of SC-FDMA”, M.Sc. thesis, Department of Physics and Electrical Engineering, Karlstad University

17.              Erik Dahlman, Stefan Parkvall and Johan Sköld (2011), “4G LTE/LTE-Advanced for Mobile Broadband”, Academic Press is an imprint of Elsevier, website at www.elsevierdirect.com,  Library of Congress Control Number: 2011921244, ISBN: 978-0-12-385489-6 

18.              Haipeng Lei and Xiaoqiang Li (2009), “system level study of LTE uplink employing SC-FDMA and virtual MU-MIMO”, IEEE International Conference on Communications Technology and Applications ICCTA’09, DOI: 10.1109/ICCOMTA.2009.5349218, Page(s): 152 – 156

1-10

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Hari Hara P Kumar M

Paper Title:

Video, Image and Data Compression by using Discrete Anamorphic Stretch Transform

Abstract:  we have a compression technology which is used to represent the more information efficiently. This kind of technology will helpful when we dealing the exponential increase of digital data. With the help of by increasing spatial coherency, we have new physics based transform to get the image compression. There is a possibility to improve the JPEG and JPEG 2000 performance by using our new technology and showed by experimentally.

Keywords:
 Image Compression, Image De-Compression, Discrete Anamorphic transform, Spatial Coherency, JPEG and JPEG2000, Discrete Cosine Transform, Wavelet Transform, Frequency Decomposition


References:

1.              W. B. Pennebaker and J. L. Mitchell, JPEG still image data compression standard, 3rd ed., Springer, 1993. H. Poor, An Introduction to Signal Detection
and Estimation.   New York: Springer-Verlag, 1985, ch. 4.

2.              Skodras, C. Christopoulos, and T. Ebrahimi, “The JPEG 2000 still image compression standard”, IEEE Signal Process. Mag., Vol. 18, pp. 36 -58, 2001.

3.              M. Lustig, D. Donoho, J. M. Pauly, “Sparse MRI: The application of compressed sensing for rapid MR imaging,” Magn. Reson. Med., Vol. 58, pp. 1182-1195, 2007.

4.              K. Goda, A. Ayazi, D. R. Gossett, J. Sadasivam, C. K. Lonappan, E. Sollier, A. M. Fard, S. C. Hur, J. Adam, C. Murray, C. Wang, N. Brackbill, D. Di Carlo, and B.
Jalali, “High-throughput single microparticle imaging flow analyzer,” Proceedings of the National Academy of Sciences, Vol. 109, p. 11630 2012.

5.              Ashok, P. Baheti, and M. A. Neifeld, “Compressive imaging system design using task-specific information,” Appl. Opt., vol. 47, pp. 4457–471, 2008.

6.              N. I. Cho and S. K. Mitra, “Warped discrete cosine transform and its application in image compression,” IEEE Trans. Circuits Syst. Video Technol., vol. 10, pp. 1364–1373, 2000.

7.              M. H. Asghari and B. Jalali, “Discrete anamorphic transform for image compression,” IEEE Signal Processing Letters, Vol. 21, pp. 829-833, 2014.

8.              L.W. Chang, “Signal Processing: Image Communication” EURASIP Vol. 15, pp. 879-890, 2000.

9.              Guo and L. Zhang, “A novel multi resolution spatiotemporal saliency detection model and its applications in image and video compression,” IEEE Trans. on Image Proc., Vol. 19, pp. 185-198, 2010.

10.           http://www.pixera.com/sample-images /professional/

11.           E. J. Candes and M. B. Wakin, “An introduction to compressive sampling,” IEEE Signal Process. Mag., vol. 25, pp. 21–30, 2008.

12.           G. Evangelista and S. Cavaliere, “Discrete frequency warped wavelets: Theory and applications,” IEEE Trans. Signal Process., vol. 46, pp. 874–885, 1998.

11-15

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Porag Kalita

Paper Title:

Best Practices in Engineering College by TQC with Special Reference to North East India

Abstract: Quality is never an accident, but result of intelligent effort”– John Young. For the rapid growth of population and industries, Total Quality Circle (TQC) has gained importance and being introduce and experimental with in Engineering College in India. In educational institutions, allocation procedure of TQC is complex, as it human beings as input to and output from the system. Students are input and customer too.Quality circle as a means, “ It is a small group of teachers in the same work area or doing similar type of work who voluntarily meet regularly for about to identify, analyse and resolve work related problems, not only improve quality of education and total performance of the engineering college Philosophy to contribute to the improvement and development of engineering institutions are consisting by following special references to the N E India.
1) Teachers develop their ability, wisdom and creativity by using their brain.

2) Teachers educate themselves by sharing experienced.

3) Teachers do not work in isolation but act as a them.

4) Display Human capabilities fully.

5) It promotes job involvement and participation etc.

Therefore, Total Quality Circles in tact represent the form of “self control”, suggested for higher educational institutions.


Keywords:
      Ability, job control TQC, Job involvement, wisdom.


References:

1.                 Course materials of Management Development Programme, XLRI, Jamshedpur, January 2nd to 6th/1995.
2.                 Course materials of Executive Development Programme in IIM Bangalore, July 17th to 21st July/1995.

3.                 Course Materials of Faculty Development Programme in IIE, Guwahati, from 22nd January to 2nd February 2001, India.

4.                 Course material of National council for Labour Management, Chennai. 1996, India.

5.                 Proceeding of NAAC sponsored National Seminar in J B College, Jorhat, Assam, India, on dated from November 4th to 5th/2002.

6.                 Paper by Dr. Kalita Porag, NAAC sponsored National Seminar in J B College, Jorhat, Assam, and India, on dated from November 4th to 5th/2002.. pages No. from 20 to 24.

7.                 Paper by Dr. Kalita Porag, ICSSR sponsored International Seminar in Bodoland University, was held 4th 6th, oct/2013.

8.                 Proceeding of 34th Indian Social Science Congress as International Conference at Guwahati University was held from 27th Dec to 31st Dec/2010. 

9.                 Paper by Dr. Kalita Porag, International Seminar in Gossaigaon College, Kokarjar, Assam, India, dated 4th to 6th Feb/2015 and sponsored by ICSSR, New
Delhi.     

10.              Department of Education, Govt. of Assam sponsored Int’l conference of Council of Teachers Education (CTE), H.Q. Bhopal, dated 14th to 16, Dec/2002, at Guwahati University, paper by Dr. Kalita Porag.                                                                                                                                                    

11.              Ministry of Human Resource Development sponsored Int’l conference of CTE, was held at Bhopal dated 3rd to 5 Nov/2003, paper by Dr. Kalita Porag.

12.              Dibrugarh University Int’l Conference,(CTE) Department of Education, From 7th Feb. to 9th Feb/2013, paper by Dr. Kalita Porag.

13.              Int’l Conference under CTE at Guwahati, from 7th to 8th Non/2008,  paper by Dr. Kalita Porag. Contd…P/5

14.              Nat’l Seminar in Tezpur University with collaboration by Faculty of Commerce, Delhi University, on dated 17th to 18 Nov/2012., paper by Dr. Kalita Porag.

15.              UGC sponsored National Seminar in North Lakhimpur Girls College, N.L., Assam; India dated 12th to 13th, Sep/2008, paper by Dr. Kalita Porag.

16.              UGC sponsored National Seminar in D.C.B. Girls College, Jorhat, Assam, dated 19th to 20th, Dec/2009, paper by Dr. Kalita Porag.

17.              UGC sponsored National seminar in Nalbari Commerce College, Nalbari, Assam, dated 11th to 12thy June/2010, paper by Dr. Kalita Porag.

18.              UGC sponsored National Seminar in  Now gong College, Now gong, Assam, dated 25th to 26 July/2012, paper by Dr. Kalita Porag.1

19.              Paper Published in Book, ISBN No. 978-81- 7139-617-7. 15.15.6.    

20.              Paper published ISBN No. 0-7680-0539-6).

21.              Paper published in ISBN No.0-7680-0553-1.  

22.              Paper I/D 20150401061, on line journal volume 04, issue 03, Mar/2015 (www.ijret.org)

16-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Mohanad Abdulkareem Hasan Hasab

Paper Title:

Digital Topology and Edge Detection as Application

Abstract:  Digital topology refers to the use of topological properties and features that  could be extracted from images defined as digital grid, In this paper we defined the basic and well known concepts of digital topology and how it represents an image as digital array of different dimension with some operations could be used for enhancing and processing the image for different practical purpose , Then producing an algorithm to detect the edges of images that are considered a type of crucial information needed for segmentation and recognition . and also presented a brief study of the fundamental concepts of the edge detection methods.

Keywords:
 Digital topology ,digital image processing , edge detection


References:

1.              T,Y.KONG , A.ROSENFELD .DIGITAL TOPOLOGY:INTRODUCTION AND SURVEY.COMPUTER VISION ,GRAPHICS AND IMAGE PROCESSING 48 ,1989.PP357-393.
2.              ATTILA FAZEKAS ,INTRODUCTION TO DIGITAL TOPOLOGY .

3.              A.ROSENFELD ,FUZZY DIGITAL TOPOLOGY ,INFORMATION AND CONTROL 40,1979,76-87.

4.              A.ROSENFELD,ON CONNECTIVITY PROPERTIES OF GRAYSCALE PICTURES,PATTERN RECOGNITION .16,1983.47-50.

5.              SAHA.DIGITAL TOPOLOGY AND GEOMETRY IN MEDICAL IMAGING : A SUREVEY.MEDICAL IMAGING ,IEEE TRANSACTIONS ON (VOLUME 34,ISSUE 9) ,2015 ,PP
1940-1964.

6.              H.H.ATKINSON ,I.GARGANTINI AND M.V.S.RAMANATH , IMPROVEMENTS TO A RECENT 3D-BORDER ALGORITHM .PATTERN RECOGNITION ,18,1985, 215-226.

7.              GILLES BERTRAND AND MICHEL COUPRIE ,A MODEL FOR DIGITAL TOPOLOGY .

8.              T.Y KONG ,A.W.ROSCOE AND A.ROSENFELD . CONCEPTS OF DIGITAL TOPOLOGY. TOPOLOGY AND ITS APPLICATION 46 , 1992 , 219-262 .

9.              ULRICH ECKHARDT, LONGIN JAN LATECKI. DIGITAL TOPOLOGY. HAMBURGER BEITRGE ZUR ANGEWANDTEN MATHEMATIK,1994 .

10.           P.K.SAHA , 3D DIGITAL TOPOLOGY UNDER BINARY TRANSFORMATION WITH APPLICATIONS.COMPUTER VISION AND IMAGE UNDERSTANDING ,VOL.63(3) ,1996,418-429 .

11.           JAYARAM K.UDUPA ,APPLICATION OF DIGITAL TOPOLOGY IN MEDICAL THREE-DIMENSIONAL IMAGING ,TOPOLOGY AND ITS APPLICATIONS ELSEVIER ,VOL.46(3),1992181-197 .

12.           M.P.CHAUDHARY ,V. KUMAR AND S. CHAUDHARY , ON TOPOLOGICAL SETS AND SPACES ,GLOBAL JOURNAL OF SCIENCE FRONTIER RESEARCH ,VOL(11) ,ISSUE(2) VERSION (1.0) , 2011.

13.           J. CANNY, “A COMPUTATIONAL APPROACH TO EDGE DETECTION,” IEEE TRANS. PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 8, NO. 6, PP. 679-698, NOV. 1986.

14.           SONAM SALUJA1, ARADHANA KUMARI SINGH2, SONU AGRAWAL ,A STUDY OF EDGE-DETECTION METHODS, INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING VOL. 2, ISSUE 1, 2013. 994 -999.

15.           BINDU BANSAL, JASBIR SINGH SAINI, VIPAN BANSAL, AND GURJIT KAUR ,“COMPARISON OF VARIOUS EDGE DETECTION TECHNIQUES”, JOURNAL OF
INFORMATION AND OPERATIONS MANAGEMENT ISSN: 0976–7754 & E-ISSN: 0976–7762 , VOLUME 3, ISSUE 1, PP-103-106, 2012.

16.           GONZALEZ R.C. R.E. WOODS AND S.L. EDDINS, (2004). “DIGITAL IMAGE PROCESSING USING MATLAB”, PRENTICE HALL.

17.           W. FREI AND C. CHEN, “FAST BOUNDARY DETECTION: A GENERALIZATION AND NEW ALGORITHM,” IEEE TRANS. COMPUTERS, VOL. C-26, NO. 10, PP. 988-998, OCT. 1977.

18.           Mohammad N. D. Dr. Manar Y. K. Dr. Dhuha B. A., Brain Tumors Segmentation Based On Genetic Algorithms, 1st conference of information technology, Musel univ,Iraq,2008.

20-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Khurshid Abdul Jabbar

Paper Title:

Effecting Transformation Towards a Green Computing Infrastructure: A Case Study on Asia Pacific University

Abstract:   Energy consumption and environmental concerns have become organizational priorities as sustainability becomes a business imperative. Within the last decade Green Computing has become a key dimension in IT management owing to the economic opportunities and stakeholder pressure, however, the strategic relevance of Green Computing has largely been neglected as a corporate strategy. This case study on Asia Pacific University aims to deliver a holistic Green Computing Framework for the University. This Framework addresses the key facets of an organization: strategy, technology, infrastructure, operations and administration, as an avenue for the University to assess its Green readiness as it moves towards a Green Computing infrastructure for competitive advantage. The absence of a Green Computing readiness framework is critical for the University to understand the key factors in implementing a sustainable business practice. A sustainable energy-efficient learning centre will account for a healthy environment while maintaining a high standard of educational excellence.

Keywords: 
Green Computing, Green Readiness, Sustainability


References:

1.             Acumen-insights.(2009). Strategic Information Systems Knowledge – IST Rationale.[Online]. Available from: http://www.acumen-insights.com/papers/Strategic%20Information%20Systems%20Knowledge%20%20IST%20Rationale.pdf[Accessed: 29thDecember 2015]
2.             Bauer, R. (2008). Building the Green Data Center.[Online]. Available from: net.educause.edu/ir/library/pdf/bauer.pdf [Accessed: 29th December 2015]

3.             Chan, R.Y. & Yam, E. (1995). Green Movement in a Newly Industrializing Area: A survey on the Attitudes and Behaviour of the Hong Kong Citizens. Journal of
Community and Applied Social Psychology.[Online].5 (4).

4.             Climate Group. (2008). SMART 2020: Enabling the Low Carbon Economy in the Information Age. [Online]. Available from: http://www.smart2020.org/_assets/files/02_Smart2020Report.pdf[Accessed: 29th December 2015]

5.             Coster, F. (2010).Business IT Alignment.[Online]. Available from: http://businessitalignment.wordpress.com/2010/12/17/the-strategic-alignment-model-of-henderson-and-venkatraman[Accessed: 29th December 2015]

6.             Ebber, M., Archibald, M., Fonseca, C.F.F., Griffel, M., Para, V., Searcy, M.(2011).Smarter Data Centers Achieving Greater Efficiency.[Online]. Available from:www.redbooks.ibm.com/redpapers/pdfs/redp4413.pdf[Accessed: 29th December 2015]

7.             Erek, K.,Loeser, F., Schmidt, N.H., Zarnekow, R., Kolbe, L.M.(2011).Green IT Strategies: A Case Study-Based Framework for Aligning Green IT with Competitive Environmental Strategies.[Online]. Available from: http://projects.business.uq.edu.au/pacis2011/papers/PACIS2011-049.pdf[Accessed: 8th September 2015]

8.             Harmon, R. R. &Auseklis, N. (2009).Sustainable IT Services: Assessing the Impact of Green Computing Practices.[Online]. Available from: http://www.sis.pitt.edu/~dtipper/3350/GreenICT1.pdf [Accessed: 10th September 2015]

9.             Hart, S. L. & Milstein, M. B. (2003).Creating Sustainable Value.Academy of Management Executive.17 (2).

10.          Harris, J. (2006). Green Computing and Green IT Best Practices.[Online]. Available from: http://www.csbdu.in/pdf/Green%20Computing.pdf [Accessed: 29th December 2015]

11.          Henderson, J. C. & Venkatraman, N. (1999). Strategic Alighnment: Leveraging Information Technology for Transforming Organizations. IBM Systems Journal.[Online].32 (1).

