Untitled - International Journal of Engineering and Advanced

Transcription

Untitled - International Journal of Engineering and Advanced
Editor In Chief
Dr. Shiv K Sahu
Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT)
Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India
Dr. Shachi Sahu
Ph.D. (Chemistry), M.Sc. (Organic Chemistry)
Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India
Vice Editor In Chief
Dr. Vahid Nourani
Professor, Faculty of Civil Engineering, University of Tabriz, Iran
Prof.(Dr.) Anuranjan Misra
Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University,
Noida (U.P.), India
Chief Advisory Board
Prof. (Dr.) Hamid Saremi
Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran
Dr. Uma Shanker
Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India
Dr. Rama Shanker
Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea
Dr. Vinita Kumari
Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India
Dr. Kapil Kumar Bansal
Head (Research and Publication), SRM University, Gaziabad (U.P.), India
Dr. Deepak Garg
Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE,
Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical
Education (ISTE), Indian Science Congress Association Kolkata.
Dr. Vijay Anant Athavale
Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India
Dr. T.C. Manjunath
Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India
Dr. Kosta Yogeshwar Prasad
Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot,
Gujarat, India
Dr. Dinesh Varshney
Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya
University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India
Dr. P. Dananjayan
Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India
Dr. Sadhana Vishwakarma
Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India
Dr. Kamal Mehta
Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India
Dr. CheeFai Tan
Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia
Dr. Suresh Babu Perli
Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India
Dr. Binod Kumar
Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest
International University, Ipoh, Perak, Malaysia
Dr. Chiladze George
Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia
Dr. Kavita Khare
Professor, Department of Electronics & Communication Engineering., MANIT, Bhopal (M.P.), INDIA
Dr. C. Saravanan
Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India
Dr. S. Saravanan
Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India
Dr. Amit Kumar Garg
Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana,
Ambala (Haryana), India
Dr. T.C.Manjunath
Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India
Dr. P. Dananjayan
Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India
Dr. Kamal K Mehta
Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India
Dr. Rajiv Srivastava
Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India
Dr. Chakunta Venkata Guru Rao
Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India
Dr. Anuranjan Misra
Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad,
India
Dr. Robert Brian Smith
International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie
Centre, North Ryde, New South Wales, Australia
Dr. Saber Mohamed Abd-Allah
Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai,
China
Dr. Himani Sharma
Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue,
Dundigal, Hyderabad, India
Dr. Sahab Singh
Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida,
India
Dr. Umesh Kumar
Principal: Govt Women Poly, Ranchi, India
Dr. Syed Zaheer Hasan
Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal
Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India.
Dr. Jaswant Singh Bhomrah
Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India
Technical Advisory Board
Dr. Mohd. Husain
Director. MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India
Dr. T. Jayanthy
Principal. Panimalar Institute of Technology, Chennai (TN), India
Dr. Umesh A.S.
Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India
Dr. B. Kanagasabapathi
Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City,
Bangalore, India
Dr. C.B. Gupta
Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India
Dr. Sunandan Bhunia
Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West
Bengal, India
Dr. Jaydeb Bhaumik
Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India
Dr. Rajesh Das
Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India
Dr. Mrutyunjaya Panda
Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India
Dr. Mohd. Nazri Ismail
Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia
Dr. Haw Su Cheng
Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya
Dr. Hossein Rajabalipour Cheshmehgaz
Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi
Malaysia (UTM) 81310, Skudai, Malaysia
Dr. Sudhinder Singh Chowhan
Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India
Dr. Neeta Sharma
Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India
Dr. Ashish Rastogi
Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India
Dr. Santosh Kumar Nanda
Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa),
India
Dr. Hai Shanker Hota
Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India
Dr. Sunil Kumar Singla
Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India
Dr. A. K. Verma
Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India
Dr. Durgesh Mishra
Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis
Institute of Technology, Indore (M.P.), India
Dr. Xiaoguang Yue
Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China
Dr. Veronica Mc Gowan
Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman
China
Dr. Mohd. Ali Hussain
Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry
(A.P.), India
Dr. Mohd. Nazri Ismail
Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA
Dr. Sunil Mishra
Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon
(Haryana), India
Dr. Labib Francis Gergis Rofaiel
Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology,
Mansoura City, Egypt
Dr. Pavol Tanuska
Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia
Dr. VS Giridhar Akula
Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India
Dr. S. Satyanarayana
Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India
Dr. Bhupendra Kumar Sharma
Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India
Dr. Praveen Agarwal
Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India
Dr. Manoj Kumar
Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India
Dr. Shaikh Abdul Hannan
Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad
(Maharashtra), India
Dr. K.M. Pandey
Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India
Prof. Pranav Parashar
Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India
Dr. Biswajit Chakraborty
MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India
Dr. D.V. Ashoka
Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India
Dr. Sasidhar Babu Suvanam
Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of
Engineering, Kadayiuruppu, Kolenchery, Kerala, India
Dr. C. Venkatesh
Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India
Dr. Nilay Khare
Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India
Dr. Sandra De Iaco
Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy
Dr. Yaduvir Singh
Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad,
Lucknow (U.P.), India
Dr. Angela Amphawan
Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
Dr. Ashwini Kumar Arya
Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era
University, Dehradun (U.K.), India
Dr. Yash Pal Singh
Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET,
Chandok, Bijnor, (U.P.), India
Dr. Ashish Jain
Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida
(U.P.), India
Dr. Abhay Saxena
Associate Professor&Head, Department. of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India
Dr. Judy. M.V
Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham,
Brahmasthanam, Edapally, Cochin, Kerala, India
Dr. Sangkyun Kim
Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea
Dr. Sanjay M. Gulhane
Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology,
Yavatmal, Maharastra, India
Dr. K.K. Thyagharajan
Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar,
Thiruyallur, Tamil Nadu, India
Dr. P. Subashini
Asso. Professor, Department of Computer Science, Coimbatore, India
Dr. G. Srinivasrao
Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India
Dr. Rajesh Verma
Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology &
Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India
Dr. Pawan Kumar Shukla
Associate Professor, Satya College of Engineering & Technology, Haryana, India
Dr. U C Srivastava
Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India
Dr. Reena Dadhich
Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India
Dr. Aashis.S.Roy
Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India
Dr. Sudhir Nigam
Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal,
(M.P.), India
Dr. S.Senthilkumar
Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering,
Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561756, South Korea Tamilnadu, India
Dr. Gufran Ahmad Ansari
Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of
Saudi Arabia (KSA)
Dr. R.Navaneethakrishnan
Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India
Dr. Hossein Rajabalipour Cheshmejgaz
Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai,
Malaysia
Dr. Veronica McGowan
Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman
China
Dr. Sanjay Sharma
Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India
Dr. Taghreed Hashim Al-Noor
Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq
Dr. Madhumita Dash
Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India
Dr. Anita Sagadevan Ethiraj
Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore
Institute of Technology (VIT) University, Tamilnadu, India
Dr. Sibasis Acharya
Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074,
Queensland, Australia
Dr. Neelam Ruhil
Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India
Dr. Faizullah Mahar
Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan
Dr. K. Selvaraju
Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu,
India
Dr. M. K. Bhanarkar
Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India
Dr. Sanjay Hari Sawant
Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India
Dr. Arindam Ghosal
Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida,
India
Dr. M. Chithirai Pon Selvan
Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology, Amity University,
Dubai, UAE
Dr. S. Sambhu Prasad
Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India.
Dr. Muhammad Attique Khan Shahid
Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science,
Faisalabad.
Dr. Kuldeep Pareta
Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India
Dr. Th. Kiranbala Devi
Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India
Dr. Nirmala Mungamuru
Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia
Dr. Srilalitha Girija Kumari Sagi
Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India
Dr. Vishnu Narayan Mishra
Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas
Road, Surat (Gujarat), India
Dr. Yash Pal Singh
Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India.
Dr. Sripada Rama Sree
Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem,
Andhra Pradesh. India.
Dr. Rustom Mamlook
Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East.
Dr. Ramzi Raphael Ibraheem Al Barwari
Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil –
Kurdistan, Erbil Iraq.
Dr. Kapil Chandra Agarwal
H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University,
Jai Bheem Nagar, Meerut, (U.P). India.
Dr. Anil Kumar Tripathy
Associate Professor, Department of Environmental Science & Engineering, Ghanashyama Hemalata Institute of Technology and
Management, Puri Odisha, India.
Managing Editor
Mr. Jitendra Kumar Sen
International Journal of Engineering and Advanced Technology (IJEAT)
Editorial Board
Dr. Soni Changlani
Professor, Department of Electronics & Communication, Lakshmi Narain College of Technology & Science, Bhopal (.M.P.), India
Dr. M .M. Manyuchi
Professor, Department Chemical and Process Systems Engineering, Lecturer-Harare Institute of Technology, Zimbabwe
Dr. John Kaiser S. Calautit
Professor, Department Civil Engineering, School of Civil Engineering, University of Leeds, LS2 9JT, Leeds, United Kingdom
Dr. Audai Hussein Al-Abbas
Deputy Head, Department AL-Musaib Technical College/ Foundation of Technical Education/Babylon, Iraq
Dr. Şeref Doğuşcan Akbaş
Professor, Department Civil Engineering, Şehit Muhtar Mah. Öğüt Sok. No:2/37 Beyoğlu Istanbul, Turkey
Dr. H S Behera
Associate Professor, Department Computer Science & Engineering, Veer Surendra Sai University of Technology (VSSUT) A Unitary
Technical University Established by the Government of Odisha, India
Dr. Rajeev Tiwari
Associate Professor, Department Computer Science & Engineering, University of Petroleum & Energy Studies (UPES), Bidholi,
Uttrakhand, India
Dr. Piyush Kumar Shukla
Assoc. Professor, Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal (M.P.), India
Dr. Piyush Lotia
Assoc.Professor, Department of Electronics and Instrumentation, Shankaracharya College of Engineering and Technology, Bhilai
(C.G.), India
Dr. Asha Rai
Assoc. Professor, Department of Communication Skils, Technocrat Institute of Technology, Bhopal (M.P.), India
Dr. Vahid Nourani
Assoc. Professor, Department of Civil Engineering, University of Minnesota, USA
Dr. Hung-Wei Wu
Assoc. Professor, Department of Computer and Communication, Kun Shan University, Taiwan
Dr. Vuda Sreenivasarao
Associate Professor, Department of Computr And Information Technology, Defence University College, Debrezeit Ethiopia, India
Dr. Sanjay Bhargava
Assoc. Professor, Department of Computer Science, Banasthali University, Jaipur, India
Dr. Sanjoy Deb
Assoc. Professor, Department of ECE, BIT Sathy, Sathyamangalam, Tamilnadu, India
Dr. Papita Das (Saha)
Assoc. Professor, Department of Biotechnology, National Institute of Technology, Duragpur, India
Dr. Waail Mahmod Lafta Al-waely
Assoc. Professor, Department of Mechatronics Engineering, Al-Mustafa University College – Plastain Street near AL-SAAKKRA
square- Baghdad - Iraq
Dr. P. P. Satya Paul Kumar
Assoc. Professor, Department of Physical Education & Sports Sciences, University College of Physical Education & Sports Sciences,
Guntur
Dr. Sohrab Mirsaeidi
Associate Professor, Department of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia
Dr. Ehsan Noroozinejad Farsangi
Associate Professor, Department of Civil Engineering, International Institute of Earthquake Engineering and Seismology (IIEES)
Farmanieh, Tehran - Iran
Dr. Omed Ghareb Abdullah
Associate Professor, Department of Physics, School of Science, University of Sulaimani, Iraq
Dr. Khaled Eskaf
Associate Professor, Department of Computer Engineering, College of Computing and Information Technology, Alexandria, Egypt
Dr. Nitin W. Ingole
Associate Professor & Head, Department of Civil Engineering, Prof Ram Meghe Institute of Technology and Research, Badnera
Amravati
Dr. P. K. Gupta
Associate Professor, Department of Computer Science and Engineering, Jaypee University of Information Technology, P.O. Dumehar
Bani, Solan, India
Dr. P.Ganesh Kumar
Associate Professor, Department of Electronics & Communication, Sri Krishna College of Engineering and Technology, Linyi Top
Network Co Ltd Linyi , Shandong Provience, China
Dr. Santhosh K V
Associate Professor, Department of Instrumentation and Control Engineering, Manipal Institute of Technology, Manipal, Karnataka,
India
Dr. Subhendu Kumar Pani
Assoc. Professor, Department of Computer Science and Engineering, Orissa Engineering College, India
Dr. Syed Asif Ali
Professor/ Chairman, Department of Computer Science, SMI University, Karachi, Pakistan
Dr. Vilas Warudkar
Assoc. Professor, Department of Mechanical Engineering, Maulana Azad National Institute of Technology, Bhopal, India
Dr. S. Chandra Mohan Reddy
Associate Professor & Head, Department of Electronics & Communication Engineering, JNTUA College of Engineering
(Autonomous), Cuddapah, Andhra Pradesh, India
Dr. V. Chittaranjan Das
Associate Professor, Department of Mechanical Engineering, R.V.R. & J.C. College of Engineering, Guntur, Andhra Pradesh, India
Dr. Jamal Fathi Abu Hasna
Associate Professor, Department of Electrical & Electronics and Computer Engineering, Near East University, TRNC, Turkey
Dr. S. Deivanayaki
Associate Professor, Department of Physics, Sri Ramakrishna Engineering College, Tamil Nadu, India
Dr. Nirvesh S. Mehta
Professor, Department of Mechanical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, South Gujarat, India
Dr. A.Vijaya Bhasakar Reddy
Associate Professor, Research Scientist, Department of Chemistry, Sri Venkateswara University, Andhra Pradesh, India
Dr. C. Jaya Subba Reddy
Associate Professor, Department of Mathematics, Sri Venkateswara University Tirupathi Andhra Pradesh, India
Dr. TOFAN Cezarina Adina
Associate Professor, Department of Sciences Engineering, Spiru Haret University, Arges, Romania
Dr. Balbir Singh
Associate Professor, Department of Health Studies, Human Development Area, Administrative Staff College of India, Bella Vista,
Andhra Pradesh, India
Dr. D. RAJU
Associate Professor, Department of Mathematics, Vidya Jyothi Institute of Technology (VJIT), Aziz Nagar Gate, Hyderabad, India
Dr. Salim Y. Amdani
Associate Professor & Head, Department of Computer Science Engineering, B. N. College of Engineering, PUSAD, (M.S.), India
Dr. K. Kiran Kumar
Associate Professor, Department of Information Technology, Bapatla Engineering College, Andhra Pradesh, India
Dr. Md. Abdullah Al Humayun
Associate Professor, Department of Electrical Systems Engineering, University Malaysia Perlis, Malaysia
Dr. Vellore Vasu
Teaching Assistant, Department of Mathematics, S.V.University Tirupati, Andhra Pradesh, India
Dr. Naveen K. Mehta
Associate Professor & Head, Department of Communication Skills, Mahakal Institute of Technology, Ujjain, India
Dr. Gujar Anant kumar Jotiram
Associate Professor, Department of Mechanical Engineering, Ashokrao Mane Group of Institutions, Vathar, Maharashtra, India
Dr. Pratibhamoy Das
Scientist, Department of Mathematics, IMU Berlin Einstein Foundation Fellow Technical University of Berlin, Germany
Dr. Messaouda AZZOUZI
Associate Professor, Department of Sciences & Technology, University of Djelfa, Algeria
Dr. Vandana Swarnkar
Associate Professor, Department of Chemistry, Jiwaji University Gwalior, India
Dr. Arvind K. Sharma
Associate Professor, Department of Computer Science Engineering, University of Kota, Kabir Circle, Rajasthan, India
Dr. R. Balu
Associate Professor, Department of Computr Applications, Bharathiar University, Tamilnadu, India
Dr. S. Suriyanarayanan
Associate Professor, Department of Water and Health, Jagadguru Sri Shivarathreeswara University, Karnataka, India
Dr. Dinesh Kumar
Associate Professor, Department of Mathematics, Pratap University, Jaipur, Rajasthan, India
Dr. Sandeep N
Associate Professor, Department of Mathematics, Vellore Institute of Technology, Tamil Nadu, India
Dr. Dharmpal Singh
Associate Professor, Department of Computer Science Engineering, JIS College of Engineering, West Bengal, India
Dr. Farshad Zahedi
Associate Professor, Department of Mechanical Engineering, University of Texas at Arlington, Tehran, Iran
Dr. Atishey Mittal
Associate Professor, Department of Mechanical Engineering, SRM University NCR Campus Meerut Delhi Road Modinagar, Aligarh,
India
Dr. Hussein Togun
Associate Professor, Department of Mechanical Engineering, University of Thiqar, Iraq
Dr. Shrikaant Kulkarni
Associate Professor, Department of Senior faculty V.I.T., Pune (M.S.), India
Dr. Mukesh Negi
Project Manager, Department of Computer Science & IT, Mukesh Negi, Project Manager, Noida, India
Dr. Sachin Madhavrao Kanawade
Associate Professor, Department Chemical Engineering, Pravara Rural Education Society’s,Sir Visvesvaraya Institute of Technology,
Nashik, India
Dr. Ganesh S Sable
Professor, Department of Electronics and Telecommunication, Maharashtra Institute of Technology Satara Parisar, Aurangabad,
Maharashtra, India
Dr. T.V. Rajini Kanth
Professor, Department of Computer Science Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India
Dr. Anuj Kumar Gupta
Associate Professor, Department of Computer Science & Engineering, RIMT Institute of Engineering & Technology, NH-1, Mandi
Godindgarh, Punjab, India
Dr. Hasan Ashrafi- Rizi
Associate Professor, Medical Library and Information Science Department of Health Information Technology Research Center,
Isfahan University of Medical Sciences, Isfahan, Iran
Dr. Golam Kibria
Associate Professor, Department of Mechanical Engineering, Aliah University, Kolkata, India
Dr. Mohammad Jannati
Professor, Department of Energy Conversion, UTM-PROTON Future Drive Laboratory, Faculty of Electrical Enginering, Universit
Teknologi Malaysia,
Dr. Mohammed Saber Mohammed Gad
Professor, Department of Mechanical Engineering, National Research Centre- El Behoos Street, El Dokki, Giza, Cairo, Egypt,
Dr. V. Balaji
Professor, Department of EEE, Sapthagiri College of Engineering Periyanahalli,(P.O) Palacode (Taluk) Dharmapuri,
Dr. Naveen Beri
Associate Professor, Department of Mechanical Engineering, Beant College of Engg. & Tech., Gurdaspur - 143 521, Punjab, India
Dr. Abdel-Baset H. Mekky
Associate Professor, Department of Physics, Buraydah Colleges Al Qassim / Saudi Arabia
Dr. T. Abdul Razak
Associate Professor, Department of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli – 620 020 India
Dr. Preeti Singh Bahadur
Associate Professor, Department of Applied Physics Amity University, Greater Noida (U.P.) India
Dr. Ramadan Elaiess
Associate Professor, Department of Information Studies, Faculty of Arts University of Benghazi, Libya
Dr. R . Emmaniel
Professor & Head, Department of Business Administration ST, ANN, College of Engineering & Technology Vetapaliem. Po, Chirala,
Prakasam. DT, AP. India
Dr. C. Phani Ramesh
Director cum Associate Professor, Department of Computer Science Engineering, PRIST University, Manamai, Chennai Campus,
India
Dr. Rachna Goswami
Associate Professor, Department of Faculty in Bio-Science, Rajiv Gandhi University of Knowledge Technologies (RGUKT) DistrictKrishna, Andhra Pradesh, India
Dr. Sudhakar Singh
Assoc. Prof. & Head, Department of Physics and Computer Science, Sardar Patel College of Technology, Balaghat (M.P.), India
Dr. Xiaolin Qin
Associate Professor & Assistant Director of Laboratory for Automated Reasoning and Programming, Chengdu Institute of Computer
Applications, Chinese Academy of Sciences, China
Dr. Maddila Lakshmi Chaitanya
Assoc. Prof. Department of Mechanical, Pragati Engineering College 1-378, ADB Road, Surampalem, Near Peddapuram, East
Godavari District, A.P., India
Dr. Jyoti Anand
Assistant Professor, Department of Mathematics, Dronacharya College of Engineering, Gurgaon, Haryana, India
Dr. Nasser Fegh-hi Farahmand
Assoc. Professor, Department of Industrial Management, College of Management, Economy and Accounting, Tabriz Branch, Islamic
Azad University, Tabriz, Iran
Dr. Ravindra Jilte
Assist. Prof. & Head, Department of Mechanical Engineering, VCET Vasai, University of Mumbai , Thane, Maharshtra 401202, India
Dr. Sarita Gajbhiye Meshram
Research Scholar, Department of Water Resources Development & Management Indian Institute of Technology, Roorkee, India
Dr. G. Komarasamy
Associate Professor, Senior Grade, Department of Computer Science & Engineering, Bannari Amman Institute of Technology,
Sathyamangalam,Tamil Nadu, India
Dr. P. Raman
Professor, Department of Management Studies, Panimalar Engineering College Chennai, India
Dr. M. Anto Bennet
Professor, Department of Electronics & Communication Engineering, Veltech Engineering College, Chennai, India
Dr. P. Keerthika
Associate Professor, Department of Computer Science & Engineering, Kongu Engineering College Perundurai, Tamilnadu, India
Dr. Santosh Kumar Behera
Associate Professor, Department of Education, Sidho-Kanho-Birsha University, Ranchi Road, P.O. Sainik School, Dist-Purulia, West
Bengal, India
Dr. P. Suresh
Associate Professor, Department of Information Technology, Kongu Engineering College Perundurai, Tamilnadu, India
Dr. Santosh Shivajirao Lomte
Associate Professor, Department of Computer Science and Information Technology, Radhai Mahavidyalaya, N-2 J sector, opp.
Aurangabad Gymkhana, Jalna Road Aurangabad, India
Dr. Altaf Ali Siyal
Professor, Department of Land and Water Management, Sindh Agriculture University Tandojam, Pakistan
Dr. Mohammad Valipour
Associate Professor, Sari Agricultural Sciences and Natural Resources University, Sari, Iran
Dr. Prakash H. Patil
Professor and Head, Department of Electronics and Tele Communication, Indira College of Engineering and Management Pune, India
Dr. Smolarek Małgorzata
Associate Professor, Department of Institute of Management and Economics, High School of Humanitas in Sosnowiec, Wyższa
Szkoła Humanitas Instytut Zarządzania i Ekonomii ul. Kilińskiego Sosnowiec Poland, India
Dr. Umakant Vyankatesh Kongre
Associate Professor, Department of Mechanical Engineering, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal,
Maharashtra, India
Dr. Niranjana S
Associate Professor, Department of Biomedical Engineering, Manipal Institute of Technology (MIT) Manipal University, Manipal,
Karnataka, India
Dr. Naseema Khatoon
Associate Professor, Department of Chemistry, Integral University Lucknow (U.P), India
Dr. P. Samuel
Associate Professor, Department of English, KSR College of Engineering Tiruchengode – 637 215 Namakkal Dt. Tamilnadu, India
Dr. Mohammad Sajid
Associate Professor, Department of Mathematics, College of Engineering Qassim University Buraidah 51452, Al-Qassim Saudi
Arabia
Dr. Sanjay Pachauri
Associate Professor, Department of Computer Science & Engineering, IMS Unison University Makkawala Greens Dehradun-248009
(UK)
Dr. S. Kishore Reddy
Professor, Department of School of Electrical & Computer Engineering, Adama Science & Technology University, Adama
Dr. Muthukumar Subramanyam
Professor, Department of Computer Science & Engineering, National Institute of Technology, Puducherry, India
Dr. Latika Kharb
Associate Professor, Faculty of Information Technology, Jagan Institute of Management Studies (JIMS), Rohini, Delhi, India
Dr. Kusum Yadav
Associate Professor, Department of Information Systems, College of Computer Engineering & Science Salman bin Abdulaziz
University, Saudi Arabia
Dr. Preeti Gera
Assoc. Professor, Department of Computer Science & Engineering, Savera Group of Institutions, Farrukh Nagar, Gurgaon, India
Dr. Ajeet Kumar
Associate Professor, Department of Chemistry and Biomolecular Science, Clarkson University 8 Clarkson Avenue, New York
Dr. M. Jinnah S Mohamed
Associate Professor, Department of Mechanical Engineering, National College of Engineering, Maruthakulam.Tirunelveli, Tamil
Nadu, India
Dr. Mostafa Eslami
Assistant Professor, Department of Mathematics, University of Mazandaran Babolsar, Iran
Dr. Akram Mohammad Hassan Elentably
Professor, Department of Economics of Maritime Transport, Faculty of Maritime Studies, Ports & Maritime Transport, King AbdulAziz University
Dr. Ebrahim Nohani
Associate Professor, Department of Hydraulic Structures, Dezful Branch, Islamic Azad University, Dezful, Iran
Dr. Aarti Tolia
Faculty, Prahaldbhai Dalmia Lions College of Commerce & Economics, Mumbai, India
Dr. Ramachandra C G
Professor & Head, Department of Marine Engineering, Srinivas Institute of Technology, Valachil, Mangalore-574143, India
Dr. G. Anandharaj
Associate Professor, Department of M.C.A, Ganadipathy Tulsi's Jain Engineering College, Chittoor- Cuddalore Road, Kaniyambadi,
Vellore, Tamil Nadu, India
Volume-3 Issue-4, April 2014, ISSN: 2249-8958 (Online)
S.
No
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd.
Authors:
T.S.Keerthiga, S.Sarika
Paper Title:
Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols
Page
No.
Abstract: Secure multiparty protocols is used as third party protocols in the data hiding and security. The major
problem is, there is no Security Scheme operated for Data Storage Services between Multi Party protocols. To
overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity,
which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the
protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information. The
system deals with Generalization approach, with a common Identification. Suppression approach, used for Hiding
User Identity. In the secure random key algorithm, an Authentication Key is generated before a user change/update
the data for Verification. Entire Data is encrypted to ensure Security.
Keywords: Security, Privacy, k-anonymity, Multi Party protocols.
1.
References:
1.
2.
3.
4.
5.
6.
7.
Mehmet Ercan Nergiz,Abdullah Ercument Cicek,Thomas B.Pedersen,and Yucel Saygin,”A Look-Ahead Approach to Secure Multiparty
Protocols”,IEEE Transactions on knowledge and data engineering,VOL.24,NO.7,JULY 2012.
M.Kantarclu and C.Clifton, “Privacy-Preserving Distributed Mining of association Rules on Horizontally Partitioned Data,”IEEE Trans.
Knowledge and Data Eng., vol. 16, no. 9,pp. 1026-1037,Sept. 2004.
R.C.-W. Wong, J. Li, A.W.-C. Fu, and K. Wang, “(α, k)-Anonymity:An Enhanced K-Anonymity Model for Privacy Preserving Data
Publishing,” Proc. 12th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ’06), pp. 754-759, 2006.
B.-C. Chen, K. LeFevre, and R. Ramakrishnan,“Privacy Skyline:Privacy with Multidimensional Adversarial Knowledge,” Proc.33rd Int’l
Conf. Very Large Data Bases (VLDB ’07), pp. 770-781, 2007.
S.R. Ganta, S.P. Kasiviswanathan, and A. Smith, “CompositionAttacks and Auxiliary Information in Data Privacy,” Proc. 14thACM
SIGKDD Int’l Conf. Knowledge Discovery and Data Mining(KDD ’08), pp. 265-273, http://doi.acm.org/10.1145/1401890.1401926, 2008.
G.Ghinita,P.Karras,P.Kalnis,and N.Mamoulis,”Fast Data Anonymization with Low Information Loss”,Proc.33rd Int’l conf.Very Large Data
Bases(VLDB’07),PP.758-769,2007.
M.E.Nergiz,M.Atzori,andC.Clifton,”Hiding the presence of individuals in Shared Databases”,Proc.ACM SIGMOD Int’l Conf.Management
of Data(SIGMOD’07),June-2007
1-3
Authors:
T. Hemanth Kumar, P. Swaminathan, M. Mohanraj
Paper Title:
Modeling and Simulation of an Intelligent Power Conversion System for Photovoltaic Generation
Abstract: This paper represents a simulation and design of two types of Maximum Power Point Tracking (MPPT)
algorithm methods is proposed. Here the PV system is composed to a boost converter which can perform with those
algorithm methods. In this the algorithm methods are Perturb and Observe (P&O) and Probability of Neural Network
(PNN). The probability of neural network which can be deals with the neurons and can be included the neural based
Maximum Power Point Tracking. By using these different MPPT techniques we can maximize the PV array output
which can be track continuously from the solar panel’s temperature and irradiation. These MPPT techniques can be
explained by using the MATLAB.
Keywords: Solar Module, Maximum Power Point Tracking (MPPT), Perturb and Observe (P&O) and Probability
of Neural Network (PNN).
2.
References:
1.
2.
3.
4.
5.
6.
7.
8.
Samer Alsadi, Basim Alsayid "Maximum Power
Point Tracking Simulation for Photovoltaic Systems Using Perturb and Observe
Algorithm" International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012.
David Sanz Morales "Maximum Power PointTracking Algorithms for Photovoltaic Applications"Thesis submitted for examination for the
degree ofMaster of Science in Technology. Espoo 14.12.2010.
J. Surya Kumari and Ch. Sai Babu Mathematical Modeling and Simulation of Photovoltaic Cell using Matlab-Simulink Environment
International Journal of Electrical and Computer Engineering (IJECE) Vol. 2, No. 1, February 2012, pp. 26~34.
M.Lokanadham, K.Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622
www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012, pp.1420-1424.
M.C. Di Piazza, M. Pucci, G. Vitale ConsiglioNazionale delle Ricerche, Istituto di Studi sui Sistemi Intelligenti per l'Automazione (ISSIA CNR), sezione di Palermo, via Dante 12, 90141 Palermo, Italy.
Donald F . Specht "Probabilistic Neural Network" Neural Networks, Vol. 3, pp. 109-118, 1990
Mahmoud A. younis, Tamer khatib, Mushtaq najeeb, A Mohd ariffin przegl?d elektrotechniczny (Electrical Review), ISSN 0033-2097, R.
88 NR 3b/2012.
Vincent Cheung, Kevin Cannons, Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba June
10, 2002.
Authors:
3.
4-8
Khalilimard, Hussein
How Construction Errors Affecting the Bearing Capacity of the Concrete Beams? Inelastic Deflection
Paper Title:
of Concrete I-Beams
Abstract:
Reinforced concrete I-beams are widely used in bridge construction. The span length to beam height
ratio in these decks is sometimes between 15 and 30. Due to the widespread utilization of these bridges and their
heavy traffic loads, special attention must be directed at recognizing the behaviors that lead to construction errors
associated with these structures. Because of various construction and environmental factors, construction faults might
9-16
result in concrete quality or during concrete placement which can consequently lead to inhomogeneities in beam
sections. This means that concrete density and compressive strength in the beam cross section might deteriorate
along the section height.
Extensive research has been conducted on the non-linear and inhomogeneous behavior of concrete beams. However,
few researchers have specifically addressed density and compressive strength variations along beam cross sections.
The present research is aimed at estimating from elastic material parameters, the concrete I-beam inelastic deflection
resulting from inhomogeneous behavior along the beam cross sectional height. The behavior of the beam under study
was checked by comparing its relevant parameters with the results obtained from the OpenSees Software and the
method proposed in the Concrete Code ACI318. Excellent agreement was observed in both cases. Moreover, a value
of unity was proposed for parameter “n” in the relation set forth by Branson in the Concrete Code ACI318 for
estimating section cracking moment in long span I-beams.
Keywords: Inelastic Deflection, Concrete Beam, Inhomogeneity, Cracked section, Construction errors.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
4.
Joseph E. Wickline (2002) "A Study of Effective Moment of Inertia Models For Full-Scale Reinforced Concrete T-Beams Subjected To a
Tandem-Axle Load Configuration
Y.Y. Chang1, et. al. (2004) "A Simplified Method For Nonlinear Cyclic Analysis of Reinforced Concrete Structures: Direct And Energy
Based Formulations", 13th World Conference on Earthquake Engineering, Vancouver, B.C., Canada, Paper No. 2830.
Abd El Aziz, Mohamad Fathy. (2006) "Non-linear analysis of concrete beams prestressed and post-tensioned with carbon fiber reinforced
polymer (CFRP) bars", Electronic Theses and Dissertations.
Cengiz Dundar, Ilker Fatih Kara (2007) "Three dimensional analysis of reinforced concrete frames with cracked beam and column
elements", Engineering Structures 29, 2262–2273.
Bischoff, P. H. and Scanlon, A. (2007) “Effective Moment of Inertia for Calculating Deflections of Concrete Members Containing Steel
Reinforcement and Fiber-Reinforced Polymer Reinforcement”, ACI Structural Journal, Vol. 104, No. 1, pp. 68-75.
ACI-CRC Final Report (2008) “A Study of Static and Dynamic Modulus of Elasticity of Concrete”.
M. Ahmed et. al. (2008) "Effect of Concrete Cracking on The Lateral Response of RCC Buildings", Asian Journal of Civil Engineering
(building and housing) Vol. 9, No. 1 (2008), pp. 25-34.
İlker Kalkan (2010) "Deflection Prediction for Reinforced Concrete Beams Through Different Effective Moment of Inertia Expressions",
Int. J. Eng. Research & Development, Vol. 2, No. 1.
Bischoff, P. H., and Gross, S. P. (2011) “Equivalent moment of inertia based on integration of curvature.” Journal of Compos. Constr.,
15(3), 263–273.
Kulkarni S.K. et. al. (2012) "Elastic Properties of RCC Under Flexural Loading-FE Approach", World Research Journal of Civil
Engineering, ISSN: 2277-5986 & E-ISSN: 2277-5994, Vol. 2, Issue 1, 2012, pp.-30-33.
S. Roohollah Mousavi and M. Reza Esfahani (2012), "Effective Moment of Inertia Prediction of FRP-Reinforced Concrete Beams Based on
Experimental Results", Journal of Composites For Construction © ASCE / September/October 2012 16:490-498.
Jing Bo An (2012) "Nonlinear Analysis for Bending Cross Section of Tensile-Compression Prestressed Concrete Beam", Applied
Mechanics and Materials, 204-208, 4538.
Amadio, Claudio et. al. (2012) "Evaluation of the deflection of steel-concrete composite beams at serviceability limit state", Journal of
constructional steel research, Vol. 73 , p. 95-104. ISSN 1873-5983.
Lin, X. and Zhang, Y. (2013) "Novel Composite Beam Element with Bond-Slip for Nonlinear Finite-Element Analyses of Steel/FRPReinforced Concrete Beams", J. Struct. Eng. , 10.1061/(ASCE)ST.1943-541X.0000829 , 06013003.
Shahida Manzoor, Shuaib Ahmad (2013) "Ductility of RC Beams using Grade 72.5 Re-bar Steel", International Journal of Civil &
Environmental Engineering IJCEE-IJENS Vol:13 No:03, p 5-8.
Naser Kabashi et al., (2013) "Behaviour of concrete elements under the transversal forces and strengthening with the FRP", 2nd
International Balkans Conference on Challenges of Civil Engineering, BCCCE, Epoka University, Tirana, Albania.
Alameer Ali (2013) "Behaviour of Prestressed Ultra-High Performance Concrete I-Beams Subjected to Shear and Flexure", A thesis
submitted to the Faculty of Graduate and Postdoctoral Studies, University of Ottawa, Canada
S. B. Kandekar et. al. (2013) "Concrete Grade Variation in Tension and Compression Zones of RCC Beams", International Journal of
Innovative Research in Science, Engineering and Technology, ISSN: 2319-8753, Vol. 2, Issue 8
Md Shahnewazv (2013) "Shear Behavior of Reinforced Concrete Deep Beams Under Static and Dynamic Loads", Bangladesh University of
Engineering and Technology.
Patel, Vipulkumar Ishvarbhai (2013) "Nonlinear inelastic analysis of concrete-filled steel tubular slender beam-columns", PhD thesis thesis,
Victoria University.
Amini Najafian H et. al. (2013) "Comparative assessment of finite element and strut and tie based design methods for deep beams",
Magazine of Concrete Research, Vol:65, ISSN:0024-9831, Pages:970-986
Bukhari IA et al. (2013) "Shear Strengthening of Short Span Reinforced Concrete Beams with CFRP Sheets", Arabian Journal for Science
and Engineering, Vol:38, ISSN:1319-8025, Pages:523-536
Stochino, Flavio (2013) "Flexural models of reinforced concrete beams under blast load", Doctoral Thesis, Universita' degli Studi di
Cagliari.
ACI 318 (2008) "Building Code Requirements for Reinforced Concrete and Commentary", American Concrete Institute, Michigan.
Authors:
D. Usha Nandini, Ezil Sam Leni, M. MariaNimmy
Paper Title:
Mining of High Utility Itemsets from Transactional Databases
Abstract: Efficient discovery of high utility itemsets from transactional databases crucial task in data mining. UPGrowth and UP-Growth+ algorithms are proposed for mining high utility itemsets. In this paper we also proposed a
compact tree structure, called Utility pattern tree (UP-Tree) and it maintains the information of high utility itemsets.
Previously we proposed FP-Growth algorithm for mining only large number of frequent itemsets, but not generate
the high utility itemsets. They have the issue of producing large number of candidate itemsets and probably it
degrades mining performance in terms of speed and space requirement. However, our previous study needs more
space and execution time. Many algorithms are used to show the performance of UP-Growth and UP-Growth+. UPGrowth and UP-Growth+ becomes more efficient since database contain long transactions and generate fewer
number of candidates than FP-Growth. The experimental results and comparison validate its effectiveness.
Keywords: Candidate pruning, Data mining, Frequent itemset, High utility itemset.
References:
1.
2.
3.
4.
R. Srikant and R. Agrawal, “Fast algorithms for mining association rules,” in Proc. of The 20th VLDB Conf,” pp. 487-499, 1994.
R. Agrawal, Imielinski. T and A. Swami, “Mining association rules between sets of items in large databases”, in proceedings of the ACM
SIGMOD International Conference on Management of data, pp. 207-216, 1993.
R. Agrawal and R. Srikant, “Mining Sequential Patterns,” in Proc. of the 11th Int’l Conference on Data Engineering, pp. 3-14, Mar 1995.
Liu. Y, Liao. W, A. Choudhary, ”A Fast High Utility Itemsets Mining Algorithm,” In: 1st Workshop on Utility-Based Data Mining. Chicago
17-21
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Illinois, 2005.
