Volume-7 Issue-5


Version
Download 47
Total Views 813
Stock
File Size 4.00 KB
File Type unknown
Create Date April 26, 2018
Last Updated September 20, 2018
Download

Download Abstract Book

S. No

Volume-7 Issue-5, June 2018, ISSN: 2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.

Page No.

1.

Authors:

Anand Bhushan Tripathy, Prashant Kumar Jain

Paper Title:

Cognitive Radio Network using LEACH Protocol for Maximization Energy Efficiency

Abstract: Over present day remote interchanges those range will be allocated with settled authorized clients Also on the different side the amount of remote gadgets may be expanding quickly that need prompt range crunch. Concerning illustration the range will be precious it need to a chance to be used effectively. The result with relieve this issue will be “Spectrum Sharing”. A standout amongst those imaginative methodologies to remember and right those range gaps display in the authorized range may be ‘Cognitive radio (CR)’. Range sensing or offering will be An build to those execution about know works performed by those cognitive radio (CR). Issues identified with single cr identification are succeed Eventually Tom's perusing agreeable identification utilizing group leader from close-by hubs Previously, cognitive radio. Low vitality versatile grouping chain of importance (LEACH) may be a hierarchic protocol Previously, which The majority hubs transmit with group heads, and the bunch heads aggravator and compresses the information What's more ahead it of the build station (sink) which expands cognitive radio execution An non agreeable range sensing calculation might not worth of effort great with the goal agreeable range sensing (CSS) calculations Eventually Tom's perusing using multi-user assorted qualities determines with numerical outcomes it camwood be watched that Normal throughput will be attained through streamlining which bring been investigated through a normal throughput vs number from claiming helpful auxiliary clients for different combination lead. An radio which autonomously detects What's more exploits void range will expand your record exchange rate. Suppose this same radio Might recall those areas the place your calls have a tendency with drop Furthermore organize for your call on a chance to be overhauled by an alternate transporter for the individuals areas. These would exactly of the thoughts inspiring those advancement for cognitive radio by drain. Over effect, An cognitive radio will be a programming radio whose control procedures power situational learning and canny transforming with fill in towards accomplishing some objective identified with the necessities of the user, application, or system. Emerging from a legitimate advancement of the control techniques of a product radio, cognitive radio displays those likelihood about various revolutionary applications, first of which will be entrepreneurial range use.

Keywords: The result with relieve this issue will be “Spectrum Sharing”. ‘Cognitive radio, (CR)’. Cognitive radio, (LEACH) may be a hierarchic protocol Previously, (CSS) Over effect, radio control techniques of a product radio,

References:

  1. Lorenza Giupponi and Christian Ibars.Cooperative Cognitive Systems
  2. Najam ul Hasan. COOPERATIVE Spectrum sensing IN COGNITIVE RADIO NETWORKS, 2006-NUST-MS PhD-ComE
  3. http://enpub.fulton.asu.edu/PowerZone/FuzzyLogic/chapter%201/frame1.htm
  4. Giupponi, Ana I. Pérez-Neira. Fuzzy-based Spectrum Handoff in Cognitive radio network, Centre Tecnològic de Telecomunicacions de Catalunya(CTTC), Universitat Politècnica de Catalunya (UPC). [5] Dong Li, Xianhua Dai, Han Zhang. Joint Adaptive Modulation and Power Control in Cognitive Radio Networks, School of Information and Scienc Technology, Sun Yat-Sen University Guangzhou 510275, P. R. China.
  5. Nouha Baccour, Anis Koubˆaa, Habib Youssef, Maissa Ben Jamˆaa1,Denis do Ros´ario,
    M´ario Alves, and Leandro B. Becker.F-LQE: A Fuzzy Link Quality Estimator for Wireless Sensor Networks
  6. Miao Ma and Danny H. K. Tsan. Cross-Layer Throughput Optimization in Cognitive
    Radio Networks with SINR Constraints, Department of Electronic and Computer Engineering The Hong Kong University of Science and Technology.
  7. charles Clancy,William A Arbaugh, Measuring Interference temperature, Department
    of computer Science, University of Maryland[9] http://www.scribd.com/doc/23492277/85/Major-advantages-of-SINR-based-algorithmover-RSS-based
  8. Paul j kolodzy. Interference temperature: A metric for dynamic spectrum, March 2006,phD member, IEEE.
  9. http:// electronics.dit.ie/staff/amoloney/...2/dig-comms-ii-lecture-11-12.pdf
  10. http://www.csgnetwork.com/tvfreqtable.html
  11. HJ Cheng, ZHSu R Guo, NX Xiong, WZ Guo, Service-oriented nodescheduling schemes with energy efficiency in wireless sensor networks.Int. J. Distributed Sensor Netw.2014(2014) 14. H Zhang, Z Zhang, H Dai, R Yin, XM Chen, in IEEE GlobalTelecommunications Conference Distributed spectrum-aware clustering in cognitive radio sensor networks, (2011), pp. 1–6
  12. RM Eletreby, HM Elsayed, MM Khairy, inInternational Conference onCognitive Radio Oriented Wireless Networks and CommunicationsCogLEACH: a spectrum aware clustering protocol for cognitive radiosensor networks, (2014), pp. 179–184
  13. M Ozger, OB Akan, inProceedings IEEE INFOCOM. Event-drivenspectrum-aware clustering in cognitive radio sensor networks, (2013),pp. 1483–1491
  14. CF Li, M Ye, GH Chen, J Wu, inIEEE International Conference on Mobile Adhoc and Sensor Systems. An energy-efficient unequal clusteringmechanism for wireless sensor networks, (2005), pp. 604–612
  15. AO Bicen, OB Akan, Reliability and congestion control in cognitive radiosensor networks. Ad Hoc Netw. J. (Elsevier).9(7), 1154–1164 (2011)
  16. B Gulbahar, OB Akan.Information theoretical optimization gains in energyadaptive data gathering and relaying in cognitive radio sensor networks.IEEE Trans. Wireless Commun.11(5), 1788–1796 (2012)
  17. GA Shah, VC Gungor, OB Akan, A cross-layer QoS-aware communicationframework in cognitive radio sensor networks for smart grid applications.IEEE Trans. Ind. Inf.9(3), 1477–1485 (2013)
  18. GA Shah, OB Akan, Performance analysis of CSMA-based opportunisticmedium access protocol in cognitive radio sensor networks. Ad HocNetw. J. (Elsevier).15 4–13 (2014)
  19. GA Shah, F Alagoz, E Fadel, OB Akan, A spectrum-aware clustering forefficient multimedia routing incognitive radio sensor networks. IEEETrans. Vehicular Technol.63(7), 3369–3380 (2014)
  20. GA Shah, OB Akan, Cognitive adaptive medium access control in cognitiveradio sensor networks. IEEE Trans. vehicular Technol.64 (2), 757–767 (2015)
  21. V Esmaeelzadeha, R Berangia, ES Hosseinia, OB Akanb, Stochastic backlogand delay bounds of generic rate-based AIMD congestion control scheme incognitive radio sensor networks, (2015). Pervasive and Mobile Computing
  22. W Heinzelman, A Chandrakasan, H Balakrishnan, applicationspecificprotocol architecture for wireless microsensor networks. IEEE Trans.Wireless Commun.1 (4), 660–670 (2002)
  23. GA Shah, OB Akan, inIEEE International Conference on CommunicationsSpectrum-aware cluster-based routing for cognitive radio sensornetworks, (2013), pp. 2885–2889

1-8

http://blueeyesintelligence.org/2checkout_download.html

2.

Authors:

Srividya B., Thirunavukkarasu V.

Paper Title:

Investigation of Total Quality Management Principles In The Print Production Industry

Abstract: The purpose of the investigation was to determine the efficiency of the term “Total Quality management”, to define the principle of the quality concept and to test the effectiveness with in the print production industry. The research involves in-depth survey of quality management system, which was distributed to print production employees across the state. The aim of the survey was to collect data that was predominately qualitative. It inquired upon the utilization and effectiveness of quality management system, knowledge and usage of TQM principles with in the participant’s company. Using content analysis, the collected data was analysed and with the gathered information case studies were developed. The investigation result shows that the principle of TQM was widely executed in print production industry. In many of the print production industry employees not having the clear idea of TQM is, and the more successful industry tended to have a more solid knowledge and usage of TQM principles. These print production industries may benefit by taking time to fully understand TQM and use it to its fullest potential.

Keywords: TQM Principles, Print Production, Printing Industry, Quality Management System

References:

  1. Paige Cornelison, “The effectiveness of Total Quality Management Principle in the printing Industry”, Graphic Communication Department, California Polytechnic State university, 2013.
  2. Goyal, Niraj, “Newspaper aims to improve printing: A TQM case study”, IsixSigmaP., Web. <http://www.isixsigma.com/reginal vies/asia/newspaper-aims-improve-printing-tqm-case-study, 2010
  3. Hashmi, Khurram, “Introduction and Implementation of TQM”, IsixSigmaP., Web. http://www.isixsigma.com/methodology/tqm/, 2010
  4. Miller, John Douglas, “A case study of the effects of implementing TQM at Perry printing corporation and implications for adult learning”, University of Wisconsin, 2015
  5. Milosan I, “Studies about the TQM concept”, Acta Technica Corvininesis- Bulletin of Engineering, 2011
  6. Padhi, Nayantara, “The Eight Elements of TQM”, IsixSigmaP., Web. http://www.isixsigma.com/methodology/tqm/, 2010
  7. Tari, Juan Jose, “Components of Successful TQM”, The TQM Magazine, 182-97. Print, 2015
  8. Westcott, Russ, “The certified Manager of Quality/organisational Excellency- Handbook”, Milwaukee WI: ASQ Quality, 2013
  9. Srividya B, Dr. Thirunavukkarasu, “Investigation the print quality of web offset colour prints on newsprint paper”, Asian Journal of Research in Social Science and Humanities, Volume 6 Number 11, pp.803-811, ISSN:2249-7315, 2016.
  10. Srividya B, Dr. Thirunavukkarasu, “Investigation of Quality Parameter for Newspaper Printing & Optimizing the Six Colour Coldset web offset machine to minimize the paper waste and to bring down Carbon Footprint through Process Optimization”, Asian Journal of Research in Social Science and Humanities, Volume 6 Number 8, pp. 936-947, ISSN: 2249-7315, 2016.

9-12

http://blueeyesintelligence.org/2checkout_download.html

3.

Authors:

Ghiath Al Aqel

Paper Title:

A Survey of The Optimization of The Flexible Job Shop Problem

Abstract: The flexible job shop problem is an important problem in modern manufacturing systems. It is known to be an NP-hard problem. The optimization of this problem can bring in considerable improvements in the manufacturing efficiency. In recent studies, it has attracted the attention of most researchers in this field. Several metaheuristic methods were proposed to solve this problem. These methods started with exact algorithms and later approximate methods, which include heuristic methods, evolutionary algorithms, swarm intelligence, local search and hybrid algorithms, were introduced to cope with the development and the growing scale of the flexible job shop problem. In this paper we explore the algorithms that are most commonly used to solve this problem. This paper also aims to evaluate and compare the performance of these algorithms.

Keywords: Flexible Job Shop, Optimization Algorithms.

References:

  1. Li, X. and L. Gao, An effective hybrid genetic algorithm and tabu search for flexible job shop scheduling problem. International Journal of Production Economics, 2016. 174: p. 93-110.
  2. Brucker, P. and R. Schlie, Job-shop scheduling with multi-purpose machines. Computing, 1990. 45(4): p. 369-375.
  3. Demir, Y. and S.K. İşleyen, Evaluation of mathematical models for flexible job-shop scheduling problems. Applied Mathematical Modelling, 2013. 37(3): p. 977-988.
  4. Pezzella, F., G. Morganti, and G. Ciaschetti, A genetic algorithm for the flexible job-shop scheduling problem. Computers & Operations Research, 2008. 35(10): p. 3202-3212.
  5. Taillard, E., Benchmarks for basic scheduling problems. european journal of operational research, 1993. 64(2): p. 278-285.
  6. Paulli, J., A hierarchical approach for the FMS scheduling problem. European Journal of Operational Research, 1995. 86(1): p. 32-42.
  7. Zhang, G., L. Gao, and Y. Shi, An effective genetic algorithm for the flexible job-shop scheduling problem. Expert Systems with Applications, 2011. 38(4): p. 3563-3573.
  8. Baykasoğlu, A. and L. Özbakır, Analyzing the effect of dispatching rules on the scheduling performance through grammar based flexible scheduling system. International Journal of Production Economics, 2010. 124(2): p. 369-381.
  9. Ingimundardottir, H. and T.P. Runarsson, Evolutionary learning of linear composite dispatching rules for scheduling, in Computational Intelligence. 2016, Springer. p. 49-62.
  10. Ying, K.-C., S.-W. Lin, and C.-C. Lu, Effective dynamic dispatching rule and constructive heuristic for solving single-machine scheduling problems with a common due window. International Journal of Production Research, 2017. 55(6): p. 1707-1719.
  11. Mei, Y. and M. Zhang. A comprehensive analysis on reusability of GP-evolved job shop dispatching rules. in Evolutionary Computation (CEC), 2016 IEEE Congress on. 2016. IEEE.
  12. Ɖurasević, M. and D. Jakobović, Comparison of ensemble learning methods for creating ensembles of dispatching rules for the unrelated machines environment. Genetic Programming and Evolvable Machines, 2017: p. 1-40.
  13. Huang, J. and G.A. Süer, A dispatching rule-based genetic algorithm for multi-objective job shop scheduling using fuzzy satisfaction levels. Computers & Industrial Engineering, 2015. 86: p. 29-42.
  14. Ho, N.B., J.C. Tay, and E.M.-K. Lai, An effective architecture for learning and evolving flexible job-shop schedules. European Journal of Operational Research, 2007. 179(2): p. 316-333.
  15. Peigen, Z.C.R.Y.L. and S. Xinyu, BILEVEL GENETIC ALGORITHM FOR THE FLEXIBLE JOB-SHOP SCHEDULING PROBLEM [J]. Chinese Journal of Mechanical Engineering, 2007. 4: p. 020.
  16. Peigen, Z.G.G.L.L. and Z. Chaoyong, Improved Genetic Algorithm for the Flexible Job-shop Scheduling Problem [J]. Journal of Mechanical Engineering, 2009. 7: p. 026.
  17. Demir, Y. and S.K. İşleyen, An effective genetic algorithm for flexible job-shop scheduling with overlapping in operations. International Journal of Production Research, 2014. 52(13): p. 3905-3921.
  18. Zhang, H.P. and M. Gen, Multistage-based genetic algorithm for flexible job-shop scheduling problem. Journal of Complexity International, 2005. 48: p. 409-425.
  19. Jia, H., et al., A modified genetic algorithm for distributed scheduling problems. Journal of Intelligent Manufacturing, 2003. 14(3): p. 351-362.
  20. Huang, M., W. Mingxu, and L. Xu. An improved genetic algorithm using opposition-based learning for flexible job-shop scheduling problem. in Cloud Computing and Internet of Things (CCIOT), 2016 2nd International Conference on. 2016. IEEE.
  21. Purnomo, M.R.A., A Knowledge-Based Genetic Algorithm for Solving Flexible Job Shop Scheduling Problem. International Business Management, 2016. 10(19): p. 4708-4712.
  22. Ishikawa, S., R. Kubota, and K. Horio, Effective hierarchical optimization by a hierarchical multi-space competitive genetic algorithm for the flexible job-shop scheduling problem. Expert systems with applications, 2015. 42(24): p. 9434-9440.
  23. Jorapur, V.S., et al., A promising initial population based genetic algorithm for job shop scheduling problem. Journal of Software Engineering and Applications, 2016. 9(05): p. 208.
  24. Rossi, A. and G. Dini, Flexible job-shop scheduling with routing flexibility and separable setup times using ant colony optimisation method. Robotics and Computer-Integrated Manufacturing, 2007. 23(5): p. 503-516.
  25. Zhang, R., S. Song, and C. Wu, A hybrid artificial bee colony algorithm for the job shop scheduling problem. International Journal of Production Economics, 2013. 141(1): p. 167-178.
  26. Wang, L., et al., An effective artificial bee colony algorithm for the flexible job-shop scheduling problem. The International Journal of Advanced Manufacturing Technology, 2012. 60(1): p. 303-315.
  27. Kacem, I., S. Hammadi, and P. Borne, Approach by localization and multiobjective evolutionary optimization for flexible job-shop scheduling problems. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews), 2002. 32(1): p. 1-13.
  28. Zhang, G., et al., An effective hybrid particle swarm optimization algorithm for multi-objective flexible job-shop scheduling problem. Computers & Industrial Engineering, 2009. 56(4): p. 1309-1318.
  29. Xing, L.-N., et al., A knowledge-based ant colony optimization for flexible job shop scheduling problems. Applied Soft Computing, 2010. 10(3): p. 888-896.
  30. Li, J.-Q., et al., A hybrid tabu search algorithm with an efficient neighborhood structure for the flexible job shop scheduling problem. The international journal of advanced manufacturing technology, 2011. 52(5-8): p. 683-697.
  31. Zhang, G., Y. Shi, and L. Gao. A genetic algorithm and tabu search for solving flexible job shop schedules. in Computational Intelligence and Design, 2008. ISCID'08. International Symposium on. 2008. IEEE.