12.          IPCC (2013).Climate Change 2013: The Physical Science Basis. Contribution of WorkingGroup I to the Fifth Assessment Report of the Intergovernmental Panel on Climate ChangeAvailable from: https://www.ipcc.ch/pdf/assessment-report/ar5/wg1/WGIAR5_SPM_brochure_en.pdf [Accessed: 29th December 2015]

13.          James, P. & Hopkinson, L. (2009).Sustainable ICT inFurther and Higher Education.Available from: http://www.jisc.ac.uk/media/documents/publications/rptgreenictv1.pdf[Accessed: 29th December 2015]

14.          Joumaa, C. &Kadry, S. (2012). Green IT: Case Studies. International Conference on Future Energy, Environment and Materials.

15.          Kounatze, R. C. (2009). Towards Green ICT Strategies: Assessing Policies and Programmes on ICT and the Environment. [Online]. Available from: http://dx.doi.org/10.1787/222431651031[Accessed: 25th December 2015]

16.          Lubin, D. A. &Esty, D. C. (2010). The-Sustainability-Imperative.The Harvard Business Review.

17.          Molla, A. (2006). E-readiness and Successful e-commerce Diffusion in Developing countries: Results from a Cluster Analysis.[Online]. Available from: http://www.irma-international.org/viewtitle/9260/[Accessed: 29th December2015]

18.          Molla, A. (2009). The Reach And Richness Of Green IT: 20th Australasian Conference on Information Systems. Melbourne, 2nd to 4th Dec 2009. Melbourne

19.          Molla, A. et al. (2008). E-Readiness to G-Readiness: Developing a Green Information Technology Readiness Framework.Australasian Conference of Information
Systems. Christchurch. 3rd to 5th December 2008. Christchurch. ACIS.

20.          Molla, A. & Cooper, V. (2009).Green IT Readiness: A Framework and Preliminary Proof of Concept. Australasian Journal of Information Systems.16 (2).

21.          Murugesan, S. (2008).Harnessing Green IT: Principles and Practices. IEEE Computer Society.

22.          Nogareda, J. S. & Ziegler, A. (2006). Green Management and Green Technology:Exploring the Causal Relationship.[Online]. Available from:www.cis.ethz.ch/publications/WP_18_Seijas_Ziegler.pdf[Accessed: 29th December 2015]

23.          Orsato, R. J. (2006). Sustainability Strategies – When Does It Pay to Be Green.California Management Review.

24.          Philipson, G. (2010). A Green ICT Framework.[Online]. Available from:http://www.computersite.com.au/assets/files/A_Green_ICT_Framework_CR.pdf [Accessed: 29th December 2015]

25.          Rao, P. & Holt, D. (2005). Do Green Supply Chains Lead to Competitiveness and Economic Performance? International Journal of Operations & Production Management.[Online].25 (9). p. 898-916.

26.          RMIT.(2012). RMIT University.[Online]. Available from: http://www.rmit.edu.au/ [Accessed: 29th December 2015]

27.          Roy, S. & Bag, M. (2008).Green Computing – New Horizon of Energy Efficiency and E-Waste Minimization – World Perspective vis-à-vis Indian Scenario.[Online]. Available from:http://www.csi-sigegov.org/emerging_pdf/8_64-69.pdf [Accessed: 25th December 2015]

28.          Santos, A. T. (2009). Going Green: the impact on higher education institutions. International-Business-Research

29.          Scheihing, P. (2009). DOE Data Center Energy Efficiency Program.[Online]. Available from: http://www1.eere.energy.gov/manufacturing/tech_deployment/pdfs/doe_data_centers_presentation.pdf [Accessed: 29th December 2015]

30.          Singh, G. (2012). Effecting Transformation towards a Green Computing Infrastructure: A Case Study on APU.[Interview]. 25th April 2012

31.          Shinde, S., Nalawade, S., Nalawade, A. (2013).Green Computing: Go Green and Save Energy. International Journal of Advanced Research in Computer Science and Software Engineering.Vol 3, Issue 7

32.          Tiwari, N. (2015). Green Computing. International Journal of Innovative Computer Science & Engineering. Vol 2, Issue 1 (2015)

33.          Tomlinson, B. (2010). Greening Through IT. London: The Massachusetts Institute of Technology (MIT) Press

34.          Wang, U. (2008). Green ComputingExploring energy-efficient computing, from system designs to applications.[Online]. Available from: http://www.lbl.gov/publicinfo/newscenter/features/2008/apr/assets/docs/NCFGreenComputing.pdf [Accessed: 29th December 2015]

35.          Webber, L. & Wallace, M. (2009).Green Tech. New York: American Management Association Willemse, G. (2008). Green Computing.[Online]. Available from: http://www.gitoc.fs.gov.za/knowledgebank/infrastructure/Green%20Computing%20aka%20Green%20IT.pdf[Accessed: 29th December 2015]

36.          Taghaboni-Dutta, F., Trappey, A.J.C., Trappey, C.V.(2010). An XML based supply chain integration hub for green product lifecycle management. Science Direct.

37.          Talebi, M. & Thomas, W. (2009).Methods, Metrics and Motivation for a Green Computer Science Program.ACM.[Online].(May). Available from: http://www.csc.villanova.edu/~tway/publications/talebiSIGCSE09.pdf[Accessed: 9th December 2015]

38.          Pyakurlal, B. (2009). A Feasibility Study on the Application of Green Technology for Sustainable Agriculture Development.[Online]. Available from: http://www.unapcaem.org/Activities%20Files/A0902/StudyOnGreenTech.pdf[Accessed: 29th December 2015]

39.          The Electricity Journal.(2008). Electricity Currents.The Electricity Journal.[Online].Vol. 21.Issue 8.

40.          U.S. Department Of Environment.(2011). Best Practices Guide for Energy-Efficient Data Center Design.[Online]. Available from: www1.eere.energy.gov/femp/pdfs/eedatacenterbestpractices.pdf [Accessed: 29th December 2015]

41.          UN General Assembly. (2000). United Nations Millennium Declaration.[Online]. Available from: http://www.un.org/millennium/declaration/ares552e.htm[Accessed: 29th December 2015]

42.          Velte, T. J. et al. (2008). Green IT. Reduce Your Information System’s Environmental Impact While Adding to the Bottom Line’. USA: McGraw Hill

43.          Verma, S. (2007).Green Computing.[Online]. Available from: http://www.techno-preneur.net/information-desk/sciencetechmagazine/2007/nov07/Green%20Computing.pdf [Accessed: 29th December 2015]

44.          Nickels, D. W. (2003).IT-Business Alignment What We Know That We Still Don’t Know.[Online]. Available from: http://sais.aisnet.org/2004/.%5CNickels.pdf[Accessed: 16th July 2012]

45.          Zarella, E. (2008). Sustainable IT – The Case for Strategic Leadership.[Online]. Available from: http://www.kpmg.com/CN/en/IssuesAndInsights/ArticlesPublications/Documents/Sustainable-IT-200808-o.pdf[Accessed: 29th December 2015]

26-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Devikant Baviskar, Balbheem Kamanna, Gauri Tembe, Kajal Juikar

Paper Title:

Design and Analysis of Polymer PEK Spur Gear under Static Loading Condition using FEA

Abstract:    this work presents the design and Analysis of polymer PEK spur gear and Comparison of results of PEK with Metallic Cast Iron under limited loading conditions. Application of Plastic gear reduces the weight and noise vibration. Analytical Method is used to calculate Tooth load with help of Lewis equation & dynamic tooth load with help of Buckingham equation. Gear profile modeling is done by using SOLIDWORKS 2015. Finite Element Method is used for Static analysis of the gear to find the Von-misses stress on the tooth of the gear using ANSYS and these values are compared with Analytical values.

Keywords:
 SOLIDWORKS, ANSYS, Lewis and Buckingham Equation, PEK.


References:

1.                S. Jyothirmai, R. Ramesh, T. Swarnalatha, D. Renuka, “A Finite Element Approach to Bending, Contact and Fatigue Stress Distribution in Helical Gear Systems”, 3rd International Conference on Materials Processing and Characterization (ICMPC 2014), Procedia Materials Science 6, (2014) 907 – 918, www.sciencedirect.com.
2.                Raja Roy, S. Phani Kumar, D.S. Sai Ravi Kiran, “ Contact pressure analysis of spur gear using FEAM”, International Journal of Advanced Engineering Applications, Vol.7, Iss.3, pp.27-41 (2014)

3.                Pravin Kumar, Harsh Raghuvanshi, “DESIGN AND ANALYSIS OF SPUR GEAR DIFFERENT GEOMETRIC CONDITIONS“, International Journal of Engineering & Advanced Technology (IJEAT), ISSN:2249-8958, Volume-3, Issue-2, December 2013

4.                Utkarsh.M.Desai, Prof.Dhaval.A.Patel, “MODELING AND STRESS ANALYSIS OF COMPOSITE MATERIAL FOR SPUR GEAR UNDER STATIC LOADING CONDITION”, Technical Research Organization India, ISSN(PRINT): 23946202, (ONLINE):23946210, VOLUME1, ISSUE2,2015

5.                3.V. Siva Prasad, Syed Altaf Hussain, V.Pandurangadu, K.PalaniKumar, “MODELING AND ANALYSIS OF SPUR GEAR FOR SUGARCANE JUICE MACHINE UNDER STATIC LOAD CONDITION BY USING FEA”, International Journal of Modern Engineering Research (IJMER), ISSN: 2249-6645, Volume-2, Issue.4, July-Aug 2012 

6.                Pradeep Kumar Singh1, Manwendra Gautam1, Gangasagar1 and Shyam Bihari Lal “STRESS ANALYSIS SPUR GEAR DESIGN BY USING ANSYS WORKBENCH”, International Journal of Mechanical Engineering and Robotics Research, ISSN 2278 – 0149,  Vol. 3, No. 3, July 2014

7.                Thirugnanam, J. Sathish and Lenin Rakesh , “CONTACT ANALYSIS OF SPUR GEAR USING COMPOSITE MATERIAL(NYLO CAST)”, Middle-East Journal of Scientific Research 20 (3), ISSN 1990-9233,2014

8.                Mahebub Vohra, Prof. Kevin Vyas, “Comparative FINITE ELEMENT ANALYSIS OF METALLIC AND NON-METALLIC SPUR GEAR”, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684,p-ISSN: 2320-334X, Volume 11, Issue 3 Ver. IV (May- Jun. 2014)

9.                Amarjeet R. Gupta, “APPLICATION OF DIFFERENT THERMOPLASTIC GEARS IN THE GEARBOX OF MOPED”, International Journal for Engineering Applications and Technology (IJFEAT), ISSN: 2321-8134, Issue: 2(1):10Oct,2013

10.             Sandeep C. Dhaduti1, Dr. S. G. Sarganachari, “REVIEW OF COMPOSITE ASYMMETRIC SPUR GEAR”, International Journal of Engineering Research, ISSN:2319-6890,Volume No.4, Issue No.2,01 Feb. 2015

11.             K. Wood, V. Williams and R. Weidig, “THE RELATIVE PERFORMANCE OFSPUR GEARS MANUFACTURED FROM STEEL AND PEEK”, (Reprinted with kind permission of the VDI International Conference on Gears, Technical University of Munich 2010), March/April 2012

12.             M/s. Kalaikathir Achchagam, Faculty of Mechanical Engineering PSG College of Technology, Coimbatore-641 004 (ISBN 978-81-927355-0-4), 15 MAY, 2013.

35-38

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

S. Santhosh Kumar, Anu R. G

Paper Title:

Radiating Flare Design of Tapered Slot Loaded Vivaldi Antenna Using Fourier Series Approach

Abstract:     Federal communication commission has allocated a band from 3.1 GHz to 10.6 GHz for ultra wide band (UWB) applications. An antenna designed for UWB applications should be capable of offering a higher bandwidth, with minimum distortion of signals. One such antenna that satisfies this criterion is the Vivaldi antenna. The gain offered by a conventional exponentially tapered Vivaldi prototype is less, particularly at a lower giga hertz of frequencies. As the gain is dependent on the geometry of the radiating flare, an improvement in the gain is achieved by removing the restriction on the geometry of the flare. An antenna designed using Fourier series takes an optimized shape, such that the condition of maximum gain and minimum return loss is achieved corresponding to the design frequency. Antenna performance obtained from the simulation result and hardware prototype measurements shows a good agreement thereby verifying the design concept.

Keywords: 
Ultra wide band, Vivaldi Antenna, Fourier series, gain, Radiation flare


References:

1.             D.Ziani Kerarti, F.Z Marouf and S.M. Meriah, “New Tapered Slot Vivaldi antenna for UWB Applications in,” 24th International Conference on Microelectronics (ICM)}, 2012.
2.             Li Tianming, Rao Yuping and Niu Zhongxia, Analysis and Design of UWB Vivaldi Antenna, in IEEE International Symposium on Microwave, Antenna, Propagation, and EMC Technologies For Wireless Communications, 2007

3.             Aaron Zachary Hood, Tutku Karacolak and Erdem Topsakal, A small antipodal Vivaldi antenna for ultra wide band application, in IEEE Antennas And Wireless Propagation Letters, vol. 7, pp. 656–660, 2008.

4.             Satoru Sugawara, Yutaka Maita, Kazuhiko Adachi, Koji Mori and Koji Mizuno, Characteristics Of A MM-Wave Tapered Slot Antenna With Corrugated Edges, in IEEE MTT-S Digest, WE2A–5, 1998.

5.             Dalia M. Elsheakh and Esmat A. Abdallah, Novel Shapes of Vivaldi Antenna for Ground Penetrating Radar (GPR), in 7th European Conference on Antennas and Propagation, 2013

6.             Jeremy B. Muldavin and Gabriel M. Rebeiz, Millimeter-Wave Tapered-Slot Antennas on Synthesized Low Permittivity Substrates, in IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, , vol. 47, pages 1276–1280, July 15–17, 2009.

39-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Esayas Alemayehu, Thamineni Bheema Lingaiah

Paper Title:

Development of Iron Oxide Coated Sand (IOCS) Adsorbent for Defluoridation Technology

Abstract:      Although safe and reliable water supply is badly needed, the installation of advanced defluoridation plants in regions with low economic resources such as Ethiopia is, at present, very scarce mainly due to operational consideration and settlement characteristics of the people.  In such cases the development and popularizing of low cost fluoride removal technologies, which does not demand much money and skilled manpower, is important. Therefore, this study focuses on the removal of fluoride from groundwater by using Iron oxide coated sand (IOCS), which could be used as an alternative defluoridation adsorbent. The influence of design parameters such as contact time, adsorbent dose, solution pH, and initial fluoride concentration was investigated. Basic process characteristics were determined under batch conditions. Fluoride adsorption onto IOCS was strongly pH dependent. The maximum adsorption capacity for IOCS was found to be 136 mg kg-1. This result was obtained at optimized conditions of solution pH (4.0), contact time (8.0 h), dose (15.0 g L-1) and initial fluoride concentration (5.0 mg L-1).  The uptake of fluoride slightly increased with increasing equilibrium concentration of fluoride ion in solutions. By increasing the initial concentration of fluoride from 3.0 to 10.0 mg L-1, the adsorption capacity, increased from 90.73 mg kg-1 to 252.17 mg kg-1. IOCS was found to be promising adsorbent for defluoridation technology..