A.W.C. Fu, C.H. Cai, C.H. Cheng, and W.W. Kwong, “Mining Association Rules with Weighted Items,” Proc. Int’l DB Engineering and
Apps Symp. (IDEAS ’98), pp. 68-77, 1998.
Tanbeer. S.K., C.F. Ahmed, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE
Trans. Knowledge and Data Engineering, vol. 21, no. 12, pp. 1708-1721, Dec. 2009.
J. Yang, W. Wang, and Yu. P, “Efficient Mining of Weighted Association Rules (WAR),” Proc. ACM SIGKDD Conference. Knowledge
Discovery and Data Mining (KDD ‘00), pp. 270-274, 2000.
Tao. F, Farid. M, and F. Murtagh, “Weighted Association Rule Mining Using Weighted Support and Significance Framework,” Proc. ACM
SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’03), pp. 661-666, 2003.
Erwin. A, Gopalan. R.P, Achuthan. N.R., “A Bottom-Up Projection Based Set of rules for Mining High Utility Itemsets,” In: International
Workshop on Integrating AI and Data Mining. Gold Coast, Australia, 2007.
Tseng V.S, C.W. Wu, B.E. Shie, and P.S. Yu, “UP-Growth: An Efficient Algorithm for High Utility Itemsets Mining,” Proc. 16th ACM
SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’10), pp. 253-262, 2010.
Han. J, J. Pei, Yin. Y, “Mining frequent patterns without candidate generation,” In: ACM SIGMOD International Conference on
Management of Data, 2000.
S.J. Yen and Y.S. Lee, “Mining High Utility Quantitative Association Rules.” Proc. Ninth Int’l Conf. Data Warehousing and Knowledge
Discovery (DWK), pp. 283-292, Sept. 2007.
U. Yun, “An Efficient Mining of Weighted Frequent Patterns with Length Decreasing Support Constraints,” Knowledge-Based Systems, vol.
21, no. 8, pp. 741-752, Dec 2008.
Y.-C. Li, C.C. Chang and J.S. Yeh, “Isolated Items Discarding Strategy for Discovering High Utility Itemsets,” Data and Knowledge
Engineering, vol. 64, no. 1, pp. 198-217, (Jan 2008).
http:// fimi.cs.helsinki.fi/, 2012.Frequent Itemset Mining Implementations Repository,
Authors:
P.Chandra Sekhar, M.V.Sai Tej, U.N.S.Vijayshri, J.Nitish Kumar
Paper Title:
Design and Implementation of Microwave Inverted ‘L’ and ‘J’ Filter
Abstract: In this paper, a filter is proposed using micro strip, series of patch. S-parameters, return loss and VSWR
are calculated for the filter. A reference filter is designed using a series of patches and is modified into an inverted L
and J line filter (proposed filter). The proposed filter can be easily implemented and has excellent filter
characteristics which are near to the ideal filter. There are many practical applications of this filter for example in
microwave radio relay communication systems, radio astronomy, RADAR. The entire simulation is done using CST
Microwave Studio.
Keywords: Filter, micro strip, return loss, S-parameters, VSWR, transmission coefficient.
References:
5.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
David M. Pozar, “Microwave Engineering”, John Wiley & Sons, Inc., Fourth Edition, 2011.
Constantine A. Balanis, “Antenna Theory: Analysis and Design”, John Wiley & Sons, Inc., Second Edition, 1997.
Mathew M. Radmanesh, “Advanced Rf & Microwave Circuit Design: The Ultimate Guide to Superior Design”, Author House, 2009.
P. Chandra Sekhar, et.al, “Performance Evaluation of Various filters at X band Frequency”, 10th IEEE International conference on Wireless
and Optical Communication Networks (WOCN)-2013, pp.1-5, July 2013.
Lotfi Neyestanak A.A, “Ultra wideband rose leaf microstrip patch antenna,” Progress in Electromagnetic Research, Vol. 86, pp.155-168,
2008.
Roger L Freeman, “Fundamentals of Telecommunications”, John Wiley & Sons, Second Edition. Aug 2013.
Ian C Hunter, “Theory and Design of Microwave Filters”, The institution of Electrical Engineers, 2001.
Bates, R. N, “Design of microstrip spur-line band-stop filters,” Microwave, Optics and Acoustics, Vol. 1, No. 6, 1977.
Computer Simulation Technology, CST studio suite 2010.
H.W. Wu, S.K. Liu, M.H. Weng, C.H. Hung, “Compact microstrip band pass filter with multi spurious Suppression,” Progress in
Electromagnetic Research, Vol. 107, pp.21-30, 2010.
Chin K.S. and D.J. Chen, “Novel microstrip band pass filters using direct-coupled triangular stepped-impedance resonators for spurious
suppression.” Progress in Electromagnetic Research Letters, Vol. 12, pp. 11-20. 2009.
A K Tiwary and N Gupta, “Performance of two microstrip low pass filter on EBG ground plane”, Microwave Review, Vol. 15, No. 2, pp,
37-40, Dec. 2009.
J S Hong, M J Lancaster, Microwave Filters for RF/Microwave Applications, New York: John Wiley and Sons, Inc; 2001.
Authors:
Zaki Majeed AbduAllah, Omar Talal Mahmood, Ahmed M. T. Ibraheem AL-Naib
Paper Title:
Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller
22-26
Abstract:
This paper presents the design and practical implementation of a buck-type power converter for
Photovoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking
(MPPT) algorithm. A buck converter is used to regulate battery charging. The system is controlled by a Peripheral
Interface Controller (PIC) 16F877A microcontroller from Microchip via sensing the solar panel voltage and
generating the Pulse Width Modulation (PWM) signal to control duty cycle of the buck converter. This type of
microcontroller was chosen because it has the necessary features for the proposed design such as built-in Analog-toDigital Converter (ADC), PWM outputs, low power consumption and low cost. Simulation and experimental results
demonstrate the effectiveness and validity of the proposed system.
6.
Keywords: Photovoltaic, MPPT, Buck Converter, PIC16F877A.
References:
1.
2.
3.
4.
5.
6.
S. Masri, P. Chan,“Development of a Microcontroller Based Boost Converter for Photovoltaic System ”, European Journal of Scientific
Research, ISSN 1450-216X,Vol. 41 No.1, pp.38-47, 2010.
Zhengshicheng, L. Wei, “Research and Implementation of Photovoltaic Charging System with MPPT”, 3rd IEEE Conference on Industrial
Electronics and Applications, pp.619-624, 2008.
M.H. Rashid, “Power Electronics Handbook”, Second Edition, ISBN 13-978-0-12-088479-7, 2007.
M.A.S. Masoum, H. Dehbonei, E.F. Fuchs, “ Theoretical and Experimental Analyses of Photovoltaic Systems with Voltage and CurrentBased MPPT ”, IEEE Transactions on Energy Conversion, Vol. 17, No. 4, pp.514-522, December 2002.
E Koutroulis, K. Kalaitzakis, N.C. Voulgaris, “Development of a Microcontroller Based Photovoltaic MPPT Control System”, IEEE
Transactionson Power Electronics, Vol. 16, No. 1, pp.46-54, January 2001.
M.S. Rahman, “Buck Converter Design Issues”, Master thesis performed in division of Electronic Devices, 2007.
27-31
7.
PIC16F87XA Data Sheet DS39582B, Microchip Technology, Inc.
Authors:
Rathod Balasaheb S, Satish. M. Rajmane
Paper Title:
A Case Study on Design of a Flywheel for Punching Press Operation
Abstract: A flywheel is the heavy rotating mass which is placed between the power source and the driven machine
to act as a reservoir of energy. It is used to store the energy when the demand of energy of energy is less and deliver
it when the demand of energy is high. The current paper is focused on the analytical design of arm type of flywheel
which is used for punching press operation. Now in regard to the design of flywheel it is required to decide the mean
diameter of the flywheel rim, which depends upon two factors such as availability of space and the limiting value of
peripheral velocity of the fly wheel. However the current design problem is formulated for punching machine which
has to be make holes of 30 holes/minute in a steel plate of 18mm thickness with space limitation that is the diameter
of flywheel should not exceed 1000mm, hence it can be observed that the design of the flywheel is to be carried out
(based) on the availability of space limitation and accordingly the fluctuation of energy, dimensions of the flywheel,
stresses induced in the flywheel are determined. Finally after detail analysis it is observed that the induced diameter
of the flywheel is less than the allowable/permissible diameter and hence it can be concluded that the design is safe
from availability of space point of view.
7.
Keywords: Flywheel, peripheral velocity, fluctuation of energy, stresses, stored energy.
32-35
References:
1.
2.
3.
4.
5.
6.
7.
Akshay P. Punde, G.K.Gattani , Analysis of Flywheel, International Journal of Modern Engineering Research (IJMER) , Vol.3, Issue.2,
March-April. 2013 pp-1097-1099
Bjorn Bolund , Hans Bernhoff, Mats Leijon , Flywheel energy and power storage systems,international journal of Renewable and
Sustainable Energy Reviews 11 (2007) 235–258
Sudipta Saha, Abhik Bose, G. Sai Tejesh, S.P. Srikanth , computer aided design & analysis on flywheel for greater efficiency, International
Journal of Advanced Engineering Research and Studies, IJAERS/Vol. I/ Issue II/January-March, 2012/299-301
M.lavakumar, R.prasanna srinivas, Design and analysis of light weight motor vehicle flywheel, International Journal of Computer Trends
and Technology (IJCTT) – volume 4 Issue -7July 2013
Sushama G Bawane , A P Ninawe and S K Choudhary, Analysis and optimization of flywheel, International Journal of mechanical
engineering and robotics Vol. 1, No. 2, July 2012
S. M. Dhengle, Dr. D. V. Bhope, S. D. Khamankar , sInvestigation of stresses in arm type rotating flywheel, International Journal of
Engineering Science and Technology (IJEST), Vol. 4 No.02 February 2012.
D.Y. Shahare, S. M. Choudhary , Design Optimization of Flywheel of Thresher using FEM, Advanced Materials Manufacturing &
Characterization Vol3 Issue 1 (2013)
Authors:
K.Suganya, S.Dhamodharan
Paper Title:
Assessment of Data Quality in Health Care Using Association Rules
Abstract: To find the outlier and disease possibility of ten cancer diseases. In the existing system, Transactional
data of three companies are taken as input. Association rules are extracted from the input data using open source data
mining tool.By applying consistency rule, the outliers are identified. Outliers are manually examined to determine
whether any data quality is violation has really occurred. Cost for manual examination is estimated using confusion
matrix. In this system, recorded patient details is taken as input. From the input data, association rule is identified and
outliers are detected. Weight is assigned to each symptoms of all considered cancer disease. When user enters the
symptoms, percentage of cancer disease possibility is calculated.
8.
Keywords: Association rule,outlier,consistency rule
36-37
References:
1.
2.
3.
4.
5.
6.
9.
Ms. Ishtake S.H , Prof. Sanap S.A."Intelligent Heart Disease Prediction System Using Data Mining Techniques" International J. of
Healthcare & Biomedical Research, Volume: 1, Issue: 3, Pages 94-101,April ( 2013)
K.Srinivas, B.Kavihta Rani,A.Govrdhan, "Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks"
K.Srinivas et al. / (IJCSE) International Journal on Computer Science and Engineering,Vol. 02, No. 02, Pages 250-255, (2010)
Bendi Venkata Ramana, Prof. M.Surendra Prasad Babu, Prof. N. B. Venkateswarlu,"A Critical Study of Selected Classification Algorithms
for Liver Disease Diagnosis" International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May (2011)
Chunhua Ju, Yaolin Li ,"An Incremental Outlier Detection Model for Transaction Data Streams" , Journal of Information & Computational
Science 10: 1 Pages: 49–59 (2013)
Anjali Barmade, Madhu M.Nashipudinath, "An Efficient Strategy to Detect Outlier Transactions" International Journal of Soft Computing
and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January( 2014 )
S.Preetha, V.Radha "Enhanced Outlier Detection Method Using Association Rule Mining Technique" International Journal of Computer
Applications (0975 – 8887) Volume 42– No.7, March (2012 )
Authors:
L.Lakshmanan, D.C.Tomar, Japala Saikrishna Rao
Paper Title:
Implementation of Protus2.0 by Ontology for Advanced E Learning
Abstract: Protus2.0 E_ learning environment is used in learning process for decision making, communication and
problem-solving. The semantic web used in real-time annotations of these ontology for debriefing of the students,
student self study and better guidance of the learning methodologies of mentors.A ever-present methodology
environment will provides an interoperable, pervasive, and flawless learning structural design to connect, fix
together, and share three major scope of learning resources such as learning collaborators, learning services, and
learning contents. ever-present learning is characterized for identify right learning collaborators, right learning
contents and right learning services in the right place at the right time. it promotes the achievement of practical
knowledge as well as decision production, communication, and problem solving with help of ontological Skillsbased learning environments. These environments are a important to give feedback about the students from the
practically conducted sessions and comments of learners actions can notify to the assessment of their quality process.
38-40
And also, those learning environments are helping to the researchers for better understand the learning process. The
proposed system examined study environments. Also, achieve the better student improving the knowledge as well as
feedback of the understanding of learning environments; we proposed a new mechanism such as semantic based
approach with the ontology is used.
Keywords:
systems.
semanticweb,ontology mapping methods, fuzzy logic, fuzzy grouping, k-means algorithms, tutorial
References:
1.
2.
3.
4.
5.
6.
7.
M.J. Weal, D. Michaelides, K.R. Page, D.C. De Roure, E. Monger, and M. Gobbi, “Semantic Annotation of Ubiquitous Learning
Environments,” IEEE Trans. Learning Technologies, vol. 5, no. 2, pp. 143-156, Apr.-June 2012.
T. Tiropanis, H. Davis, D. Millard, and M. Weal, “Semantic Technologies for Learning and Teaching in the Web 2.0 Era—A Survey,” Proc.
Society On-Line (WebSci ’09), http://eprints.ecs. soton.ac.uk/17106, 2009.
J.W. McDonald, M.O. Gobbi, D. Michaelides, E. Monger, M.J.Weal, and D. De Roure, “Grid-Enabled Data Collection and Analysis:
Semantic Annotation in Skills-Based Learning,” Proc.Fourth Int’l Conf. E-Social Science, June 2008.
M.J. Weal, D.T. Michaelides, D.C. De Roure, M. Gobbi, E. Monger, and J.W. McDonald, “Semantic Annotation in Ubiquitous Healthcare
Skills-Based Learning Environments,” Proc. Workshop Semantic Web in Ubiquitous Healthcare (ISWC), Nov. 2007.
K.R. Page, D.T. Michaelides, S.J.B. Shum, Y.-H. Chen-Burger, J.Dalton, D.C. De Roure, M. Eisenstadt, S. Potter, N.R. Shadbolt, A.Tate, M.
Bachler, and J. Komzak, “Collaboration in the Semantic Grid: A Basis for E-learning,” Applied Artificial Intelligence, vol. 19, nos. 9/10, pp.
881-904, Nov. 2005.
O. Lassila and M. Adler, “Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web,” Spinning the Semantic Web, D. Fensel, ed.,
MIT, pp. 363-376, 2003.
T. D. of Health, “Delivery 21st Century IT Support for the NHS: National Strategic Programme,” technical report, The Stationary Office,
June 2002.
Authors:
Richu Sam Alex, R Narciss Starbell
Paper Title:
Energy Efficient Intelligent Street Lighting System Using ZIGBEE and Sensors
Abstract: Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the
limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to
automate the system so that we can conserve energy as well as to maximize the efficiency of the system. In this paper
a new method is suggested so as to maximize the efficiency of the street lighting system and to conserve the energy
usage by the system with the help of ZIGBEE and sensors. It uses a sensor combination to control and guarantee the
desired system parameters. The information is transferred point by point using ZIGBEE transmitters and receivers
and is sent to the control terminal used to check the state of the street lamps and hence we can take immediate actions
if required.
Keywords: Automation, Atmega, LED, PV, Sensors.
10.
References:
1.
2.
3.
4.
5.
6.
7.
11.
A. Valente, R. Morais, C. Serodio, P. Mestre, S. Pinto, and M. Cabral, “A zigbee sensor element for distributed monitoring of soil parameters in environmental monitoring,” Proc. IEEEE Sensors, pp. 135–138, Oct. 2007.
Z. Rasin, H. Hamzah, and M. S. M. Aras, “Application and evaluation of high power zigbee based wireless sensor network in water
irrigation control monitoring system,” in Proc. IEEE Symp. Ind. Electron. Appl., Oct. 4–6, 2009, vol. 2, pp. 548–551.
H. Tao and H. Zhang, “Forest monitoring application systems based on wireless sensor networks,” in Proc. 3rd Int. Symp. Intell. Inf.
Technol. Appl. Workshops, Nov. 21–22, 2009, pp. 227–230.
J. Liu, C. Feng, X. Suo, and A. Yun, “Street lamp control system based on power carrier wave,” in Proc. Int. Symp. Intell. Inf. Technol.
Appl. Workshops, Dec. 21–22, 2008, pp. 184–188.
Y. Chen and Z. Liu, “Distributed intelligent city street lamp monitoring and control system based on wireless communication chip
nRF401,” in Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput., Apr. 25–26, 2009, vol. 2, pp. 278–281.
W. Yongqing, H. Chuncheng, Z. Suoliang, H. Yali, and W. Hong, “Design of solar LED street lamp automatic control circuit,” in Proc. Int.
Conf. Energy Environment Technol., Oct. 16–18, 2009, vol. 1, pp. 90–93.
M. A. D. Costa, G. H. Costa, A. S. dos Santos, L. Schuch, and J. R. Pinheiro, “A high efficiency autonomous street lighting system based
on solar energy and LEDs,” in Proc. Power Electron. Conf., Brazil, Oct. 1, 2009, pp. 265–273.
Authors:
KR.Akshara, N.Srinivasan
Paper Title:
Collective Behavior Learning on Heterogeneous Affiliation in OSN
41-44
Abstract: Millions of real world data is generated by the social network like Facebook, twitter etc which gives us
an opportunity to under or predict users behavior by means of collective learning. Many studies have been conducted
already on this field. Existing algorithm uses connection or user relationship to understand their behavior but they
lack the understanding of heterogeneity in their connection which reduces the effectiveness of their algorithm. In this
project we proposed a mechanism to focus on these issues by introducing the concept of edge centric clustering for
classification of users based on their heterogeneity affiliation and extracting the social dimension , relevant
community detection is made and the social dimension is extracted by using chi square testing model. Here in this
work it also reduce the computational problem by scaling the samples applying the scheme sparse social network
Keywords: Collective Learning, Social Dimension, Community Detection
References:
1.
2.
3.
4.
L. Tang and H. Liu, “Toward predicting collective behavior via social dimension extraction,” IEEE Intelligent Systems, vol. 25,pp. 19–25,
2010.
L.Tang and H.Liu, “Relational learning via latent social dimensions,” in KDD ’09: Proceedings of the 15th ACM SIGKDD international
conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 817–826.
M. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical Review E vol. 74, no. 3, 2006.
[Online].Available:http://dx.doi.org/10.1103/PhysRevE.74.036104
L. Tang and H. Liu, “Scalable learning of collective behavior based on sparse social dimensions,” in CIKM ’09: Proceeding of the 18th
45-47
ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2009, pp. 1107–1116.
P. Singla and M. Richardson, “Yes, there is a correlation: - from social networks to personal behavior on the web,” in WWW ’08:
Proceeding of the 17th international conference on World Wide Web. New York, NY, USA: ACM, 2008, pp. 655–664.
6. M. McPherson, L. Smith-Lovin, and J. M. Cook, -Birds of a feather: Homophily in social networks.
7. A. T. Fiore and J. S. Donath, “Homophily in online dating: when do you like someone like yourself?” in CHI ’05: CHI ’05extended abstracts
on Human factors in computing systems. NewYork, NY, USA: ACM, 2005, pp. 1371–1374.
8. H. W. Lauw, J. C. Shafer, R. Agrawal, and A. Ntoulas, “Homophily in the digital world: A LiveJournal case study,” IEEE Internet
Computing, vol. 14, pp. 15–23, 2010.
9. S. A. Macskassy and F. Provost, “Classification in networked data: A toolkit and a univariate case study,” J. Mach. Learn .Res., vol. 8, pp.
935–983, 2007.
10. X. Zhu, “Semi-supervised learning literature survey,” 2006.[Online].Available: ttp://pages.cs.wisc.edu/∼jerryzhu/ pub/ssl survey 12 9
2006.pdf
5.
Authors:
A. Prasanth Babu, N. Srinivasan
Paper Title:
Temporal Analyzing Time Interval for Text Document in Text Excavation
Abstract:
Text excavation has been an unavoidable data excavation technique. There are different methods for
text excavation, the most famous one criterion matching successful will be excavation using the effective criterions.
The quality of excavation text data is the main problem text excavation due to the large number of terms, words,
tables, phrases, and noise. However, the originality of excavation terms in text data may be not high because of lot of
noise in text especially in the domain of text excavation. Pattern taxonomy model is a criterion-based method which
adopts the technique of sequential criterion excavation and uses closed criterions as features in the representative. In
Criterion taxonomy model it does not analyze the time period to the given text documents and also does not provide
the rank to the given sets of documents. Existing is used to term-based approach to extracting the text. In this system
we are going to propose the temporal text excavation approach which it calculates the time series and give the rank of
the documents by decomposing the documents.
Keywords: Text Excavation, Terrestrial sequence, Stumble Criterion Evolution, D-Criterion.
12.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
M.F. Caropreso, S. Matlin, and F. Sebastiani. Statistical Phrases in Automated Text Categorization, Technical Report IEI-B4-07- 2000,
Instituto di Elaborazione dell’Informazione, 2000.
C. Cortes and V. Vapnik. Substantiate-Vector Networks, Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.
S.T. Dumais, Improving the Retrieval of Information from External Sources, Behavior Research Methods, Instruments, and Computers,
Vol. 23, No. 2, pp. 229-236, 1991.
J. Han and K.C.-C. Chang. Data Excavation for Web Intelligence, Computer, Vol. 35, No. 11, pp. 64-70, Nov. 2002.
J. Han, J. Pei, and Y. Yin. Excavation Frequent Criterions without Candidate Generation, Proc. ACM SIGMOD Int’l Conf. Management of
Data (SIGMOD ’00), pp. 1-12, 2000.
Y. Huang and S. Lin. Excavation Sequential Criterions Using Graph Search Techniques, Proc. 27th Ann. Int’l Computer Software and
Applications Conf., pp. 4-9, 2003.
N. Jindal and B. Liu. Identifying Comparative Sentences in Text Documents, Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and
Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006.
K.Aas and L.Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999.
R.Agrawal and R.Srikant, “Fast Algorithms for Excavation Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data
Bases (VLDB ’94), pp. 478-499, 1994.
H.Ahonen, O.Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Excavation Techniques for Descriptive Phrase Extraction in
Digital Document Collections,” Proc. IEEE Int’l Forum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11,
1998.
R. Baeza-Yates and B.Ribeiro-Neto, Modern Information Retrieval. Addison Wesley, 1999.
N.Cancedda, N. Cesa-Bianchi, A. Conconi, and C. Gentile, “Kernel Methods for Document Filtering,” TREC, trec.nist.gov/
ubs/trec11/papers/kermit.ps.gz, 2002.
Authors:
Kulkarni Akshata
Paper Title:
A Review on Glucagon like Peptide-1 Approach in Diabetes Melltius
Abstract: Epidemiology of diabetes has gained great significance both in estimating the burden of the disease and
also in finding out the risk factors with an ultimate goal of prevention of the disease. Type 2 diabetes is a progressive
chronic disease resulting from a dynamic interaction between defects in insulin secretion and insulin action. New
molecules have recently been launched and many others are under clinical investigation. Besides classical
sulfonylureas and glinides, new insulin secretagogues are now available, which target the incretin gut hormone
glucagon-like peptide-1 (GLP-1). Indeed, oral incretin enhancers acting as antagonists of the enzyme DPP-4
(dipeptidylpeptidase-4), which inactivates natural GLP-1, and injectable incretin mimetics (exenatide) or analogues
(liraglutide), which reproduce the actions of GLP-1 while resisting to DPP-4, represent new opportunities to
stimulate insulin secretion, without increasing the risk of hypoglycaemia and weight gain. Therapies based on the
incretin hormone glucagon-like peptide 1 (GLP-1) are novel treatment options for type 2 diabetes. Incretin hormones
cause an increase in the amount of insulin released from beta cells in the pancreas following ingestion of food.
Glucagon-like peptide-1 (GLP-1) is the most well-characterized incretin hormone, which is considered to be the most
important incretin released by the gut into the bloodstream in response to meal. In addition to its effects on insulin
secretion after eating, primary function of GLP-1 is to enhance insulin secretion. GLP-1 also has additional effects
that can help in the management of diabetes.
Keywords: Diabetes mellitus, Glucagon like peptide-1, incretins.
References:
1.
2.
C Alarcon, B Wicksteed, C.J Rhodes,Exendin 4 controls insulin production in rat islet beta cells predominantly by potentiation of glucosestimulated proinsulin biosynthesis at the translational level. Diabetologia;49: 2006.pp-2920–2929.
J.M Barragan,J Eng, R Rodriguez,E Blazquez, Neural contribution to the effect of glucagon-like peptide-1-(7-36) amide on arterial blood
48-50
51-54
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
pressure in rats. Am J Physiol; 277: 1999. E784– E791.
D.J Drucker,The role of gut hormones in glucose homestasis. J Clin Invest, 2007.117:pp-24-32.
M Moller, S.P Sheikh,Central administration of GLP-1-(7-36) amide inhibits food and water intake in rats. Am J Physiol; 271: 1999,R848–
R856.
M.M Engelgau, T.J Thompson, W.H Herman ,JP Boyle, Aubert R.E,S.J.Kenny, Diabetes Care,1997, pp-785–91.
H.C Fehmann, J.F Habener, Functional receptors for the insulinotropic hormone glucagon-like peptide-I(7-37) on a somatostatin secreting
cell line. FEBS Lett,279,1991, pp-335–340.
F.M Gribble, Targetting GLP-1 release as potential strategy for therapy of type-2 diabetes mellitus,In:Diabetic medicine,25(8),1991,pp-889894.
J.J Holst, C Orskov,O.V Nielsen,T.W Schwartz,Truncated glucagon-like peptide I, an insulin-releasing hormone from the distal gut. FEBS
Lett 211,1987,pp-169–174.
M.I Harris,R.C Eastman,C.C Cowie,K.M Flegal,M.S Eberhardt MS,Diabetes Care,20,1987,pp-1859–62.
B Kreymann,G.Williams,M.A Ghatei,SR Bloom, Glucagon-like peptide-1 7-36: a physiological incretin in man. Lancet; 2: 1987, pp-1300–
1304.
L.B Knudsen,Pridal,Glucogon like peptide-1(9-36) amide is major metabolite and glucagon like peptide-1(7-38)amide after in vivo
administration to dogs and it acts as antagonist on pancreatic receptor. In: European of journal pharmacology, 318, (2-3),1996,pp-429-435.
K Meeran K,D O’Shea,CM Edwards,M..D Turton, MM Heath,I Gunn,S Abusnana,M Rossi,CJ Small,A.P Goldstone,G.M Taylor,D Sunter,J
Steere,S.J Choi,M.A Ghatei,SR Bloom Repeated intracerebroventricular administration of glucagon-like peptide1-(7-36) amide or exendin(9-39) alters body weight in the rat. Endocrinology; 140,1999,pp-244–250.
S Mojsov,G.C Weir,J.F Habener J.F,Insulinotropin: glucagon-like peptide I (7-37) co-encoded in the glucagon gene is a potent stimulator of
insulin release in the perfused rat pancreas. J Clin Invest,79,1987,pp-616–619.
JJ Meier,B Gallwitz,S Salmen,O Goetze,J.J Holst, W.E Schmidt,M.A Nauck Normalization of glucose concentrations and deceleration of
gastric emptying after solid meals during intravenous glucagon-like peptide 1 in patients with type 2 diabetes. J Clin Endocrinol Metab,
88,2003,2719–2725.
C Orskov,A Wettergren,J.J Holst J.J,Secretion of incretin hormones glucagon like peptide-1 and gastric inhibition polypeptide with insulin
secretion in normal man throughout day .In:Scandianrian journal of gastroenterology,31(7), 1996,pp-665-670.
C Ruiz-Grande,C Alarcn,E Mzrida,I Valverde,Lipolytic action of glucagon-like peptides in isolated rat adipocytes. Peptides; 13,1992,pp-13–
16.
M Szayna,M.E Doyle,JA Betkey,H.W Holloway,R.G Spencer,N.H Greig,J.M Egan,Exendin-4 decelerates food intake, weight gain, and fat
deposition in Zucker rats. Endocrinology; 141,2000,1936–1941.
M.D Turton,D O’Shea,I Gunn,S.A Beak,C.M Edwards,K Meeran,S.J Choi,G.M Taylor,M.M Heath,P.D Lambert, Wilding J.P, Smith DM,
Ghatei M.A, Herbert J, Bloom S.R,A role for glucagon-like peptide-1 in the central regulation of feeding. Nature 6;379,1996,pp-69–72.
R.E.Wachters-Hagedoorn,M.G.Prieb,A.M Heiner,J.J
Holst,The rate of intestinal glucose absorption is corrected with plasma
glucose.Depending insulinotropic polypeptide concentration in healthy men,In:the journal of nutrition,(136) 6,2006,pp-1511-1516.
B Willms,J Werner,J.J Holst ,C Orskov,W Creutzfeldt, M.A Nauck,Gastric emptying, glucose responses, and insulin secretion after a liquid
test meal: effects of exogenous glucagon-like peptide-1 (GLP-1)-(7-36) amide in type 2 (noninsulin-dependent) diabetic patients. J Clin
Endocrinol Metab; 81,1996,pp-327–332.
M Zander,A Christiansen,S Madsbad,J.J Holst, Additive Effect of Glucagon-Like Peptide 1 and Pioglitazone in Patients with Type 2
Diabetes. Diabetes Care, 27, 2004, pp-1910-1914.
Authors:
Devarshi Chaurasia
Bus Rapid Transit System (BRTS): A Sustainable Way of City Transport (Case Study of Bhopal
Paper Title:
BRTS)
Abstract:
Irrespective of the cities of any country around the world, at some point of time they have faced
problems associated with passenger mobility and connecting the city periphery with central part, in urban areas and
found few innovative solutions to overcome the problems. Urban Planners, Engineers and Urban Administrator have
found Bus Rapid Transit (BRT) System as efficient, cost effective and simple as compare to other Light Rail Transit
(LRT) and Metro Rail solution to provide ‘life line’ to city. Many cities around the world operating BRTS and
getting positive results including so many Indian cities. By this technical paper, I am investigating the salient features
and properties of BRT system with the help of various operational BRT. At last, I am presenting an observational
study of Bhopal BRT system to analyze the actual condition and lacunas of BRTS.
Keywords: BRT system, Urban Transport, City, Passenger Mobility.
References:
1.
2.
14.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Ahmedabad Bus Rapid Transit System, Urban Transport Initiatives in India: Best Practices in PPP report by National Institute of Urban
Affairs, India http://www.niua.org/projects/tpt/AHMEDABAD%20BRTS.pdf http://www.ahmedabadbrts.com/web/About_JanMarg.html
Agarwal P.K., Sharma Anupama, Sing A.R. (2010), An overview on Bus Rapid Transit System, JERS/Vol.-I/Issue-II/ Oct.-Dec./ page.
195-205.
Bus Rapid Transit System Bhopal, Presentation by BCEOM International France, Bhopal Municipal Corporation, Sept. 2008 Downloaded
from Internet on Aug. 2013)
BRT Case Study, Curitiba, Brazil. http://onlinepubs.trb.org/onlinepubs/tcrp/tcrp90v1_cs/Curitiba.pdf
Colleen McCaul (2009), Project Manager of GTZ Consulting Team: Johannesburg Rea Vaya BRT Project, South Africa
http://www.unhabitat.org/downloads/docs/7997_81569_rea_vaya.pdf
HT Correspondent, Hindustan Times Bhopal, June 20, 2013 http://www.hindustantimes.com/India-news/Bhopal/3-things-missing-fromBhopal-BRTS-estimates-panel/Article1-1079470.aspx
Jaiswal Anuj, Sharma Ahsutosh (2012); ‘Optimization of Public Transport Demand : A case study of Bhopal’ IJSRP/Vol.-2/Issue-7/July
2012, ISSN No.: 2250-3153
Kadiyali,L.R,(2008),Traffic Engineering and Transportation Planning, Khanna Publishers,Seventh Edition, Delhi.
Kumar
Manish,
Sustainable
Cities
Collective
,
Article
(Downloaded
from
Internet
net
on
6/10.2013)
http://sustainablecitiescollective.com/kumar-manish/180741/my-bus-brts-launched-bhopal-bridges-old-city-and-new-city-india
Lloyd Wright, University College London, Book Title-Sustainable Transport: A source book for Policy Makers in Developing Cities,
Module 3b: Bus Rapid Transit http://www.itdp.org/documents/brtplanningguidedec04.pdf
Mohan Dinesh, Planning for Public Transport: Integrating Safety, Environment and Economic Issues, Transportation Research and Injury
Prevention Programme Indian Institute of Technology, New Delhi 110 016, India.
Rafael
Villarsed
(2008),
Bagota
Bus
Rapid
Transit,
Transmilenio
Institutional
Presentation.
http://tram.mcgill.ca/Teaching/seminar/presentations/BRTBog.pdf
Transport Research & Injury Prevention Programme-TRIPP (2008), BRTS special Issue, IIT Delhi.
Tiwari Geetam, Bus Priority Lanes for Delhi, Transportation Research and Injury Prevention Programme, Indian Institute of Technology,
Delhi, India 110016.
Yoga Adiwinarto (2013), Expanding TransJakarta BRT through ‘Direct service’ system, 32nd Southern Africa Transport Conference.
55-63
Authors:
Remya George, Anjaly Cherian.V, Annet Antony, Harsha Sebestian, Mishal Antony, Rosemary
Babu.T
Paper Title:
An Intelligent Security System for Violence against Women in Public Places
Abstract:
This paper describes about an intelligent security system for women. Women all over the world are
facing much unethical physical harassment. This acquires a fast pace due to lack of a suitable surveillance system.
Our project is a venture to resolve this problem. The systems mainly consist of a monitoring device, the output of
which is processed to identify insecure environments. Upon identifying unsafe environments system will send
message to near-by control room also turn on alarms placed all around the area letting help from others. This system
can be positioned in public places such as railway stations, bus stands, foot paths and shopping mall, where women
are commonly experiencing attacks. We really believe that this endeavor will make a difference in the life of many
and dream about seeing this world with individuals walking fearlessly.
Keywords: women security, face recognition.
References:
1.
2.
15.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
“violence against women in India-a literature review”-Sheela Saravanan, Intsitute of social studies trust.
Aisha Meethian and B.M.Imran, “Real Time Gesture Recognition Using Gaussian Mixture Model”, International Journal of Scientific &
Engineering Research, Volume 4, Issue 8, August-2013.
”A mobile application for women”-Times of India, Dec 03 2013.
“electronic device for women safety”- Times of India, Sep 15 2013.
P. Viola and M. J. Jones, “Robust real-time face detection”, International Journal of Computer Vision, 57(2):137–154, 2004.
Qiang Li, Bo Li ,”Online Finger Gesture Recognition Using Surface Electromyography Signals”-Journal of Signal and Information
Processing, 2013, 4, 101-105 doi:10.4236/jsip.2013.42013 Published Online May 2013
A. Samal and P.A. Iyengar, “Automatic Recognition and Analysis of Human Faces and Facial Expressions: A Survey,” Pattern Recognition,
vol. 25, no. 1, pp. 65-77, 1992.
Y. Tian, T. Kanade and J. Cohn, “Recognizing Action Units for Facial Expression Analysis,” IEEE Trans. Pattern Analysis and Machine
Intelligence,vol. 23, no. 2, pp. 97–115, 2001.
Regina Lionnie, Ivanna K. Timotius and Iwan Setyawan ,“Performance Comparison of Several Pre-Processing Methods in a Hand Gesture
Recognition System based onNearest Neighbor for Different Background Conditions”, ITB J. ICT, Vol. 6, Nov. 3, 2012.
Vinay Bettadapura,” Face Expression Recognition and Analysis: The State of the Art”
Chen Wu and Hamid Aghajan “Model-based Human Posture Estimation for Gesture Analysis in an Opportunistic Fusion Smart Camera
Network” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 9, pp. 884–900, 2007
P. Ekman and W.V. Friesen, “Manual for the Facial ActionCoding System,”Consulting Psychologists Press,1977.
MPEG Video and SNHC, “Text of ISO/IEC FDIS 14 496-3: Audio,” in Atlantic City MPEG Mtg., Oct. 1998, Doc. ISO/MPEG N2503.
“Robust object tracking using local kernels and background information”-Jaideep Jeyakar, R. Venkatesh Babu, K. R. Ramakrishnan
“Multiple Object Tracking by Kernel Based Centroid Method for Improve Localization”- Rahul Mishra1, Mahesh K. Chouhan2, Dr. Dhiiraj
Nitnawwre3 International Journal of Advanced Research in Computer Science and Software Engineering.
M.S. Ryoo and J.K. Aggerwal, “observe and explain: a new approach for multiple hypotheses tracking of humans and objects” , university of
Texsas,pg:1-8,2005
Tao Zhao and Ram Nevatia, “tracking multiple human in a crowded environment”, International Journal of Computer Vision, pg:1-9,2004
Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang, “Multiple Human Objects Tracking in Crowded Scenes”, International Journal of
Computer Vision, pg:1-4,2006
Andrew Rayam, Adam Rossi, “automated facial expression recognition system”, IEEE transactions, pg 1-6, 2009
Ole Helvig Jensen, “Implementing the Viola-Jones Face Detection Algorithm”, Technical University of Denmark, pg:1-32,2008
Deqing Sun, Stefan Roth, Michael J Black, “secrets of optical flow estimation and their principles”, Brown university, pg:1-8, 2010
Authors:
A.Mathumathi, Nivya.R.Mohan, Neethu Babu, D.Padmapriya, Anoop, M.Geetha Priya
Paper Title:
Leakage Power Optimization for VLSI Circuits @90nm CMOS Process
64-68
Abstract:
In Integrated Circuits (IC), the transistor density is increased by scaling down the size of MOSFETs.