13-16

http://blueeyesintelligence.org/2checkout_download.html

4.

Authors:

Swati Gautam, Kanchan Cecil

Paper Title:

A Four-Element Planar UWB-MIMO Antenna System Comprising of Plus-Sign Stub for High Isolation

Abstract: A four-element planar UWB-MIMO antenna system with plus-sign stub (for achieving high isolation) is proposed here. The complete antenna system is constructed on 52mm x 52mm, FR-4 substrate (dielectric constant=4.3). The structure consists of 4 identical antenna elements, with each element placed orthogonal to its adjacent element on the top of the substrate. The partial ground plane with circular slots is utilized on the back of the substrate. The antenna is simulated using CST Microwave Studio. Simulated S11<-10dB, in the entire operating band (2.9 -12.9 GHz) and the isolation among the elements is observed to be less than -20 dB in most of the band. Maximum gain of 4.82dB is observed at center frequency (7.9 GHz). VSWR<2 is present throughout the band. The impedance bandwidth of 126.58% shows its candidature for many wireless UWB communication applications.

Keywords: Four-Element UWB-MIMO Antenna, Orthogonal, Plus-sign Stub, High Isolation.

References:

  1. Yan-Yan Liu, Zhi-Hong Tu, “Compact Differential Band-Notched Stepped-Slot UWB-MIMO Antenna with Common-Mode Suppression”, IEEE Antennas and Wireless Propagation Letters, 2016.
  2. Ahmed A. Ibrahim, Mahmoud A. Abdalla, John L. Volakis, “4 Elements UWB MIMO Antenna for Wireless Applications”, Antennas and propagation and USNC/URSI National Radio Science Meeting IEEE Symposium, 19 October 2017.
  3. –L. Liu, Z.–D. Wang, Y.–Z. Yin, J. Ren, and J.–J. Wu, “A Compact Ultrawideband MIMO Antenna Using QSCA for High Isolation”, IEEE Antennas and Wireless Propagation Letters, pp no. 1497 – 1500, vol.13, 17 July 2014.
  4. Deepika Sipal, Mahesh P. Abegaonkar, and Shiban Kishen Koul, “Easily Extendable Compact Planar UWB MIMO Antenna Array”, IEEE Antennas and Wireless Propagation Letters, Vol. 16, 2017.
  5. Yashika, Monika Sharma, Sachin Sharma, Kumar Goodwill, Jagannath Malik, “A CPW Fed Antenna Design for UWB-MIMO Communication System for High isolation” , International Conference on Innovative Applications of Computational Intelligence on Power, Energy and Controls with their Impact on Humanity (CIPECH14) 28 & 29 November 2014.
  6. P Naveen Kumar Reddy, S Anuradha, “A Compact Four Element UWB MIMO Antenna” , International Conference on Trends in Electronics and Informatics ICEI 2017.
  7. Saleem, M. Bilal, K.B. Bajwa and M.F. Shafique, “Eight-element UWB-MIMO array with three distinct isolation mechanisms”, ELECTRONICS LETTERS, Vol. 51 No. 4 pp. 311–313, 19th February 2015.
  8. Qian Li, Alexandros P. Feresidis, Marina Mavridou, and Peter S. Hall, “Miniaturized Double-Layer EBG Structures for Broadband Mutual Coupling Reduction Between UWB Monopoles”, IEEE Transactions on Antenna and Propagation, Vol. 63, No. 3, March
  9. Jianfeng Zhu, Shufang Li, Botao Feng, Li Deng, and Sixing Yin, “Compact Dual-Polarized UWB Quasi-Self-Complementary MIMO/Diversity Antenna With Band-Rejection Capability”, IEEE Antennas and Wireless Propagation Letters, Vol. 15, 2016.

17-20

http://blueeyesintelligence.org/2checkout_download.html

5.

Authors:

Awanit Kumar, Abdul Hamid Qureshi

Paper Title:

New Bot Technologies Need To Automated or Augmented by Artificial Intelligence

Abstract: Chatbot’s are Natural language processing system based artificial intelligence systems that we interact with via text or voice interface like Apple siri or Google voice. World are now considering how best to apply new Bot technologies to their business to provide customers services, and their way to think about which types of work can be automated or augmented by Artificial Intelligence solutions for such problems. In this paper we are going to design a Chatbot for companies which can reduce human efforts (person who communicate customer by chatting other than voice process). Chatbot, are a hot topic and many companies are hoping to develop bots to have natural conversations indistinguishable from human ones, and many are claiming to be using. Natural language processing and Deep Learning techniques are used to make this possible.

Keywords: Chatbot, Artificial Intelligence, Natural Language Processing, Machine Learning, Deep Learning.

References:

  1. https://chatbotslife.com/ultimate-guide-to-leveraging-nlp-machine-learning-for-you-chatbot-531ff2dd870c
  2. https://towardsdatascience.com/chatbots-vs-reality-how-to-build-an-efficient-chatbot-with-wise-usage-of-nlp-77f41949bf08
  3. https://chatbotsmagazine.com/contextual-chat-bots-with-tensorflow-4391749d0077
  4. https://www2.deloitte.com/insights/us/en/focus/tech-trends/2017/moving-beyond-artificial-intelligence.html
  5. https://chatbotsmagazine.com/what-is-the-working-of-a-chatbot-e99e6996f51c
  6. https://medium.com/@gk_/how-chat-bots-work-dfff656a35e2
  7. https://blog.statsbot.co/chatbots-machine-learning-e83698b1a91e
  8. https://blog.statsbot.co/text-classifier-algorithms-in-machine-learning-acc115293278
  9. https://github.com/facebookresearch/InferSent
  10. https://github.com/facebookresearch/fastText

21-23

http://blueeyesintelligence.org/2checkout_download.html

6.

Authors:

Angira Sengupta, Avirup Saha, Saugata Roy, Mekhala Mitra, Rupayan Mallick, Avik Denra, Sayantan Adak, Monal Dutta

Paper Title:

Elaboration of Different Pore Blocking Model for Phenol Removal using Disk Shaped Ceramic Membrane

Abstract: Membrane fouling is mainly associated with the deposition of solute molecules on the membrane surface. The performance of a given membrane is found to be degraded due to membrane fouling and hence it results into a significant decline in the permeate flux. Therefore it is very necessary to interpret the fouling mechanism in order to predict the profile of permeate flux. The present study illustrates the mechanism of membrane fouling through describing four pore blocking models such as complete pore blocking, standard pore blocking, intemediate pore blocking and cake filtration. The model parameters were also evaluated at varying trans-membrane pressures ranging from 196 to 392 kPa. The accuracy of the fitted model was further judged in terms of higher value of regression coefficient (R2) and here also it is confirmed from Table 1 that cake filtration model exhibits higher values of R2 (≈ 0.98). The degree of membrane fouling was indicated by model parameter k. The values of permeate fluxes calculated from different models are found to be less than the experimental values of the permeate flux indicating the under prediction of flux profile.

Keywords: Concentration Polarization, Fouling, Membrane, Permeate Flux, Pore Blocking.

References:

  1. Baghbanzadeh, D. Rana, C. Q. Lan, T. Matsuura, “Effects of hydrophilic silica nanoparticles and backing material in improving the structure and performance of VMD PVDF membranes”, Separation and Purification Technology, vol. 157, pp. 60–71, 2016.
  2. Mehrdad, W. Daniel, S. A. Kikavous, E. Larisa, P. Laura, M. Peter, B. Peter, C. Peter, “Investigations on the use of different ceramic membranes for efficient oilfield produced water treatment”, Desalination, vol. 250, no. 3, pp. 991-96, 2010.
  3. R. Ahmadun, A. Pendashteh, L. C. Abdullah, D. R. A. Biak, S. S. Madaeni, Z. Z. Abidin, “Review of technologies for oil and gas produced water treatment”, Journal of Hazardous Materials, vol. 170, no. 2-3, pp. 530–551, 2009.
  4. Xiong, A. L. Zydney, M. Kumar, “Fouling of microfiltration membranes by flow back and produced waters from the Marcellus shale gas play”, Water Research, vol. 99, pp. 162-170, 2016.
  5. Jin, Y. Ju, H. Lee, S. Hong, “Fouling potential evaluation by cake fouling index: Theoretical development, measurements, and its implications for fouling mechanisms”, Journal of Membrane Science, vol. 490, pp. 57–64, 2015.
  6. Wandera, S. R. Wickramasinghe, S. M. Husson, “Modification and characterization of ultrafiltration membranes for treatment of produced water”, Journal of Membrane Science, vol. 373, pp. 178-188, 2011.
  7. Jacob, M. Y. Jaffrin, “Purification of brown cane sugar solutions by ultrafiltration with ceramic membranes: investigation”, Seperation Science and Technology, vol. 35, no. 7, pp. 989.
  8. Mondal S.; S. R. Wickramasinghe, “Produced water treatment by nanofiltration and reverse osmosis membranes”, Journal of Membrane Science, vol. 322, no. 1, pp. 162-170, 2008.
  9. K. Nandi, B. Das, R. Uppaluri, M. K. Purkait, “Microfiltration of mosambi juice using low cost ceramic membrane”, J Journal of Food Engineering, vol. 95, no. 4, pp. 597-605, 2009.
  10. Jegatheesan, D.D. Phong, L. Shu, R. B. Aim, “Performance of ceramic micro- and ultrafiltration membranes treating limed and partially clarified sugar cane juice”, Journal of Membrane Science, vol. no. 1-2, pp. 69-77, 2009.
  11. Jegatheesan, L. Shu, D. D. Phong, Navaratna, Dimuth and Neilly, Adam, “Clarification and concentration of sugar cane juice through ultra, nano and reverse osmosis membranes”, Membrane water treatment, vol. 3, no. 2, pp. 99-111, 2012.
  12. Sim, L. Shu, V. Jegatheesan, D. D. Phong, “Effect of operating parameters and cleaning on the performance of ceramic membranes treating partially clarified sugar cane juice”, Separation Science and Technology, vol. 44, no. 15, pp. 3506-3537, 2009.
  13. Li, G. Ling, F. Lei, N. Li, W. Peng, K. Li, H. Lu, F. Hang, Y. Zhang, “Ceramic membrane fouling and cleaning during ultrafiltration of limed sugarcane juice”, Separation and Purification Technology, vol. 190, pp. 9–24, 2018.
  14. N. B. Elizaldea, S. Al-Gharabli, J. Kujawa, M. Mavukkandy, S. W. Hasan, H. A. Arafat, “Fabrication of blend polyvinylidene fluoride/chitosan membranes for enhanced flux and fouling resistance”, Separation and Purification Technology, vol. 190, pp. 68–76, 2018.
  15. Tang, Z. Zhang, X. Zhang, “New insight into the effect of mixed liquor properties changed by pre-ozonation on ceramic UF membrane fouling in wastewater treatment”, Chemical Engineering Journal, vol. 314, pp. 670–680, 2017.

24-27

http://blueeyesintelligence.org/2checkout_download.html

7.

Authors:

I. I. Sayyad, Gonjare Pranav Pramod, Joshi Shaunak Nitin, Dongare Varun Sanjay, Galdhar Rohit Dilip

Paper Title:

Design and Fabrication of Tablet Strips Counter and Shifter Machine

Abstract: The applications of conveyor are increasing day by day in the manufacturing industries due to its flexibility and accuracy in material handling. Industries like packaging and food processing uses conveyor for the rapid production and less power utilization in material handling. In general, only a single type of object likes tablets, bottles or trays are monitored and controlled on a single conveyor in pharmaceutical industries. The trays or boxes on the conveyor are to be stopped at the required station and material to be filled in the trays on conveyor. This can be done using the induction type proximity sensors and counters placed at different positions in the system. In given system, we have done the design and fabrication of semi-automatic tablet counting and shifting mechanism in belt conveyor used in the packaging and transportation system in tablet packaging for pharmaceutical industries. The number of trays/boxes to be filled by tablets can be transfer by using arrangements of proximity sensors and pneumatic locking along with counting system. The output packaging fixed can be easily altered in between the process.

Keywords: Tablets, Packaging, Counter, Pneumatic, Sensors, Belt Conveyor.