Keywords:
 Adsorption Technology, Batch Experiments, Defluoridation, IOCS


References:

1.                 S. K. (2001) Adsorptive Iron Removal from Groundwater. Swets and Zeitlinger B. V., Lisse.
2.                 Sharma, S. K. (1997) Iron Removal in Water Treatment by Sorption of Iron (II) onto Filter Media. M. Sc. Thesis, IHE, Delft.

3.                 Sharma, S.K., Ijpelaar, G.F., Schippers, J.C. (2000) Iron oxide Coating Development on Filter Media, Transactions of the Filtration society, 1 ( 3), 68-72

4.                 Benjamin, M.M., Sletten, R.S., Bailey, R.P., Bennett, T. (1996) Sorption and Filtration of Metals Using Iron-Oxide-Coated Sand, Water Research, 30 (11). 2609-2620
5.                 Petrusevski, B, Boere, J., Shahidullah, S.M., Sharma, S.K., Schippers, J.C. (2000) Adsorbent Based Point Of Use System For Arsenic Removal In Rural Areas, Proceeding Of Conference On Innovation In Conventional And Advanced Water Treatment Processes, Amsterdam
6.                 Dugger, D. L. et al,(1964) The Exchange Of Twenty Metal Ions At The Weakly Acidic Silanol Group Of Silica Gel. J. Phys. Chem. 68, 757.

7.                 James, R. O. and Healy T. W. (1972) Adsorption of Hydrolyzable Metal Ions at the Oxide Water Interface. II. Charge Reversal Of Sio2 And TiO2 Colloids By Adsorbed Co (II), La (III), And Th (IV) As Model Systems. J. Colloid Interface Sci. 40, 53 – 64.

8.                 Kinniburgh, D. G., Jackson M. L. and Syers J. K. (1976) Adsorption Of Alkaline Earth, Transition, And Heavy Metal Cations By Hydrous Oxide Gels Of Iron And Aluminum. Soil Sci. Soc. Am. J. 40, 796 – 799.

9.                 Schindler, P. W., Furst, B., Dick, B. and Wolf, P. U. (1976) Ligand Properties of Surface Silanol Groups. I. Surface Complex Formation with Fe3+, Cu2+, Cd2+, And Pb2+. J. Colloid Interface Sci. 55, 469 – 475.

10.              Benjamin M. M. (1983) Adsorption and Surface Precipitation of Metals on Amorphous Iron Oxyhydroxide, Environ. Sci. Technol. 17, 686 – 692.

11.              Davis J. A. and Leckie J. O. (1978) Effect Of Adsorbed Complexing Ligands On Trace Metal Uptake By Hydrous Oxides. Environ. Sci. Technol. 12, 1309 – 1315.

12.              Bourg A. and Schindler P. W. (1978) Ternary Surface Complexes. I. Complex Formation In The System Silica- Cu (II) – Ethylenediamine. Chimia 32, 166 – 168.

13.              Elliott, H. A. and Huang C. P. (1980) Adsorption Of Some Copper (II)- Amino Acid Complexes At The Solid Solution Interface. Effect Of Ligand and Surface
Hydrophobicity. Environ. Sci. Technol. 14, 87 – 93.

14.              Benjamin M. M., Hayes K. F. and Leckie J.O. (1982) Removal Of Toxic Metals From Power – Generation Waste Streams By Adsorption And Copercipitation. Journal WPCF, 54(11) 1472-1481.

15.              Dillard, J. G. and Schenick C. V. (1986) Interaction of Co (II) And Co (III) Complexes on Synthetic Birnessite: Surface Characterization. In Geochemical Processes at Mineral Interfaces (Edited by Davis J. A. and Hayes K. F.). ACS Symposium Ser. No. 323, American Chemical Society, Washington, D.C.

16.              Edwards, M. and Benjamin, M.M. (1989) Adsorptive Filtration Using Coated Sand A New Approach for the Treatment of Metal Bearing Wastes. Journal of WPCF, 61 (9), 1523 – 1533.

17.              Alemayehu, E. (2003) Removal of heavy metals from groundwater using iron oxide coated sand: M. Sc. Thesis, UNESCO-IHE Institute for Water Education, the Netherlands. http://www.unesco-ihe.org/

18.              Lounici H, Addour L, Belhocine D, Grib H, Nicolas S, Bariou B. (1997) Study of a new technique for fluoride removal from water. Desalination 114:241–51.

19.              Srimurali M, Pragathi A, Karthikeyan J. (1998) A study on removal of fluorides from drinking water by adsorption onto low-cost materials. Environ Pollut 99:285–9.

20.              Alemayehu, E. (2008) IOCS and natural iron enriched adsorbents as an alternative low-cost defluoridation technique in rift valley of Ethiopia. Sustainable Management of Water Resource in the East-African Rift System (MAWARI – Fluoride project report), unpublished. http://www.mawari.net

21.              Hichour M, Persin F, Sandeaux J, Gavach C. (2000) Fluoride removal from waters by Donnan dialysis. Sep Purif Technol  18:1–11.

22.              Amor Z, Malki S, Taky M, Bariou B, Mameri N, Elmidaoui A. (1998) Optimization of fluoride removal from brackish water by electrodialysis. Desalination 120:263–71.

23.              Hasany SM, Chaudhary MH. (1996) Sorption potential of Haro River quartz for the removal of antimony from acidic aqueous solution. Appl Radioactive Isot 47(4): 467–71.

24.              Cohen D, Conrad HM. (1998) 65000 GPD fluoride removal membrane system in Lakeland California USA. Desalination 117:19–35.

25.              Tklehaimanot R. (2005) Study of fluoride and fluorosis in Ethiopia with recommendations on appropriate defluoridation technologies: A UNICEF sponsored consultancy. Addis Ababa, Ethiopia. May 5, 2005 report (unpublished).

26.              Datta, M. M. (1995) Excess Fluoride in drinking water in Ethiopia. Maji . 9, 14 – 23

27.              Devi, R., Alemayehu, E., Singh, V., Kumar, A., Mengiste, E. (2008) Removal of fluoride, arsenic and coliform bacteria by modified homemade filter media from drinking water. Bioresource Technology. 99, 2269-2274.

28.              Fufa, F., Alemayehu, E., Lennartz, B. (2013) Defluoridation of groundwater using termite mound. Water, Air, & Soil Pollution. An International Journal of Environmental Pollution. 224, 1-15

29.              Fufa, F.,  Alemayehu, E., Deboch, B. (2014) Defluoridation of Groundwater Using Gypsiferous Limestone. Journal of Environmental and Occupational Science. 3 (2):- doi: 10.5455/jeos.20140314041743

30.              Sharma et al (2002) Effect of groundwater quality on adsorptive iron removal. Journal of water supply: Research and Technology. -AQUA, 51(4), 199-208.

31.              Shang-Lien, Lo. et al, (1997) Characteristics And Adsorption Properties Of Iron Coated Sand, Jornal of Wat. Sci. Tech., 35 (7), 63-70.

32.              Dzombak, D. A. and Morel, F. M. M. (1990) Surface Complexation Modelling – Hydrous Ferric Oxides: John Wiley and Sons.

33.              Huang, C. P., and Vane, L. M. (1989) Enhancing As (V) removal by Fe(II) – Treated Activated Carbon. Journal of WPCF, 61 (9), 1596 – 1603.

34.              Joshi, A. and Chaudhurri, M. (1996) Removal of Arsenic from Ground water by Iron Oxide-Coated Sand, Journal of Environmental Engineering, 122 (8), 769-772.

35.              Eaton AD, Lenore SC & Arnold EG (1995) Standard Methods for the Examination of Water and Wastewater, 19th ed. American Public Health Association, American Water Work association & Water Environment Federation: United Book Press, Inc., Baltimore, Maryland, USA.

44-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

A. K. Rajak, S. K. Maity, Nagendra Prasad

Paper Title:

Improvement in Mechanical Properties of Ultra High Strength Steel through Induction Melting and Electroslag Refining

Abstract:       The objective of the present study is to develop the ultrahigh strength steel by induction melting and electroslag refining, which is followed by thermomechanical treatment with yield strength in excess of 1600 MPa and elongation of 9-10% . Ultrahigh strength steels are used in fabrication of rocket motor casings, aircraft undercarriages, turbine motors, pressure vessels and offshore platforms.  Some of the currently employed imported steels, like maraging steel is highly alloyed and is expensive . In the first part, the alloys were prepared by induction melting with addition of calculated amount of scrap and ferroalloys. The molten metal was tapped at 16000C and poured in preheated cast iron mould of 48x52x250 mm in dimension. The other alloy is prepared by addition of 0.024% Ti to the base composition. This alloy exhibits better mechanical properties than previous one. In the second part of investigation, Attempts were made to develop steel containing low sulphur and low phosphorous through electroslag refining (ESR) process followed by thermomechanical treatment (TMT). The other alloy was prepared by inoculation of about 0.058% titanium during ESR process. Alloys developed by ESR process resulted in sound ingot with low inclusions. The ESR ingots were further undergone for thermomechanical treatment (TMT) to convert it into plates. The process consist of  pre-rolling of the ESR ingot to a bar at 1200C, followed by hot rolling in two passes starting from 950C and finishing at 850C with equal deformation of 25% in each pass to convert the bar into plates and were immediately cooled in oil. The mechanical properties and some microstructural features were characterized with the specimens prepared from plates. The base alloy displayed UTS of 1792 MPa, yield strength of about 1580 MPa and elongation of 7.6%. Titanium inoculated alloy displayed UTS of 1885 MPa, yield strength of 1700 MPa and elongation of 8.3 %. It can be construed that the mechanical properties of the titanium inoculated alloy were substantially improved compared to base alloy.  Optical and SEM microstructures of the TMT specimen’s reveals predominantly lath martensites. However, the microstructure of titanium inoculated alloy consisted of small packets of finer lath martensite. Titanium addition reduces the grain size and refines the martensite laths that lead to improvement in mechanical properties.

Keywords:
Ultrahigh strength steel, Electroslag refining, Themomechanical treatment, Microstructure, Mechanical properties


References:

1.                T. V. Philip and T. J. McCaffy, Ultrahigh Strength Steel in Metals Handbook, 10th  Ed., ASM International, USA, 1990, pp. 431-435.
2.                Bee, J. V., Howell, P. R. and Honeycombe, R. W. K., Metal.Trans., Vol. 10, 1979, .1207.

3.                Mazanec, K., Neue Hütte, Vol. 31, 1986, p.21.

4.                Hyspecka, L. and Mazanec, K., Iron and Steel Institute, Vol. 1,1973, p.375.

5.                J. Pacyna, Steel   Research, 57 (1986) 586.

6.                K. Mazanec and E. Mazancova, Physical Metallurgy of Thermomechanical Treatment of Structural Steels, Mbridge International Science Publishing, London, 1997.

7.                C. Ouchi, Multipurpose Accelerated Cooling System, Kawasaki Steel Corporation, Report, 1985.

8.                W. E. Ducworth, G. Hoyle, “Electro-Slag Refining”, British Iron and Steel Research Association, London, 1969, pp.1-50.

52-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Yendrembam Arunkumar Singh, Taiborlang Lyngdoh Ryntathiang, Konjengbam Darunkumar Singh

Paper Title:

Economic Evaluation of Plastic Filled Concrete Block Pavement

Abstract:    This paper presents economic evaluation of Plastic Cell filled Concrete Block Pavement (PCCBP)  over conventional flexible and Concrete pavements for low volume rural roads. The cost comparison has been carried out considering both construction and maintenance cost for a period of 5 years, based on design analysis and performance studies of  100 mm thick PCCBP laid over 100 mm thick WBM sub-base course. It has been observed that the initial construction costs for both flexible and rigid pavement were higher than that of PCCBP by ~9% and~150% respectively and the total cost (including maintenance cost for 5 years) of flexible and rigid pavement are found to be higher by ~43% and~141% respectively as compared to that of PCCBP. Cent percent replacement of river sand in concrete by waste stone dust proved to be cost cutting without significant change in strength of the concrete.

Keywords:
  ABAQUS, BACKGA, Falling Weight Deflectometer (FWD), KENLAYER, Low volume roads, Plastic Cell Filled Concrete Block Pavement (PCCBP), Stone dust.


References:

1.             AASHTO, 1993. Guide for design of pavement structures, AASHTO, Washington, D.C., II-12.
2.             ABAQUS, 2009. Dassault Systems Similua Corp., Providence, RI, USA

3.             Huang, Y.H, 2010. Pavement Analysis and Design, Dorling Kindersley (India) Pvt. Ltd., licensees of Pearson Education of South Asia,Noida-201309 (U,P), New Delhi.

4.             IRC, 2001. Guidelines for the Design of Flexible Pavements. Indian Road Congress, New Delhi, IRC-37, New Delhi, India.

5.             IRC, 2002. Rural Roads Manual, Indian Road Congress Special Publication, IRC-SP: 20, New Delhi, India.

6.             IRC, 2004. Guidelines for the Design and Construction of Cement Concrete Pavements, Indian Road Congress Special Publication, IRC-SP: 62, New Delhi, India.

7.             IRC, 2007. Guidelines for the Design of Flexible Pavements for Low Volume Roads, Indian Road Congress Special Publication, IRC-SP: 72, New Delhi, India.

8.             IS 2720 (1975). Methods of Test for Soil, Determination dry density of soils in place by core cutter method, Part-XXIX, Bureau of Indian Standards, New Delhi.
9.             IS 2720 (1987). Methods of Test for Soil, Laboratory determination of CBR, Part-16, Bureau of Indian Standards, New Delhi.

10.          IS 383 (1970), Indian Standard Specification for coarse and Fine aggregates from Natural Sources for Concrete (Second Revision), Bureau of Indian Standards, New Delhi.

11.          MORTH (2001). Specifications for Roads and Bridge Works, Ministry of Shipping, Roads Transport and Highways (MORTH), Indian Road Congress, New Delhi.

12.          NHAI, 2011. Indian Road Network, National Highway Authority of India, Ministry of Road Transport and Highways, Government of India, http://www.nhai.org/roadnetwork.htm, accessed on 21st August.

13.          OEA, 2010. Office of the Economic Advisory, Government of India, http://eaindustry.nic.in, accessed on 5th December.

14.          Panda, B.C. and Ghosh, A.K. (2002a). Structural Behaviour of Concrete Block Pavements I: Sand in Bed and Joints, Journal of Transportation Engineering, 128 (2), pp. 123-129.

15.          Panda, B.C. and Ghosh, A.K. (2002b). Structural Behaviour of Concrete Block Pavements II: Sand in Bed and Joints, Journal of Transportation Engineering, 128 (2), pp. 130-135.

16.          PMGSY, 2010. Pradhan Mantri Gram Sadak Yojna (online), http://www.harrida.gov.in/Maintenance%20Analysis.pdf, (Accessed on 10th June, 2010).

17.          PWD, 2007. Schedule of Rates for Road, Bridge and Culvert Works for all Divisions under PWD (Public Works Department), Assam for the year 2007-2008, Government of Assam, India.

18.          Reddy, M.A., Ready, K.S. and Pandey, B.B. (2002). Evaluation of Pavement Layer Moduli Using Genetic Algorithms, International Journal on Pavement Engineering and Asphalt Technology, October, pp. 6-19.

19.          Roy, S., Reddy, K.S., Pandey, B.B. (2009). Flexible-Rigid Pavement Materials- A Sustainable Solution for Village Roads, Journal of the Indian Roads Congress, 70 (3), pp. 261-273.