Scaling down of devices sizes for improving the performance has lead to a substantial increase in the subthreshold
leakage current. In this paper, a new method is proposed to reduce leakage power in standby mode of operation. This
proposed method combines Input Vector Control (IVC) and Gate Replacement (GR) techniques. The proposed
method is validated by applying to three different benchmark circuits at 90nm CMOS process technology using
HSPICE. The final results obtained are compared with other well known leakage reduction techniques and the
proposed method proves to be more effective than other existing techniques.
Keywords: leakage reduction, HSPICE, CMOS, full adder, PDP
References:
16.
1.
2.
3.
4.
5.
6.
7.
8.
9.
M. Geetha Priya and K. Baskaran, “A Novel Low Power 3 Transistor based Universal Gate for VLSI Applications”, Journal of Scientific
and Industrial Research, vol. 72, pp. 217-221, Apr. 2013
M.Geetha Priya and K. Baskaran, “A new universal gate for low power SoC applications”, Sadhana-Academy Proceedings in Engineering
Sciences, vol. 38, pp. 6445-651, Aug. 2013
Afshin Abdollahi, Farzan Fallah and Massoud Pedram, “Leakage Current Reduction in CMOS VLSI Circuits by Input Vector Control”,
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 140-154, Feb. 2004
Saibal Mukhopadhyay, Cassondra Neau, Riza Tamer Cakici, Amit Agarwal, Chris H. Kim and Kaushik Roy, “Gate Leakage Reduction for
Scaled Devices Using Transistor Stacking”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 11, no. 4, pp. 716730, Aug. 2003
Narender Hanchate and Nagarajan Ranganathan, “LECTOR: A Technique for Leakage Reduction in CMOS Circuits”, IEEE Transactions
on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 196-205, Feb. 2004
Lin Yuan and Gang Qu, “A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction”, IEEE
Transactions on Very Large Scale Integration (VLSI) Systems, vol. 14, no. 2, pp. 173-182, Feb. 2006
Kaushik Roy, Saibal Mukhopadhyay and Hamid Mahmoodi-Meimand, “Leakage Current Mechanisms and Leakage Reduction Techniques
in Deep-Submicrometer CMOS Circuits”, Proceedings of the IEEE, vol. 91, no. 2, pp. 305-327, Feb. 2003
M. Geetha Priya, K. Baskaran, D. Krishnaveni & S. Srinivasan, "A New Leakage Power Reduction Technique for CMOS VLSI Circuits",
Journal of Artificial Intelligence, vol.5, pp. 227-232, 2012
Yu Wang, Xiaoming Chen, Wenping Wang, Yu Cao, Yuan Xie and Huazhong Yang, “Leakage Power and Circuit Aging Cooptimization
69-72
by Gate Replacement Techniques”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 19, no. 4, pp. 615-628, Apr.
2011
Authors:
Nandini Ammanagi, Rahul Khadilkar, Akash Harwani, Disha Budhlani, Disha Dembla
Comparison of the Performance of Microstrip Antenna at 2.4GHz Using Different Substrate
Paper Title:
Materials
Abstract:
This paper discusses the performance of various dielectric substrates, having dielectric constants
ranging from 2 to 5. These designs are basically rectangular micro strip patch antennas for wireless communication
resonating at 2.4 GHz. They are simulated using the evaluator's version of the software IE3D and their performances
are compared with respect to ‘return loss v/s frequency’ and ‘vswr v/s frequency’ parameters. The comparison is
made for four dielectric substrates: FR4, RO-3003, PTFE(Teflon) and Polyguide. Analysis of each is done and
compiled using MATLAB to show relative performance.
17.
Keywords: Antenna, Dielectric substrate, IE3D, Microstrip, Rectangular Patch.
73-75
References:
1.
2.
3.
4.
5.
C. A. Balanis, “Antenna Theory-Analysis and Design,” 2nd ed., J. Peters, John Wiley and Sons, pp. 728-730.
G. Kumar, K. P. Ray, “Broadband microstrip antennas”,
Artech House, 2003.
N. Agarwal, D.C.Dhubkarya, R. Mittal,“ Designing \& Testing of Rectangular Micro strip antenna operating at 2.0 GHz using IE3D” ,
Global Journal of Researches in Engineering, Volume 11 Issue 1, Version 1.0 February 2011, Journal Publisher: Global Journals Inc.
(USA)
K.Praveen Kumar, K.Sanjeeva Rao ,V.Mallikarjuna Rao, et al. “The effect of dielectric permittivity on radiation characteristics of coaxially feed rectangular patch antenna: Design & Analysis”, International Journal of Advanced Research in Computer and Communication
Engineering Vol. 2, Issue 2, February 2013.
A. Khan,R Nema. "Analysis of Five Different Dielectric SubstratesOn Microstrip Patch Antenna", International Journal of Computer
Applications (0975 – 8887), Volume 55, No.18, October 2012.
Authors:
Naser Hussein Judran, Ravi Jon
Paper Title:
A Study on Carbon Nano Tube and Bucky Balls Membrane for Water Purification
Abstract: Carbon Nanotube are single sheets of graphite (called graphene) rolled into cylinders. The diameter of
the tubes is typically of nanometer dimensions, while the lengths are typically micrometers. In this paper we are
going Explore the property of Carbon Nanotube which is currently the focus of intense research. The Nanotube may
consist of one up to tens and hundreds of concentric shells of carbons with adjacent shells separation of 0.34 nm; we
are also going to explore the properties of carbon Nano tube through Raman Spectroscopy, and this paper review the
Bucky paper Membrane for water Filtration.
Keywords:
Spectroscopy.
Carbon Nanotube, Optical Properties, Bucky-paper, membrane; filtration method, Raman
References:
1.
2.
3.
18.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
19.
Edison TA, US Patent 470’925 (1892).
Bacon R. Growth, structure and properties of carbon whiskers. J Appl Phys 1960; 31: 283-290.
Dresselhaus MS, Dresselhaus G, Sugihara K, Spain IL, and Goldberg HA. Graphite fibers and filaments. (Springer-Verlag, Berlin, 1988),
Vol. 5 of Springer Series in Materials Science.
Oberlin A, Endo M, and Koyama T. Filamentous growth of carbon through benzene decomposition. J Crystal Growth1975; 32: 335-349.
Kroto HW, Heath JR, O’Brian SC, Curl RF, and Smalley RE. C60: Buckminsterfullerene. Nature 1985; 318: 162-163.
Dresselhaus MS, Dresselhaus G, Eklund PC. Science of fullerences and carbon nanotubes. Academic Press, San Diego, California,1996.
Smalley RE, Semiconductor cluster surface chemistry. DoD Workshop in Washington, DC (December 1990).
Dresselhaus MS, Dresselhaus G, and Eklund PC. Symmetry for lattice modes in C60 and alkali-metal-doped C60. Phys Rev B 45 1992;
Coleman Henry, Bryce Dorr, Jonathan A. Brant Separation and Purification Technology, Volume 100, (24 October 2012 )
Buckminsterfullerene (C60) nanoparticle fouling of microfiltration membranes operated in a cross-flow configuration
Iijima S. Helical microtubules of graphitic carbon. Nature 1991; 354: 56-58.
Iijima S and Ichihashi T. Single-shell carbon nanotubes of 1 nm diameter. Nature 1993; 363: 603.
Bethune DS, Kiang CH, de Vries MS, Gorman G, Savoy R, Vasquez J, and Beyers R. Cobalt- catalysed growth of carbon nanotubes with
single-atomic-layer walls. Nature 1993; 363:605.
Wildoer JWG, Venema LC, Rinzler AG, Smalley RE, Dekker C. Electronic structure of atomically resolved carbon nanotubes. Nature 1998;
391: 59-62.
Ajayan PM, Iijima S. Capillarity-induced filling of carbon nanotubes. Nature 1993; 361: 333.
Thess A, Lee R, Nikolaev P, Dai H, Petit P, Robert J, Xu C, et al. Crystalline ropes of metallic carbon nanotubes. Science 1996; 273: 483487.
Buseck PR, Tsipursky SJ, Hettich R. Fullerenes from the geological environment. Science 1992; 257: 215–217.
Saito R, Dresselhaus G, Dresselhaus MS. Physical properties of carbon nanotubes. Imperial College Press, London, 1998.
Harris PJF, Carbon nanotubes and related structures – New materials for the twenty-first century. Cambridge University Press, Cambridge,
UK, 1999. [19] Nanotube Modeler, JCrystalSoft 2004 – 2005, http://www.icrystal.com.
Qin LC, Zhao X, Hirahara K, Miyamoto Y, Ando Y, Iijima S. The smallest carbon nanotube, Nature 2000; 408: 50.
Authors:
P.Rajeswari, S.Pratheeba, S.R.Karthika
Paper Title:
A Comprehensive Overview on Different Applications of Wireless Sensor Network
Abstract: The Wireless Sensor Network is built of "nodes" – from a few to several hundreds or even thousands,
where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically
several parts: a radio transceiver with an internal antenna or connection to an external antenna, a micro controller, an
electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of
energy harvesting. A sensor node might vary in size. It detects things like temperature, sound, vibrations, pressure,
motion, or pollutants through autonomous sensors. They are currently being used for industries and civilian use such
as industrial process monitoring and control, machine health monitoring, monitoring of the environment, health care
applications, home automation, tracking and traffic control. More specific applications would be things like habitat
76-79
80-84
monitoring, tracking objects, detecting fires or landslides, and monitoring traffic. Generally a WSN would be
scattered in an area where its sensor nodes collect data.
Keywords: Applications of Wireless Sensor Network, Area Monitoring, Wireless Sensor Network.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6550437
D. J. Cook and S. K. Das, “Smart environments: technologies , protocols and applications,” New York: John Wiley, pp. 13-15, 2004.
K. Sohraby, D. Minoli, and T. Znati, “Wireless sensor networks: technology, protocols and applications,” New Jersey: John Wiley, pp. 3871, 2007.
http://www.memsnet.org/mems/what-is.html
F. L. LEWIS,"Wireless Sensor Networks"Associate Director for Research,Head, Advanced Controls, Sensors, and MEMS
Group,Automation and Robotics Research Institute The University of Texas at Arlington.
Eric Lee Eekhoff A,“Wireless sensor networks and personal area networks for data integration in a virtual reality environment ” submitted
to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE.
Theofanis P. L AMBROU ,PhD Thesis Proposal ,Supervisor: Prof. Christos G. PANAYIOTOU, ”Collaborative Area Monitoring Using
Wireless Sensor Networks with Stationary and Mobile Nodes ”.
Alan Mainwaring -Intel Research Laboratory, Berkeley ,Joseph Polastre2 -2 EECS Department ,University of California at Berkeley ,David
Culler-College of the Atlantic Bar Harbor, Maine :”Wireless Sensor Networks for Habitat Monitoring ”.
J. G. T. Anderson. Pilot survey of mid-coast Maine seabird colonies: “an evaluation of techniques”. Bangor, ME, 1995. Report to the State of
Maine Dept. of Inland Fisheries and Wildlife.
http://www.eurekalert.org/pub_releases/2008-06/uoa-nws060408.php
J. Portilla, A. de Castro, E. de La Torre, and T. Riesgo, “A modular architecture for nodes in wireless sensor networks,” Journal of Universal
Computer Science, vol. 12, no. 3, pp. 328–339, 2006.
http://www.advanticsys.com/services/agricultural-environment- monitoring/
J.D. Kenney, D.R. Poole, G.C. Willden, B.A. Abbott, A.P. Morris, R.N. McGinnis, and D.A. Ferrill, "Precise Positioning with Wireless
Sensor Nodes: Monitoring Natural Hazards in All Terrains", 2009 IEEE International Conference on Systems, Man, and Cybernetics, San
Antonio, TX, USA, Oct. 2009.
Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London".
Sensors 8 (6): 3601
T.L. Dinh, W. Hu, P. Sikka, P. Corke, L. Overs and S. Brosnan, "Design and Deployment of a Remote Robust Sensor Network: Experiences
from an Outdoor Water Quality Monitoring Network", 2007 32nd IEEE Conference on Local Computer Networks
http://ciemcal.org/wireless-sensor-network-and-mobile-ad-hoc- network/
http://www.advanticsys.com/services/water-monitoring-equipment/
http://www.enpicbcmed.eu/content/wireless-sensor-networks-accurate-continuous-monitoring-waterways-and-industrial-pipeline-ne.
http://www.nireas-iwrc.org/index.php?link=PP-leak_detection.php.
F. Viani, P. Rocca, M. Benedetti, G. Oliveri, A. Massa , "Electromagnetic passive localization and tracking of moving targets in a WSNinfrastructured environment " in Inverse Problems, vol. 26, (2010), p. 1-15. - DOI: 10.1088/0266-5611/26/7/074003
Surie, D., Laguionie, O., Pederson, T.: "Wireless Sensor Networking of Everyday Objects in a Smart Home Environment". In Proceedings of
the 4th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, pp. 189-194,
(2008)
Yenumula B Reddy,Grambling State University,Grambling, LA 71245,”Survey in Wireless Sensor Network”.
http://ciemcal.org/wireless-sensor-network/
Authors:
Meera Treesa Mathews, Manju E.V
Paper Title:
Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving
Abstract: Secure sum computation is a simple example of Secure Multi party Computation. This provide privacy
to data in case more than two parties are present, while finding combined results of individual data. Association rule
mining algorithms like Apriori are used for mining frequent items from database. In this paper we address secure
mining of frequent items from a horizontally partitioned data. It uses Apriori algorithm for mining frequent items
with the help of a Extended Distributed Rk- Secure Sum Protocol for privacy preserving
Keywords: Secure sum computation, secure multi party computation, Apriori, Extended Distributed Rk- secure
sum protocol, frequent items, Global support
References:
1.
2.
20.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Jyotirmayee Rautaray, Raghavendra Kumar, “FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database”, International
Journal of Scientific & Engineering Research, Vol. 4, No. 3,march 2013, pp 1-5.
Jyotirmayee Rautaray, Raghavendra Kumar, “Distributed Rk- Secure sum Protocol for Privacy Preserving”, IOSR Journal of Computer
Engineering, Vol. 9, No. 1, January – February 2013,
pp. 49 – 52
Priyanka Jangde, Gajendra Singh chandel, Durgesh Kumar Mishra, “Hybrid Technique for Secure Sum Protocol”, World of Computer
science and Information Technology Journal, Vol. 1, No. 5, 2011, pp 198 – 201.
Ms Shweta, Dr. Kanwal Garg, “Mining Efficient Association Rules through Apriori Algorithm Using Attributes and comparative analysis
of various Association Rule Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.
3, No. 6, June 2013, pp. 306 – 312.
Sunita B. Aher, Lobo L.M.R.J, “ A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning”,
International Journal of Computer Applications (0975 – 8887), vol . 39, No. 1, February 2012, pp. 48 – 52.
Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” Distributed k-Secure sum Protocol for secure Multi –Party Computations”,
Journal of Computing, Vol. 2, No. 3, March 2010, pp. 68 – 72.
Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra, ”Changing Neighbour k- Secure Sum Protocol for secure multi party
computation”, International Journal of Computer science And Information Security, Vol. 7, No. 1, 2010, pp. 239 – 243.
Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” A modified ck- Secure Sum Protocol for multi party computation”, Journal of
Computing, Vol. 2, No.2, February 2010, pp. 62 – 66.
Yehuda Lindell, Benny Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining”, The Journal of Privacy and
Confidentiality, vol.1, No.1, 2009, pp. 59-98.
Rashid Sheikh , Beerendra Kumar, “Privacy Preserving K- Secure Sum Protocol”, International Journal of Computer science and
Information Security, Vol. 6, No. 2, 2009, pp. 184 – 188.
Murat Kantarcioglu, Chris Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE
Transactions on Knowledge And Data Engineering, Vol. 16, No. 9, September 2004
Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, “Tools for Privacy Preserving Distributed Data
85-88
13.
14.
15.
16.
17.
18.
19.
Mining”, SIGKDD Explorations, Newsletter, vol.4, no.2, ACM Press, 2002, pp.28-34.
M. J. Atallah and W. Du. “Secure Multiparty Computational Geometry,” In proceedings of Seventh International Workshop on Algorithms
and Data Structures(WADS2001). Providence, RhodeIsland, USA, 2001, pp. 165-179.
W. Du and M.J.Atallah, “Privacy-Preserving Statistical Analysis,” In proceedings of the 17th Annual Computer Security Applications
Conference, New Orleans, Louisiana, USA, 2001, pp. 102-110.
Wenliang Du, Mikhail J. Atallah, “Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems”, In
proceedings of new security paradigm workshop, Cloudcroft, New Maxico, USA, Sep. 11-13 2001, page 11-20.
Rakesh Agrawal, Ramakrishnan Srikant,”Fast algorithm for mining association rules”, Proceedings of the 20th VLDB Conference
Santiago,Chile, 1994.
Rakesh Agrawal, Tomasz Imielinski, Arun Swami, “Mining Association Rules between Sets of items in Large Databases”, Proceedings of
the 1993 ACM SIGMOD conference Washington DC, USA, May 1993, pp. 1- 10.
Jiawie Han, Micheline Kamber, Jian Pie, “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishing, Third edition, pp 248 –
253.
http://www.cs.sunysb.edu/~cse634/lecture_notes/ 07apriori.pdf accessed on date 02-02-2012.
Authors:
Vidya.M, Reshmi.S
Paper Title:
Alleviating Energy Depletion Attacks in Wireless Sensor Networks
Abstract: Network survivability is the capacity of a network keeping connected under loss and intrusions, which
is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power
wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses
about energy draining attacks at the routing protocol layer, which drains battery power. A innovative approach for
routing protocols, affect from attack even those devised to be protected which is short of protection from these
attacks, which we call energy debilitating attacks, which enduringly disable networks by quickly draining nodes
battery power. These energy depletion attacks are not protocol specific but are disturbing and hard to notice, and are
easy to carry out using as few as one malicious insider sending only protocol compliant messages.
21.
Keywords: Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks.
89-91
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Eugene.Y.Vasserman, Nicholas Hopper, Vampire attacks Draining life from ad-hoc wireless sensor networks,IEEE volume 2 (2014).
Jae-Hwan Chang and Leandros Tassiulas,Maximum lifetime routing in wireless networks,IEEE/ACM Transactions on Networking 12
(2004), no.4
The network simulator — ns-2. http://www.isi.edu/nsnam/ns/
Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001.
John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003.
Daniel Bernstein and Peter Schwabe, New AES software speed records, INDOCRYPT, 2008.
I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic curves in cryptography, Vol. 265, Cambridge University Press, 1999.
Joppe W. Bos, Dag Arne Osvik, and Deian Stefan, Fast implementations of AES on various platforms, 2009.
Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003), no. 10.
Authors:
Dushyant Kumar Shukla, Munish Vashishtha
Paper Title:
Noise Analysis of Common-Collector Amplifier using Stochastic Differential Equation
Abstract:
In this paper, we analyse the effect of noise in a common-collector amplifier working at high
frequencies. Extrinsic noise is analyzed using time domain method employing techniques from stochastic calculus.
Stochastic differential equations are used to obtain autocorrelation functions of the output noise voltage and other
solution statistics like mean and variance. The analysis leads to important design implications for improved noise
characteristics of the common-collector amplifier.
22.
Keywords: common-collector amplifier, noise, stochastic differential equation, mean and variance.
92-94
References:
1.
2.
3.
4.
5.
23.
Tarun Kumar Rawat,Abhirup Lahiri, and Ashish Gupta, Noise Analysis of Single-Ended Input Differential Amplifier using Stochastic
Differential Equation, International Journal of Computer, Information, and System Science, and Engineering, pp.191-196,2008.
Wei Yu and Bosco H. Lueng, Noise Analysis for Sampling Mixers using Differential Equations, IEEE Tran. On Circuit and Systems-II:
Analog and Digital Signal Processing, Vol. 46, No. 6, June 1999.
A. Demir, E.W.Y. Liu, and L.S. Vincentelli, Time Domain Non Monte Carlo Method noise simulation for non linear dynamic circuit with
arbitrary excitation, IEEE Tran. Computer Aided Design, Vol. 15, pp.493-505, May 1996.
L. Arnold, Stochastic Differential Equation, John Wiley, NewYork.
Jacob Millman and Christos C. Halkias, Integrated Electronics, Tata McGraw Hill.
Authors:
Giriraj Sharma, Ashish Kumar Bansal
Paper Title:
A Practical Approach to Improve GSM Network Quality by RF Optimization
Abstract: All GSM service provider uses KPI to monitor their QOS performance. Report generated from OMCR
terminal & customer feedback are considered in further network improvement activity. RF optimization and drive
test is the tool to keep continue watch on network QOS .In this paper some practical cases and solutions are adopted
to improve the network QOS during drive test & post processing. Major QOS parameter Handover, call drop,
congestion, interference reasons and solutions are discussed. drive test tool Ascom TEMS 10.2.1 is used to perform
drive test. if optimization done continuously it will attract more and more customers due to service satisfaction.
Keywords: GSM,RF optimization ,Drivetest, TEMS drive test tool, BSC,BTS,TRX,QOS
References:
1.
2.
TEMS investigation user’s manual, 11.0, Ascom- 2010.
Bilal Haider, M Zafrullah Khan, M.K.Islam: Radio Frequency Optimization and QOS in operational GSM network.
95-99
3.
4.
5.
24.
Syed Imran Basha, Idrish Shaik: Reducing Handover Failure Rate by RF Optimization
Wireless Communications, Principles and Practice, 2nd edition, Theodore S. Rappaport, Pearson publications.
[2] ITU-T recommendation G.1000 (2001), Communication quality ofService: A framework and definition.
Authors:
Mohammad Ali Adelian
Paper Title:
Improvement of Substation Earthing
Abstract:
Designing a proper substation grounding system is quite complicated. Many parameters affect its
design. In order for a grounding design to be safe, it needs to provide a way to carry the electric currents into the
ground under both normal and faulted conditions. Also, it must provide assurance that a person in the vicinity would
not be endangered. The grounding portion of substation design will be explored. In order to properly plan and design
the grounding grid, calculations of the following will be done: maximum fault current, grid resistance, grid current,
safe touch and step voltages, ground potential rise, as well as expected touch and step voltage levels. Background
information and guidelines to design a substation grounding grid will be provided. A set of equations will be
presented to calculate whether the design is safe, and finally, an example will be provided that can be used as a
template.
100-104
Keywords: Safety, reliability Step Voltage, Touch Voltage.
References:
1.
2.
3.
4.
5.
6.
7.
Design Guide for Rural Substations”, Rural Utilities Service. United States Department of Agriculture. June 2001.
Gonen, Turan. “Electric Power Distribution System Engineering.” CRC Press. 2008.
Gonen, Turan. “Electric Power Transmission System Engineering: Analysis and Design.” CRC Press. 2009.
"IEEE 80-2000 IEEE Guide for Safety in AC Substation Grounding."
"IEEE 81-1983 IEEE Guide for Measuring Earth Resistivity, Ground Impedance, and Earth Surface Potentials of a Ground System.”
Markovic, D. Miroslav. “Grounding Grid Design in Electric Power Systems.” TESLA Institute, 1994.
NFPA 70-2008. National Electrical Code. 2008.
Authors:
Ranjit Kumar Bindal
Paper Title:
A Review of Benefits of FACTS Devices in Power System
Abstract:
In developing countries, a pressure associated with economical and environmental constraints has
forced the power utilities to meet the future demand by fully utilizing the existing resource of transmission facilities
without building new lines. Flexible alternating current transmission systems (FACTS) devices are used to control
the phase angle, voltage and impedance of high voltage AC lines. By using FACTS devices maximum benefits of
transmission system can be managed i.e. utilization of existing transmission assets; increased transmission system
availability and enabling environmental benefits. This paper presents different types of FACTS devices and their
benefits for transmission in electrical power system.
25.
Keywords: Transmission system, FACTS Devices, Benefits these devices.
105-108
References:
1.
2.
3.
4.
5.
26.
J.J Paserba, “H ow FACTS controllers benefits AC transmission system,” IEEE transmission on Power Engineering Society, Vol.3, sep2003,pp 949-956.
V.K.Candrakar, M.M.Missal, V.P.Rajderkar, S.N.Durve, “Flexible Alternating Current Transmission System (FACTS) for cost effective
and reliable transmission of electrical energy,” National Power engineering conference (NPEC-07) ,June-2007.
A.A Edris, R Aapa, M H Baker, L Bohman, K Clark, “ Proposed terms and definitions for flexible ac transmission system (FACTS)”, IEEE
Tran. on power delivery Vol. 12, No.4, Oct 1997.
N.G. Hingorani , L. Gyugyi, “ Understanding FACTS : Concepts and Technology of Flexible AC Transmission systems, ” IEEE Power
Engineering Society, IEEE press, Delhi 2001.
ER.Moal Matru , Rajiv K. verma, “tyristor Based FACTS controllers for electrical transmission system ,” IEEE press, wiley Inter science
publication , USA
Authors:
G.Gokilakrishnan, R.Rajesh, R.Sureshkumar, R.Adithya
Paper Title:
An Innovative Cost Effective Slipper for Elderly Persons
Abstract:
This invention of Safety Slippers relates to the safety measures taken on behalf of elderly persons at
times of emergency. This idea deals with the integration of program with sensor, transmitter and receiver in a normal
slipper to identify the status of the program installed and take the appropriate action in time of need. This idea works
on the principle of application of force which is the body weight of the user on the slipper. The concept involves the
sensing of the force applied by the user through the sensor placed inside the slipper. The signal thus sensed is passed
on to the receiver module through the transmitting module. As long as the signal is sensed continuously, the receiver
module keeps the GSM module in deactivated mode. If the signal from the transmitting module is interrupted more
than the set time limit, the receiver module activates the GSM module. The GSM module is incorporated with
necessary text message or call options to a list of contacts to be sent. When the GSM module activates it alerts the
corresponding contacts automatically without the intervention of human regarding the emergency alert.
Keywords: safety; slippers; sensor; transmitter; receiver; GSM module
References:
1.
2.
Ch.Naga KK, Raghu babu YV, A.Gamya, P.Jainath, M. Vijay. Design and development of activation and controlling of home automation
system via SMS through microcontroller. International Journal of Engineering Research and Applications ISSN: 2248-9622 Vol. 2, Issue
2,Mar-Apr 2012, pp.1349-1352
Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir, Shahid Jaman, Nahian Chowdhury. Design and Implementation of Low Cost Home
Security System using GSM Network - International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012. ISSN
2229-5518
109-112
3.
4.
5.
6.
7.
Gokilakrishnan G, Sureshkumar R, Rajesh R. Safety Slippers. Official Journal of Patent Office, Government of India, Issue No 43/ 2013:
27413: Application Number: 4569/ CHE/2013.
Sathya Narayanan, Gayathri S. Design of wireless home automation and security system using PIC microcontroller. International journal of
computer applications in engineering sciences - Volume iii, special issue, August 2013 - ISSN: 2231-4946
www.radiolocman.com
www.next.gr
www.open-electronics.org
Authors:
Ali Fadhil Naser
Optimization of oblique Angle Design of Abutments and piers, and piers Shape of Continuous
Paper Title:
Prestressed Concrete Box Girder Bridges: Static Analysis part 1
Abstract: Skewed bridges are normally used to cross roadways, waterways, or railways that are not perpendicular
to the bridge structure at the intersection. It is required when it is often not possible to arrange that a bridge spans
square to the feature that it crosses, particularly where it is important to maintain a relatively straight alignment of a
roadway above or below the bridge. The pier shape has important effect on the structural performance of the bridge
structure according to the location conditions. The main aims of this study are to select the optimal design of piers
shape and skew angles in the prestressed box girder bridge, to study the effects of pier shape and skew angles on the
static structural responses. There are 120 bridge model are used in this study. FEM of SAP2000 Ver. 14.0.2 is used in
the analysis. The results of structural analysis show that the pier shape and skew angle has significant effects on the
static responses of the bridge structure. For vertical displacement, the optimal models are skew angle of bridge
structure is range from 36 degree to 54 degree and the solid rectangular pier (skew abutments and skew piers). The
models of two square piers (skew abutments and without skew piers) and 48 skew angle is the optimal models for
bending moment. For tensile stress, the model of skew angle 48 degree and the model of solid rectangular pier (skew
abutments and skew piers) is the optimal model. It can be concluded that the skewed models gives good results than
straight model.
Keywords: bridge, box girder, bending moment, vertical displacement.
References:
1.
27.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
28.
F. N. Ali and W. Zonglin, 2011, “Experimental Inspection of Damage and Performance Evaluation after Repair and Strengthening of
Jiamusi Highway Prestressed Concrete Bridge in China“, World Academy of Science, Engineering and Technology,V. 73, 2011, pp: 195201.
State Department of Transportation, “Washington State Bridge Inspection Manual”, Technical Manual, Washington, USA, 2010.
W. N. Al-Rifaie, and A. S. Kareem, “Bridges”, first edition, University of Technology, Baghdad, Iraq, 1986, pp 5-8.
G. Fu and P. Chun, “Skewed Highway Bridges”, Final Report to Michigan Department of Transportation, Center for Advanced Bridge
Engineering Department of Civil and Environmental Engineering, Wayne State University, Detroit, Michigan, USA. , 2013.
SteelConstruction.info,
“The
free
encyclopedia
for
UK
steel
construction
information”,
2014,
http://www.steelconstruction.info/Skew_bridges.
NCHRP, “SHEAR IN Skewed Multi-Beam Bridges”, Final Report for National Cooperative Highway Research Program Transportation
Research Board National Research Council, USA., 2002.
X.H. He, X.W. Sheng, A. Scanlon , D.G. Linzell, X.D. Yu, “Skewed concrete box girder bridge static and dynamic testing and analysis”,
Engineering Structures, V. 39, 2012), pp:38–49.
S. I. Ibrahim, “Effect of Skew Angle on Behavior of Simply Supported R. C. T-Beam Bridge Decks”, ARPN Journal of Engineering and
Applied Sciences, V. 6, No. 8, 2011, pp:1-14.
A. Dhar, M. Mazumder, M. Chowdhury and S. Karmakar, “Effect of Skew Angle on Longitudinal Girder (Support Shear, Moment,
Torsion) and Deck Slab of an IRC Skew Bridge, The Indian Concrete Journal, 2013, pp:46-52.
V. Khatri, P. R. Maiti, P. K. Singh and A. Kar, “Analysis of Skew Bridges Using Computational Methods”, International Journal of
Computational Engineering V. 2, No.3, 2012, pp:628-636.
F. B. Diab, M. Mabsoutb, and K. Tarhinic,” Influence of Skew Angle on Live Load Moments in Steel Girder Bridges, Bridge Structures, V.
7, 2011, pp: 151–163.
C. C. Fu, L. Tim and T. Getaneh, “Theoretical and Field Experimental Evaluation of Skewed Modular Slab Bridges”, State Highway
Administration Research Report, Report No.MD-12-SP109B4N, Maryland State Highway Administration. 2012.
K. M. Kassahun, “Finite Element Modeling of Skew Slab-Girder Bridges”, Thesis Submitted in partial fulfillment of the requirements for
the degree Master of Science Faculty of Civil Engineering and Geosciences Technical University of Delft, 2010.
http://en.wikipedia.org/wiki/Vertical_displacement, 2014.
V. Samuel, K. Gaston, B. David, C. Denis, and I. Daniele, “Vertical Deflection of a Prestressed Concrete Bridge Obtained Using
Deformation Sensor and Inclinometer Measurement”, ACI Structural Journal, V.95, No.5, 1998, pp:518-526.
http://www.learneasy.info/MDME/MEMmods/MEM30006A/Bending_Moment/Bending_Moment.html, 2014.
http://en.wikipedia.org/wiki/Bending_moment., 2014.
http://en.wikipedia.org/wiki/Shear_force, 2014.
113-121
Authors:
Ashish B Chaudhari, S. Jebarani Evangeline
Paper Title:
A Space Vector Pulse Width Modulation Technique to Reduce the Effects of Voltage Unbalances
Abstract:
A space vector pulse width modulation (SVPWM) technique is a special technique to determine the
switching sequence of the semiconductor switches of the inverter. SVPWM provides more efficient use of the dc bus
voltage,in comparison with the direct sinusoidal modulation technique.In this paper,switching pulses for three phase
inverter has been carried out by using differentiation of alpha voltage vector.To obtain the phase angle,three phase
voltages has to be transformed into voltage vectors alpha and beta using Clark’s transformation. In this paper,voltage
vector beta has been carried out by differentiating alpha voltage vector using trigonometric relation between alpha
and beta vector.The interaction between two voltage vectors has been reduced,which will give better result compare
to conventional SVM method for unbalanced voltage conditions.Different unbalances has been introduced for
analysis.MATLAB software has been used for simulation.
Keywords: Three phase Inverter,Space Vector Pulse Width Modulation,Clark’s transformation,derivation of alpha
voltage vector,voltage unbalances.
122-127
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Lutfu Saribulut,Mehmet Tumay, “Robust space vector modulation technique for unbalance voltage disturbances”,Elsevier journal,Electric
power Systems Research 80(2010) 1364-1374.
Joseph P John,Dr. S. Suresh Kumar, Jaya B,“Space vector modulation based field oriented control scheme for brushless DC
motor”,,proceedings of ICETECT 2011
K.Kishore Reddy,K.Vinoth Kumar,P.Ponrajan,S.Ramsankar,“Diode clamped inverter for SVPWM fed induction motor,proceedings of
APECT’11 March 2011,FX EC,Tvl.
Gupta A.K,,A.M. Khambadkone.(2006) “A space vector PWM scheme for multilevel inverters based on two-level space vector PWM”,
IEEE Transactions on Industrial Electronics 53 ,1631–1639
Celanovic N.(2000) “Space vector modulation and control of multilevel converters”, Faculty of the Virginia Polytechnic Institute and
State University, PhD. Thesis.
Fitzer C., M. Barnes, P. Green. (2004) “Voltage sag detection technique for a dynamic voltage restorer”,IEEE Transactions on Industry
Applications 40,203–212.
Mondal S.K.,B.K. Bose, V. Oleschuk, J.O.P. Pinto. (2003) “Space vector pulse width modulation of three-level inverter extending
operation into over modulation region”, IEEE Transactions on Power Electronics 18, 604–611
Mondal S.K., J.O.P. Pinto, B.K. Bose. (2002) “A neural-network based space-vector PWM controller for a three-level voltage-fed
inverter induction motor drive”, IEEE Transactions on Power Electronics 38, 660–669.
Pinheiro H., F. Botteron, C. Rech, L. Schuch, R.F. Camargo, H.L. Hey, H.A. Grundling, J.R. Pinheiro.(2002)“Space vector modulation for
voltage-source inverters:a unified approach”, Industrial Electronics Society 1 ,23–29.
Rodriguez J, J.S. Lai, F.Z. Peng, (2002) “Multilevel inverters: a survey of topologies, controls and applications”,IEEE Transactions on
Industrial Electronics 49, 724–738.
Sani A.M.(2007) “Advanced modulation techniques for power converters”, The University of Manitoba, Master Thesis.
Seok S.H., P.H. Gyu, N. Kwanghee(1999) “An instantaneous phase angle detection algorithm under unbalanced line voltage
condition”,Power Electronics Specialists Conference 1, 533–537.
Authors:
Amir Aliabadian
Paper Title:
A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm
Abstract:
Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach
towards to unsupervised learning and is one of the major techniques in pattern recognition.FCM algorithm needs the
number of classes and initial values of center for each cluster. These values are determined randomly, so it may cause
target function converges to several local center. so many iterative stages are needed, until FCM can reach to global
center for each cluster. In this paper, we suggest robust hybrid algorithm in which, we have real unsupervised
learning algorithm, no need to initial center value and the number of clusters. The First layer in this algorithm finds
initial clustering center by K-nearest neighbor (K-NN) rules based on unsupervised learning approach. In the second
layer, we applied FCM only one time for having optimal clustering. It is done by means of Fuzzy clustering
validation criterion, unlike FCM that needs iterative process. We applied new algorithm to several set of standard
databases (IRIS).results show that this algorithm is more accurate than FCM both in estimation of optimal number of
clusters and correctness of devotion of data to their real clusters.
Keywords: Cluster analysis. FCM algorithm. K-nearest neighbor. target function.
References:
29.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
30.
Kuo-Lung Wu, Miin-Shen Yang - Alternative c-means clustering algorithms - Pattern Recognition35 (2002) 2267 – 2278.
Dae-Won Kima, Kwang H. Lee, Doheon Lee, - On cluster validity index for estimation of the optimalnumber of fuzzy clusters - Pattern
Recognition 37 (2004) 2009 – 2025.