References:

  1. Tasnim F. Ariff, Muhd Fahmi B. Jusosh, Malek Parnin and Mohd. Hanif Azenan.., “Design improvements and Fabrication of Conveyor belt cleaner and washing system” International Journal of Education and Research. [Vol.1, Issue No.10, page no.(1-15),(2013)]
  2. Imran S. Khan, Prof. Ravichandra Gandhi, “Study and Analysis of Roller Conveyor in Material handling” [Vol.4, Issue No.8, page no. (724-728), (August, 2015)]
  3. Amol B Kharage, Prof. Balaji Nelge, Prof. Dhumal Ketan, “Analysis and optimization of Gravity Roller Conveyor Using ANSYS”. [Vol.4, Issue No.4, page no. (296-301), (April, 2015)]
  4. Yogesh Tanajirao Padwal, Mr. Satish M. Rajmane, Swapnil S. Kulkarni, “Design and Analysis of a Roller Conveyor for Weight Optimization and Material Saving”. [Vol.2, Issueno.7, page no. (138-140), (July, 2013)]
  5. Konkalla Naga Sri Ananth, Vaitla Rakesh, Potham settee Kasi Visweswarao, “Design and Selection of the Proper Conveyor-belt”. [Vol.3, Issueno.9, page no. (43-49), (August 2014)]
  6. Rohini N. Sangolkar, Vidhya dhar P. Kshirsagar, “Modelling And Analysis of Industrial Belt Conveyor Or System Using Creo-Parametric And ANSYS Software.”[Vol.3, Issueno.4, pageno. (178-181), (July-August 2015)]
  7. Vijay M. Patil, Nitesh kumar A .Vidya, Roshan L. Katkar, Piyush S. Pande, “Type of Conveyor System Used in the Machine.”[Vol.2, Issueno.12, page no. (305-307), (July, 2015)]
  8. K. Bhoyar, Dr. C .C. Handa, “Design Consideration of Adjustable Height and Radial Belt Conveyor System.”[Vol.4, Issueno.10, page no. (4377-4382), (October, 2013)]
  9. Alhande A. Algitta, Mustafa S, Ibrahim F, Abdalruof N, Yousef M, “Automated Packaging Machine Using PLC.”[Vol.2, Issueno.5, page no. (282-287), (May, 2015)]

28-33

http://blueeyesintelligence.org/2checkout_download.html

8.

Authors:

Niresh J., Abdul Samath A.

Paper Title:

A Novel Approach Development of Electrically Assisted Braking System

Abstract: This paper provides the means to effectively improve the braking system using BLDC controlled by microcontroller. Efficiency of the conventional mechanical braking is drastically influenced by friction, because of this friction due to braking, life of the brake followed by integrity of the system became compromised. To overcome this, normal braking is assisted using BLDC. Prototype is developed, and the parameters such as braking distance and braking time for various vehicle speed are measured and discussed.

Keywords: Critical Speed, Arduino Board, IR Sensor and DC Motor

References:

  1. Srinivasa rao and G. Kesevarao “Design and Implementation of Micro Controller Blugging Barking in electric/ hybrid electric vehicle
  2. Xiaoling He and Jeffery W.Hodgson, 2014“Modeling and Simulation for Hybrid Electric Vehicle Part-I Modeling” IEEE Transactions on Intelligent Transportation Systems,Volume3, Issue 4, p.p:235 – 243
  3. Abbas Shiri and Abbas Shoulaie. “End Effect Braking Force Reduction in High Speed Single-Sider Linear Induction Machine” Journal of EnergyConversion and Management, Volume 61, pp 43–50(2012).
  4. Fang Z.Peng,HuiLi,Gui-Jia Su and Jack Lawler.,2004“A New ZVS Bidirectional DC-DC Converter for Fuel Cell and Battery Application” IEEE transaction power electronics,Vol.19
  5. Jeongminkim,ChimanPark,SunghoHwang,Yoichi Hari and Hyunsoo Kim “Control Algorithm for an Independent Motor Drive Vehicle” Sep 2010,IEEE transaction on Vehicular Technology,Vol.59.
  6. Gewald,S.Karellas and A.Spliethoff., 2012 “Integrated Sysytem Approach for Increase of Engine Combined Cycle Efficiency” ELSEVIER on Energy conversion and Management.
  7. Ruimin Li and Geoffery Rose.,2011 “Incorporating Uncertainly into Short-Term Travel Time Predictions” Journal of Transportation Research, Part: c Emerging Technologies, Volume 19, Issue 6,pp 1006–1018.
  8. BakheiraTabbach,AbdelazizKheloui and Mohamed EI Hachemi Benbouzid.,2011“An adaptive Electric Differential for Electric Vehicle Motion Stabilization” IEEE Transaction on Vehicular Technology,Vol 60.
  9. AbdelfatahNasri,Abdeldjabar and Ismail Khali Bousserhane .,2009“Fuzzy Sliding Mode Speed Control for Two Wheels Electric Vehicle Drive” Journal of Electrical Engineering & Technology Vol.4, No. 4, pp. 499-509
  10. Abdel fatah Nasri, Brahim Gasbaou and Mohammed Fayssal.,2009“Sliding Mode Control Four Wheels Electric Vehicle Drive” Procedia Technology 22,pp 518 – 526.

34-37

http://blueeyesintelligence.org/2checkout_download.html

9.

Authors:

I.I.Sayyad, Makune Kanchan Karn, Landge Sakshi Sunil, Matade Kalyani Changdeo, More Swati Daulat

Paper Title:

Double Helical Spiral Mixer

Abstract: Recent advances in mixer and blender designs have contributed to the growing success of food companies, meeting their requirement for consistency and developing new products while also lowering production costs. This paper discusses both traditional and new specialty mixing technologies available to food manufacturers today. Phase and viscosity are used to classify different mixing categories. Sample applications are presented as well to illustrate certain processing challenges and the mixing technologies used to resolve them.[In conventional method of mixing the metal oxide powder and vehicle mixing is carried out on ‘Unidirectional Stirring Machine’ The stirrer of conventional machine rotates in one direction only which creates a particular flow pattern in the fluids hence the particles tend to stick to the walls of container owing to the centrifugal force rather than mixing thoroughly in mixture of paint, ultimately results into poor quality mixture of paints there by poor quality output of paint]

Keywords: Spiral Blades, Bidirectional Motion, Pneumatic Ram, Planetary Mixer.

References:

  1. raghunath Rajaput, Mr. Tamboli Najirkhan, Prof, S.T. Waghmode, “Bi-Directional Mixer”, International Journal of Innovations in Engineering Research and Technology, Volume 2,Issue-4 Apr (2015 ) 1-13.
  2. Maria Cristna Valigi, Silvia Logozzo, Mirko Rinchi, “Wear Resistance of Blades in Planetaey concrete Mixers, Desing of a New Improved Blade Shape and 2D Validation”, Tribology International 96(2016) 191-201.
  3. Hans Lokke, Ad M.J Ragas, Martin Holmstrup, “Tool and Perspectives for assessing Chemical Mixtures and Multiple Stressors”, Toxicology 313(2013) 73-82.
  4. Amruta K.Wankhede, Dr. A. R.sahu, “Desing, Modification and Analysis of Concrete Mixer Machine”, International Journal on Recent and Innovation Trends in Computing and communication, Volume 3,Issue 12,6613-6616.
  5. Sachin n.waghmare, Suraj P.Mail, Pranav S.Nalawade, Digambar A. Mohit,Pranil D.Salunke,”Design and Analysis of Electrically powered mixer for phenyl”, International Journal of advanced technology in engineering and science, volume ª,Issue No-1 March 2016.
  6. Jadish M.Chahande, Dr. A. V. Vanalkar, V.D. Dhopte, “Methodology for Desing and Fabrication of planetary mixer for preparing cake cream”, IJSRD, Volumeª, issue 01,2015

38-42

http://blueeyesintelligence.org/2checkout_download.html

10.

Authors:

Sheena Latif, Savier J. S.

Paper Title:

An Overview and Implementation of Control Strategies Adopted with DVR in DFIG based Wind Farms

Abstract: Doubly Fed Induction Generators have become popular among renewable energy technology associated with wind farms in distribution systems. The Grid Code requirements on LVRT capability of grid connected DFIG systems have gained attention during last few decades. Dynamic Voltage Restorer has emerged as one of the promising, reliable and stable solution for enhancing LVRT capability of grid connected wind generators in many countries. A state of the art review is presented in this paper on the various control strategies adopted in DVR connected DFIG wind farms by various researchers. A MATLAB Simulink based DFIG wind farm is analysed with symmetric and asymmetric faults and PID controller based DVR is implemented as a solution to enhance the LVRT capability of the system. The active and reactive power flow as well as voltage during fault period is restored and compensated successfully.

Keywords: DFIG, DVR, LVRT, Controller, etc.

References:

1. Muller, M. Deicke, Rik.W, De Doncker, Doubly fed Induction Generator Systems for Wind Turbines – A Viable Alternative to Adjust Speed over a wide Range of Minimal Cost, IEEE Industry Applications Magazine, May/June 2002
2. Tapia, G Tapia, J.X Ostolaza, J.R Saenz, Modeling and control of a wind turbine driven doubly fed induction generator, IEEE Transactions on Energy Conversion, Vol.18, Issue 2, June 2003
3. P. Ledesma, J. Usaola, Doubly fed Induction generator model for transient stability Analysis, IEEE Transactions on Energy Conversion, Vol.20, Issue.2, June 2005
4. Alvaro Luna, F.K.A Lima, David Santos, Pedro Rodriguez, Edson H. Watanabe, Santiago Arnaltes, Simplified Modeling of a DFIG for Transient Studies in Wind Power Applications, IEEE Transactions on Industrial Electronics, Vol. 58, Issue 1, Jan 2011
5. Lie Xu, P. Cartwright, Direct Active and Reactive Power Control of DFIG for wind energy generation, IEEE Transactions on Energy Conversion, Vol.21, Issue 3, Sept.2006
6. Lie Xu, Yi Wang, Dynamic Modeling and Control of DFIG based Wind Turbines Under Unbalanced Network Conditions, IEEE Transactions on Power Systems, Vol 22, Issue1, Feb 2007
7. Indian Wind Grid Code, Centre for Wind Energy Technology, July 2009: niwe.res.in
8. Indian Electricity Grid Code, Central Electricity Regulatory Commission New Delhi
9. M. Tsili, S. Papathanassiou, A Review of Grid Code Technical Requirements for wind farms, IET Renewable Power Generation, Vol.3, Issue 3, Sep 2009, pp 308-332
10. Erlich, U. Bachmann, Grid Code requirements concerning connection and operation of wind turbines in Germany, Power Engineering Society General Meeting, 2005.IEEE, June 2005, USA
11. Sun Li ling, Yang Pu, Wang Yi, Simulayion Research for LVRT of DFIG based on rotor active crowbar protection, International Conference on Sustainable Power Generation and Supply (SUPERGEN 2012)
12. Ling Peng, Bruno Francois, Yongdong Li, Improved Crowbar Control Strategy of DFIG based Wind Turbines for Grid Fault Ride Through, Applied Power Electronics Conference and Exposition, 2009, Twenty Fourth Annual IEEE.
13. Anca D. Hansen, Gabriele Michalke, Fault Ride through capability of DFIG wind turbines, Renewable Energy, Vol 32, Issue 9, July 2007, pp- 1594-1610
14. Cristian Wessels, Friedrich W. Fuchs, Fault Ride through of DFIG wind turbines during symmetrical voltage dip with crowbar or stator current feedback solution, Energy Conversion Congress and Exposition (ECCE), 2010 IEEE, Sep 12-16
15. H.L Zhou, G.Yang, D.Y. Li, Short Circuit current analysis of DFIG wind turbines with crowbar protection, International Conference on Electrical Machines and Systems, 2009, ICEMS, Nov 15-18 2009
16. Graham Pannell, David J. Atkinson, Bashar Zahawi, Minimum –Threshold crowbar for a fault ride through grid code compliant DFIG wind turbine, IEEE Transactions on Energy Conversion, Vol 25, Issue 3, Sep 2010, pp- 750-759
17. Xiangwu Yan, Giri Venkataramanan, Yang Wang, Grid fault tolerant operation of DFIG wind turbine generator using passive resistance network, Energy Conversion Congress and Exposition (ECCE), 2009 IEEE, Sep 20-24.
18. M.Rahimi, M. Parniani, Efficient control scheme of wind turbines with doubly fed induction generator for low voltage ride through capability enhancement, IET Renewable Power Generation, Vol. 4, Issue 3, May 2010, pp- 242-252
19. Wang Hong Fu, Lin Guoqing, Qiu Jaiju, Cao Jun, Improvement of low voltage ride through capability of wind farms by use of series dynamic braking resistors, Automation of Electric power systems, 2008-2018, www.cnki.com.cn
20. Kenneth E. Okedu, S.M Muyeen, Rion Takahashi, Junji Tamura, Wind farms fault ride through using DFIG with New Protection Scheme, IEEE Transactions on Sustainable Energy, Vol 3, Issue 2, April 2012, pp- 242-254
21. Dongliang Xie, Zhao Xu, Lihui Yang, Jacob Ostergaard, Yusheng Xue, Kit Po Wong, A Comprehensive LVRT Control Strategy for DFIG Wind Turbines with Enhanced Reactive Power Support, IEEE Transactions on Power Systems, Vol.28, Issue 3, Aug 2013, pp-3302-3310
22. Hadi El-helw, Ahmed Khaled, Comparison study between two dynamic braking resistor techniques in protecting the doubly fed induction generator, Environment and Electrical Engineering (EEEIC), 2013 12th International Conference, May 508 2013
23. Mohsen Rahimi, Mostafa Parniani, Coordinated Control Approaches for low voltage ride through enhancement in wind turbines with doubly fed induction generators, IEEE Transactions on Energy Conversion, Vol.25, Issue.3, Sept. 2010, pp-873-883.
24. M. Jahangir Hossain, Tapan Kumar Saha, Nadarajah Mithulananthan, Hemanshu R.Pota, Control Strategies of Augmenting LVRT Capability of DFIGs in Interconnected Power Systems, IEEE Transactions on Industrial Electronics, Vol.60, Issue.6, June 2013, pp- 2510-2522.
25. Qingjun Huang, Xudong Zou, Donghai Zhu, Yong Kang, Scaled Current Tracking Control for Doubly fed Induction Generator to ride through serious grid faults, IEEE Transactions on Power Electronics Vol. 31, Issue 3, March 2016, pp- 2150-2165
26. Shuai Xiao, Geng Yang, Honglin Zhou, Hua Geng, An LVRT Control Strategy based on flux Linkage Tracking for DFIG based WECS, IEEE Transactions on Industrial Electronics, Vol.60, Issue 7, July 2013, pp 2820-2832
27. Sheng Hu, Xinchun Lin, Yong Kang, Xudong Zou, An Improved Low Voltage Ride Through Control Strategy of Doubly fed Induction Generator during grid faults, IEEE Transactions on Power Electronics, Vol.26, Issue.12, Dec 2011, pp-3653-3665
28. A.H.M.A Rahim, E.P Nowicki, Supercapacitor energy storage system for fault ride through of a DFIG wind generation system, Energy Conversion and Management, Vol.59, July 2012, pp-96-102
29. Wenyong Guo, Liye Xiao, Shaotao Dai, Enhancing Low voltage ride through capability and smoothing output power of DFIG with a super conducting fault current limiter – Magnetic Energy Storage System, IEEE Transactions on Energy Conversion, Vol.27, Issue 2, June 2012, pp-277-295
30. Ahmad Khajeh, Reza Ghazi, Control of DFIG Wind Turbines based on Indirect Matrix Converters in Short Circuit Mode to Improve LVRT Capability, Advances in Power Electronics, Vol.2013, 11 pages
31. Yasser M. Alharbi, A.M Shiddiq Yunus, A. Abu Siada, Application of UPFC to improve the LVRT capability of wind turbine generator, Power Engineering Conference (AUPEC), 2012 22nd Australian Universities, 26-29 Sept
32. A.F Abdou, a. Abu Siada, H.R Pota, Application of STATCOM to improve the LVRT of DFIG during RSC fire through fault, Power Engineering Conference (AUPEC), 2012 22nd Australian Universities, 26-29 Sept
33. Christian Wessels, Fabian Gebhardt, Friedrich Wilhelm Fuchs, Fault ride through of a DFIG Wind Turbine using a Dynamic Voltage Restorer during symmetrical and asymmetrical grid faults, IEEE Transactions on Power Electronics, Vol.26, No.3, March 2011, pp-807-815
34. M.Kenan, A new approach for low voltage ride through capability in DFIG based wind farms, Electric Power and Energy systems, 83(2016), 251-258
35. J.G Nielsen, F. Blaabjerg, N.Mohan, Control Strategies for dynamic voltage restorer for compensating voltage sags with phase jump, Applied Power Electronics Conference and Exposition, 2001, Sixteenth annual IEEE, 4-8 March
36. H.K l Hadidi, A.M Gole, David A. Jacobson, A Novel Configuration for a Cascade Inverter-Based Dynamic Voltage Restorer With Reduced Energy Storage Requirements, IEEE Transactions on Power Delivery, Vol.23, Issue 2, April 2008, pp 881-888
37. N.H Woodey, L. Morgan, A.Sundaram, Experience with an inverter-based dynamic voltage restorer, IEEE Transactions on Power Delivery, Vol.14, Issue 3, July 1999,pp-1181-1186
38. P. Daehler, R. Affolter, Requirements and solutions for dynamic voltage restorer, a case study, Power Engineering Society Winter Meeting, 2000, IEEE Jan.23-27
39. R. Strzelecki, G. Benysek, Control strategies and comparison of the Dynamic Voltage Restorer, Power Quality and Supply Reliability Conference, 2008, 27-29 Aug
40. Etxeberria Otadui, U. Viscarret, S. Bacha, M. Caballero, R. Reyero, Evaluation of different strategies for series voltage sag compensation, Power Electronics Specialist Conference, 2002, June 23-27
41. Hyosung Kim, Seung Ki Sui, Compensation voltage control in dynamic voltage restorers by use of feed forward and state feedback scheme, IEEE Transactions on power Electronics, Vol. 20, Issue 5, Sep.2005, pp 1169-1177
42. Wang Jing, Xu Aiqin, Shen Yueyue, A survey on control strategies of dynamic voltage restorer, Harmonics and Quality of Power, 2008, ICHQP, 13th International Conference, 28 Sept.-1st Oct 2008.
43. Su Chen, G. Joos, L.Lopes, Wennan Guo, A nonlinear control method of dynamic voltage restorers, Power Electronics Specialists Conference, 2002, PESC, 23-27 June
44. Fawzi AL Jowder, Modeling and Simulation of Dynamic Voltage Restorer (DVR) Based on Hysteresis Voltage Control, Industrial Electronics Society, IECON , 33rd Annual Conference of IEEE, 5-8 Nov.2007
45. Anita Pakharia, Manoj Gupta, Dynamic Voltage Restorer For Compensation Of Voltage Sag And Swell: A Literature Review, International Journal of Advances in Engineering & Technology, Vol.4, Issue 1, July 2012, pp-347-355
46. CH Srisailam, A Sreenivas, Mitigation Of Voltage Sags/Swells By Dynamic Voltage Restorer Using Pi And Fuzzy Logic Controller, International Journal of Engineering Research and Applications, Vol.2, Issue 4, july-August 2012, pp 1733-1737
47. Mahmoud A. El-Gammal , Amr Y. Abou-Ghazala , and Tarek I. El-Shennawy, Dynamic Voltage Restorer (DVR) for Voltage Sag Mitigation, International Journal on Electrical Engineering and Informatics ‐ Volume 3, Number 1, 2011
48. Ahmad O. Ibrahim, Thanh Hai Nguyen, Dong-Choon Lee, Su-Chang Kim, Ride-through Strategy for DFIG Wind Turbine Systems Using Dynamic Voltage Restorers, IEEE Conference, 2009
49. Andres E Leon, Marcelo F. Farias, Pedro E. Battaiotto, Maria Ines Valla, Control Strategy of a DVR to Improve Stability in Wind Farms Using Squirrel-Cage Induction Generators, Article in IEEE Transactions on Power Systems 26(3):1609-1617 • August 2011 
50. M Venmathi, Soumyadeep Chakraborti , Soham Ghosh , Abhirup Ray , Vidhya Nikam, Mitigation Of Voltage Sag in a DFIG Based Wind Turbine Using DVR, International Journal of Engineering Research and Applications (IJERA),National Conference on Emerging Trends in Engineering & Technology (VNCET-30 Mar’12)
51. Kyung-Min Jin, Quach Ngoc Thinh, Eel-Hwan Kim, DVR Control ofDFIG for Compensating Fault RideThrough Based on Stationary and Synchronous Reference Frame, 2012 IEEE 7th International Power Electronics and Motion Control Conference - ECCE Asia June 2-5, 2012, Harbin, China
52. Quach Ngoc Thinh*․Ji-Han Ko․Dong-Wan Kim․Eel-Hwan Kim, A DVR Control for Compensating Unbalanced Voltage Dips of a DFIG System using Zero Sequence Components, Journal of the Korean Institute of IIIuminating and Electrical Installation Engineers (2013) 27(2):62-68
53. El Hawatt M.S. Hamad K.H. Ahmed I.F. El Arabawy, Low Voltage Ride-Through Capability Enhancement of a DFIG Wind Turbine Using a Dynamic Voltage Restorer with Adaptive Fuzzy PI Controller, International Conference on Renewable Energy Research and Applications Madrid, Spain, 20-23 October 2013
54. Jun Yao, Hui Li, Zhe Chen, Xianfeng Xia, Xiyin Chen, Qing Li, and Yong Liao, Enhanced Control of a DFIG-Based Wind-Power Generation System With Series Grid-Side Converter Under Unbalanced Grid Voltage Conditions, IEEE Transactions On Power Electronics, Vol. 28, No. 7, July 2013,pp 3167-3181
55. Xia Chen, Linfang Yan, Xin Zhou and Haishun Sun, A Novel DVR-ESS-embedded Wind-energy Conversion System, , IEEE Transactions on Sustainable Energy , 2017,pp 1-9
56. Ali Darvish Falehi, Mansour Rafiee, Maximum efficiency of wind energy using novel Dynamic Voltage Restorer for DFIG based Wind Turbine, Energy Reports 4(2018), pp 308-322