20.          Roy, S., Reddy, K.S., Pandey, B.B. (2011). An investigation on cell-filled pavements, International Journal of Pavement Engineering, 12 (3), pp. 229-237.

21.          Ryntathiang, T.L. (2005). An Investigation on Precast and Cast In-situ Concrete Block Pavements for Low Volume Roads, PhD Thesis, Department of Civil Engineering, Indian Institute of Technology, Kharagpur-721302, India.

22.          Ryntathiang, T.L., Mazumdar, M. and Pandey, B.B., 2009. Structural Behaviour of Concrete Block Pavements, Journal of Transportation Engineering, 131(9), 662-668.

23.          Sahoo, U.C., Reddy, K.S. and Pandey, B.B., 2006. Structural Evaluation of Concrete Filled Cell Pavement, International Journal of Pavement Engineering and Asphalt Technology, U.K., 7 (1), pp. 27-37.

24.          SHELL, 1978. Shell Pavement Design Manual – Asphalts Pavement and Overlay for Road Traffic, SHELL, International Petroleum Company Ltd, London.

25.          Srinivas, T., Suresh, K. and Pandey, B.B. (2007). Wheel Load and Temperature Stresses in Concrete Pavement, Highway Research Bulletin, Indian Road Congress, New Delhi, 76, pp. 11-24.

26.          Visser, A.T. (1994). A Cast In-situ Block Pavement for Labour-Enhanced Construction, Concrete Beton, Concrete Society of South Africa, 71, pp. 1-8.

27.          Visser, A.T. (1999). The Response of Flexible Portland Cement Concrete Pavements Under Ultra Heavy Loading, Concrete Beton, Concrete Society of South Africa, pp. 11-18.

28.          Visser, A.T. and Hall, S. (1999). Flexible Portland Cement Concrete Pavement for Low-Volume Roads, Transportation Research Record, 1652, Washington D. C., pp. 121-127.

29.          Visser, A.T. and Hall, S. (2003). Innovative and Cost Effective Solutions for Roads in Rural Areas and Difficult Terrain, Transportation Research Record, Journal of Transportation Research Board, (1819 A), pp. 169-173.

30.          Yendrembam, A.S., Teiborlang, L.R., Konjengbam, D.S. (2012). Structural Assessment of Plastic Cell Filled Concrete Block Pavement (PCCBP) – an experimental study, International Journal of Pavement Engineering, 13 (3), PP. 267-279.

31.          Yendrembam, A.S., Teiborlang, L.R., Konjengbam, D.S. (2012). An Investigation of Plastic Cell filled Concrete Block Pavement (PCCBP) overlay, Journal of Road
Materials and Pavement Design, Taylor and Francis,13(2), 345- 359.

32.          Yendrembam, A.S., Teiborlang, L.R., Konjengbam, D.S. (2012). Distress Evaluation of Plastic Cell Filled Concrete Block Pavement, ,Int. J. Pavement Res. Technology, 5(4), 234-244.

33.          Yendrembam, A.S., Teiborlang, L.R., Konjengbam, D.S. (2015). Structural Analysis of Flexible Concrete Pavement – An Innovative Pavement Technique, International Journal of Engineering and Technical Research, 3(10) pp. 81-89.

57-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Ademola Abdulkareem, Awosope C. O. A., Samuel I., Agbetuyi A. F

Paper Title:

Contingency Analysis for Assessing Line Losses in Nigeria 330-kV Power lines

Abstract:     Line losses in transmission lines constitute one of the major problems affecting power generation and distribution systems. Losses have been found to affect the overall efficiency of a system. Therefore, to increase the efficiency of any system, losses must be minimized. This paper carried out a comprehensive study and analysis of line losses associated with Nigeria 330-kV power transmission lines. The work includes the power-flow analysis carried out on the existing network using both the Newton-Raphson (N-R)written in code-based MATLAB and the model-based N-R in Power World Simulator (PWS) environment. The power-flow analysis was further subjected to contingency analysis and simulation using the N-R in PWS. Two load-flows were performed to reveal voltage violated buses.The results showed that the bus voltages outside the statutory limit of 0.95 – 1.05p.u(i.e 313.5 – 346.5kV) occurred at buses2-Birnin-Kebbi (0.9183pu), bus 9  Akangba (0.937pu), bus 18-Onitsha (0.935pu),  bus 20-New-Haven (0.920pu), bus 25- Kaduna (0.9233pu), bus 26-Kano (0.776pu), bus 22-Jos (0.8192pu) and bus 28-Gombe (0.7247pu) under normal uncompensated condition. Capacitive shunt compensation was applied on these buses and the results recorded appreciable loss reduction (about 18.35%). The result of the single line contingency analysis for uncompensated and compensated indicates a total of 335 and 25 voltage bus violations respectively.

Keywords:
   Line losses, power line, power-flow analysis, voltage violations, compensation, contingency analysis .


References:

1.              R. Shankar and P. Kundur, “Power System Stability Control”, 1st. 2nd Edition New York, McGraw-Hill Books, pp581, 1994. 
2.              H. Sadaat, “Power System Analysis”. Milwaukee School of Engineering, Tata  McGraw-Hill Publishing Company Ltd. New Delhi, pp 189, 2002

3.              J. J. Grainger and W. D. Stevenson, “Power System Analysis”, New York, McGraw-Hill Inc. pp. 1994, 329-376

4.              Mehta and R. Mehta, “Principle of Power system”. New Delhi: S.Chand, 2010

5.              Isaac, S and A. Abdulkareem, “Investigating the Selection of a Suitable Slack bus: A Case Study of Multi-generating Stations of the Nigerian 330-kV Power Station”. International Journal of Electrical Electronic Engineering Studies, vol.2 No. 1 pp. 1-12.

6.              Power World Co-operation. ((2014 Version)). Power World Simulator, Version 18Glover/Sarma Build11/02/01, Licensed only for Evaluation and University Education use.

66-78

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Swetha Ajith Mathew, M. Nazeer

Paper Title:

Strength and Chemical Durability of PC-Slag-RHA Ternary Blended Concrete Mixes

Abstract:      Concrete is an important and commonly used man made construction material, which can be considered to have better strength and durability characteristics. Nowadays, ternary blended concrete is achieving popularity by overcoming the disadvantages of binary blended concrete. The present work deals with study of fresh properties, strength and durability of ternary blended concrete with Ground Granulated Blast Furnace Slag (GGBS) and Rice Husk Ash (RHA). Concrete mix is designed for strength of 40MPa. The study is limited to ternary blended concrete with 50% replacement of cement with GGBS and remaining 50% of cement is replaced with 5%, 10% and 15% RHA in different mixes. The chloride penetration resistance of the concrete is assessed by rapid chloride permeability test. The observations were critically analysed and the different attributes of the various mixes were correlated with the RHA content in the mix.

Keywords:
 Ground Granulated Blast Furnace Slag, Rice Husk Ash, ternary blended concrete, strength, durability


References:

1.        Cheng and R. Huang, “Influence of GGBS on durability and corrosion behaviour of reinforced concrete,” Materials Chemistry and Physics, 93, pp. 404-411, 2005
2.        Elahi,  P.A.M. Basheer, and S.V. Nanukuttan, “Mechanical and durability properties of high performance concrete containing supplementary cementitious materials”, Construction and Building Materials, 24, pp. 292-299, 2010.

3.        M.R. Karim, M.F.M. Zain, M.Jamil, F.C. Lai and M.N. Islam,  “Strength of Mortar and Concrete as Influenced by Rice Husk Ash: A Review”, World Applied Sciences
Journal, 10, pp. 1501-1503, 2012.

4.        K. Kartini, H.B. Mahmud and M.S. Hamidah, “Strength Properties Of Grade 30 Rice Husk Ash Concrete”, 31st Conference On Our World In Concrete & Structures, Singapore, 2006.

5.        S. Ogawa, T. Nozaki, K. Yamada, H. Hirao and R.D. Hooton, “Improvement on sulfate resistance of blended cement with high alumina slag”, Cement and Concrete Research, 42, pp. 244–251, 2011.

6.        Oner, and S. Akyuz, “An experimental study on optimum usage of GGBS on compressive strength of concrete”, Cement and Concrete Composites,  29, pp. 505-514, 2007.

7.        P.J. Ramadhansyah, M. Z. M. Salwa, A. W. Mahyun, B. H. Abu Bakar, M. A. Megat Johari and C. W. Che Norazman, “Properties of Concrete Containing Rice Husk Ash under Sodium Chloride Subjected to Wetting and Drying”, International Conference on Advances Science and Contemporary Engineering, 50, pp. 305-308. 2012.

8.        A.A. Ramezanianpour, S. Atarodi and M. sami, “Durability of concretes containing ground granulated blast furnace GGBS against sulfate attack”, Third International Conference on Sustainable Construction Materials and Technologies, Amirkabir University Of Technology, Tehran, Iran, 2012.

9.        H.S. Satish, S. V. Vairagadeb and K. S. Kavita, “Combine Effect of Rice Husk Ash and Fly Ash on Concrete by 30% Cement Replacement”, Chemical, Civil and Mechanical Engineering Track of 3rd Nirma University International Conference, 51, pp. 35-41, 2013.

10.     K.G. Sonali, R.S. Deotale and R.N. Abhijeet, “To Study the Partial Replacement of Cement by GGBS & RHA and Natural Sand by Quarry Sand In Concrete”, Journal of Mechanical and Civil Engineering, 11, pp. 69-77, 2014.

11.     R.D. Hooton, “The Reactivity and Hydration Products of Blast-Furnace Slag, Chapter in Supplementary Cementing Materials, editor, V.M Malhotra, CANMET 1987, pp. 247-288, 2000.

12.     Bouzoubaa, N. and B. Fournier (2001) Concrete Incorporating Rice-Husk Ash: Compressive Strength and Chloride-Ion Penetrability, International Centre for Sustainable Development of Cement and Concrete (ICON), CANMET, Natural Resources Canada, Ottawa, Canada

13.     ASTM C 618-03 Standard Specification for Coal Fly Ash and Raw or CalcinedNatural Pozzolan for Use in Concrete, ASTM International, WestConshohocken, PA, United States. 2003.

14.     Q. Yu, K. Sawayama, S. Sugita, M. Shoya and Y. Isojima, “Reaction between rice husk ash and Ca(OH)2 solution and the nature of its product”, Cement and Concrete Research, 29, pp. 37–43, 1999.

15.     IS 12269; 1987, Indian standard specification for 53 grade ordinary Portland cement, Bureau of Indian Standards, New Delhi.

16.     IS 1199:1959, Methods of sampling and analysis of concrete Bureau of Indian Standards, New Delhi.

17.     IS:516-1959, Indian standard methods of test for strength of concrete, Bureau of Indian Standards, New Delhi.

18.     ASTM C 1202-97, Standard Test Method for Electrical Indication of Concrete’s Ability to Resist Chloride Ion Penetration, ASTM International, West Conshohocken, PA, United States. 1997.

79-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Haider Sh Hashim

Paper Title:

Security Text Massage Verification via Steganography and Color Image in Internet of Things Environment

Abstract:   Internet of Things (IoT) technologies allow everyday objects including small devices in sensor networks to be capable of connecting to the Internet. Such an innovative technology can lead to positive changes in human life. However, if there is no proper security mechanism, private and sensitive data around humans can be revealed to the public Internet. In this aspect, this paper examines security issues of the IoT that major challenge is faced by IoT. In particular, we focus on the main challenge in exchanging information among devices in IoT’s environment. We have combined the concept of attribute based on steganography and crypto hash function to process data with efficient exchange information between two or more entities in the IoT’s environment. The proposed scheme has several important security features such as key agreement, resisting malicious attacks, and a good performance. The experimental results view the efficiency and sturdiness of our proposed scheme.

Keywords:
    (IoT), IoT’s, However, performance, experimental, security, resisting


References:

1.          D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac,” Internet of things: Vision, Applications and research challenges”, Ad Hoc Networks vol. 10, issue7, 2012, pp. 1497-1516.
2.          K. Ashton, That ‘Internet of Things’ Thing. RFID Journal, www.rfidjournal.com article print/4986 (2009).

3.          J. Buckley (Ed.),”The Internet of things: from RFID to the next-generation pervasive networked systems”, Publications, New York, 2006.

4.          L. Atzori, A. Iera, G. Morabito, The Internet of Things: a survey, Computer Networks Vol.54, PP. 2787–2805 ,2010.

5.          J. Qiu and P. Wang,”An Image Encryption and Authentication Scheme”, Proceedings of Seventh International Conf. on Computational Intelligence and Security (CIS), China, pp. 784-787, 2011.

6.          H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, Vision and challenges for realising the Internet of Things, Cluster of European Research Projects on the Internet of Things—CERP IoT, 2010.

7.          H. Gupta,  R. Kumar, S. Changlani, “Enhanced Data Hiding Capacity Using LSB- Based Image Steganography Method”, International Journal of Engineering Technology and Advanced Engineering, Vol 3, No.6, 2013.

8.          B.Veera, S.M.Verma, C.Uma, “Implementation and Analysis of Email Messages Encryption and Image Steganography Schemes for Image Authentication and
Verification “, International Journal of Computer Applications, vol.5, No.5 ,PP.0975 – 8887, 2010.

9.          J.Venkata , B.Venkateswara, “Authentication of Secret Information in Image Stenography”, IJCSNS International Journal of Computer Science and Network Security, vol.14, No.6, 2014.

10.       S.G. Gino, K. Padmaveni, L. Joseph, “Four key Secured Data Transfer Using Steganography and Cryptography”, International Journal of Engineering Research and Applications (IJERA), vol. 3, pp.1492-1496, 2013.

11.       K Babu, S. Kumar and A. Babu , “A Survey on Cryptography and Steganography Methods for Information Security ”, International Journal of Computer Applications”, pp. 13-17, vol. 12, no. 2, 2010.

12.       R.Amirtharajan, R. Akila, P.Deepikachowdavarapu.” A Comparative Analysis of Image Steganography”, International Journal of Computer Application, Vol.2, No.3, pp. (0975-8887),2010.

13.       Cheddad, J. Condell, K. Curran, P.M. Kevitt, “Digital image steganography: survey and analysis of current methods”, Signal Processing Vol.90, PP.727–75 ,2010.

14.       J. K. Mandal, D. Das,”Image steganographic scheme based on pixel-value differencing and LSB replacement methods”. IEEE Proceedings-Vision, Image and Signal Processing, vol. 152, no. 5, PP. 611-615, 2005.

15.       Ali A. Yassin, Hikmat Z. Neima, and Haider Sh. Hashim. Security and Integrity of Data in Cloud Computing Based on Feature Extraction of Handwriting Signature, International Journal of Cyber-Security and Digital Forensics (IJCSDF),  Vol.3, No.2, pp. 93-105, 2014.

16.       S. Mortha, R. Kassey,” A High-Capacity Digital Image Data Hiding Scheme Using Adaptive LSB Substitution “, International Journal of Advanced Research in Computer Science and Software Engineering  Vol. 2, No. 10, 2012

17.       Ali A. Yassin, M. Hasson, H. Ridha, “A New Message Authentication Code Scheme Based  on Feature Extraction of Fingerprint in Cloud Computing “, International Journal of Engineering Research & Technology (IJERT),  Vol. 3 Issue 11,  2014.

18.       K.-C. Chang, C.-P. Chang, P.-S. Huang, and T.-M. Tu, “A novel image steganography method, IJCSNS International Journal of Computer Science and Network Security, Vol.14 No.6, 2014.

19.       M. Juneja, P. S. Sandhu,―Improved LSB based Steganography Techniques for Color Images in Spatial Domain, International Journal of Network Security, vol. 16, No.4, pp. 366-367, 2014.