Oleg S. Pianykh - Analytically tractable case of fuzzy c-means clustering - Pattern Recognition 39(2006) 35 – 46
Luis Rueda, Yuanquan Zhang - Geometric visualization of clusters obtained from fuzzy clusteringalgorithms - Pattern Recognition 39
(2006) 1415 – 1429
Carl G. Looney - Interactive clustering and merging with a new fuzzy expected value –PatternRecognition 35 (2005) 2413 – 2423
WitoldPedrycz, George Vukovich - Fuzzy clustering with supervision - Pattern Recognition 37(2004) 1339 – 1349
Haojun Sun , Shengrui Wang, Qingshan Jiang - FCM-Based Model Selection Algorithms forDetermining the Number of Clusters - Pattern
Recognition 37 (2004) 2027 – 2037
Nabil Belacel, Pierre Hansen, NenadMladenovic - FuzzyJ-Means: a new heuristic for fuzzyclustering - Pattern Recognition 35 (2002) 2193
– 2200
WeilingCai, Songcan Chen, Daoqiang Zhang - Fast and robust fuzzy c-means clustering algorithmsincorporating local information for
image segmentation - Pattern Recognition 40 (2007) 825 – 838
Chien-Hsing Chou, Chin-Chin Lin,Ying-Ho Liu, Fu Chang – A prototype classification method andits use in a hybrid solution for
multiclass pattern recognition - Pattern Recognition 39 (2006) 624 – 634
N. Zahid, M. Limouri, A. Essaid - A new cluster-validity for fuzzy clustering - Pattern Recognition32 (1999) 1089}1097
Mario G.C.A. Cimino, Beatrice Lazzerini, Francesco Marcelloni – A novel approach to fuzzyclustering based on a dissimilarity relation
extracted from data using a TS system - Pattern Recognition39 (2006) 2077 – 2091
Michel MeH nard, Christophe Demko, Pierre Loonis - The fuzzy c-means: solving the ambiguityrejection in clustering - Pattern
Recognition 33 (2000) 1219}1237
Malay K. Pakhira, SanghamitraBandyopadhyay, UjjwalMaulik - Validity index for crisp and fuzzy clusters - Pattern Recognition 37 (2004)
487 – 501
Wuhan, Hubei, China ",A Modified FCM Algorithm for MRI Brain Image Segmentation," 2008 International Seminar on Future Bio
Medical Information Engineering, December18, 2008
128-132
Authors:
N.Rajasekhar, T.V.Rajini Kanth
Paper Title:
Weather Analysis of Guntur District of Andhra Region using Hybrid SVM Data Mining Techniques
Abstract:
In the recent years, weather prediction has drawn much attention for research community because it
helps in safeguarding human life and their wealth. Apart from that, it is useful in effective prediction of natural
calamities, agricultural yield growth, air traffic control, marine navigation, forests growth & military purposes.
Literature studies shows that Machine Learning Algorithms proved to be good than the existing techniques /
methodologies/traditional statistical methods. Hence development of new Hybrid SVM (Support vector machines)
model is required for effective weather prediction by analyzing the given weather data and to recognize the patterns
133-136
existing in it. SVM comes under the set of supervised learning methods for classifications & regression. It will be
yielding good results in predicting the weather than the existing machine learning programming techniques. In this
paper, Guntur district weather data sets were considered for analysis using the hybrid SVM data mining techniques.
Keywords: weather prediction, Machine learning, Data mining techniques, Hybrid SVM.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
31.
http://www.timeanddate.com/weather/forecast-accuracy-time.html
http://en.wikipedia.org/wiki/Weather_forecasting
Folorunsho Olaiya, Application of Data Mining Techniques inWeather Prediction and Climate Change Studies, I.J. InformationEngineering
and Electronic Business, 2012, 1, 51-59, Published OnlineFebruary 2012 in MECS (http://www.mecs-press.org/) DOI:
10.5815/ijieeb.2012.01.07
Dr. M.H.Dunham, Companion slides for the text, “Data Mining,Introductory and Advanced Topics”, Prentice Hall, 2002.
Y.Radhika and M.Shashi, “Atmospheric Temperature Predictionusing Support Vector Machines” International Journal of ComputerTheory
and Engineering, Vol. 1, No. 1, April 2009 1793-8201
Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, Estimation of theInfluence of Fertilizer Nutrients Consumption on the Wheat Crop yield in
India- a Data mining Approach, 30 Dec 2013, Volume 3, Issue 2, Pg.No:316-320, ISSN: 2249-8958 (Online).
Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, A Data Mining Approach for the Estimation of Climate Change on the Jowar Crop Yield in
India, 25Dec2013,Volume 2 Issue 2, Pg.No:16-20, ISSN: 2319-6378 (Online).
A. Vijay Kumar, Dr. T. V. Rajini Kanth “Estimation of the Influential Factors of rice yield in India” 2nd International Conference on
Advanced Computing methodologies ICACM-2013, 02-03 Aug 2013, Elsevier Publications, Pg. No: 459-465, ISBN No: 978-93-35107-1495.
Dr.David, B.Stephenson, Data analysis methods in weather and Limate research Department of Meteorology University of Reading, July,20,
2005 ,http://www.met.rdg.ac.uk /cag/courses/
Authors:
Hasan Iqbal, Divendu Mishra, Anchal Ojha, Arun Yadav, Ravi Kumar Srivastava, Satish Kumar
Dwivedi
Paper Title:
Brick Lifting Machine
Abstract:
As we can see that during any type of construction work there is a need to carry the bricks from one
floor to the other which is done manually by the workers because of which they often get injured and it also
consumes a lot of precious time and in turn increases the labour cost, So in order to tackle with this problem with the
help of mechanical engineering we had proposed to design a brick lifting machine which can lift up to 50 bricks at a
time we had also focused on minimum power consumption and the efficiency so that in minimum power
consumption maximum no. of bricks can be lifted. The key points in the designing of the lift is are factor of safety
and the counterweight, there are many else technical parameters on which designing of lift depends such as Rate
load, rated speed, Height of travel, the number and location of stops, type of drive etc. The motor which will be used
for lifting the load will be D.C series motor and the type of drive is gearless traction drive. The gearless traction drive
is preferred over geared traction drive because it provides higher efficiency.
137-142
Keywords: D.C.
References:
1.
2.
3.
4.
5.
32.
Aberkom- Results of experimental work on traction drives, Elevator technology 4 (Proceedings of ELEVCON 92) Amsterdam 1992
Janovysky L – Elevator mechanical design Elis horwood ltd.
Thiemann, H. (1979) Elevators, Veb Verlag Technik, Berlin, (in German).
Philips R.S Electric lifts pitman publishing , London 1973
Strakosch, G Vertical transportation elevators and escalators 2nd edition John Wiley and sons, new York 1983.
Authors:
Ruchi Sharma, Aditi Gupta
Paper Title:
Differentiation of Oral Streptococcal Species by Haemolysis in Blood Agar Medium in Vitro
Abstract: Pathogenic bacteria also cause infections such as tetanus, typhoid fever, diphtheria, syphilis, and leprosy.
Blood agar medium contain a typical nutrient growth medium enriched with 5% sheep blood. It is useful for
encouraging growth of fastidious organisms. The Three Types of Lytic Activities seen on the plate are- clear zone
around bacterial growth -RBC hemolyzed completely (Beta-hemolysis, pathogenic); green zone around growth -RBC
partially hemolyzed (Alpha-hemolysis); no change around growth -RBC is not hemolyzed (Gamma-hemolysis or no
hemolysis). The discrimination of oral bacteria specifically Streptococcal species can be done by haemolysis tests
using blood agar medium. Other than ultramicroscopic and morphological studies this experiment also conveys the
species differentiation due to its lytic activity. Thus, blood agar medium can be a useful medium for pathogenic
bacterial survey and investigation. The present review has proved the importance of blood agar utilization in
diagnostics and disease analysis.
Keywords: Bacteria,Streptococcus, Blood, Agar, Haemolysis
References:
1.
2.
3.
4.
5.
6.
Kumar, Vinay; Abbas, Abul K.; Fausto, Nelson; & Mitchell, Richard N. (2007). Robbins Basic Pathology (8th ed.). Saunders Elsevier. pp.
843 ISBN 978-1-4160-2973-1
Ray, C. George; Ryan, Kenneth J.; Kenneth, Ryan (July 2004). Sherris Medical Microbiology: An Introduction to Infectious Diseases (4th
ed.). McGraw Hill. p. 237. ISBN 978-0-8385-8529-0. LCCN 2003054180. OCLC 52358530.
Rickard A H (2008). "Cell-cell Communication in Oral Microbial Communities". Molecular Oral Microbiology. Caister Academic Press.
ISBN 978-1-904455-24-0.
Rogers A H (editor). (2008). Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0.
Shaikh N, Leonard E, Martin JM (September 2010). "Prevalence of streptococcal pharyngitis and streptococcal carriage in children: a metaanalysis". Pediatrics 126 (3): e557–64. doi:10.1542/peds.2009-2648. PMID 20696723
HW; Gerber, MA; Kaplan, EL; Lee, G; Martin, JM; Van Beneden, C (Sep 9, 2012). "Clinical Practice Guideline for the Diagnosis and
Management of Group A Streptococcal Pharyngitis: 2012 Update by the Infectious Diseases Society of America.". Clinical infectious
143-144
7.
8.
9.
10.
diseases : an official publication of the Infectious Diseases Society of America 55 (10): e86–102. doi:10.1093/cid/cis629. PMID 22965026.
Hahn RG, Knox LM, Forman TA (May 2005). "Evaluation of poststreptococcal illness". Am Fam Physician 71 (10): 1949–54. PMID
15926411.
Baltimore RS (February 2010). "Re-evaluation of antibiotic treatment of streptococcal pharyngitis". Curr. Opin. Pediatr. 22 (1): 77–82.
A. Wayne, 2007, Clinical Laboratory Standards Institute. Principles and procedures for blood cultures; Approved Guideline. CLSI
document M47-PA: Clinical and Laboratory Standards Institute, 2007
Baron EJ, Weinstein MP, Dunne WMJ, Yagupsky P, Welch DF, Wilson DM, eds. Cumitech 1C, blood cultures IV. Washington, DC:ASM
Press, 2005
Authors:
M. Sai Sarath Kumar, M. Aarthy
Paper Title:
A 2.8 GHz Low Power High Tuning Voltage Controlled Ring Oscillator
Abstract: This work describes a two-stage CMOS Voltage Ring Oscillator (VCRO) using differential delay cells
are analyzed. The main aim of the paper is to increase the tuning range of the circuit and obtain a good phase noise at
the cost of design complexity and power consumption. Two-stage VCRO implemented in 90 nm Technology realizes
a tuning range of 53.40% and a phase noise of -156.328 dBc/Hz for a power consumption of 9.85mW. The phase
noise of the VCRO is bettered by cascading more number of stages to trade off power consumption A four-stage
VCRO is implemented and achieved a tuning range of 62.15% and a phase noise of -116.608 dBc/Hz. However the
power consumption of the circuit increased to 16.45mW.
33.
Keywords: Voltage Ring Oscillator, Phase Noise, Tuning Range
145-147
References:
1.
2.
3.
4.
5.
6.
“A 1.4GHz CMOS Low-Phase Noise Voltage - Controlled Ring Oscillator”, Ahmad Akmal Abd Ghani and Azilah Saparon, The 5th Student
Conference on Research and Development –SCOReD 2007, 11-12 December 2007, Malaysia.
“A 900-MHz CMOS Low-Phase-Noise Voltage-Controlled Ring Oscillator”, William Shing Tak Yan and Howard Cam Luong, , IEEE
Transactions Circuits and Systems—II:Analog and Digital Signal Processing, VOL. 48, NO. 2,February 2001.
B. Fahs, W. Y. Ali-Ahmad, and P. Gamand, “A twostage ring oscillator in 0.13-μm CMOS for UWB impulse radio,” IEEE Trans. Microw.
Theory Tech.,vol. 57, no. 5, pp.1074–1082, May 2009.
Y. A. Eken and J. P. Uyemura, “A 5.9-GHz voltagecontrolled ring oscillator in 0.18-μm CMOS,” IEEE J. Solid-State Circuits, vol. 39, no. 1,
pp. 230–233, Jan. 2004.
Changzhi Li, and Jenshan Lin, ‘’A 1–9 GHz Linear Wide-Tuning-Range Quadrature Ring Oscillator in 130 nm CMOS for Non-Contact
Vital Sign Radar Application, 2009”.IEEE Microwave and wireless components Letters, VOL. 20,NO. 1, January 2010.
B. Razavi, “Design of Analog CMOS integrated circuits,” McGraw Hill, 2001.
Authors:
Miloni Ganatra, Ashwin Patani
Paper Title:
Time and Energy Optimizing Signature Indexing Technique Perform and Implementation by VHDL
Abstract:
The periodic broadcasting of frequently requested data can The periodic broadcasting of frequently
requested data can reduce the workload of uplink channels and improve data access for users in a wireless network.
Since portable devices have limited energy capacities associated with their relies on battery power, it is important to
minimize the time and energy spent on accessing the required data from the broadcasted data. The indexing in the
broadcast data plays an important role in this problem. This research intends to study the indexing technique that is
used to save the power and to minimize the access time. The simple signature technique to index data is one of the
simplest ways to optimize these factors. The VHDL implementation of simple signature model presented here is real
time.
Keywords: Mobile computing, mobile client, broadcast, signature indexing.
34.
References:
1.
2.
3.
4.
5.
6.
7.
8.
35.
[Acharya S.,Alonso R., Franklin M and Zdonik S.,”Broadcast Disc: Data Management for Asymmetric Communication Environments”,In
Preceeding of ACM sigmod,pp 199-210.1995
Serfert A.and Hung J. “ FlexInd: A Flexible and Parametrised Air Indexing Scheme of Data Broadcast System” EDBT 2006 LNCS 3896
pp 902-920 (2006).
T. Imielinski, S. Viswanathan, and B. R. Badrinath. Energy efficiency indexing on air. In Proceedings of the International Conference on
SIGMOD, pages 25–36, 1994.
Imielinski T., Viswanathan S. and Badrinath B. R., “Data on Air: Organization and Access”, IEEE Transactions on Knowledge and Data
Engineering, 9(3): 353-371, 1997.
Lee, D.K., Xu, J., Zheng, B. and Lee, W-C, “Data Management in Location-Dependent Information Services”, IEEE Pervasive Computing,
2(3):65-72, July-Sept, 2002.
Amermend, D., Aristugi, M. “An Index Allocation Method for Data Access over Multiple Wireless Broadcast Channel” IPSJ Digital
Courier, Vol. 2, 852 – 862, 2006.
Lee G., Chen e, and Lo S-C, “Broadcast Data Allocation for Efficient Access on Multiple Data Items in Mobile Environments”, Mobile
Networks and Applications, 8, 365- 375, 2003.
Hu Q., Lee W. C. and Lee D. L. “Indexing Techniques for Wireless Data Broadcast under Data Clustering and Scheduling” CIKM ’99, 1
l/99 Kansas City, MO, USA (1996).
Authors:
S.Adebayo Daramola, Olujimi Ajayi, Tiwalade Odu
Paper Title:
Robust Palm-print Feature for Human Identification
Abstract: Palm-print is a unique biometric trait commonly uses to distinguish people. Identification of people with
aid of machine is needed to solve insecurity challenges in our society. Human palm-print is a good raw material for
machine based identification systems. These systems require strong predominate feature from palm-print for
successful operation. In this work, a discriminate feature that can be used to differentiate people accurately is
extracted from palm-print image. Edge detected palm-print image is sliced into smaller image blocks through centre
points thereafter robust feature vector is generated from these smaller image blocks. The new feature was
experimental using feature plot and it is shown clearly that this feature will deliver excellent classification result.
148-151
152-155
Keywords: Centre points, City block distance, Image blocks, Palm-print.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
M. Nageshkumar., P.K Mahesh. and M.N. Shanmukha Swamy, “An Efficient Secure Multimodal Biometric Fusion Using Palmprint and
Face Image”, International Journal of Computer Science Issues, Vol.2, 2009, pp49-53,
S. Zokaee, K. Faez, “Human Identification Based on Electrocardiogram and Palmprint”, International Journal of Electrical and Computer
Engineering, Vol.2, No.2, 2012, pp. 261-266.
D. Y Liliana, E. T Utaminingsih, “The Combination of Palm print and Hand Geometry for Biometrics Palm Recognition”, International
Journal of Video & Image Processing and Network Security. Vol.12, No.1, 2012, pp.1-5.
S. Kumra. T. Rao, “A Novel Design for a Palm Prints Enabled Biometric System”, IOSR Journal of Computer Engineering (IOSRJCE)
Volume 7, Issue 3, 2012, pp. 1-8.
W. K Kong, D. Zhang., W. Li, “Palmprint Feature Extraction using 2-D Gabor Filters”, The Journal of Pattern Recognition Society”, Vol.
36, 2003, pp.2339 – 2347.
S. Karar and R. Parekh, “Palmprint Recognition using Phase Symmetry”, International Journal of Scientific and Research Publications,
Vol.3, Issue 4, 2013, pp. 1-6.
H. M Salman, “Palmprint Characterization Using Multi-wavelet Transform for Human Identification”, Eng.& Tech.Journal, Vol.27, No.3,
2009, pp405-417.
J. Guo, Y. Liu, W. Yuan, “Palmprint Recognition Using Local Information from a Single Image Per Person”, Journal of Computational
Information Systems, Vol.8 (8), 2012, pp.3199 – 3206.
H Imtiaz, S Aich, S A Fattah, “A Novel Pre-processing Technique for DCT domain Palm-print Recognition”, International Journal of
Scientific & Technology Research , Volume 1, Issue 3, 2012, pp.31 – 35.
N. Swathi, C. Satish, V. S Satyanarayana, P. Ramesh, H. Kumar, N. Bhuma, C. Himabin, “New Palm Print Authentication System By Using
Wavelet Based Method”, Signal & Image Processing : An International Journal(SIPIJ) , Vol.2, No.1, . 2011, pp.191 – 203 .
K. Ito, T. Aoki, H. Nakajima, K. Kobayashi and T. Higuchi, “A Palmprint Recognition Algorithm using Phase-based Image Matching” ,
IEEE International Conference of Image Processing , 2006, pp.2669 – 2672.
Jyoti Malik1, Ratna Dahiya1, G. Sainarayanan, “Personal Authentication Using Palmprint with Phase Congruency Feature Extraction
Method”, International Journal of Signal Processing, Image Processing and Pattern Recognition system. Vol. 4, No. 3, 2011, pp. 19-34.
K .Umadevi1 and L.Latha, An Efficient Searching and Clusterig based Palmprint Identification, Research Journal of Computer Systems
Engineering – RJCSE, Vol 04, 2013, pp. 613 – 617.
K.Shanmugapriya, M. Karthika, Dr. S.Valarmathy, M.Arunkumar, “Performance Evaluation of Contourlet Transform based Palmprint
Recognition using Nearest Neighbour Classifier”, International Journal of Emerging Technology and Advanced Engineering Volume 3,
Issue 1, 2013, pp. 294 – 299.
J. Malik1, G. Sainarayanan and R. Dahiya, “Personal Authentication using Palmprint with Sobel code, Canny edge and Phase Congruency
Feature Extraction Method”, ICTACT Journal on Image and Video Processing , Vol. 02, Issue 03, 2012, pp.357- 368.
Allen George, G.Karthick, “Palmprint Recognition Using Ridge Features”, International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 2, Issue 11, 2013 , pp.4288 - 4291 .
Authors:
R. Abd Allah
Paper Title:
Busbar Protection Scheme Based on Alienation Coefficients for Current Signals
Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for
fault analysis. An alienation technique is developed for busbar protection against all ten types of shunt faults, which
may locate in busbar protection zone, under different loading levels, fault resistances and fault inception angle. It
does not need any extra equipment as it depends only on the three-line currents measurements, of all feeders
connected to the protected busbar, which are mostly available at the relay location. It is able to perform fault
detection, fault confirmation, faulty phase selection and determine the fault location in about a half-cycle period.
Thus, the alienation technique is well suited for implementation in digital protection schemes. The technique is
efficient to detect current transformer saturation conditions without needing any additional algorithm. The effects of
DC components and harmonics are eliminated with estimation of alienation coefficients. The proposed methodology
is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB package are
used to implement the proposed technique.
Keywords: Busbar protection, current transformer saturation, fault detection, internal and external faults, alienation
coefficient, ATP software, MATLAB.
References:
36.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
IEEE Guide for the Application of Current Transformers Used for Protective Relaying Purposes IEEE Std. C 37.110-1996.
Working group of the Relay Input Sources Subcommittee of the Power System Relaying Committee “Transient response of current
transformers” IEEE Transaction on power apparatus and systems, Vol. PAS-96, no. 6, November/December 1977.
W.J. Smolinky “Design Consideration in the Application of Current Transformers For Protective Relaying Purposes”, IEEE Transactions on
Power Apparatus and System, Vol. PAS-92, no.4, July/August 1973.
D.A. Bradley, C.B.Gray, D.O’Kelly “Transient compensation of current transformers” IEEE Transactions on Power Apparatus and Systems,
Vol. PAS-97, no.4, July/Aug 1978
Y.C. Kang, J.K.Park, S.H.Kang, A.T. Johns, R.K. Aggarawal “ An algorithm for compensating secondary currents of current transformers”
IEEE Transactions on Power Delivery, Vol.12, no.1, January 1997
D.C.Yu,Z.Wang, J.C. Cummins,H.-J. Yoon,L.A.Kojovic,and D.Stone “Neural network for current transformer saturation correction” in
proc. IEEE Transm. Distrib. Conf., New Orrleans,LA,Apr.1999.
M.E. Masoud, E.H.Shehab-Eldin, M.M Eissa, and M.F.Elnagar. “A New Compensating secondary current technique for saturated current
transformers” The 8thInternational Middle- East power system conference “MEPECON 2001”, PP549-555.
Jiuping Pan, Khoi Vu, and Yi Hu “An Efficient Compensation Algorithm for Current Transformer Saturation Effects” IEEE Transactions on
Power delivery, Vol. 19, no.4, October, 2004, PP1623-1628.
M.A. Salem, M.I. Gilany,Z. Osman and E. aboul Zahab “ A new algorithm for compensating the secondary current during current
transformer saturation” The tenth International Middle- East power systems conference “MEPECON 2005” PP 427-433.
M.S. Sachdev, T.S. Sidhu, H.S. Gill, ''A busbar protection technique and its performance during CT saturation and CT ratio-mismatch'',
Power Delivery, IEEE Transactions on (Volume:15, Issue: 3 ), Page(s):895 - 901, Jul 2000.
Xuyang Deng, Jiale Suonan, Zaibin Jiao and Xiaoning Kang, ''A Model Parameter Identification Based Bus-bar Protection Principle'', Power
and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010.
Jiale Suonan, Xuyang Deng and Guobing Song, ''A Novel Busbar Protection Based on Fault Component Integrated Impedance'', Power and
Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010.
Libao Xu, Grasset, H., Xingli Dong, Chenliang Xu and Ruidong Xu, ''A new method for busbar protection stability improvement'',
156-167
14.
15.
16.
17.
18.
19.
20.
Developments in Power System Protection (DPSP 2010). Managing the Change, 10th IET International Conference on, Page(s):1-4, April
2010.
ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual Preliminary Release No. 1.1 - October 2002.
W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere
grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.
Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H.
Freeman, pp. 33-46, 1976.
Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed.
Ames, IA: Iowa State Press, pp. 175-178, 1980.
Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University
Press, pp. 630-633, 1992.
Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294323, 1992.
Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined
Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban,2006.
Authors:
B. Roja Reddy, Uttarakumari M.
Paper Title:
Orthogonal MIMO Radar Waveform Performance Analysis with Ambiguity Function
Abstract: In this paper, the basic Multiple Input and Multiple Output ambiguity function tool is used to analyze
the performance of orthogonal waveforms for MIMO radar antenna system. The orthogonal waveforms like modified
Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Polyphase and Discrete
Frequency Coding Space Time Waveform (DFCSTW) waveforms are considered. The resolution performance is
governed and controlled by the system on transmit using orthogonal waveform diversity. The resolution performance
is illustrated using MIMO radar orthogonal waveforms.
Keywords: Ambiguity Function (AF), Discrete Frequency Coding Space Time Waveform (DFCSTW), Discrete
Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Orthogonal waveforms, Polyphase
Waveforms.
References:
1.
2.
3.
4.
5.
6.
7.
8.
37.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
E.Fishler, A.Haimovich, R. Blum, L.Cimini, D.Chizhik, and R. Valenzuela, “MIMO radar: An idea whose time has come,” in proceedings of
IEEE International Radar conference, Philadelphia, PA, April 2004, pp No.71-78.
Qu JinYou Zhang JianYun Liu ChunQuan, “The Ambiguity Function of MIMO Radar,” in IEEE 2007 International Symposium on
Microwave, Antenna, Propagation, and EMC Technologies For Wireless Communications, Hangzhou, 16-17 , Aug. 2007, pp no.265 – 268.
Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Optimization Using Frequency-Hopping Waveforms,” in 41st Asilomar
Conference in Signals, Systems and Computers, Pacific Grove, CA, 4-7 Nov. 2007, pp no. 192 – 196.
Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Properties and Optimization Using Frequency-Hopping Waveforms,” in
IEEE Transactions on Signal Processing, Vol 56, No. 12, Dec.2008, pp no. 5926- 5936.
Harger, Robert O. , “A Note on the Realization of Ambiguity Functions,” in IEEE Transactions on Space Electronics and Telemetry, 12
November 2007, pp no. 127 – 130.
Bo Liu, Zishu He, liankui Zeng, “Optimization of Polyphase Code Based on Ambiguity Function for MIMO Radar, ” in International
Conference on Communications, Circuits and Systems, Kokura, 11-13 July 2007, pp no. 111 - 114
Chun-Yang Chen and P. P. Vaidyanathan, “ Properties of the MIMO Radar Ambiguity Function, ” in IEEE International Conference
Acoustics, Speech and Singal Processing, Las Vegas, NV March 31 2008-April 4 2008, pp no. 2309 – 2312
Yuri 1. Abramovich, Gordon 1. Frazer, “MIMO Radar Performance in clutter Limitations Imposed by Bounds on the Volume and Height
Distributions for The MIMO Radar Ambiguity Function,” in 5th IEEE Signal Processing Workshop Array and Multichannel, Darmstadt, 2123 July 2008, pp no. 441 – 445.
Yuri I. Abramovich, Gordon J. Frazer, “Bounds on the Volume and Height Distributions for the MIMO Radar Ambiguity Function,” on
IEEE Signal Processing Letters, Vol 15, 2008, Vol. 15, 2008, pp no. 505– 508.
M. A. Haleem and A. Haimovich, “On The Distribution Of Ambiguity Levels in MIMO Radar, ” in 42nd Asilomar Conference on Signals,
Systems, and Computers, Pacific Grove, CA, 26-29 Oct. 2008, pp no. 198 – 202.
Daniel R. Fuhrmann, J. Paul Browning, and Muralidhar Rangaswamy, “Ambiguity function analysis for the Hybrid MIMO Phased-array
Radar ,” in IEEE Radar Conference, Pasadena, CA, 4-8 May 2009, pp no.1 – 6.
Jamil, M. ; Zepernick, H. ; Pettersson, M.I. , “ Properties of ambiguity functions for weighted pulse trains with Oppermann sequences, ” in
International Conference on Signal Processing and Communication Systems, Omaha, NE V, 28-30 Sept. 2009, pp no. 1 – 8.
Rajesh Sharma, “Analysis of MIMO Radar Ambiguity Functions and Implications on Clear Region ,” in Radar conference, Washington, DC,
10-14 May 2010, pp no.544 – 548.
V.U. Reddy, “Signal Design for a Specified Transmit Beampattern, Spatial Ambiguity Function for MIMO Radar: A Brief Review of Recent
Results, ” in IEEE Applied Electromagnetic Conference, Kolkatta, Indiai, 18-22 Dec. 2011, pp no. 1-4.
Wicks, M.C. ; Vela, R. ; Lo Monte, L.,“ Range-Doppler-Angle Ambiguity Function Analysis in Modern Radar, ”in IEEE International
Symposium on Antenna and Propagation Society, Chicago, IL 8-14 July 2012, pp no. 1.
Wei Zhou, Haowen Chen, Weidong Jiang, Hongqiang Wang, “Generalized Ambiguity Function Analysis of MIMO SAR ,” in IEEE 11th
International Conference Signal Processing, Vol 3, Beijing, 21-25 Oct. 2012, pp no. 1724 – 1728.
Honghui Yan, Guowei Shen, Rudolf Zetik, Ole Hirsch, and Reiner S. Thomä, “Ultra-Wideband MIMO Ambiguity Function and Its
Factorability, ” in IEEE Transactions on geosciences and Remote Sensing, Vol 51, No. 1, January 2013, pp no.504-519.
Uttam K. Majumder, Mark R. Bell, Muralidhar Rangaswamy, “A Novel Approach for Designing Diversity Radar Waveforms that are
Orthogonal on Both Transmit and Receive,” in IEEE Radar Conference, Ottawa, April 29 -May 3 2013, pp no. 1 – 6.
Waseem Khan, Ijaz Mansoor Qureshi, and Kiran Sultan,“ Ambiguity Function of Phased–MIMO Radar With Colocated Antennas and Its
Properties,” in IEEE Geoscience and Remote Sensing Letters, vol PP, Issue:99, 05 December 2013, pp no. 1 – 5.
H. Deng, “Polyphase code design for orthogonal netted radar systems,” IEEE Trans. Signal Process., vol. 52, no. 11, pp. 3126–3135,
Nov.2004.
Bo., Liu., Zishu., He., Jiankui., Zeng., Benyong., Liu, “Polyphase Orthogonal Code Design for MIMO Radar Systems,” Proc. Int. Conf
Radar, Shanghai, April 2006, pp. 1-4.
Bo Liu, Zishu He, Jun Li, “Mitigation of Autocorrelation sidelobe peaks of Orthogonal Discrete Frequency-Coding waveform for MIMO
Radar”, in proceedings of IEEE Radar conference, pp 1-6, China, Chengdu,2008.
B. Roja Reddy, M uttarakumari, “Generation of orthogonal discrete frequency coded waveform using accelerated particle swarm
optimization algorithm for MIMO radar”, Proceedings of the Second International Conference on Computer Science, Engineering and
Applications (ICCSEA 2012), New Delhi, India, Volume 1, pp 13-23, May 25-27, 2012.
Smt. B.Roja Reddy, M. Uttara Kumari, “Polyphase orthogonal Wave Form using Modified particle swarm optimization algorithm for MIMO
Radar”, ”IEEE International Conference on Signal Processing Computing and Control at WAKNAGHAT-SHIMLA from March 15-17th 2012.
168-173
Authors:
Samir S. Rathod, G. Niranjana
Paper Title:
Effective Resource Utilization for Caching as a Service in Cloud
Abstract: With the growing popularity of cloud based data centers as the enterprise IT platform of choice, there is
a need for effective management strategies capable of maintaining performance. Caching technology improves the
performance of the cloud. Cache as a service (CaaS) model is an additional service to Infrastructure as a service
(IaaS). The cloud server process introduce, pricing model together with the elastic cache system. This will increase
the disk I/O performance of the IaaS, and it will reduce the usage of the physical machines. The emerging cloud
applications provide data management services allowing the user to query the cloud data, paying the price for the
infrastructure they use. Cloud management necessitate an economy that manages the services of multiple users in an
efficient, but also, resource economic way that allows for cloud profit. The cloud caching service can maximize its
profit using an optimal pricing scheme. This scheme requires an appropriately simplified price-demand model that
incorporates the correlations of structures in the cache services. The pricing scheme should be adaptable to time
changes. This paper proposes a novel price demand model designed for a cloud cache and a dynamic pricing scheme
for queries executed in the cloud cache. This will estimates the correlations of the cache services in a time-efficient
manner and improve the efficiency of resources in cloud storage infrastructure to deliver scalable service.
38.
Keywords: Cloud Computing, CaaS model, Virtual Machine, Remote Memory, Optimal pricing scheme.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
39.
174-178
X. Zhang and Y. Dong, "Optimizing Xen VMM Based on Intel Virtualization Technology," Proc. IEEE Int'l Conf. Internet Computing in
Science and Eng. (ICICSE '08), 2008
H. Kim, H. Jo, and J. Lee, "XHive: Efficient Cooperative Caching for Virtual Machines, " IEEE Tran s. Computers, vol. 60, no. 1, Jan.
2011
G. Jung, M. A. Hiltunen, K. R. Joshi, "Amazon Elastic Compute Cloud", Amazon Web Services, 2010.
Verena Kantere , Debabrata Dash , Gregory Francois , Sofia Kyriakopoulou, Anastasia Ailamaki Ecole Polytechnique F'ed'erale de
Lausanne, "Optimal service pricing for a cloud cache", vol. 23, no. 9, pp. 1345-1358, 2011.
M.D. Dahlin, R.Y. Wang, T.E. Anderson, and D.A. Patterson, "Cooperative Caching: Using Remote Client Memory to Improve File
System Performance,” Proc. First USENIX Conf. Operating Systems Design and Implementation (OSDI ’94), 1994.
A. Menon, A.L. Cox, and W. Zwaenepoel, “Optimizing Network Virtualization in Xen,” Proc. Ann. Conf. USENIX Ann. Technical Conf.
(ATC `06), 2006.
Hyuck Han, Young Choon Lee, Woong Shin, Hyungsoo Jung, Heon Y. Yeom and Albert Y. Zomaya, "Cashing in on the Cache in the
Cloud", IEEE Transactions on Parallel and Distributed Systems, Vol. 23, no. 8, August 2012.
C. Park, P. Talawar, D. Won, M. Jung, J. Im, S. Kim, and Y. Choi, “A High Performance Controller for NAND Flash-Based Solid State
Disk (NSSD),” Proc. IEEE Non-Volatile Semiconductor Memory Workshop (NVSMW `06), 2006.
J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazie'res, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S.M.
Rumble, E. Stratmann, and R. Stutsman, "The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM/' ACM
SIGOPS Operating Systems Rev., vol. 43, pp. 92-105, Jan. 2010
C.A. Waldspurger, “Memory Resource Management in VMware ESX Server,” Proc. Fifth USENIX Conf. Operating System Design and
Implementation (OSDI `02), 2002.
Authors:
Vishal Srivastava, Tejasvi Gupta, Sourabh Kumar, Vinay Kumar, Javed Rafiq, Satish Kumar
Dwivedi
Paper Title:
Automatic Side Stand
Abstract:
The side stand is used for supporting a parked motorcycle. If the rider may forget to retract the side
stands before riding, then the undistracted stand hitting the ground and affected the riders control during the turn.
Now a day’s sensor are used for ensure that the stand is in released condition. The motorcycle side stand consists of a
metallic rod and helical spring which is offset from the centre.
Some side stand retract automatically when the motorcycle is lifted up the support some other are fit with electrical
interlocks , warning devices or special retracting mechanism. In this paper there is possibility to reduce the evident
which is takes place by the side stand.
Side stand in two wheelers function the entire weight of the vehicle when it is parked. They are perfect on quick stop
when one need to leave the vehicle for short while. They are provided with the spring that pulls it back into position
to ensure extra safety.
The presented mechanism consists of D.C. motor powered by motorcycles battery. Connected to the worm and worm
gear mechanism for reduction of speed of motor and multiply the torque. The motor is actuated by the Rotation
sensor which is mounted on the front of the wheel.
179-182
Keywords: D.C.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Everett, S.A., Shults, R.A., Barrios, L.C., Sacks, J.J., Lowry, R. and Oeltmann, J. (2001) Trend and subgroup differences in transportation
related injury risk and safety behaviors among high school students.
Reeder, A.I., Chalmers, D.J. and Langeley, J.D. (1996) The risky and protective motorcycling opinions and behaviors of young on road
motorcyclist in New Zealand
A journal paper ‘motorcycle accidents- case study and what do learn from them’ by Ecker, H. Viema University of Technology,
Bhimbra
P.S,
2009-2010, ‘Electrical machine’.
Sharma P.C., 2010-2011, ‘Machine design’ study for design purpose.
Singh Sadhu, 2009-2010, ‘Machine design’ study for design purpose.
R.S. Khurmi, 2008-2010, ‘Theory of machine study for torque calculation.
Sabey, B.E. and Taylor, H. (1980) The known risk We run: The Highway.
Hurt, H.H., Ouellet, J.V. and Thom, D.R. (1981) Motorcycle accident cause factors.
Grayson, G. and Hakkert, A. (1987) Accident analysis and conflict behaviour. In J. Rothengatter and R. de Bruin (eds) Road user and traffic
safety.
11.
12.
13.
14.
Malaterre, G. (1990) Error analysis and in- depth accident analysis.
Yin, R.K., (1984) case study research, Applied Social research Methods vol. 5. London Sage Publication.
1891- Frederick G.Taylor and R.L GRANSTON, “bicycle support”, U.S.patent 456,347
1928- W.S. Harley and Arthur R. Constantine assignors to Harley Davidson Motor Co., Milwau-kee, “Cycle Support”, U.S. Patent
1,675,551
Authors:
Gazal Betab, Ranjeet Kaur Sandhu
Paper Title:
Fingerprints in Automated Teller Machine-A Survey
Abstract: The main objective of this system is to develop a system that will increase the ATM security. However,
despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper,
we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates
recommended approaches to prevent these types of frauds.. The ATM will service one customer at a time. A
customer will be required to enter a login id and validate his finger print and both will be sent to the bank for
validation as part of each transaction. This makes the developed ATM software more secure as compared to the
software that authenticates the user merely by using a PIN or password.
Keywords: ATM Fraud, ATM Fraud Countermeasures Biometrics, Fingerprint Verification.
40.
References:
1.
2.
3.
4.
5.
6.
7.
8.
”Automatic Teller Machine”. The history of computing project. Thocp.net. 17 April 2006
Bhawna Negi 1 , Varun Sharma”Fingerprint Recognition System”, International Journal of Electronics and Computer Science Engineering
872 , www.ijecse.org ISSN- 2277-2011.
Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and
Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008).
G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge
Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008).
Pennnam Krishnamurthy and Mr. M. Maddhusudhan Redddy. “Implementation of ATM Security by Using Fingerprint recognition and
GSM”, International Journal of Electronics Communication and Computer Engineering.Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X
Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy,” Implementation of ATM Security by Using Fingerprint recognition and GSM”,
International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X,(2012)
Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image
Computing Techniques and Applications, pp. 245-252, (2007).
S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking
System”, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011.
Authors:
Priyank Rajvanshi, Subhash Chand Gupta
Paper Title:
Single Sign on Using SAML
183-186
Abstract:
With the proliferation of SaaS and other web-based applications, identity management is becoming a
major concern for businesses. Just think about the number of usernames and password you regularly type each day.
You probably log into your company's network, portal, webmail, benefits system, Google Apps, bespoke applications
and of course Force.com applications. Now multiply this by the number of users in your company and think about
the support and security implications. You need dedicated resources to manage your identity store, respond to
password reset requests, provision new users for each system and deactivate users that no longer need access. Just
think of the number of man hours you could save if you could eliminate 25-50% of your passwords and their
associated costs. Implementing a Single Sign-On (SSO) infrastructure enables users to sign in once and have access
to all authorized resources. In this article, we'll look at the different methods of implementing SSO with Force.com,
how to set up your own open source identity management system for federated authentication using SAML 2, and
how to configure the Force.com platform to utilize your new identify provider. We'll also provide some
troubleshooting techniques and outline some best practices to help you avoid common roadblocks, getting you up
and running fast.