43-61

http://blueeyesintelligence.org/2checkout_download.html

11.

Authors:

Nidhi Chawla, Vikram Singh

Paper Title:

A Novel Video Watermarking Scheme Based on DWT and PCA

Abstract: Digital Video Watermarking is one of the great applications of hiding the data in the video for many kind of application like copyright information hiding, secure data travelling etc. Various watermarking techniques are popular in the research community e.g. Discrete wavelet transform (DWT), Discrete cosine transform (DCT), Principal component analysis (PCA). In this paper, Video Water Marking (VWM) scheme related to DWT and PCA is used.DWT and PCA are utilized in the proposed algorithm which enhances the watermarking embedding and decrypting technique. An Arnold’s cap map method has been introduced in the DWT mechanism due to which the algorithm become more robust and difficult for the attackers. Data are embedded in the LL –HH sub-band of wavelet coefficients and decoding is encountered based on difference and comparison of elements of the first principal component. The resultant video is unsusceptible to much kind of attacks like uniform, Gaussian Noise and Median Filtering.

Keywords: Principal Component Analysis (PCA), Watermarking, Frame Extraction, Discrete Wavelet transform (DWT), Visual Saliency.

References:

  1. Hsu and J. L. Wu, “DCT-based watermarking for video,” IEEE Trans. Consumer Electron, vol. 44, no. 1, pp. 206–216, Feb. 1998.
  2. Young-Yoon, J. Han-Seung, and L. Uk, “3D DFT-based video watermarking using perceptual models,” in Proc. IEEE 46th Midwest Symp. Circuits Syst., vol. 3. Dec. 2003, pp. 1579–1583.
  3. Park, S. H. Lee, and Y. S. Moon, “Adaptive video watermarking by utilizing video characteristics in 3D-DCT domain,” in Lecture Notes in Computer Science, vol. 4283. New York, NY, USA: Springer-Verlag, Nov. 2006, pp. 397–406.
  4. Campisi and A. Neri, “Perceptual video watermarking in the 3D-DWTdomain using a multiplicative approach,” in Lecture Notes in computer science, vol. 3710. New York, NY, USA: Springer-Verlag, Sep. 2005, pp. 432–443.
  5. Khalilian, S. Ghaemmaghami, and M. Omidyeganeh, “Digital video watermarking in 3D ridgelet domain,” in Proc. 11th ICACT, vol. 3. Feb2009, pp. 1643–1646.
  6. Houmansadr, H. Pirsiavash, and S. Ghaemmaghami, “Robust content-based video watermarking exploiting motion entropy masking effect,”inProc. Int. Conf. Signal Process. Multimedia Appl., Aug. 2006, pp. 252–259.
  7. Huang, C. Yang, and W. Hsu, “A video watermarking technique based on pseudo-3D DCT and quantization index modulation,” IEEE Trans.Inf. Forensics Security, vol. 5, no. 4, pp. 625–637, Dec. 2010.
  8. Khalilian and I. V. Bajic, “Multiplicative video watermarking with semi-blind maximum likelihood decoding for copyright protection,”inProc. IEEE Pacific Rim Conf. Commun., Comput. Signal Process., Aug. 2011, pp. 125–130.
  9. Koz and A. Alatan, “Oblivious spatiotemporal watermarking of digital video by exploiting the human visual system,” IEEE Trans.Circuits Syst. Video Technol., vol. 18, no. 3, pp. 326–337, Mar. 2008.
  10. Deguillaume, G. Csurka, J. O’Ruanaidh, and T. Pun, “Robust3D DFT video watermarking,” Proc. SPIE, vol. 3657, pp. 113–124, Jan. 1999.
  11. Hartung and B. Girod, “Watermarking of uncompressed and compressed video,” Signal Process., vol. 66, no. 3, pp. 283–301, May 1998.
  12. Simitopoulos, S. Tsaftaris, N. Boulgouris, and M. Strintzis,“Compressed-domain video watermarking of MPEG stream,” in Proc. IEEE ICME, Aug. 2002, pp. 569–572.
  13. Noorkami and R. M. Mersereau, “Digital video watermarking in P-frames with controlled video bit-rate increase,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 441–455, Sep. 2008.
  14. Golikeri, P. Nasiopoulos, and Z. J.Wang, “Robust digital video watermarking scheme for H.264 advanced video coding standard,” J. Electron.Imaging, vol. 16, no. 4, pp. 043008-1–043008-14, Dec. 2007.
  15. Shahid, M. Chaumont, and W. Puech, “Spread spectrum-based watermarkingforTardos code-based fingerprinting of H.264/AVC video,” inProc. IEEE ICIP, Sep. 2010, pp. 2105–2108.
  16. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich, and T. Kalker, Digital Watermarking and Steganography, 2nd ed. San Mateo, CA, USA: Morgan Kauffman, 2008.
  17. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and applications of Digital Watermarking and Content Protection. Norwood, MA, USA: Artech House, 2003.
  18. A. P. Petitcolas and S. Katzenbeisser, Information Hiding: Techniques for Steganography and Digital Watermarking. Norwood, MA, USA:Artech House, 2000.
  19. A. Akhaee, N. Kalantari, and F. Marvasti, “Robust audio and speech watermarking using Gaussian and Laplacian modeling,” Signal Process., vol. 90, no. 8, pp. 2487–2497, Aug. 2009.
  20. A. Akhaee, S. M. E. Saheaeian, and F. Marvasti, “Contourletbased image watermarking using the optimum detector in a noisy environment, ”IEEE Trans. Image Process., vol. 19, no. 4, pp. 967–980, Apr. 2010.
  21. A. Akhaee, S. M. E. Saheaeian F. Marvasti, and B. Sankur, “Robust scaling-based image watermarking technique using maximum likelihood decoder with optimum strength factor,” IEEE Trans. Multimedia, vol. 11, no. 5, pp. 822–833, Aug. 2009.
  22. Shieh, D. Lou, and M. Chang, “A semi-blind digital watermarking scheme based on singular value decomposition,” Comput. Stand. Inter., vol. 28, no. 4, pp. 428–440, Apr. 2006.
  23. Q. Pham, T. Miyaki, T. Yamasaki, and K. Aizawa, “Geometrically invariant object based watermarking using SIFT feature,” in Proc. IEEE TIP, vol. 5. Oct. 2007, pp. 473–476.
  24. -J. Shen and J.-M.Ren, “A robust associative watermarking technique based on vector quantization,” Digit. Signal Process., vol. 20, no. 5, pp. 1408–1423, Sep. 2010.
  25. Boato, F. G. B. De Natale, and C. Fontanari, “An improved asymmetric watermarking scheme suitable for copy protection,” IEEE Trans.Signal Process., vol. 54, no. 7, pp. 2833–2834, Jul. 2006.
  26. Lai and C. Tsai, “Digital image watermarking using discrete wavelet transform and singular value decomposition,” IEEE Trans. Instrum. Meas., vol. 59, no. 11, pp. 3060–3063, Nov. 2010.
  27. Z. Liu and T. N. Tan, “An SVD-based watermarking scheme for protecting rightful ownership,” IEEE Trans. Multimedia, vol. 4, no. 1, pp. 121–128, Mar. 2002.
  28. Wang, J. F. Doherty, and R. E. Van Dyck, “A wavelet-based watermarking algorithm for ownership verification of digital images,” IEEE Trans. Image Process., vol. 11, no. 2, pp. 77–88, Feb. 2002.
  29. S. Faragallah, “Efficient video watermarking based on singularvalue decomposition in the discrete wavelet transform domain,” Int.J. Electron.Commun., vol. 67, no. 3, pp. 189–196, Mar. 2013.
  30. Salwa A.K Mostafa, A. S. Tolba, F.M. Abdelkader, Hisham M. Elhindy, Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009.
  31. Reyes, C. Cruz, M. Nakano-Miyatake, Member IEEE and H. Perez-Meana, Senior Member IEEE, Digital Video Watermarking in DWT Domain Using Chaotic Mixtures, IEEE Latin America Transactions, VOL. 8, NO. 3, June 2010.
  32. Xiaoli Li, Student Member, IEEE, Sridhar (Sri) Krishnan, Senior Member, IEEE, and Ngok-Wah Ma, Senior Member, IEEE, A Wavelet-PCA-Based Fingerprinting Scheme for Peer-to-Peer Video File Sharing, IEEE Transactions on Information Forensics and Security, VOL. 5, NO. 3, September 2010.
  33. Xiangui Kang, Jiwu Huang, Senior Member, IEEE, Yun Q. Shi, Senior Member, IEEE, and Yan Lin, A DWT-DFT Composite Watermarking Scheme Robust to Both Affine Transform and JPEG Compression, IEEE Transactions on Circuits and Systems for Video Technology, VOL. 13, NO. 8, August 2003.
  34. Ranjana Sinha, Prajnat Bardhan, Swarnali Pramanick, Ankul Jagatramka, Dipak K. Kole, Arun Chakraborty, Department of Computer Science & Engineering, St Thomas’ College of Engineering and Technology, Kolkata, India, Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis, International Journal of Wisdom Based Computing, Vol. 1 (2), August 2011.
  35. Nisreen I. Yassin1, Nancy M. Salem2, and Mohamed I. El Adawy National Research Centre, Cairo, Egypt, Block-Based Video Watermarking Scheme Using Wavelet Transform and Principal Component Analysis, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012.
  36. K. Amirgholipour, A. R. Naghsh-Nilchi: Robust Digital Image Watermarking Based on Joint DWT-DCT, International Journal of Digital Content Technology and its Applications Volume 3, Number 2, pp. 42-54, June 2009.
  37. Martin Zlomek, Charles University in Prague, Faculty of Mathematics and Physics, Department of Software and Computer Science Education, Video Watermarking.
  38. Chandra, S. Pandey: A DWT Domain Visible Watermarking Techniques for Digital Images, International Conference on Electronics and Information Engineering, pp. V2-421 - V2-427, 2010.
  39. Peterson, Linear Algebra, Arnold’s cat map,1997.