83-89

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Debabrata Bhattacharya, Harinandan Tunga

Paper Title:

Encryption and Decryption Process of a Secret Natural Colour Image Based on K out of N VSS Scheme

Abstract:    The Visual Secret Sharing (VSS) scheme is a cryptographic tool used to encode a secret image into several shares, each of which separately does not reveal any information of the secret image. Visual Cryptography (VC) schemes hide the secret image into two or more images which are called ‘shares’. The secret image can be recovered simply by stacking the shares together without any complex computation involved. The shares are very safe because separately they reveal nothing about the secret image. In this paper, a generalized version of Visual Cryptography is mentioned. Here an image (secret image) can be hidden in ‘n’ numbers of cover images. This generalized version helps the user to attain the desired level of encryption. Also after successful transmission the secret image can be re-discovered using a simple decryption algorithm. The aim of our paper is that a sender sends ‘n’ number of colored images with a hidden secret image in it by encryption and the receiver recovers the secret image from it by decryption. The proposed approach uses meaningful shares (cover images) to hide the colored secret image and the recovery process is lossless. In this paper, we propose a proportionate algorithm which successfully encrypts a secret image into any number of cover images as chosen by the user. Here the amount of original image share depends upon the pixel values of the cover images. Also a critical value on the number of images is determined which helps in optimizing our aim with the complexity.

Keywords:
Visual Cryptography (VC), Secret Image, Hidden Secret Image, Proportionate Algorithm, Human Vision System (HVS)


References:

1.       Adi Shamir, “How to Share a Secret”, published in ACM, Laboratory for Computer Science, Massachusetts Institute of Technology, 1979
2.       Naor, M. and Shamir, A., “Visual cryptography”, In Proc. Eurocrypt 94, Perugia, Italy, May 9–12, LNCS 950, pp. 1–12. Springer Verlag., 1994. http://www.wisdom.weizmann.ac.il/~naor/onpub.html.

3.       Moni Naor, Adi Shamir, “Visual Cryptography” ,Lecture Notes in Computer Science, 1995, http://citeseer.ist.psu.edu/naor95visual.html.

4.       Mizuho NAKAJIMA, Yasushi YAMAGUCHI, “Extended Visual Cryptography for Natural Images”, Department of Graphics and Computer Sciences, Graduate School of Arts and Sciences, The University of Tokyo, 2002, http://wscg.zcu.cz/wscg2002/Papers_2002/A73.pdf

5.       Harinandan Tunga,” A New Secret Coloured Image Encryption and Decryption Scheme Based on Extended Visual Technology.

6.       Verheul, E.R., van Tilborg, H.C.A., 1997 ”Construction and Properties of k out of n visual secret sharing schemes” Designs Codes Cryptography. (11), 179–196.

7.       C. Chang, C. Tsai, and T. Chen.“A New Scheme For Sharing Secret Color Images In Computer Network”, Proceedings of International Conference on Parallel and Distributed Systems, pp. 21–27,July 2000.

8.       Chin-Chen Chang, Tai-Xing Yu, “Sharing A Secret Gray Image In Multiple Images”, Proceedings of the First International Symposium on Cyber Worlds (CW.02), 2002.

90-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Sree Vrinda G. M, Prasanth R. S

Paper Title:

A Survey on Person Reidentification

Abstract:     In recent years, person reidentification receives an intensive attention in the field of intelligent video surveillance (IVR). Recognizing an instance of a person captured by one camera to another instance of the person captured by different camera is mainly called as Person Reidentification. It’s an important task for surveillance applications, either for on-line tracking of a person or off-line retrieval of all videos containing a person of interest. Person reidentification is considered as a challenging problem because the appearance of individuals varies greatly through the scenes, due to different acquisition devices, changes in viewpoints, illumination conditions, shadows, different pose or orientation of person that has to be searched for.  This paper focuses on the survey of different techniques that are used for person reidentification and to tackle all the issues and challenging aspects of person reidentification while simultaneously describing previously proposed solutions for the problems.

Keywords:
  IVR, Person Reidentification


References:

1.     Annan Li, Luoqi Liu, Kang Wang, Si Liu and Shuicheng Yan, “Clothing    Attributes Assisted Person Re-identification,” IEEE Transactions on ircuits and Systems for Video Technology, Vol:25, Issue:5, May 2015.
2.     Yanbing Geng, Hai-Miao Hu, Jin Zheng and Bo Li. “A person re-identification algorithm by using region-based feature selection and feature fusion,” IEEE International Conference on Image Processing (ICIP), 2013.

3.     L. Ma, X. Yang, and D. Tao, “Person re-identification over camera networks using multi-task distance metric learning,” IEEE Trans. Image Process, vol. 23, no. 8, pp. 3656-3670, Aug. 2014.

4.     R. Zhao, W. Ouyang, and X. Wang, “Unsupervised salience learning for person re-identification,” in IEEE Conf. Computer Vision and Pattern Recognition, CVPR, 2013, pp. 4321-4328.

5.     Andy J. Ma, Jiawei Li, Pong C. Yuen and Ping Li, “Cross Domain Person Reidentification Using Domain Adaptation Ranking SVMs,” IEEE Transactions on Image Processing, vol. 24, no. 5, May 2015.

6.     LI, W., WU, Y., MUKUNOKI, M., AND MINOH, M. 2012. Common-near-neighbor analysis for person reidentification. In Internationl Conference on Image Processing, 1621-1624.

7.     D. Tao, L. Jin, Y. Wang, and X. Li, “Person reidentification by minimum classification error-based KISS metric learning,” IEEE Trans. Cybern., 2014, 10.1109/TCYB.2014.2323992.

98-100

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Ahmed Abdulrasool, Hasan Abdulsahib Mezaal

Paper Title:

Investigating the Influence of Hardness and Shape Recovery with Sintering Time of Cu-Al-Ni Smart Alloy

Abstract:      In this study a Cu-Al-Ni alloy was manufactured by powder metallurgy (PM) method by mixing powder of 83%Cu-13%Al-4%Ni for 6 hrs. after that compacted at 650 mpa and sintered at 850 C for ( 3,4,5,6,7) hrs. and heat treated  to investigate the influence of( hardness and shape recovery ) with multiple sintering time.  To make sure that manufactured alloy are smart alloy XRD and SEM tests were done for 3 and 7 hrs . The result showed that Martensite layer was formed on surface. The result of hardness and recovery tests showed fluctuation of hardness and shape recovery with sintering time. The effect of sintering time on hardness is apposite on shape recovery. In this research artificial neural network was used to predict the behavior of alloy at sintering time between 3 and 7 hrs.

Keywords:
   powder metallurgy, hardness, shape recovery ,neural network


References:

1.             Rupa Dasgupta, “Effect of alloying constituents on the martensitic phase formation in some Cu-based SMAs” journal of material research  and technology, vol3 264-273 2014
2.             CimpriˇcDarjan “shape memory alloy” UNIVERZA V LJUBLJANIFAKULTETA ZA MATEMATIKO IN FIZIKO ODDELEK ZA FIZIKO, 13 January  2007.

3.             M. Benke, “High-Temperature Transformation Processes in Cu-13.4Al-5Ni Shape Memory Alloy Single Crystals” ASM International, DOI: 10.1007/s11665-009-9397-7 2009

4.             Kathryn J. De Laurentis1 and Constantinos Mavroidis2, “Mechanical Design of a Shape Memory Alloy Actuated Prosthetic Hand” Robotics and Mechatronics Laborato Department of Mechanical and Aerospace Engineering Rutgers University, The State University of New Jersey 98 Brett Rd, Piscataway, available on
Webpage: http://cronos.rutgers.edu/~mavro/robot

5.             Ming H. “INDUSTRIAL APPLICATIONS FOR SHAPE MEMORY ALLOYS” Proceedings of the International Conference on Shape Memory and Superelastic Technolgies, Pacific Grove, California, P.171-182 (2000).

6.             E.PAUL DeGARMO” materials and processes in manufacturing, six edition” , macmillan publishing company 1984

7.             M. Reihanian” Application of neural network and genetic algorithm to powder metallurgy of pure iron” material and design journal, vol 32 3183–3188 2011

101-107

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Bahaa Hussein Taher

Paper Title:

Driver Fatigue and Distraction Detection System

Abstract: Driver monitoring system is a real-time system that can detect driver fatigue and distraction using image processing tools. In this paper, an algorithm is introduced for driver fatigue and distraction detection based on the relation between face and eye regions. We used the position of the face as indicator for distraction through tracking the face of the driver in the image taken by camera placed on the front upper mirror while for fatigue the eyes state was used to index sleeping situation ,the eyes state detected by the size and matching templates for opened and closed eyes .The algorithm tested laboratory and using of recorded videos and approved to be efficient in application for estimating the driver fatigue and distraction

Keywords:
    Driver monitoring system, driver fatigue, distraction detection


References:

1.              Muhammad Fahad Khan and Farhan Aadil, Efficient Car Alarming System for Fatigue Detection during Driving, International Journal of Innovation, Management and Technology, Vol. 3, No. 4, August 2012,pages 480-486.
2.              Mohamad-Hoseyn Sigari et.al. ,A Driver Face Monitoring System for Fatigue and Distraction Detection, International Journal of Vehicular Technology ,Volume 2013, Article ID 263983, 11 pages

3.              Mandalapu Saradadevi and Dr. Preeti Bajaj,Driver Fatigue Detection Using Mouth and Yawning Analysis, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.6, June 2008,pages 183-188.

4.              Harini Veeraraghavan and Nikolaos P. Papanikolopoulos,Detecting Driver Fatigue Through the Use of Advanced Face Monitoring Techniques, ITS Institute Center for Transportation Studies 200 Transportation and Safety Building 511 Washington Ave. SE University of Minnesota September 2001.

5.              Jennifer F. May *, Carryl L. Baldwin ,Driver fatigue: The importance of identifying causal factors of fatigue when considering detection and countermeasure technologies, Transportation Research Part F 12 (2009) 218–224.

6.              Lawrence Barr ,et.al.,A REVIEW AND EVALUATION OF EMERGING DRIVER FATIGUE DETECTION MEASURES AND TECHNOLOGIES.

7.              Luke Fletcher,et.al.,Road Scene Monotony Detection in a Fatigue Management Driver Assistance System.

8.              Swapnil V. Deshmukh,et.al.,Driver fatigue Detection Using Sensor Network,  International Journal of Engineering Science and Technology (IJEST), 2011,pages 89-92.

9.              Mahesh M. Bundele and Rahul Banerjee,Detection of Fatigue of Vehicular Driver using Skin Conductance and Oximetry Pulse: A Neural Network Approach, iiWAS2009, December 14–16, 2009, Kuala Lumpur, Malaysia. ACM 978-1-60558-660-1/09/0012

10.           MAHESH IYER ,et.al., DRIVER FATIGUE ACCIDENT PREVENTION USING EYEBLINK SENSOR ,SRM university,2010.

11.           Jung-Ming Wang ,et.al., DETECTING DRIVER’S EYES DURING DRIVING, 18th IPPR Conference on Computer Vision, Graphics and Image Processing (CVGIP 2005) 2005,pages 941-947.

12.           Abdulredha M.S.,Face detection and Tracking in video stream ,A MSC thesis ,Basrah university ,Iraq,2012.

13.           Wen-Bing Horng and Chih-Yuan Chen,Areal-time driver fatigue detection system based on eye tracking and dynamic template matching, Tamkang Journal of Science and Engineering, Vol. 11, No. 1, pp. 65_72 (2008).

14.           R.L. Hsu; A. M. Mottaleb and A. K. Jain, “Face Detection in Color Images, ” IEEE Trans. On Pattern Analysis and Machine Intelligence, vol.24, no.5, pp. 696–706, May 2002.

15.           D. Chai, K. N. Ngan, “Face Segmentation Using Skin-Color Map in Videophone Applications,”IEEE Trans on Circuits and Systems for Video Technology, vo.9, no.4,pp.551-564, June 1999.

16.           Yang M.,et.al.,Detaecting Faces in images :A survey,IEEE Trans on pattern Analysis and Machine Intelligence(PAMI), Vol.24 ,no.1,pp 34-58,2002.

17.           Monhi,M., Torkamani-Azar ,F. , face detection using learning Networks,M.Sc Thesis, The Graduate school of Natural and Applied Science ,The middle east technical university ,2002.

18.           S. B. Klein and B. M. Thorne, Biological Psychology, Worth Pub, 2007.

19.           Anon, “Perclos and eye tracking: Challenge and opportunity,” Applied  Science Laboratories, Bedford, MA. Tech.Rep., 1999.

20.           Cho, K. J., Roy, B., Mascaro, S. and Asada, H. H., “A Vast DOF Robotic Car Seat Using SMA Actuators with a Matrix Drive System,” Proc. IEEE Robotics and Automation, New Orleans, LA, U.S.A., Vol. 4, pp. 3647_3652 (2004).

108-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Kamalkishor G. Maniyar, Roshan V. Marode, S. B. Chikalthankar

Paper Title:

Optimization of EDM Process Parameters on MRR & TWR of Tungsten Carbide by Taguchi Method

Abstract:  Electrical discharge machining (EDM) is a process for shaping hard metals and forming deep complex shaped holes by arc erosion in all kinds of electro-conductive materials. The objective of this research is to study the influence of operating parameters current, voltage and pulse on time on material removal rate (MRR) and tool wear rate (TWR) in EDM of Tungsten carbide. The effectiveness of EDM process with tungsten carbide is evaluated in terms of the material removal rate and tool wear rate produced. It is observed that copper is most suitable for use as the tool electrode in EDM of Tungsten carbide. In this research, trials are conducted on Tungsten carbide to observe the influence of the parameters such current, voltage and pulse on time on output characteristic MRR and TWR. The experiments are conducted by using Taguchi, DOE technique and analysis is confirmed by ANOVA and regression method. This study presented the optimal machining condition which can be used for maximize MRR and minimize TWR. The tests are confirmed by confirmation test and results are validated mathematical analysis.

Keywords:     ANOVA analysis, EDM Parameters, Material Removal Rate, Tool Wear Rate, Taguchi Method

References:

1.             R. Karthikeyan, P.R. Lakshmi Narayanan, and R.S. Naagarazan, “Mathematical modeling for electric discharge machining of aluminium-silicon carbide particulate composites”, Journal of Materials Processing Technology, vol. 87 (1-3), 1999, pp. 59-63.
2.             H. Yan, C.C. Wang, H.M. Chow, and Y.C.Lin, “Feasibility study of rotary electrical discharge machining with ball burnishing for Al2O3/6061Al composite”, International Journal of Machine Tools and Manufacture, vol. 40(10), 2000, pp. 1403-1421.

3.             S.H. Lee, and X.P. Li, “Study of the effect of machining parameters on the machining characteristics in electrical discharge machining of tungsten carbide”, Journal of Materials Processing Technology, vol. 115(3), 2001, pp. 344-358.

4.             B. Mohan, A. Rajadurai, and K.G. Satyanarayana, “Effect of sic and rotation of electrode on electric discharge machining of Al-sic composite”, Journal of Materials Processing Technology, vol. 124(3), 2002, pp. 297-304.

5.             H. C. Tsai, B. H. Yan, and F.Y. Huang, “EDM performance of Cr/Cu-based composite electrodes”, International Journal of Machine Tools and Manufacture, vol. 43(3), 2003, pp. 245-252.

6.             P.N. Singh, K. Raghukandan, M. Rathinasabapathi, And B.C. Pai, “Electric discharge machining of Al-10%sicp as-cast metal matrix composites”, Journal of Materials Processing Technology, vol. 155-156(1-3), 2004,

7.             Y. Lin, C. Cheng, and L. Hwang, “Machining characteristics and optimization of machining parameters of SKH 57 high-speed steel using electrical-discharge machining based on Taguchi method”, Materials and Manufacturing Processes, vol. 21(8), 2006, pp. 922- 929.