In our approach we are trying to create Single Sign On in Salesforce so that in the applications which are connected
to salesforce can be authenticated with this approach.
41.
Keywords: Security, Identity Provider, SAML, Single Sign-On, Web, Authentication.
References:
OASIS Frequently Asked Questions “http://www.oasis- open.org/who/faqs.php”, 2009.
P. Madsen. SAML 2: The Building Blocks of Federated Identity “http://www.xml.com/pub/a/2005/01/12/saml2.html”, 2005.
Differences Between SAML V2.0 and SAML V1.1. “https://spaces.internet2.edu/display/SHIB/SAMLDiffs”, Feb. 2007.
N. Ragouzis et al. Security Assertion Markup Language (SAML)
V2.0
Technical
Overview.
“http://www.oasisopen.org/committees/download.php/22553/sstc-saml-tech- overview.pdf”, Feb. 2007.
5. S. Cantor et al. Metadata for the OASIS Security Assertion Markup
Language
(SAML)
V2.0.
“http://docs.oasisopen.org/security/saml/v2.0/saml-metadata-2.0-os.pdf”, March 2005.
6. M. Theimer. HttpFox 0.8.4. “https://addons.mozilla.org/en- US/firefox/addon/6647”, 2009.
7. HttpWatch. “http://www.httpwatch.com/”, 2009.
8. F. Hirsch et al. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasisopen.org/security/saml/v2.0/saml- sec-consider-2.0-os.pdf”, March 2005.
9. S. M. Hansen, J. Skriver, and H. R. Nielson. “Using static analysis to validate the SAML single sign-on protocol”, in Proceedings of the
2005 workshop on Issues in the theory of security (WITS ’05), 2005, pages 27–40.
10. T. Großand, and B. Pfitzmann, “Saml Artifact Information Flow Revisited”. Research Report RZ 3643 (99653), IBM Research,
“http://www.zurich.ibm.com/security/publications/2006/Gr Pf06.SAML-Artifacts.rz3643.pdf”, 2006.
11. S. Gajek, L. Liao, and J. Schwenk. “Stronger TLS bindings for SAML assertions and SAML artifacts”, in Proceedings of the 2008 ACM
Workshop on Secure Web Services (SWS ’08), 2008, pages 11-20.
1.
2.
3.
4.
42.
Authors:
R. Abd Allah
187-193
Paper Title:
Automatic Power Factor Correction Based on Alienation Technique
Abstract:
In modern digital protection and control systems, an alienation technique has recently become the
workhorse of quantitative research and analysis. In this paper, an alienation technique is developed for calculations of
original power factor on-line, active and compensation reactive powers and determination of the required number of
capacitor banks to get the desired power factor. Alienation coefficients are calculated between phase voltage and
current signals of power supply. These calculations are performed within one-cycle. Thus, the algorithm is well
suited for implementation in a digital reactive power control scheme. This scheme is able accurately to identify the
required capacitor rating to get the desired power factor under different loading levels. It does not need any extra
equipment as it depends only on the voltage and line-current measurements which are mostly available at the relay
location. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed
technique.
Keywords: Power system, power factor correction, correlation coefficient, alienation coefficient, reactive power
control relays, ATP software, MATLAB..
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
43.
K. K. Kapil, “Reduction in transmission and distribution loses, an opportunity for earning carbon credits”, Available online:
http://www.slideshare.net/kris_kapil/cdm-in-reduction-in-transmission and-distribution-losses.
Y. Jiang, F.C. Lee, G. Hua and W. Tang, “A novel single-phase power factor correction scheme,” Eighth Annual Applied Power Electronics
Conference and Exposition, pp: 287-292, 1993.
S. Basu and M.H.J. Bollen, “A Novel Common Power Factor Correction Scheme for Homes and Offices,” IEEE Transactions on Power
Delivery, Volume: 20, Issue: 3, pp: 2257 - 2263, 2005.
L. W. W. Morrow, “Power-factor correction,” Transactions of the American Institute of Electrical Engineers, vol. XLIV, pp. 1–7, Jan 1925.
D.K. Maly and K.S. Kwan, “Optimal battery energy storage system (BESS) charge scheduling with dynamic programming,” IEE
Proceedings in Science, Measurement and Technology, pp: 453- 458, 1995.
Fang Lin Luo and Hong Ye, ''Research on DC-Modulated Power Factor Correction AC/AC Converters'' Industrial Electronics Society, 2007.
IECON 2007. 33rd Annual Conference of the IEEE, PP: 1478 – 1483, Nov. 2007.
Shicheng Zheng, Electr. & Inf. Sch. And Biqing Liao,''Research on active power factor correction based on PDC control'', Industrial
Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, PP:1413 – 1418, May 2009.
Mather, B.A. and Maksimovi , D., ''A Simple Digital Power-Factor Correction Rectifier Controller'', Power Electronics, IEEE Transactions
on (Volume: 26 , Issue: 1) , PP: 9 – 19, Jan. 2011.
Wang Su, ''Research and Simulation of Active Power Factor Correction Based on the Three-Phase Rectifier'', Power and Energy Engineering
Conference (APPEEC), 2011 Asia-Pacific, PP:1 – 3, March 2011.
J. Hazra, Balakrishnan Narayanaswamy, Kaushik Das, Ashok Pon Kumar, Deva P Seetharam, De Silva Liyanage and Sathyajith Mathew
"Decentralized Power Factor Correction." Sustainable Future Energy 2012 and 10th See Forum Innovation for Sustainable and Secure
Energy 21-23 November 2012, Brunei Darussalam.
Sanjay N. Patel, Mulav P. Rathod, Keyur C. Patel, Parth H. Panchal, Jaimin N. Prajapati , ''Thyristorised Real Time Power Factor Correction
(TRTPFC)'', International Journal of Engineering Research & Technology, Vol.2 - Issue 3, March – 2013.
Abhinav Sharma, Vishal Nayyar, S. Chatterji, Ritula Thakur3and P.K. Lehana, ''PIC Microcontroller Based SVC for Reactive Power
Compensation and Power Factor Correction'', International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 3, Issue 9, September 2013.
ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002.
W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere
grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.
Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H.
Freeman, pp. 33-46, 1976.
M.Vitins, "A correlation Method for transmission line protection'', IEEE Transactions Power Apparatus and Systems, Vol.97, No.5, Sep/Oct
1978, pp.1607-1617.
Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed.
Ames, IA: Iowa State Press, pp. 175-178, 1980.
Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University
Press, pp. 630-633, 1992.
Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294323, 1992.
Authors:
R. Abd Allah
Paper Title:
Protection Scheme for Transmission Lines Based on Correlation Coefficients
Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for
fault analysis. A correlation technique is developed for faults detection and discrimination. The proposed technique is
able to accurately identify the condition of phase(s) involved in all ten types of shunt faults that may occur in extra
high-voltage transmission lines under different fault resistances, inception angle and loading levels. The proposed
technique does not need any extra equipment as it depends only on the three line-currents measurements which are
mostly available at the relay location. This technique is able to perform the fault detection, type and phase selection
in about a half-cycle period. Thus, the proposed technique is well suited for implementation in digital protection
schemes. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient
program (ATP) and MATLAB programs are used to implement the proposed technique.
Keywords: Power system, fault detection, fault classification, correlation coefficient.
References:
1.
2.
3.
4.
M. M. Saha et al., “A new accurate fault location algorithm for series compensated lines,” IEEE Trans. Power Delivery, vol. 14, pp. 789–
797, July 1999.
A. G. Phadke, Computer Relaying for Power Systems. New York: Wiley, 1988.
R. K. Aggrawal, Q. Y. Xuan, R. W. Dunn, and A. Bennett, “A novel fault classification technique for double-circuit line based on a
combined unsupervised/supervised neural network,” IEEE Trans. Power Delivery, vol. 14, pp. 1250–125, Oct. 1999.
W.-M. Lin, C.-D. Yang, and J. H. Lin, “A fault classification method by RBF neural network with OLS learning procedure,” IEEE Trans.
194-202
203-212
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
Power Delivery, vol. 16, pp. 473–477, Oct. 2001.
T. Dalstein and B. Kulicke, “Neural network approach to fault classification for high speed protective relaying,” IEEE Trans. Power
Delivery, vol. 10, pp. 1002–1011, Apr. 1995.
D. K. Ranaweera, “Comparison of neural network models for fault diagnosis of power system,” Elect. Power Syst. Res., pp. 99–104, 1994.
K. H. Kim and J. K. Park, “Application of hierarchical neural networks to fault diagnosis of power system,” Int. J. Elect. Power Energy
Syst., vol. 15, no. 2, pp. 65–70, 1993.
A. L. O. Fernandez and N. K. I. Ghonaim, “A novel approach using a FIRANN for fault detection and direction estimation for high voltage
transmission lines,” IEEE Trans. Power Delivery, vol. 17, pp. 894–901, Oct. 2002.
Poeltl and K. Frohich, “Two new methods for fast fault type detection by means of parameters fitting and artificial neural networks,” IEEE
Trans. Power Delivery, vol. 14, pp. 1269–1275, Oct. 1999.
A. Girgis and M. B. Johns, “Ahybrid expert system for faulted section identification, fault type classification and selection of fault location
algorithms,” IEEE Trans. Power Delivery, vol. 4, pp. 978–985, Apr. 1989.
A. Protopapas, K. P. Psatiras, and A. V. Machias, “An expert system for substation fault diagnosis and alarm processing,” IEEE Trans.
Power Delivery, vol. 6, pp. 648–655, Apr. 1991.
H. T. Yang, W. Y. Chang, and C. L. Huang, “On line fault diagnosis of power substation using connectionist expert system,” IEEE Trans.
Power Syst., vol. 10, pp. 323–331, Feb. 1995.
A. Ferrero, S. Sangiovanni, and E. Zapitelli, “A fuzzy set approach to fault type identification in digital relaying,” IEEE Trans. Power
Delivery, vol. 10, pp. 169–175, Jan. 1995.
H.Wang andW.W. L. Keerthipala, “Fuzzy neuro approach to fault classification for transmission line protection,” IEEE Trans. Power
Delivery, vol. 13, pp. 1093–1104, Oct. 1998.
T. Adu, “An accurate fault classification technique for power system monitoring devices,” IEEE Trans. Power Delivery, vol. 17, pp. 684–
690, July 2002.
M.E. Masoud, M.M.A. Mahfouz, “Protection scheme for transmission lines based on alienation coefficients for current signals”, IET Gener.
Transm. Distrib., Vol. 4, Iss. 11, pp. 1236 – 1244. March 2010
W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere
grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992.
Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined
Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban.
ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002.
Authors:
Ghazala Y. Hermiz, Bushra A. Aljurani, Md. Ali H. Al-Beayaty
Paper Title:
Effect of Mn Substitution on the Superconducting Properties of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ
Abstract: The present study includes the preparation of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ compound with x =
0.0, 0.1, 0.2, 0.3, 0.4 and 0.5 by solid state reaction method. The effect of the substitution of Mn on Ca site on
superconducting properties has been investigated to obtain the optimum conditions for the formation and stabilization
of the high Tc phase. Energy dispersive X-ray spectroscopy (EDX) analysis was used to test the proportions and
energies of the elements of the compound. The crystal structure was examined by XRD for all superconductor
samples; it was found that the crystal structure was orthorhombic and all major peaks in the spectra could be pointed
to 2223-phase with amount of 2212-phase ; a small volume fraction of impurities like Ca2CuO3, CuO and
Sr2Ca2Cu7Oδ were noticed in some samples. The highest Tc obtained for Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ
composition was 118K for the sample with x=0.3.Scanning electron microscopy (SEM) has been used to identify the
morphology of the superconducting phase and to investigate the influence of substitution effect of Mn on Ca site
.The microstructure shows plate –like layered with increasing of voids and defect for samples with x=0.1,0.2,while
the grains become smaller with disappear of grain boundaries of sample with x=0.3.
Keywords: Bi-based superconductors, Mn substitution, •Scanning electronic microscopy.
44.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
45.
P.Vase,R.Flukiger,M.Leghissa and G.Glowacki,“Current status of high-TC wire,” Supercond. Sci. Technol., vol. 13, 2000,pp. R71-R84.
Y. Huang, J.Kerby,T. Nicol and T.Peterson,“Progress in Bi=2223 wire performance” presented at
CEC-ICMC , Madison,
Wisconcin,USA,2001,16-20.
B.L. Gyorffy, Z. Szotek, W.M. Temmerman, O.K. Andersen and O. Jepsen, “On the Quasi Particle Spectra of High Temperature
Superconductors", Phys.Rev.B vol.58,1998,pp.1025.
Retoux R, Studer F, Michel C, Raveau B, Fontaine A, Dartyge E. "Valence state for bismuth in the superconducting bismuth cuprates" Phys
Rev. B vol.41(1),1990,pp.193-199 .
H.Maeda, Y.Tanaka, M.Fukutomi ,T.Asano"A New High-Tc Oxide Superconductor without a Rare Earth Element"Jpn. J. Appl.Phys.
vol.27, 1988,pp.209–210.
G.Yildirim,S.Bal,E.Yucel,M.Dogruer,M.Akdogan.A.Varilci,C.Terzioglu" Effect of Mn Addition on Structural and Superconducting
Properties of (Bi, Pb)-2223 Superconducting Ceramics "J Supercond. Nov. Magn. vol 25,2012,pp.381–390.
I.Verma, R. Rawat, V. Ganesan, D. M. Phase and B. Das ,The Effect of Mn Substitution on Properties of Bi1.6Pb0.4Sr2 Ca2−xMnxCu3Oy
Superconductors , IndiaJ Supercond Nov Magn.,vol. 25,2012,pp.85–90.
R. Kumar• I.Verma • N.Verma ,V. Ganesan “Effect of Mn on the Surface Morphological Properties of (Bi,Pb)2Sr2Ca2Cu3−x
MnxO10+δSuperconductor J. Supercond. Nov. Magn. Vol.25,2012,pp1215–1221.
J. S. Hawa,H. Azhan ,S. Y. Yahya ,K. Azman ,H. N. Hidayah and A. W. Norazidah”The effect of Eu substitution onto Ca site in Bi(Pb)2223 superconductor via co-precipitation method” J. Supercond. Nov. Magn., Vol. 26, 2013, pp. 979-983.
A.Ashish, “processing–property relationships for high Tc ceramic superconductors in the Bi-Ca-Sr-Cu-O system” Ph.D. Thesis, University
of Illinois at Urbana –Champaign, 1992.
L.W.Lei, Z.Y. Fu, J.Y.Zhang, "Influence of sintering temperature on microstructure and magnetotransport properties of La0.8Na0.2MnO3
ceramics" Materials Letters vol.60, 2006,pp. 970-973 .
V.Primo,F.Sapina,M.J.Sanchis,R.Ibanez,A.Beltran,D.Beltran,"A new improved synthesis of the 110 K bismuth superconducting phase:
freeze-drying of acetic solutions” Materials Letters vol.15,1992,pp.149-155.
Authors:
Ms.Anagha.C.K, Mrs.S.Berclin Jeyaprabha , Ms.Shaema Lizbeth Mathew
Paper Title:
Optimal Sizing of Building Integrated Hybrid Energy system
Abstract: In this study, an optimal sizing for building integrated hybrid photovoltaic, diesel generator and battery
system for zero load rejection is performed. The optimization is obtained by considering the loss-of-load probability
(LLP) of the system less than 0.01. For this system, the average daily solar radiation is collected from
‘Thondamuthur’region, Coimbatore. The load demand is collected from Civil Department building of Karunya
213-217
218-222
University. The optimization presented in this study aims to calculate the optimum size of a PV array and diesel
generator, and battery which examine the minimum system cost. An optimization problem in terms of system unit
cost is solved graphically in this study. The results of the optimization show that a photovoltaic/diesel generator
choice is more feasible compared to a standalone photovoltaic system or diesel generator system.
Keywords: Diesel Generator, Photovoltaic energy, Renewable energy, Sizing of the system
References:
R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–diesel systems using genetic algorithms‖, Solar Energy 79
(2005) 33–46.
2. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the design and operation strategy of hybrid-PV energy systems‖, Solar
Energy 61 (1997)77–87.
3. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40.
4. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖,
Solar Energy 66 (1999)1–9.
5. Tamer Khatib, A. Mohamed, K. Sopian, M. Mahmoud, ―Optimal sizing of building integrated hybrid PV/diesel generator system for zero
load rejection for Malaysia‖.
6. Ganguly, D. Misra, S. Ghosh, ―Modeling and analysis of solar photovoltaic electrolyzer - fuel cell hybrid power system integrated with a
floriculture greenhouse‖, Energy and Buildings42 (2010) 2036–2043.
7. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PV/diesel /battery hybrid powersystem for a remotely located population near Rafha,
Saudi Arabia‖, Solar Energy 35(2010)46-48.
8. R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–dieselsystems using genetic algorithms‖, Solar Energy 79 (2005)
33–46.
9. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the designand operation strategy of hybrid-PV energy systems‖, Solar
Energy 61 (1997)77–87.
10. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40.
11. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖,
Solar Energy 66 (1999)1–9.
12. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PVedieselebattery hybrid powersystem for a remotely located population near Rafha,
Saudi Arabia‖, Solar Energy 35(2010)46-48
1.
Authors:
Shaema Lizbeth Mathew, S.Berclin Jeyaprabha, Anagha.C.K
Optimal Sizing Procedure for Standalone PV System for University Located Near Western Ghats in
Paper Title:
India
Abstract: This paper presents an optimal sizing procedure and tracking for standalone photovoltaic system located
in one of the remote areas of India. This work is based on the meteorological data in Thondamuthur region where
Karunya University is located and load demand profile of Computer Technology Centre of Karunya University. The
PV array tilt angle is designed optimally based on the optimization algorithm. The PV array can be tilted at various
angles in order to receive maximum global solar energy in different season. This strategy of tilt angle adjustment can
reduce the use of electromechanical or pure mechanical devices, reduce the number of site visits and increase the
solar radiation capturing efficiency. PV array size and storage battery capacity are calculated based on numerical
method and compared with intuitive method using MATLAB. It is proved in this paper that the system designed by
intuitive method is more expensive than the system designed by the numerical method as the former is based on the
worst month data.
46.
Keywords: Array size, Battery capacity, Optimal Sizing, Optimization of energy sources, PV tilt angle
223-229
References:
1.
2.
3.
4.
5.
6.
7.
47.
A. McEvoy, T. Markvart, L. Castaner, “Practical Handbook of Photovoltaics: Fundamentals and Applications”, Elsevier, New York, NY,
USA, 2011.
M. Benghanem, “Optimization of tilt angle for solar panel: case study for Madinah, Saudi Arabia”, Applied Energy 88 (2011) 1427–1433.
G. Shrestha, I. Goel, “A study on optimal sizing of standalone photovoltaic stations”, IEEE Transactions on Energy Conversion 13 (1998)
373–378.
J. Hay, “Calculation of monthly mean solar radiation for horizontal and tilted surfaces”, Solar Energy (1979) 23.
T. Khatib, A. Mohamed, K. Sopian, M. Mahmoud, “A new approach for metrological variables prediction using ANNs: application for
sizing & maintain PV systems”, Journal of Solar Energy Engineering 134 (2) (2012) 205–217.
Omidreza Saadatian, K Sopian, B R Elhab, Mh Ruslan, Nilofar Asim, “Optimal Solar Panels’ Tilt Angles and Orientations in Kuala
Lumpur, Malaysia”, Advances in Environment, Biotechnology and Biomedicine ISBN: 978-1-61804-122-7.
M.Jamil Ahmed, G.N.Tiwari, “ Optimization of tilt angle of solar collector to receive maximum radiation” , Open Renewable Energy
Journal, 2009, 2, 19-24.
Authors:
Manjula Athani, Neelam Pathak, Asif Ullah Khan
Paper Title:
Dynamic Music Recommender System Using Genetic Algorithm
Abstract: Web-based systems are popular in many different areas, with the users they tend to deliver customized
information by means of utilization of recommendation methods.The recommender system also has to recognize and
provide items corresponding with user favorites. In this paper we presented a dynamic recommender system for
music data. This system is able to identifying the n-number of users preferences and adaptively recommend music
tracks according to user preferences. we are extracting unique feature of each music track. Then we are applying
BLX-a crossover to a extracted features of each music track. User favorite and user profiles are included. Multiuser
dynamic recommender system for n-user combines the two methodologies, the content based filtering technique and
the interactive genetic algorithm by providing optimized solution every time and which is based on user’s
preferences hence it give better result and better user system..
Keywords: recommender system: Interactive genetic algorithm; BLX-a crossover.
230-232
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Hyun-Tae Kim,Jong-Hyun Lee, Chang Wook Ahn :A Recommender system Based on Genitic Algorithm for Music Data Second
International Conference on Computer Engineering and technolory v-6 415
Balabanovic ,M.and Shoham,Y.(1997).Recommender as classification: Using Social and Content Based Information in recommendation. In
Proceedings of National Conference on Artificial Intelligence,PP.714-720.
Goldberg,D.,Nichols,Oki,B.M.,andTerry,D.(1992).Using Collaborative Recommendation.In Proceedings of European Conference on
Research,7,pp 395-410.
Balabanovic ,M.,Shoham Y.FAB: Content-based,Collaborative recommendation.Communications of the Association for Comuputing
Machinery 40(3)(1997) 66-72.
D.E. Goldberg and J.H. Holland. “Genetic Algorithm and Machine Learning” Machine Learning,vol 3,n0 2-3,pp95-99,1988.
H. Takagi,” Interactive Evolutionary Computation: Fusion of the Capabilities of EC Optimization and Human Fvalution, ”Proceedings of
the IEEEE, vol 89, pp.1275-1296,2001
D.Thierens and D.Goldberg, “Elitist Recombination: An Integrated Selection Recombination GA, “ in Proceedings of the First IEEE
Conference on Evoltionary Computation,pp508-512,1994.
J.F. Crow and M. Kimura, “ Efficiency of Trucation Selection ,”in Proceedings of the National Academy of Sciences of the United States of
America, vol 76, no 1 396-399,1979.
F. Herrea,M.Lozano,and J.L. Verdegay, “Trackling Real-coded Genetic Algorithms : Operators and Tools for Behavioural Analysis,
”Artificial Intelligence Review, vol 12,265-319,318.
R .Burke. “Hybrid Web Recommender Systems” Lecture Notes in Computer Science,vol.4321,pp 377-408,Sringer Berlin: Heidelberg,2007.
M.J.Pazzani, “A Framework for collaborative, content-based and Demographic Filtering, ”Artificial Intelligence Review,vol.13,no 5-6,pp
.394-408,1999.
Elitist Recombination, An Integrated selection; Recombination GA ,In proceeding of the first of the first IEEE conferences on Evolutionary
Computation ,pp 508-512,1994.
J.F. Crow and M. Kimura,” Efficiency of Truncation Selection “ in proceedings of the National Academy, of science of the United States of
Americal,vol,76 no 1 ,pp 396-399,1979.
Authors:
Benderradji R, Gouidmi H, Beghidja A
Numerical Simulation of the Interaction Shockwave / Turbulent Boundary Layer: Interference
Paper Title:
RR/MR
Abstract: This study focuses on both the development of the turbulent boundary layer in supersonic flow over a
flat plate, the distance required for it to invade the entire section of the plate, and the effects of the size of the
interaction area on the development of the boundary layer. Increasing the strength of the interaction is an increase in
size of the areas of interaction leading to the formation of a recirculation bubble which is an area of the head losses.
For this reason, it can increase and decrease the Mach number for a reflection or Mach explains the impact of the
incident shock wave with strong boundary layer. The increase and decrease the Mach number has caused the
appearance of a hysteresis loop which is represented by the contours of iso fields’ density. These studies are in
agreement with respect to the trial that was presented by J. Delery et al (2009). We were given another contribution
and investigations of the phenomenon of wave interaction of shock / turbulent boundary layer. The model used in
this study is the kw-SST model, it is considered as the most suitable for this kind of problem, with special treatment
of the near-wall region. Numerical simulations were performed using FLUENT software.
Keywords:
Interaction of shockwave/ boundary layer- Interference shockwaves-Polar shock- RR ReflectionReflection MR.
References:
1.
2.
48.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
J. Deleuze, “Structure d’une couche limite turbulente soumise à une onde de choc incident. Thèse doctorat. Université AIX-Marseille II,
No. 2079588 (1995).
H. Laurent, Turbulence d’une interaction onde de choc/couche limite sur une paroi plane adiabatique ou chauffée, thèse de Doctorat,
Université AIX-Marseille II, (1996).
J. Délery and J. P. Dussauge, Some physical aspects of shock wave/boundary layer interactions, Shock wave, No. 19 (2009) 453-468.
D. S. Dolling, Fifty years of shock-wave/boundary layer interaction research: what next?, AIAA J. No. 39 (8) (2001).
A. Hadjadj J, Larsson, B. E. Morgan, J. W. Nichols and S. K. Lele, Large-eddy simulation of shock/boundary layer interaction. Center for
turbulence research-proceeding of the Summer ¨Program (2010).
S. Deck, P. E. Weiss, M. Pamiès and E. Garnier, Zonal detached Eddy Simulation of spatially developing flat plate turbulent boundary
layer, Computer§ Fluids No. 48 (2011) 1-15.
K. Sinha, K. Mahesh and G. Candler, Modeling the effect of shock unsteadiness in shock-wave/turbulent boundary layer interactions,
AIAA (2004).
J. R. Edwards, Numerical simulations of shock/boundary layer interactions using time-dependent modeling techniques: A survey of recent
results, Progress in Aerospace Sciences No. 44 (2008) 447-765.
J. Y. Choi, I. S. Jeung and Y. Yoon, Scaling effect of the combustion induced by shock-wave boundary layer interaction in premixed Gas,
Twenty-seventh symposium (international) on combustion (1998) 2181-2188.
S. Pirozzoli and F. Grasso, Direct numerical simulation of impinging shock wave/turbulent boundary layer interaction at M=2.25, Physics
of fluids No. 18 065113 (2006).
E. Touber and N. D. Sandham, Large-eddy simulation of low-frequency unsteadiness in a turbulent shock-induced separation bubble,
Theor. Comput. Fluid Dyn. No. 23 (2009) 79-107.
S. Teramoto, Large-Eddy simulation of shock wave/Boundary layer interaction, Trans. Japan Coc. Aero. Space sci. Vol. 47, No. 158
(2005) 268-275.
B. Morgan, S. Kawai and S. K. Lele, Large-Eddy simulation of an oblique shock wave impinging on a turbulent boundary layer, 10th fluid
dynamics conference and exhibit, AIAA No. 4467 28 june-1 july Chicago, IIIinois (2010).
M. Lagha, J. Kim, J. D. Eldredge and X. Zhong, A numerical study of compressible turbulent boundary layers, Physics of fluids No. 23
015106 (2011).
M. F. Shahab, G. Lehnasch, T. B. Gatski and P, Comte, DNS of a spatially developing, supersonic turbulent boundary layer flow over a
cooled wall, Turbulence, Heat and Masse Transfer 6, (2009).
S. Dubos, Simulation des grandes échelles d’écoulement turbulent supersoniques, These Doctorat, INSA de Rouen (2005).
C. Hadad, Instationnarités, mouvements d'onde de choc et tourbillons à grandes échelles dans une interaction onde de choc/couche limite
avec décollement, Thèse Doctorat, Université de Provence Aix-Marseille I (2005).
V. S. Murthy and W. C. Rose, Wall shear stress measurements in shock wave boundary layer interaction, AIAA J. No. 7, 16 (1978) 667672.
E. R. Van Driest, Turbulent boundary layer in compressible fluids, J. Aero. Sc. No. 3, 18 (1951) 145-160.
Sebastian Deck, Philippe Duvaeu, Paulo d’Espincy et Philippe Guillen: Development and application of Spalart-Allmaras one equation
233-237
turbulence model to three dimensional supersonic complex configurations. Aerospace Science and Technology. (2002) 171-183.
49.
Authors:
Alsana Bashir, Misba Gul, Javed A Naqash, Ajaz Masood
Paper Title:
Study of Permeability and Compressive Strength of Silica Fume Concrete
Abstract: Qualitatively permeability within concrete may be defined as the ease with which water, air and other
substances such as chloride ions or contaminants pass through the concrete pore structure. In general, the relative
magnitude of permeability for a given permeant (water, air or any other ion/ salt contaminant) may act as a prima
facie indicative parameter of durability of concrete. More the permeability, lesser may be the durability. As durability
governs the service life of the structure, thus permeability indirectly affects the service life of the structure. Besides,
in relation to durability, permeability invariably becomes a very important aspect for the design of over-head tanks,
water retaining structures and open flat roofs where permeability of concrete becomes objectionable. As such making
concrete least permeable without harming its compressive strength is of a primal importance for researchers.
Present state of knowledge about permeability and methods to decrease it are discretely available from literature.
Few pozzolanic materials have been reported to decrease the permeability remarkably.
Efforts in this experimental study were primarily aimed at evaluating effect of Silica Fume on important
characteristic properties of hardened concrete like crushing strength and permeability. The study was also aimed at
optimizing the weight of cement replacing additive (% by weight of the cement), which may be required to cause
favorable effects like relatively impermeable concrete, without compromising the strength aspect of the hardened
concrete mix. With potential optimization of replacement, the study may also serve as a contrast/guideline, for
relative effectiveness of Silica Fume Concrete over conventional Portland Cement Concrete.
Keywords: Concrete Permeability, Epoxy Sealing, Permeability cell, Silica Fume, Superplasticizer
238-242
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
M.G.Alexander, and B.J.Magee, “Durability Perfornance of Concrete Containing Condensed Silica Fume”, Cement Concrete Res., 29(6),
1999, pp.917-922.
Bayasi, Zing, Zhou, Jing, “ Properties of Silica Fume Concrete and Mortor”,ACI Materials Journal 90 (4) ,1993, pp.349-356.
DL.Venkatesh Babu , SC. Nateshan “Investigations on silica-Fume Concrete”, The Indian Concrete Journal, September 2004, pp.57-60
R.Siddique and M. Iqbal Khan, “Supplementary Cementing Materials”, Engineering Materials, Springer-Verlag Berlin Heidelberg ,2011,
pp.67-68.
Khaloo, A.R; Houseinian, M.R., “Evaluation of Properties of Silica Fume for use in Concrete”, International Conference on Concretes,
Dundee, Scotland, 1999.
R. Duval, E.H.Kadri, “ Influence of Silica Fume on the workability and Compressive Strength of High Performance Concrete”, Cement and
Concrete Research, Vol. 28, Issue 4, Pg. 533 – 547.
IS: 4031, Methods of Physical Tests for Hydraulic Cement, Part I, IV, V, VI, 1988.
IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards,
New Delhi.
IS 9103-1999 Concrete Admixtures-Specifications, Bureau of Indian Standards, New Delhi, India.
IS: 3085 – 1965, “Indian Standard method of test for permeability of cement mortar and concrete”, Bureau of Indian Standards, New Delhi.
IS 5514:1969 Apparatus used in Le-Chatelier test, Indian Standards, New Delhi, India.
IS 8112:1989 Specifications for 43 grade ordinary Portland cement, Indian Standards Institution, New Delhi.
Authors:
Harjot Kaur, Manpreet Kaur
Paper Title:
Detecting Clones in Class Diagrams Using Suffix Array
Abstract:
Model Driven Engineering has become standard and important framework in software research field.
UML domain models are conceptual models which are used to design and develop software in software development
life cycle. Unexpected copy of model elements leads to many problem. Models contain design level similarities and
are equally harmful for software maintain -ace as code clones are. So number of clones need to be detected from
UML domain models. This paper introduces an approach to detect clones in class diagrams. Class diagram contains
redundant element which increases the complexity and need to be removed. Firstly, class diagrams are encoded as
XML files. Tokens are extracted and matched using Suffix array technique. The approach is based on finding
similarities in tokens known as clones.
Keywords: Code clones, Model Clones, Suffix Array.
References:
50.
Abdul.H.B. and Jarzabek.S.,2005 “Detecting Higher-level Similarity Patterns in Programs” ESEC-FSE’05,ACM,.Lisbon,Portugal.
Abdul.H .B., Puglisi.S.J., Smyth.W.F., Turpin.A. and Jarjabek.S., 2007 “Efficient Token Based Clone Detection with Flexible Tokenization”
ESEC/FSE’07,ACM ,Cavtat Croatia.
3. Antony.E.P, Alafi.M.H. and Cordy.J.R,,2013 “ An-Approach to clone detection in Behavioral Models” Queen’s
university,Kingston,Canada,AAC-WCRE.
4. Deissenboeck.F, Hummel.B,Juergens.E, Pfaehler.M .and Schaetz, B.,2010”Model Clone Detection in Practice``, IWSC`10,Cape Town,
South Africa.,pp.37-44.
5. Deissenboeck.F.,Hummel,B.,Juergens,E.,Schatz,B.,Wagner, S.,Giard,J.F. and Teuchert,S.,2008 “Clone Detection in Automotive modelBased Development” ICSE` 08,ACM, Leipzig,Germany.pp.603-612.
6. Falke, R., Koschke, R. and Frenzel, P.,2008.” Empirical Evaluation of Clone Detection Using Syntax Suffix Trees”, Empirical Software
Engineering, Vol. 13, No. 6, pp. 601-643.
7. Hummel, B.,Juergens, E. and Steidl, D., 2011” Index-Based Model Clone Detection”, Proceedings of 5th International Workshop on
Software Clones, Honolulu, USA, pp-21-27.
8. Lin.H.J. and Peng.L.F.,,2009 “Quick Similarity Measurement of Source Code based on Suffix Array”, International Conference on
Computational Intelligence and Security” ,DOI 10.1109/CIS.2009.175.
9. Liu.H, Zhiyi.M , Zhang.L. and Shao.W.,” Detecting Duplications in Sequence Diagrams Based on Suffix Trees” Software Institute, School
of Electronics Engineering and Computer SciencePeking University, Beijing , China..
10. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Comparison and Evaluation of Clone Detection Tools: An Experimental Approach.” CSI journal
of computing, Vol 1: No of 4,Pg 44-55,2012.
1.
2.
243-246
11. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Clone detection in Models : an Empirical Study.” 3rd IBM Collaborative Academia Research
Exchange(I-CARE) 2011,New Delhi, India,October 13,2011.
12. Pham.N.H, H. A.,Nguyen, T. T., Nguyen, J.M.Kofahi and Nguyen,T.N.,2009.“ Complete and Accurate Clone Detection in Graph-based
Models”, ICSE’09,Vancouver,Canada, IEEE.
13. Petresen.H,2012 “Clone Detection in Matlab Simulink Models” ,IMM-M.Sc,Berlin..
14. Purchase.H.C, Colpoys.L., McGill.M., Carrington.D. and Britton.C.,2001 “UML class diagram syntax: an empirical study of
comprehension”, Australian Symposium on Information Visualization, Sydney,vol.9.
15. Rattan.D, Bhatia.R, and Singh.M ,2013. “Software clone detection: A
systematic review”, Information and Software Technology 55
pp.1165-1199.
16. Rattan.D, Bhatia.R and Singh.M, 2012 “ Model Clone detection based on tree comparison”,IEEE ,.
17. Roy, C.K., Cordy J.R. and Koschke, R., 2009. “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative
Approach”, Science of Computer Programming , Vol.74,No. 7,pp. 470-495.
18. Roy, C.K., Cordy J.R. and Kosher, R.,2008. “An Empirical Study of Function clones in Open Source Software Systems”, Proceedings of 15
th Working conference on Reverse Engineering,pp-81-90.
19. Roy, C.K., Cordy J.R. and Koschke, R.,2007.” A Survey on Software Clone Detection Resarch”, Technical Report 2007-541, Queen’s
University at Kingston Ontario,Canada,115pp.
20. Storrle.H“ Towards Clone Detection in UML domain models”, DOI:10.1007/s10270-011-0217-9.
21. Yamashina.T, H.Uwano,K.Fushida,Y.Kamei,M.Nagura,S.Kawaguchi and H.Lida,”Shinobi: A Real Time Code Clone Detection Tool for
Software Maintenance” nara institute of science and technology.
Authors:
S B Chikalthankar, G D Belurkar, V M Nandedkar
Paper Title:
Factors Affecting on Springback in Sheet Metal Bending: A Review
Abstract:
Spring-back is a very common and critical phenomenon in sheet metal forming operations, which is
caused by the elastic redistribution of the internal stresses after the removal of deforming forces. Spring-back
compensation is absolutely essential for the accurate geometry of sheet metal components.
This paper reviews the various parameters affecting spring back such as punch angle, grain direction of sheet metal
material, die opening, ratio of die radius to sheet thickness, sheet thickness, punch radius, punch height, coining
force, pre bend condition of strip etc.
Keywords: Bending, Die opening, Grain Direction Springback
References:
1.
2.
51.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
52.
Huang, H. M., Liu, S. D., and Jiang, S. Stress and strain histories of multiple bending–unbending springback process. Trans. ASME, J. Eng.
Mater.and Technol.,2001, 123, 384–390.
Seo, D. G., Chang, S. H., and Lee, S. M. Springback characteristics of steel sheets for warm U-draw bending.Metals Mater. Int., 2003, 9,
497–501.
D’Acquisto, L. and Fratini, L. Springback effect evaluation in three-dimensional stamping processes at the varying blank holder force. J.
Mech. Eng. Sci., 2006,220, 1827–1837.
Carden, W. D., Geng, L. M., Matlock, D. K., and Wagnor, R. H. Measurement of springback.Int. J. Mech. Sci., 2002, 44, 79–101.
Ivina Suchi, Die Design Hnadbook, Edition Second
H K Yi1, D W Kim1, C J Van Tyne2, and Y H Moon1, Analytical prediction of springback based on residual differential strain during sheet
metal bending.Int. J. Mech. Sci., 2008, 117-129
Recep Kazan, Mehmet Fırat, Aysun Egrisogut Tiryaki, “Source-Prediction of spring back in wipe-bending process of sheet metal using
neural network”, Materials and Design 30 (2009) 418–423.