62-68

http://blueeyesintelligence.org/2checkout_download.html

12.

Authors:

Nidhi Chawla, Vikram Singh

Paper Title:

A Review of DWT and PCA based Digital Watermarking Schemes

Abstract: Video watermarking is an important issue to encrypt intellectual property information for the data creators. Increasing data exchange over the internet also enhancing the probability of piracy and attacks on the encrypted/watermarked video. This problem is encouraging the research community to work over the robust watermarking algorithm which provides ideally attack free watermarked video with the quality maintenance of the video. The Video watermarking techniques using Discrete Wavelet Transform (DWT) or Principal Component Analysis (PCA) played a vital role to develop enhanced algorithm to develop the digital watermarking techniques since the last decade. In this paper, a rigorous literature survey has been done to understand the new possible trends in digital watermarking. An investigation of DWT, PCA, and other possible techniques has been done. The possible attacks also discussed along with a survey to understand the robustness of the proposed algorithm of watermarking. This study and survey provide a better way to understand the new areas and scope of research to the researchers.

Keywords: DWT, PCA, DCT, Watermarking, Attacks

References:

  1. Hsu and J. L. Wu, “Hidden Digital Watermarks in Images” IEEE Transactions on image processing, vol. 8, no. 1, January 1999.
  2. Biswas, S.R. Das, and E.M. Petriu, “An Adaptive Compressed MPEG-2 Video Watermarking Scheme” IEEE Transactions on Instrumentation and Measurement, vol. 54, no. 5, October 2005.
  3. Noorkami and R.M. Mersereau, “Digital Video Watermarking in P-Frames with Controlled Video Bit-Rate Increase” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, September 2008.
  4. Reyes, C. Cruz, M. N. Miyatake and H. P. Meana, “Digital Video Watermarking in DWT Domain using Chaotic Mixtures” IEEE Latin America Transactions, vol. 8, no. 3, June 2010.
  5. Y. Huang, C.H. Yang, and W.H. Hsu, “A Video Watermarking Technique Based on Pseudo-3-D DCT and Quantization Index Modulation” IEEE Transactions on Information Forensics and Security, vol. 5, no. 4, December 2010.
  6. C. Lai and C.C. Tsai, “Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition” IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 11, November 2010.
  7. T. Huang, S.Y. Tan, Y.J. Chang, C.H. Chen, “A Robust Watermarking Technique for Copyright Protection Using Discrete Wavelet TransformWSEAS Transactions on Computers, vol 5 Iss 9, 2010, pp:485-495
  8. R. Keyvanpour, F.M. Bayat, “Robust Dynamic Block-Based Image Watermarking in DWT Domain” Procedia Computer Science 3 (2011) 238–242.
  9. Khalilian and I.V. Bajic, “Video Watermarking with Empirical PCA Based Decoding” 2013 IEEE.
  10. Sharma and A. Tiwari, “A Hybrid technique of Video Watermarking in Wavelet domain and Scan based Encryption Method” 2014 IJEDR | Volume 2, Issue 3 | ISSN: 2321-9939.
  11. Fallahpour, S. Shirmohammad, M.Semsarzadeh, and J. Zhao, “Tampering Detection in Compressed Digital Video Using Watermarking” IEEE Transactions on Instrumentation and Measurement, vol. 63, no. 5, May 2014.
  12. Chitrasen and T. Kashyap, “Digital Video Watermarking using DWT for Data Security” International Journal of Advanced Research in Computer and Communication EngineeringVol. 4, Issue 1, January 2015.
  13. Rajendhiran, J. Elavanthan, M. Vengadapathiraj, R. Vinothkumar and Dr. M. Saravanan, “Video watermarking algorithm for content authorization” International Journal of Science, Engineering and Technology Research (IJSETR) Volume 4, Issue 3, March 2015.
  14. Thind and S. Jindal, “A Semi-Blind DWT-SVD Video Watermarking” International Conference on Information and Communication Technologies (ICICT 2014).
  15. Asikuzzaman, Md. J. Alam, A.J. Lambert, and Mark R. Pickering, “Robust DT CWT Based DIBR 3D Video Watermarking using Chrominance Embedding” Transactions on Multimedia 2016, pp:1-16, 2016.
  16. Asikuzzaman and M. R. Pickering, “An Overview of Digital Video Watermarking” IEEE Transactions on Circuits and Systems for Video Technology 1051-8215 (c) 2016 IEEE.
  17. Kaur and A. K Gupta, “A Survey on Different Video Watermarking Techniques” International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 4 Issue 4 November 2014.
  18. Licks, R. Jordan “ON DIGITAL IMAGE WATERMARKING ROBUST TO GEOMETRIC TRANSFORMATIONS” IEEE, 0-7803-6297-7
  19. Dong, J.G. Brankov, N.P. Galatsanos, Y.Yang, and F.Davoine, “Digital Watermarking Robust to Geometric Distortions” IEEE Transaction on image processing, vol 14 no 12, 2005 pp:2140-2150.
  20. Biswas, S. R. Das, and E.M. Petriu, “An Adaptive Compressed MPEG-2 Video Watermarking Scheme”, IEEE transactions on instrumentation and measurement, vol. 54, no. 5, October 2005
  21. K. Su, J.J. Eggers, B. Girod,” Analysis of digital watermarks subjected to optimum linear filtering and additive noise” Elsevier, signal processing 81 (2001) pp: 1141-1175
  22. Majumder, S. Swarnalipi, S. Sarkar and S.Kumar Sarkar. A Novel Watermarking using Multiresolution SVD matrix. International Journal of Electrical, Electronics vol.1, Iss 2, 2012 pp.35-39.
  23. K. Amirgholipour, A. R. Naghsh-Nilchi: Robust Digital Image Watermarking Based on Joint DWT-DCT, International Journal of Digital Content Technology and its Applications Volume 3, Number 2, pp. 42-54, June 2009.
  24. Chandra, S. Pandey: A DWT Domain Visible Watermarking Techniques for Digital Images, International Conference on Electronics and Information Engineering, pp. V2-421 - V2-427, 2010.
  25. Salwa A.K Mostafa, A. S. Tolba, F.M. Abdelkader, Hisham M. Elhindy, Video Watermarking Scheme Based on Principal Component Analysis and Wavelet Transform, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.8, August 2009.
  26. Sanjana Sinha, PrajnatBardhan, SwarnaliPramanick, AnkulJagatramka, Dipak K. Kole, Arun Chakraborty,Department of Computer Science & Engineering, St Thomas’ College of Engineering and Technology, Kolkata, India, Digital Video Watermarking using Discrete Wavelet Transform and Principal Component Analysis, International Journal of Wisdom Based Computing, Vol. 1 (2), August 2011.
  27. Nisreen I. Yassin, Nancy M. Salem, and Mohamed I. El Adawy, “Block-Based Video Watermarking Scheme Using Wavelet Transform and Principal Component Analysis”, International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012, pp: 296-301
  28. ArashSaboori, S.AbolfazlHosseini, “A New Method For Digital Watermarking Based on Combination of DCT and PCA”, TELFOR 2014, pp: 521-524
  29. Anandkumar, Mukesh Gupta, “Semi visible Watermarking Scheme Based on DWTandPCA” International Conference on Green Computing and Internet of Things (ICGCloT), 2015, pp: 986-990.
  30. Dejey, R.S. Rajesh; "Robust Color Image Watermarking Schemes In the Wavelet Domain"; ICTACT JOURNAL ON IMAGE AND VIDEO PROCESSING, Iss 01, 2010
  31. Varsha Gaikwad, RehanaShikalgar, ShubhangiSagare, ShitalShendage, “Analysis of Attacks on Video Watermarking”, International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE) Volume 6, Issue 4, April 2017
  32. S. Agarwal, Priyanka, Usha Pal, “ Different Types of Attack in Image Watermarking including 2D, 3D Images”, International Journal of Scientific & Engineering Research, Volume 6, Issue 1, January-2015
  33. Amir Houmansadr Shahrokh Ghaemmaghami, “A Novel Video Watermarking Method Using Visual Cryptography”, Engineering of an intelligent system, 2006 IEEE International Conference on 22-23 April 2006
  34. Gwena¨elDo¨err and Jean-Luc Dugelay, “Collusion Issue in Video Watermarking,” Download Link: https://pdfs.semanticscholar.org
  35. A Chimanna, S.R.Khot, “Digital Video Watermarking Techniques for Secure Multimedia Creation and Delivery”, International Journal of Engineering Research andApplications, Vol. 3, Issue 2, March -April 2013, pp.839-844.
  36. Cruz-Ramos, R. Reyes-Reyes, M. Nakano-Miyatake, H. Perez-Meana, “A Blind Video Watermarking Scheme Robust To Frame Attacks Combined With MPEG2 Compression”, Journal of Applied Research and Technology, Vol.8 No.3 December 2010, pp: 323-339
  37. N. Sujatha, P. Satyanarayana, “Analysis of Robustness of Hybrid Video Watermarking against Multiple Attacks”, International Journal of Computer Applications, Volume 118 – No.22, May 2015
  38. C. Gonzalez, R. E. Woods, and S. L. Eddins, “Digital image processing Using Matlab”, Pearson Prentice Hall, New Jersey, 2004.
  39. W. Chan and M. R. Lyu, “A DWT-based digital video watermarking scheme with error correcting code” Proceedings of the 5Th International Conference on Information and Communications Security, 2003, pp. 202-213.
  40. ErkanYavuz and ZiyaTelatar, ”Digital Watermarking with PCA Based Reference Images”, ACIVS 2007, pp. 1014–1023.
  41. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure Spread Spectrum Watermarking for Multimedia”, IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 6, NO. 12, DECEMBER 1997, pp: 1673-1687
  42. Voloshynovskiy, S. Pereira, T. Pun, J.J. Eggers and J.K. Su, “Attacks on Digital Watermarks: Classification, Estimation-based Attacks, and Benchmarks,”
  43. ShouyuanYanga, Zhanjiang, Zhijun Fang, Jucheng Yang, “A Novel Affine Attack Robust Blind Watermarking Algorithm”, Symposium on Security Detection and Information Processing, Procedia Engineering 7 (2010) 239–246
  44. KunalAhire, Gajendra Singh Chandel, “Digital Video Watermarking Using Principal Component Analysis”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 4, April 2014, pp: 1171-1174
  45. Singh, A. Agarwal, J. Gupta, “Image Watermark Attacks: Classification & Implementation”, IJECT Vol. 4, Issue 2, April - June 2013, pp: 95-100
  46. Zaidi, R. Boyer, and P. Duhamel, “Audio Watermarking Under Desynchronization and Additive Noise Attacks”, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 2, FEBRUARY 2006, pp: 570-584.
  47. Zhao, Y., Campisi, P., Kundur, D., "Dual Domain Watermarking for authentication and Compression of Cultural Heritage Images", in IEEE transactions on linage Processing, vol. 13, no. 3, pp. 430-448, March 2004.
  48. V, M. Potdar, S.Han, Elizabeth Chang”A Survey of Digital Watermarking Techniques ” in 3rd IEEE International Conference on Industrial Informatics (INDIN), 10-12 August 2005, Australia

69-76

http://blueeyesintelligence.org/2checkout_download.html

13.

Authors:

Harshavardhan N. Shinde

Paper Title:

Preference of Flexible Pavement Crust Type for Traffic 50msa and Above, based on Low Direct Construction Cost.

Abstract: This paper expedite minimizing the cost of road construction, through analysis done based on the road types cited in IRC 37. There are five flexible road types cited in IRC 37-2012 for different traffic volumes and construction materials at various CBRs ranging from 2% to 15 %. This paper includes the analysis for traffic volume 50msa, 100msa and 150msa. District schedule rates and the specification and standards of the Roads (MORTH Specifications) are used to calculate material, equipment and direct construction cost. Co-relation between the cost, road types, CBRs and Traffic volumes is established, which act as baseline to select the low costing road crust type at a particular site for traffic volume from 50 to 150msa.

Keywords: Direct Construction cost, Road Types, Traffic, CBRs, Material and construction cost.

References:

  1. Endut, I.R., Akintoye, A. & Kelly, J. (2009). Cost and time overruns of projects in Malaysia. Proceedings of the 2nd Scottish Conference for Postgraduate Researchers of the Built and natural Environment (PRoBE), 16 - 17 November, 2009, Glasglow Caledonian University.
  2. Mahamid Ibrahim “Effects of project’s physical characteristics on cost deviation in road construction” , Journal of king Saud Univerisity- Engineering sciences (2013) vol 25, Page-81-88
  3. Vamsidhar, D. A. Eshwarswaroop, K. Ayyappapreamkrishna, R. Gopinath Study and Rate Analysis of Escalation in Construction industry, IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: 2278-1684, Volume 11, Issue 2 Ver. V (Mar- Apr. 2014), PP 14-25
  4. Abdul Rahman, I., Memon, A.H., Nagapan, S., Latif, Q.B.A.I. & Abdul Azis, A.A (2012). Time and Cost Performance of Construction Projects in Southern and Central Regions of Peninsular Malaysia. IEEE Colloqium on Humanities, Science & Engineering Research (CHUSER 2012), December 3 -4, 2012
  5. Al-Zarooni, S. Abdou, A., 2000., “Risk management in pre-design stage and its potential benefits for UAE public projects” . In: Proceedings of the 28th World Congress on Housing Challenges for the 21st Century, 15–19 April, Abu Dhabi, UAE.
  6. Ibrahim Mahamid and Amund Bruland, “Cost diviation in road construction projects: The case of Palestine” Construction Economics and Building, Vol 12, No 1 (2012)
  7. Guidelines for the design of flexible pavements :IRC 37, July 2012
  8. Government of Maharashtra Public Works Department State e-DSR for year 2017-18, w.e.f. 14/06/2017
  9. MORTH - Specifications for Road & Bridge Works (5th Revision) 1, 2013

77-80

http://blueeyesintelligence.org/2checkout_download.html

14.