8.             S. Dhar, R. Purohit, N. Saini and G.H. Kumar, “Mathematical modeling of electric discharge machining of cast Al-4Cu-6Si alloy-10 wt.% sicp composites”, Journal of Materials Processing Technology, vol. 193(1-3), 2007, pp. 24-29.

9.             Yan-Cherng Lin, Yuan-feng chen, Ching-tien Lin, and Hsinn-jyh Tzeng, “Feasibility study of rotary electrical discharge machining with ball burnishing for Al2O3/6061Al composite”, vol.23, 2008, pp. 391–399.

10.          T.A. El-Taweel, “Multi-response optimization of EDM with Al-Cu-Si-tic P/M composite electrode”, International Journal of Advanced Manufacturing Technology, vol. 44(1-2), 2009, pp. 100-113.

11.          S. H. Tomadi, M. A. Hassan, Z. Hamedon, Member, IAENG R.Daud, A. G. Khalid, “Analysis of the Influence of EDM Parameters on Surface Quality, Material Removal Rate and Electrode Wear of Tungsten Carbide”, Proceeding of the International Multi Conference of Engineers and Computer Scientists, vol. II, 2009, pp 01-06.

12.          Pandey, P.C., and Shah, H.S. (1980),“Modern Machining Processes”,New Delhi. Tata Mcgraw-Hill.

13.          Puertas, I., Luis, C.J . and Alvarez , L. (2004),“Analysis of the Influence of EDM Parameters on Surface Quality , MRR and EW of WC-Co”, Journal of Material Processing Technology.

112-116

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Mohamed Hanaoui, Rachid Aouami, Mounir Rifi

Paper Title:

Smart Antenna System for Wireless Sensor Networks to Improve Energy Efficiency

Abstract:   This paper presents the design and implementation of smart antenna system in wireless sensor network severely to minimize the energy consumption due a interference constraints. The integration of in wireless sensor networks is a challenging and very attractive technical solution to improve the system capacity, the quality of service, and the power control. Smart antenna system has the advantage over traditional omnidirectional antennas system), of being able to orientate signals into the desired direction in either transmission node or reception node. In this paper, we create a view of ground with nodes by using MATLAB, then we compare active communication using SAS and active communication using OAS using the static topology. The designed system provides a flexible and low cost solution for us to make in the smart-home and office smarter. The energy efficiency to bring by smart antenna system is described.

Keywords:
 smart antenna, omnidirectional antenna, wireless sensor network, nodes, energy efficiency.


References:

1.           Frank B. Gross. “Smart Antenna for Wireless Communication with Matlab”. McGraw-Hill Companies, Inc. United States of America 2005.
2.           C.A. Ballanis. “Antenna theory analysis and design”.  3rd edition, John willey and Son’s Inc, New York 2005.

3.           Luca Catarinucci, Sergio Guglielmi, Riccardo Colella, Luciano Tarricone . “Switched-Beam antenna for WSN nodes enabling Hardware-driven power saving”. Proceedingsof the 2014 federated conference on computer science and information systems pp. 1079-1086 . DOI: 10.15439/2014F82 ACSIS, Vol. 2

4.           Luca Catarinucci, Sergio Guglielmi, Luigi Patrono, Luciano Tarricone . “Switched-Beam antenna for Wireless Sensor Networks  nodes”. Progress in electromagnetics research C, Vol. 39, 193-207,2013

5.           G. Giorgetti, A. Cidronali, S.K.S. Gupta, G. Manes, “Exploiting LowCost Directional Antennas in 2.4 GHz IEEE 802.15.4 Wireless Sensor Networks”, in Proc. 10th European Conference on Wireless Technology, Oct. 2007, pp. 217-220.

6.           D.-C. Chang, B.-H. Zeng, J.-C. Liu, “Reconfigurable angular diversity antenna with quad corner reflector arrays for 2.4 GHz applications,” IET Microw., Antennas Propag. , vol. 3, no 3, pp. 522–528, Apr. http://dx.doi.org/2009, 10.1049/iet-map.2008.0119

7.           L. Ming-Iu, W. Tzung-Yu, H. Jung-Chin, W. Chun-Hsiung, J. ShyhKang, “Compact Switched-Beam Antenna Employing a Four-Element Slot Antenna Array for Digital Home Applications, ” IEEE Trans. Antennas Propag. , vol. 56 , no.9, pp 2929-2936, Sept. 2008.

8.           Tian-Hong Loh, Ke Liu, Fei Qin, Haitao Liu . “Assessment of the adaptive routing performance of a wireless sensor network using smart antennas”. IET wireless sensor systems, 5th November 2014, DOI: 10.1049/iet-wss.2014.0066.

9.           A. Ansari, “Performance Comparison for Omnidirectional and Directional MAC Protocols for Ad hoc Network,” Int. J. Comput. Appl., vol. 70, no. 21, pp. 26–31, 2013.

10.        R.Aouami.E.Said. M.Rifi and M.Ouzzif ‘Fountain code enabled of IEEE 802.11DCF for optimazation throughput in Wireless Sensors The 10th International Conference for Internet Technology and Secured Transactions (ICITST-2015)’, London, UK .14-16 December 2015.

11.        M. N. Alam, M. A. Hussain, and K. S. Kwak, “Neighbor initiated approach for avoiding deaf and hidden node problems in directional MAC protocol for ad-hoc networks,” Wirel. Networks, vol. 19, pp. 933–943, 2013.

12.        M. Hanaoui, M. Rifi, H. Bouassam, H. Terchoune, “Improvement of energy efficiency of GSM BTS by using smart antenna system” Revue Méditerranéenne des Télécommunications, Vol. 5, N° 2, June 2015. ISSN 2458-6765

117-121

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Devarshi Chaurasia, Yogesh Garg

Paper Title:

Assessment of Building Architecture Design Parameters by Applying Fuzzy Logic Concepts

Abstract:    The field of Building Architecture and Design is considered as multidisciplinary science with a very important dimension as ‘Art’. Architecture and design requires more artistic aptitude then engineering. As far as engineering and science are concerned, phenomenological paradigms are sufficient. However, need to explore new approaches as far as Art and Architecture are concerned. In architecture we make perceptions on the bases of knowledge and experience. Recently, Fuzzy Logic has been among new scientific paradigms to assess the architecture and Design quality, which actually differ or vary person to person. The research focuses on scope of application of fuzzy logic concepts and theory on architecture and design quality assessment. Architectural design quality assessment may consider as science with full of soft and flexible variables. In such situations, assessment on the subject in fuzzy logic terms plays the essential role.

Keywords:
 smart antenna, omnidirectional antenna, wireless sensor network, nodes, energy efficiency.


References:

1.             Zubkov, A. Quality Control of Building Projekt. Akadeemia tee. 5A(019).
2.             Zadeh, L. A., Fuzzy Sets, Information and Control. Vol. 8, pp. 335-353, 1965.

3.             Woodcock, C.E. and S. Gopal, Fuzzy set theory and thematic maps: accuracy assessment and area estimation. International Journal of Geographical Information Science, 2000. 14(2): p.153-172.

4.             LA, Z., The Concept of a linguistic variable and its application to approximate reasoning. Journal of Infornation Science, 1975. 8(1): p. 199-249.

5.             Jang J.S., Sun C.T. and Mizutani E., Fuzzy-Neuro and Soft Computing, Prentice-Hall International, Inc., Upper saddle River, NJ 07458.

6.             Clitcioglu ö., Durmisevic S., Fuzzy Logic in Architecture Design. TU Delft, Faculty of Architecture, Building Technology, Berlageweg 1, 2628 CR Delft, Netherlands.

7.             www.eusflat.org/proceedings/EUSFLAT_2001/…/265_Ciftcioglu.pdf

8.             Bansal. Sunita, Biswas. Srijit, Singh S.K., Selection of most economical Green Building out of n-Alternatives: Approach of Vague Fuzzy Logic, International Journal of Engineering and Technology, Vol.-4 No.-2 pp 164-168, Feb.2015

9.             http://esatjournals.org/Volumes/IJRET/2015V04/I02/IJRET20150402020.pdf.

10.          Jang J-SW.R., at al., Neuro-fuzzy and Soft Computing: A Computational Approach to Learning Maching Intelligence. Prentice Hall, 1996.

11.          Fuzzy Control Programming. Technical Report, International Electronical Commision, 1997.

12.          http://cs.bilkent.edu.tr/~zeynep/files/short_fuzzy_logic_tutorial.pdf

13.          J. Mendel., Fuzzy Logic system for engineering: A Tutorial. Proceeding of the IEEE, 83(3): 345-377, March 1995. http://cs.bilkent.edu.tr/~zeynep/files/short_fuzzy_logic_tutorial.pdf

14.          Bansal. Sunita, Biswas. Srijit, Singh S.K., Approach of Fuzzy Logic for Evaluation of Green Building Rating System, International Journal of Innovative Research in Advance Engineering, Issue-3, Vol.-2 March 2015 http://www.ijirae.com/volumes/Vol2/iss3/08.  MRCE10080.pdf

122-127

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Sabah Khan

Paper Title:

Analysis of Wear Rate and Tribological Behavior of Aluminum Cast Alloy A356 and Granite Composite at Different Speeds

Abstract:     Most of the machine elements have surface contacts with friction between them. The presence friction tends to wear off the surface leading to failure of the machinery. In today’s world almost all material scientists are striving to develop materials with low wear rate to improve the life expectancy and performance efficiency of the components. In this paper, I have carried out a comparative analysis of the effect of presence of reinforcing granite particles on A356/LM25 cast alloy of aluminum. The wear rates of both the alloy and composite are analyzed at different speeds and pressures. The results are used to analyze the tribological behavior, of the alloy and the composite.

Keywords: Granite, LM 25, Tribology, Wear rate .

References:

1.             N.Axen, I.M. Hutchings and S. Jacobson, “A Model for the friction of multiphase materials in abrasion”,Tribology International Vol.29, No.6. pp467-475,1996.
2.             Krutz, Schueller, Claar, “Machine Design for Mobile and Industrial applications”,SAE International, 1999, pp25,26.

3.             Brady, GS., H.R. Clauser and JA Vaccari “ Materials Handbook” 14th ed., McGraw-Hill, NY, 1996.

4.             Krishan K. Chawla  “Composite materials : science and engineering”. New York : Springer-Verlag, c1987.WALTER TA418.9 .C6 C43 1987
5. Mel Schwartz,”Composite materials”, Upper Saddle River, N.J. : Prentice Hall PTR, c1997.WALTER TA418.9 .C6 S37 1997
6.             R.K Dogra , A.K Sharma “ Advances in Material Science”, S. K. Kataria and Sons.pp 389-394.
7.             Engineered materials handbook, v. 1. Composites / Handbook Committee Metals Park, Ohio : ASM International, c1987 WALTER Quarto TA403 .E497 1987
8.             Bharat Bhushan, “Principles and Applications of Tribology”,  John-Wiley & Sons, 1999.

9.             Elwin L. Rooy, “Aluminium and Aluminium alloys”, Aluminium Company of America, 2002.

10.          S. Nafisi, D. Emadi, M.T. Shehata and R. Ghomashchi, Effects of electromagnetic stirring and superheat on the microstructural characteristics of Al-Si-Fe alloy, Materials Science and Engineering A, 432, 71-83, 2006.

11.          Stowe R L, “Strength and deformation properties of granite, basalt, limestone and tuff at various loading rates”, sponsored by Defence Atomic Support Agency, 1969.

12.          Sabah Khan, “Effect of Sliding Surface Temperature on the Sliding Wear Behavior of Natural Mineral Reinforced Aluminium Alloy Composite”, InternationalJournal of Scientific Research, Vol 4, Issue 3, March, 2015.

13.          Radhika, R. Subramanian , S. Venkat Prasat, “Tribological Behaviour of Aluminium/Alumina/Graphite Hybrid Metal Matrix Composite Using Taguchi’s Techniques”, JMMCE, Vol. 10, No.5, pp.427-443, 2011.

14.          Sabah Khan, “Analysis of Tribological Applications of Functionally Graded Materials in Mobility Engineering”, International Journal of Scientific and Engineering Research, March 2015, pp 1150- 1160.

15.          Zeeshan Ahmad, Sabah Khan, ”Evaluation of Effective Thermal Properties of Aluminum Metal Matrix Composites Reinforced by Ceramic Particles”, IJCET, Volume 5, No4. July- August, 2015. Pp2884-2897.

128-131

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Swapna P. S, Susan R. J, Sakuntala S. Pillai

Paper Title:

Analysis of Spectral Efficiency in OFDMA Fem to Cell Networks

Abstract:      Orthogonal Frequency Division Multiple Access (OFDMA) is a promising multiple access technique for next generation wireless communication such as WiMAX, LTE, IMT-A etc because of its high spectral efficiency and inherent robustness against frequency selective fading. Recently fem to cell has been proposed for indoor coverage extension and to reduce traffic within macrocells. Fem to cells are deployed in an ad-hoc manner by different consumers in the same frequency band, causing interference with each other. To fully realize the potential of these networks, it is necessary to allocate resources to them in such a way that interference is mitigated. This work aims to improve the performance of uplink OFDMA fem to cell networks by joint subchannel and power allocation. Joint subchannel and power allocation using Hungarian and water filling algorithm performs better than the existing fem to cell resource allocation algorithms with respect to spectral efficiency.

Keywords:
  Orthogonal Frequency Division Multiple Access (OFDMA); femtocell; resource allocation; subchannel allocation; power allocation.


References:

1.          Lee, Hyuntai Kim, Jinhyun Park, and Jitae Shin, “ An Efficient Resource Allocation in OFDMA Fem to cell Networks”, IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010.
2.          G. Li and H. Liu, “Downlink radio resource allocation for multi-cell OFDMA system,” IEEE Trans. Wireless Commun., vol. 5, no. 12, pp. 3451–3459, Dec. 2006.

3.          L. Garcia, K. Pedersen, and P. Mogensen, “Autonomous component carrier selection: Interference management in local area environments for lte-advanced,” IEEE Communications Magazine., 2009.

4.          R. Madan, J. Borran, A. Sampath, N. Bhushan, A. Khandekar, and T. Ji, “Cell association and interference coordination in heterogeneous LTE-A cellular networks,” IEEE Journal on Selected Areas in Communications., 2010.

5.          R. Chang, Z. Tao, and C.-C. Zhang, J.and Kuo, “A graph approach to dynamic fractional frequency reuse (ffr) in multi-cell ofdma networks,” in IEEE ICC, 2009.

6.          David Lopez, Akos Ladanyi, Alpar Juttner and Jie Zhang, “OFDMA femtocells: A Self Organizing approach for frequency assignment”  IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009.

7.          K. Sundaresan, S. Rangarajan, “ Efficient Resource Management in OFDMA Femto Cells,” Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, May. 2009.

8.          Hojoong Kwon and Byeong Gi Lee,” Distributed Resource Allocation through Noncooperative Game Approach in Multi-cell OFDMA Systems,” IEEE conference publications,2006.

9.          L. Giupponi and C. Ibars, “Distributed interference control in OFDMAbased femtocells,” in Proc. 2010 IEEE Int. Symp. on Personal, Indoor and Mobile Radio Commun., pp. 1201–1206.

10.       Stephen Schedler and volker Kuhn, “Resource allocation for the multiple access relay channels and OFDMA,” EURASIP Journal on Advances in Signal Processing 2013.

11.       Qilin Qi, Andrew Minturn, and Yaoqing (Lamar) Yang, “An Efficient Water-Filling Algorithm for Power Allocation in OFDM-Based Cognitive Radio Systems”, 2012 International Conference on Systems and Informatics (ICSAI 2012).