SutasnThipprakmas, Finite element analysis of punch height effect on V-bending angle, Materials and Design 31 (2010) 1593–1598
You-Min Huang and Daw-KweiLeu, effects of process variables on v-die bendingprocess of steel sheet, Int. J. Mech. Sci. Vol. 40, No. 7,
631 - 650, 1998
W.M.Chan*, H.I. Chew, H.P.Lee, B.T.Cheok Finite Element analysis of springback of V bending sheet metal forming processes, Journal of
Materials Processing Technology 148 (2004) 15-24
Sutasn Thipprakmas, Wiriyakorn Phanitwong, Process parameter design of springback and spring-go in V bending process using Taguchi
Technique, Material and Design 32 (2011) 4430-4436.
Vijay Gautam, Parveen Kumar, Aadityeshwar Singh Deo, Effect of Punch Profile Radius and Localised Compression on Springback in VBending of High Strength Steel and its FEA Simulation, International Journal Of Mechanical EngineeringAnd Technology (Ijmet) , Volume
3, Issue 3, (2012), 517-530
Luc Papelux, Jean-Philippe Ponthot, “Finite element simulation of spring back in sheet metal forming”, Material Processing Technology,
125-126 (2002) 785-791.
Authors:
Tahseen Flaih Hasan
Paper Title:
FPGA Design Flow for SDR Transceiver using System Generator
Abstract:
Software defined radio (SDR) is highly configurable hardware platform that provides technology for
realizing the rapidly expanding third (even future) generation digital wireless communication infrastructure. While
among the silicon alternatives available for implementing the various functions of SDR, field programmable gate
array (FPGA) is an attractive option in terms of performance, power consumption, and flexibility. This paper
examines 16-QAM (Quadrature Amplitude Modulation) SDR transmitter and receiver with an appropriate timing
recovery system using FPGA. We provide a tutorial style overview of techniques and schemes for system
(abstraction) level design of the 16-QAM SDR transmitter and receiver using Xilinx System Generator, ModelSim
and Synplify Pro software, and FPGA implementation (realization) using Xilinx ISE software. Two design
alternatives are presented to highlight the rich design space accessible using the FPGA configurable logic. At last,
this new design technique would help in designing and realizing SDR to 3G wireless communication system and
accelerate the transition to 4G wireless communication system.
Keywords: FPGA, 16QAM, SDR, System Generator
References:
1.
2.
A. Pal, “FPGA-based (Xilinx) Embedded System Design,” Workshop on Microcontroller and FPGA-based Embedded System Design, July
2007.
The MathWorks, Inc.. DSP – Digital Signal Processing & Communications. , 2009, [Online]. Available:
247-251
252-258
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
53.
http://www.mathworks.com/applications/dsp_comm
Xilinx, Inc., DSP Design Flows in FPGA Tutorial Slides, 2003.
J. G. Prokis, Digital Communications, 4th ed., New York: McGraw-Hill,2001
D. Haessig, J. Hwang, S. Gallagher, and M. Uhm, “Case-Study of a Xilinx System Generator Design Flow for Rapid Development of SDR
Waveforms,” in Proc. SDR 05 Forum Tech. Conf. and Product Exposition, Orange County, California, 2005.
C. Dick, F. Harris, and M. Rice, “Synchronization in Software Radios Carrier and Timing Recovery Using FPGAs,” , pp. 195- 204. IEEE,
2000.
System Generator for DSP User Guide, Release 9.2.01, Xilinx, Inc., 2007.
Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007.
P240 Analog Module User Guide, Rev 1.0, Avnet, Inc., May 2006. [Online]. Available:
http://www.files.em.avnet.com/files/177/p240_analog-ug.pdf
Virtex-4 MB Development Board User’s Guide, Ver. 3.0, AvnetMemec, Dec. 2005. [Online]. Available:
http://www.files.em.avnet.com/files/177/v4mb_user_guide_3_0.pdf
“ADS5500: 14-bit, 125 Msps, Analog-to-Digital Converter Data Sheet,” Texas Instrument, Inc., Feb. 2007. [Online]. Available:
http://focus.ti.com/lit/ds/symlink/ads5500.pdf
“DAC5687: 16-bit, 500 Msps, 2x-8x, Interpolation Dual-Channel Digital-to-Analog Converter (DAC) Data Sheet,” Texas Instrument, Inc.,
June 2005. [Online]. Available: http://focus.ti.com/lit/ds/symlink/dac5687.pdf
Synplicity FPGA Synthesis Reference Manual, Synplicity, Inc., 2007.
Authors:
S.S. Lavhate, Saurabh R. Keskar, Vishal P.Unhale, Avinash Sangale
Paper Title:
Advanced Paper Cutting Machine using ARM7
Abstract: The proposed system will be an intelligent automated length measurement device composed of the rotary
encoder, proximity switches, motor and embedded design consisting microcontroller with digital circuitry etc. this
device used as control panel of paper cutting machine, which is used to cut the various kind of paper products,
plastic, thin film, leather, slice of nonferrous metal etc. This system can be applicable in paper cutting industry and
proves how it can be a low cost solution in the production practice.
Keywords: Cutting, Rotary encoder, Safety, touch screen.
259-261
References:
1.
2.
3.
Gheorghe Livinţ, VasilHorga, Marcel Răţoi and Mihai Albu Gheorghe Asachi Technical University of Iaşi Romania.
Abdel Azzeh, Richard duke “CAN control system for Electric Vehicle”, ENZCon 2005, the 12th Electronics New Zeland Conference.
Manukau City, New Zealand, November 2005.
Kumar, M. A.Verma, and A. Srividya, Response-Time “Modeling of Controller Area Network (CAN). Distributed Computing and
Networking,
Authors:
Amita Kumari, Rajesh Mehra
Paper Title:
Design of Hybrid Method PSO & SVM for Detection of Brain Neoplasm
Abstract: In the field of medical field ,Magnetic resonance imaging (MRI) provides detailed anatomic information
of any part of the body .This methodology consist of 4 steps: image processing ,image enhancement ,feature
extraction and image classification. Image preprocessing is done with the help different gradient operator. Image
enhancement step uses the noise removal and histogram equalization. Wavelet based texture feature are extracted
from normal and tumor regions. At last optimization is done with the help of PSO and SVM classifier
54.
Keywords: MRI, GA, HAAR wavelet, ANN, PSO
References:
1.
2.
3.
4.
5.
55.
262-266
Kharrat , A; Gasmi K.; Ben Messaoud ,M; Benamrane N. and Abid M. “ A hybrid approach for automatic classification of brain MRI using
genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010.
E.F Badran,.; E.G Mahmoud, N Hamdy .“An algorithm for brain tumor in MRI images”, International Conference on Communication
Computer Engineering and Systems(ICCES), Networking & Broadcasting, pp 368-373, June, 2010.
Abdullah, N.; Lee Wee Chuen; Ngah, U.K.; Ahmad, K.A. “Improvement of MRI brain classification using Principles Component Analysis”,
IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011.
Lejian Huang, Elizabeth A. Thompson, Vincent Schmithorst, Scott K. Holland, and Thomas M. Talavage. “partially adaptive STAP
algorithm approaches to functional MRI” ,IEEE transaction on biomedical engineering ,vol56, no2,February 2009
M Kociolek , A.Materka,M.Strzelecki P.Szczypinski “Discrete wavelet transform –derived features for digital image texture analysis ,proc.
of international confrernce on signal and Electronic System, 18-21 ,sep 2001,Lodz,Poland ,pp.163-168
Authors:
Sunil Kumar Yadav, Rajesh Mehra
Paper Title:
Analysis of Different IIR Filter based on Implementation Cost Performance
Abstract: In this paper we examine the optimal implementation cost performance of various IIR Filter, which are
relevant for real time application therefore these filter can realize any transfer function .these IIR filter is designed
and analyzed by FDATOOL and the implementation cost has been analyzed on the basis of filter order, multiplier,
adder, and input samples. The Elliptical IIR Filter is examined and comparison from the Butterworth and Chebyshev
is done. The Elliptical Filter is minimize the order of filter op to 96.59% to Butterworth Filter, and 85.7% to
Chebyshev.
Keywords: Filter, IIR, MATLAB, FDATOOL
References:
1.
2.
3.
Soo-Chang Pei, Huei-Shan Lin “Tunable FIR and IIR Fractional-Delay Filter Design and Structure Based on Complex Cepstrum”IEEE
Transactions on circuits and systems—i: regular papers, VOL. 56, pages:2195-2206, OCTOBER 2009.
Bojan Jovanovi , and Milun Jevti “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium
pages:61-66, February 2010
Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D
IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer
267-270
4.
5.
6.
7.
8.
9.
Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter
using FPGA Devices” International Technology Research Letters, pages:25-31, 2012
Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference
on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013
Fábio Fabian Daitx, Vagner S. Rosa, Eduardo Costa, Paulo Flores, Sérgio Bampi, “VHDL Generation of Optimized FIR Filters”, 2008
International Conference on Signals, Circuits and Systems
Ke, Zhang, et al. "The application of the IIR filters based on FPGA in the DTV field." On Computer Science-Technology and Applications,.
International Forum on. Vol. 3. IEEE, pages: 406-409 2009.
Vagner S. Rosa, Fábio F. Daitx, Eduardo Costa, Sergio Bampi, “Design Flow for the Generation of Optimized FIR Filters”, ICECS 2009.
Victor DeBrunner, Linda S. DeBrunner, and Anand Mohan “Using 2nd-0rder information to reduce average coefficient length in IIR
Filters” IEEE Conference Publications pages 189-192, 2002
Authors:
M.Natheera Banu
Paper Title:
FPGA Based Hardware Implementation of Encryption Algorithm
Abstract: Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware
implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of
advanced encryption standard (AES) with 128-bit key as a constant which is used for encrypting the text file and
image for secure transmission. Timing report for the files are taken and conclude that text file of 128 bit size is taking
less time to encrypt and decrypt compare to the image file. Synthesizing and implementation (Translate, Map and
Place and Route) of the VERILOG code is carried out on Xilinx - Project Navigator ISE 12.3 software.
Keywords: AES, decryption, encryption, image and text.
References:
1.
2.
56.
3.
4.
5.
6.
7.
8.
9.
10.
11.
13.
Xinmiao Zhang and Keshab K. Parhi “HIGH-SPEED VLSI ARCHITECTURES FOR THE AES ALGORITHM” IEEE TRANSACTIONS
ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 9, SEPTEMBER 2004.
Jia Zhao, Xiaoyang Zeng*, Jun Han, Jun Chen State-Key Lab ofASIC and System,“VERY LOW-COST VLSI IMPLEMENTATION OF
AES ALGORITHM” IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS,2006
Bin Liu, and Bevan M. Baas “PARALLEL AES ENCRYPTION ENGINES FOR MANY- CORE PROCESSOR ARRAYS IEEE
TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 3, MARCH 2013
Stefan Mangard Student Member, IEEE, Manfred Aigner, and Sandra Dominikus “A HIGHLY REGULAR AND SCALABLE AES
HARDWARE ARCHITECTURE” IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 4, APRIL 2003
P.Karthigaikumar Soumiya Rasheed “SIMULATION OF IMAGE ENCRYPTION USING AES ALGORITHM” IJCA Special Issue on
Computational Science - New Dimensions & Perspectives” NCCSE, 2011.
Manoj.B, Manula N Harihar “IMAGE ENCRYPTION AND DECRYPTION USING AES” International Journal of Engineering and
Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012.
Jawad Ahmad and Fawad Ahmed “EFFICIENCY ANALYSIS AND SECURE VALUATION OF IMAGE ENCRYPTION SCHEMES”
International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04.
Mr. Antosh M. Dyade, Prof. Raafiya Gulmeher “MODIFIED SHIFTROW TRANSFORMATION OF AES FOR IMAGE ENCRYPTION”
International Journal of Communications And Engineering Vol. 4 Issue 3, Sept. 2013
Sourabh Singh, Anurag Jain “AN ENHANCED TEXT TO IMAGE ENCRYPTION TECHNIQUE USING RGB SUBSTITUTION AND
AES” International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013
Amandeep Kaur, Puneet Bhardwaj, Naveen Kumar” FPGA IMPLEMENTATION OF EFFICIENT HARDWARE FOR THE ADVANCED
ENCRYPTION STANDARD” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075,
Volume-2, Issue-3, February 2013
Chityala Prathyusha, P. Sharmila Rani “IMPLEMENTATION OF FAST PIPELINED AES ALGORITHM ON XILINX FPGA”
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Mg Suresh, Dr.Nataraj.K.R” AREA OPTIMIZED AND PIPELINED FPGA IMPLEMENTATION OF AES ENCRYPTION AND
DECRYPTION” International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue.
Authors:
Sabah SHehd Abdulabas
Paper Title:
Efficient Timing Recovery Technique for Software Defined Radio Receiver using FPGA
271-277
Abstract: This paper presents the timing recovery in software defined radio receiver as a widely used technique
nowadays. Software defined radios (SDR) is the more configurable hardware platforms that provide the technology
for realizing the fast growing third and new generation digital wireless communication structure. The more complex
duty performed in a high data rate wireless system is the synchronization. The timing synchronization in SDRs using
FPGA based signal processors is introduced. The 16-QAM loop for performing coherent demodulation were
described and reported on the suggestion of FPGA automation. A matched filter control system is used to provide
and addressed the symbol timing recovery technique. To explain the operations of the timing recovery loop and
reflection, much approach is adopted and outlined for FPGA performance.
57.
Keywords: Timing Recovery, SDR, FPGA
References:
1.
2.
3.
4.
5.
6.
7.
8.
Chris Dick, fred harris and Michael Rice, “Synchronization in Software Radios - Carrier and Timing Recovery Using FPGAs”, IEEE, 2000,
PP.195-204
H. Meyr, M. Moeneclaey and S. A. Fechtal, Digital Communication Receivers, John Wiley & Sons Inc., New York, 1998.
B. Sklar, Digital Communications Fundamentals and Applications, Prentice Hall, Englewood Cliffs, New Jersey, 1988.
D. R. Brown III and H. Poor, “Time-slotted round-trip carrier synchronization for distributed beamforming,” IEEE Transactions on Signal
Processing, 2008
D. R. Brown III, G. B. Prince, and J. A. McNeill, “A method for carrier frequency and phase synchronization of two autonomous cooperative
transmitters,” IEEE 6th Workshop on Signal Processing Advances in Wireless Communication, 2005
Chan, Tsui, Yeung, and Yuk,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed
Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007
Durke (2009), “Field Programmable Gate Array Based SDR Design” phd. Thesis, Naval postgraduate school, Department of Electrical and
Computer Engineering,California:http://edocs.nps.edu/npspubs/scholarly/theses/2009
Ezra, Joseph and kahn, “Carrier Synchronization for 3-bita and 4-bits per symbol optical transmission”, IEEE, Journal of light wave
278-286
technology, Vol.23, pp.4110-4124, 2005
Jeffry H. Reed, “Software Radio a modern approach to radio engineering”, Prentice Hall PTR, A division of person education Inc, ISBN 013-081158-0, pp.33-123, 2002
10. Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal,
online available: http://www.anacom.pt/render.jsp?contentId=761239, 2008
11. Tony, “RF and Digital Signal Processing for Software-Defined Radio”, Elsevier, ISBN 978-0-7506-8210-7, UK, pp. 319, 2009
12. Proakis, and Salehi,. “Digital Communications”, 5th ed., New York, NY: McGraw-Hill, Ch. 3, pp. 95-148, 2008
9.
Authors:
Varun Singh Nagar, Subhash Chand Gupta
Paper Title:
Voice and Location Based Appliance Automation System Using Mobile Cloud
Abstract:
We are in the information technology age. Mobile technology is getting a fast pace in this older
population has more ratio than other age group. Smart phones are a great enhancing the use of technology and its
advancement. In this paper we are going to present the modular based home automation system environment and the
technologies required to achieve the goal of automation. This concept uses voice commands to act as commands to
control the appliances in context to home office or car. Cloud platform is used for processing of commands on the air
and dispatched from cloud server to controlling modules at home, office or car respectively. As cloud computing is
the future of information sharing and shared resource utilization with optimization. This also brief the challenges
involved in implementing voice based appliance automation using cloud platform. As it is evident that home
automation is in its immature state so other technological challenges should be considered which can affect the
system.
58.
Keywords: Android, Cloud, Home automation, Speech recognition, Voice based.
287-288
References:
Vu Le , Sumit Gulwani , Zhendong Su “SmartSynth: Synthesizing Smartphone Automation Scripts from Natural Language 2013 ACM“
Mitali Patil , Aswini Bedare, Varsha Pacharne “ The Design and Implementation of Voice Controlled Wireless Intelligent Home Automation
System Based on ZigBee.“ 978-1-4244-4738-1/09/ 2013 IJARCSSE.
3. Syed Anwaarullah , S.V.Altaf “RTOS based Home Automation System using Android “ Jan-2013 IJATCSE.
4. Humaid Al Shu’eili “ Wireless Home Automation based on Voice Recognition”
5. Andre Coucopulus “Voice Processing for Home Automation Systems” Network Systems Design Line January 2007
6. R.Gadalla “Speech Recognition System for Massey SmartHouse”
7. Jianliang Meng , Jhunwei Zhang “Overview of the Speech Recognition Technology” 978-0-7695-4789-3/12 $26.00 © 2012 IEEE.
8. Rawan T.Khalil , AlaF.Khalifeh , Khalid A Dhrabakh “Mobile-Free Driving with Android Phones: System Design and Performance
Evaluation” 2012 – 9th International Multi-Conference on Systems.
9. Fengyu Zhou, Guohui Tian, Yang Yang, Hairong Xiao and Jingshuai Chen “Research and Implementation of Voice Interaction System
Based on PC in Intelligent Space” Proceedings of the 2010 IEEE International Conference on Automation and Logistics August 16-20 2010,
Hong Kong and Macau
10. M. Saadeq Rafieee , Ali Akbar Khazaei “A Novel Model Characteristics for Noise-Robust Automatic Speech Recognition Based onHMM”
978-1-4244-5849-3/10/$26.00 ©2010 IEEE.
1.
2.
Authors:
N.Sasirekha, M.Hemalatha
Paper Title:
Quantum Cryptography using Quantum Key Distribution and its Applications
Abstract: Secure transmission of message between the sender and receiver is carried out through a tool called as
cryptography. Traditional cryptographical methods use either public key which is known to everyone or on the
private key. In either case the eavesdroppers are able to detect the key and hence find the message transmitted
without the knowledge of the sender and receiver. Quantum cryptography is a special form of cryptography which
uses the Quantum mechanics to ensure unconditional security towards the transmitted message. Quantum
cryptography uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence
enables the communicating parties to detect the presence of potential eavesdropper. This paper also analyses few
application areas of quantum cryptography and its limitations.
Keywords: Classical Cryptography, Photon polarization, Qubit, Quantum Cryptography, Quantum entanglement,
Quantum Key Distribution, Sifting key.
References:
59.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Wiesner, Stephen., 1983. "Conjugate coding." ACM Sigact News 15.1: 78-88.
Henle, F., 2002. BB84 Demo. http://www.cs.dartmouth.edu/~henle/Quantum/cgi-bin/Q2.cgi
Ford, James., 1996. "Quantum cryptography tutorial." http://www.cs.dartmouth.edu/~jford/crypto.html.
Harrison,
David
M.,
2001.
"Quantum
Teleportation,
Information
and
Cryptography."
http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport/ QuantTeleport.html.
Knight,
Will.,
2004.
"Entangled
photons
secure
money
transfer."
Newscientist.com.
http://www.newscientist.com/news/news.jsp?id=ns99994914.
Quantum cryptography. Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Quantum_cryptography. Modified 17 September
2004.
The BB84 Quantum Coding Scheme, June 2001. http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84coding.html
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., "Quantum Cryptography", Reviews of Modern Physics, vol. 74, January 2002, pp. 146 195.http://www.gap-optique.unige.ch/Publications/Pdf/QC.pdf
Martinez-Mateo, Jesus, David Elkouss, and Vicente Martin. "Key reconciliation for high performance quantum key distribution." Scientific
reports 3 (2013).
C. H. Bennett and G. Brassard. 1984.Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proc. IEEE Int. Conf. on
Comp.,Sys. and Signal Process., pages 175–179, Bangalore.
A. K. Ekert. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67(6):661–663, 1991.
Hughes, Richard J., et al. 1995. "Quantum cryptography." Contemporary Physics 36.3: 149-163.
Hoque, S., Fairhurst, M., Howells, G., & Deravi, F. (2005, March 17). Feasibility of generating biometric encryption keys. Electronics
Letters, 41(6), 1-2.
Webb, W. (2006, July 20). Hack-proof design. (Cover story). EDN, 51(15), 46-54.
Lovoshynovskiy, S., Deguillaume, F., Koval, O., & Pun, T. (2005, January). Information-theoretic data-hiding:: recent achievements and
289-294
openproblems. International Journal of Image & Graphics, 5(1), 5-35.
16. Floyd, D. (2006, Fall2006). Mobile application security system (MASS). Bell Labs Technical Journal, 11(3), 191-198.
17. Hughes, D. (2007, May). Cyberspace Security via Quantum Encryption. Military Technology,31(5), 84-87.
18. Sasirekha, N., And M. Hemalatha. "A Hybrid Indexed Table And Quasigroup Encryption Approach For Code Security Against Various
Software Threats." Journal of Theoretical & Applied Information Technology 60.2 (2014).
19. Sasirekha, N., and M. Hemalatha. "Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured
Software." International Review on Computers & Software 8.8 (2013).
20. Sasirekha, N., and M. Hemalatha. “A Quasigroup Encryption Based Cryptographic Scheme for Software Protection.” International Journal
of Advances in Engineering and Emerging Technology 3.1(2013).
Authors:
Anamika Mishra, Anju Jaiswal, Ankita Jaiswal, A.K.Niketa
Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power
Paper Title:
VLSI Application
Abstract: In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic
logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low
power circuit design. energy. This paper proposes an Adder circuit based on energy efficient two-phase clocked
adiabatic logic. A simulative investigation on the proposed 1-bit full adder has been implemented with the proposed
technique and hence compared with standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase
Adiabatic Static Clocked Logic (2PASCL) respectively. Comparison has shown a significant power saving to the
extent of 70% in case of proposed technique as compared to CMOS logic in 10 to 200MHz transition frequency
range. Comparative results has also been shown by a histogram which represents the least power dissipation of
proposed technique. In this paper all circuits are analyzed in terms of power using 0.35um technology and simulated
using Pspice .
Keywords: Adiabatic logic, energy recovery ,power supply, low power ,Full adder, Positive feedback adiabatic
logic, 2PASCL
References:
1.
60.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
A.K.Maurya, G. Kumar, "Energy Efficient Adiabatic Logic for low power VLSI APPLICATION," IEEE International Conference on
Communication Systems & Network Technologies, pp 460-463,2011.
H.M.Meimand and A.A.Kusha and M.Nourani, "Adiabatic Carry look-ahead Adder with Efficient Power Clock Generator," IEEE Proc.Circuit Devices Systems, Vol. 148, No. 5, pp. 229-234,October.2001
S.Kim,M.C.Papefthymiou, "True Single-Phase Adiabatic Circuitry," IEEE Transactions on Very Large Scale Integration (VLSI) Systems,
Vol. 9, No. 1, pp. 52-63, February 2001.
W.C.Athas,L.J.Svensson,J.G.Koller,et al.,"Low power digital systems based on adiabatic switching principles,"IEEE Trans.On VLSI
systems,2(4),Dec.1994,pp:398-407.
P.Saxena ,Prof. D.Chandra and S.Kumar.V, "An Adiabatic Approach for Low Powerful Adder Design," International Journal On Computer
Science & Engineering, Vol.3, No. 9,pp.3207-3221,2011
A.Sajid, A.Nafees & S. Rahman, "Design and Implementation of Low Power 8-bit Carry-lookAhead Adder Using Static CMOS Logic and
Adiabatic Logic," International Journal Information Technology and Computer Science, Vol.11, pp. 78-92,2013.
N.Anuar, Y.Takahashi, and T.Sekine, "Two Phase Clocked Adiabatic Static CMOS Logic and its Logic Family," Journal of Semiconductor
Technology and Science, Vol. 10,No. 1, pp. 1-10, 2010.
M.S.Dhaka, Gayatri and P.Singh Dhaka, "Adiabatic Logic Gate for Low Power Application," International Journal of Engineering Research
and Applications, Vol. 2, No. 3, pp. 2474-2478, 2012.
M.Sharma, "Design & Analysis of CMOS Cells using Adiabatic Logic," International Journal of Networks & Systems, Vol. 1, No. 2, pp. 5257, 2012.
S.K.Kelly and J.L.Wyatt, "A Power Efficient Neural Tissue Stimulator with Energy Recovery," IEEE Transactions on Biomedical Circuits
and Systems, Vol.5, No. 1, pp. 20-29, Feb. 2011.
G.Singh ,R.Kumar and M.K.Sharma, "Comparative Analysis of Conventional CMOS and ENERGY Efficient Adiabatic Logic Circuits,"
International Journal of Emerging Technology and Advanced Engineering,Vol. 3,No.9,pp 260-264,September 2013.
D.Maksimovic´, V.G.Oklobdžija, B.Nikolic´, and K. Wayne Current, "Clocked CMOS Adiabatic Logic with Integrated Single-Phase PowerClocked Supply," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.8, No. 4, pp. 460-463, August 2000
P.Teichmann(2012),"Fundamental of Adiabatic Logic," Chapter 2,pp 5-22.
S.Goel,A.Kumar and M.A.Bayoumi,(2006),"Design of robust,energy efficient full adders for deep-submicro meter design using hybrib
CMOS logic styles," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No. 12, pp.1309-1321.
Authors:
A.Vaishnavi, B.Chanakya Raju, G.Prathiksha, L.Harshitha Reddy, C.Santhosh Kumar
Paper Title:
Comparison of Two Speaker Recognition Systems
295-299
Abstract:
This paper presents a comparison between two speaker recognition systems. One system uses 30
Shannon entropy values extracted from a four level wavelet packet decomposition method in addition to the first
three formant frequencies as features and a cascaded feed forward back propagation neural network is used as
classifier. The second system uses Mel frequency cepstral coefficients (MFCC) as features and a support vector
machine (SVM) as classifier. Results suggest that wavelet based system has better performance than the classic
MFCCs with an efficiency of 89.56%.
61.
Keywords: Shannon entropy, Formant frequencies, cascaded neural network, MFCC, SVM.
References:
1.
2.
3.
4.
5.
T. Kinnunen and H. Li, “An overview of text-independent speaker recognition from features to super vectors,” Speech communication.vol.
52, pp. 12-40. 2010.
K. Daqrouq, “Wavelet entropy and neural network for text-independent speaker identification,” Engineering Applications of Artificial
Intelligence., vol. 24, pp. 796-802. 2011.
K. Daqrouq, T. Abu Hilal, M. Sherif, S. El-Hajjar and A. Al-Quawasmi, “Speaker identification system using wavelet transform and neural
network,” Advances in Computational Tools for Engineering Applications (ACTEA)., ZoukMosbeh, Lebanon, pp. 559-564. Jul. 2009.
R. Sarikaya, J.H.L. Hansen and L. Bryan, “Wavelet transform features with application to speaker identification,” in Proc. of IEEE Nordic
Signal Processing Symp., Visgo, pp. 81-84. 1998.
M. Siafarikas, T. Ganchev and N. Fakotakis, “Objective wavelet packet features for speaker verification,” in Proc. Of the InterSpeech-2004ICSLP., Jeju, Korea, pp. 2365-2368. Oct. 2004.
300-303
6.
7.
Kuruvachan K. George, Arunraj K and Sreekumar K.T, “Towards Improving the Performance of Text/Language Independent Speaker
Recognition Systems.”
D. A. Reynolds, Thomas F. Quatieri and Robert B. Dunn,“Speaker verification using Adaptive Gaussian Mixture Models,” in Digital Signal
Processing Vol. 10.Nos. 1-3,January 2000.
Authors:
Misba Gul, Alsana Bashir, Javed A Naqash
Paper Title:
Study of Modulus of Elasticity of Steel Fiber Reinforced Concrete
Abstract: Plain, unreinforced concrete is a brittle material, with a low tensile strength, limited ductility and little
resistance to cracking. In order to improve the inherent tensile strength of concrete there is a need of multidirectional
and closely spaced reinforcement, which can be provided in the form of randomly distributed fibers. Steel fiber is one
of the most commonly used fibers. Short, discrete steel fibers provide discontinuous three-dimensional reinforcement
that picks up load and transfer stresses at micro-crack level. This reinforcement provides tensile capacity and crack
control to the concrete section prior to the establishment of visible macro cracks, thereby promoting ductility or
toughness.
The modulus of elasticity of concrete is a very important parameter reflecting the ability of concrete to deform
elastically. In addition, in order to make full use of the compressive strength potential, the structures using high
strength concrete tend to be slimmer and require a higher elastic modulus so as to maintain its stiffness. Therefore,
knowledge of the modulus of elasticity of high strength concrete is very important in avoiding excessive
deformation, providing satisfactory serviceability, and avoiding the most cost-effective designs.
The present experimental study considers the effect of steel fibers on the modulus of elasticity of concrete. Hook end
steel fibers with aspect ratio of 50 and 71 at volume fraction of 0.5%, 1.0% and 1.5% were used. Study on effect of
volume fraction and aspect ratio of fibers on the modulus of elasticity of concrete was also deemed as an important
part of present experimental investigation. The results obtained show that the addition of steel fiber improves the
modulus of elasticity of concrete. It was also analyzed that by increasing the fiber volume fraction from 0.5% to
1.5% and aspect ratio of fibers from 50 to 71 there was a healthy effect on modulus of elasticity of Steel Fiber
Reinforced Concrete.
62.
Keywords: Aspect ratio, Compressometer, Modulus of Elasticity, Steel fiber reinforced concrete, volume fraction.
304-309
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
Chen, S, 2004. “Strength of Steel Fibre Reinforced Concrete Ground Slabs”. Proceedings of the Institute of Civil Engineers, Structures and
Buildings (157), Issue SB2, pp. 157-163
Banthia,N,Chokri,K, and Trottier,JF,1995. Impact tests on Cement-Based Fiber Reinforced Composites. ACI Publications, Detroit, USA,
SP, 155-9, pp.171-188
Khaloo, A R and Kim, N, 1997. “Influence of Concrete and Fiber Characteristics on Behaviour of Steel Fiber Reinforced Concrete under
Direct Shear”. ACI Materials Journal, 94, No. 4, pp. 592-601.
Johnston, CD, and Zemp, WR, 1991. “Flexural Fatigue performance of Steel Fibre reinforced concrete- Influence of Fibre Content, Aspect
Ratio, and Type”. ACI Material Journal, 88, No.4, pp. 374-383.
Elsaigh,WA and Kearsley,EP,2002.”Effect of Steel Fibre Content on Properties of Concrete”. Journal of Concrete/Beton, South Africa, No
102, pp. 8-12.
Johnston Gopalaratnam, V.S. and S. Shah, 1987. “Failure mechanism and Fracture of fibre reinforced concrete, Fibre reinforced concrete –
Properties and Application”, American Concrete Institute, Detroit, pp: 1-25
A.M Shende et al.. “Comparative Study on Steel Fiber Reinforced cum Control Concrete” International Journal Of Advanced Engineering
Sciences And Technologies Vol. No. 6, Issue No. 1, 116 – 120
Mohammed Alias Yusof et al., “Mechanical Properties of Hybrid Steel Fibre Reinforced Concrete with Different Aspect Ratio.” Australian
Journal of Basic and Applied Sciences, 5(7): 159-166, 2011
Er Prashant Y.Pawade et al. “Effect of Steel Fibres on Modulus of Elasticity of Concrete” (IJAEST) International Journal Of Advanced
Engineering Sciences And Technologies Vol No. 7, Issue No. 2, 169 – 177
Osman Gencel et al.. “ Workability and Mechanical Performance of Steel Fiber-Reinforced Self-Compacting Concrete with Fly Ash”
Composite Interfaces 18 (2011) 169–184
Saravana Raja Mohan. K, Parthiban. K “Strength and behaviour of Fly Ash based Steel Fibre Reinforced Concrete Composite.
J. Mater. “Mechanical Properties of Steel Fiber Reinforced Concrete”, Journal of Materials in Civil Engineering ,Volume 19 , Issue 5, 2007
IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian
Standards, New Delhi
BS 1881: Part 121:1983,” Testing concrete Method for determination of static modulus of elasticity in compression”.
ASTM C 469-94” Standard Test Method for Static Modulus of Elasticity and Poisson’s Ratio of Concrete in Compression”
Authors:
K.V.Rama Krishna Rao, K.Durga Rani, S.S.S.V.Gopala Raju
Paper Title:
Feasibility Study on Motor Cycle Lanes in Visakhapatnam City
Abstract:
The present study addresses a comprehensive analysis and feasibility of motor cycle lanes in two
important city roads, “CMR central to Thatichetlapalem via., Gurudwara junction”, and “Jagadamba junction to old
post office via., Poorna market in Greater Visakhapatnam Municipal Corporation[GVMC]” which are carrying 52%
and 55% of motor cycles in total traffic. The paper discusses the basic understanding of travel time benefits and
travel comfort by separating two wheeler motor cycle traffic from mixed traffic.
63.
Keywords: Exclusive motor cycle lanes, Inclusive motor cycle lanes, Motor cycle traffic, Mixed traffic.
References:
1.
2.
3.
Radin Umar R.S., Barton, E. (1997) Preliminary Cost-Benefit Analysis of the Exclusive Motorcycle Lanes in Malaysia, REAAA Journal
No. 9,1997pp 2-6
Radin Umar R.S., Murray, G. Mackay and Brian, L. Hills (1995) Preliminary Analysis on Impact of Motorcycle Lanes Along Federal
Highway F02, Shah Alam, Malaysia, Journal of IATSSResearch Vol. 19, No. 2, pp 93-98
Gopala Raju SSSV, Duraga Rani K (2012) Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal
of innovations & development, Vol.1, No.6, pp.469-471
310-312
4.
5.
6.
7.
Gopala Raju SSSV (2011) Vehicular growth and its management: Visakhapatnam city in India– A case study, Indian Journal of Science and
Technology, Vol.4, No.8,pp. 903-906.
Kumar P.S, Gopala Raju SSSV, Murali M, Prasad CSRK (2007), Assessment of Noise level due to vehicular traffic at Warangal city,
International journal of environment and pollution, Vol.30, No.1, pp137-153.
Hussain, H., Radin Umar, R. S., Ahmad Farhan, M. S., & Dadang, M. M. (2005). Key components of a motorcycle-traffic system - A study
along the motorcycle path in Malaysia. IATSS Research, Vol. 29(1),pp.50-56.
Tung, S. H., Wong, S. V., Law, T. H., and Radin Umar, R. S. (2008). Crashes with roadside objects along motorcycle lanes in Malaysia.
International Journal of Crashworthiness, Vol. 13(2), pp.205-210.
Authors:
A.Praveena, M.Jayashree
Paper Title:
Mitigation of Voltage SAG using Dynamic Voltage Restorer
Abstract: Power quality problem is an occurrence manifested as an nonstandard voltage ,current or frequency that
results in failure of end use equipments .one of the major problem in power quality is voltage sag .To improve the
power quality, custom power devices are used. The custom power device used here is DVR(Dynamic Voltage
Restorer) is role to compensate load voltage during the different fault conditions like voltage sag ,single line to
ground ,double line to ground faults .In this work ,PI controller and discrete PWM pulse generator are used for the
control purpose
Keywords: component; PWM(pulse width modulation) technic,DVR(dynamic voltage restorer),PI(proportional
integral) controller
64.
References:
1.
2.
3.
4.
5.
6.
7.
D. Daniel Sabin, Senior member IEEE ,and Ambra Sannino, IEEE “A summary of the draft IEEE P1409 Custom Power Application
Guide” Transmission and Distribution Conference and Exposition, IEEE PES, vol.3,pp.931-936,2003.
Yash Pal, A. Swarup Senior Member, IEEE,and Bhim Singh, Senior Member IEEE”A Review of Compensating Type Custom Power
Devices for Power Quality Improvement” IEEE Power India Conference,2008.
Michael D. Stump, Gerald J. Keane “The Role, of Custom Power Products in Enhancing Power Quality at Industrial Facilities”, Energy
Management and Power Delivery.vol. 2,507-517,International Conference 1998.
Bingsen Wang, Giri Venkataramanan and Mahes Illindala,” Operation and Control of a Dynamic Voltage Restorer Using Transformer
Coupled H-Bridge Converters”, IEEE Transactions on power electronics,vol.21,pp.1053-1061,july 2006.
Fawzi AL Joeder” Modelling and Simulation of Different System Topologies for Dynamic Voltage Restorer” Electric Power and Energy
Conversion Systems,EPECS’09.InternationalConferences,IEEE,pp.1-6,2009.
D.N.Katole Research Scholor :Department of Electrical Engg. G. H.Raisoni College of Engineering Nagpur, Maharashtra India.”Analysis
and Mitigation of Balanced Voltage Sag with The Help of Energy Storage System” ICETET pp.317-321,2010.
H.P.Tiwari and Sunil Kumar Gupta “Dynamic Voltage Restorer against Voltage Sag” International Journal Of Innovation, Management and
Technology.vol. 1,no. 3,pp.232-237,2010.
Authors:
Amita Kumari, Rajesh Mehra
Paper Title:
Hybridized Classification of Brain MRI using PSO & SVM
313-318
Abstract: Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body. In
this method a hybrid approach for classification of brain tissue in MRI based on Particle Swarm Optimization (PSO)
and Support Vector Machine (SVM) wavelet based texture feature are extracted from normal and tumor region by
using HAAR wavelet. These features are given as input to the SVM classifier which classified them into normal &
abnormal brain neoplasm. The algorithm incorporates steps for pre-processing, image segmentation and image
classification using SVM classifier.
Keywords: MRI, Classification PSO, SVM, HAAR wavelet
References:
1.
65.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
66.