Authors:

Maher Shehadi, Anne Lucietto

Paper Title:

Engineering Technology Students Response to Hands-on Fluid Power Exercises

Abstract: Hands-on interventions have been the focus of many studies; however, they frequently are not done using a population of students involved in active learning. Engineering technology programs are established with the premise that the program will encourage hands-on exercises, in field experiences, and contact with those that have experience in the field. These researchers work with engineering technology students throughout the academic year, some of them have experience in other programs such as engineering, mathematics, and business. They find the contrast between these groups of students often remarkable. Some studies have focused on the cognitive development of this population, others have focused on survey response that includes student or graduate introspection regarding their education and career path. Few focus on how the students respond to short, hands-on tasks involving the use of existing skills, and those they acquire in class. This study presents a set of exercises to students and analyzes the level of engagement, interest, and knowledge gain by asking them to carefully consider the answers to three questions and then respond to those questions. The researchers focus on the qualitative and quantitative answers, as well as student interaction following the exercises. Purdue Polytechnic is one of Purdue’s University Colleges and has 9 remote locations spread across the state in addition to main campus. Students located at main campus tend to be traditional students that matriculate immediately after high school graduation, while those at the remote campus’ are more likely to matriculate a year or more after high school graduation. The interactive hands-on exercises were tested on students located in one of the remote sites and the results are compared to other remote sites and to the main campus, as well. These groups also are different in size ranging from a few students to nearly 100. The data in this study is analyzed as an aggregate and as separate locations. The researchers find that these students have more intuition to solve problems, as noted by past research on this population, done in a different manner.

Keywords: Active Learning, Performance Comparisons and Improvements, Student-Centered Learning.

References:

  1. ABET Technology Accreditation Commission. (2009). Criteria for Accrediting Engineering Technology Programs. In: October.
  2. Lee, E. & Hannafin, M. J. (2016). A design framework for enhancing engagement in student-centered learning: own it, learn it, and share it. Educational Technology Research and Development, 64(4), 707-734.
  3. Beichner, R. J., Saul, J. M., Abbott, D. S., Morse, J. J., Deardorff, D., Allain, R. J., and Risley, J. S. (2007). The student-centered activities for large enrollment undergraduate programs (SCALE-UP) project. Research-based reform of university physics, 1(1), 2-39.
  4. French, S., & Kennedy, G. (2017). Reassessing the value of university lectures. Teaching in Higher Education, 22(6), 639-654.
  5. Alt, D. (2017). College students’ perceived learning environment and their social media engagement in activities unrelated to class work. Instructional Science, 45(5), 623-643.
  6. Latifah, L., Susilowati, N., & Setiyani, R. (2017). The Effects of Authentic Learning on Generic Skills and Characters. Advanced Science Letters, 23(8), 7800-7803.
  7. (BHEF) Business-Higher Education Forum. (2012). Stem ineterest among college students: Where they enrol. Retrieved from http://www.bhef.com/sites/default/files/BHEF_2012_stem_interest_enrollment.pdf
  8. Lucietto, A. M., & Leach, S. (2017). Comparing Main Campus Engineering Technology Students to Those at Remote Sites. Paper presented at the ASEE Annual Conference, Columbus, OH.

81-88

http://blueeyesintelligence.org/2checkout_download.html

15.

Authors:

Harshit Ramteke, Manoj Kumar Singh, Abhishek Shrivastava

Paper Title:

Implementation of Emotion Recognition By Real Image Expression using Web Camera With The Help of Matlab Tool

Abstract: The human face assumes a tremendous part for programmed acknowledgment of feeling in the field of recognizable proof of human feeling and the connection amongst human and PC for some genuine application like driver state observation, customized learning, wellbeing checking and so on. Most announced facial feeling acknowledgment frameworks, in any case, are not completely thought to be subject-autonomous dynamic highlights, so they are not sufficiently vigorous for genuine acknowledgment assignments with subject (human face) variety, head development and brightening change. In this article we have endeavored to outline a computerized structure for feeling location utilizing outward appearance. For human-PC cooperation outward appearance makes a stage for non-verbal correspondence. The feelings are adequately variable happenings that are evoked because of actuating power. So, in actuality, application, discovery of feeling is exceptionally testing undertaking. Outward appearance acknowledgment framework requires to defeat the human face having various changeability, for example, shading, introduction, demeanor, stance and surface so on. In our structure we have taken edge from live gushing and prepared it utilizing Grabor highlight extraction and neural system. To distinguish the feeling facial traits extraction by foremost segment investigation is utilized and a clusterization of various outward appearance with individual feelings. At long last to decide outward appearances independently, the handled element vector is directed through the officially learned example classifiers. Outward appearances offer essential information concerning feelings of somebody. Understanding outward appearances precisely is one in all the troublesome assignments for social connections. Programmed feeling identification abuse outward appearances acknowledgment is as of now a principle space of enthusiasm among changed fields like registering, drug, and science. HCI examination groups also utilize machine-controlled facial highlights acknowledgment framework for higher outcomes. changed element extraction systems are produced for acknowledgment of articulations from static pictures in addition as ongoing recordings. This paper gives an audit of investigation work dispensed and uncovered inside the field of facial highlights acknowledgment and changed methods utilized for facial highlights acknowledgment.

Keywords: Automated Facial Expression Recognition System, Face Detection, Emotion Detection, And Human Computer Interaction (HCI).

References:

  1. Bartlett, Marian Stewart, et al. "Measuring facial expressions by computer image analysis." Psychophysiology 36.2 (1999): 253-263.
  2. Black, Michael J., and Yaser Yacoob. "Tracking and recognizing rigid and non-rigid facial motions using local parametric models of image motion." Computer Vision, 1995. Proceedings., Fifth International Conference on. IEEE, 1995.
  3. Daugman, J. G. (1988). Complete discrete 2-D Gabor transforms by neural networks for image analysis and compression. IEEE Transactions on acoustics, speech, and signal processing, 36(7), 1169-1179
  4. Donato, G., Bartlett, M.S., Hager, J.C., Ekman, P. and Sejnowski, T.J., 1999. Classifying facial actions. IEEE Transactions on pattern analysis and machine intelligence, 21(10), pp.974-989.
  5. Essa, Irfan A., and Alex Paul Pentland. "Coding, analysis, interpretation, and recognition of facial expressions." IEEE transactions on pattern analysis and machine intelligence 19, no. 7 (1997): 757-763.
  6. Fukui, K. and Yamaguchi, O., 1998. Facial feature point extraction method based on combination of shape extraction and pattern matching. Systems and Computers in Japan, 29(6), pp.49-58.
  7. Lee, T. S. (1996). Image representation using 2D Gabor wavelets. IEEE Transactions on pattern analysis and machine intelligence, 18(10), 959-971.
  8. Lien, J.J.J., Kanade, T., Cohn, J.F. and Li, C.C., 2000. Detection, tracking, and classification of action units in facial expression. Robotics and Autonomous Systems, 31(3), pp.131-146.
  9. Lyons, M., Akamatsu, S., Kamachi, M., & Gyoba, J. (1998, April). Coding facial expressions with gabor wavelets. In Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on (pp. 200-205). IEEE.
  10. Mase, Kenji. "Recognition of facial expression from optical flow." IEICE transactions (E) 74 (1991): 3474-3483.
  11. Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural computation, 18(7), 1527-1554.
  12. Susskind, J.M., Hinton, G.E., Movellan, J.R. and Anderson, A.K., 2008. Generating facial expressions with deep belief nets. In Affective Computing. InTech.
  13. Lyons, M., Akamatsu, S., Kamachi, M., & Gyoba, J. (1998, April). Coding facial expressions with gabor wavelets. In Automatic Face and Gesture Recognition, 1998. Proceedings. Third IEEE International Conference on (pp. 200-205). IEEE.
  14. Hinton, G. E. (2012). A practical guide to training restricted Boltzmann machines. In Neural networks: Tricks of the trade (pp. 599-619). Springer, Berlin, Heidelberg.

89-93

http://blueeyesintelligence.org/2checkout_download.html

16.

Authors:

Bhupendra Ambilkar, Manoj Kumar Singh, Abhishek Shrivastava

Paper Title:

Implementation of Stroke Risk Stratification using Ultrasonic Echolucent Carotid Wall Plaque Morphology: By using MATLAB Tool

Abstract: Stroke hazard stratification visible of grayscale morphology of the ultrasound arterial blood vessel divider has as these days been looked as if it would have a guarantee in arrangement of high hazard versus usually safe plaque or symptomatic versus symptomless plaques. In past examinations, this stratification has been primarily visible of investigation of the furthest mass of the arterial blood vessel vein. thanks to the multifocal plan of hardening of the arteries malady, the plaque development is not restricted to the way divider alone. This paper displays another approach for stroke likelihood appraisal by incorporating analysis of each the shut and much dividers of the arterial blood vessel itinerary utilizing grayscale morphology of the plaque. Further, this paper displays a logical approval framework for stroke hazard appraisal. each these advancements have not been displayed. The philosophy includes of a mechanized division arrangement of the shut divider and much divider locales in grayscale arterial blood vessel B-mode ultrasound checks. Sixteen grayscale surface highlights square measure patterned, and nourished into the machine learning framework. The preparation framework uses the lumen breadth to form ground truth names for the stratification of stroke hazard. The cross-approval strategy is adjusted keeping in mind the tip goal to amass the machine reading testing characterization exactness mistreatment 3 arrangements of parcel conventions: (5, 10, and Jack Knife). The mean order exactness over all of the arrangements of section conventions for the computerized framework within the way and shut dividers is ninety five.08% and 93.47%, on an individual basis. The relating correct nesses for the manual framework square measure ninety four.06% and 92.02%, on an individual basis. The accuracy of import of the mechanized machine learning framework once analyzed against manual hazard analysis framework square measure ninety eight.05% and 97.53% for the way and shut dividers, separately. The mythical creature of the hazard analysis framework for the way and shut dividers is close to one.0 showing high exactness.

Keywords: Coronary Artery IVUS, Carotid IMT, Machine learning PCA, Risk Assessment

References:

  1. Mittmann, Nicole, Soo Jin Seung, Michael D. Hill, Stephen J. Phillips, Vladimir Hachinski, Robert Coté, Brian H. Buck et al. "Impact of disability status on ischemic stroke costs in Canada in the first year." Canadian Journal of Neurological Sciences 39, no. 6 (2012): 793-800.
  2. Hartley, Louise, Ewemade Igbinedion, Margaret Thorogood, Aileen Clarke, Saverio Stranges, Lee Hooper, and Karen Rees. "Increased consumption of fruit and vegetables for the primary prevention of cardiovascular diseases." Cochrane Database Syst Rev 4, no. 6 (2012).
  3. Saba, L., Gao, H., Acharya, U.R., Sannia, S., Ledda, G. and Suri, J.S., 2012. Analysis of carotid artery plaque and wall boundaries on CT images by using a semi-automatic method based on level set model. Neuroradiology, 54(11), pp.1207-1214.
  4. Laine, Andrew, Joäao Miguel Sanches, and Jasjit S. Suri. Ultrasound Imaging: Advances and Applications. Springer, 2012..
  5. Saba, L., Tallapally, N., Gao, H., Molinari, F., Anzidei, M., Piga, M., Sanfilippo, R. and Suri, J.S., 2013. Semiautomated and automated algorithms for analysis of the carotid artery wall on computed tomography and sonography. Journal of Ultrasound in Medicine, 32(4), pp.665-674.
  6. Ross, Russell. "Cell biology of atherosclerosis." Annual review of physiology 57, no. 1 (1995): 791-804.
  7. Tracqui, P., Broisat, A., Toczek, J., Mesnier, N., Ohayon, J. and Riou, L., 2011. Mapping elasticity moduli of atherosclerotic plaque in situ via atomic force microscopy. Journal of structural biology, 174(1), pp.115-123.
  8. Teng, Z., Zhang, Y., Huang, Y., Feng, J., Yuan, J., Lu, Q., Sutcliffe, M.P., Brown, A.J., Jing, Z. and Gillard, J.H., 2014. Material properties of components in human carotid atherosclerotic plaques: a uniaxial extension study. Acta biomaterialia, 10(12), pp.5055-5063.
  9. Amato, Mauro, Piero Montorsi, Alessio Ravani, Elisa Oldani, Stefano Galli, Paolo M. Ravagnani, Elena Tremoli, and Damiano Baldassarre. "Carotid intima-media thickness by B-mode ultrasound as surrogate of coronary atherosclerosis: correlation with quantitative coronary angiography and coronary intravascular ultrasound findings." European Heart Journal 28, no. 17 (2007): 2094-2101.
  10. Kao, Amy H., Apinya Lertratanakul, Jennifer R. Elliott, Abdus Sattar, Linda Santelices, Penny Shaw, Mehret Birru et al. "Relation of carotid intima-media thickness and plaque with incident cardiovascular events in women with systemic lupus erythematosus." American Journal of Cardiology 112, no. 7 (2013): 1025-1032.
  11. Eigenbrodt, M. L., Bursac, Z., Rose, K. M., Couper, D. J., Tracy, R. E., Evans, G. W., ... & Mehta, J. L. (2006). Common carotid arterial interadventitial distance (diameter) as an indicator of the damaging effects of age and atherosclerosis, a cross-sectional study of the Atherosclerosis Risk in Community Cohort Limited Access Data (ARICLAD), 1987–89. Cardiovascular Ultrasound, 4(1), 1.
  12. Eigenbrodt, Marsha L., et al. "Common carotid artery wall thickness and external diameter as predictors of prevalent and incident cardiac events in a large population study." Cardiovascular ultrasound 5.1 (2007): 11.
  13. Ikeda, Nobutaka, Norihiro Kogame, Raisuke Iijima, Masato Nakamura, and Kaoru Sugi. "Impact of carotid artery ultrasound and ankle-brachial index on prediction of severity of SYNTAX score." Circulation Journal 77, no. 3 (2013): 712-716.
  14. Araki, T., Ikeda, N., Dey, N., Acharjee, S., Molinari, F., Saba, L., ... & Suri, J. S. (2015). Shape‐Based Approach for Coronary Calcium Lesion Volume Measurement on Intravascular Ultrasound Imaging and Its Association With Carotid Intima‐Media Thickness. Journal of Ultrasound in Medicine, 34(3), 469-482.
  15. Araki, Tadashi, Nobutaka Ikeda, Nilanjan Dey, Suvojit Acharjee, Filippo Molinari, Luca Saba, Elisa Cuadrado Godia, Andrew Nicolaides, and Jasjit S. Suri. "Shape‐Based Approach for Coronary Calcium Lesion Volume Measurement on Intravascular Ultrasound Imaging and Its Association With Carotid Intima‐Media Thickness." Journal of Ultrasound in Medicine 34, no. 3 (2015): 469-482.
  16. Araki, Tadashi, Nobutaka Ikeda, Devarshi Shukla, Pankaj K. Jain, Narendra D. Londhe, Vimal K. Shrivastava, Sumit K. Banchhor et al. "PCA-based polling strategy in machine learning framework for coronary artery disease risk assessment in intravascular ultrasound: A link between carotid and coronary grayscale plaque morphology." Computer methods and programs in biomedicine 128 (2016): 137-158.
  17. Araki, Tadashi, et al. "PCA-based polling strategy in machine learning framework for coronary artery disease risk assessment in intravascular ultrasound: A link between carotid and coronary grayscale plaque morphology." Computer methods and programs in biomedicine 128 (2016): 137-158.

94-100

http://blueeyesintelligence.org/2checkout_download.html

17.