12.       R. Jain, A. Durresi, and G. Babic, “Throughput fairness index: Anexplanation,” ATM Forum Document Number: ATM Forum/990045, Feb. 1999.

13.       Vu Nguyen Ha and Long Bao Le, “Fair resource Allocation for OFDMA Fem to cell Networks with Macro cellProtection”, IEEE Transactions On Vehicular Technology, Vol. 63, No. 3, March 2014.

14.       Prabhu Chandhar, Suvra Sekhar Das,” Analysis of Area Spectral Efficiency for Co-Channel Deployed Macrocell-Fem to cell OFDMA Networks“, wireless communications symposium IEEE ICC, 2013.

132-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Faisal Ahmad

Paper Title:

Comparative Analysis of Sediment Removal Efficiency Parameters of Settling Basin

Abstract:       The mechanism of flow in settling basin is so complicated that it is very difficult to establish a general regression model to accurately estimate the sediment removal efficiency. No general relationship is available which can be used for estimation of sediment removal efficiency of settling basin under flushing condition as well as without flushing condition. Even in the absence of flushing, considerable differences exist in efficiencies given by different methods. The present study aims to re-analyze the databases to develop a general regression model for the determination of sediment removal efficiency of settling basin. The equation for sediment removal efficiency of settling basin given by Ranga Raju et al. (1999) has been checked and it was observed that the Ranga Raju et al. (1999) predictor does not give the reasonable estimate of sediment removal efficiency of settling basin. Therefore, the data have been re-analyzed and a new equation is developed which is recommended in order to predict the sediment removal efficiency of settling basin. The qualitative performance of present predictor indicated that it has lowest AAD,RMSE,APE and highest R as compared to Ranga Raju et al. (1999) predictor.

Keywords:
   settling basin, sediment removal efficiency, regression model, R


References:

1.       Atkinson, E. (1992). “The design of sluiced settling basins—A numerical approach.” Rep. No. OD 124, Overseas Development Unit, HR Wallingford, U.K.
2.       Camp, T. R. (1946). “Sedimentation and the design of settling tanks.” Trans., ASCE, 3, 895-958.

3.       Dobbins, W.E. (1944). “Effect of turbulence on sedimentation.” Trans. ASCE, 109, 629-653.

4.       Garde, R. J., Ranga Raju, K. G., and Sujudi, A. W. R. (1990). “Design of settling basins.” J. Hydraul. Res., 28(1), 81–91.

5.       Jain, A. K. (2009). “Fluid mechanics including hydraulic machines.” Tenth edition, Khanna publishers, New Delhi.
6.       Kerssens, P. J. M.,Prins, A., and Van Rijn, L. C. (1979). “Model for suspended sediment transport.” J. Hydr. Div., 105(5), 461–471.
7.       Ranga Raju, K. G., Kothyari, U. C., Srivastav, S., and Saxena, M.(1999). “Sediment removal efficiency of settling basins.” J. Irrig. Drain. Eng., 125(5), 308–314.

8.       Saxena, M. (1996). ‘‘Effect of flushing on efficiency of settling basins,’’ ME thesis, Dept. of Civil Engineering, Univ. of Roorkee, Roorkee (U.P.), India.

9.       Schrimpf,W. (1991). “Discussion of‘Design of settling basins,’ by R. J. Garde, K.G. Ranga Raju, and A.W.R. Sujudi.” J. Hydraul. Res., 29(1), 136-142.

10.    Singh, K.K. (1987). “Experimental study of settling basins.” ME thesis, Dept. of Civil Engineering, Univ. of Roorkee, Roorkee (U.P.), India.

11.    Singh, K. K., Pal, M., Ojha, C. S. P., and Singh, V. P. (2008). “Estimation of removal efficiency for settling basins using neural networks and support vector machines.” J. Hydrol. Eng., ASCE, 13(3), 146-155.

12.    Srivastav, S. (1997). ‘‘Effect of flushing on the efficiency of settling basin,’’ ME thesis, Dept. of Civil Engineering, Univ. of Roorkee, Roorkee (U.P.), India.

13.    Stamou, A. I., Adams, E. W., and Rodi, W. (1989). “Numerical modeling of flow and settling in primary rectangular clarifier.”J. Hydraul. Res., 27(5), 665–682.

14.    Sujudi, A. W. R. (1987). “Design of settling basins.” ME thesis, Dept. of Hydrology, Univ. of Roorkee, Roorkee (U.P.), India.

15.    Sumer, M. S. (1977). “Settlement of solid particles in open channel flow.” J. Hydr. Div., 103(11), 1323–1337.

16.    United States Bureau of Reclamation (1949). “Design and construction of the imperial dam and desilting work”. Boulder canyon project final report, Denver, Colorado, United states of America.

17.    Vanoni, V. A. (1975). “Sedimentation engineering.” Manuals and Reports on Engineering Practice No. 54, ASCE, New York, 22–25 and 582–583.

136-140

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Reshmalakshmi C, Sasikumar M

Paper Title:

Fuzzy Rule Based Color Space

Abstract:   Color prediction is still a critical issue in computer vision and image processing. It is necessary to ensure that the perceived color of object remains constant under varying illumination conditions. Novelty of this paper lies in introduction of new color space called linguistic color space designed using fuzzy system for better color constancy. In addition, mapping from RGB to linguistic space retains the precision and accuracy. While evaluating the algorithm, it is clear that the color components are preserved effectively and accurately with the help of combination of different types of membership functions. Inference rules with membership functions results intuitive and efficient color space.

Keywords:
    Color Space, Fuzzy inference, linguistic variable, membership functions.


References:

1.              R. S. Berns, F. W. Billmeyer, and M. Saltzman, Billmayer and Saltzman’s Principles of Colour Technology, 3rd ed. New Yok: Wiley, 2000
2.              L. Hildebrand and M. Fathi. “Knowledge -based fuzzy colour processing” IEEE Trans.  Syst. Man. Cybern. Part C, 34(4): 499-505, Nov. 2004.

3.              G. Louverdis, I. Andreadis, and Ph. Tsalides. “New fuzzy model for morphological colour image processing,” IEEE Proc.Vis. Image Signal Processing, vol.149, June 2002.

4.              J. Chamorro- Martinez, D. Sanchez, and J. M. Soto- Hidalgo. “A Novel Histogram Definition for Fuzzy Colour Spaces”. IEEE Conf. 2008.

5.              L. A. Zadeh, “Outline of a new approach to the analusis complex systems and decision process,” IEEE Trans. Syst. Man. Cybern., vol. SMC-3, no. 1,pp. 28-44, Jan.1973.

6.              H. J. Jimmermann, Fuzzy Set Theory and its Applications, Second ed. Norwell, MA: Kulwer, 1991.

7.              J.M. Soto-Hidalgo, J. Chamorro- Martinez, and D. Sanchez. “A New Approach for Defining a Fuzzy Colour Space”. IEEE Conf. 2010.

8.              Amine AIT YOUNES, Isis TRUCK, and Herman AKDAG. “Image retreival using fuzzy representation of colours”. Soft Computing Manuscript.

9.              R.C. Gonzalez, R.E. Woods, Digital Image Processing. (Prentice hall Upper Saddle River, New Jersey 2006.

10.           C. Reshmalakshmi, and M. Sasikumar, “Image Contrast Enhancement using Fuzzy Technique”. IEEE Conference ICCPCT (2013), pp. 861–865

11.           C. Reshmalakshmi, and M. Sasikumar, “Content-based Algorithm for Colour Image Enhancement Using Fuzzy Technique” . Artifial Intelligence and Evolutionary
Algorithms in Engineering systems and computing”. Vol. 325 , 2015, pp 343-352

141-144

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Juan Ochoa Aldeán, Edison D. Troya Chanta

Paper Title:

A Method for Identification of White Spaces in the VHF/UHF Band for the Future Deployment of Cognitive Radio Networks in the City of Loja

Abstract:    This project aims to carry out the identification of White Spaces within the VHF / UHF, corresponding to the range of frequencies ranging from 54 to 686 MHz, for possible use in cognitive radio systems bands. The methodology consisted of a spectrum monitoring performed in order to know their spectral occupancy in six parishes of the City of Loja. For that, a spectrum analyzer system was used, in order to evaluate the implementation Cognitive Radio Networks (CRN’s).

Keywords:  Spectrum, Wireless Communication, Cognitive Radio, White Spaces, National Frequency Plan.

References:

1.    J. H. Aguilar y A. Navarro, «Radio Cognitiva – Estado del Arte,» Revista Sistemas y Telemática, vol. IX, nº 16, pp. 31-53, 2011.
2.    S. M. Corbacho, «Análisis y caracterizacion de la ocupación espectral en entornos urbanos exteriores e interiores en el contexto de redes Cognitive Radio de acceso dinámico al espectro,» 23 julio 2009. [En línea]. Available:

3.    http://upcommons.upc.edu/bitstream/handle/2099.1/7614/Susana%20Molina%20Corbacho.pdf?sequence=1&isAllowed=y. [Último acceso: 23 febrero 2015].

4.    Agencia de Regulación y Control (ARCOTEL), «Plan Nacioanl de Frecuencias,» 2012. [En línea]. Available:

5.    http://www.arcotel.gob.ec/wp-content/uploads/downloads/2013/07/plan_nacional_frecuencias_2012.pdf. [Último acceso: 13 marzo 2015].

6.    ARCOTEL, «Listado Mensual de radiodifusión FM y TV abierta VHF/UHF,» Agosto 2015. [En línea]. Available: http://www.arcotel.gob.ec/estadisticas/. [Último acceso: 12 Septiembre 2015].

7.    D. A. S. Briones, «Análisis de factibilidad para la utilización de Cognitive Radio en las radiocomunicaciones necesarias para casos de emergencia en el Ecuador,» Diciembre 2010. [En línea]. Available: http://bibdigital.epn.edu.ec/bitstream/15000/2602/1/CD-3284.pdf. [Último acceso: 12 Febrero 2015].

145-151

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

R. Abd Allah

Paper Title:

Unbalance Current Detection for Synchronous Generator Using Alienation Concept

Abstract:     In modern digital power protection systems, statistical coefficients technique is recently used for fault analysis. An alienation technique is developed for protecting synchronous generators against unbalance currents conditions. The proposed technique is able to accurately identify the conditions of unbalance phase(s) currents involved in all different types of shunt faults that may locate on stator windings of synchronous generator. Case studies are processed under different loading levels, fault resistances and fault inception angles. It does not need any extra equipment as it depends only on the three-line currents measurements which are mostly available at the relay location. This technique is able to detect the unbalance current conditions, in about a one-cycle period. Thus, the alienation technique is well suited for implementation in digital protection schemes. The proposed methodology is applied for El-kuriemat power station unit that produces 320 MVA and a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed technique.

Keywords: Generator protection, unbalance currents, alienation coefficient, internal and external fault..

References:

1.       “Protective Relays Applications Guide,” The English Electric Company Limited, Relay Division, Stafford, 1975.
2.       C. J. Mozina, ”IEEE Tutorial on the Protection of Synchronous Generators”, IEEE Tutorial Course, IEEE Power Engineering Society Special Publ., no. 95 TP102, 1995.

3.       M. S. Sachdev and D. W. Wind, “Generator differential protection using a hybrid computer,” IEEE Trans. Power Apparatus System, PAS-92 (1973) 2063-2072.

4.       N.W. Kinhekar, Sangeeta Daingade and Ajayshree Kinhekar, “Current Differential Protection of Alternator Stator Winding,” Paper submitted to the International Conference on Power Systems Transients (IPST2009) in Kyoto, Japan June 3-6, 2009.

5.       Grainger J, Stevenson Jr WD. Power systems analysis electrical engineering. McGraw-Hill International Editions; 1994.

6.       ABB Automation Products, ‘Negative sequence overcurrent relay and protection assemblies’ 1999. Available: http://www.abb.mu/product/us/9AAC710454.aspx Accesed on: 15 Feb 2012.

7.       P. K. Dash, O. P. Malik, and G. S. Hope, “Digital differential protection of a generating unit scheme and real-time test results,” IEEE Transactions oxn Power Apparatus and Systems, vol. PAS-96, no. 2, March/April 1977.

8.       P. K. Dash, O. P. Malik, and G. S. Hope, “Fast generator protection against internal asymmetrical faults,” IEEE Transactions on Power Apparatus and Systems, vol. PAS-96, no. 5, September/October 1977.

9.       Q. Usta, M. Bayrak, M.A. Redfern, “A New Digital Relay for Generator Protection against Asymmetrical Faults”, IEEE Transaction on Power Delivery, Yol. 17, No.1, January 2002, pp. 54-59.

10.    T. Bach, et al., “Determining negative sequence currents of turbine generator rotors,” in Electrical Machines and Systems, 2009. ICEMS 2009. International
Conference on, 2009, pp. 1-6.

11.    F. Elneweihi, et al., “Negative-sequence overcurrent element application and coordination in distribution protection,” Power Delivery, IEEE Transactions on, vol. 8,
pp. 915-924, 1993.

12.    Muhammad Mohsin Aman, Muhammad Qadeer Ahmed Khan and Mohd Noor Abdullah, ”Modeling and Simulation of Digital Negative Sequence Relay for Unbalanced Protection of Generator” 2012 IEEE international power engineering and optimization conference (PEOCO2012), Melaka, Malaysia: 6-7 June 2012.

13.    ATP – version 3.5 for Windows 9x/NT/2000/XP – Users’ Manual  Preliminary Release No. 1.1 – October 2002.

14.    W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.

15.    Edwards, A. L. “The Correlation Coefficient.” Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976.

16.    Snedecor, G. W. and Cochran, W. G. “The Sample Correlation Coefficient r and Properties of r.” 10.1-10.2 in Statistical Methods, 7th ed. Ames, IA: Iowa State Press, pp. 175-178, 1980.

17.    Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. “Linear Correlation”, Cambridge, England: Cambridge University Press, pp. 630-633, 1992.

18.    Spiegel, M. R. “Correlation Theory.” Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294-323, 1992.

19.    Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban,2006.

152-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Baydaa Hussain Maula

Paper Title:

Generation of p-y curves based on Decomposition Method for Pore Water Pressure

Abstract:      To highlight the importance and strengthen the prominent role  of a pore pressure generation  on p-y behavior under different vital parameters a numerical study will be conducted depending on previous research of shaking table tests. Accordingly, we recognize that the relationship and the mechanism of the dynamic factors is not easy to predict and explain. Estimating lateral resistance and displacement’s demands on a soil-pile-structure in a liquefiable ground required an accurate measurements for PWP along the quake period. The decomposition method results explain the mechanical effect of PWP generation with time intervals on pile lateral deformation for cases the presence of a single pile or with a group.

Keywords:
  Pile group foundation, Sand blow, OpenSeesPL, Generation of p-y, decomposition method.


References:

1.     Daniel W. Wilson , Ross W. Boulanger and Bruce L. Kutter (2000) , ” Observed Seismic Lateral Resistance of liquefying Sand” Journal of geotechnical and geoenvironmental engineering , 899-905
2.     LinJiCong and LingXianChang (2012) ” Simplified Seismic Analysis Method of Bridge Pile-group Foundation in Liquefiable Ground” – Master’s thesis – Dissertation: School: Harbin Institute of Technology Course

3.     Mokhtar Abel –Salam, Mohamed Ahmed Abdel-Motaal and Mohamed Mustafa Wahidy (2014), “Lateral displacement and pile instability due to soil liquefaction using numerical model,” Ain- Shams Engineering journal, 2014(5), 1019-1032.

4.     Parra E (1996), “Numerical Modeling of Liquefaction and Lateral Ground Deformation Including Cyclic Mobility and Dilation Response in Soil Systems,” PhD Thesis,
Rensselaer Polytechnic Institute, Troy, NY.