A .Kharrat, K Gasmi , M Ben Messaoud , N Benamrane and M Abid . “ A hybrid approach for automatic classif ication of brain MRI using
genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010.
E F Badran, E G Mahmoud, N Hamdy “An algorithm for brain tumor in MRI images”, International Conference on Communication
Computer Engineering and Systems (ICCES), Networking & Broadcasting, pp 368-373, June, 2010.
N Abdullah, Lee Wee Chuen; U K Ngah, KA Ahmad, “Improvement of MRI brain classification using Principles Component Analysis”,
IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011.
M Hasanzadeh ,S Kasaei.”Multispectral brain MRI segmentation using genetic fuzzy systems” international conference on communication
,networking and broadcasting(ISSPA),pp 1-4,June,2001
V.vapnik “the nature of statistical learning theory, springer-verlag, newyork, 1995
S N Deepa, B A Devi .”Artificial neural networks design for classification of brain tumor” IEEE International Conference on Computer
Communication and Informatics(ICCII), pp 1-6, 2012.
E. I.Zacharaki ,Sumei Wang ,S Chawla, Dong Soo Yoo, R Wolf ,E.R Melhem, C.Davatzikos.”MRI based classification of brain tumor type
and grade using SVMRFE”.IEEE Symposium on bioengineering,pp-1035-1038,April ,2009.
M .C Clark, L. O Hall, D.B.Goldgof, R.Velthuizen, F.R. Murtagh, and M.S Silbiger. “Automatic tumor segmentation using knowledge based
technique, IEEE transaction on medical imaging, vol 17,no 2,pp-187-192,April,1998.
W. E. Reddick , J.O Glass, E. N. Cook , T. D Elkin ,R. J. Deaton. “Automated segmentation and classification of multispectral magnetic
resonance images of brain using artificial neural networks”, IEEE transaction on medical imaging, vol 16, no 6,pp 911-918 ,1997.
Huazhu Song , Zichun Ding, Cuicui Guo , Zhe Li, Hongxia Xia. “ Research on combination kernel function of Support Vector Machine .”
International Conference on Computer science and software engineering, pp-345-356, 2008
Mcconnell Brain Imaging centre (june 2006) stimulated data base [online] available http://www.bic .mni.mcgill.ca /brainweb).
Y.J .Kennedy ,R.Eberhart. “ Particle Swarm Optimization.” IEEE International Conference on Neural Network,pp-1942- 1948, 1995.
Vladimir N. Vapnik “ The Nature of Statistical Learning Theory” New York: Springer –Verlag,2000
Authors:
Azher Jameel
Paper Title:
A Comparative Study of XFEM and EFGM in Solving Frictional Contact Problems
Abstract:
In this paper, the extended finite element method (XFEM) and the element free Galerkin method
(EFGM) have been employed to model and simulate the contact type of nonlinearities caused by the discontinuities
due the frictional contact. In order to model these discontinuities, few modifications are made in XFEM and EFGM
319-323
324-331
to incorporate these discontinuities in the formulation. The contact interface between the two bodies is modeled by
applying an appropriate enrichment function. The classical approximate solution is enriched with the Heaviside jump
function to simulate the contact behavior between the two surfaces. Gaussian quadrature has been used for the
numerical integration of the weak formulation. Finally, three model problems are solved using XFEM and EFGM
and the results obtained by the two techniques are compared with each other. The results obtained by XFEM show a
good agreement with the results obtained by EFGM.
Keywords: XFEM, EFGM, slip criterion, slip rule, penalty factor, level set, Heaviside jump function.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
67.
T. Liszka, J. Orkisz, "The finite difference method at arbitrary irregular grids and its application in applied mechanics", Computers and
Structures, vol. 11, 1980, pp. 83-95.
J. Oliver, A. E. Huespe, P. J. Sanchez, "A finite element method for crack growth without remeshing", International Journal for Numerical
Methods in Engineering, vol. 46, 1999, pp. 131-150.
J. A. A. Portela, M. Aliabadi, D. Rooke, "The dual boundary element method: effective implementation for crack problems", International
Journal for Numerical Methods in Engineering, vol. 33, 1991, pp. 1269-1287.
U. Haussler, C. Korn, "An adaptive approach with the element free Galerkin method", Computer Methods in Applied Mechanics and
Engineering, vol. 162, 1998, pp. 203-222.
A. R. Khoei, S. O. R. Biabanaki, M. Anahid, "Extended finite element method for three-dimensional large plasticity deformations on
arbitrary interfaces", Computer Methods in Applied Mechanics and Engineering, vol. 197, 2008, pp. 1100-1114.
J. H. Chen, N. Kikuchi, "An incremental constitutive relation of unilateral contact friction for large deformation analysis", Journal of Applied
Mechanics, vol. 52, 1985, pp. 639-648.
P. Papadopoulos, R. L. Taylor, "A mixed formulation for the finite element solution of contact problems", Computer Methods in Applied
Mechanics and Engineering, vol. 94, 1992, pp. 373-389.
K. J. Bathe, A. Chaudary, "A solution method for planar and axisymmetric contact problems", International Journal for Numerical Methods
in Engineering, vol. 21, 1985, pp. 65-88.
N. Sukumar, D. L. Chopp, N. Moes, T. Belytschko, "Modeling holes and inclusions by level sets in the extended finite-element method",
Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6183-6200.
J. M. Melenk, I. Babuska, "The partition of unity finite element methods: basic theory and applications", Computer Methods in Applied
Mechanics and Engineering, vol. 139, 1996, pp. 289-314.
J. Dolbow, N. Moes, T. Belytschko, "An extended finite element method for modeling crack growth with frictional contact", Computer
Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6825-6846.
N. Moes, T. Belytschko, "Extended finite element method for cohesive crack growth", Engineering Fracture Mechanics, vol. 69, 2002, pp.
813-833.
I. V. Singh, B. K. Mishra, S. Bhattacharya, R. U. Patil, "The numerical simulation of fatigue crack growth using extended finite element
method", International Journal of Fatigue, vol. 36, 2012, pp. 109-119.
S. Glodez, Z. Ren, "Modelling of crack growth under cyclic contact loading", Theoretical and Applied Fracture Mechanics, vol. 30, 1998,
pp. 159-173.
P. M. A. Areias, T. Belytschko, "Analysis of three-dimensional crack initiation and propagation using the extended finite element method",
International Journal for Numerical Methods in Engineering, vol. 63, 2005, pp. 760-788.
A. R. Khoei, A. Shamloo, A. R. Azami, "Extended finite element method in plasticity forming of powder compaction with contact friction",
International Journal of solids and structures, vol. 43, 2006, pp. 5421-5448.
M. Anahid, A. R. Khoei, "New development in extended finite element modeling of large elasto-plastic deformations", International Journal
for Numerical Methods in Engineering, Vol. 75, 2008, pp. 1133-1171.
B. Prabel, A. Combescure, A. Gravouil, S. Marie, "Level set X-FEM non-matching meshes: application to dynamic crack propagation in
elasto-plastic media", International Journal for Numerical Methods in Engineering, vol. 69, 2006, pp. 1553-1569.
S. Mariani, U. Perego, "Extended finite element method for quasi-brittle fracture", International Journal for Numerical Methods in
Engineering, vol. 58, 2003, pp. 103-126.
L. B. Lucy, "A numerical approach to the testing of the fission hypothesis", Astronomical Journal, vol. 82, 1977, pp. 1013-1024.
J. W. Swegle, D. L. Hicks, S. W. Attaway, "Smoothed particle hydrodynamics stability analysis", Journal of Computational Physics, vol.
116, 1995, pp. 123-134.
S. W. Attaway, M. W. Heinstein, J. W. Swegle, "Coupling of smooth particle hydrodynamics with the finite element method", Nuclear
Engineering and Design, vol. 150, 1994, pp. 199-205.
T. Belytschko, L. Gu, Y. Y. Lu, "Fracture and crack growth by element free Galerkin methods", Modeling and Simulation in Materials
Science and Engineering, vol. 2, 1994, pp. 519-534.
N. Moes, M. Cloirec, P. Cartraud, J. F. Remacle, "A computational approach to handle complex microstructure geometries", Computer
Methods in Applied Mechanics and Engineering, vol. 192, 2003, pp. 3163-3177.
J. C. Simo, T. A. Laursen, "An augmented Lagrangian treatment of contact problems involving friction", Computers and Structures, vol. 42,
1992, pp. 97-116.
C. Eck, O. Steinbach, W. L. Wendland, "A symmetric boundary element method for contact problems with friction", Mathematics and
Computers in Simulation, vol. 50, 1999, pp. 43-61.
A. R. Khoei, M. Nikbakht, "An enriched finite element algorithm for numerical computation of contact friction problems", International
Journal of Mechanical Sciences, vol. 49, 2007, pp. 183-199.
Authors:
R.Gunasekar
Paper Title:
Performance Evaluation of Rotary Vane Compressor Using Oil Separator in Car AC System
Abstract: One of the primary functions of an automobile climate control system is to provide the desired cooling
and stabilize cabin temperatures to comfortable levels in hot climatic conditions. With the increasing demand for
more energy efficient systems and thermal comfort in automobiles, the automobile AC system needs to be optimized
to deliver the required cooling performance with minimum AC power consumption. Proper selection and integration
of AC compressor with other system aggregates results in improved energy efficiency of the system.
There are varies ideas to improve compressor efficiency .But considering manufacturing feasibility ,design and
validation lead time and cost as many of the ideas dropped down. Oil separator is one of the way to improve cooling
efficiency of compressor in which low investment and lead time involved. The function of oil separator is that
separate the oil and refrigerant from the AC system.AC System contains compressor ,condenser, evaporator and txv
as main parts. During AC system on condition, refrigerant flow on in the compressor ,condenser and evaporator txv
too.
Compressor contains OIL which is used for lubrication purpose for compressor internal parts.So that compressor
332-334
moving parts will not damage as wear and tear. During compressor on condition oil also mix with refrigerant which
can circulate the system.This paper response to implication of oil separator in Rotary vane compressor.
Keywords: Compressor, Oil separator
References:
1.
2.
3.
4.
68.
G H Hundy ,A.R Trott,TC Welch Refrigeration and Air-conditioning Tata McGraw Hill education Pvt Ltd.,4th Edition (2010).
P.N Ananthanarayanan., “Basic Refrigeration and Air conditioning”., Tata McGraw Hill education Pvt Ltd.,3rd Edition (2006).
C.P.Arora., “Refrigeration and Air conditioning” Tata McGraw Hill education Pvt Ltd.,17th Edition (2006).
Valeo Japan Handbook and test reports.
Authors:
Shakeel Ahmad, Rehan Ahmad Khan, Hina Gupta
Paper Title:
Seismic Performance of a Masonry Heritage Structure
Abstract:
World-wide experience from past earthquakes shows un-reinforced masonry structures are the most
vulnerable and represent overall the largest threat to human life and property in future earthquakes. This highlights
the structural inadequacy of buildings, especially unreinforced masonry buildings, to carry seismic loads and requires
an urgent assessment of existing buildings in terms of the strength, expected performance and safety of existing
buildings during earthquake as well as for carrying out the necessary rehabilitation. As it is a heavy, brittle material
with low tensile strength and exhibits little ductility when subjected to seismic effects, unreinforced masonry is
highly susceptible to earthquake damage than various other types of construction material. Unreinforced masonry
buildings are usually characterized by sudden and dramatic collapse. Present study deals with an evaluation of the
seismic performance of an old unreinforced masonry building structure. The 137 years old masonry heritage school
building is located at Aligarh Muslim University, Aligarh (seismic zone IV). The building does not show any cracks
under gravity loads. Since the historical building was built before the inception of seismic IS code, the point of
concern is performance of building under seismic loads. In the present study, the building is modelled using finite
element technique and its seismic evaluation is carried out using the commercially available Finite Element software
assuming a homogeneous and nonlinear behaviour of the material. The building is subjected to different PGA levels
(0.1g, 0.2g, 0.3g, 0.4g ) as input ground motion to determine its seismic performance.The results thus obtained will
be useful for detecting the weak failure zones of the buildings under future seismic forces and retrofit accordingly
using proper retrofitting techniques.
335-340
Keywords: Heritage masonry building, finite element modelling, seismic performance, peak ground acceleration.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
IS: 1905-1987, Indian Standard Code of Practice for Structural Use of Unreinforced Masonry, Bureau of Indian Standards, New Delhi.
IS 1893–2002, Criteria for Earthquake Resistant Design of Structure.
Suggested draft IS: 1905, Code of practice for structural use of unreinforced masonry (Draft suggested by IITK GSDMA Program on
Building Codes which is available from www.nicee.org).
M. Sirajuddin, N. S. Potty and J. Sunil, “Nonlinear seismic analysis of masonry structures,”, India, Journal of Design and Built
Environment, Vol. 9, December 2011, pp. 1–16.
Ueli Camathias (Master Thesis) “Seismic Performance Evaluation of a Historic Unreinforced Masonry Building Structure”, 2013.
M. J. DeJong (Ph.D Thesis). “Seismic Assessment Strategies for Masonry Structures”, 2009.
S.S. Khadka,” Seismic Performance of Tradational Unreinforced Masonry Building in Nepal,” Kathmandu University Journal of Science,
Engineering and Technology Vol. 9, No. I, July, 2013, pp 15-28.
G. Angjeliu1, M. Baballëku,” Seismic assessment of historical masonry structures. The former Italian Embassy,” 2nd International Balkans
Conference on Challenges of Civil Engineering, BCCCE, 23-25 May 2013, Epoka University, Tirana, Albania.
P.B. Lourenço,”Computations on historic masonry structures”, Prog. Struct. Engng. Mater., 4, 2002, pp. 301-319.
R. Capozucca,” Shear Behaviour of Historic Masonry Made of Clay Bricks,” The Open Construction and Building Technology Journal,
2011, 5, (Suppl 1-M6) pp. 89-96.
H. R. Parajuli, J. Kiyono, H. Taniguchi, K. Toki, A. Furukawa, P.N. Maskey, “Parametric study and dynamic Analysis of a Historical
Masonry Building of Kathmandu” Disaster Mitigation of Cultural Heritage and Historic cities, Vol.4, July 2010.
Authors:
Sunil Kumar Yadav, Rajesh Mehra
Paper Title:
Analysis of FPGA Based Recursive Filter Using Optimization Techniques for High Throughput
Abstract: In this paper we examine the optimal throughput of recursive filter using varies optimization techniques,
which are relevant for real time application. By formulating filter design as a multi-objective optimization problem
and approaching. Different approaches use for implementing of these methods on hardware. In this work FPGA
implementation of recursive filters are examined and the comparison of these methods is done by analyzing the
hardware cost and performance.
69.
Keywords: IIR filter, VHDL, FPGA
References:
1.
2.
3.
4.
5.
Bojan Jovanovi , and Milun Jevti “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium
pages:61-66, ebruary 2010
Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D
IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer
Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter
using FPGA Devices” International Technology Research Letters, pages:25-31, 2012
Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference
on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013
Kamboh, Hamid M., and Shoab A. Khan. "An algorithmic transformation for FPGA implementation of high throughput filters." Emerging
Technologies 7th International Conference on. IEEE,pages 1-6 2011.
341-343
Authors:
Ravi Prakash Yadav, Ritesh Kumar Mishra
Paper Title:
Performance Analysis of OFDM System Employing an Efficient Scheme of ICI Self- Cancellation
Abstract:
Orthogonal frequency division multiplexing (OFDM) is very sensitive to frequency offset caused by
Doppler frequency drift or frequency drift between transmitter and receiver oscillator. This leads to a loss in the
orthogonality between sub-carriers and results in inter-carrier-interference (ICI). In this paper we proposed an
efficient ICI self-cancellation scheme to reduce ICI in OFDM system and its performance is compared with existing
methods of self-cancellation in terms of carrier-to-interference ratio (CIR) and bit-error rate (BER). Simulation result
shows that the proposed scheme outperforms the existing schemes.
Keywords: Inter-carrier-interference (ICI), OFDM, self-cancellation (SC), data-conjugate, data-conversion.
References:
1.
2.
70.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
71.
J. Armstrong, “Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM”, IEEE
Trans. Commun., vol. 47, no. 3, pp. 365–369, Mar. 1999.
P. H. Moose, “A technique for orthogonal frequency division multiplexing frequency offset correction”, IEEE Trans. Commun., vol. 42,
no.10, pp. 2908–2914, 1994.
J. Ahn and H. S. Lee, “Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,” Electronics
letters, vol. 29, no. 16, pp. 1476-1477, Aug. 1993.
C. Muschallik, “Improving an OFDM reception using an adaptive Nyquist windowing,” IEEE Transactions on Consumer Electronics, vol.
42, pp. 259-269, Aug. 1996.
P. Tan and N. C. Beaulieu , “Reduced ICI in OFDM System Using the “Better Than” Raised Cosine Pulse”, IEEE Commun., letters , vol.8 ,
no.3 , march 2004.
Y. Zhao and S. G. Haggman, “Intercarrier Interference Self-Cancellation Scheme for OFDM Mobile Communication Systems”, IEEE
Trans. on Commun., vol.49, no. 7, July 2001.
K .Sathananthan, R.M.A.P.Rajatheva and S.B.Slimane, “Cancellation technique to reduce intercarrier interference in OFDM, IEEE Elect.
Lett. , Dec. 2000.
Y. Fu and C.C. Ko, “A new ICI self-cancellation scheme for OFDM systems based on a generalized signal mapper”, Proc. 5th wireless
Personal Multimedia Communications, pp.995-999, 2002.
Y-H Peng, “Performance Analysis of a New ICI-Self- Cancellation Scheme in OFDM Systems”, IEEE Trans. on Consumer Electronics,
vol.53, no.4, pp.1333-1338, 2007.
H.G. Ryu, Y. Li, J.S.Park, “An Improved ICI Reduction Method in OFDM Communication System”, IEEE Trans. Broadcasting, vol.51,
no.3 pp.395-400, Sep.2005.
Q. Shi, Y. Fang, M. Wang, “A novel ICI self-cancellation scheme for OFDM systems”, in IEEE WiCom, pp.1-4, 2009.
H. Zhou and Y-F Huang, “A Maximum Likelihood Fine Timing Estimation for Wireless OFDM Systems”, IEEE Trans. on Broadcasting,
Vol.55, No.1, pp.31-41, Mar.2009.
Q. Shi, “ICI Mitigation for OFDM Using PEKF”, IEEE Signal Process. Lett. , vol.17, no. 12, pp.981-984, Dec.2010.
Authors:
Chithrakshi, Taranath H.B
Paper Title:
Image Compression Using Fuzzy Enhancement
344-347
Abstract:
Fuzzy logic is a way to embed an engineer’s experience into the system. It mathematically emulates
human reasoning, provides an intuitive way to design function blocks for intelligent control systems, advanced fault
detection and other complex applications. The fuzzy logic, unlike conventional logic system, is able to model
inaccurate or imprecise models. The fuzzy logic approach offers a simpler, quicker and more reliable solution that is
clear advantages over conventional techniques. It can significantly improve response so we are actively
incorporating fuzzy logic into many real time applications. Image processing is one of the area where fuzzy can be
utilized for the image enhancement. Image compression is one of the major image processing techniques that is
widely used in medical, automotive, consumer and military applications. In this project fuzzy technique has been
used in image compression with Discrete Wavelet Transforms (DWT) technique. Discrete wavelet transforms is the
most popular transformation technique adopted for image compression. Complexity of DWT is always high due to
large number of arithmetic operations. In order to minimize the complexity of DWT, modified DA split architecture
has been proposed and implemented on FPGA.
Keywords: DA split architecture, Discrete wavelet transforms (DWT), Fuzzy logic, Image processing
348-351
References:
1.
2.
3.
4.
5.
6.
7.
72.
David S. Taubman, Michael W. Marcellin - JPEG 2000 - Image compression, fundamentals, standards and practice", Kluwer academic
publishers, Second printing - 2002.
G. Knowles, "VLSI Architecture for the Discrete Wavelet Transform," Electronics Letters, vo1.26, pp. 1184-1185,1990.
M, Vishwanath, R. M. Owens, and M. 1. Irwin, "VLSI Architectures for the Discrete Wavelet Transform," IEEE Trans. Circuits And
Systems II, vol. 42, no. 5, pp. 305-316, May. 1995.
AS. Lewis and G. Knowles, "VLSI Architectures for 2-D Daubechies Wavelet Transform without MUltipliers".Electron Letter, vo1.27, pp.
171-173, Jan 1991.
K.K. Parhi and T. Nishitani "VLSI Architecture for Discrete Wavelet Transform", IEEE Trans. VLSI Systems, vol. 1, pp. 191-202, June
1993.
M. Vishwanath, R.M. Owens and MJ. Irwin, "VLSI Architecture for the Discrete Wavelet Transform", IEEE Trans. Circuits and Systems,
vol. 42, pp. 305-316, May 1996.
C. Chakrabarti and M. Vishwanath, "Architectures for Wavelet Transforms: A Syrvey", Journal of VLSI Signal Processing, Kulwer, vol.lO,
pp. 225-236,1995.
Authors:
S.Senthil Kumar, V.Parthasarathy
Paper Title:
Juggler Radio Network Using Virtual Wi-Fi
Abstract:
A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed
infrastructure and is lack of any centralized control. Any single radio interface that is dynamically switched to a
wireless channel in different frequency bands to communicate with different nodes. This however incurs frequent
352-355
channel switching overhead of the order of 100s of microseconds which is comparable to packet transmission times.
A more practical method for concurrent channel usage is to use multiple radio interfaces .A multi-channel wireless
mesh network architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 NICs. We
address the problem of interference aware routing in multi-radio infrastructure mesh networks where in each mesh
node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. In proposed Virtual
Refined Wi-Fi Additional interfaces can support parallelism in network flows, improve handoff times, and provide
sideband communication with nearby peers. Completely, such benefits are outweighed by the added costs of an
additional physical interface. Instead, virtual interfaces have been proposed as the solution, multiplexing a single
physical interface across more than one communication endpoint
Keywords: Ad-hoc, Virtual Wi-Fi, Radio interface, Multiracial, WMN.
References:
1.
A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. In
Broadnets, 2004. R. Draves, J. Padhye, and B. Zill; .Routing in Multi-radio, Multi-hop Wireless Mesh Networks.; ACM MobiCom '04.
2. P. Hsiao, A. Hwang, H. Kung, D. Vlah; .Load-Balancing Routing for Wireless Access Networks.; Proc. of IEEE INFOCOM '01.
3. I. Katzela, M. Naghshineh; .Channel assignment schemes for cellularmobile telecommunication systems: a comprehensive survey.; IEEE
Personal Communications (June '96)
4. T. R. Jensen, B. Toft; .Graph Coloring Problems.; Wiley Inter science, New York, '95.
5. Jie Gao, Li Zhang; .Load Balanced Short Path Routing in Wireless Networks.; Proc. of INFOCOM '04 .
6. H. Hassanein, A. Zhou; .Routing with load balancing in wireless Adhoc networks.; Proc. of ACM MSWiM '01.
7. S.J. Lee and M. Gerla; .Dynamic Load-Aware Routing in Ad hoc Networks.; Proc. of ICC '01.
8. A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh
Networks.;ACM Mobile Computing & Comm Review (MC2R), April '04.
9. C. Villamizar, R. Chandra, R. Govindan; .Internet RFC 2439 – BGP Route Flap Damping.
A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.;
ACM Mobile Computing & Comm Review (MC2R), April '04.
A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniquesfor diagnosing faults in ieee 802.11 infrastructure networks. In
Proceedings of the International Conference on Mobile Computing .Networking (MobiCom), pages 30–44, Philadelphia, PA, Sept. 2004.
10. M. Shin, S. Lee and Y.-A. Kim, “Distributed Channel Assignment for Multi-Radio Wireless Networks”, IEEE Internat. Conf. on Mobile
Adhoc and Sensor Systems (MASS), Oct. 8–11, 2006, pp. 417–426.
11. J. Tang, X. Guoliang, and W. Zhang, “Interference-aware topology control and QoS routing in multi-channel wireless mesh networks,” in
Proceedings of the 6th ACM International Symposium on Mobile AdHoc Networking and Computing, MobiHoc 2005,.
73.
Authors:
Abhay Limaye, Shraddha Kakne, Priti Tiple, Shubhangi Bhamare
Paper Title:
Scrutinizing the Art of Intrusion Detection
Abstract:
Internet services and applications have become an inextricable part of quotidian life, enabling
communication and the management of confidential information from any place imaginable. These internet services
are bound to be vulnerable to attackers. Billions of dollars are lost every year in mending the systems hit by the
intrusions. The means for pinpointing and tracking these intrusions are called as Intrusion Detection Systems (IDS).
Intrusion Detection Systems are procuring mainstream adulation as companies move more of their critical business
interactions to the Internet. Thus, hereby, in this paper, we present the dissertation on the notion of Intrusion
Detection wherein we first focus on the assorted genres of attacks or intrusions. Furthermore we attempt to discern
the paradigm of Intrusion Detection Systems. Denouement of this paper elaborates pragmatic benefits and unrealistic
conjectures of prevalent Intrusion Detection Systems.
Keywords: Intrusion Detection System (IDS), Dos (Denial of Service), brute force Attack, SQL injection attack.
356-361
References:
1.
2.
3.
4.
5.
6.
74.
Amrita Anand,Brajesh Patel"International Journal of Advanced Research in Computer Science and Software Engineering",International
Journal of Advenced Research in Computer Science and Software Engineering 2 (8), August- 2012.
Sapna S. Kaushik, Dr.Prof.P.R.Deshmukh"Detection of Attacks in an Intrusion Detection System" (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 2 (3) , 2011
Renaud Bidou “Denial of Service Attacks”
John Bellardo and Stefan Savage “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions”
Faizal, M.A., MohdZaki M., Shahrin Sahib, Robiah, Y., SitiRahayu, S., and AsrulHadi, Y. “Time Based Intrusion Detection on Fast Attack
for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010.
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna(2005). Intrusion Detection and Correlation, Challenges and Solution, Springer
Science+Business Media Inc, USA.
Authors:
Munaga Siva Prasanth, Kallepalli Venkatesh
Paper Title:
Fire Suppression System in Locomotives
Abstract:
Still we had seen a lot of fire accidents and gas leakages are present in trains. So in this paper it is a
remedy to reduce the death loss occurring due to fire accidents in trains. Fire on a running train is more catastrophic
than on a stationary one, since fanning by winds helps spread the fire to other coaches. The damage is heavier due to
improper reach of service at right time due to improper communication. This time delay is causing heavier damage.
Thus, eliminating the time between when an accident occurs and when first responders are dispatched to the scene
decreases the damage.
This projects help in notifying the passengers and emergency services. The project consists of a microcontroller
which is interfaced with the thermistor, gas sensors, water sprinkler and GSM modem, Once the sensors attached in
the compartments of train sense the gas detection and fire detection, it assumes a fire accident. The controller
assumes it as an emergency and power supply will be automatically off, starts the buzzer, doors are opened, Sprinkler
on and GSM modem present in the train sending the message alert to loco pilot and near the railway stations.
362-364
Keywords: Sprinkler, D.C. Motor, Thermistor (NTC) & Smoke sensors, GSM, Buzzer, Submergible pump or
centrifugal pump.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
“The 8051 Microcontroller and Embedded Systems” by “Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinlay”
“Practical electrical motor handbook” by “Irving Gottlieb”
Microcontroller AT89C52 datasheet
Thermistor NTC datasheet
http://en.wikipedia.org/wiki/Thermistor
http://www.ti.com/general/docs/lit/getliterature.tsp? genericPartNumber= lm35&reg =en&fileType=pdf
http://www.8085projects.info/Block-diagram-and-working-of-ADC0809.html
http://www.dnatechindia.com/Tutorial/8051-Tutorial/Interfacing-Relay-to-Microcontroller.html
http://www.systemsensor.com/en-us/Pages/Aspiration.aspx
http://www.sohofireprotection.us/water-based-fire-sprinklers.html
http://9circuits.com/store/products/pololu/flammable-gas-smoke-sensor/
Authors:
75.
Amrita Razdan, M. F. Wani
Experimental Characterization for Wear Rate of Silicon Carbide and Nickel-Base Alloy for Human
Paper Title:
Implants
Abstract: Among the available ceramic materials for load bearing bio-implant applications, silicon carbide is
superior for its better biocompatibility, which can increase the longevity of prosthetic joints. The major cause of
revision surgery and implant failure is Osteolysis (aseptic loosening of the prosthetic joint). The product of bearing
wear, microscopic particulate debris in the joint space leads to implant loosening. Prosthetic joint mainly consists of
acetabular cup, acetabular lining and femoral head. The best material for manufacturing acetabular cup is nickel –
base alloy. For manufacturing acetabular lining and femoral head, silicon carbide is the best chosen material. The
acetabular cup or knee cap is prone to catastrophic failures due to walking, stumbling etc. A sliding distance test was
performed on polished surface of silicon carbide and nickel-base alloy (mirror- like finish, 1µm) by using
Reciprocating Friction Monitor (Courtesy; National Institute of Technology, Srinagar) for the evaluation of wear
coefficient by standard test procedures and equation outlined in ASTM F 603. The test was carried out in ambient
temperature. The results obtained showed drastically reduced wear rates. The experiments on Reciprocating Friction
Monitor for Silicon carbide and nickel –base alloy showed that the best choice for prosthetic joint replacement would
be a combination of two materials; silicon carbide for femoral heads and acetabular lining, and nickel-base alloy for
acetabular cup.
365-367
Keywords: Aseptic loosening, Nickel base alloy, Silicon Carbide, Total joint replacement, Wear rate.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
76.
Willert HG, Bertam H, Buchhorn GH. Osteolysis in Alloarthroplasty of the hip: The role of ultra- high monolecular weight polyethylene
wear particles. Clin Orthop Relat Res 1990;258:95-107.
Ceramic on ceramic bearing Sukree khumrak, Bangkok medical journal vol.4.
Capello WN, D’Antonio JA, Feinberg JR, et al. Ceramicon- ceramic total hip arthroplasty: update. J Arthroplasty
Chevillotte C, Pibarot V, Carret JP, et al. Hip squeaking: A 10 years Follow up Study. J Arthroplasty 2012;27: 1008-13
Nevelos JE, Ingham E, Doyle C, et al. Wear of HIPed and non-HIPed alumina-alumina hip joints under standard and severe simulator
testing conditions. Biomaterials 2001;22:2191-7.
Hannouche D, et al. Ceramics in Total Hip Replacement. Clin Orthop Relate Res 2005;430:62-71.
Chevillotte C, Trousdale RT, Chen Q, et al. Hip Squeaking : A Biomechanical study of Ceramic-on-Ceramic Bearing Surfaces. Clin Orthop
Relat Res 2010;468:345-50.
Walter WL, Insley GM, Walter WK, et al. Edge loading in third generation alumina ceramic-on-ceramic bearings: stripe wear. J
Arthroplasty 2004;19:402-13.
Tribochemical polishing of silicon carbide in oxidant solution Zhize Zhu ), Viktor Muratov, Traugott E. Fischer.Department of Materials
Science and Engineering, SteÍens Institute of Technology, Hoboken, NJ 07030, USA .
Authors:
Abdulaziz S. Al-Aboodi
Paper Title:
Kinematic Simulation of Three Rollers in Circular Motion Using 2D Planar FE Modeling
Abstract:
A method is established for joining a tube to a tubesheet by expanding the tube to the tubesheet. The
expansion done using different method such as rolling. The joint integrity is important to ensure the roundness of the
structure of the heat exchanger, and to prevent leakage. Many parameters affect the joint integrity such as the initial
clearance, wall reduction and material properties. The residual contact stress is the main parameter indicating the
strength of the joint.
In this paper, the two dimensional planar FE model is established for the tube to tubesheet roller expansion. The
planar model is great way for our attempt to understand and analyze the problem. The planar model reveals a realistic
motion of the rollers in addition to the exact geometry of the tubesheet. This eliminates the need for the assumption
of uniform expansion and tubesheet sleeve diameter sets on the axisymmetric model. That, the ligament dimensional
effect will be shown on this model.
Keywords: Kinamatic, Simulation, Finite Element, Rolling, Modeling.
References:
1.
2.
3.
Al-Aboodi A (2006) Finite element analysis of roller expanded tubetubesheet joints with overenlarged tubesheet holes. PhD thesis, KFUPM
Al-Aboodi A, Merah N, Shuaib AR, Al-Nassar Y, Al-Anizi SS (2008) Modeling the effects of initial tube-tubesheet clearance, wall
reduction and material strain hardening on rolled joint strength.
ASME J Press Vessel Technol 130/4:041204-1–041204-6
368-372
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
Al-Aboodi A, Merah N, Shuaib AN, Al-Nassar Y (2009) FEA of groove geometry effect on roller and hydraulically expanded tube to
tubesheet joint strength. Int J Precis Technol 1(2):201–207
Allam M, Bazergui A (2002) Axial strength of tube-to tubesheet joints: finite element and experimental evaluations. J Press Vessel Technol
124:23–31
Allam M, Chaaban A, Bazergui A (1998) Estimation of residual stresses in hydraulically expanded tube-to-tubesheet joints. J Press Vessel
Technol 120:129–137
Andrieux S, Voldoire F (1995) Stress identification in steam generator tubes from profile measurements. Nucl Eng Design 158:417–427
ANSYS (2004) Version 9.0, program and help documentations, Swanson Analysis System, Inc.
Aufaure M (1987) Analysis of residual stresses due to roll-expansion process: finite element computation and validation by experimental
tests. In: Transaction of the 9th international conference of SMIRT, pp 499–503
Cizelj L, Mavko B (1995) Propagation of stress corrosion cracks in steam generator tubes. Int J Press Vessel Piping 63:35–43 Cooper
Power Tools (2005) Tube cleaners and expanders airetool manual. SP-1100EN0405–410M
Jawad MH, Clarkin EJ, Schuessler RE (1987) Evaluation of tube-totubesheet junctions. J Press Vessel Technol 109:19–26
Merah N, Al-Zayer A, Shuaib A, Arif A (2003) Finite Element evaluation of clearance effect on tube-to-tubesheet joint strength. Int J Press
Vessel Piping 80:879–885
Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y, Al-Anizi SS (2009) Combined effects of tube projection, initial tube-tubesheet clearance
and tube material strain hardening on rolled joint strength. ASME J Press Vessel Technol 131/5
Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y (2010) 3-D FEA of the effects of large overtolerances on roller expanded tubetubesheet
joint strength. In: Abstract published on IVth European conference on computational mechanics, Paris 16–21, 2010
Metzger DR, Sauve RG, Nadeau E (1995) Prediction of residual stress by simulation of the rolled joint manufacturing process for steam
generators, PVP vol 305. In: Current topics in computational mechanics. ASME, New York
Scott DA, Wolgemuth GA, Aikin JA (1984) Hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 106:104–109
Shuaib AN, Merah N, Khraisheh MK, Allam IM, Al-Anizi SS (2003) Experimental investigation of heat exchanger tubesheet hole
enlargement. J Press Vessel Technol 125:19–25
Standard of the Tubular Exchanger Manufacturer Association ‘TEMA’, 7th edn (1988) TEMA, Terrytown
Updike DP, Kalnins A, Caldwell SM (1992) Residual stresses in transition zone of heat exchanger tubes. J Press Vessel Technol 114:149–
156
Williams DK (1996) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs—part 1: 2-D
solution, PVP vol 327. In: Residual stresses in design, fabrication, assessment and repair, ASME, New York, pp 173–180
Williams DK (1997) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs-part 2: 3-D
solution, PVP vol 354. In: Current topics in the design and analysis of pressure vessels and piping. ASME, New York, pp 17–28
Williams DK (2003) Prediction of residual stresses in the mechanical roll of HX tubes into TEMA grooves, PVP vol 2003–1937. In: Design
and analysis methods and fitness for service, ASME, New York, pp 121–29.
Authors:
Ambika Oad, Himanshu Yadav, Anurag Jain
Paper Title:
A Review: Image Encryption Techniques and its Terminologies
Abstract: In today’s environment, security becomes an important issue in communication. For secure transmission
of data in open network, encryption is very important methodology. Though encryption we can prevent our data from
unauthorized access during transmission. In recent years many image encryption methods have been proposed and
used to protect confidential data. In this paper, we survey on existing work which is used different techniques for
image encryption and we also give general introduction about cryptography.
Keywords: Cryptography, Image Encryption, Decryption, Security.
References:
1.
2.
3.
4.
5.
6.
7.
77.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
http://en.wikipedia.org/wiki/Encryption
http://en.wikipedia.org/wiki/Plaintext
http://en.wikipedia.org/wiki/Ciphertext
http://en.wikipedia.org/wiki/Decryption
http://en.wikipedia.org/wiki/Cryptography
Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “ Multilevel Image Encryption by Binary Phase XOR
Operations “, IEEE Proceeding in the year 2003.
M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004
Vol. 40 No. 25
Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖,
Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004
Guosheng Gu ,Guoqiang Han “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International
Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006.
N.K. Pareek, Vinod Patidar, "Image encryption using chaotic logistic map", Elsevier, Image and Vision Computing 24 (2006) 926–934.
Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher
Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008
Mohammad Ali Bani Younes and Aman Jantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed
by Encryption , IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008.
Mohammad Ali Bani Younes and Aman Jantan ImageEncryption Using Block-Based Transformation Algorithm IAENG International
Journal of Computer Science, 35,2008.
Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and
improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009.
Sesha Pallavi Indrakanti , P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications
(0975 – 8887) Volume 28– No.8, 2011.
Amnesh Goel, Reji Mathews & Nidhi Chandra, "Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices",
International Journal of Computer Applications (0975 – 8887), Volume 36– No.3, December 2011.
Reji Mathews, Amnesh Goel, Prachur Saxena & Ved Prakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of
the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011,
October 19-21, 2011, San Francisco, USA. ISBN: 978-988-18210-9-6.
S.Bosu Babu & S.S.P Kumar “Enhanced Color Visual Cryptography” Engineering Science and Technology: An International Journl, , ISSN:
2250-3498, Vol.2, No. 5, October 2012
Quist-Aphetsi Keste,“ Image Encryption based on the RGB PIXEL Transposition and Shuffling” I.J.Computer Network and Information
Security, 2013,7, 43-50,2013.
Keerti Kushwah, Sini Shibu “New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher
Technique,” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 61 - 65
Nehal Kandele, Shrikant Tiwari “A New Combined Symmetric Key Cryptography CRDDBT Using - Relative Displacement (RDC) and
373-376
Dynamic Base Transformation (DBTC)”, International Journal of Engineering Research & Technology, Vol.2 - Issue 10 (October - 2013)(
2278-0181)
Authors:
Aparna A Nair, S.K Sudheer, M. Jayaraju
Paper Title:
Analysis of Optical Characteristics for Photonic Crystal Fiber at Small Core Diameters
Abstract: In the present study photonic crystal of eight ring with modified inner most ring has been considered.
The important optical properties like chromatic dispersion, effective area, nonlinear coefficient and confinement loss
has been studied. Each characteristic has been investigated under different core diameter of the photonic crystal
fiber. Each iteration has been done within range of wavelength 1000nm -1600nm .Using software like COMSOL
MULTIPHYSICS and MATLAB, each parameter were realized. This design has made the propagation of
electromagnetic waves of higher wavelength through the core under tight confinement. The novel design has made
the light of higher wavelength to be trapped inside the core of very small diameters (1μm-3μm).A good confinement
loss has been achieved due to increase of the number of rings
Keywords: Photonic crystal fiber (PCF), Finite Element Method, Chromatic Dispersion, Confinement Loss, and
Nonlinear Coefficient.
References:
R. K. Sinha and Shailendra K. Varshney, “Dispersion Properties Of Photonic Crystal Fibers”, Microwave And Optical Technology Letters,
Vol. 37, No. 2, 2003 .
2. Tzong-Lin Wu, Senior Member, IEEE, Jung-Sheng Chiang, and Chia-Hsin Chao, “ A Novel Approach for Calculating the Dispersions of
Photonic Crystal Fibers”, IEEE Photonics Technology Letters, Vol. 16, No. 6, 2004.
3. P. St. J. Russell, “Photonic-Crystal Fibers,” J. Lightwave Technol., No. 24 , pp. 4729- 4749, 2006
4. Jianguo Liu, Lifang Xue, Zhi Wang, Guiyun Kai, Yange Liu, Weigang Zhang, and Xiaoyi Dong, “Large Anomalous Dispersion at Short
Wavelength and Modal Properties of a Photonic Crystal Fiber With Large Air Holes” , IEEE Journal Of Quantum Electronics, Vol. 42, No.
9, 2006.
5. Lars Grüner-Nielsen, and Bera Pálsdóttir , “Highly nonlinear fibers for very wideband supercontinuum generation” , Proc. of SPIE Vol.
6873, 68731B, 2008
6. Feroza Begum, Yoshinori Namihira , S.M. Abdur Razzak , Shubi Kaijage , Nguyen Hoang Hai ,Tatsuya Kinjo , Kazuya Miyagi , Nianyu
Zou, “Design and analysis of novel highly nonlinear photonic crystal fibers with ultra-flattened chromatic dispersion” Optics
Communications 282 ,1416–1421,2009.
7. Rekha Mehra , Pawan Kumar Inaniya, “Design of Photonic Crystal Fiber for Ultra Low Dispersion in Wide Wavelength Range with Three
Zero Dispersion Wavelengths” , AIP Conf. Proc. 1324, 175 ,2010.
8. Md. Anwar Hossain,Yoshinori Namihira, Jingjing Liu, S.M.Abdur Razzak, Md. Asraful Islam, Yuki Hirako, Kazuya Miyagi, Shinya
Nozaki, “Dispersion Flattened Photonic Crystal Fibers For Supercontinuum Generation In A Telecommunication Window” , Proceedings of
ICCTA2011.
9. WANG XiaoYan, LI ShuGuang, HAN Ying, DU Ying, XIA ChangMing & HOU LanTian, “The polarization-dependent supercontinuum
generation in photonic crystal fibers with high birefringence and two-zero dispersion”, Science China:Physics, Mechanics & Astronomy,
Vol.55 No.2: 199–203, Feb 2012.
10. M. Samiul Habib, M. A. Motin, M. I. Hasan, M. Selim Habib, S.M. Abdur Razzak, and M. A. Goffar Khan, “Dispersion and Confinement
Loss Control with Decagonal Photonic Crystal Fibers for Wideband Transmission Systems”, IEEE 2013.
11. Aparna A Nair, Dr. S.K Sudheer, Dr. M Jayaraju, “Research on Optical Properties of Photonic Crystal Fiber (PCF) at Telecommunication
Windows”, in proceedings of International Conference on Recent trends in Engineering Technology, ICRTET Cochin, Kerala, pp-8085,January 2014
1.
78.
377-380
Authors:
Reshma Elizabeth Regi, Haris P.A.
Performance of PAPR Reduction in OFDM System with Complex Hadamard Sequence using SLM
Paper Title:
and Clipping
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is an efficient method of data transmission for
high speed communication systems. However, the main drawback of OFDM system is that, it exhibits high Peak to
Average Power Ratio (PAPR) of the transmitted signals. OFDM consist of large number of independent subcarriers,
as a result of which the amplitude of such a signal can have high peak values. The Selected Mapping (SLM)
technique is one of the promising PAPR reduction techniques for OFDM. This technique however increases the
computational and phase search complexity and PAPR reduction performance is largely dependent on the selection
of random phase sequences. In this paper, a new SLM method which rotates the phase of input data after IFFT by
using matrices generated from complex Hadamard code is proposed. After phase rotation, clipping technique is used
to further reduce the PAPR. From simulation results, we can find that the proposed method has lower PAPR than
conventional SLM combined with clipping technique.
79.
Keywords:
Sequence.
OFDM-Orthogonal frequency division multiplexing, Clipping, SLM-Selected Mapping, Hadamard
References:
1.
2.
3.
4.
5.
6.
7.
8.
Y. Wu and W. Y. Zou, ”Orthogonal frequency division multiplexing: a multi-carrier modulation scheme,” IEEE Transactions on Consumer
Electron, Aug. 1995.
L. J. Cimini Jr., ”Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans.
Commun., vol. COM-33, pp. 665-675, July 1985.
Dov Wulich,”Definition of Efficient PAPR in OFDM ,” IEEE communication Letters, vol. 9, no. 9, Sept 2005
R. van Nee and A. de Wild, “Reducing the Peak-to-Average Power Ratio of OFDM,” in Proc. of Vehicular Technology Conference, IEEE,
vol. 3, pp. 2072-2076.May 1998.
L. Wang and C. Tellambura, ”A simplified clipping and filtering technique for par reduction in ofdm systems, ”IEEE Signal Process. Lett,
vol. 12, no. 6, pp. 453–456, 2005
J. Armstrong, ”Peak-to-average power reduction for ofdm by repeated clipping and frequency domain filtering,” Electron. Lett, vol. 38,
no. 5, pp. 246–247, 2002.
Xiaodong Li and Leonard J. Cimini, Jr. “Effects of Clipping and Filtering on the Performance of OFDM, ”IEEE Comm. Letters vol. 2, no.
5, pp. 131-133,1998
Steve C. Thompson, John G. Proakis, and James R. Zeidler, “The Effectiveness of Signal Clipping for PAPR and Total Degradation
381-384
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
Reduction in OFDM Systems,” IEEE Globecom., vol. 30, pp. 2807-2811, 2005.
Guoguang Chen, Rashid Ansari, Yingwei Yao,“ Improved Peak Windowing for PAPR Reduction in OFDM,”
IEEE Conference
Publications pp. 1-5,2009.
A. E. Jones, T. A. Wilkinson, and S. K. Barton, “Block coding scheme for reduction of peak to mean envelope power ratio of multicarrier
transmission schemes,” Electron. Lett., vol. 30, pp. 2098-2099, 1994.
Wattanasuwakull, T. ; Benjapolakul, W,”PAPR Reduction for OFDM Transmission by using a method of Tone Reservation and Tone
Injection” in proc. of Information, Communications and Signal Processing, Conference, IEEE ,pp. 273 - 277,2005
B. S. Krongold and D. L. Jones. “PAR reduction in OFDM via active constellation extension,”IEEE Trans. Broadcasting, April 2002.
R.W. Bguml, R.F.H. Fischer and J.B. Huber “Reducing the peak-to-average power ratio of multicarrier modulation by selected mapping,”
Electronics letters, vol. 32, no. 22, pp. 259– 268, October 1996.
Sang -Woo Kim, Jin-Kwan Kim and Heung-Gyoon Ryu “A Computational Complexity Reduction Scheme Using Walsh Hadamard
Sequence in SLM Method. ” IEEE conference Publications, pp. 762-766, 2006
S.H. Muller and J.B. Huber “OFDM with reduced peak to-average power ratio by optimum combination of partial transmit sequences”
Electronics letters, vol. 33,no. 5 ,pp. 368- 369, february 1997.
Asma Latif; N. D. Gohar, “Reducing Peak-to-Average Power Ratio (PAPR) Using Partial Transmit Sequence in OFDM Systems, ” Proc of
lEEE, pp. 126-130,2003
Aparna P. More, Sunil B. Somani, “The Reduction of PAPR in OFDM Systems Using Clipping and SLM Method, ” Proc on lEEE
conference, pp. 593-597,2013
Aye Aung, Boon Poh Ng, and Susanto Rahardja,”Sequence- Ordered Complex Hadamard Transform Properties,Computational
Complexity and Applications” ,IEEE Transactions on signal processing , vol. 56, no. 8,pp. 3562-3571 , 2008
Authors:
80.
Bibi Ayesha.H.Patel, K.Indira
Automatic Recognition of Rodent Species based on Mathematical Morphological Characterization of
Paper Title:
Skull
Abstract: Morphological image processing is a collection of non-linear operations related to the shape or
morphology of features in an image. Digital image processing technique applied to extract morphological features of
skull image taken from optical camera. Based on the prominent nine extracted morphological features of rodent
species, the closed form univariate two-factor analysis is derived. These two factor analysis is used for real time autorecognition uniqueness of rodent species such as Meriones unguiculatus, Microtus brandti and Rattus norvegicus.
The same two-factor auto-recognition analysis is used over x-ray image of rodent's skull as well as other rodent
species like squirrel. The considered morphological features are short axis(X1), perimeter(X2), eccentricity(X3),
sphericity(X4), bump area(X5), paraxial area of enclosing rectangle(X6), hu1(X7), hu2(X8), hu3(X9).
385-387
Keywords: Morphological image processing , Hu- moments, Rodent species.
References:
1.
2.
3.
4.
81.
Onboard Autonomous Rock Shape Analysis For Mars Rovers, IEEE 2002
Zhihu Huang, Jinsong Leng "Analysis of Hus Moment Invariants on Image Scaling and Rotation", IEEE 2010
J. F. Boyce and W. J. Hossack, " Moment Invariants for Pattern Recognition," Pattern Recognition Letters, vol. 1, pp. 451-456, 1983
Jan Flusser and Tomas Suk, "A Moment-based Approach to Registration of Images with Affine Geometric Distortion," IEEE transaction
on Geoscience and Remote Sensing, vol. 32, pp. 382-387, 1994
Authors:
Monali Chaudhari, Amogh Waghmare, Sheldon Fernandes, Sagar Sinkar
Paper Title:
Dual Axes Maximum Light Intensity Tracker
Abstract: Efficiency of any solar powered system reduces due to mismatch between the direction of the sun’s rays
and axis of the solar panel. Aim of the proposed and implemented scheme is to increase the efficiency of such a
system, by reorienting the plane of the solar panel orthogonal to the sun’s radiation by using a simple low powered
system. To achieve this, the panel is moved about two axes after a certain interval of time depending upon the
ambient light conditions.
Keywords: LDR, Gimbal Structure, ADC, LSB
388-391
References:
1.
2.
3.
Saravanan C. , Dr .M.A. Panneerselvam, I. William Christopher, “A Novel Low Cost Automatic Solar Tracking System”.
Design, Development and Performance Test of an Automatic Two-Axis Solar Tracker system by Bajpai, P. (Electr. Eng. Dept., IIT
Kharagpur, Kharagpur, India) et.al. India Conference (INDICON), 2011 Annual IEEE
Design, Manufacturing and Performance Test of a Solar Tracker Made by a Embedded Control by Beltran, J.A. et.al. Electronics, Robotics
and Automotive Mechanics Conference,25-28 Sept. 2007 Page(s): 129 – 134 Print ISBN: 978-0-7695-2974-5
Authors:
82.
Syed Shujauddin Sameer
Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association
Paper Title:
Rules
Abstract:
The availability of data on the internet is increasing on a larger basis daily .Privacy Preservation data
mining has emerged to address one of the side effects of data mining Technology. The threat to individual privacy
through data mining is able to infer sensitive information from Non-sensitive information or unclassified data. There
is a n urgent need to be able to infer some mechanism to avoid the projection of all the sensitive information .An
approach in data mining techniques is very much essential. Alteration of data, filtering of the data, blocking of the
data are Some of the approaches. Given specific rules to be hidden, the techniques involve is to hide only the given
sensitive data. In this work we assume that only sensitive datais given and we analyze the approaches to secure 392-395
sensitive data in the database.
Keywords: Privacy preserving data mining, Association rules ,Sensitive data.
References:
1
Privacy Preserving Decision Tree Learning Using Unrealized Data Sets ,Issue No 02- February 2012.Vol. 24,Knowledge and Data
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Engineering ,IEEE Transactions
D. Agrawal and C. C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms”, In Proceedings of the
20th Symposium on Principles of Database Systems, Santa Barbara,California, USA, May 2001.
R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases”, In Proceedings of ACM
SIGMOD International Conference on Management of Data, Washington DC, May 1993.
R. Agrawal and R. Srikant, ”Privacy preserving data mining”, In ACM SIGMOD Conference on Management of Data, pages 439–450,
Dallas, Texas, May 2000.
Ljiljana Brankovic and Vladimir Estivill-Castro, “Privacy Issues in Knowledge Discovery and Data Mining”, Australian Institute of
Computer Ethics Conference, July, 1999, Lilydale.
C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining”, in Workshop on Research Issues on Data Mining and
knowledge Discovery, 1996.
C. Clifton, “Protecting Against Data Mining Through Samples”, in Proceedings of the ThirteenthAnnual IFIP WG 11.3 Working
Conference on Database Security, 1999.
C. Clifton, “Using Sample Size to Limit Exposure to Data Mining”, Journal of Computer Security, 8(4), 2000.SIGMOD
Chris Clifton, Murant Kantarcioglu, Xiaodong Lin and Michael Y. Zhu, “ Tools for Privacy PreservingDistributed Data Mining”, SIGKDD
Explorations, 4(2), 1-7, Dec. 2002.
E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino, “Hiding Association Rules by Using Confidence and Support” in Proceedings of
4th Information Hiding Workshop, 369-383, Pittsburgh,PA, 2001.
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules”, In Proc. Of the 8th ACM
SIGKDD Int’l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002.
Alexandre Evfimievski, “Randomization in Privacy Preserving Data Mining”, SIGKDD Explorations, 4(2), Issue 2, 43-48, Dec. 2002.
Alexandre Evfimievski, Johannes Gehrke and Ramakrishnan Srikant, “Limiting Privacy Breaches in Privacy Preserving Data Mining”,
PODS 2003, June 9-12, 2003, San Diego, CA.
M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules onhorizontally partitioned data”, In ACM
SIGMOD Workshop on Research Issues on Data Miningand Knowledge Discovery, June 2002.
Y. Lindell and B. Pinkas, “Privacy preserving data mining”, In CRYPTO, pages 36–54, 2000.
D. E. O’ Leary, “Knowledge Discovery as a Threat to Database Security”, In G. Piatetsky-Shapiro and W. J.Frawley, editors, Knowledge
Discovery in Databases, 507516, AAAI Press/ MIT Press, Menlo Park, CA, 1991.
S. Oliveira, O. Zaiane, “Algorithms for Balancing Privacy and Knowledge Discovery i Association Rule Mining”, Proceedings of 7th
International Database Engineering and ApplicationsSymposium (IDEAS03), Hong Kong, July 2003.
S. Oliveira, O. Zaiane, “Protecting Sensitive Knowledge by Data Sanitization”, Proceedings of IEEE International Conference on Data
Mining, November 2003.
S. J. Rizvi and J. R. Haritsa, “Privacy-preserving Association rule mining”, In Proc. of the 28th Int’l Conference on Very Large Databases,
August 2002.
Y. Saygin, V. Verykios, and C. Clifton, “Using Unknowns to Prevent Discovery of Association Rules”, SIGMOD Record 30(4): 45-54,
December 2001.
Surajit Chaudhuri. “Efficient evaluation of queries with mining predicates”, In Proc. ofthe 18th Int’l Conference on Data Engineering
(ICDE) 529-540,2002.
Authors:
Prabodh Sarmah, Devajit Mahanta
Paper Title:
Computational Methods for Enzyme Design and Its Biological Significance
Abstract: Enzymes are large biological molecules responsible for the thousands of metabolic processes that sustain
life. They are highly selective catalysts, greatly accelerating both the rate and specificity of metabolic reactions, from
the digestion of food to the synthesis of DNA. Most enzymes are proteins, although some catalytic RNA molecules
have been identified. Enzymes adopt a specific three-dimensional structure, and may employ organic (e.g. biotin) and
inorganic (e.g. magnesium ion) cofactors to assist in catalysis. Multiple experimental approaches have been applied
to generate nearly all possible mutations of target enzymes, allowing the identification of desirable variants with
improved properties to meet the practical needs. Meanwhile, an increasing number of computational methods have
been developed to assist in the modification of enzymes during the past few decades. With the development of
bioinformatics algorithms, computational approaches are now able to provide more precise guidance for enzyme
engineering and make it more efficient and less laborious. In this review, we summarize the recent advances of
method development with significant biological outcomes to provide important insights into successful
computational protein designs.
Keywords: Enzymes, computational approaches
83.
References:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Smith AL (Ed) (1997). Oxford dictionary of biochemistry and molecular biology. Oxford [Oxfordshire]: Oxford University Press. ISBN 019-854768-4.
Grisham, Charles M.; Reginald H. Garrett (1999). Biochemistry. Philadelphia: Saunders College Pub. pp. 426–7. ISBN 0-03-022318-0.
Bairoch A. (2000). "The ENZYME database in 2000" (PDF). Nucleic Acids Res 28(1): 304–5. doi:10.1093/nar/28.1.304. PMC 102465.
PMID 10592255.
Lilley D (2005). "Structure, folding and mechanisms of ribozymes". Current Opinion in Structural Biology 15 (3): 313–23.
doi:10.1016/j.sbi.2005.05.002. PMID 15919196.
Cech T (2000). "Structural biology. The ribosome is a ribozyme". Science 289 (5481): 878–9. doi:10.1126/science.289.5481.878. PMID
10960319.
Groves JT (1997). "Artificial enzymes. The importance of being selective". Nature 389(6649): 329–30. doi:10.1038/38602. PMID 9311771.
de Réaumur, RAF (1752). "Observations sur la digestion des oiseaux". Histoire de l'academie royale des sciences 1752: 266, 461.
Williams, H. S. (1904) A History of Science: in Five Volumes. Volume IV: Modern Development of the Chemical and Biological Sciences
Harper and Brothers (New York) Accessed 4 April 2007
Payen, A. et J.-F. Persoz (1833) "Mémoire sur la diastase, les principaux produits de ses réactions et leurs applications aux arts industriels"
(Memoir on diastase, the principal products of its reactions and their applications to the industrial arts), Annales de chimie et de physique,
2nd series, 53 : 73–92.
Dubos J. (1951). "Louis Pasteur: Free Lance of Science, Gollancz. Quoted in Manchester K. L. (1995) Louis Pasteur (1822–1895)—chance
and the prepared mind".Trends Biotechnol 13 (12): 511–5. doi:10.1016/S0167-7799(00)89014-9.PMID 8595136.
Kühne coined the word "enzyme" in: W. Kühne (1877) Jump up^ Text of Eduard Buchner's 1907 Nobel lecture at http://nobelprize.org.
Retrieved 4 April 2007.
The naming of enzymes by adding the suffix "-ase" to the substrate on which the enzyme acts, has been traced to French scientist Jump
up^ Willstätter, R. (1927). Problems and Methods in Enzyme Research. Cornell University Press, Ithaca. quoted in Blow, David (2000).
"So do we understand how enzymes work?" (pdf). Structure 8 (4): R77–R81. doi:10.1016/S0969-2126(00)00125-8.PMID 10801479.
396-403
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
58.
1946 Nobel prize for Chemistry laureates at http://nobelprize.org. Retrieved 4 April 2007.
Blake CC, Koenig DF, Mair GA, North AC, Phillips DC, Sarma VR. (1965). "Structure of hen egg-white lysozyme. A three-dimensional
Fourier synthesis at 2 Angstrom resolution". Nature 206 (4986): 757–61. doi:10.1038/206757a0. PMID 5891407.
Chen LH, Kenyon GL, Curtin F, Harayama S, Bembenek ME, Hajipour G, Whitman CP (1992). "4-Oxalocrotonate tautomerase, an enzyme
composed of 62 amino acid residues per monomer". J. Biol. Chem. 267 (25): 17716–21. PMID 1339435.
Smith S (1 December 1994). "The animal fatty acid synthase: one gene, one polypeptide, seven enzymes". FASEB J. 8 (15): 1248–59.
PMID 8001737.
Anfinsen C.B. (1973). "Principles that Govern the Folding of Protein Chains". Science181 (4096): 223–30.
doi:10.1126/science.181.4096.223. PMID 4124164.
Dunaway-Mariano D (2008). "Enzyme function discovery". Structure 16 (11): 1599–600. doi:10.1016/j.str.2008.10.001. PMID 19000810.
The Catalytic Site Atlas at The European Bioinformatics Institute. Retrieved 4 April 2007.
Jaeger KE, Eggert T. (2004). "Enantioselective biocatalysis optimized by directed evolution". Current Opinion in Biotechnology 15 (4):
305–
Shevelev IV, Hubscher U. (2002). "The 3' 5' exonucleases". Nature Reviews Molecular Cell Biology 3 (5): 364–
Tymoczko, John L.; Stryer Berg Tymoczko; Stryer, Lubert; Berg, Jeremy Mark (2002).Biochemistry. San Francisco: W.H. Freeman. ISBN
Ibba M, Soll D. (2000). "Aminoacyl-tRNA synthesis". Annu Rev Biochem. 69: 617–50.doi:10.1146/annurev.biochem.69.1.617. PMID
10966471.
Rodnina MV, Wintermeyer W. (2001). "Fidelity of aminoacyl-tRNA selection on the ribosome: kinetic and structural mechanisms". Annu
Rev Biochem. 70: 415–35.doi:10.1146/annurev.biochem.70.1.415. PMID 11395413.
Tawfik, O. K. A. D. S.; Tawfik, D. S. (2010). "Enzyme Promiscuity: A Mechanistic and Evolutionary Perspective". Annual Review of
Biochemistry 79: 471–505.doi:10.1146/annurev-biochem-030409-143718. PMID 20235827. edit
Fischer E. (1894). "Einfluss der Configuration auf die Wirkung der Enzyme" [Influence of configuration on the action of enzymes].
Berichte der Deutschen chemischen Gesellschaft zu Berlin 27 (3): 2985–93. doi:10.1002/cber.18940270364Jump up^ Koshland D. E.
(1958). "Application of a Theory of Enzyme Specificity to Protein Synthesis". Proc. Natl. Acad. Sci. 44 (2): 98–104.
doi:10.1073/pnas.44.2.98.PMC 335371. PMID 16590179.
Davies GJ, Bohm M. (2002). "Glycosidase mechanisms". Current Opinion in Chemical Biology 6 (5): 619–29. doi:10.1016/S13675931(02)00380-0.PMID 12413546.
Boyer, Rodney (2002) [2002]. "6". Concepts in Biochemistry (2nd ed.). New York, Chichester, Weinheim, Brisbane, Singapore, Toronto.:
John Wiley & Sons, Inc. pp. 137–8. ISBN 0-470-00379-0. OCLC 51720783.
Savir Y & Tlusty T (2007). "Conformational proofreading: the impact of conformational changes on the specificity of molecular
recognition". In Scalas, Enrico. PLoS ONE 2(5): e468. doi:10.1371/journal.pone.0000468. PMC 1868595. PMID 17520027.
Chou K.C. (1996). "Review: Prediction of human immunodeficiency virus protease cleavage sites in proteins". Analytical Biochemistry
233 (1): 1–14.doi:10.1006/abio.1996.0001. PMID 8789141.
Gan, Y. R., Huang, H., Huang, Y. D., Rao, C. M., Zhao, Y., Liu, J. S., Wu, L. & Wei, D. Q. (April 2006). "Synthesis and activity of an
octapeptide inhibitor designed for SARS coronavirus main proteinase". Peptides 27 (4): 622–625.doi:10.1016/j.peptides.2005.09.006.
PMID 16242214.
Du, Q. S., Wang, S., Wei, D. Q., Sirois, S. & Chou, K. C. (2005). "Molecular modelling and chemical modification for finding peptide
inhibitor against SARS CoV Mpro". Analytical Biochemistry 337 (2): 262–270. doi:10.1016/j.ab.2004.10.003.PMID 15691506.
Du, Q. S., Sun, H. & Chou, K. C. (2007). "Inhibitor design for SARS coronavirus main protease based on "distorted key theory"".
Medicinal Chemistry 3 (1): 1–6.doi:10.2174/157340607779317616. PMID 17266617.
Fersht, Alan (1985). Enzyme structure and mechanism. San Francisco: W.H. Freeman. pp. 50–2. ISBN 0-7167-1615-1.
Jencks, William P. (1987). Catalysis in chemistry and enzymology. Mineola, N.Y: Dover. ISBN 0-486-65460-5.
Villa J, Strajbl M, Glennon TM, Sham YY, Chu ZT, Warshel A (2000). "How important are entropic contributions to enzyme catalysis?".
Proc. Natl. Acad. Sci. U.S.A. 97(22): 11899–904. doi:10.1073/pnas.97.22.11899. PMC 17266. PMID 11050223.
Warshel A, Sharma PK, Kato M, Xiang Y, Liu H, Olsson MH (2006). "Electrostatic basis for enzyme catalysis". Chem. Rev. 106 (8):
3210–35. doi:10.1021/cr0503106.PMID 16895325.
Eisenmesser EZ, Bosco DA, Akke M, Kern D (2002). "Enzyme dynamics during catalysis". Science 295 (5559): 1520–3.
doi:10.1126/science.1066176.PMID 11859194.
Agarwal PK (2005). "Role of protein dynamics in reaction rate enhancement by enzymes". J. Am. Chem. Soc. 127 (43): 15248–56.
doi:10.1021/ja055251s.PMID 16248667.
Eisenmesser EZ, Millet O, Labeikovsky W (2005). "Intrinsic dynamics of an enzyme underlies catalysis". Nature 438 (7064): 117–21.
doi:10.1038/nature04105.PMID 16267559.
Yang LW, Bahar I (5 June 2005). "Coupling between catalytic site and collective dynamics: A requirement for mechanochemical activity of
enzymes". Structure 13 (6): 893–904. doi:10.1016/j.str.2005.03.015. PMC 1489920. PMID 15939021.
Agarwal PK, Billeter SR, Rajagopalan PT, Benkovic SJ, Hammes-Schiffer S. (5 March 2002). "Network of coupled promoting motions in
enzyme catalysis". Proc Natl Acad Sci USA. 99 (5): 2794–9. doi:10.1073/pnas.052005999. PMC 122427.PMID 11867722.
Agarwal PK, Geist A, Gorin A (2004). "Protein dynamics and enzymatic catalysis: investigating the peptidyl-prolyl cis-trans isomerization
activity of cyclophilin A".Biochemistry 43 (33): 10605–18. doi:10.1021/bi0495228. PMID 15311922.
Tousignant A, Pelletier JN. (2004). "Protein motions promote catalysis". Chem Biol. 11(8): 1037–42. doi:10.1016/j.chembiol.2004.06.007.
PMID 15324804
Flomenbom O, Velonia K, Loos D et al. (2005). "Stretched exponential decay and correlations in the catalytic activity of fluctuating single
lipase molecules". Proc. Natl. Acad. Sci. U.S.A. 102 (7): 2368–2372. doi:10.1073/pnas.0409039102.PMC 548972. PMID 15695587.
English BP, Min W, van Oijen AM et al. (2006). "Ever-fluctuating single enzyme molecules: Michaelis-Menten equation revisited". Nature
Chemical Biology 2 (2): 87–94.doi:10.1038/nchembio759. PMID 16415859.
Lu H, Xun L, Xie X S (1998). "Single-molecule enzymatic dynamics". Science 282(5395): 1877–1882.
doi:10.1126/science.282.5395.1877. PMID 9836635.
Olsson, MH; Parson, WW; Warshel, A (2006). "Dynamical Contributions to Enzyme Catalysis: Critical Tests of A Popular Hypothesis".
Chem. Rev. 106 (5): 1737–.
Neet KE (1995). "Cooperativity in enzyme function: equilibrium and kinetic aspects".Meth. Enzymol. Methods in Enzymology 249: 519–
67. doi:10.1016/0076-6879(95)49048-5. ISBN 978-0-12-182150-0. PMID 7791626.
Changeux JP, Edelstein SJ (2005). "Allosteric mechanisms of signal transduction".Science 308 (5727): 1424–8.
doi:10.1126/science.1108595. PMID 15933191.
de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Cofactor". International Union of Pure and Applied
Chemistry. Retrieved 30 October 2007.
de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Coenzyme". International Union of Pure and Applied
Chemistry. Retrieved 30 October 2007.
Fisher Z, Hernandez Prada JA, Tu C, Duda D, Yoshioka C, An H, Govindasamy L, Silverman DN and McKenna R. (2005). "Structural and
kinetic characterization of active-site histidine as a proton shuttle in catalysis by human carbonic anhydrase II".Biochemistry. 44 (4): 1097–
115. doi:10.1021/bi0480279. PMID 15667203.
Wagner, Arthur L. (1975). Vitamins and Coenzymes. Krieger Pub Co. ISBN 0-88275-258-8.
BRENDA The Comprehensive Enzyme Information System. Retrieved 4 April 2007.
Törnroth-Horsefield S, Neutze R (2008). "Opening and closing the metabolite gate".Proc. Natl. Acad. Sci. U.S.A. 105 (50): 19565–6.
doi:10.1073/pnas.0810654106.PMC 2604989. PMID 19073922.
Ferguson, S. J.; Nicholls, David; Ferguson, Stuart (2002). Bioenergetics 3 (3rd ed.). San Diego: Academic. ISBN 0-12-518121-3.
Henri, V. (1902). "Theorie generale de l'action de quelques diastases". Compt. Rend. Hebd. Acad. Sci. Paris 135: 916–9.
59.
60.
61.
62.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
77.
78.
84.
Sørensen,P.L. (1909). "Enzymstudien {II}. Über die Messung und Bedeutung der Wasserstoffionenkonzentration bei enzymatischen
Prozessen". Biochem. Z. 21: 131–304.
Michaelis L., Menten M. (1913). "Die Kinetik der Invertinwirkung". Biochem. Z. 49: 333–369. English translation. Retrieved 6 April 2007.
Briggs G. E., Haldane J. B. S. (1925). "A note on the kinetics of enzyme action".Biochem. J. 19 (2): 339–339. PMC 1259181. PMID
16743508.
Xue X, Liu F, Ou-Yang ZC (2006). "Single molecule Michaelis-Menten equation beyond quasistatic disorder". Phys. Rev. E 74 (3):
030902. doi:10.1103/PhysRevE.74.030902.PMID 17025584.
Radzicka A, Wolfenden R. (1995). "A proficient enzyme". Science 267 (5194): 90–931.doi:10.1126/science.7809611. PMID 7809611.
Ellis RJ (2001). "Macromolecular crowding: obvious but underappreciated". Trends Biochem. Sci. 26 (10): 597–604. doi:10.1016/S09680004(01)01938-7.PMID 11590012.
Kopelman R (1988). "Fractal Reaction Kinetics". Science 241 (4873): 1620–26.doi:10.1126/science.241.4873.1620. PMID 17820893.
Savageau MA (1995). "Michaelis-Menten mechanism reconsidered: implications of fractal kinetics". J. Theor. Biol. 176 (1): 115–24.
doi:10.1006/jtbi.1995.0181.PMID 7475096.
Schnell S, Turner TE (2004). "Reaction kinetics in intracellular environments with macromolecular crowding: simulations and rate laws".
Prog. Biophys. Mol. Biol. 85 (2–3): 235–60. doi:10.1016/j.pbiomolbio.2004.01.012. PMID 15142746.
Xu F, Ding H (2007). "A new kinetic model for heterogeneous (or spatially confined) enzymatic catalysis: Contributions from the fractal
and jamming (overcrowding) effects".Appl. Catal. A: Gen. 317 (1): 70–81. doi:10.1016/j.apcata.2006.10.014.
Garcia-Viloca M., Gao J., Karplus M., Truhlar D. G. (2004). "How enzymes work: analysis by modern rate theory and computer
simulations". Science 303 (5655): 186–95.doi:10.1126/science.1088172. PMID 14716003.
Olsson M. H., Siegbahn P. E., Warshel A. (2004). "Simulations of the large kinetic isotope effect and the temperature dependence of the
hydrogen atom transfer in lipoxygenase". J. Am. Chem. Soc. 126 (9): 2820–8. doi:10.1021/ja037233l.PMID 14995199.
Masgrau L., Roujeinikova A., Johannissen L. O., Hothi P., Basran J., Ranaghan K. E., Mulholland A. J., Sutcliffe M. J., Scrutton N. S.,
Leys D. (2006). "Atomic Description of an Enzyme Reaction Dominated by Proton Tunneling". Science 312 (5771): 237–
41.doi:10.1126/science.1126002. PMID 16614214.
Cleland, W.W. (1963). "The Kinetics of Enzyme-catalyzed Reactions with two or more Substrates or Products 2. {I}nhibition:
Nomenclature and Theory". Biochim. Biophys. Acta 67: 173–87.
Price, NC. (1979). "What is meant by 'competitive inhibition'?". Trends in Biochemical Sciences 4 (11): pN272. doi:10.1016/09680004(79)90205-6.
R Poulin; Lu, L; Ackermann, B; Bey, P; Pegg,
Yoshikawa S and Caughey WS. (15 May 1990). "Infrared evidence of cyanide binding to iron and copper sites in bovine heart cytochrome
c oxidase. Implications regarding oxygen reduction". J Biol Chem. 265 (14): 7945–58. PMID 2159465.
Hunter T. (1995). "Protein kinases and phosphatases: the yin and yang of protein phosphorylation and signaling". Cell. 80 (2): 225–36.
doi:10.1016/0092-8674(95)90405-0. PMID 7834742.
Berg JS, Powell BC, Cheney RE (1 April 2001). "A millennial myosin census". Mol. Biol. Cell 12 (4): 780–94. doi:10.1091/mbc.12.4.780.
PMC 32266.PMID 11294886.
Meighen EA (1 March 1991). "Molecular biology of bacterial bioluminescence".Microbiol. Rev. 55 (1): 123–42. PMC 372803. PMID
2030669.
Authors:
Anil Sai Bodepudi, Anil Kumar Kopparthy, Annavarapu Santosh Kumar
Paper Title:
Mobile Operated Control System for Humanoid Robot
Abstract: In this paper a control system is designed to operate a Humanoid Robot “Bioloid Premium” using DTMF
(Dual-Tone-Multiple- Frequency) technology of mobile phones for long range operations. The mobile phone with
the operator acts as a transmitter and the one attached to the Robot acts as a receiver and hence no additional
communication devices are required. The operator calls the mobile installed in the humanoid Robot which gets
activated through auto answering mode. In the course of a call, if any button is pressed, a DTMF tone corresponding
to the button pressed is heard at the other end of the call. The Humanoid Robot perceives this DTMF tone with the
help of the phone placed on it. The received tone is processed by the Arduino microcontroller with the help of DTMF
decoder. The decoder decodes the DTMF tone into its equivalent binary digit and the same is sent to the
microcontroller. The microcontroller is programmed to take a decision for any given input and outputs its decision to
the CM-530 controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to
motor driver in order to control the servo motors in required direction for human like moves. Auto answering video
calling is done in order to control the humanoid very easily and precisely. Experiment based on the DTMF has been
carried out which can be implemented in the humanoid robot for various applications like security or safety, defence,
assistance in medical and environmental hazards and other humanitarian services.
404-407
Keywords: Humanoid Robot, DTMF, Microcontroller.
References:
1.
2.
3.
4.
85.
Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oilphant, GSM and Personal Communications Handbook, Artech House Boston,
London, 1998 .
Sabuj Das Gupta, Arman Riaz Ochi, Mohammad Sakib Hossain,
Nahid
Alam
Siddique,
Designing
and Implementation
of Mobile Operated Toy Car by DTMF, International Journal of Scientific and Research Publications, Vol 3, Issue 1, pp 1-7, 2013.
4Online Available: www.natalnet.br/~aroca/afron/mt8870.pdf Online Available: http://www.arduino.cc/
Online Available: http://www.robotis.com/xe.
Authors:
Wail N. Al-Rifaie
Paper Title:
An Approximate Method for the Design of Ferrocement Beams
Abstract: A simple analytical model is proposed to design the ferrocement rectangular beam subjected to flexural
loading. The predicted results of cross sectional resistance moment obtained using the proposed model is compared
with ACI (trial and error) method. A parametric study was conducted to estimate the influence of volume fraction of
reinforcement and the depth of the beam. The comparison between the proposed and ACI methods was quite
satisfactory.
Keywords: Frrocement, pre-fabricated building, moment, eco-housing.
References:
1.
IFS Committees 10, 2001”Ferrocement Model Code,” Building Code Recommendations for Ferrocement (IFS 10-01).
408-410
2.
3.
ACI Publication SP.61, 1979 “Ferrocement–Materials and Applications”, pp 1-195.
ACI committee 549, 1980, “Guide for the Design, Construction, and Repair of Ferrocement” ACI Structural Journal, May. June, pp 325-351.