Authors:

Jayarenjini N, Unni C

Paper Title:

Hexagonal Shaped Microstrip Patch Antenna for Satellite and Military Applications

Abstract: In this work, investigation of the effect of different slots in a hexagonal shaped microstrip patch antenna is presented. The proposed antenna is designed on FR4-epoxy substrate and the performance is obtained by using CST Microwave Studio. The antenna has been analyzed for various dimensions of slots and the optimum design has been chosen. By increasing the number of slots, the gain, bandwidth and return loss of the structure has been improved. The simulated antenna structures also show dual band characteristics. The antenna offers application in WiFi IEEE802.11n (2.4 to 5 GHz) and UWB range especially for X-band uplink satellite system (7.9–8.4GHz). As the designed structures resonate in C-band (4-8 GHz), it offers applications in Fixed Satellite Services (FSS) and military also. 

Keywords: Microstrip Patch Antenna, Ultra Wide Band, Fixed Satellite Services, Return Loss.

References:

  1. Y. Liu, 2011, “An Improved Rectenna for wireless Power Transmission for Unmanned air vehicles”, naval postgraduate School, Monterey, California.
  2. Yogamathi, S. Banu, A. Vishwapriya, “Design of fractal antenna for multiband applications”, IEEE-31661, ICCCNT, 4-6 July, 2013.
  3. Chung K, Kim J, Choi J. Wideband microstrip-FED monopole antenna having frequency band-notch function. IEEE Microwave Wirel. Compon. Lett. 2005;15:766–768.
  4. Vuong TP, Ghiotto A, Duroc Y, Tedjini S. Design and characteristics of a small U-slotted planar antenna for  R-UWB. Microwave Opt. Technol. Lett. 2007;49:1727–1731.
  5. Abbosh AM, Bialkowoski ME, Mazierska J, Jacob MV. A planar UWB antenna with signal rejection capability in the 4–6 Hz band. IEEE Microwave Wirel. Compon. Lett. 2006;16:278–280.
  6. Kim Y, Kwon DH. CPW-fed planar ultra wideband antenna having a frequency band notch function. Electronics Lett. 004;40:403–405.
  7. Lorena I. Basilio. 2001. The Dependence of the Input Impedance on Feed Position of Probe and Microstrip Line-Fed patch Antennas. IEEE Transaction on Antennas and Propagation. 49(1 )
  8. Jayarenjini N, Ali Fathima N A, Megha S and Unni C, “Dual polarized Microstrip Fractal patch antenna for S-band Applications”, IEEE Conference Publications in Control, Communication and Computing, 2015. Digital Object Identifier: 10.1109/ICCC.2015.7432941
  9. Symposium, Vol. 2,pp. 704-707,June. [4] Wong, K. (2002), "Com pact and Broadband Microstrip Antenna", JohnWiley & Sons,Inc.
  10. Kam tongdee, C. and Wongkasem , N. (2009), "A Novel Design of Compcat 2.4 GHz Microstrip Antennas", 611. International Corifence ECTI-CON, Vol. 2,pp. 766-769,May
  11. Gupta,N. and Gupta,V.R. (2005),"Reduced Size,Dual Frequency Band Antenna for Wireless Communication",IEEE International Corifence on Personal Wireless Communications, pp. 321-323,Jan.
  12. Ghosh,B.,Haque,S.M. and Mitra,D. (2011), "Minituarization of Slot Antennas Using Slit and Strip Loading",IEEE Transactions on Antennas and Propagation, Vol. 59,pp. 3922-3927,Aug.
  13. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3). pp.876—880.

101-105

http://blueeyesintelligence.org/2checkout_download.html

18.

Authors:

Sint Sint Aung, Myat Su Wai

Paper Title:

Analysis on Automatic Opinion Extraction from Product Reviews

Abstract: Opinion mining also known as sentiment analysis is the computational study of subjective information towards different entities. Entities usually refer to products, organizations, services or/and their features, functions, components and attributes. Opinion mining is a major task of Natural Language Processing (NLP) that studies methods for identifying and extracting opinions from written text, such as product reviews, discussion groups, forums and blogs. Natural Language Processing techniques and lexicon-based approaches for opinion mining are used to extract aspects and customer opinions. Extracting opinion words and product features is an important task in many sentiment analysis applications. Opinion lexicon also plays a very important role because it is very useful for a wide range of tasks. Although there are several opinion lexicons available, it is hard to maintain a universal opinion lexicon to cover all domains. So, it is necessary to expand a known opinion lexicon that is useful for some domains. The aim of this system is to automatically expand opinion lexicon and to extract product features based on the dependency relations. Stanford Core NLP dependency parser is used to identify the dependency relations between features and opinions. Extraction rules are predefined according to these dependency relations. This work proposed an algorithm based on double Propagation to extract feature and opinions. The polarity orientation is annotated by using Vader lexicon. Unlike the existing approaches, this system contributes verbs opinions and verb product features. In order to increase the precision and recall, the system also proposes additional patterns besides 8 rules in Double Propagation. And, general words that are not features and adjectives that are not opinions are filtered in the proposed system. According to experimental studies, our approach is better than the existing state of the art approach. 

Keywords: Opinion Mining, Opinions, Aspects

References:

  1. http://sentiment.christopherpotts.net/lexicon, 27. 10. 2016.
  2. http://mpqa.cs.pitt.edu/corpora/product_debates/18.9.2016.
  3. Agarwal, B., Poria, S., Mittal, N., Gelbukh, A., and Hussain, A. “Concept-level sentiment analysis with dependency-based semantic parsing: A novel approach”. Cognitive Computation, pages 1–13, 2015.
  4. Asghar M, Khan A, Ahmad S, Kundi F, “A Review of Feature Extraction in Sentiment Analysis”, Journal of Basic and Applied Scientific Research, 4(3): 181–186, 2014.
  5. Broß, J. “Aspect-Oriented Sentiment Analysis of Customer Reviews Using Distant Supervision Techniques”. PhD thesis, Freie Universität Berlin, 2013.
  6. Bing Liu, (2011) “Web Data Mining, Springer”, Second Edition, Department of Computer Science, University of Illinois, Chicago, USA.
  7. Chen, L., Wang, W., Nagarajan, M., Wang, S., Sheth, A. P. “Extracting Diverse Sentiment Expressions with Target-Dependent Polarity from Twitter”, In the Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media(ICWSM), 50–57, 2012.
  8. Chinsha, T. and Joseph, S. “A syntactic approach for aspect-based opinion mining”. In Semantic Computing (ICSC), 2015 IEEE International Conference on, pages 24–31. IEEE.
  9. De Marneffe, M.-C. and Manning, C. D. “Stanford typed dependencies manual. Report”, Technical report, Stanford University, 2016.
  10. Fabbrizio G, Aker A, Gaizauskas R012) “Summarizing Online Reviews Using Aspect Rating Distributions and Language Modeling”, IEEE Intelligent Systems, 28(3): 28–37, 2012.
  11. Qiu, B. Liu, J. Bu, and C. Chen, “Opinion word expansion and target extraction through double propagation,” Computational Linguistics 37, no.1, 2011, pp. 9–27.
  12. Jiang, M. Yu, M. Zhou, X. Liu, and T. Zhao, “Target-dependent twitter sentiment classification,” In Proc. of the 49th Ann. Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume 1, pp. 151-160. Association for Computational Linguistics, 2011.
  13. Khan, K., Baharudin, B., Khan, A., and Ullah, A. “Mining opinion components from unstructured reviews: A review”. Journal of King Saud University-Computer and Information Sciences, 26(3):258–275, 2014.
  14. Kundi F, Ahmad S, Khan A, Asghar, “Detection and Scoring of Internet Slangs for Sentiment Analysis Using SentiWordNet”, Life Science Journal, 11(9):66–72, 2014.
  15. Liu, B. “Web data mining: exploring hyperlinks, contents, and usage data”. Springer Science & Business Media, 2011.
  16. Liu, B. “Sentiment analysis and opinion mining”. Synthesis Lectures on Human Language Technologies, 5(1):1–167, 2015.
  17. Liu, B. “Sentiment analysis mining opinions, sentiments, and emotions”. 1:1–386, 2015.
  18. Liu, L. Xu and J. Zhao, “Opinion target extraction using word-based translation model”, Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning, pp. 1346-1356, 2012.
  19. Moghaddam, A. S., “Aspect-based opinion mining in online reviews”. PhD thesis, Applied Sciences: School of Computing Science, 2014.
  20. Myat Su Wai and Sint Sint Aung, “Simultaneous Opinion Lexicon Expansion and Product Feature Extraction”, Proceeding of 16th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2017), ISBN: 978–1–5090–5506–7.
  21. Neviarouskaya A, Aono M, “Sentiment Word Relations with Affect, Judgment, and Appreciation”, IEEE Transactions on Affective Computing, 4(4): 425–438, 2014.
  22. Pontiki, M., Galanis, D., Papageorgiou, H., Manandhar, S., and Androutsopoulos, I., “Semeval-2015 Task 12: Aspect Based Sentiment Analysis”. In Proceedings of the 9th International Workshop on Semantic Evaluation (SemEval 2015), pages 486–495, Denver, Colorado. Association for Computational Linguistics.
  23. Pontiki, M., Galanis, D., Pavlopoulos, J., Papageorgiou, H., Androutsopoulos, I., and Manandhar, S.. “Semeval-2014 Task 4: Aspect Based Sentiment Analysis”. In Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014), pages 27–35, Dublin, Ireland. Association for Computational Linguistics.
  24. Poria, B. Agarwal, Gelbukh, A. Hussain, N. Howard, “Dependency-based semantic parsing for concept-level text analysis”, In Gelbukh, A. (ed.) Computational Linguistics and Intelligent Text Proceeding, Part I. LNCS, vol. 8403, pp. 113–127. Springer, Heidelberg, 2014.
  25. Poria, E. Cambria, G. Winterstein, G. B. Huang, “Sentic patterns: Dependency-based rules for concept-level sentiment analysis,”. Knowledge-Based Systems, vol.69, pp. 45-63, 2014.
  26. Poria, E. Cambria, L.W. Ku, C. Gui, A. Gelbukh, “A rule-based approach to aspect extraction from product reviews,” In Workshop Proc. of the 25th International Conference on Computational Linguistics, COLING’14, pp. 28-37, 2014.
  27. Shariaty, S. and Moghaddam, S.. “Fine-grained opinion mining using conditional random fields”. In Data Mining Workshops (ICDMW), 2011 IEEE 11th International Conference on, pages 109–114. IEEE..
  28. Sint Sint Aung and Myat Su Wai, Domain Independent Feature Extraction Using Rule Based Approach, Advances in Science, Technology and Engineering Systems Journal (ASTESJ)​​, volume 3, issue 1, 2018.
  29. Souza M, Vieira R, Busetti D, Chishman R, Alves I, “Construction of a Portuguese Opinion Lexicon from Multiple Resources”, in the proceedings of the 8th Brazilian Symposium in Information and Human Language Technology (STIL’ 2011), 59–66. Springer, pp.411-448, 2007.
  30. Maria Pontiki et al. (2016) “Aspect Based Sentiment Analysis”, Association for Computational Linguistics (ACL), San Diego, California, June 16-17, 2016.
  31. Saif M. Mohammad. arXiv preprint arXiv, Word Affect Intensities , April 2017.
  32. Xu, T. J. Zhao, D. Q. Zheng, S. Y. Wang, “Product features mining based on Conditional Random Fields model”, Proceedings of the 2010 International Conference on Machine Learning and Cybernetics, pp. 3353-3357, 2010.
  33. Xu, X., Cheng, X., Tan, S., Liu, Y., and Shen, H. “Aspect-level opinion mining of online reviews”. China Communications, 10(3):25–41.
  34. Wu, Q. Zhang, X. Huang, and L. Wu, “Phrase dependency parsing for opinion mining,”. In EMNLP’09, Volume 3-Volume 3, pp. 1533- 1541. Association for Computational Linguistics, 2009.
  35. Zheng, L. Ye, G. Wu and X. Li, “Extracting product features from Chinese customer reviews,” Proceedings of 3rd International Conference on Intelligent System and Knowledge Engineering, pp. 285-290, 2008.
  36. Hai, K. Chang, G. Cong, “One seed to find them all: mining opinion features via association”, Proceedings of the 21st ACM international conference on Information and knowledge management, pp. 255-264, 2012
  37. Zhai, Z., Liu, B., Xu, H., and Jia, P., “Clustering product features for opinion mining”. In Proceedings of the fourth ACM international conference on Web search and data mining, pages 347–354. ACM.
  38. Zhang D, Dong H, Yi J, Song L, “Opinion summarization of customer reviews”, In proceedings of the International Conference on Automatic Control and Artificial Intelligence (ACAI 2012), 1476–1479.
  39. Zhang, L. and Liu, B. “Aspect and entity extraction for opinion mining”. In Data mining and knowledge discovery for big data, pages 1–40. Springer.
  40. Zhang, Y. and Zhu, W. “Extracting implicit features in online customer reviews”, In Proceedings of the 15th ACM international conference on Information and knowledge management, pages 43–50. ACM.
  41. Guang Qiu, Bing Liu, Jiajun Bu and Chun Chen. "Opinion Word Expansion and Target Extraction through Double Propagation." Computational Linguistics, March 2011, Vol. 37, No. 1: 9.27.
  42. Qian Liu, Zhiqiang Gao, Bing Liu and Yuanlin Zhang. A Logic Programming Approach to Aspect Extraction in Opinion Mining. Proceedings of IEEE/WIC/ACM International Confernece on Web Intelligence (WI-2013), 2013.
  43. Qian Liu, Zhiqiang Gao, Bing Liu and Yuanlin Zhang. “Automated Rule Selection for Aspect Extraction in Opinion Mining.” Proceedings of International Joint Conference on Artificial Intelligence (IJCAI-2015), July 25-31, 2015.
  44. Yahui Xi (2013), “Extracting Product Features from Chinese Product Reviews”, Journal of Multimedia, 2013. C.J. Hutto and Eric Gilbert, 2014, “VADER: A Parsimonious Rule-Based Model for Sentiment Analysis of Social Media Texts”, Association for the Advancement of Artificial Intelligent AAAI, , 2014.
  45. Zhao et al. (2014) “Joint Propagation and Refinement for Mining Opinion Words and Targets”, IEEE Data Mining Workshop, 2014, pp.417-424.
  46. Zhiyuan Chen, Arjun Mukherjee, and Bing Liu. Aspect Extraction with Automated Prior Knowledge Learning. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics (ACL 2014), June 22-27, Baltimore, USA.

106-112

http://blueeyesintelligence.org/2checkout_download.html

19.

Authors:

Gbenga Matthew Ayininuola, Lukman Olusegun Balogun

Paper Title:

Investigation of Glass Fiber Potential in Soil Stabilization

Abstract: The use of natural fibers to reinforce soil is an old and ancient idea. Traditional geosynthetics such as geotextile, geogrid etc. have proved to be efficient, and are increasingly used in geotechnical engineering. In contrast, the use of glass fibers in soil needs further investigation. Soil samples were obtained from borrow pits at Ajibode and Chapel both located in the University of Ibadan, Ibadan, Nigeria and stabilized with procured glass fiber at proportions of 0.4%. 0.8%, 1.2%, 1.6%, 2.0%, 2.5% and 3.0% by weight. Tests such as particle size analysis, compaction and California bearing ratio (CBR) were carried out on the unstabilized (control) soil samples. Thereafter, the compaction and CBR tests were carried out on stabilized soil samples. The results showed an improvement in the two soils’ maximum dry density and CBR on addition of the glass fibers. The glass fibers had optimum effect on the soils between 1.2% and 1.6% of soil samples. Therefore, incorporating glass fiber into the soils in the required quantity will enhance soils’ CBR and density. 

Keywords: Glass Fiber, Soil Stabilization, California Bearing Ratio, Maximum Dry Density, Reinforcement.

References:

1. E. E. Arinze, “Stabilization of laterites with industrial wastes: a recent and comprehensive review,” International Journal of Advancements in Research & Technology, vol. 4, no. 11, 2015, pp. 69 – 87.
2. A. Kumar, and A. K. Singh, “Stabilization of soil using cement kiln dust,” International Journal of Innovative Research in Science, Engineering and Technology, vol. 6, no. 6, 2017, pp. 11632 – 11637.
3. P. Sherwood,. Soil stabilization with cement and lime. State of the Art Review. London: Transport Research Laboratory, HMSO, 1993.
4. C. Rogers, S. Glandinning, and N. Dixon, “Lime Stabilization,” Proceedings Seminar held at Loughborough University on 25 September 1996. Published by Thomas Telford, UK, 1996.
5. H. I. Ling, D. Leshchinsky, and F. Tatsuoka, Reinforced Soil Engineering: Advances in Research and Practice. New York: Marcel Dekker Incorporated, 2003.
6. M. O. Jackson, “The foundation failure in coastal plain sand of Nigeria,” Proceedings, 7th Regional Conference for Africa on Soil Mechanics and Foundation Engineering. Institute of Civil Engineering, Accra, 1980, pp. 425-430.
7. P. A. Vallerga, and N. Rananandana, Characteristics of lateritic soils used in Thailand road construction. Highway Research Record,1969, 284.
8. L. A. Balogun,.”Influence of geological origin on the geotechnical properties of lime stabilized laterites,” Proceeding Conference for Africa SMFE, Harare, 1984, pp. 355 – 362.
9. D. A. Alao, “Geology and engineering properties of lateritic soil from Ilorin, Nigeria,” Engineering Geology, vol. 19, 1983, pp.:111-118.
10. O. Ogunsanwo, “CBR and shear strength of compacted laterite soil from southwestern Nigeria,” Quarterly Journal of Engineering Geology, vol. 22, 1989, pp. 317 - 328.
11. EuroSoilStab. Design guide: soft soil stabilization, 2002, pp. 97-103.
12. A. Maher, T. Bennert, F. Jafari, W. S. Doglas, and N. Gucunski, “Geotechnical Properties of Stabilized Dredged Material from New York-New Jersey Harbour,” Journal of the Transportation Research Board, 2004, pp. 86-96.
13. A. Al-Tabbaa, and W. C. Evans, “Stabilization-solidification treatment and remediation: part 1: binders and technologies-basic principal,” Proceedings International Conference on Stabilization/Solidification Treatment and Remediation, Cambridge, 2005, pp. 367 – 385.
14. R. G. Hicks, Alaska Soil Stabilization Design Guide. Alaska Department of Transportation and Federal Highway Administration Report No. FHWA-AK-RD-01-6B, 2002.
15. R. G. Bhuvaneshwari, S. Robinson, and R. Gandhi, “Stabilization of expansive soils using fly ash,” Fly Ash Utilisation Programme (FAUP) 2005.
16. S. M. Mackiewicz, and E. G. Ferguson, “Stabilization of soil with self-cementing coal ashes,” World of Coal Ash (WOCA), Lexington, Kentucky, USA, 2005.
17. C. S. Fletcher, and W. K. Humphries, “California bearing ratio improvement of remoulded soils by addition of polypropylene fiber reinforcement,” Proceedings, Seventieth Annual Meetings, Transportation Research Board, Washington, 1991, pp. 80-86.
18. J. Prabakar, and R. S. Sridhar, “Effect of random inclusion of sisal fiber on strength behaviour of soil,” Construction and Building Materials, vol. 16, 1996, pp. 123 – 131.
19. S. M. Marandi, M. H. Bagheripour, R. Rahgozar, and H. Zare, “Strength and ductility of randomly distributed palm fibers reinforced silty-sand soils,” American Journal of Applied Sciences, vol. 5, no. 3, 2008, pp. 209 - 220.
20. R. L. Terrel, J. A. Epps, E. J. Barenberg, J. K. Mitchell, and M. R. Thompson, Soil Stabilization in Pavement Structures—A User’s Manual—Vol. 2: Mixture Design Considerations, FHWA-IP-80-2, Federal Highway Administration, Washington, D.C. 1979.
21. H. Maher,.”Behaviour of fiber-reinforced cemented sand under static and cyclic loads,” Geotech Test, vol. 16, 1993, pp. 330 - 338.
22. T. Al-Refeai,. “Behaviour of granular soils reinforced with discrete randomly oriented inclusions,” Geotextile Geomembrane, vol. 10, 1991, pp. 319-333.
23. K. S. Heineck, M. R. Coop, and N. C. Consoli, “Effect of micro-reinforcement of soils from very small to large shear strains,” Jour. Geotech. Geoenviron. Eng. Vol. 131, no. 8, 2005, pp.1024 - 1033.
24. N. C. Consoli, K. S. Heineck, M. D. T. Casagrande, and M. R. Coop, “Shear strength behavior of fiber-reinforced sand considering triaxial tests under distinct stress paths,”.Journal Geotech. Geoenviron. Eng., vol. 133, no. 11, 2007, pp. 1466 - 1469.
25. J. Liu, G. Wang, T. Kamai, F. Zhang, J. Yang, and B. Shi, “Static liquefaction behavior of saturated fiber-reinforced sand in undrained ring-shear tests” Geotext. Geomembr. vol. 29, no. 5, 2011, pp. 462 - 471.
26. F. Ahmad, D. Mujah, H. Hazarika, and A. Safari, “Assessing the potential reuse of recycled glass fiber in problematic soil applications,” Journal of Cleaner Production, vol. 35, 2012, pp. 102-107.
27. BS 1377, Method of test for soils for civil engineering purposes, London British Standard Institute, 1990.

113-117

http://blueeyesintelligence.org/2checkout_download.html

20.

Authors:

Gbenga Matthew Ayininuola, Olaniyi Diran Afolayan

Paper Title:

Potential of Oyster Shell Ash Activated with Cement as soil Stabilizer for Road Construction

Abstract: The study investigated the suitability of oyster shell ash activated with cement as additive to improve soil geotechnical properties. Three Lateritic soil samples were collected and stabilized with varying percentages of oyster shell ash (OYSA) from 2% - 15% activated with 5 % cement by dry weight. The mixtures’ geotechnical properties: Atterberg limit, specific gravity, California bearing ratio (CBR) and shear strength parameters (cohesion and angle of friction) were determined. Chemical analysis of the oyster shell ash was carried out in laboratory. Results showed that the OYSA is rich in calcium and silicon oxides (CaO and SiO2) with other oxides. OYSA addition led to increase in specific gravity (2.42 to 2.43 sample 1; 2.24 to 2.50 sample 2 and 2.25 - 2.28 sample 3) , improvement in Atterberg’s limit through decrease in the plasticity index, increase in the CBR (22.5% - 145% sample 1, 0.54% - 30.78% sample 2 and 1.56% - 54.54% sample 3) and improvement of cohesive shear strength property (50 - 65kN/m2 sample 1, 20 - 21 kN/m2 sample 2, and 42 – 78 kN/m2 sample 3) ) due to the formation of cementitious layer and alteration in the structure and grain composition of soil samples. Therefore, using 6% OYSA activated with 5% cement will enhance soil geotechnical properties. 

Keywords: Oyster Shell Ash, Soil Stabilization, Geotechnical Properties, Lateritic Soil

References:

1. T. W. Kennedy, R. Smith, R. J. Holmgreen Jr, and M. Tahmoressi, “An evaluation of lime and Cement Stabilization,” Transportation Research Record, vol.119, 1987, pp. 11 - 25.
2. N. C. Consoli, L. L. Lopes, and K. H. Heineck, “Key parameters for the control of lime stabilized soils,” Journal of Materials in Civil Engineering, vol. 21, no. 5, 2009, pp. 210- 216.
3. J. H. Jung, Y. S. Lee, K. S. Yoo, H. K. Lee, K. J. Oh, and G. H. Shon, Reactivity of bio-sorbent prepared by waste shells of shellfish in acid gas cleaning. Korean Journal of Chemical Engineering, vol. 22, no. 5, 2005, pp. 266 – 268.
4. J. H. Jung, K. S. Yoon, H. G. Kim, H. K. Lee, and B. H. Shon, “Reuse of waste oyster shells as a SO2/NOX removal absorbent,”Journal of Industrial and Engineering Chemistry, vol.13, no. 8, 2007, pp. 512-517.
5. G. L. Yoon, B. T. Kim, B. O. Kim, and Han, “Chemical-mechanical characteristics of crushed oyster-shell,” Waste Management, vol. 23, no. 9, 2003, pp. 825–834.
6. H. Yoon, S. Park, K. Lee, and J. Park, “Oyster shell as substitute for aggregate in mortar,” Waste Manage Res., vol. 22, 2004, pp, 158–170
7. BS 1377, Method of Test for Soils for Civil Engineering Purposes. British Standard Institute, 1990.
8. C. A. O’Flaherty, Highways: the location, design and maintenance of road pavements. 4th ed., Butterworth Heinemann. Oxford: Jordan Hill Oxford, 2002.
9. O. O. Amu, S. A. Ogunniyi, and O. O. Oladeji “The suitability and lime stabilization requirement of some lateritic soil samples as pavement,” International Journal of Pure and Applied Sciences and Technology, vol. 2, no. 1, 2011, pp. 29-46.
10. G. O. Rowlands, M. Arabi, and R. Delpak, “Lime and the plasticity of clays,” The Journal of the Institution of Highways and Transportation, vol. 34, 1987, pp. 21-24.
11. W. H. Park, and C. Polprasert, “Phosphorus adsorption characteristics of oyster shells and alum sludge and their application for nutrient control in constructed wetland system,” J. Environ. Sci. Health, vol. 43, no. 5, 2008, pp. 511 – 517.
12. S. J. Poulos, Liquefaction related phenomena Advanced Dam Engineering for Design, Van Nostrand Reinhold pub., 1989, 292-320.

118-126

http://blueeyesintelligence.org/2checkout_download.html

21.

Authors:

A. Sivatharun, D. Haripriya

Paper Title:

Hand Gesture Controlled Vehicle Using Accelerometer with The Help of Zigbee Pairs

Abstract: In this paper a model to control the vehicle via hand gesture using accelerometer is presented. Accelerometer is a three axis device which is mounted on the human hand in order to perform the movement of the vehicle as per the actions performed by the human hand .The signal transmission from transmitter to receiver is done by zigbee technology. The microcontroller used is a ATmega328 microcontroller, it is programmed to take analog reading as input from accelerometer and to transmit the signal at the receiving end of the robotic arm.The DCmotor are used to achieve the movement of the vehicle. The main aim is to control the robotic arm via human gesture in a wired fashion with ease in motion over a given range. It consists of mainly two parts, one is transmitter part and another is receiver part. The transmitter will transmit the signal according to the position of accelerometer and your hand gesture and the receiver will receive the signal and make the vehicle move in respective direction. Here, the program is designed by using Arduino UNO.

Keywords: MCU, Gesture, Accelerometer, DC Motor, Aurduino UNO, Zigbee.

References:

1. Aditya Purkayastha, Akhil Devi, Arunav Bora, Akshaykumar, Pankaj“Hand Gestures Controlled Robotic Arm”, Journal of International Academic Research For Multidisciplinary, Vol-2, Issue-4, PP.-234240, May 2014.
2. Aggarwal, Varnika Gaur, PuneetVerma,“Design and Implementation of Wireless Gesture Controlled Robotic Arm with Vision”, International Journal of Computer Application, Vol-79, No.-13, PP.-3943, October 2013.
3. S. Perrin, A. Cassinelli and M. Ishikawa, May 2004, “Gesture Recognition Using Laser-Based Tracing System”, In Automated Face and Gesture Recognition. Proceeding, Sixth IEEE Conference, pp. 541-546 Available at: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1301 589
4. Y. Song, S. Shin, S. Kim, D. Lee, and K. H. Lee, “Speed estimation from a tri-axial accelerometer using neural networks, ” in 29th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBS 2007, pp. 3224-3227, 2007 Available at: http://www.ncbi.nlm.nih.gov/pubmed/18002682
5. J. Yang, W. Bang, E. Choi, S. Cho, J. Oh, J. Cho, S. Kim, E. Ki and D. Kim, 2006, “A 3D Hand drawn Gesture Input Device using Fuzzy ARTMAP-based Recognizer”, In Journal of Systemic, Cybernetics and Informatics, Vol. 4 Issue 3, pp. 1-7. Available at: http://www.iiisci.org/journal/CV$/sci/pdfs/P771618.pdf
6. K. Murakami and H. Taguchi, 1991, “Gesture Recognition using Recurrent Neural Networks”, In Proceedings of ACM CHI’91 Conference on Human Factors in Computing Systems, New Orleans, USA, pp. 237-242. Availableat:http://openexhibits.org/wpcontent/uploads/papers/Murakami_NNgesturerecognition_ 1993.pdf
7. Aswath S, Chinmaya Krishna Tilak, Amal Suresh and GaneshaUdupa, “Human Gesture Recognition for Real-Time Control of Humanoid Robot”, International Journal of Advances in Mechanical and Automobile Engineering (IJAMAE), Vol- 1, Issue 1, PP.96-100, (2014).
8. Shruthi B. N, Shivraj, Sumathi S, “Hand Gesture Based Direction Control of Robocar using Arduino Microcontroller”, International Journal of Recent Technology and Engineering(IJRTE), Volume-3, Issue-3,PP.-32-35, July 2014.
9. Vicky Somkuwar, RoshanGabhane, Sandeepkakde, “Design and Implementation of Gesture Controlled Robot using Flex sensor and Accelerometer”.
10. GauravGautam, AbhijeetAshish, Anil Kumar, Avdesh, “Wirelessly Hand Glove Operated Robot”, International Journal of AdvancedResearch in Electronics and Communication Engineering (IJARECE), Volume-3, Issue-11,PP.-1546-1547, November 2014.
11. Harish Kumar Kaura, VipulHonrao, SayaliPatil, PravishShetty, “Gesture Controlled Robot using Image Processing”, International Journal of AdvancedResearch in Artificial Intelligence (IJARECE), PP.-69-77, Vol-2, No.-5[2013].
12. Aditya Purkayastha, Akhil Devi Prasad, Arunav Bora, Akshaykumar Gupta, Pankaj Singh, “Hand Gestures Controlled Robotic Arm”, Journal of International Academic Research For Multidisciplinary, Vol-2, Issue-4, PP.-234-240, May 2014.

127-130

http://blueeyesintelligence.org/2checkout_download.html