5.     Phanikanth V.S. , Srinivas K., Deepankar Choudhury and Reddy G.R (2013), “Behavior of single piles in liquefied soils during earthquake” International Journal of
Geomechanics (Impact Factor: 1.2). 08/2013; 13(4):454-462. DOI: 10.1061/(ASCE)GM.1943-5622.0000224..

6.     Tang Liang, Baydaa Hussain Maula, Ling Xianzhang,  and Su Lei(2014).” Numerical simulations of shake-table experiment for dynamic soil-pile-structure interaction in liquefiable soils”Earth Quack Engineering and Engineering Vibration, Vol.13, No.1(2014) 13: 171-180.

7.     Tang Liang. “P-Y Model of Dynamic Pile-soil Interaction in Liquefying Ground,” PhD Thesis, Dissertation, Harbin Institute of Technology, Harbin, China

8.     http://mptuttle.com/newmadrid3.html) Earthquake induced liquefaction in the NMSZ

163-170

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

Volume-5 Issue-4

 Download Abstract Book

S. No

Volume-5 Issue-4, April 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Gautham Allur Subramanya, Aakash Agrawal, Nikhil Kothari, Shreenivas B

Paper Title:

Challenges Faced By Next-Generation-Networks

Abstract: This paper will address the challenges thatNext-Generation-Networks will face and how to tackle them. As we are pumping more and more data into the current networks, there exists an inescapable need for improvement in our current telecommunication networks. This has fuelled a lot of research and surveys on the development of Next-Generation-Networks. But developing these “better networks” is not a very easy task and the process will face a lot challenges such as, (1) maintaining optimum energy efficiency, (2) keeping an eco-friendly outlook while developing new technologies, (3) dealing with security issues such as jamming and spoofing, (4) dealing with software bugs that would arise with the use of SDN (Software Defined Networking) as well as many other SDN related problems. Addressing these challenges can eventually lead to lesser costs and more efficiency.

Keywords:
 Next-Generation-Networks, SDN, Cognitive Radio


References:

1.           Simon Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications” IEEE Journal On Selected Areas In Communications, VOL. 23, NO. 2, February 2005.
2.           Raffaele Bolla and Franco Davoli, DIST-University of Genoa. Roberto Bruschi, National Inter-University Consortium for Telecommunications. Ken Christensen, University of South Florida. Flavio Cucchietti, Telecom Italia. Suresh Singh, Portland State University, “The Potential Impact of Green Technologies inNext-Generation Wireline Networks: Is There Room for Energy Saving Optimization?” IEEE Communications Magazine • August 2011.

3.           Teena Hammond, article for ZDNET, “Research: IT leaders slow toembrace software-defined networking”

4.           Omid Mashayekhi, “Spectral Utilization and Coexistence Strategiesin Cognitive Radio Devices” Stanford.edu

5.           Andrea Goldsmith, Syed Ali Jafary, Ivana Maric and Sudhir Srinivasa, “Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective” Stanford.edu

6.           Scott Reeves, article for TechRepublic, “Key features of Next Generation Networks”

7.           Vinod Namboodiri, Department of Electrical Engineering and Computer Science, Wichita State University, “Are Cognitive Radios Energy Efficient? A Study of the Wireless LAN Scenario”

8.           Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran , Shantidev Mohanty, “NeXt generation/dynamic spectrum access/cognitive radiowireless networks: A survey” Elsevier, 2006.

9.           Shigang Chen ; Illinois Univ., Urbana, IL, USA ; Nahrsted K, “Anoverview of quality of service routing for next-generation high-speed networks: problems and solutions” Network, IEEE (Volume:12 , Issue: 6 ).

10.        Huber, J.F. ; Inf. & Commun. Mobile Networks, Siemens AG, Munich, Germany, “Mobile next-generation networks” MultiMedia, IEEE (Volume:11 , Issue: 1 ).

11.        Ramjee, R. Lucent Technol. Bell Labs., USA La Porta, T.F. ; Salgarelli, L. ; Thuel, S. ; Varadhan, K. ; Li Li, “IP-based accessnetwork infrastructure for next-generation wireless data networks” Personal Communications, IEEE(Volume:7 Issue: 4 )

12.        Lillian Goleniewski authored book, “Telecommunications Essentials: The Complete Global Source for Communications Fundamentals, Data Networking and the Internet, and Next-generation Networks”.

13.        Bradley Mitchell, QoS article, About.com

14.        Thomas D. Nadeau, “What are the hard (and interesting) open Research problems in the SDN Space?” IETF 85 –IRTF SDN Research Group.

15.        Witsa.org “Next Generation Networks and the Policy Implications”

16.        Tech Target article, “Real-Time Transport Protocol (RTP)”

17.        Sdsu.edu article, “Multimedia over IP”

18.        Nick Mc Keown, Stanford University; Tom Anderson, University of Washington; Hari Balakrishnan, MIT; Guru Parulkar, Stanford University; Larry Peterson, Princeton University; Jennifer Rexford, Princeton University; Scott Shenker, University of California, Berkeley; Jonathan Turner, Washington University, “Open Flow: Enabling Innovation
in Campus Networks” Openflow.org

19.        Marc Mendonca, University of California, Santa Cruz, USA; Katia Obraczka, University of California, Santa Cruz, USA; Thierry Turletti, INRIA, Sophia Antipolis, France, “The Case for Software–Defined Networking in Heterogeneous Networked Environments”

20.        K. Yap, R. Sherwood, M. Kobayashi, N. Handigol, N. Mc Keown, and G. Parulkar. “Blueprint for introducing innovation into wireless mobile networks”.

21.        M. Yu, J. Rexford, M. Freedman, and J. Wang. “Scalable flow-based networking with define”

1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Abubakr Mustafa Elkhaleefa

Paper Title:

Waste Engine Oil Characterization and Atmospheric Distillation to Produce Gas Oil

Abstract:  Two type of used engine oil (A and B)has been characterized along with a fresh sample of each type and hence the properties changes and degradation was observed. The samples (A and B) subjected to a batch atmospheric distillation process. The distillation product analyzed and the results show that the product specifications are similar to the gas oil.

Keywords:
 Used engine oil, characterization, atmospheric distillation, gas oil


References:

1.              Bhaskar, T., et al., Recycling of waste lubricant oil into chemical feedstock or fuel oil over supported iron oxide catalysts. Fuel, 2004. 83(1): p. 9-15.
2.              Hamad, A., E. Al-Zubaidy, and M.E. Fayed, Used lubricating oil recycling using hydrocarbon solvents. Journal of environmental management, 2005. 74(2): p. 153-159.

3.              Fuentes, M., et al., Pyrolysis and combustion of waste lubricant oil from diesel cars: decomposition and pollutants. Journal of Analytical and Applied Pyrolysis, 2007. 79(1): p. 215-226.

4.              Fan, W.T.-C., Regeneration of used petroleum-based lubricants and biolubricants by a novel green and sustainable technology. 2010: University of Southern California.

5.              Rincon, J., P. Canizares, and M.T. Garcia, Regeneration of used lubricant oil by ethane extraction. The Journal of supercritical fluids, 2007. 39(3): p. 315-322.

6.              Bartz, W.J., Lubricants and the environment. Tribology international, 1998. 31(1): p. 35-47.

7.              Kannan, S., et al., Studies on Reuse of Re-Refined Used Automotive Lubricating Oil. Research Journal of Engineering Sciences ISSN. 2278: p. 9472.

8.              Nerın, C., et al., Behaviour of different industrial waste oils in a pyrolysis process: metals distribution and valuable products. Journal of Analytical and Applied Pyrolysis, 2000. 55(2): p. 171-183.

9.              Udonne, J., A comparative study of recycling of used lubrication oils using distillation, acid and activated charcoal with clay methods. Journal of Petroleum and Gas Engineering, 2011. 2(2): p. 12-19.

10.           Emam, E. and A. Shoaib, Re-Refining of Used Lube Oil, I-by Solvent Extraction and Vacuum Distillation Followed By Hydrotreating. Petroleum & Coal, 2013. 55(3): p. 179-187.

6-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ionuț Daniel Smărăndescu, Petre-Marian Nicolae

Paper Title:

About Electric Scooter Mobility. Aspects Regarding the Designing of a Brushless DC Motor for an Electric Scooter

Abstract:   The paper deals with the electric scooter mobility in Europe and with the designing of a brushless dc motor for an electric scooter. In the first part of the paper, the context and the motivation of the theme are presented. In the second part of the paper, the electric scooters market is described. Then, the main parts equipping an electric scooter are exposed. The final part of the paper deals with the designing of a permanent magnet brushless dc motor for electric scooter propulsion. 

Keywords:
designing, electric scooter, electric scooter mobility, permanent magnet brushless dc motor.


References:

1.           Braconi Dario, „Green two-wheeled mobility-Material Hygiene and life cycle analysis of an electric scooter”, Dissertation, Stockholm, Sweden, 2014.
2.           http://www.teslamotors.com/en_GB/about/executives/elonmusk.

3.           http://www.kth.se/en/itm/inst/mmk/forskning/forskningsenheter/systemkomponentdesign/ecodesign.

4.           Colella Wh. G., „Market prospect, design features, and performance of a fuel cell powered scooter”, Journal of Power Sources, 2000.

5.           Electric motorcycle development action plan”, EPA, Environmental protection administration, 1998.

6.           http://www.oxforddictionaries.com/definition/english/scooter.

7.           https://en.wikipedia.org/wiki/Electric_motorcycles_and_scooters.

8.           The motorcycle industry statistical overview, ACEM, 2013.

9.           Environmental annual report”, Honda, 2013.

10.        Corporate Social Responsibility report”, Piaggio, 2013.

11.        http://www.navigantresearch.com/research/navigant-research-leaderboard-report-electricscooters.

12.        Jiangsu Xinri E-Vehicle Co., http://english.xinri.com.

13.        Vmoto, http://www.vmoto.com.

14.        Sym, http://www.sym-global.com/index.

15.        Vectrix, http://www.vectrixitalia.it.

16.        Terra Motors, http://www.terra-motors.com.

17.        Govecs, http://www.govecs.it.

18.        Yamaha Motors, http://www.yamaha-motor.eu/it/prodotti/scooter/index.aspx.

19.        Peugeot scooter, http://www.peugeotscooters.it.

20.        iO scooter, http://www.io-scooter.com.

21.        Nimag B.V. (Nimoto), http://www.nimoto.nl/contact.

22.        http://www.icpe.ro/ro/d/2/p/scuter-electric.

23.        Billings Randy, „Z Electric Vehicle Introduces New Model 5000 Scooter”, EV World.com, 9 May 2012.

24.        Sullivan J.L. and Gaines L., „Status of life cycle inventories for batteries”, Energy Convension and Management, Vol. 58, pp. 134-148, 2012.

25.        http://vega.unitbv.ro/~ogrutan/Microcontrollere2011/5-motoare.pdf.

26.        Brushless DC motors – three phased”, Electronica AZI, web access: http://electronica-azi.ro/2004/07/08/motoare-de-curent-continuu-fara-peri-trifazate (in romanian).

27.        Larminie J. and Lowry, J., “Electric machines and their controllers”, Electric Vehicle Technology Explained, Chapter 6, Second Edition, 2012.

28.        ***https://ro.wikipedia.org/wiki/Motor_electric_de_curent_continuu_f%C4%83r%C4%83_perii.

29.        http://www.scrigroup.com/tehnologie/electronica-electricitate/Motoare-de-curent-continuu-far73164.php.

30.        Fransua Al., Măgureanu R., Câmpeanu A., Condruc M., Tocaci M. – “Machines and electric drive systems”, Ed. “Tehnică”, Bucharest, 1978 (in romanian).

9-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Kavita Burse, Subrato Howlader, Prateek Wankhade

Paper Title:

Breathing Sensor Operated Wheel Chair for Paralyzed Persons

Abstract:  The proposed breathing sensor based wheel chair (BSWC) can be controlled using breathing commands. Therefore a ‘disabled’ person can control the BSCWC by himself. Computer input system with breathing commands does not work in real time bases. Moreover it is not robust against various background noises and vibrations. Through experiment it is found that the proposed BSWC is robust against the above mentioned influencing factors. Moreover it is confirmed that the proposed BSWC can be controlled by breathing accurately and safely. The proposed research is a computer controlled wheel chair where sensor and intelligent control algorithm have been used to minimize the level of human intervention.

Keywords:
BSWC, breathing sensor, wheel chair, paralysis  


References:

1.             Vasundhara G. Posugade, Komal K. Shedge, Chaitali S. Tikhe “Touch-screen based wheelchair system” International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 2, Mar-Apr 2012, pp.1245-1248.
2.             Dr. Shaik Meeravali, M. Aparna “Design and development of a hand-glove controlled wheel chair based on MEMS” International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 8, August 2013, pp: 3706-3712.

3.             Rakhi A. Kalantri, D. K. Chitre “Automatic wheelchair using gesture recognition” International Journal of Engineering and Advanced Technology (IJEAT), Volume 2, Issue 6, August 2013, pp: 146-150.

4.             Pradeep Kumar Rattewal, Parteek Kumar “Design and fabrication of low cost intelligent wheelchair” International Journal of Engineering and Computer Science (IJECS), Volume 3, Issue 6, June, 2014 Page No. 6432-6437.

5.             Nirmal T M “Wheelchair for physically and mentally disabled persons” International Journal of Electrical and Electronics Research, Volume 2, Issue 2, April – June 2014, pp: 112-118.

6.             Mr. Vijendra P. Meshram, Ms. Pooja A. Rajurkar, Ms. Mohini M. Bhiogade, Ms. Arundhati C. Kharabe, Mr. Dhiraj Banewar. “Wheelchair automation using head gesture” International Journal of Advanced Research in Computer Science and Software Engineering,  Volume 5, Issue 1, January 2015, pp: 641-646.

14-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Suhas S, Abhishek Joshi, Ravi Srinivas, Nagarjun C S

Paper Title:

FPGA Implementation for Integrated Circuit Technology Tester

Abstract:     Integrated Circuits have dominated every walk of life in the present world. In this Integrated Circuit era, the need of testing of ICs has become the need of the hour. The implementation and fabrication of new ICs on a daily basis have brought testing to new heights. Albeit these requirements, not many efficient, cheap and readily available testing solutions have been realized. In the following paper, a simple yet highly effective solution to various testing concerns of digital circuits or ICs along with its implementation has been brought out. The real time results got are validated and are readily available for verification of the design under test.

Keywords:
Digital designs, Field Programmable Gate Array [FPGA], Testing


References:

1.                Md. Fokhrul Islam, M. A. Mohd. Ali,  Burhanuddin Yeop Majlis, “ FPGA Implementation Of An LFSR Based Pseudorandom Pattern Generator For MEMS Testing”, International Journal of Computer Applications (0975 – 8887) Volume 75– No.11, August 2013
2.                R. V. PrasadaRao, N. A. Varaprasad, G. S. Babu and C. M. Mohan, “Power Optimization of Linear Feedback Shift Register for Low Power BIST Implemented in HDL”, International Journal of Modern Engineering Research (IJMER), Vol. 3, Issue. 3, pp. 1523-1528 (2013).

3.                C. R. Reddy, S. Zilani and V. Sumalatha, “Low Power, Low-Transition Random Pattern Generator”, International Journal of Engineering Research & Technology (IJERT), Vol. 1, Issue 5 (2012).

4.                Jutman, A. Tsertov and R. Ubar, “A tool for Advanced Learning of LFSR-Based Testing Principles”, Baltic Electronics Conference, 2006 International.

5.                Nazeih.M.Botros “HDL Programming Using VHDL and VERILOG”, John Weily India, 2008.

17-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Priyanka Khare, Kavita Burse, Anjana Pandey

Paper Title: