Untitled - International Journal of Engineering and Advanced
Transcription
Untitled - International Journal of Engineering and Advanced
Editor In Chief Dr. Shiv K Sahu Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT) Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India Dr. Shachi Sahu Ph.D. (Chemistry), M.Sc. (Organic Chemistry) Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India Vice Editor In Chief Dr. Vahid Nourani Professor, Faculty of Civil Engineering, University of Tabriz, Iran Prof.(Dr.) Anuranjan Misra Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University, Noida (U.P.), India Chief Advisory Board Prof. (Dr.) Hamid Saremi Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran Dr. Uma Shanker Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India Dr. Rama Shanker Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea Dr. Vinita Kumari Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India Dr. Kapil Kumar Bansal Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE, Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical Education (ISTE), Indian Science Congress Association Kolkata. Dr. Vijay Anant Athavale Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India Dr. T.C. Manjunath Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India Dr. Kosta Yogeshwar Prasad Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot, Gujarat, India Dr. Dinesh Varshney Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India Dr. P. Dananjayan Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India Dr. Sadhana Vishwakarma Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India Dr. Kamal Mehta Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India Dr. CheeFai Tan Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia Dr. Suresh Babu Perli Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India Dr. Binod Kumar Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest International University, Ipoh, Perak, Malaysia Dr. Chiladze George Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia Dr. Kavita Khare Professor, Department of Electronics & Communication Engineering., MANIT, Bhopal (M.P.), INDIA Dr. C. Saravanan Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India Dr. S. Saravanan Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India Dr. Amit Kumar Garg Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana, Ambala (Haryana), India Dr. T.C.Manjunath Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India Dr. P. Dananjayan Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India Dr. Kamal K Mehta Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India Dr. Rajiv Srivastava Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India Dr. Chakunta Venkata Guru Rao Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India Dr. Anuranjan Misra Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad, India Dr. Robert Brian Smith International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie Centre, North Ryde, New South Wales, Australia Dr. Saber Mohamed Abd-Allah Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai, China Dr. Himani Sharma Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal, Hyderabad, India Dr. Sahab Singh Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida, India Dr. Umesh Kumar Principal: Govt Women Poly, Ranchi, India Dr. Syed Zaheer Hasan Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India. Dr. Jaswant Singh Bhomrah Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India Technical Advisory Board Dr. Mohd. Husain Director. MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India Dr. T. Jayanthy Principal. Panimalar Institute of Technology, Chennai (TN), India Dr. Umesh A.S. Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India Dr. B. Kanagasabapathi Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City, Bangalore, India Dr. C.B. Gupta Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India Dr. Sunandan Bhunia Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Jaydeb Bhaumik Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Rajesh Das Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Mrutyunjaya Panda Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India Dr. Mohd. Nazri Ismail Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia Dr. Haw Su Cheng Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya Dr. Hossein Rajabalipour Cheshmehgaz Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (UTM) 81310, Skudai, Malaysia Dr. Sudhinder Singh Chowhan Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India Dr. Neeta Sharma Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India Dr. Ashish Rastogi Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India Dr. Santosh Kumar Nanda Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa), India Dr. Hai Shanker Hota Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India Dr. Sunil Kumar Singla Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India Dr. A. K. Verma Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India Dr. Durgesh Mishra Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India Dr. Xiaoguang Yue Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China Dr. Veronica Mc Gowan Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman China Dr. Mohd. Ali Hussain Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry (A.P.), India Dr. Mohd. Nazri Ismail Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA Dr. Sunil Mishra Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon (Haryana), India Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology, Mansoura City, Egypt Dr. Pavol Tanuska Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia Dr. VS Giridhar Akula Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India Dr. S. Satyanarayana Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India Dr. Bhupendra Kumar Sharma Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India Dr. Praveen Agarwal Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India Dr. Manoj Kumar Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India Dr. Shaikh Abdul Hannan Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad (Maharashtra), India Dr. K.M. Pandey Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India Prof. Pranav Parashar Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India Dr. Biswajit Chakraborty MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India Dr. D.V. Ashoka Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India Dr. Sasidhar Babu Suvanam Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering, Kadayiuruppu, Kolenchery, Kerala, India Dr. C. Venkatesh Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India Dr. Nilay Khare Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India Dr. Sandra De Iaco Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy Dr. Yaduvir Singh Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad, Lucknow (U.P.), India Dr. Angela Amphawan Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia Dr. Ashwini Kumar Arya Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era University, Dehradun (U.K.), India Dr. Yash Pal Singh Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET, Chandok, Bijnor, (U.P.), India Dr. Ashish Jain Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida (U.P.), India Dr. Abhay Saxena Associate Professor&Head, Department. of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India Dr. Judy. M.V Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham, Brahmasthanam, Edapally, Cochin, Kerala, India Dr. Sangkyun Kim Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea Dr. Sanjay M. Gulhane Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, Maharastra, India Dr. K.K. Thyagharajan Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar, Thiruyallur, Tamil Nadu, India Dr. P. Subashini Asso. Professor, Department of Computer Science, Coimbatore, India Dr. G. Srinivasrao Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India Dr. Rajesh Verma Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology & Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India Dr. Pawan Kumar Shukla Associate Professor, Satya College of Engineering & Technology, Haryana, India Dr. U C Srivastava Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India Dr. Reena Dadhich Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India Dr. Aashis.S.Roy Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India Dr. Sudhir Nigam Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal, (M.P.), India Dr. S.Senthilkumar Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering, Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561756, South Korea Tamilnadu, India Dr. Gufran Ahmad Ansari Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of Saudi Arabia (KSA) Dr. R.Navaneethakrishnan Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India Dr. Hossein Rajabalipour Cheshmejgaz Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai, Malaysia Dr. Veronica McGowan Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman China Dr. Sanjay Sharma Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India Dr. Taghreed Hashim Al-Noor Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq Dr. Madhumita Dash Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India Dr. Anita Sagadevan Ethiraj Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore Institute of Technology (VIT) University, Tamilnadu, India Dr. Sibasis Acharya Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074, Queensland, Australia Dr. Neelam Ruhil Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India Dr. Faizullah Mahar Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan Dr. K. Selvaraju Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu, India Dr. M. K. Bhanarkar Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India Dr. Sanjay Hari Sawant Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India Dr. Arindam Ghosal Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida, India Dr. M. Chithirai Pon Selvan Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology, Amity University, Dubai, UAE Dr. S. Sambhu Prasad Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India. Dr. Muhammad Attique Khan Shahid Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science, Faisalabad. Dr. Kuldeep Pareta Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India Dr. Th. Kiranbala Devi Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India Dr. Nirmala Mungamuru Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia Dr. Srilalitha Girija Kumari Sagi Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India Dr. Vishnu Narayan Mishra Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas Road, Surat (Gujarat), India Dr. Yash Pal Singh Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India. Dr. Sripada Rama Sree Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Andhra Pradesh. India. Dr. Rustom Mamlook Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East. Dr. Ramzi Raphael Ibraheem Al Barwari Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil – Kurdistan, Erbil Iraq. Dr. Kapil Chandra Agarwal H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University, Jai Bheem Nagar, Meerut, (U.P). India. Dr. Anil Kumar Tripathy Associate Professor, Department of Environmental Science & Engineering, Ghanashyama Hemalata Institute of Technology and Management, Puri Odisha, India. Managing Editor Mr. Jitendra Kumar Sen International Journal of Engineering and Advanced Technology (IJEAT) Editorial Board Dr. Soni Changlani Professor, Department of Electronics & Communication, Lakshmi Narain College of Technology & Science, Bhopal (.M.P.), India Dr. M .M. Manyuchi Professor, Department Chemical and Process Systems Engineering, Lecturer-Harare Institute of Technology, Zimbabwe Dr. John Kaiser S. Calautit Professor, Department Civil Engineering, School of Civil Engineering, University of Leeds, LS2 9JT, Leeds, United Kingdom Dr. Audai Hussein Al-Abbas Deputy Head, Department AL-Musaib Technical College/ Foundation of Technical Education/Babylon, Iraq Dr. Şeref Doğuşcan Akbaş Professor, Department Civil Engineering, Şehit Muhtar Mah. Öğüt Sok. No:2/37 Beyoğlu Istanbul, Turkey Dr. H S Behera Associate Professor, Department Computer Science & Engineering, Veer Surendra Sai University of Technology (VSSUT) A Unitary Technical University Established by the Government of Odisha, India Dr. Rajeev Tiwari Associate Professor, Department Computer Science & Engineering, University of Petroleum & Energy Studies (UPES), Bidholi, Uttrakhand, India Dr. Piyush Kumar Shukla Assoc. Professor, Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal (M.P.), India Dr. Piyush Lotia Assoc.Professor, Department of Electronics and Instrumentation, Shankaracharya College of Engineering and Technology, Bhilai (C.G.), India Dr. Asha Rai Assoc. Professor, Department of Communication Skils, Technocrat Institute of Technology, Bhopal (M.P.), India Dr. Vahid Nourani Assoc. Professor, Department of Civil Engineering, University of Minnesota, USA Dr. Hung-Wei Wu Assoc. Professor, Department of Computer and Communication, Kun Shan University, Taiwan Dr. Vuda Sreenivasarao Associate Professor, Department of Computr And Information Technology, Defence University College, Debrezeit Ethiopia, India Dr. Sanjay Bhargava Assoc. Professor, Department of Computer Science, Banasthali University, Jaipur, India Dr. Sanjoy Deb Assoc. Professor, Department of ECE, BIT Sathy, Sathyamangalam, Tamilnadu, India Dr. Papita Das (Saha) Assoc. Professor, Department of Biotechnology, National Institute of Technology, Duragpur, India Dr. Waail Mahmod Lafta Al-waely Assoc. Professor, Department of Mechatronics Engineering, Al-Mustafa University College – Plastain Street near AL-SAAKKRA square- Baghdad - Iraq Dr. P. P. Satya Paul Kumar Assoc. Professor, Department of Physical Education & Sports Sciences, University College of Physical Education & Sports Sciences, Guntur Dr. Sohrab Mirsaeidi Associate Professor, Department of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia Dr. Ehsan Noroozinejad Farsangi Associate Professor, Department of Civil Engineering, International Institute of Earthquake Engineering and Seismology (IIEES) Farmanieh, Tehran - Iran Dr. Omed Ghareb Abdullah Associate Professor, Department of Physics, School of Science, University of Sulaimani, Iraq Dr. Khaled Eskaf Associate Professor, Department of Computer Engineering, College of Computing and Information Technology, Alexandria, Egypt Dr. Nitin W. Ingole Associate Professor & Head, Department of Civil Engineering, Prof Ram Meghe Institute of Technology and Research, Badnera Amravati Dr. P. K. Gupta Associate Professor, Department of Computer Science and Engineering, Jaypee University of Information Technology, P.O. Dumehar Bani, Solan, India Dr. P.Ganesh Kumar Associate Professor, Department of Electronics & Communication, Sri Krishna College of Engineering and Technology, Linyi Top Network Co Ltd Linyi , Shandong Provience, China Dr. Santhosh K V Associate Professor, Department of Instrumentation and Control Engineering, Manipal Institute of Technology, Manipal, Karnataka, India Dr. Subhendu Kumar Pani Assoc. Professor, Department of Computer Science and Engineering, Orissa Engineering College, India Dr. Syed Asif Ali Professor/ Chairman, Department of Computer Science, SMI University, Karachi, Pakistan Dr. Vilas Warudkar Assoc. Professor, Department of Mechanical Engineering, Maulana Azad National Institute of Technology, Bhopal, India Dr. S. Chandra Mohan Reddy Associate Professor & Head, Department of Electronics & Communication Engineering, JNTUA College of Engineering (Autonomous), Cuddapah, Andhra Pradesh, India Dr. V. Chittaranjan Das Associate Professor, Department of Mechanical Engineering, R.V.R. & J.C. College of Engineering, Guntur, Andhra Pradesh, India Dr. Jamal Fathi Abu Hasna Associate Professor, Department of Electrical & Electronics and Computer Engineering, Near East University, TRNC, Turkey Dr. S. Deivanayaki Associate Professor, Department of Physics, Sri Ramakrishna Engineering College, Tamil Nadu, India Dr. Nirvesh S. Mehta Professor, Department of Mechanical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, South Gujarat, India Dr. A.Vijaya Bhasakar Reddy Associate Professor, Research Scientist, Department of Chemistry, Sri Venkateswara University, Andhra Pradesh, India Dr. C. Jaya Subba Reddy Associate Professor, Department of Mathematics, Sri Venkateswara University Tirupathi Andhra Pradesh, India Dr. TOFAN Cezarina Adina Associate Professor, Department of Sciences Engineering, Spiru Haret University, Arges, Romania Dr. Balbir Singh Associate Professor, Department of Health Studies, Human Development Area, Administrative Staff College of India, Bella Vista, Andhra Pradesh, India Dr. D. RAJU Associate Professor, Department of Mathematics, Vidya Jyothi Institute of Technology (VJIT), Aziz Nagar Gate, Hyderabad, India Dr. Salim Y. Amdani Associate Professor & Head, Department of Computer Science Engineering, B. N. College of Engineering, PUSAD, (M.S.), India Dr. K. Kiran Kumar Associate Professor, Department of Information Technology, Bapatla Engineering College, Andhra Pradesh, India Dr. Md. Abdullah Al Humayun Associate Professor, Department of Electrical Systems Engineering, University Malaysia Perlis, Malaysia Dr. Vellore Vasu Teaching Assistant, Department of Mathematics, S.V.University Tirupati, Andhra Pradesh, India Dr. Naveen K. Mehta Associate Professor & Head, Department of Communication Skills, Mahakal Institute of Technology, Ujjain, India Dr. Gujar Anant kumar Jotiram Associate Professor, Department of Mechanical Engineering, Ashokrao Mane Group of Institutions, Vathar, Maharashtra, India Dr. Pratibhamoy Das Scientist, Department of Mathematics, IMU Berlin Einstein Foundation Fellow Technical University of Berlin, Germany Dr. Messaouda AZZOUZI Associate Professor, Department of Sciences & Technology, University of Djelfa, Algeria Dr. Vandana Swarnkar Associate Professor, Department of Chemistry, Jiwaji University Gwalior, India Dr. Arvind K. Sharma Associate Professor, Department of Computer Science Engineering, University of Kota, Kabir Circle, Rajasthan, India Dr. R. Balu Associate Professor, Department of Computr Applications, Bharathiar University, Tamilnadu, India Dr. S. Suriyanarayanan Associate Professor, Department of Water and Health, Jagadguru Sri Shivarathreeswara University, Karnataka, India Dr. Dinesh Kumar Associate Professor, Department of Mathematics, Pratap University, Jaipur, Rajasthan, India Dr. Sandeep N Associate Professor, Department of Mathematics, Vellore Institute of Technology, Tamil Nadu, India Dr. Dharmpal Singh Associate Professor, Department of Computer Science Engineering, JIS College of Engineering, West Bengal, India Dr. Farshad Zahedi Associate Professor, Department of Mechanical Engineering, University of Texas at Arlington, Tehran, Iran Dr. Atishey Mittal Associate Professor, Department of Mechanical Engineering, SRM University NCR Campus Meerut Delhi Road Modinagar, Aligarh, India Dr. Hussein Togun Associate Professor, Department of Mechanical Engineering, University of Thiqar, Iraq Dr. Shrikaant Kulkarni Associate Professor, Department of Senior faculty V.I.T., Pune (M.S.), India Dr. Mukesh Negi Project Manager, Department of Computer Science & IT, Mukesh Negi, Project Manager, Noida, India Dr. Sachin Madhavrao Kanawade Associate Professor, Department Chemical Engineering, Pravara Rural Education Society’s,Sir Visvesvaraya Institute of Technology, Nashik, India Dr. Ganesh S Sable Professor, Department of Electronics and Telecommunication, Maharashtra Institute of Technology Satara Parisar, Aurangabad, Maharashtra, India Dr. T.V. Rajini Kanth Professor, Department of Computer Science Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India Dr. Anuj Kumar Gupta Associate Professor, Department of Computer Science & Engineering, RIMT Institute of Engineering & Technology, NH-1, Mandi Godindgarh, Punjab, India Dr. Hasan Ashrafi- Rizi Associate Professor, Medical Library and Information Science Department of Health Information Technology Research Center, Isfahan University of Medical Sciences, Isfahan, Iran Dr. Golam Kibria Associate Professor, Department of Mechanical Engineering, Aliah University, Kolkata, India Dr. Mohammad Jannati Professor, Department of Energy Conversion, UTM-PROTON Future Drive Laboratory, Faculty of Electrical Enginering, Universit Teknologi Malaysia, Dr. Mohammed Saber Mohammed Gad Professor, Department of Mechanical Engineering, National Research Centre- El Behoos Street, El Dokki, Giza, Cairo, Egypt, Dr. V. Balaji Professor, Department of EEE, Sapthagiri College of Engineering Periyanahalli,(P.O) Palacode (Taluk) Dharmapuri, Dr. Naveen Beri Associate Professor, Department of Mechanical Engineering, Beant College of Engg. & Tech., Gurdaspur - 143 521, Punjab, India Dr. Abdel-Baset H. Mekky Associate Professor, Department of Physics, Buraydah Colleges Al Qassim / Saudi Arabia Dr. T. Abdul Razak Associate Professor, Department of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli – 620 020 India Dr. Preeti Singh Bahadur Associate Professor, Department of Applied Physics Amity University, Greater Noida (U.P.) India Dr. Ramadan Elaiess Associate Professor, Department of Information Studies, Faculty of Arts University of Benghazi, Libya Dr. R . Emmaniel Professor & Head, Department of Business Administration ST, ANN, College of Engineering & Technology Vetapaliem. Po, Chirala, Prakasam. DT, AP. India Dr. C. Phani Ramesh Director cum Associate Professor, Department of Computer Science Engineering, PRIST University, Manamai, Chennai Campus, India Dr. Rachna Goswami Associate Professor, Department of Faculty in Bio-Science, Rajiv Gandhi University of Knowledge Technologies (RGUKT) DistrictKrishna, Andhra Pradesh, India Dr. Sudhakar Singh Assoc. Prof. & Head, Department of Physics and Computer Science, Sardar Patel College of Technology, Balaghat (M.P.), India Dr. Xiaolin Qin Associate Professor & Assistant Director of Laboratory for Automated Reasoning and Programming, Chengdu Institute of Computer Applications, Chinese Academy of Sciences, China Dr. Maddila Lakshmi Chaitanya Assoc. Prof. Department of Mechanical, Pragati Engineering College 1-378, ADB Road, Surampalem, Near Peddapuram, East Godavari District, A.P., India Dr. Jyoti Anand Assistant Professor, Department of Mathematics, Dronacharya College of Engineering, Gurgaon, Haryana, India Dr. Nasser Fegh-hi Farahmand Assoc. Professor, Department of Industrial Management, College of Management, Economy and Accounting, Tabriz Branch, Islamic Azad University, Tabriz, Iran Dr. Ravindra Jilte Assist. Prof. & Head, Department of Mechanical Engineering, VCET Vasai, University of Mumbai , Thane, Maharshtra 401202, India Dr. Sarita Gajbhiye Meshram Research Scholar, Department of Water Resources Development & Management Indian Institute of Technology, Roorkee, India Dr. G. Komarasamy Associate Professor, Senior Grade, Department of Computer Science & Engineering, Bannari Amman Institute of Technology, Sathyamangalam,Tamil Nadu, India Dr. P. Raman Professor, Department of Management Studies, Panimalar Engineering College Chennai, India Dr. M. Anto Bennet Professor, Department of Electronics & Communication Engineering, Veltech Engineering College, Chennai, India Dr. P. Keerthika Associate Professor, Department of Computer Science & Engineering, Kongu Engineering College Perundurai, Tamilnadu, India Dr. Santosh Kumar Behera Associate Professor, Department of Education, Sidho-Kanho-Birsha University, Ranchi Road, P.O. Sainik School, Dist-Purulia, West Bengal, India Dr. P. Suresh Associate Professor, Department of Information Technology, Kongu Engineering College Perundurai, Tamilnadu, India Dr. Santosh Shivajirao Lomte Associate Professor, Department of Computer Science and Information Technology, Radhai Mahavidyalaya, N-2 J sector, opp. Aurangabad Gymkhana, Jalna Road Aurangabad, India Dr. Altaf Ali Siyal Professor, Department of Land and Water Management, Sindh Agriculture University Tandojam, Pakistan Dr. Mohammad Valipour Associate Professor, Sari Agricultural Sciences and Natural Resources University, Sari, Iran Dr. Prakash H. Patil Professor and Head, Department of Electronics and Tele Communication, Indira College of Engineering and Management Pune, India Dr. Smolarek Małgorzata Associate Professor, Department of Institute of Management and Economics, High School of Humanitas in Sosnowiec, Wyższa Szkoła Humanitas Instytut Zarządzania i Ekonomii ul. Kilińskiego Sosnowiec Poland, India Dr. Umakant Vyankatesh Kongre Associate Professor, Department of Mechanical Engineering, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal, Maharashtra, India Dr. Niranjana S Associate Professor, Department of Biomedical Engineering, Manipal Institute of Technology (MIT) Manipal University, Manipal, Karnataka, India Dr. Naseema Khatoon Associate Professor, Department of Chemistry, Integral University Lucknow (U.P), India Dr. P. Samuel Associate Professor, Department of English, KSR College of Engineering Tiruchengode – 637 215 Namakkal Dt. Tamilnadu, India Dr. Mohammad Sajid Associate Professor, Department of Mathematics, College of Engineering Qassim University Buraidah 51452, Al-Qassim Saudi Arabia Dr. Sanjay Pachauri Associate Professor, Department of Computer Science & Engineering, IMS Unison University Makkawala Greens Dehradun-248009 (UK) Dr. S. Kishore Reddy Professor, Department of School of Electrical & Computer Engineering, Adama Science & Technology University, Adama Dr. Muthukumar Subramanyam Professor, Department of Computer Science & Engineering, National Institute of Technology, Puducherry, India Dr. Latika Kharb Associate Professor, Faculty of Information Technology, Jagan Institute of Management Studies (JIMS), Rohini, Delhi, India Dr. Kusum Yadav Associate Professor, Department of Information Systems, College of Computer Engineering & Science Salman bin Abdulaziz University, Saudi Arabia Dr. Preeti Gera Assoc. Professor, Department of Computer Science & Engineering, Savera Group of Institutions, Farrukh Nagar, Gurgaon, India Dr. Ajeet Kumar Associate Professor, Department of Chemistry and Biomolecular Science, Clarkson University 8 Clarkson Avenue, New York Dr. M. Jinnah S Mohamed Associate Professor, Department of Mechanical Engineering, National College of Engineering, Maruthakulam.Tirunelveli, Tamil Nadu, India Dr. Mostafa Eslami Assistant Professor, Department of Mathematics, University of Mazandaran Babolsar, Iran Dr. Akram Mohammad Hassan Elentably Professor, Department of Economics of Maritime Transport, Faculty of Maritime Studies, Ports & Maritime Transport, King AbdulAziz University Dr. Ebrahim Nohani Associate Professor, Department of Hydraulic Structures, Dezful Branch, Islamic Azad University, Dezful, Iran Dr. Aarti Tolia Faculty, Prahaldbhai Dalmia Lions College of Commerce & Economics, Mumbai, India Dr. Ramachandra C G Professor & Head, Department of Marine Engineering, Srinivas Institute of Technology, Valachil, Mangalore-574143, India Dr. G. Anandharaj Associate Professor, Department of M.C.A, Ganadipathy Tulsi's Jain Engineering College, Chittoor- Cuddalore Road, Kaniyambadi, Vellore, Tamil Nadu, India Volume-3 Issue-4, April 2014, ISSN: 2249-8958 (Online) S. No Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Authors: T.S.Keerthiga, S.Sarika Paper Title: Data Hiding and Secured Data Storage with Access Control towards Multiparty Protocols Page No. Abstract: Secure multiparty protocols is used as third party protocols in the data hiding and security. The major problem is, there is no Security Scheme operated for Data Storage Services between Multi Party protocols. To overcome this look-ahead approach, specifically for secure multiparty protocols to achieve distributed k-anonymity, which helps parties to decide if the utility benefit from the protocol is within an acceptable range before initiating the protocol. The look-ahead operation is highly localized and its accuracy depends on the amount of information. The system deals with Generalization approach, with a common Identification. Suppression approach, used for Hiding User Identity. In the secure random key algorithm, an Authentication Key is generated before a user change/update the data for Verification. Entire Data is encrypted to ensure Security. Keywords: Security, Privacy, k-anonymity, Multi Party protocols. 1. References: 1. 2. 3. 4. 5. 6. 7. Mehmet Ercan Nergiz,Abdullah Ercument Cicek,Thomas B.Pedersen,and Yucel Saygin,”A Look-Ahead Approach to Secure Multiparty Protocols”,IEEE Transactions on knowledge and data engineering,VOL.24,NO.7,JULY 2012. M.Kantarclu and C.Clifton, “Privacy-Preserving Distributed Mining of association Rules on Horizontally Partitioned Data,”IEEE Trans. Knowledge and Data Eng., vol. 16, no. 9,pp. 1026-1037,Sept. 2004. R.C.-W. Wong, J. Li, A.W.-C. Fu, and K. Wang, “(α, k)-Anonymity:An Enhanced K-Anonymity Model for Privacy Preserving Data Publishing,” Proc. 12th ACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining (KDD ’06), pp. 754-759, 2006. B.-C. Chen, K. LeFevre, and R. Ramakrishnan,“Privacy Skyline:Privacy with Multidimensional Adversarial Knowledge,” Proc.33rd Int’l Conf. Very Large Data Bases (VLDB ’07), pp. 770-781, 2007. S.R. Ganta, S.P. Kasiviswanathan, and A. Smith, “CompositionAttacks and Auxiliary Information in Data Privacy,” Proc. 14thACM SIGKDD Int’l Conf. Knowledge Discovery and Data Mining(KDD ’08), pp. 265-273, http://doi.acm.org/10.1145/1401890.1401926, 2008. G.Ghinita,P.Karras,P.Kalnis,and N.Mamoulis,”Fast Data Anonymization with Low Information Loss”,Proc.33rd Int’l conf.Very Large Data Bases(VLDB’07),PP.758-769,2007. M.E.Nergiz,M.Atzori,andC.Clifton,”Hiding the presence of individuals in Shared Databases”,Proc.ACM SIGMOD Int’l Conf.Management of Data(SIGMOD’07),June-2007 1-3 Authors: T. Hemanth Kumar, P. Swaminathan, M. Mohanraj Paper Title: Modeling and Simulation of an Intelligent Power Conversion System for Photovoltaic Generation Abstract: This paper represents a simulation and design of two types of Maximum Power Point Tracking (MPPT) algorithm methods is proposed. Here the PV system is composed to a boost converter which can perform with those algorithm methods. In this the algorithm methods are Perturb and Observe (P&O) and Probability of Neural Network (PNN). The probability of neural network which can be deals with the neurons and can be included the neural based Maximum Power Point Tracking. By using these different MPPT techniques we can maximize the PV array output which can be track continuously from the solar panel’s temperature and irradiation. These MPPT techniques can be explained by using the MATLAB. Keywords: Solar Module, Maximum Power Point Tracking (MPPT), Perturb and Observe (P&O) and Probability of Neural Network (PNN). 2. References: 1. 2. 3. 4. 5. 6. 7. 8. Samer Alsadi, Basim Alsayid "Maximum Power Point Tracking Simulation for Photovoltaic Systems Using Perturb and Observe Algorithm" International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012. David Sanz Morales "Maximum Power PointTracking Algorithms for Photovoltaic Applications"Thesis submitted for examination for the degree ofMaster of Science in Technology. Espoo 14.12.2010. J. Surya Kumari and Ch. Sai Babu Mathematical Modeling and Simulation of Photovoltaic Cell using Matlab-Simulink Environment International Journal of Electrical and Computer Engineering (IJECE) Vol. 2, No. 1, February 2012, pp. 26~34. M.Lokanadham, K.Vijaya Bhaskar / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012, pp.1420-1424. M.C. Di Piazza, M. Pucci, G. Vitale ConsiglioNazionale delle Ricerche, Istituto di Studi sui Sistemi Intelligenti per l'Automazione (ISSIA CNR), sezione di Palermo, via Dante 12, 90141 Palermo, Italy. Donald F . Specht "Probabilistic Neural Network" Neural Networks, Vol. 3, pp. 109-118, 1990 Mahmoud A. younis, Tamer khatib, Mushtaq najeeb, A Mohd ariffin przegl?d elektrotechniczny (Electrical Review), ISSN 0033-2097, R. 88 NR 3b/2012. Vincent Cheung, Kevin Cannons, Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba June 10, 2002. Authors: 3. 4-8 Khalilimard, Hussein How Construction Errors Affecting the Bearing Capacity of the Concrete Beams? Inelastic Deflection Paper Title: of Concrete I-Beams Abstract: Reinforced concrete I-beams are widely used in bridge construction. The span length to beam height ratio in these decks is sometimes between 15 and 30. Due to the widespread utilization of these bridges and their heavy traffic loads, special attention must be directed at recognizing the behaviors that lead to construction errors associated with these structures. Because of various construction and environmental factors, construction faults might 9-16 result in concrete quality or during concrete placement which can consequently lead to inhomogeneities in beam sections. This means that concrete density and compressive strength in the beam cross section might deteriorate along the section height. Extensive research has been conducted on the non-linear and inhomogeneous behavior of concrete beams. However, few researchers have specifically addressed density and compressive strength variations along beam cross sections. The present research is aimed at estimating from elastic material parameters, the concrete I-beam inelastic deflection resulting from inhomogeneous behavior along the beam cross sectional height. The behavior of the beam under study was checked by comparing its relevant parameters with the results obtained from the OpenSees Software and the method proposed in the Concrete Code ACI318. Excellent agreement was observed in both cases. Moreover, a value of unity was proposed for parameter “n” in the relation set forth by Branson in the Concrete Code ACI318 for estimating section cracking moment in long span I-beams. Keywords: Inelastic Deflection, Concrete Beam, Inhomogeneity, Cracked section, Construction errors. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 4. Joseph E. Wickline (2002) "A Study of Effective Moment of Inertia Models For Full-Scale Reinforced Concrete T-Beams Subjected To a Tandem-Axle Load Configuration Y.Y. Chang1, et. al. (2004) "A Simplified Method For Nonlinear Cyclic Analysis of Reinforced Concrete Structures: Direct And Energy Based Formulations", 13th World Conference on Earthquake Engineering, Vancouver, B.C., Canada, Paper No. 2830. Abd El Aziz, Mohamad Fathy. (2006) "Non-linear analysis of concrete beams prestressed and post-tensioned with carbon fiber reinforced polymer (CFRP) bars", Electronic Theses and Dissertations. Cengiz Dundar, Ilker Fatih Kara (2007) "Three dimensional analysis of reinforced concrete frames with cracked beam and column elements", Engineering Structures 29, 2262–2273. Bischoff, P. H. and Scanlon, A. (2007) “Effective Moment of Inertia for Calculating Deflections of Concrete Members Containing Steel Reinforcement and Fiber-Reinforced Polymer Reinforcement”, ACI Structural Journal, Vol. 104, No. 1, pp. 68-75. ACI-CRC Final Report (2008) “A Study of Static and Dynamic Modulus of Elasticity of Concrete”. M. Ahmed et. al. (2008) "Effect of Concrete Cracking on The Lateral Response of RCC Buildings", Asian Journal of Civil Engineering (building and housing) Vol. 9, No. 1 (2008), pp. 25-34. İlker Kalkan (2010) "Deflection Prediction for Reinforced Concrete Beams Through Different Effective Moment of Inertia Expressions", Int. J. Eng. Research & Development, Vol. 2, No. 1. Bischoff, P. H., and Gross, S. P. (2011) “Equivalent moment of inertia based on integration of curvature.” Journal of Compos. Constr., 15(3), 263–273. Kulkarni S.K. et. al. (2012) "Elastic Properties of RCC Under Flexural Loading-FE Approach", World Research Journal of Civil Engineering, ISSN: 2277-5986 & E-ISSN: 2277-5994, Vol. 2, Issue 1, 2012, pp.-30-33. S. Roohollah Mousavi and M. Reza Esfahani (2012), "Effective Moment of Inertia Prediction of FRP-Reinforced Concrete Beams Based on Experimental Results", Journal of Composites For Construction © ASCE / September/October 2012 16:490-498. Jing Bo An (2012) "Nonlinear Analysis for Bending Cross Section of Tensile-Compression Prestressed Concrete Beam", Applied Mechanics and Materials, 204-208, 4538. Amadio, Claudio et. al. (2012) "Evaluation of the deflection of steel-concrete composite beams at serviceability limit state", Journal of constructional steel research, Vol. 73 , p. 95-104. ISSN 1873-5983. Lin, X. and Zhang, Y. (2013) "Novel Composite Beam Element with Bond-Slip for Nonlinear Finite-Element Analyses of Steel/FRPReinforced Concrete Beams", J. Struct. Eng. , 10.1061/(ASCE)ST.1943-541X.0000829 , 06013003. Shahida Manzoor, Shuaib Ahmad (2013) "Ductility of RC Beams using Grade 72.5 Re-bar Steel", International Journal of Civil & Environmental Engineering IJCEE-IJENS Vol:13 No:03, p 5-8. Naser Kabashi et al., (2013) "Behaviour of concrete elements under the transversal forces and strengthening with the FRP", 2nd International Balkans Conference on Challenges of Civil Engineering, BCCCE, Epoka University, Tirana, Albania. Alameer Ali (2013) "Behaviour of Prestressed Ultra-High Performance Concrete I-Beams Subjected to Shear and Flexure", A thesis submitted to the Faculty of Graduate and Postdoctoral Studies, University of Ottawa, Canada S. B. Kandekar et. al. (2013) "Concrete Grade Variation in Tension and Compression Zones of RCC Beams", International Journal of Innovative Research in Science, Engineering and Technology, ISSN: 2319-8753, Vol. 2, Issue 8 Md Shahnewazv (2013) "Shear Behavior of Reinforced Concrete Deep Beams Under Static and Dynamic Loads", Bangladesh University of Engineering and Technology. Patel, Vipulkumar Ishvarbhai (2013) "Nonlinear inelastic analysis of concrete-filled steel tubular slender beam-columns", PhD thesis thesis, Victoria University. Amini Najafian H et. al. (2013) "Comparative assessment of finite element and strut and tie based design methods for deep beams", Magazine of Concrete Research, Vol:65, ISSN:0024-9831, Pages:970-986 Bukhari IA et al. (2013) "Shear Strengthening of Short Span Reinforced Concrete Beams with CFRP Sheets", Arabian Journal for Science and Engineering, Vol:38, ISSN:1319-8025, Pages:523-536 Stochino, Flavio (2013) "Flexural models of reinforced concrete beams under blast load", Doctoral Thesis, Universita' degli Studi di Cagliari. ACI 318 (2008) "Building Code Requirements for Reinforced Concrete and Commentary", American Concrete Institute, Michigan. Authors: D. Usha Nandini, Ezil Sam Leni, M. MariaNimmy Paper Title: Mining of High Utility Itemsets from Transactional Databases Abstract: Efficient discovery of high utility itemsets from transactional databases crucial task in data mining. UPGrowth and UP-Growth+ algorithms are proposed for mining high utility itemsets. In this paper we also proposed a compact tree structure, called Utility pattern tree (UP-Tree) and it maintains the information of high utility itemsets. Previously we proposed FP-Growth algorithm for mining only large number of frequent itemsets, but not generate the high utility itemsets. They have the issue of producing large number of candidate itemsets and probably it degrades mining performance in terms of speed and space requirement. However, our previous study needs more space and execution time. Many algorithms are used to show the performance of UP-Growth and UP-Growth+. UPGrowth and UP-Growth+ becomes more efficient since database contain long transactions and generate fewer number of candidates than FP-Growth. The experimental results and comparison validate its effectiveness. Keywords: Candidate pruning, Data mining, Frequent itemset, High utility itemset. References: 1. 2. 3. 4. R. Srikant and R. Agrawal, “Fast algorithms for mining association rules,” in Proc. of The 20th VLDB Conf,” pp. 487-499, 1994. R. Agrawal, Imielinski. T and A. Swami, “Mining association rules between sets of items in large databases”, in proceedings of the ACM SIGMOD International Conference on Management of data, pp. 207-216, 1993. R. Agrawal and R. Srikant, “Mining Sequential Patterns,” in Proc. of the 11th Int’l Conference on Data Engineering, pp. 3-14, Mar 1995. Liu. Y, Liao. W, A. Choudhary, ”A Fast High Utility Itemsets Mining Algorithm,” In: 1st Workshop on Utility-Based Data Mining. Chicago 17-21 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Illinois, 2005. A.W.C. Fu, C.H. Cai, C.H. Cheng, and W.W. Kwong, “Mining Association Rules with Weighted Items,” Proc. Int’l DB Engineering and Apps Symp. (IDEAS ’98), pp. 68-77, 1998. Tanbeer. S.K., C.F. Ahmed, and Y.-K. Lee, “Efficient Tree Structures for High Utility Pattern Mining in Incremental Databases,” IEEE Trans. Knowledge and Data Engineering, vol. 21, no. 12, pp. 1708-1721, Dec. 2009. J. Yang, W. Wang, and Yu. P, “Efficient Mining of Weighted Association Rules (WAR),” Proc. ACM SIGKDD Conference. Knowledge Discovery and Data Mining (KDD ‘00), pp. 270-274, 2000. Tao. F, Farid. M, and F. Murtagh, “Weighted Association Rule Mining Using Weighted Support and Significance Framework,” Proc. ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’03), pp. 661-666, 2003. Erwin. A, Gopalan. R.P, Achuthan. N.R., “A Bottom-Up Projection Based Set of rules for Mining High Utility Itemsets,” In: International Workshop on Integrating AI and Data Mining. Gold Coast, Australia, 2007. Tseng V.S, C.W. Wu, B.E. Shie, and P.S. Yu, “UP-Growth: An Efficient Algorithm for High Utility Itemsets Mining,” Proc. 16th ACM SIGKDD Conf. Knowledge Discovery and Data Mining (KDD ’10), pp. 253-262, 2010. Han. J, J. Pei, Yin. Y, “Mining frequent patterns without candidate generation,” In: ACM SIGMOD International Conference on Management of Data, 2000. S.J. Yen and Y.S. Lee, “Mining High Utility Quantitative Association Rules.” Proc. Ninth Int’l Conf. Data Warehousing and Knowledge Discovery (DWK), pp. 283-292, Sept. 2007. U. Yun, “An Efficient Mining of Weighted Frequent Patterns with Length Decreasing Support Constraints,” Knowledge-Based Systems, vol. 21, no. 8, pp. 741-752, Dec 2008. Y.-C. Li, C.C. Chang and J.S. Yeh, “Isolated Items Discarding Strategy for Discovering High Utility Itemsets,” Data and Knowledge Engineering, vol. 64, no. 1, pp. 198-217, (Jan 2008). http:// fimi.cs.helsinki.fi/, 2012.Frequent Itemset Mining Implementations Repository, Authors: P.Chandra Sekhar, M.V.Sai Tej, U.N.S.Vijayshri, J.Nitish Kumar Paper Title: Design and Implementation of Microwave Inverted ‘L’ and ‘J’ Filter Abstract: In this paper, a filter is proposed using micro strip, series of patch. S-parameters, return loss and VSWR are calculated for the filter. A reference filter is designed using a series of patches and is modified into an inverted L and J line filter (proposed filter). The proposed filter can be easily implemented and has excellent filter characteristics which are near to the ideal filter. There are many practical applications of this filter for example in microwave radio relay communication systems, radio astronomy, RADAR. The entire simulation is done using CST Microwave Studio. Keywords: Filter, micro strip, return loss, S-parameters, VSWR, transmission coefficient. References: 5. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. David M. Pozar, “Microwave Engineering”, John Wiley & Sons, Inc., Fourth Edition, 2011. Constantine A. Balanis, “Antenna Theory: Analysis and Design”, John Wiley & Sons, Inc., Second Edition, 1997. Mathew M. Radmanesh, “Advanced Rf & Microwave Circuit Design: The Ultimate Guide to Superior Design”, Author House, 2009. P. Chandra Sekhar, et.al, “Performance Evaluation of Various filters at X band Frequency”, 10th IEEE International conference on Wireless and Optical Communication Networks (WOCN)-2013, pp.1-5, July 2013. Lotfi Neyestanak A.A, “Ultra wideband rose leaf microstrip patch antenna,” Progress in Electromagnetic Research, Vol. 86, pp.155-168, 2008. Roger L Freeman, “Fundamentals of Telecommunications”, John Wiley & Sons, Second Edition. Aug 2013. Ian C Hunter, “Theory and Design of Microwave Filters”, The institution of Electrical Engineers, 2001. Bates, R. N, “Design of microstrip spur-line band-stop filters,” Microwave, Optics and Acoustics, Vol. 1, No. 6, 1977. Computer Simulation Technology, CST studio suite 2010. H.W. Wu, S.K. Liu, M.H. Weng, C.H. Hung, “Compact microstrip band pass filter with multi spurious Suppression,” Progress in Electromagnetic Research, Vol. 107, pp.21-30, 2010. Chin K.S. and D.J. Chen, “Novel microstrip band pass filters using direct-coupled triangular stepped-impedance resonators for spurious suppression.” Progress in Electromagnetic Research Letters, Vol. 12, pp. 11-20. 2009. A K Tiwary and N Gupta, “Performance of two microstrip low pass filter on EBG ground plane”, Microwave Review, Vol. 15, No. 2, pp, 37-40, Dec. 2009. J S Hong, M J Lancaster, Microwave Filters for RF/Microwave Applications, New York: John Wiley and Sons, Inc; 2001. Authors: Zaki Majeed AbduAllah, Omar Talal Mahmood, Ahmed M. T. Ibraheem AL-Naib Paper Title: Photovoltaic Battery Charging System Based on PIC16F877A Microcontroller 22-26 Abstract: This paper presents the design and practical implementation of a buck-type power converter for Photovoltaic (PV) system for energy storage application based on constant voltage Maximum Power Point Tracking (MPPT) algorithm. A buck converter is used to regulate battery charging. The system is controlled by a Peripheral Interface Controller (PIC) 16F877A microcontroller from Microchip via sensing the solar panel voltage and generating the Pulse Width Modulation (PWM) signal to control duty cycle of the buck converter. This type of microcontroller was chosen because it has the necessary features for the proposed design such as built-in Analog-toDigital Converter (ADC), PWM outputs, low power consumption and low cost. Simulation and experimental results demonstrate the effectiveness and validity of the proposed system. 6. Keywords: Photovoltaic, MPPT, Buck Converter, PIC16F877A. References: 1. 2. 3. 4. 5. 6. S. Masri, P. Chan,“Development of a Microcontroller Based Boost Converter for Photovoltaic System ”, European Journal of Scientific Research, ISSN 1450-216X,Vol. 41 No.1, pp.38-47, 2010. Zhengshicheng, L. Wei, “Research and Implementation of Photovoltaic Charging System with MPPT”, 3rd IEEE Conference on Industrial Electronics and Applications, pp.619-624, 2008. M.H. Rashid, “Power Electronics Handbook”, Second Edition, ISBN 13-978-0-12-088479-7, 2007. M.A.S. Masoum, H. Dehbonei, E.F. Fuchs, “ Theoretical and Experimental Analyses of Photovoltaic Systems with Voltage and CurrentBased MPPT ”, IEEE Transactions on Energy Conversion, Vol. 17, No. 4, pp.514-522, December 2002. E Koutroulis, K. Kalaitzakis, N.C. Voulgaris, “Development of a Microcontroller Based Photovoltaic MPPT Control System”, IEEE Transactionson Power Electronics, Vol. 16, No. 1, pp.46-54, January 2001. M.S. Rahman, “Buck Converter Design Issues”, Master thesis performed in division of Electronic Devices, 2007. 27-31 7. PIC16F87XA Data Sheet DS39582B, Microchip Technology, Inc. Authors: Rathod Balasaheb S, Satish. M. Rajmane Paper Title: A Case Study on Design of a Flywheel for Punching Press Operation Abstract: A flywheel is the heavy rotating mass which is placed between the power source and the driven machine to act as a reservoir of energy. It is used to store the energy when the demand of energy of energy is less and deliver it when the demand of energy is high. The current paper is focused on the analytical design of arm type of flywheel which is used for punching press operation. Now in regard to the design of flywheel it is required to decide the mean diameter of the flywheel rim, which depends upon two factors such as availability of space and the limiting value of peripheral velocity of the fly wheel. However the current design problem is formulated for punching machine which has to be make holes of 30 holes/minute in a steel plate of 18mm thickness with space limitation that is the diameter of flywheel should not exceed 1000mm, hence it can be observed that the design of the flywheel is to be carried out (based) on the availability of space limitation and accordingly the fluctuation of energy, dimensions of the flywheel, stresses induced in the flywheel are determined. Finally after detail analysis it is observed that the induced diameter of the flywheel is less than the allowable/permissible diameter and hence it can be concluded that the design is safe from availability of space point of view. 7. Keywords: Flywheel, peripheral velocity, fluctuation of energy, stresses, stored energy. 32-35 References: 1. 2. 3. 4. 5. 6. 7. Akshay P. Punde, G.K.Gattani , Analysis of Flywheel, International Journal of Modern Engineering Research (IJMER) , Vol.3, Issue.2, March-April. 2013 pp-1097-1099 Bjorn Bolund , Hans Bernhoff, Mats Leijon , Flywheel energy and power storage systems,international journal of Renewable and Sustainable Energy Reviews 11 (2007) 235–258 Sudipta Saha, Abhik Bose, G. Sai Tejesh, S.P. Srikanth , computer aided design & analysis on flywheel for greater efficiency, International Journal of Advanced Engineering Research and Studies, IJAERS/Vol. I/ Issue II/January-March, 2012/299-301 M.lavakumar, R.prasanna srinivas, Design and analysis of light weight motor vehicle flywheel, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue -7July 2013 Sushama G Bawane , A P Ninawe and S K Choudhary, Analysis and optimization of flywheel, International Journal of mechanical engineering and robotics Vol. 1, No. 2, July 2012 S. M. Dhengle, Dr. D. V. Bhope, S. D. Khamankar , sInvestigation of stresses in arm type rotating flywheel, International Journal of Engineering Science and Technology (IJEST), Vol. 4 No.02 February 2012. D.Y. Shahare, S. M. Choudhary , Design Optimization of Flywheel of Thresher using FEM, Advanced Materials Manufacturing & Characterization Vol3 Issue 1 (2013) Authors: K.Suganya, S.Dhamodharan Paper Title: Assessment of Data Quality in Health Care Using Association Rules Abstract: To find the outlier and disease possibility of ten cancer diseases. In the existing system, Transactional data of three companies are taken as input. Association rules are extracted from the input data using open source data mining tool.By applying consistency rule, the outliers are identified. Outliers are manually examined to determine whether any data quality is violation has really occurred. Cost for manual examination is estimated using confusion matrix. In this system, recorded patient details is taken as input. From the input data, association rule is identified and outliers are detected. Weight is assigned to each symptoms of all considered cancer disease. When user enters the symptoms, percentage of cancer disease possibility is calculated. 8. Keywords: Association rule,outlier,consistency rule 36-37 References: 1. 2. 3. 4. 5. 6. 9. Ms. Ishtake S.H , Prof. Sanap S.A."Intelligent Heart Disease Prediction System Using Data Mining Techniques" International J. of Healthcare & Biomedical Research, Volume: 1, Issue: 3, Pages 94-101,April ( 2013) K.Srinivas, B.Kavihta Rani,A.Govrdhan, "Applications of Data Mining Techniques in Healthcare and Prediction of Heart Attacks" K.Srinivas et al. / (IJCSE) International Journal on Computer Science and Engineering,Vol. 02, No. 02, Pages 250-255, (2010) Bendi Venkata Ramana, Prof. M.Surendra Prasad Babu, Prof. N. B. Venkateswarlu,"A Critical Study of Selected Classification Algorithms for Liver Disease Diagnosis" International Journal of Database Management Systems ( IJDMS ), Vol.3, No.2, May (2011) Chunhua Ju, Yaolin Li ,"An Incremental Outlier Detection Model for Transaction Data Streams" , Journal of Information & Computational Science 10: 1 Pages: 49–59 (2013) Anjali Barmade, Madhu M.Nashipudinath, "An Efficient Strategy to Detect Outlier Transactions" International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January( 2014 ) S.Preetha, V.Radha "Enhanced Outlier Detection Method Using Association Rule Mining Technique" International Journal of Computer Applications (0975 – 8887) Volume 42– No.7, March (2012 ) Authors: L.Lakshmanan, D.C.Tomar, Japala Saikrishna Rao Paper Title: Implementation of Protus2.0 by Ontology for Advanced E Learning Abstract: Protus2.0 E_ learning environment is used in learning process for decision making, communication and problem-solving. The semantic web used in real-time annotations of these ontology for debriefing of the students, student self study and better guidance of the learning methodologies of mentors.A ever-present methodology environment will provides an interoperable, pervasive, and flawless learning structural design to connect, fix together, and share three major scope of learning resources such as learning collaborators, learning services, and learning contents. ever-present learning is characterized for identify right learning collaborators, right learning contents and right learning services in the right place at the right time. it promotes the achievement of practical knowledge as well as decision production, communication, and problem solving with help of ontological Skillsbased learning environments. These environments are a important to give feedback about the students from the practically conducted sessions and comments of learners actions can notify to the assessment of their quality process. 38-40 And also, those learning environments are helping to the researchers for better understand the learning process. The proposed system examined study environments. Also, achieve the better student improving the knowledge as well as feedback of the understanding of learning environments; we proposed a new mechanism such as semantic based approach with the ontology is used. Keywords: systems. semanticweb,ontology mapping methods, fuzzy logic, fuzzy grouping, k-means algorithms, tutorial References: 1. 2. 3. 4. 5. 6. 7. M.J. Weal, D. Michaelides, K.R. Page, D.C. De Roure, E. Monger, and M. Gobbi, “Semantic Annotation of Ubiquitous Learning Environments,” IEEE Trans. Learning Technologies, vol. 5, no. 2, pp. 143-156, Apr.-June 2012. T. Tiropanis, H. Davis, D. Millard, and M. Weal, “Semantic Technologies for Learning and Teaching in the Web 2.0 Era—A Survey,” Proc. Society On-Line (WebSci ’09), http://eprints.ecs. soton.ac.uk/17106, 2009. J.W. McDonald, M.O. Gobbi, D. Michaelides, E. Monger, M.J.Weal, and D. De Roure, “Grid-Enabled Data Collection and Analysis: Semantic Annotation in Skills-Based Learning,” Proc.Fourth Int’l Conf. E-Social Science, June 2008. M.J. Weal, D.T. Michaelides, D.C. De Roure, M. Gobbi, E. Monger, and J.W. McDonald, “Semantic Annotation in Ubiquitous Healthcare Skills-Based Learning Environments,” Proc. Workshop Semantic Web in Ubiquitous Healthcare (ISWC), Nov. 2007. K.R. Page, D.T. Michaelides, S.J.B. Shum, Y.-H. Chen-Burger, J.Dalton, D.C. De Roure, M. Eisenstadt, S. Potter, N.R. Shadbolt, A.Tate, M. Bachler, and J. Komzak, “Collaboration in the Semantic Grid: A Basis for E-learning,” Applied Artificial Intelligence, vol. 19, nos. 9/10, pp. 881-904, Nov. 2005. O. Lassila and M. Adler, “Semantic Gadgets: Ubiquitous Computing Meets the Semantic Web,” Spinning the Semantic Web, D. Fensel, ed., MIT, pp. 363-376, 2003. T. D. of Health, “Delivery 21st Century IT Support for the NHS: National Strategic Programme,” technical report, The Stationary Office, June 2002. Authors: Richu Sam Alex, R Narciss Starbell Paper Title: Energy Efficient Intelligent Street Lighting System Using ZIGBEE and Sensors Abstract: Solar Photovoltaic panel based street lighting systems are becoming more common these days. But the limitation with these ordinary street light systems is that it lacks intelligent performance. It is very essential to automate the system so that we can conserve energy as well as to maximize the efficiency of the system. In this paper a new method is suggested so as to maximize the efficiency of the street lighting system and to conserve the energy usage by the system with the help of ZIGBEE and sensors. It uses a sensor combination to control and guarantee the desired system parameters. The information is transferred point by point using ZIGBEE transmitters and receivers and is sent to the control terminal used to check the state of the street lamps and hence we can take immediate actions if required. Keywords: Automation, Atmega, LED, PV, Sensors. 10. References: 1. 2. 3. 4. 5. 6. 7. 11. A. Valente, R. Morais, C. Serodio, P. Mestre, S. Pinto, and M. Cabral, “A zigbee sensor element for distributed monitoring of soil parameters in environmental monitoring,” Proc. IEEEE Sensors, pp. 135–138, Oct. 2007. Z. Rasin, H. Hamzah, and M. S. M. Aras, “Application and evaluation of high power zigbee based wireless sensor network in water irrigation control monitoring system,” in Proc. IEEE Symp. Ind. Electron. Appl., Oct. 4–6, 2009, vol. 2, pp. 548–551. H. Tao and H. Zhang, “Forest monitoring application systems based on wireless sensor networks,” in Proc. 3rd Int. Symp. Intell. Inf. Technol. Appl. Workshops, Nov. 21–22, 2009, pp. 227–230. J. Liu, C. Feng, X. Suo, and A. Yun, “Street lamp control system based on power carrier wave,” in Proc. Int. Symp. Intell. Inf. Technol. Appl. Workshops, Dec. 21–22, 2008, pp. 184–188. Y. Chen and Z. Liu, “Distributed intelligent city street lamp monitoring and control system based on wireless communication chip nRF401,” in Proc. Int. Conf. Netw. Security, Wireless Commun. Trusted Comput., Apr. 25–26, 2009, vol. 2, pp. 278–281. W. Yongqing, H. Chuncheng, Z. Suoliang, H. Yali, and W. Hong, “Design of solar LED street lamp automatic control circuit,” in Proc. Int. Conf. Energy Environment Technol., Oct. 16–18, 2009, vol. 1, pp. 90–93. M. A. D. Costa, G. H. Costa, A. S. dos Santos, L. Schuch, and J. R. Pinheiro, “A high efficiency autonomous street lighting system based on solar energy and LEDs,” in Proc. Power Electron. Conf., Brazil, Oct. 1, 2009, pp. 265–273. Authors: KR.Akshara, N.Srinivasan Paper Title: Collective Behavior Learning on Heterogeneous Affiliation in OSN 41-44 Abstract: Millions of real world data is generated by the social network like Facebook, twitter etc which gives us an opportunity to under or predict users behavior by means of collective learning. Many studies have been conducted already on this field. Existing algorithm uses connection or user relationship to understand their behavior but they lack the understanding of heterogeneity in their connection which reduces the effectiveness of their algorithm. In this project we proposed a mechanism to focus on these issues by introducing the concept of edge centric clustering for classification of users based on their heterogeneity affiliation and extracting the social dimension , relevant community detection is made and the social dimension is extracted by using chi square testing model. Here in this work it also reduce the computational problem by scaling the samples applying the scheme sparse social network Keywords: Collective Learning, Social Dimension, Community Detection References: 1. 2. 3. 4. L. Tang and H. Liu, “Toward predicting collective behavior via social dimension extraction,” IEEE Intelligent Systems, vol. 25,pp. 19–25, 2010. L.Tang and H.Liu, “Relational learning via latent social dimensions,” in KDD ’09: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. New York, NY, USA: ACM, 2009, pp. 817–826. M. Newman, “Finding community structure in networks using the eigenvectors of matrices,” Physical Review E vol. 74, no. 3, 2006. [Online].Available:http://dx.doi.org/10.1103/PhysRevE.74.036104 L. Tang and H. Liu, “Scalable learning of collective behavior based on sparse social dimensions,” in CIKM ’09: Proceeding of the 18th 45-47 ACM conference on Information and knowledge management. New York, NY, USA: ACM, 2009, pp. 1107–1116. P. Singla and M. Richardson, “Yes, there is a correlation: - from social networks to personal behavior on the web,” in WWW ’08: Proceeding of the 17th international conference on World Wide Web. New York, NY, USA: ACM, 2008, pp. 655–664. 6. M. McPherson, L. Smith-Lovin, and J. M. Cook, -Birds of a feather: Homophily in social networks. 7. A. T. Fiore and J. S. Donath, “Homophily in online dating: when do you like someone like yourself?” in CHI ’05: CHI ’05extended abstracts on Human factors in computing systems. NewYork, NY, USA: ACM, 2005, pp. 1371–1374. 8. H. W. Lauw, J. C. Shafer, R. Agrawal, and A. Ntoulas, “Homophily in the digital world: A LiveJournal case study,” IEEE Internet Computing, vol. 14, pp. 15–23, 2010. 9. S. A. Macskassy and F. Provost, “Classification in networked data: A toolkit and a univariate case study,” J. Mach. Learn .Res., vol. 8, pp. 935–983, 2007. 10. X. Zhu, “Semi-supervised learning literature survey,” 2006.[Online].Available: ttp://pages.cs.wisc.edu/∼jerryzhu/ pub/ssl survey 12 9 2006.pdf 5. Authors: A. Prasanth Babu, N. Srinivasan Paper Title: Temporal Analyzing Time Interval for Text Document in Text Excavation Abstract: Text excavation has been an unavoidable data excavation technique. There are different methods for text excavation, the most famous one criterion matching successful will be excavation using the effective criterions. The quality of excavation text data is the main problem text excavation due to the large number of terms, words, tables, phrases, and noise. However, the originality of excavation terms in text data may be not high because of lot of noise in text especially in the domain of text excavation. Pattern taxonomy model is a criterion-based method which adopts the technique of sequential criterion excavation and uses closed criterions as features in the representative. In Criterion taxonomy model it does not analyze the time period to the given text documents and also does not provide the rank to the given sets of documents. Existing is used to term-based approach to extracting the text. In this system we are going to propose the temporal text excavation approach which it calculates the time series and give the rank of the documents by decomposing the documents. Keywords: Text Excavation, Terrestrial sequence, Stumble Criterion Evolution, D-Criterion. 12. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. M.F. Caropreso, S. Matlin, and F. Sebastiani. Statistical Phrases in Automated Text Categorization, Technical Report IEI-B4-07- 2000, Instituto di Elaborazione dell’Informazione, 2000. C. Cortes and V. Vapnik. Substantiate-Vector Networks, Machine Learning, vol. 20, no. 3, pp. 273-297, 1995. S.T. Dumais, Improving the Retrieval of Information from External Sources, Behavior Research Methods, Instruments, and Computers, Vol. 23, No. 2, pp. 229-236, 1991. J. Han and K.C.-C. Chang. Data Excavation for Web Intelligence, Computer, Vol. 35, No. 11, pp. 64-70, Nov. 2002. J. Han, J. Pei, and Y. Yin. Excavation Frequent Criterions without Candidate Generation, Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’00), pp. 1-12, 2000. Y. Huang and S. Lin. Excavation Sequential Criterions Using Graph Search Techniques, Proc. 27th Ann. Int’l Computer Software and Applications Conf., pp. 4-9, 2003. N. Jindal and B. Liu. Identifying Comparative Sentences in Text Documents, Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006. K.Aas and L.Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999. R.Agrawal and R.Srikant, “Fast Algorithms for Excavation Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94), pp. 478-499, 1994. H.Ahonen, O.Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Excavation Techniques for Descriptive Phrase Extraction in Digital Document Collections,” Proc. IEEE Int’l Forum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11, 1998. R. Baeza-Yates and B.Ribeiro-Neto, Modern Information Retrieval. Addison Wesley, 1999. N.Cancedda, N. Cesa-Bianchi, A. Conconi, and C. Gentile, “Kernel Methods for Document Filtering,” TREC, trec.nist.gov/ ubs/trec11/papers/kermit.ps.gz, 2002. Authors: Kulkarni Akshata Paper Title: A Review on Glucagon like Peptide-1 Approach in Diabetes Melltius Abstract: Epidemiology of diabetes has gained great significance both in estimating the burden of the disease and also in finding out the risk factors with an ultimate goal of prevention of the disease. Type 2 diabetes is a progressive chronic disease resulting from a dynamic interaction between defects in insulin secretion and insulin action. New molecules have recently been launched and many others are under clinical investigation. Besides classical sulfonylureas and glinides, new insulin secretagogues are now available, which target the incretin gut hormone glucagon-like peptide-1 (GLP-1). Indeed, oral incretin enhancers acting as antagonists of the enzyme DPP-4 (dipeptidylpeptidase-4), which inactivates natural GLP-1, and injectable incretin mimetics (exenatide) or analogues (liraglutide), which reproduce the actions of GLP-1 while resisting to DPP-4, represent new opportunities to stimulate insulin secretion, without increasing the risk of hypoglycaemia and weight gain. Therapies based on the incretin hormone glucagon-like peptide 1 (GLP-1) are novel treatment options for type 2 diabetes. Incretin hormones cause an increase in the amount of insulin released from beta cells in the pancreas following ingestion of food. Glucagon-like peptide-1 (GLP-1) is the most well-characterized incretin hormone, which is considered to be the most important incretin released by the gut into the bloodstream in response to meal. In addition to its effects on insulin secretion after eating, primary function of GLP-1 is to enhance insulin secretion. GLP-1 also has additional effects that can help in the management of diabetes. Keywords: Diabetes mellitus, Glucagon like peptide-1, incretins. References: 1. 2. C Alarcon, B Wicksteed, C.J Rhodes,Exendin 4 controls insulin production in rat islet beta cells predominantly by potentiation of glucosestimulated proinsulin biosynthesis at the translational level. Diabetologia;49: 2006.pp-2920–2929. J.M Barragan,J Eng, R Rodriguez,E Blazquez, Neural contribution to the effect of glucagon-like peptide-1-(7-36) amide on arterial blood 48-50 51-54 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. pressure in rats. Am J Physiol; 277: 1999. E784– E791. D.J Drucker,The role of gut hormones in glucose homestasis. J Clin Invest, 2007.117:pp-24-32. M Moller, S.P Sheikh,Central administration of GLP-1-(7-36) amide inhibits food and water intake in rats. Am J Physiol; 271: 1999,R848– R856. M.M Engelgau, T.J Thompson, W.H Herman ,JP Boyle, Aubert R.E,S.J.Kenny, Diabetes Care,1997, pp-785–91. H.C Fehmann, J.F Habener, Functional receptors for the insulinotropic hormone glucagon-like peptide-I(7-37) on a somatostatin secreting cell line. FEBS Lett,279,1991, pp-335–340. F.M Gribble, Targetting GLP-1 release as potential strategy for therapy of type-2 diabetes mellitus,In:Diabetic medicine,25(8),1991,pp-889894. J.J Holst, C Orskov,O.V Nielsen,T.W Schwartz,Truncated glucagon-like peptide I, an insulin-releasing hormone from the distal gut. FEBS Lett 211,1987,pp-169–174. M.I Harris,R.C Eastman,C.C Cowie,K.M Flegal,M.S Eberhardt MS,Diabetes Care,20,1987,pp-1859–62. B Kreymann,G.Williams,M.A Ghatei,SR Bloom, Glucagon-like peptide-1 7-36: a physiological incretin in man. Lancet; 2: 1987, pp-1300– 1304. L.B Knudsen,Pridal,Glucogon like peptide-1(9-36) amide is major metabolite and glucagon like peptide-1(7-38)amide after in vivo administration to dogs and it acts as antagonist on pancreatic receptor. In: European of journal pharmacology, 318, (2-3),1996,pp-429-435. K Meeran K,D O’Shea,CM Edwards,M..D Turton, MM Heath,I Gunn,S Abusnana,M Rossi,CJ Small,A.P Goldstone,G.M Taylor,D Sunter,J Steere,S.J Choi,M.A Ghatei,SR Bloom Repeated intracerebroventricular administration of glucagon-like peptide1-(7-36) amide or exendin(9-39) alters body weight in the rat. Endocrinology; 140,1999,pp-244–250. S Mojsov,G.C Weir,J.F Habener J.F,Insulinotropin: glucagon-like peptide I (7-37) co-encoded in the glucagon gene is a potent stimulator of insulin release in the perfused rat pancreas. J Clin Invest,79,1987,pp-616–619. JJ Meier,B Gallwitz,S Salmen,O Goetze,J.J Holst, W.E Schmidt,M.A Nauck Normalization of glucose concentrations and deceleration of gastric emptying after solid meals during intravenous glucagon-like peptide 1 in patients with type 2 diabetes. J Clin Endocrinol Metab, 88,2003,2719–2725. C Orskov,A Wettergren,J.J Holst J.J,Secretion of incretin hormones glucagon like peptide-1 and gastric inhibition polypeptide with insulin secretion in normal man throughout day .In:Scandianrian journal of gastroenterology,31(7), 1996,pp-665-670. C Ruiz-Grande,C Alarcn,E Mzrida,I Valverde,Lipolytic action of glucagon-like peptides in isolated rat adipocytes. Peptides; 13,1992,pp-13– 16. M Szayna,M.E Doyle,JA Betkey,H.W Holloway,R.G Spencer,N.H Greig,J.M Egan,Exendin-4 decelerates food intake, weight gain, and fat deposition in Zucker rats. Endocrinology; 141,2000,1936–1941. M.D Turton,D O’Shea,I Gunn,S.A Beak,C.M Edwards,K Meeran,S.J Choi,G.M Taylor,M.M Heath,P.D Lambert, Wilding J.P, Smith DM, Ghatei M.A, Herbert J, Bloom S.R,A role for glucagon-like peptide-1 in the central regulation of feeding. Nature 6;379,1996,pp-69–72. R.E.Wachters-Hagedoorn,M.G.Prieb,A.M Heiner,J.J Holst,The rate of intestinal glucose absorption is corrected with plasma glucose.Depending insulinotropic polypeptide concentration in healthy men,In:the journal of nutrition,(136) 6,2006,pp-1511-1516. B Willms,J Werner,J.J Holst ,C Orskov,W Creutzfeldt, M.A Nauck,Gastric emptying, glucose responses, and insulin secretion after a liquid test meal: effects of exogenous glucagon-like peptide-1 (GLP-1)-(7-36) amide in type 2 (noninsulin-dependent) diabetic patients. J Clin Endocrinol Metab; 81,1996,pp-327–332. M Zander,A Christiansen,S Madsbad,J.J Holst, Additive Effect of Glucagon-Like Peptide 1 and Pioglitazone in Patients with Type 2 Diabetes. Diabetes Care, 27, 2004, pp-1910-1914. Authors: Devarshi Chaurasia Bus Rapid Transit System (BRTS): A Sustainable Way of City Transport (Case Study of Bhopal Paper Title: BRTS) Abstract: Irrespective of the cities of any country around the world, at some point of time they have faced problems associated with passenger mobility and connecting the city periphery with central part, in urban areas and found few innovative solutions to overcome the problems. Urban Planners, Engineers and Urban Administrator have found Bus Rapid Transit (BRT) System as efficient, cost effective and simple as compare to other Light Rail Transit (LRT) and Metro Rail solution to provide ‘life line’ to city. Many cities around the world operating BRTS and getting positive results including so many Indian cities. By this technical paper, I am investigating the salient features and properties of BRT system with the help of various operational BRT. At last, I am presenting an observational study of Bhopal BRT system to analyze the actual condition and lacunas of BRTS. Keywords: BRT system, Urban Transport, City, Passenger Mobility. References: 1. 2. 14. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Ahmedabad Bus Rapid Transit System, Urban Transport Initiatives in India: Best Practices in PPP report by National Institute of Urban Affairs, India http://www.niua.org/projects/tpt/AHMEDABAD%20BRTS.pdf http://www.ahmedabadbrts.com/web/About_JanMarg.html Agarwal P.K., Sharma Anupama, Sing A.R. (2010), An overview on Bus Rapid Transit System, JERS/Vol.-I/Issue-II/ Oct.-Dec./ page. 195-205. Bus Rapid Transit System Bhopal, Presentation by BCEOM International France, Bhopal Municipal Corporation, Sept. 2008 Downloaded from Internet on Aug. 2013) BRT Case Study, Curitiba, Brazil. http://onlinepubs.trb.org/onlinepubs/tcrp/tcrp90v1_cs/Curitiba.pdf Colleen McCaul (2009), Project Manager of GTZ Consulting Team: Johannesburg Rea Vaya BRT Project, South Africa http://www.unhabitat.org/downloads/docs/7997_81569_rea_vaya.pdf HT Correspondent, Hindustan Times Bhopal, June 20, 2013 http://www.hindustantimes.com/India-news/Bhopal/3-things-missing-fromBhopal-BRTS-estimates-panel/Article1-1079470.aspx Jaiswal Anuj, Sharma Ahsutosh (2012); ‘Optimization of Public Transport Demand : A case study of Bhopal’ IJSRP/Vol.-2/Issue-7/July 2012, ISSN No.: 2250-3153 Kadiyali,L.R,(2008),Traffic Engineering and Transportation Planning, Khanna Publishers,Seventh Edition, Delhi. Kumar Manish, Sustainable Cities Collective , Article (Downloaded from Internet net on 6/10.2013) http://sustainablecitiescollective.com/kumar-manish/180741/my-bus-brts-launched-bhopal-bridges-old-city-and-new-city-india Lloyd Wright, University College London, Book Title-Sustainable Transport: A source book for Policy Makers in Developing Cities, Module 3b: Bus Rapid Transit http://www.itdp.org/documents/brtplanningguidedec04.pdf Mohan Dinesh, Planning for Public Transport: Integrating Safety, Environment and Economic Issues, Transportation Research and Injury Prevention Programme Indian Institute of Technology, New Delhi 110 016, India. Rafael Villarsed (2008), Bagota Bus Rapid Transit, Transmilenio Institutional Presentation. http://tram.mcgill.ca/Teaching/seminar/presentations/BRTBog.pdf Transport Research & Injury Prevention Programme-TRIPP (2008), BRTS special Issue, IIT Delhi. Tiwari Geetam, Bus Priority Lanes for Delhi, Transportation Research and Injury Prevention Programme, Indian Institute of Technology, Delhi, India 110016. Yoga Adiwinarto (2013), Expanding TransJakarta BRT through ‘Direct service’ system, 32nd Southern Africa Transport Conference. 55-63 Authors: Remya George, Anjaly Cherian.V, Annet Antony, Harsha Sebestian, Mishal Antony, Rosemary Babu.T Paper Title: An Intelligent Security System for Violence against Women in Public Places Abstract: This paper describes about an intelligent security system for women. Women all over the world are facing much unethical physical harassment. This acquires a fast pace due to lack of a suitable surveillance system. Our project is a venture to resolve this problem. The systems mainly consist of a monitoring device, the output of which is processed to identify insecure environments. Upon identifying unsafe environments system will send message to near-by control room also turn on alarms placed all around the area letting help from others. This system can be positioned in public places such as railway stations, bus stands, foot paths and shopping mall, where women are commonly experiencing attacks. We really believe that this endeavor will make a difference in the life of many and dream about seeing this world with individuals walking fearlessly. Keywords: women security, face recognition. References: 1. 2. 15. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. “violence against women in India-a literature review”-Sheela Saravanan, Intsitute of social studies trust. Aisha Meethian and B.M.Imran, “Real Time Gesture Recognition Using Gaussian Mixture Model”, International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013. ”A mobile application for women”-Times of India, Dec 03 2013. “electronic device for women safety”- Times of India, Sep 15 2013. P. Viola and M. J. Jones, “Robust real-time face detection”, International Journal of Computer Vision, 57(2):137–154, 2004. Qiang Li, Bo Li ,”Online Finger Gesture Recognition Using Surface Electromyography Signals”-Journal of Signal and Information Processing, 2013, 4, 101-105 doi:10.4236/jsip.2013.42013 Published Online May 2013 A. Samal and P.A. Iyengar, “Automatic Recognition and Analysis of Human Faces and Facial Expressions: A Survey,” Pattern Recognition, vol. 25, no. 1, pp. 65-77, 1992. Y. Tian, T. Kanade and J. Cohn, “Recognizing Action Units for Facial Expression Analysis,” IEEE Trans. Pattern Analysis and Machine Intelligence,vol. 23, no. 2, pp. 97–115, 2001. Regina Lionnie, Ivanna K. Timotius and Iwan Setyawan ,“Performance Comparison of Several Pre-Processing Methods in a Hand Gesture Recognition System based onNearest Neighbor for Different Background Conditions”, ITB J. ICT, Vol. 6, Nov. 3, 2012. Vinay Bettadapura,” Face Expression Recognition and Analysis: The State of the Art” Chen Wu and Hamid Aghajan “Model-based Human Posture Estimation for Gesture Analysis in an Opportunistic Fusion Smart Camera Network” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 21, no. 9, pp. 884–900, 2007 P. Ekman and W.V. Friesen, “Manual for the Facial ActionCoding System,”Consulting Psychologists Press,1977. MPEG Video and SNHC, “Text of ISO/IEC FDIS 14 496-3: Audio,” in Atlantic City MPEG Mtg., Oct. 1998, Doc. ISO/MPEG N2503. “Robust object tracking using local kernels and background information”-Jaideep Jeyakar, R. Venkatesh Babu, K. R. Ramakrishnan “Multiple Object Tracking by Kernel Based Centroid Method for Improve Localization”- Rahul Mishra1, Mahesh K. Chouhan2, Dr. Dhiiraj Nitnawwre3 International Journal of Advanced Research in Computer Science and Software Engineering. M.S. Ryoo and J.K. Aggerwal, “observe and explain: a new approach for multiple hypotheses tracking of humans and objects” , university of Texsas,pg:1-8,2005 Tao Zhao and Ram Nevatia, “tracking multiple human in a crowded environment”, International Journal of Computer Vision, pg:1-9,2004 Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang, “Multiple Human Objects Tracking in Crowded Scenes”, International Journal of Computer Vision, pg:1-4,2006 Andrew Rayam, Adam Rossi, “automated facial expression recognition system”, IEEE transactions, pg 1-6, 2009 Ole Helvig Jensen, “Implementing the Viola-Jones Face Detection Algorithm”, Technical University of Denmark, pg:1-32,2008 Deqing Sun, Stefan Roth, Michael J Black, “secrets of optical flow estimation and their principles”, Brown university, pg:1-8, 2010 Authors: A.Mathumathi, Nivya.R.Mohan, Neethu Babu, D.Padmapriya, Anoop, M.Geetha Priya Paper Title: Leakage Power Optimization for VLSI Circuits @90nm CMOS Process 64-68 Abstract: In Integrated Circuits (IC), the transistor density is increased by scaling down the size of MOSFETs. Scaling down of devices sizes for improving the performance has lead to a substantial increase in the subthreshold leakage current. In this paper, a new method is proposed to reduce leakage power in standby mode of operation. This proposed method combines Input Vector Control (IVC) and Gate Replacement (GR) techniques. The proposed method is validated by applying to three different benchmark circuits at 90nm CMOS process technology using HSPICE. The final results obtained are compared with other well known leakage reduction techniques and the proposed method proves to be more effective than other existing techniques. Keywords: leakage reduction, HSPICE, CMOS, full adder, PDP References: 16. 1. 2. 3. 4. 5. 6. 7. 8. 9. M. Geetha Priya and K. Baskaran, “A Novel Low Power 3 Transistor based Universal Gate for VLSI Applications”, Journal of Scientific and Industrial Research, vol. 72, pp. 217-221, Apr. 2013 M.Geetha Priya and K. Baskaran, “A new universal gate for low power SoC applications”, Sadhana-Academy Proceedings in Engineering Sciences, vol. 38, pp. 6445-651, Aug. 2013 Afshin Abdollahi, Farzan Fallah and Massoud Pedram, “Leakage Current Reduction in CMOS VLSI Circuits by Input Vector Control”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 140-154, Feb. 2004 Saibal Mukhopadhyay, Cassondra Neau, Riza Tamer Cakici, Amit Agarwal, Chris H. Kim and Kaushik Roy, “Gate Leakage Reduction for Scaled Devices Using Transistor Stacking”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 11, no. 4, pp. 716730, Aug. 2003 Narender Hanchate and Nagarajan Ranganathan, “LECTOR: A Technique for Leakage Reduction in CMOS Circuits”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 12, no. 2, pp. 196-205, Feb. 2004 Lin Yuan and Gang Qu, “A Combined Gate Replacement and Input Vector Control Approach for Leakage Current Reduction”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 14, no. 2, pp. 173-182, Feb. 2006 Kaushik Roy, Saibal Mukhopadhyay and Hamid Mahmoodi-Meimand, “Leakage Current Mechanisms and Leakage Reduction Techniques in Deep-Submicrometer CMOS Circuits”, Proceedings of the IEEE, vol. 91, no. 2, pp. 305-327, Feb. 2003 M. Geetha Priya, K. Baskaran, D. Krishnaveni & S. Srinivasan, "A New Leakage Power Reduction Technique for CMOS VLSI Circuits", Journal of Artificial Intelligence, vol.5, pp. 227-232, 2012 Yu Wang, Xiaoming Chen, Wenping Wang, Yu Cao, Yuan Xie and Huazhong Yang, “Leakage Power and Circuit Aging Cooptimization 69-72 by Gate Replacement Techniques”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 19, no. 4, pp. 615-628, Apr. 2011 Authors: Nandini Ammanagi, Rahul Khadilkar, Akash Harwani, Disha Budhlani, Disha Dembla Comparison of the Performance of Microstrip Antenna at 2.4GHz Using Different Substrate Paper Title: Materials Abstract: This paper discusses the performance of various dielectric substrates, having dielectric constants ranging from 2 to 5. These designs are basically rectangular micro strip patch antennas for wireless communication resonating at 2.4 GHz. They are simulated using the evaluator's version of the software IE3D and their performances are compared with respect to ‘return loss v/s frequency’ and ‘vswr v/s frequency’ parameters. The comparison is made for four dielectric substrates: FR4, RO-3003, PTFE(Teflon) and Polyguide. Analysis of each is done and compiled using MATLAB to show relative performance. 17. Keywords: Antenna, Dielectric substrate, IE3D, Microstrip, Rectangular Patch. 73-75 References: 1. 2. 3. 4. 5. C. A. Balanis, “Antenna Theory-Analysis and Design,” 2nd ed., J. Peters, John Wiley and Sons, pp. 728-730. G. Kumar, K. P. Ray, “Broadband microstrip antennas”, Artech House, 2003. N. Agarwal, D.C.Dhubkarya, R. Mittal,“ Designing \& Testing of Rectangular Micro strip antenna operating at 2.0 GHz using IE3D” , Global Journal of Researches in Engineering, Volume 11 Issue 1, Version 1.0 February 2011, Journal Publisher: Global Journals Inc. (USA) K.Praveen Kumar, K.Sanjeeva Rao ,V.Mallikarjuna Rao, et al. “The effect of dielectric permittivity on radiation characteristics of coaxially feed rectangular patch antenna: Design & Analysis”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 2, February 2013. A. Khan,R Nema. "Analysis of Five Different Dielectric SubstratesOn Microstrip Patch Antenna", International Journal of Computer Applications (0975 – 8887), Volume 55, No.18, October 2012. Authors: Naser Hussein Judran, Ravi Jon Paper Title: A Study on Carbon Nano Tube and Bucky Balls Membrane for Water Purification Abstract: Carbon Nanotube are single sheets of graphite (called graphene) rolled into cylinders. The diameter of the tubes is typically of nanometer dimensions, while the lengths are typically micrometers. In this paper we are going Explore the property of Carbon Nanotube which is currently the focus of intense research. The Nanotube may consist of one up to tens and hundreds of concentric shells of carbons with adjacent shells separation of 0.34 nm; we are also going to explore the properties of carbon Nano tube through Raman Spectroscopy, and this paper review the Bucky paper Membrane for water Filtration. Keywords: Spectroscopy. Carbon Nanotube, Optical Properties, Bucky-paper, membrane; filtration method, Raman References: 1. 2. 3. 18. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 19. Edison TA, US Patent 470’925 (1892). Bacon R. Growth, structure and properties of carbon whiskers. J Appl Phys 1960; 31: 283-290. Dresselhaus MS, Dresselhaus G, Sugihara K, Spain IL, and Goldberg HA. Graphite fibers and filaments. (Springer-Verlag, Berlin, 1988), Vol. 5 of Springer Series in Materials Science. Oberlin A, Endo M, and Koyama T. Filamentous growth of carbon through benzene decomposition. J Crystal Growth1975; 32: 335-349. Kroto HW, Heath JR, O’Brian SC, Curl RF, and Smalley RE. C60: Buckminsterfullerene. Nature 1985; 318: 162-163. Dresselhaus MS, Dresselhaus G, Eklund PC. Science of fullerences and carbon nanotubes. Academic Press, San Diego, California,1996. Smalley RE, Semiconductor cluster surface chemistry. DoD Workshop in Washington, DC (December 1990). Dresselhaus MS, Dresselhaus G, and Eklund PC. Symmetry for lattice modes in C60 and alkali-metal-doped C60. Phys Rev B 45 1992; Coleman Henry, Bryce Dorr, Jonathan A. Brant Separation and Purification Technology, Volume 100, (24 October 2012 ) Buckminsterfullerene (C60) nanoparticle fouling of microfiltration membranes operated in a cross-flow configuration Iijima S. Helical microtubules of graphitic carbon. Nature 1991; 354: 56-58. Iijima S and Ichihashi T. Single-shell carbon nanotubes of 1 nm diameter. Nature 1993; 363: 603. Bethune DS, Kiang CH, de Vries MS, Gorman G, Savoy R, Vasquez J, and Beyers R. Cobalt- catalysed growth of carbon nanotubes with single-atomic-layer walls. Nature 1993; 363:605. Wildoer JWG, Venema LC, Rinzler AG, Smalley RE, Dekker C. Electronic structure of atomically resolved carbon nanotubes. Nature 1998; 391: 59-62. Ajayan PM, Iijima S. Capillarity-induced filling of carbon nanotubes. Nature 1993; 361: 333. Thess A, Lee R, Nikolaev P, Dai H, Petit P, Robert J, Xu C, et al. Crystalline ropes of metallic carbon nanotubes. Science 1996; 273: 483487. Buseck PR, Tsipursky SJ, Hettich R. Fullerenes from the geological environment. Science 1992; 257: 215–217. Saito R, Dresselhaus G, Dresselhaus MS. Physical properties of carbon nanotubes. Imperial College Press, London, 1998. Harris PJF, Carbon nanotubes and related structures – New materials for the twenty-first century. Cambridge University Press, Cambridge, UK, 1999. [19] Nanotube Modeler, JCrystalSoft 2004 – 2005, http://www.icrystal.com. Qin LC, Zhao X, Hirahara K, Miyamoto Y, Ando Y, Iijima S. The smallest carbon nanotube, Nature 2000; 408: 50. Authors: P.Rajeswari, S.Pratheeba, S.R.Karthika Paper Title: A Comprehensive Overview on Different Applications of Wireless Sensor Network Abstract: The Wireless Sensor Network is built of "nodes" – from a few to several hundreds or even thousands, where each node is connected to one (or sometimes several) sensors. Each such sensor network node has typically several parts: a radio transceiver with an internal antenna or connection to an external antenna, a micro controller, an electronic circuit for interfacing with the sensors and an energy source, usually a battery or an embedded form of energy harvesting. A sensor node might vary in size. It detects things like temperature, sound, vibrations, pressure, motion, or pollutants through autonomous sensors. They are currently being used for industries and civilian use such as industrial process monitoring and control, machine health monitoring, monitoring of the environment, health care applications, home automation, tracking and traffic control. More specific applications would be things like habitat 76-79 80-84 monitoring, tracking objects, detecting fires or landslides, and monitoring traffic. Generally a WSN would be scattered in an area where its sensor nodes collect data. Keywords: Applications of Wireless Sensor Network, Area Monitoring, Wireless Sensor Network. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6550437 D. J. Cook and S. K. Das, “Smart environments: technologies , protocols and applications,” New York: John Wiley, pp. 13-15, 2004. K. Sohraby, D. Minoli, and T. Znati, “Wireless sensor networks: technology, protocols and applications,” New Jersey: John Wiley, pp. 3871, 2007. http://www.memsnet.org/mems/what-is.html F. L. LEWIS,"Wireless Sensor Networks"Associate Director for Research,Head, Advanced Controls, Sensors, and MEMS Group,Automation and Robotics Research Institute The University of Texas at Arlington. Eric Lee Eekhoff A,“Wireless sensor networks and personal area networks for data integration in a virtual reality environment ” submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE. Theofanis P. L AMBROU ,PhD Thesis Proposal ,Supervisor: Prof. Christos G. PANAYIOTOU, ”Collaborative Area Monitoring Using Wireless Sensor Networks with Stationary and Mobile Nodes ”. Alan Mainwaring -Intel Research Laboratory, Berkeley ,Joseph Polastre2 -2 EECS Department ,University of California at Berkeley ,David Culler-College of the Atlantic Bar Harbor, Maine :”Wireless Sensor Networks for Habitat Monitoring ”. J. G. T. Anderson. Pilot survey of mid-coast Maine seabird colonies: “an evaluation of techniques”. Bangor, ME, 1995. Report to the State of Maine Dept. of Inland Fisheries and Wildlife. http://www.eurekalert.org/pub_releases/2008-06/uoa-nws060408.php J. Portilla, A. de Castro, E. de La Torre, and T. Riesgo, “A modular architecture for nodes in wireless sensor networks,” Journal of Universal Computer Science, vol. 12, no. 3, pp. 328–339, 2006. http://www.advanticsys.com/services/agricultural-environment- monitoring/ J.D. Kenney, D.R. Poole, G.C. Willden, B.A. Abbott, A.P. Morris, R.N. McGinnis, and D.A. Ferrill, "Precise Positioning with Wireless Sensor Nodes: Monitoring Natural Hazards in All Terrains", 2009 IEEE International Conference on Systems, Man, and Cybernetics, San Antonio, TX, USA, Oct. 2009. Ma, Y.; Richards, M.; Ghanem, M.; Guo, Y.; Hassard, J. (2008). "Air Pollution Monitoring and Mining Based on Sensor Grid in London". Sensors 8 (6): 3601 T.L. Dinh, W. Hu, P. Sikka, P. Corke, L. Overs and S. Brosnan, "Design and Deployment of a Remote Robust Sensor Network: Experiences from an Outdoor Water Quality Monitoring Network", 2007 32nd IEEE Conference on Local Computer Networks http://ciemcal.org/wireless-sensor-network-and-mobile-ad-hoc- network/ http://www.advanticsys.com/services/water-monitoring-equipment/ http://www.enpicbcmed.eu/content/wireless-sensor-networks-accurate-continuous-monitoring-waterways-and-industrial-pipeline-ne. http://www.nireas-iwrc.org/index.php?link=PP-leak_detection.php. F. Viani, P. Rocca, M. Benedetti, G. Oliveri, A. Massa , "Electromagnetic passive localization and tracking of moving targets in a WSNinfrastructured environment " in Inverse Problems, vol. 26, (2010), p. 1-15. - DOI: 10.1088/0266-5611/26/7/074003 Surie, D., Laguionie, O., Pederson, T.: "Wireless Sensor Networking of Everyday Objects in a Smart Home Environment". In Proceedings of the 4th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Sydney, Australia, pp. 189-194, (2008) Yenumula B Reddy,Grambling State University,Grambling, LA 71245,”Survey in Wireless Sensor Network”. http://ciemcal.org/wireless-sensor-network/ Authors: Meera Treesa Mathews, Manju E.V Paper Title: Extended Distributed RK- Secure Sum Protocol in Apriori Algorithm for Privacy Preserving Abstract: Secure sum computation is a simple example of Secure Multi party Computation. This provide privacy to data in case more than two parties are present, while finding combined results of individual data. Association rule mining algorithms like Apriori are used for mining frequent items from database. In this paper we address secure mining of frequent items from a horizontally partitioned data. It uses Apriori algorithm for mining frequent items with the help of a Extended Distributed Rk- Secure Sum Protocol for privacy preserving Keywords: Secure sum computation, secure multi party computation, Apriori, Extended Distributed Rk- secure sum protocol, frequent items, Global support References: 1. 2. 20. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Jyotirmayee Rautaray, Raghavendra Kumar, “FP Tree Algorithm using Hybrid Secure Sum Protocol in Distributed Database”, International Journal of Scientific & Engineering Research, Vol. 4, No. 3,march 2013, pp 1-5. Jyotirmayee Rautaray, Raghavendra Kumar, “Distributed Rk- Secure sum Protocol for Privacy Preserving”, IOSR Journal of Computer Engineering, Vol. 9, No. 1, January – February 2013, pp. 49 – 52 Priyanka Jangde, Gajendra Singh chandel, Durgesh Kumar Mishra, “Hybrid Technique for Secure Sum Protocol”, World of Computer science and Information Technology Journal, Vol. 1, No. 5, 2011, pp 198 – 201. Ms Shweta, Dr. Kanwal Garg, “Mining Efficient Association Rules through Apriori Algorithm Using Attributes and comparative analysis of various Association Rule Algorithms”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, No. 6, June 2013, pp. 306 – 312. Sunita B. Aher, Lobo L.M.R.J, “ A Comparative Study of Association Rule Algorithms for Course Recommender System in E-learning”, International Journal of Computer Applications (0975 – 8887), vol . 39, No. 1, February 2012, pp. 48 – 52. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” Distributed k-Secure sum Protocol for secure Multi –Party Computations”, Journal of Computing, Vol. 2, No. 3, March 2010, pp. 68 – 72. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra, ”Changing Neighbour k- Secure Sum Protocol for secure multi party computation”, International Journal of Computer science And Information Security, Vol. 7, No. 1, 2010, pp. 239 – 243. Rashid Sheikh, Beerendra Kumar, Durgesh Kumar Mishra,” A modified ck- Secure Sum Protocol for multi party computation”, Journal of Computing, Vol. 2, No.2, February 2010, pp. 62 – 66. Yehuda Lindell, Benny Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining”, The Journal of Privacy and Confidentiality, vol.1, No.1, 2009, pp. 59-98. Rashid Sheikh , Beerendra Kumar, “Privacy Preserving K- Secure Sum Protocol”, International Journal of Computer science and Information Security, Vol. 6, No. 2, 2009, pp. 184 – 188. Murat Kantarcioglu, Chris Clifton, “Privacy-Preserving Distributed Mining of Association Rules on Horizontally Partitioned Data”, IEEE Transactions on Knowledge And Data Engineering, Vol. 16, No. 9, September 2004 Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu, “Tools for Privacy Preserving Distributed Data 85-88 13. 14. 15. 16. 17. 18. 19. Mining”, SIGKDD Explorations, Newsletter, vol.4, no.2, ACM Press, 2002, pp.28-34. M. J. Atallah and W. Du. “Secure Multiparty Computational Geometry,” In proceedings of Seventh International Workshop on Algorithms and Data Structures(WADS2001). Providence, RhodeIsland, USA, 2001, pp. 165-179. W. Du and M.J.Atallah, “Privacy-Preserving Statistical Analysis,” In proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, 2001, pp. 102-110. Wenliang Du, Mikhail J. Atallah, “Secure MultiParty Computation Problems and Their Applications: A Review and Open Problems”, In proceedings of new security paradigm workshop, Cloudcroft, New Maxico, USA, Sep. 11-13 2001, page 11-20. Rakesh Agrawal, Ramakrishnan Srikant,”Fast algorithm for mining association rules”, Proceedings of the 20th VLDB Conference Santiago,Chile, 1994. Rakesh Agrawal, Tomasz Imielinski, Arun Swami, “Mining Association Rules between Sets of items in Large Databases”, Proceedings of the 1993 ACM SIGMOD conference Washington DC, USA, May 1993, pp. 1- 10. Jiawie Han, Micheline Kamber, Jian Pie, “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishing, Third edition, pp 248 – 253. http://www.cs.sunysb.edu/~cse634/lecture_notes/ 07apriori.pdf accessed on date 02-02-2012. Authors: Vidya.M, Reshmi.S Paper Title: Alleviating Energy Depletion Attacks in Wireless Sensor Networks Abstract: Network survivability is the capacity of a network keeping connected under loss and intrusions, which is a major concern to the design and design interpretation of wireless ad hoc sensor networks. Ad-hoc low power wireless networks are in inquisition in both discerning and ubiquitous computing. The proposed method discusses about energy draining attacks at the routing protocol layer, which drains battery power. A innovative approach for routing protocols, affect from attack even those devised to be protected which is short of protection from these attacks, which we call energy debilitating attacks, which enduringly disable networks by quickly draining nodes battery power. These energy depletion attacks are not protocol specific but are disturbing and hard to notice, and are easy to carry out using as few as one malicious insider sending only protocol compliant messages. 21. Keywords: Denial of service, security, routing, ad hoc networks, sensor networks, wireless networks. 89-91 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. Eugene.Y.Vasserman, Nicholas Hopper, Vampire attacks Draining life from ad-hoc wireless sensor networks,IEEE volume 2 (2014). Jae-Hwan Chang and Leandros Tassiulas,Maximum lifetime routing in wireless networks,IEEE/ACM Transactions on Networking 12 (2004), no.4 The network simulator — ns-2. http://www.isi.edu/nsnam/ns/ Tuomas Aura, Dos-resistant authentication with client puzzles, International workshop on security protocols, 2001. John Bellardo and Stefan Savage, 802.11 denial-of-service attacks: real vulnerabilities and practical solutions, USENIX security, 2003. Daniel Bernstein and Peter Schwabe, New AES software speed records, INDOCRYPT, 2008. I.F. Blake, G. Seroussi, and N.P. Smart, Elliptic curves in cryptography, Vol. 265, Cambridge University Press, 1999. Joppe W. Bos, Dag Arne Osvik, and Deian Stefan, Fast implementations of AES on various platforms, 2009. Haowen Chan and Adrian Perrig, Security and privacy in sensor networks, Computer 36 (2003), no. 10. Authors: Dushyant Kumar Shukla, Munish Vashishtha Paper Title: Noise Analysis of Common-Collector Amplifier using Stochastic Differential Equation Abstract: In this paper, we analyse the effect of noise in a common-collector amplifier working at high frequencies. Extrinsic noise is analyzed using time domain method employing techniques from stochastic calculus. Stochastic differential equations are used to obtain autocorrelation functions of the output noise voltage and other solution statistics like mean and variance. The analysis leads to important design implications for improved noise characteristics of the common-collector amplifier. 22. Keywords: common-collector amplifier, noise, stochastic differential equation, mean and variance. 92-94 References: 1. 2. 3. 4. 5. 23. Tarun Kumar Rawat,Abhirup Lahiri, and Ashish Gupta, Noise Analysis of Single-Ended Input Differential Amplifier using Stochastic Differential Equation, International Journal of Computer, Information, and System Science, and Engineering, pp.191-196,2008. Wei Yu and Bosco H. Lueng, Noise Analysis for Sampling Mixers using Differential Equations, IEEE Tran. On Circuit and Systems-II: Analog and Digital Signal Processing, Vol. 46, No. 6, June 1999. A. Demir, E.W.Y. Liu, and L.S. Vincentelli, Time Domain Non Monte Carlo Method noise simulation for non linear dynamic circuit with arbitrary excitation, IEEE Tran. Computer Aided Design, Vol. 15, pp.493-505, May 1996. L. Arnold, Stochastic Differential Equation, John Wiley, NewYork. Jacob Millman and Christos C. Halkias, Integrated Electronics, Tata McGraw Hill. Authors: Giriraj Sharma, Ashish Kumar Bansal Paper Title: A Practical Approach to Improve GSM Network Quality by RF Optimization Abstract: All GSM service provider uses KPI to monitor their QOS performance. Report generated from OMCR terminal & customer feedback are considered in further network improvement activity. RF optimization and drive test is the tool to keep continue watch on network QOS .In this paper some practical cases and solutions are adopted to improve the network QOS during drive test & post processing. Major QOS parameter Handover, call drop, congestion, interference reasons and solutions are discussed. drive test tool Ascom TEMS 10.2.1 is used to perform drive test. if optimization done continuously it will attract more and more customers due to service satisfaction. Keywords: GSM,RF optimization ,Drivetest, TEMS drive test tool, BSC,BTS,TRX,QOS References: 1. 2. TEMS investigation user’s manual, 11.0, Ascom- 2010. Bilal Haider, M Zafrullah Khan, M.K.Islam: Radio Frequency Optimization and QOS in operational GSM network. 95-99 3. 4. 5. 24. Syed Imran Basha, Idrish Shaik: Reducing Handover Failure Rate by RF Optimization Wireless Communications, Principles and Practice, 2nd edition, Theodore S. Rappaport, Pearson publications. [2] ITU-T recommendation G.1000 (2001), Communication quality ofService: A framework and definition. Authors: Mohammad Ali Adelian Paper Title: Improvement of Substation Earthing Abstract: Designing a proper substation grounding system is quite complicated. Many parameters affect its design. In order for a grounding design to be safe, it needs to provide a way to carry the electric currents into the ground under both normal and faulted conditions. Also, it must provide assurance that a person in the vicinity would not be endangered. The grounding portion of substation design will be explored. In order to properly plan and design the grounding grid, calculations of the following will be done: maximum fault current, grid resistance, grid current, safe touch and step voltages, ground potential rise, as well as expected touch and step voltage levels. Background information and guidelines to design a substation grounding grid will be provided. A set of equations will be presented to calculate whether the design is safe, and finally, an example will be provided that can be used as a template. 100-104 Keywords: Safety, reliability Step Voltage, Touch Voltage. References: 1. 2. 3. 4. 5. 6. 7. Design Guide for Rural Substations”, Rural Utilities Service. United States Department of Agriculture. June 2001. Gonen, Turan. “Electric Power Distribution System Engineering.” CRC Press. 2008. Gonen, Turan. “Electric Power Transmission System Engineering: Analysis and Design.” CRC Press. 2009. "IEEE 80-2000 IEEE Guide for Safety in AC Substation Grounding." "IEEE 81-1983 IEEE Guide for Measuring Earth Resistivity, Ground Impedance, and Earth Surface Potentials of a Ground System.” Markovic, D. Miroslav. “Grounding Grid Design in Electric Power Systems.” TESLA Institute, 1994. NFPA 70-2008. National Electrical Code. 2008. Authors: Ranjit Kumar Bindal Paper Title: A Review of Benefits of FACTS Devices in Power System Abstract: In developing countries, a pressure associated with economical and environmental constraints has forced the power utilities to meet the future demand by fully utilizing the existing resource of transmission facilities without building new lines. Flexible alternating current transmission systems (FACTS) devices are used to control the phase angle, voltage and impedance of high voltage AC lines. By using FACTS devices maximum benefits of transmission system can be managed i.e. utilization of existing transmission assets; increased transmission system availability and enabling environmental benefits. This paper presents different types of FACTS devices and their benefits for transmission in electrical power system. 25. Keywords: Transmission system, FACTS Devices, Benefits these devices. 105-108 References: 1. 2. 3. 4. 5. 26. J.J Paserba, “H ow FACTS controllers benefits AC transmission system,” IEEE transmission on Power Engineering Society, Vol.3, sep2003,pp 949-956. V.K.Candrakar, M.M.Missal, V.P.Rajderkar, S.N.Durve, “Flexible Alternating Current Transmission System (FACTS) for cost effective and reliable transmission of electrical energy,” National Power engineering conference (NPEC-07) ,June-2007. A.A Edris, R Aapa, M H Baker, L Bohman, K Clark, “ Proposed terms and definitions for flexible ac transmission system (FACTS)”, IEEE Tran. on power delivery Vol. 12, No.4, Oct 1997. N.G. Hingorani , L. Gyugyi, “ Understanding FACTS : Concepts and Technology of Flexible AC Transmission systems, ” IEEE Power Engineering Society, IEEE press, Delhi 2001. ER.Moal Matru , Rajiv K. verma, “tyristor Based FACTS controllers for electrical transmission system ,” IEEE press, wiley Inter science publication , USA Authors: G.Gokilakrishnan, R.Rajesh, R.Sureshkumar, R.Adithya Paper Title: An Innovative Cost Effective Slipper for Elderly Persons Abstract: This invention of Safety Slippers relates to the safety measures taken on behalf of elderly persons at times of emergency. This idea deals with the integration of program with sensor, transmitter and receiver in a normal slipper to identify the status of the program installed and take the appropriate action in time of need. This idea works on the principle of application of force which is the body weight of the user on the slipper. The concept involves the sensing of the force applied by the user through the sensor placed inside the slipper. The signal thus sensed is passed on to the receiver module through the transmitting module. As long as the signal is sensed continuously, the receiver module keeps the GSM module in deactivated mode. If the signal from the transmitting module is interrupted more than the set time limit, the receiver module activates the GSM module. The GSM module is incorporated with necessary text message or call options to a list of contacts to be sent. When the GSM module activates it alerts the corresponding contacts automatically without the intervention of human regarding the emergency alert. Keywords: safety; slippers; sensor; transmitter; receiver; GSM module References: 1. 2. Ch.Naga KK, Raghu babu YV, A.Gamya, P.Jainath, M. Vijay. Design and development of activation and controlling of home automation system via SMS through microcontroller. International Journal of Engineering Research and Applications ISSN: 2248-9622 Vol. 2, Issue 2,Mar-Apr 2012, pp.1349-1352 Sadeque Reza Khan, Ahmed Al Mansur, Alvir Kabir, Shahid Jaman, Nahian Chowdhury. Design and Implementation of Low Cost Home Security System using GSM Network - International Journal of Scientific & Engineering Research Volume 3, Issue 3, March -2012. ISSN 2229-5518 109-112 3. 4. 5. 6. 7. Gokilakrishnan G, Sureshkumar R, Rajesh R. Safety Slippers. Official Journal of Patent Office, Government of India, Issue No 43/ 2013: 27413: Application Number: 4569/ CHE/2013. Sathya Narayanan, Gayathri S. Design of wireless home automation and security system using PIC microcontroller. International journal of computer applications in engineering sciences - Volume iii, special issue, August 2013 - ISSN: 2231-4946 www.radiolocman.com www.next.gr www.open-electronics.org Authors: Ali Fadhil Naser Optimization of oblique Angle Design of Abutments and piers, and piers Shape of Continuous Paper Title: Prestressed Concrete Box Girder Bridges: Static Analysis part 1 Abstract: Skewed bridges are normally used to cross roadways, waterways, or railways that are not perpendicular to the bridge structure at the intersection. It is required when it is often not possible to arrange that a bridge spans square to the feature that it crosses, particularly where it is important to maintain a relatively straight alignment of a roadway above or below the bridge. The pier shape has important effect on the structural performance of the bridge structure according to the location conditions. The main aims of this study are to select the optimal design of piers shape and skew angles in the prestressed box girder bridge, to study the effects of pier shape and skew angles on the static structural responses. There are 120 bridge model are used in this study. FEM of SAP2000 Ver. 14.0.2 is used in the analysis. The results of structural analysis show that the pier shape and skew angle has significant effects on the static responses of the bridge structure. For vertical displacement, the optimal models are skew angle of bridge structure is range from 36 degree to 54 degree and the solid rectangular pier (skew abutments and skew piers). The models of two square piers (skew abutments and without skew piers) and 48 skew angle is the optimal models for bending moment. For tensile stress, the model of skew angle 48 degree and the model of solid rectangular pier (skew abutments and skew piers) is the optimal model. It can be concluded that the skewed models gives good results than straight model. Keywords: bridge, box girder, bending moment, vertical displacement. References: 1. 27. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 28. F. N. Ali and W. Zonglin, 2011, “Experimental Inspection of Damage and Performance Evaluation after Repair and Strengthening of Jiamusi Highway Prestressed Concrete Bridge in China“, World Academy of Science, Engineering and Technology,V. 73, 2011, pp: 195201. State Department of Transportation, “Washington State Bridge Inspection Manual”, Technical Manual, Washington, USA, 2010. W. N. Al-Rifaie, and A. S. Kareem, “Bridges”, first edition, University of Technology, Baghdad, Iraq, 1986, pp 5-8. G. Fu and P. Chun, “Skewed Highway Bridges”, Final Report to Michigan Department of Transportation, Center for Advanced Bridge Engineering Department of Civil and Environmental Engineering, Wayne State University, Detroit, Michigan, USA. , 2013. SteelConstruction.info, “The free encyclopedia for UK steel construction information”, 2014, http://www.steelconstruction.info/Skew_bridges. NCHRP, “SHEAR IN Skewed Multi-Beam Bridges”, Final Report for National Cooperative Highway Research Program Transportation Research Board National Research Council, USA., 2002. X.H. He, X.W. Sheng, A. Scanlon , D.G. Linzell, X.D. Yu, “Skewed concrete box girder bridge static and dynamic testing and analysis”, Engineering Structures, V. 39, 2012), pp:38–49. S. I. Ibrahim, “Effect of Skew Angle on Behavior of Simply Supported R. C. T-Beam Bridge Decks”, ARPN Journal of Engineering and Applied Sciences, V. 6, No. 8, 2011, pp:1-14. A. Dhar, M. Mazumder, M. Chowdhury and S. Karmakar, “Effect of Skew Angle on Longitudinal Girder (Support Shear, Moment, Torsion) and Deck Slab of an IRC Skew Bridge, The Indian Concrete Journal, 2013, pp:46-52. V. Khatri, P. R. Maiti, P. K. Singh and A. Kar, “Analysis of Skew Bridges Using Computational Methods”, International Journal of Computational Engineering V. 2, No.3, 2012, pp:628-636. F. B. Diab, M. Mabsoutb, and K. Tarhinic,” Influence of Skew Angle on Live Load Moments in Steel Girder Bridges, Bridge Structures, V. 7, 2011, pp: 151–163. C. C. Fu, L. Tim and T. Getaneh, “Theoretical and Field Experimental Evaluation of Skewed Modular Slab Bridges”, State Highway Administration Research Report, Report No.MD-12-SP109B4N, Maryland State Highway Administration. 2012. K. M. Kassahun, “Finite Element Modeling of Skew Slab-Girder Bridges”, Thesis Submitted in partial fulfillment of the requirements for the degree Master of Science Faculty of Civil Engineering and Geosciences Technical University of Delft, 2010. http://en.wikipedia.org/wiki/Vertical_displacement, 2014. V. Samuel, K. Gaston, B. David, C. Denis, and I. Daniele, “Vertical Deflection of a Prestressed Concrete Bridge Obtained Using Deformation Sensor and Inclinometer Measurement”, ACI Structural Journal, V.95, No.5, 1998, pp:518-526. http://www.learneasy.info/MDME/MEMmods/MEM30006A/Bending_Moment/Bending_Moment.html, 2014. http://en.wikipedia.org/wiki/Bending_moment., 2014. http://en.wikipedia.org/wiki/Shear_force, 2014. 113-121 Authors: Ashish B Chaudhari, S. Jebarani Evangeline Paper Title: A Space Vector Pulse Width Modulation Technique to Reduce the Effects of Voltage Unbalances Abstract: A space vector pulse width modulation (SVPWM) technique is a special technique to determine the switching sequence of the semiconductor switches of the inverter. SVPWM provides more efficient use of the dc bus voltage,in comparison with the direct sinusoidal modulation technique.In this paper,switching pulses for three phase inverter has been carried out by using differentiation of alpha voltage vector.To obtain the phase angle,three phase voltages has to be transformed into voltage vectors alpha and beta using Clark’s transformation. In this paper,voltage vector beta has been carried out by differentiating alpha voltage vector using trigonometric relation between alpha and beta vector.The interaction between two voltage vectors has been reduced,which will give better result compare to conventional SVM method for unbalanced voltage conditions.Different unbalances has been introduced for analysis.MATLAB software has been used for simulation. Keywords: Three phase Inverter,Space Vector Pulse Width Modulation,Clark’s transformation,derivation of alpha voltage vector,voltage unbalances. 122-127 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Lutfu Saribulut,Mehmet Tumay, “Robust space vector modulation technique for unbalance voltage disturbances”,Elsevier journal,Electric power Systems Research 80(2010) 1364-1374. Joseph P John,Dr. S. Suresh Kumar, Jaya B,“Space vector modulation based field oriented control scheme for brushless DC motor”,,proceedings of ICETECT 2011 K.Kishore Reddy,K.Vinoth Kumar,P.Ponrajan,S.Ramsankar,“Diode clamped inverter for SVPWM fed induction motor,proceedings of APECT’11 March 2011,FX EC,Tvl. Gupta A.K,,A.M. Khambadkone.(2006) “A space vector PWM scheme for multilevel inverters based on two-level space vector PWM”, IEEE Transactions on Industrial Electronics 53 ,1631–1639 Celanovic N.(2000) “Space vector modulation and control of multilevel converters”, Faculty of the Virginia Polytechnic Institute and State University, PhD. Thesis. Fitzer C., M. Barnes, P. Green. (2004) “Voltage sag detection technique for a dynamic voltage restorer”,IEEE Transactions on Industry Applications 40,203–212. Mondal S.K.,B.K. Bose, V. Oleschuk, J.O.P. Pinto. (2003) “Space vector pulse width modulation of three-level inverter extending operation into over modulation region”, IEEE Transactions on Power Electronics 18, 604–611 Mondal S.K., J.O.P. Pinto, B.K. Bose. (2002) “A neural-network based space-vector PWM controller for a three-level voltage-fed inverter induction motor drive”, IEEE Transactions on Power Electronics 38, 660–669. Pinheiro H., F. Botteron, C. Rech, L. Schuch, R.F. Camargo, H.L. Hey, H.A. Grundling, J.R. Pinheiro.(2002)“Space vector modulation for voltage-source inverters:a unified approach”, Industrial Electronics Society 1 ,23–29. Rodriguez J, J.S. Lai, F.Z. Peng, (2002) “Multilevel inverters: a survey of topologies, controls and applications”,IEEE Transactions on Industrial Electronics 49, 724–738. Sani A.M.(2007) “Advanced modulation techniques for power converters”, The University of Manitoba, Master Thesis. Seok S.H., P.H. Gyu, N. Kwanghee(1999) “An instantaneous phase angle detection algorithm under unbalanced line voltage condition”,Power Electronics Specialists Conference 1, 533–537. Authors: Amir Aliabadian Paper Title: A Robust Clustering Approach Based on KNN and Modified C-Means Algorithm Abstract: Cluster analysis is used for clustering a data set into groups of similar individuals. It is an approach towards to unsupervised learning and is one of the major techniques in pattern recognition.FCM algorithm needs the number of classes and initial values of center for each cluster. These values are determined randomly, so it may cause target function converges to several local center. so many iterative stages are needed, until FCM can reach to global center for each cluster. In this paper, we suggest robust hybrid algorithm in which, we have real unsupervised learning algorithm, no need to initial center value and the number of clusters. The First layer in this algorithm finds initial clustering center by K-nearest neighbor (K-NN) rules based on unsupervised learning approach. In the second layer, we applied FCM only one time for having optimal clustering. It is done by means of Fuzzy clustering validation criterion, unlike FCM that needs iterative process. We applied new algorithm to several set of standard databases (IRIS).results show that this algorithm is more accurate than FCM both in estimation of optimal number of clusters and correctness of devotion of data to their real clusters. Keywords: Cluster analysis. FCM algorithm. K-nearest neighbor. target function. References: 29. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 30. Kuo-Lung Wu, Miin-Shen Yang - Alternative c-means clustering algorithms - Pattern Recognition35 (2002) 2267 – 2278. Dae-Won Kima, Kwang H. Lee, Doheon Lee, - On cluster validity index for estimation of the optimalnumber of fuzzy clusters - Pattern Recognition 37 (2004) 2009 – 2025. Oleg S. Pianykh - Analytically tractable case of fuzzy c-means clustering - Pattern Recognition 39(2006) 35 – 46 Luis Rueda, Yuanquan Zhang - Geometric visualization of clusters obtained from fuzzy clusteringalgorithms - Pattern Recognition 39 (2006) 1415 – 1429 Carl G. Looney - Interactive clustering and merging with a new fuzzy expected value –PatternRecognition 35 (2005) 2413 – 2423 WitoldPedrycz, George Vukovich - Fuzzy clustering with supervision - Pattern Recognition 37(2004) 1339 – 1349 Haojun Sun , Shengrui Wang, Qingshan Jiang - FCM-Based Model Selection Algorithms forDetermining the Number of Clusters - Pattern Recognition 37 (2004) 2027 – 2037 Nabil Belacel, Pierre Hansen, NenadMladenovic - FuzzyJ-Means: a new heuristic for fuzzyclustering - Pattern Recognition 35 (2002) 2193 – 2200 WeilingCai, Songcan Chen, Daoqiang Zhang - Fast and robust fuzzy c-means clustering algorithmsincorporating local information for image segmentation - Pattern Recognition 40 (2007) 825 – 838 Chien-Hsing Chou, Chin-Chin Lin,Ying-Ho Liu, Fu Chang – A prototype classification method andits use in a hybrid solution for multiclass pattern recognition - Pattern Recognition 39 (2006) 624 – 634 N. Zahid, M. Limouri, A. Essaid - A new cluster-validity for fuzzy clustering - Pattern Recognition32 (1999) 1089}1097 Mario G.C.A. Cimino, Beatrice Lazzerini, Francesco Marcelloni – A novel approach to fuzzyclustering based on a dissimilarity relation extracted from data using a TS system - Pattern Recognition39 (2006) 2077 – 2091 Michel MeH nard, Christophe Demko, Pierre Loonis - The fuzzy c-means: solving the ambiguityrejection in clustering - Pattern Recognition 33 (2000) 1219}1237 Malay K. Pakhira, SanghamitraBandyopadhyay, UjjwalMaulik - Validity index for crisp and fuzzy clusters - Pattern Recognition 37 (2004) 487 – 501 Wuhan, Hubei, China ",A Modified FCM Algorithm for MRI Brain Image Segmentation," 2008 International Seminar on Future Bio Medical Information Engineering, December18, 2008 128-132 Authors: N.Rajasekhar, T.V.Rajini Kanth Paper Title: Weather Analysis of Guntur District of Andhra Region using Hybrid SVM Data Mining Techniques Abstract: In the recent years, weather prediction has drawn much attention for research community because it helps in safeguarding human life and their wealth. Apart from that, it is useful in effective prediction of natural calamities, agricultural yield growth, air traffic control, marine navigation, forests growth & military purposes. Literature studies shows that Machine Learning Algorithms proved to be good than the existing techniques / methodologies/traditional statistical methods. Hence development of new Hybrid SVM (Support vector machines) model is required for effective weather prediction by analyzing the given weather data and to recognize the patterns 133-136 existing in it. SVM comes under the set of supervised learning methods for classifications & regression. It will be yielding good results in predicting the weather than the existing machine learning programming techniques. In this paper, Guntur district weather data sets were considered for analysis using the hybrid SVM data mining techniques. Keywords: weather prediction, Machine learning, Data mining techniques, Hybrid SVM. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 31. http://www.timeanddate.com/weather/forecast-accuracy-time.html http://en.wikipedia.org/wiki/Weather_forecasting Folorunsho Olaiya, Application of Data Mining Techniques inWeather Prediction and Climate Change Studies, I.J. InformationEngineering and Electronic Business, 2012, 1, 51-59, Published OnlineFebruary 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijieeb.2012.01.07 Dr. M.H.Dunham, Companion slides for the text, “Data Mining,Introductory and Advanced Topics”, Prentice Hall, 2002. Y.Radhika and M.Shashi, “Atmospheric Temperature Predictionusing Support Vector Machines” International Journal of ComputerTheory and Engineering, Vol. 1, No. 1, April 2009 1793-8201 Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, Estimation of theInfluence of Fertilizer Nutrients Consumption on the Wheat Crop yield in India- a Data mining Approach, 30 Dec 2013, Volume 3, Issue 2, Pg.No:316-320, ISSN: 2249-8958 (Online). Dr.T. V. Rajini Kanth, Ananthoju Vijay Kumar, A Data Mining Approach for the Estimation of Climate Change on the Jowar Crop Yield in India, 25Dec2013,Volume 2 Issue 2, Pg.No:16-20, ISSN: 2319-6378 (Online). A. Vijay Kumar, Dr. T. V. Rajini Kanth “Estimation of the Influential Factors of rice yield in India” 2nd International Conference on Advanced Computing methodologies ICACM-2013, 02-03 Aug 2013, Elsevier Publications, Pg. No: 459-465, ISBN No: 978-93-35107-1495. Dr.David, B.Stephenson, Data analysis methods in weather and Limate research Department of Meteorology University of Reading, July,20, 2005 ,http://www.met.rdg.ac.uk /cag/courses/ Authors: Hasan Iqbal, Divendu Mishra, Anchal Ojha, Arun Yadav, Ravi Kumar Srivastava, Satish Kumar Dwivedi Paper Title: Brick Lifting Machine Abstract: As we can see that during any type of construction work there is a need to carry the bricks from one floor to the other which is done manually by the workers because of which they often get injured and it also consumes a lot of precious time and in turn increases the labour cost, So in order to tackle with this problem with the help of mechanical engineering we had proposed to design a brick lifting machine which can lift up to 50 bricks at a time we had also focused on minimum power consumption and the efficiency so that in minimum power consumption maximum no. of bricks can be lifted. The key points in the designing of the lift is are factor of safety and the counterweight, there are many else technical parameters on which designing of lift depends such as Rate load, rated speed, Height of travel, the number and location of stops, type of drive etc. The motor which will be used for lifting the load will be D.C series motor and the type of drive is gearless traction drive. The gearless traction drive is preferred over geared traction drive because it provides higher efficiency. 137-142 Keywords: D.C. References: 1. 2. 3. 4. 5. 32. Aberkom- Results of experimental work on traction drives, Elevator technology 4 (Proceedings of ELEVCON 92) Amsterdam 1992 Janovysky L – Elevator mechanical design Elis horwood ltd. Thiemann, H. (1979) Elevators, Veb Verlag Technik, Berlin, (in German). Philips R.S Electric lifts pitman publishing , London 1973 Strakosch, G Vertical transportation elevators and escalators 2nd edition John Wiley and sons, new York 1983. Authors: Ruchi Sharma, Aditi Gupta Paper Title: Differentiation of Oral Streptococcal Species by Haemolysis in Blood Agar Medium in Vitro Abstract: Pathogenic bacteria also cause infections such as tetanus, typhoid fever, diphtheria, syphilis, and leprosy. Blood agar medium contain a typical nutrient growth medium enriched with 5% sheep blood. It is useful for encouraging growth of fastidious organisms. The Three Types of Lytic Activities seen on the plate are- clear zone around bacterial growth -RBC hemolyzed completely (Beta-hemolysis, pathogenic); green zone around growth -RBC partially hemolyzed (Alpha-hemolysis); no change around growth -RBC is not hemolyzed (Gamma-hemolysis or no hemolysis). The discrimination of oral bacteria specifically Streptococcal species can be done by haemolysis tests using blood agar medium. Other than ultramicroscopic and morphological studies this experiment also conveys the species differentiation due to its lytic activity. Thus, blood agar medium can be a useful medium for pathogenic bacterial survey and investigation. The present review has proved the importance of blood agar utilization in diagnostics and disease analysis. Keywords: Bacteria,Streptococcus, Blood, Agar, Haemolysis References: 1. 2. 3. 4. 5. 6. Kumar, Vinay; Abbas, Abul K.; Fausto, Nelson; & Mitchell, Richard N. (2007). Robbins Basic Pathology (8th ed.). Saunders Elsevier. pp. 843 ISBN 978-1-4160-2973-1 Ray, C. George; Ryan, Kenneth J.; Kenneth, Ryan (July 2004). Sherris Medical Microbiology: An Introduction to Infectious Diseases (4th ed.). McGraw Hill. p. 237. ISBN 978-0-8385-8529-0. LCCN 2003054180. OCLC 52358530. Rickard A H (2008). "Cell-cell Communication in Oral Microbial Communities". Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0. Rogers A H (editor). (2008). Molecular Oral Microbiology. Caister Academic Press. ISBN 978-1-904455-24-0. Shaikh N, Leonard E, Martin JM (September 2010). "Prevalence of streptococcal pharyngitis and streptococcal carriage in children: a metaanalysis". Pediatrics 126 (3): e557–64. doi:10.1542/peds.2009-2648. PMID 20696723 HW; Gerber, MA; Kaplan, EL; Lee, G; Martin, JM; Van Beneden, C (Sep 9, 2012). "Clinical Practice Guideline for the Diagnosis and Management of Group A Streptococcal Pharyngitis: 2012 Update by the Infectious Diseases Society of America.". Clinical infectious 143-144 7. 8. 9. 10. diseases : an official publication of the Infectious Diseases Society of America 55 (10): e86–102. doi:10.1093/cid/cis629. PMID 22965026. Hahn RG, Knox LM, Forman TA (May 2005). "Evaluation of poststreptococcal illness". Am Fam Physician 71 (10): 1949–54. PMID 15926411. Baltimore RS (February 2010). "Re-evaluation of antibiotic treatment of streptococcal pharyngitis". Curr. Opin. Pediatr. 22 (1): 77–82. A. Wayne, 2007, Clinical Laboratory Standards Institute. Principles and procedures for blood cultures; Approved Guideline. CLSI document M47-PA: Clinical and Laboratory Standards Institute, 2007 Baron EJ, Weinstein MP, Dunne WMJ, Yagupsky P, Welch DF, Wilson DM, eds. Cumitech 1C, blood cultures IV. Washington, DC:ASM Press, 2005 Authors: M. Sai Sarath Kumar, M. Aarthy Paper Title: A 2.8 GHz Low Power High Tuning Voltage Controlled Ring Oscillator Abstract: This work describes a two-stage CMOS Voltage Ring Oscillator (VCRO) using differential delay cells are analyzed. The main aim of the paper is to increase the tuning range of the circuit and obtain a good phase noise at the cost of design complexity and power consumption. Two-stage VCRO implemented in 90 nm Technology realizes a tuning range of 53.40% and a phase noise of -156.328 dBc/Hz for a power consumption of 9.85mW. The phase noise of the VCRO is bettered by cascading more number of stages to trade off power consumption A four-stage VCRO is implemented and achieved a tuning range of 62.15% and a phase noise of -116.608 dBc/Hz. However the power consumption of the circuit increased to 16.45mW. 33. Keywords: Voltage Ring Oscillator, Phase Noise, Tuning Range 145-147 References: 1. 2. 3. 4. 5. 6. “A 1.4GHz CMOS Low-Phase Noise Voltage - Controlled Ring Oscillator”, Ahmad Akmal Abd Ghani and Azilah Saparon, The 5th Student Conference on Research and Development –SCOReD 2007, 11-12 December 2007, Malaysia. “A 900-MHz CMOS Low-Phase-Noise Voltage-Controlled Ring Oscillator”, William Shing Tak Yan and Howard Cam Luong, , IEEE Transactions Circuits and Systems—II:Analog and Digital Signal Processing, VOL. 48, NO. 2,February 2001. B. Fahs, W. Y. Ali-Ahmad, and P. Gamand, “A twostage ring oscillator in 0.13-μm CMOS for UWB impulse radio,” IEEE Trans. Microw. Theory Tech.,vol. 57, no. 5, pp.1074–1082, May 2009. Y. A. Eken and J. P. Uyemura, “A 5.9-GHz voltagecontrolled ring oscillator in 0.18-μm CMOS,” IEEE J. Solid-State Circuits, vol. 39, no. 1, pp. 230–233, Jan. 2004. Changzhi Li, and Jenshan Lin, ‘’A 1–9 GHz Linear Wide-Tuning-Range Quadrature Ring Oscillator in 130 nm CMOS for Non-Contact Vital Sign Radar Application, 2009”.IEEE Microwave and wireless components Letters, VOL. 20,NO. 1, January 2010. B. Razavi, “Design of Analog CMOS integrated circuits,” McGraw Hill, 2001. Authors: Miloni Ganatra, Ashwin Patani Paper Title: Time and Energy Optimizing Signature Indexing Technique Perform and Implementation by VHDL Abstract: The periodic broadcasting of frequently requested data can The periodic broadcasting of frequently requested data can reduce the workload of uplink channels and improve data access for users in a wireless network. Since portable devices have limited energy capacities associated with their relies on battery power, it is important to minimize the time and energy spent on accessing the required data from the broadcasted data. The indexing in the broadcast data plays an important role in this problem. This research intends to study the indexing technique that is used to save the power and to minimize the access time. The simple signature technique to index data is one of the simplest ways to optimize these factors. The VHDL implementation of simple signature model presented here is real time. Keywords: Mobile computing, mobile client, broadcast, signature indexing. 34. References: 1. 2. 3. 4. 5. 6. 7. 8. 35. [Acharya S.,Alonso R., Franklin M and Zdonik S.,”Broadcast Disc: Data Management for Asymmetric Communication Environments”,In Preceeding of ACM sigmod,pp 199-210.1995 Serfert A.and Hung J. “ FlexInd: A Flexible and Parametrised Air Indexing Scheme of Data Broadcast System” EDBT 2006 LNCS 3896 pp 902-920 (2006). T. Imielinski, S. Viswanathan, and B. R. Badrinath. Energy efficiency indexing on air. In Proceedings of the International Conference on SIGMOD, pages 25–36, 1994. Imielinski T., Viswanathan S. and Badrinath B. R., “Data on Air: Organization and Access”, IEEE Transactions on Knowledge and Data Engineering, 9(3): 353-371, 1997. Lee, D.K., Xu, J., Zheng, B. and Lee, W-C, “Data Management in Location-Dependent Information Services”, IEEE Pervasive Computing, 2(3):65-72, July-Sept, 2002. Amermend, D., Aristugi, M. “An Index Allocation Method for Data Access over Multiple Wireless Broadcast Channel” IPSJ Digital Courier, Vol. 2, 852 – 862, 2006. Lee G., Chen e, and Lo S-C, “Broadcast Data Allocation for Efficient Access on Multiple Data Items in Mobile Environments”, Mobile Networks and Applications, 8, 365- 375, 2003. Hu Q., Lee W. C. and Lee D. L. “Indexing Techniques for Wireless Data Broadcast under Data Clustering and Scheduling” CIKM ’99, 1 l/99 Kansas City, MO, USA (1996). Authors: S.Adebayo Daramola, Olujimi Ajayi, Tiwalade Odu Paper Title: Robust Palm-print Feature for Human Identification Abstract: Palm-print is a unique biometric trait commonly uses to distinguish people. Identification of people with aid of machine is needed to solve insecurity challenges in our society. Human palm-print is a good raw material for machine based identification systems. These systems require strong predominate feature from palm-print for successful operation. In this work, a discriminate feature that can be used to differentiate people accurately is extracted from palm-print image. Edge detected palm-print image is sliced into smaller image blocks through centre points thereafter robust feature vector is generated from these smaller image blocks. The new feature was experimental using feature plot and it is shown clearly that this feature will deliver excellent classification result. 148-151 152-155 Keywords: Centre points, City block distance, Image blocks, Palm-print. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. M. Nageshkumar., P.K Mahesh. and M.N. Shanmukha Swamy, “An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image”, International Journal of Computer Science Issues, Vol.2, 2009, pp49-53, S. Zokaee, K. Faez, “Human Identification Based on Electrocardiogram and Palmprint”, International Journal of Electrical and Computer Engineering, Vol.2, No.2, 2012, pp. 261-266. D. Y Liliana, E. T Utaminingsih, “The Combination of Palm print and Hand Geometry for Biometrics Palm Recognition”, International Journal of Video & Image Processing and Network Security. Vol.12, No.1, 2012, pp.1-5. S. Kumra. T. Rao, “A Novel Design for a Palm Prints Enabled Biometric System”, IOSR Journal of Computer Engineering (IOSRJCE) Volume 7, Issue 3, 2012, pp. 1-8. W. K Kong, D. Zhang., W. Li, “Palmprint Feature Extraction using 2-D Gabor Filters”, The Journal of Pattern Recognition Society”, Vol. 36, 2003, pp.2339 – 2347. S. Karar and R. Parekh, “Palmprint Recognition using Phase Symmetry”, International Journal of Scientific and Research Publications, Vol.3, Issue 4, 2013, pp. 1-6. H. M Salman, “Palmprint Characterization Using Multi-wavelet Transform for Human Identification”, Eng.& Tech.Journal, Vol.27, No.3, 2009, pp405-417. J. Guo, Y. Liu, W. Yuan, “Palmprint Recognition Using Local Information from a Single Image Per Person”, Journal of Computational Information Systems, Vol.8 (8), 2012, pp.3199 – 3206. H Imtiaz, S Aich, S A Fattah, “A Novel Pre-processing Technique for DCT domain Palm-print Recognition”, International Journal of Scientific & Technology Research , Volume 1, Issue 3, 2012, pp.31 – 35. N. Swathi, C. Satish, V. S Satyanarayana, P. Ramesh, H. Kumar, N. Bhuma, C. Himabin, “New Palm Print Authentication System By Using Wavelet Based Method”, Signal & Image Processing : An International Journal(SIPIJ) , Vol.2, No.1, . 2011, pp.191 – 203 . K. Ito, T. Aoki, H. Nakajima, K. Kobayashi and T. Higuchi, “A Palmprint Recognition Algorithm using Phase-based Image Matching” , IEEE International Conference of Image Processing , 2006, pp.2669 – 2672. Jyoti Malik1, Ratna Dahiya1, G. Sainarayanan, “Personal Authentication Using Palmprint with Phase Congruency Feature Extraction Method”, International Journal of Signal Processing, Image Processing and Pattern Recognition system. Vol. 4, No. 3, 2011, pp. 19-34. K .Umadevi1 and L.Latha, An Efficient Searching and Clusterig based Palmprint Identification, Research Journal of Computer Systems Engineering – RJCSE, Vol 04, 2013, pp. 613 – 617. K.Shanmugapriya, M. Karthika, Dr. S.Valarmathy, M.Arunkumar, “Performance Evaluation of Contourlet Transform based Palmprint Recognition using Nearest Neighbour Classifier”, International Journal of Emerging Technology and Advanced Engineering Volume 3, Issue 1, 2013, pp. 294 – 299. J. Malik1, G. Sainarayanan and R. Dahiya, “Personal Authentication using Palmprint with Sobel code, Canny edge and Phase Congruency Feature Extraction Method”, ICTACT Journal on Image and Video Processing , Vol. 02, Issue 03, 2012, pp.357- 368. Allen George, G.Karthick, “Palmprint Recognition Using Ridge Features”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 11, 2013 , pp.4288 - 4291 . Authors: R. Abd Allah Paper Title: Busbar Protection Scheme Based on Alienation Coefficients for Current Signals Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for fault analysis. An alienation technique is developed for busbar protection against all ten types of shunt faults, which may locate in busbar protection zone, under different loading levels, fault resistances and fault inception angle. It does not need any extra equipment as it depends only on the three-line currents measurements, of all feeders connected to the protected busbar, which are mostly available at the relay location. It is able to perform fault detection, fault confirmation, faulty phase selection and determine the fault location in about a half-cycle period. Thus, the alienation technique is well suited for implementation in digital protection schemes. The technique is efficient to detect current transformer saturation conditions without needing any additional algorithm. The effects of DC components and harmonics are eliminated with estimation of alienation coefficients. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB package are used to implement the proposed technique. Keywords: Busbar protection, current transformer saturation, fault detection, internal and external faults, alienation coefficient, ATP software, MATLAB. References: 36. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. IEEE Guide for the Application of Current Transformers Used for Protective Relaying Purposes IEEE Std. C 37.110-1996. Working group of the Relay Input Sources Subcommittee of the Power System Relaying Committee “Transient response of current transformers” IEEE Transaction on power apparatus and systems, Vol. PAS-96, no. 6, November/December 1977. W.J. Smolinky “Design Consideration in the Application of Current Transformers For Protective Relaying Purposes”, IEEE Transactions on Power Apparatus and System, Vol. PAS-92, no.4, July/August 1973. D.A. Bradley, C.B.Gray, D.O’Kelly “Transient compensation of current transformers” IEEE Transactions on Power Apparatus and Systems, Vol. PAS-97, no.4, July/Aug 1978 Y.C. Kang, J.K.Park, S.H.Kang, A.T. Johns, R.K. Aggarawal “ An algorithm for compensating secondary currents of current transformers” IEEE Transactions on Power Delivery, Vol.12, no.1, January 1997 D.C.Yu,Z.Wang, J.C. Cummins,H.-J. Yoon,L.A.Kojovic,and D.Stone “Neural network for current transformer saturation correction” in proc. IEEE Transm. Distrib. Conf., New Orrleans,LA,Apr.1999. M.E. Masoud, E.H.Shehab-Eldin, M.M Eissa, and M.F.Elnagar. “A New Compensating secondary current technique for saturated current transformers” The 8thInternational Middle- East power system conference “MEPECON 2001”, PP549-555. Jiuping Pan, Khoi Vu, and Yi Hu “An Efficient Compensation Algorithm for Current Transformer Saturation Effects” IEEE Transactions on Power delivery, Vol. 19, no.4, October, 2004, PP1623-1628. M.A. Salem, M.I. Gilany,Z. Osman and E. aboul Zahab “ A new algorithm for compensating the secondary current during current transformer saturation” The tenth International Middle- East power systems conference “MEPECON 2005” PP 427-433. M.S. Sachdev, T.S. Sidhu, H.S. Gill, ''A busbar protection technique and its performance during CT saturation and CT ratio-mismatch'', Power Delivery, IEEE Transactions on (Volume:15, Issue: 3 ), Page(s):895 - 901, Jul 2000. Xuyang Deng, Jiale Suonan, Zaibin Jiao and Xiaoning Kang, ''A Model Parameter Identification Based Bus-bar Protection Principle'', Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010. Jiale Suonan, Xuyang Deng and Guobing Song, ''A Novel Busbar Protection Based on Fault Component Integrated Impedance'', Power and Energy Engineering Conference (APPEEC), 2010 Asia-Pacific, Page(s):1 – 6, March 2010. Libao Xu, Grasset, H., Xingli Dong, Chenliang Xu and Ruidong Xu, ''A new method for busbar protection stability improvement'', 156-167 14. 15. 16. 17. 18. 19. 20. Developments in Power System Protection (DPSP 2010). Managing the Change, 10th IET International Conference on, Page(s):1-4, April 2010. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual Preliminary Release No. 1.1 - October 2002. W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992. Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976. Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed. Ames, IA: Iowa State Press, pp. 175-178, 1980. Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University Press, pp. 630-633, 1992. Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294323, 1992. Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban,2006. Authors: B. Roja Reddy, Uttarakumari M. Paper Title: Orthogonal MIMO Radar Waveform Performance Analysis with Ambiguity Function Abstract: In this paper, the basic Multiple Input and Multiple Output ambiguity function tool is used to analyze the performance of orthogonal waveforms for MIMO radar antenna system. The orthogonal waveforms like modified Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Polyphase and Discrete Frequency Coding Space Time Waveform (DFCSTW) waveforms are considered. The resolution performance is governed and controlled by the system on transmit using orthogonal waveform diversity. The resolution performance is illustrated using MIMO radar orthogonal waveforms. Keywords: Ambiguity Function (AF), Discrete Frequency Coding Space Time Waveform (DFCSTW), Discrete Frequency Coding Waveform Linear Frequency Modulation (DFCW_LFM), Orthogonal waveforms, Polyphase Waveforms. References: 1. 2. 3. 4. 5. 6. 7. 8. 37. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. E.Fishler, A.Haimovich, R. Blum, L.Cimini, D.Chizhik, and R. Valenzuela, “MIMO radar: An idea whose time has come,” in proceedings of IEEE International Radar conference, Philadelphia, PA, April 2004, pp No.71-78. Qu JinYou Zhang JianYun Liu ChunQuan, “The Ambiguity Function of MIMO Radar,” in IEEE 2007 International Symposium on Microwave, Antenna, Propagation, and EMC Technologies For Wireless Communications, Hangzhou, 16-17 , Aug. 2007, pp no.265 – 268. Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Optimization Using Frequency-Hopping Waveforms,” in 41st Asilomar Conference in Signals, Systems and Computers, Pacific Grove, CA, 4-7 Nov. 2007, pp no. 192 – 196. Chun-Yang Chen, P. P. Vaidyanathan, “MIMO Radar Ambiguity Properties and Optimization Using Frequency-Hopping Waveforms,” in IEEE Transactions on Signal Processing, Vol 56, No. 12, Dec.2008, pp no. 5926- 5936. Harger, Robert O. , “A Note on the Realization of Ambiguity Functions,” in IEEE Transactions on Space Electronics and Telemetry, 12 November 2007, pp no. 127 – 130. Bo Liu, Zishu He, liankui Zeng, “Optimization of Polyphase Code Based on Ambiguity Function for MIMO Radar, ” in International Conference on Communications, Circuits and Systems, Kokura, 11-13 July 2007, pp no. 111 - 114 Chun-Yang Chen and P. P. Vaidyanathan, “ Properties of the MIMO Radar Ambiguity Function, ” in IEEE International Conference Acoustics, Speech and Singal Processing, Las Vegas, NV March 31 2008-April 4 2008, pp no. 2309 – 2312 Yuri 1. Abramovich, Gordon 1. Frazer, “MIMO Radar Performance in clutter Limitations Imposed by Bounds on the Volume and Height Distributions for The MIMO Radar Ambiguity Function,” in 5th IEEE Signal Processing Workshop Array and Multichannel, Darmstadt, 2123 July 2008, pp no. 441 – 445. Yuri I. Abramovich, Gordon J. Frazer, “Bounds on the Volume and Height Distributions for the MIMO Radar Ambiguity Function,” on IEEE Signal Processing Letters, Vol 15, 2008, Vol. 15, 2008, pp no. 505– 508. M. A. Haleem and A. Haimovich, “On The Distribution Of Ambiguity Levels in MIMO Radar, ” in 42nd Asilomar Conference on Signals, Systems, and Computers, Pacific Grove, CA, 26-29 Oct. 2008, pp no. 198 – 202. Daniel R. Fuhrmann, J. Paul Browning, and Muralidhar Rangaswamy, “Ambiguity function analysis for the Hybrid MIMO Phased-array Radar ,” in IEEE Radar Conference, Pasadena, CA, 4-8 May 2009, pp no.1 – 6. Jamil, M. ; Zepernick, H. ; Pettersson, M.I. , “ Properties of ambiguity functions for weighted pulse trains with Oppermann sequences, ” in International Conference on Signal Processing and Communication Systems, Omaha, NE V, 28-30 Sept. 2009, pp no. 1 – 8. Rajesh Sharma, “Analysis of MIMO Radar Ambiguity Functions and Implications on Clear Region ,” in Radar conference, Washington, DC, 10-14 May 2010, pp no.544 – 548. V.U. Reddy, “Signal Design for a Specified Transmit Beampattern, Spatial Ambiguity Function for MIMO Radar: A Brief Review of Recent Results, ” in IEEE Applied Electromagnetic Conference, Kolkatta, Indiai, 18-22 Dec. 2011, pp no. 1-4. Wicks, M.C. ; Vela, R. ; Lo Monte, L.,“ Range-Doppler-Angle Ambiguity Function Analysis in Modern Radar, ”in IEEE International Symposium on Antenna and Propagation Society, Chicago, IL 8-14 July 2012, pp no. 1. Wei Zhou, Haowen Chen, Weidong Jiang, Hongqiang Wang, “Generalized Ambiguity Function Analysis of MIMO SAR ,” in IEEE 11th International Conference Signal Processing, Vol 3, Beijing, 21-25 Oct. 2012, pp no. 1724 – 1728. Honghui Yan, Guowei Shen, Rudolf Zetik, Ole Hirsch, and Reiner S. Thomä, “Ultra-Wideband MIMO Ambiguity Function and Its Factorability, ” in IEEE Transactions on geosciences and Remote Sensing, Vol 51, No. 1, January 2013, pp no.504-519. Uttam K. Majumder, Mark R. Bell, Muralidhar Rangaswamy, “A Novel Approach for Designing Diversity Radar Waveforms that are Orthogonal on Both Transmit and Receive,” in IEEE Radar Conference, Ottawa, April 29 -May 3 2013, pp no. 1 – 6. Waseem Khan, Ijaz Mansoor Qureshi, and Kiran Sultan,“ Ambiguity Function of Phased–MIMO Radar With Colocated Antennas and Its Properties,” in IEEE Geoscience and Remote Sensing Letters, vol PP, Issue:99, 05 December 2013, pp no. 1 – 5. H. Deng, “Polyphase code design for orthogonal netted radar systems,” IEEE Trans. Signal Process., vol. 52, no. 11, pp. 3126–3135, Nov.2004. Bo., Liu., Zishu., He., Jiankui., Zeng., Benyong., Liu, “Polyphase Orthogonal Code Design for MIMO Radar Systems,” Proc. Int. Conf Radar, Shanghai, April 2006, pp. 1-4. Bo Liu, Zishu He, Jun Li, “Mitigation of Autocorrelation sidelobe peaks of Orthogonal Discrete Frequency-Coding waveform for MIMO Radar”, in proceedings of IEEE Radar conference, pp 1-6, China, Chengdu,2008. B. Roja Reddy, M uttarakumari, “Generation of orthogonal discrete frequency coded waveform using accelerated particle swarm optimization algorithm for MIMO radar”, Proceedings of the Second International Conference on Computer Science, Engineering and Applications (ICCSEA 2012), New Delhi, India, Volume 1, pp 13-23, May 25-27, 2012. Smt. B.Roja Reddy, M. Uttara Kumari, “Polyphase orthogonal Wave Form using Modified particle swarm optimization algorithm for MIMO Radar”, ”IEEE International Conference on Signal Processing Computing and Control at WAKNAGHAT-SHIMLA from March 15-17th 2012. 168-173 Authors: Samir S. Rathod, G. Niranjana Paper Title: Effective Resource Utilization for Caching as a Service in Cloud Abstract: With the growing popularity of cloud based data centers as the enterprise IT platform of choice, there is a need for effective management strategies capable of maintaining performance. Caching technology improves the performance of the cloud. Cache as a service (CaaS) model is an additional service to Infrastructure as a service (IaaS). The cloud server process introduce, pricing model together with the elastic cache system. This will increase the disk I/O performance of the IaaS, and it will reduce the usage of the physical machines. The emerging cloud applications provide data management services allowing the user to query the cloud data, paying the price for the infrastructure they use. Cloud management necessitate an economy that manages the services of multiple users in an efficient, but also, resource economic way that allows for cloud profit. The cloud caching service can maximize its profit using an optimal pricing scheme. This scheme requires an appropriately simplified price-demand model that incorporates the correlations of structures in the cache services. The pricing scheme should be adaptable to time changes. This paper proposes a novel price demand model designed for a cloud cache and a dynamic pricing scheme for queries executed in the cloud cache. This will estimates the correlations of the cache services in a time-efficient manner and improve the efficiency of resources in cloud storage infrastructure to deliver scalable service. 38. Keywords: Cloud Computing, CaaS model, Virtual Machine, Remote Memory, Optimal pricing scheme. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 39. 174-178 X. Zhang and Y. Dong, "Optimizing Xen VMM Based on Intel Virtualization Technology," Proc. IEEE Int'l Conf. Internet Computing in Science and Eng. (ICICSE '08), 2008 H. Kim, H. Jo, and J. Lee, "XHive: Efficient Cooperative Caching for Virtual Machines, " IEEE Tran s. Computers, vol. 60, no. 1, Jan. 2011 G. Jung, M. A. Hiltunen, K. R. Joshi, "Amazon Elastic Compute Cloud", Amazon Web Services, 2010. Verena Kantere , Debabrata Dash , Gregory Francois , Sofia Kyriakopoulou, Anastasia Ailamaki Ecole Polytechnique F'ed'erale de Lausanne, "Optimal service pricing for a cloud cache", vol. 23, no. 9, pp. 1345-1358, 2011. M.D. Dahlin, R.Y. Wang, T.E. Anderson, and D.A. Patterson, "Cooperative Caching: Using Remote Client Memory to Improve File System Performance,” Proc. First USENIX Conf. Operating Systems Design and Implementation (OSDI ’94), 1994. A. Menon, A.L. Cox, and W. Zwaenepoel, “Optimizing Network Virtualization in Xen,” Proc. Ann. Conf. USENIX Ann. Technical Conf. (ATC `06), 2006. Hyuck Han, Young Choon Lee, Woong Shin, Hyungsoo Jung, Heon Y. Yeom and Albert Y. Zomaya, "Cashing in on the Cache in the Cloud", IEEE Transactions on Parallel and Distributed Systems, Vol. 23, no. 8, August 2012. C. Park, P. Talawar, D. Won, M. Jung, J. Im, S. Kim, and Y. Choi, “A High Performance Controller for NAND Flash-Based Solid State Disk (NSSD),” Proc. IEEE Non-Volatile Semiconductor Memory Workshop (NVSMW `06), 2006. J. Ousterhout, P. Agrawal, D. Erickson, C. Kozyrakis, J. Leverich, D. Mazie'res, S. Mitra, A. Narayanan, G. Parulkar, M. Rosenblum, S.M. Rumble, E. Stratmann, and R. Stutsman, "The Case for RAMClouds: Scalable High-Performance Storage Entirely in DRAM/' ACM SIGOPS Operating Systems Rev., vol. 43, pp. 92-105, Jan. 2010 C.A. Waldspurger, “Memory Resource Management in VMware ESX Server,” Proc. Fifth USENIX Conf. Operating System Design and Implementation (OSDI `02), 2002. Authors: Vishal Srivastava, Tejasvi Gupta, Sourabh Kumar, Vinay Kumar, Javed Rafiq, Satish Kumar Dwivedi Paper Title: Automatic Side Stand Abstract: The side stand is used for supporting a parked motorcycle. If the rider may forget to retract the side stands before riding, then the undistracted stand hitting the ground and affected the riders control during the turn. Now a day’s sensor are used for ensure that the stand is in released condition. The motorcycle side stand consists of a metallic rod and helical spring which is offset from the centre. Some side stand retract automatically when the motorcycle is lifted up the support some other are fit with electrical interlocks , warning devices or special retracting mechanism. In this paper there is possibility to reduce the evident which is takes place by the side stand. Side stand in two wheelers function the entire weight of the vehicle when it is parked. They are perfect on quick stop when one need to leave the vehicle for short while. They are provided with the spring that pulls it back into position to ensure extra safety. The presented mechanism consists of D.C. motor powered by motorcycles battery. Connected to the worm and worm gear mechanism for reduction of speed of motor and multiply the torque. The motor is actuated by the Rotation sensor which is mounted on the front of the wheel. 179-182 Keywords: D.C. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Everett, S.A., Shults, R.A., Barrios, L.C., Sacks, J.J., Lowry, R. and Oeltmann, J. (2001) Trend and subgroup differences in transportation related injury risk and safety behaviors among high school students. Reeder, A.I., Chalmers, D.J. and Langeley, J.D. (1996) The risky and protective motorcycling opinions and behaviors of young on road motorcyclist in New Zealand A journal paper ‘motorcycle accidents- case study and what do learn from them’ by Ecker, H. Viema University of Technology, Bhimbra P.S, 2009-2010, ‘Electrical machine’. Sharma P.C., 2010-2011, ‘Machine design’ study for design purpose. Singh Sadhu, 2009-2010, ‘Machine design’ study for design purpose. R.S. Khurmi, 2008-2010, ‘Theory of machine study for torque calculation. Sabey, B.E. and Taylor, H. (1980) The known risk We run: The Highway. Hurt, H.H., Ouellet, J.V. and Thom, D.R. (1981) Motorcycle accident cause factors. Grayson, G. and Hakkert, A. (1987) Accident analysis and conflict behaviour. In J. Rothengatter and R. de Bruin (eds) Road user and traffic safety. 11. 12. 13. 14. Malaterre, G. (1990) Error analysis and in- depth accident analysis. Yin, R.K., (1984) case study research, Applied Social research Methods vol. 5. London Sage Publication. 1891- Frederick G.Taylor and R.L GRANSTON, “bicycle support”, U.S.patent 456,347 1928- W.S. Harley and Arthur R. Constantine assignors to Harley Davidson Motor Co., Milwau-kee, “Cycle Support”, U.S. Patent 1,675,551 Authors: Gazal Betab, Ranjeet Kaur Sandhu Paper Title: Fingerprints in Automated Teller Machine-A Survey Abstract: The main objective of this system is to develop a system that will increase the ATM security. However, despite the numerous advantages of ATM system, ATM fraud has recently become more widespread. In this paper, we provide an overview of the possible fraudulent activities that may be perpetrated against ATMs and investigates recommended approaches to prevent these types of frauds.. The ATM will service one customer at a time. A customer will be required to enter a login id and validate his finger print and both will be sent to the bank for validation as part of each transaction. This makes the developed ATM software more secure as compared to the software that authenticates the user merely by using a PIN or password. Keywords: ATM Fraud, ATM Fraud Countermeasures Biometrics, Fingerprint Verification. 40. References: 1. 2. 3. 4. 5. 6. 7. 8. ”Automatic Teller Machine”. The history of computing project. Thocp.net. 17 April 2006 Bhawna Negi 1 , Varun Sharma”Fingerprint Recognition System”, International Journal of Electronics and Computer Science Engineering 872 , www.ijecse.org ISSN- 2277-2011. Bhupesh Gour, T. K. Bandopadhyaya and Sudhir Sharma, “Fingerprint Feature Extraction using Midpoint Ridge Contour Method and Neural Network”, International Journal of Computer Science and Network Security, vol. 8, no, 7, pp. 99-109, (2008). G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, “A Novel Fingerprints Identification System Based on the Edge Detection”, International Journal of Computer Science and Network Security, vol. 8, pp. 394-397, (2008). Pennnam Krishnamurthy and Mr. M. Maddhusudhan Redddy. “Implementation of ATM Security by Using Fingerprint recognition and GSM”, International Journal of Electronics Communication and Computer Engineering.Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy,” Implementation of ATM Security by Using Fingerprint recognition and GSM”, International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X,(2012) Robert Hastings, “Ridge Enhancement in Fingerprint Images Using Oriented Diffusion”, IEEE Computer Society on Digital Image Computing Techniques and Applications, pp. 245-252, (2007). S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System”, International Journal of Information and Communication Technology Research, vol.1, no. 5, pp.197-203, 2011. Authors: Priyank Rajvanshi, Subhash Chand Gupta Paper Title: Single Sign on Using SAML 183-186 Abstract: With the proliferation of SaaS and other web-based applications, identity management is becoming a major concern for businesses. Just think about the number of usernames and password you regularly type each day. You probably log into your company's network, portal, webmail, benefits system, Google Apps, bespoke applications and of course Force.com applications. Now multiply this by the number of users in your company and think about the support and security implications. You need dedicated resources to manage your identity store, respond to password reset requests, provision new users for each system and deactivate users that no longer need access. Just think of the number of man hours you could save if you could eliminate 25-50% of your passwords and their associated costs. Implementing a Single Sign-On (SSO) infrastructure enables users to sign in once and have access to all authorized resources. In this article, we'll look at the different methods of implementing SSO with Force.com, how to set up your own open source identity management system for federated authentication using SAML 2, and how to configure the Force.com platform to utilize your new identify provider. We'll also provide some troubleshooting techniques and outline some best practices to help you avoid common roadblocks, getting you up and running fast. In our approach we are trying to create Single Sign On in Salesforce so that in the applications which are connected to salesforce can be authenticated with this approach. 41. Keywords: Security, Identity Provider, SAML, Single Sign-On, Web, Authentication. References: OASIS Frequently Asked Questions “http://www.oasis- open.org/who/faqs.php”, 2009. P. Madsen. SAML 2: The Building Blocks of Federated Identity “http://www.xml.com/pub/a/2005/01/12/saml2.html”, 2005. Differences Between SAML V2.0 and SAML V1.1. “https://spaces.internet2.edu/display/SHIB/SAMLDiffs”, Feb. 2007. N. Ragouzis et al. Security Assertion Markup Language (SAML) V2.0 Technical Overview. “http://www.oasisopen.org/committees/download.php/22553/sstc-saml-tech- overview.pdf”, Feb. 2007. 5. S. Cantor et al. Metadata for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasisopen.org/security/saml/v2.0/saml-metadata-2.0-os.pdf”, March 2005. 6. M. Theimer. HttpFox 0.8.4. “https://addons.mozilla.org/en- US/firefox/addon/6647”, 2009. 7. HttpWatch. “http://www.httpwatch.com/”, 2009. 8. F. Hirsch et al. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. “http://docs.oasisopen.org/security/saml/v2.0/saml- sec-consider-2.0-os.pdf”, March 2005. 9. S. M. Hansen, J. Skriver, and H. R. Nielson. “Using static analysis to validate the SAML single sign-on protocol”, in Proceedings of the 2005 workshop on Issues in the theory of security (WITS ’05), 2005, pages 27–40. 10. T. Großand, and B. Pfitzmann, “Saml Artifact Information Flow Revisited”. Research Report RZ 3643 (99653), IBM Research, “http://www.zurich.ibm.com/security/publications/2006/Gr Pf06.SAML-Artifacts.rz3643.pdf”, 2006. 11. S. Gajek, L. Liao, and J. Schwenk. “Stronger TLS bindings for SAML assertions and SAML artifacts”, in Proceedings of the 2008 ACM Workshop on Secure Web Services (SWS ’08), 2008, pages 11-20. 1. 2. 3. 4. 42. Authors: R. Abd Allah 187-193 Paper Title: Automatic Power Factor Correction Based on Alienation Technique Abstract: In modern digital protection and control systems, an alienation technique has recently become the workhorse of quantitative research and analysis. In this paper, an alienation technique is developed for calculations of original power factor on-line, active and compensation reactive powers and determination of the required number of capacitor banks to get the desired power factor. Alienation coefficients are calculated between phase voltage and current signals of power supply. These calculations are performed within one-cycle. Thus, the algorithm is well suited for implementation in a digital reactive power control scheme. This scheme is able accurately to identify the required capacitor rating to get the desired power factor under different loading levels. It does not need any extra equipment as it depends only on the voltage and line-current measurements which are mostly available at the relay location. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed technique. Keywords: Power system, power factor correction, correlation coefficient, alienation coefficient, reactive power control relays, ATP software, MATLAB.. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 43. K. K. Kapil, “Reduction in transmission and distribution loses, an opportunity for earning carbon credits”, Available online: http://www.slideshare.net/kris_kapil/cdm-in-reduction-in-transmission and-distribution-losses. Y. Jiang, F.C. Lee, G. Hua and W. Tang, “A novel single-phase power factor correction scheme,” Eighth Annual Applied Power Electronics Conference and Exposition, pp: 287-292, 1993. S. Basu and M.H.J. Bollen, “A Novel Common Power Factor Correction Scheme for Homes and Offices,” IEEE Transactions on Power Delivery, Volume: 20, Issue: 3, pp: 2257 - 2263, 2005. L. W. W. Morrow, “Power-factor correction,” Transactions of the American Institute of Electrical Engineers, vol. XLIV, pp. 1–7, Jan 1925. D.K. Maly and K.S. Kwan, “Optimal battery energy storage system (BESS) charge scheduling with dynamic programming,” IEE Proceedings in Science, Measurement and Technology, pp: 453- 458, 1995. Fang Lin Luo and Hong Ye, ''Research on DC-Modulated Power Factor Correction AC/AC Converters'' Industrial Electronics Society, 2007. IECON 2007. 33rd Annual Conference of the IEEE, PP: 1478 – 1483, Nov. 2007. Shicheng Zheng, Electr. & Inf. Sch. And Biqing Liao,''Research on active power factor correction based on PDC control'', Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on, PP:1413 – 1418, May 2009. Mather, B.A. and Maksimovi , D., ''A Simple Digital Power-Factor Correction Rectifier Controller'', Power Electronics, IEEE Transactions on (Volume: 26 , Issue: 1) , PP: 9 – 19, Jan. 2011. Wang Su, ''Research and Simulation of Active Power Factor Correction Based on the Three-Phase Rectifier'', Power and Energy Engineering Conference (APPEEC), 2011 Asia-Pacific, PP:1 – 3, March 2011. J. Hazra, Balakrishnan Narayanaswamy, Kaushik Das, Ashok Pon Kumar, Deva P Seetharam, De Silva Liyanage and Sathyajith Mathew "Decentralized Power Factor Correction." Sustainable Future Energy 2012 and 10th See Forum Innovation for Sustainable and Secure Energy 21-23 November 2012, Brunei Darussalam. Sanjay N. Patel, Mulav P. Rathod, Keyur C. Patel, Parth H. Panchal, Jaimin N. Prajapati , ''Thyristorised Real Time Power Factor Correction (TRTPFC)'', International Journal of Engineering Research & Technology, Vol.2 - Issue 3, March – 2013. Abhinav Sharma, Vishal Nayyar, S. Chatterji, Ritula Thakur3and P.K. Lehana, ''PIC Microcontroller Based SVC for Reactive Power Compensation and Power Factor Correction'', International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 9, September 2013. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002. W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992. Edwards, A. L. "The Correlation Coefficient." Ch. 4 in an Introduction to Linear Regression and Correlation. San Francisco, CA: W. H. Freeman, pp. 33-46, 1976. M.Vitins, "A correlation Method for transmission line protection'', IEEE Transactions Power Apparatus and Systems, Vol.97, No.5, Sep/Oct 1978, pp.1607-1617. Snedecor, G. W. and Cochran, W. G. "The Sample Correlation Coefficient r and Properties of r." 10.1-10.2 in Statistical Methods, 7th ed. Ames, IA: Iowa State Press, pp. 175-178, 1980. Press, W. H.; Flannery, B. P.; Teukolsky, S. A.; and Vetterling, W. T. "Linear Correlation", Cambridge, England: Cambridge University Press, pp. 630-633, 1992. Spiegel, M. R. "Correlation Theory." Ch. 14 in Theory and Problems of Probability and Statistics, 2nd ed. New York: McGraw-Hill, pp. 294323, 1992. Authors: R. Abd Allah Paper Title: Protection Scheme for Transmission Lines Based on Correlation Coefficients Abstract: In modern digital power system protection systems, statistical coefficients technique is recently used for fault analysis. A correlation technique is developed for faults detection and discrimination. The proposed technique is able to accurately identify the condition of phase(s) involved in all ten types of shunt faults that may occur in extra high-voltage transmission lines under different fault resistances, inception angle and loading levels. The proposed technique does not need any extra equipment as it depends only on the three line-currents measurements which are mostly available at the relay location. This technique is able to perform the fault detection, type and phase selection in about a half-cycle period. Thus, the proposed technique is well suited for implementation in digital protection schemes. The proposed methodology is applied for a part of 500 KV Egyptian network. Alternative transient program (ATP) and MATLAB programs are used to implement the proposed technique. Keywords: Power system, fault detection, fault classification, correlation coefficient. References: 1. 2. 3. 4. M. M. Saha et al., “A new accurate fault location algorithm for series compensated lines,” IEEE Trans. Power Delivery, vol. 14, pp. 789– 797, July 1999. A. G. Phadke, Computer Relaying for Power Systems. New York: Wiley, 1988. R. K. Aggrawal, Q. Y. Xuan, R. W. Dunn, and A. Bennett, “A novel fault classification technique for double-circuit line based on a combined unsupervised/supervised neural network,” IEEE Trans. Power Delivery, vol. 14, pp. 1250–125, Oct. 1999. W.-M. Lin, C.-D. Yang, and J. H. Lin, “A fault classification method by RBF neural network with OLS learning procedure,” IEEE Trans. 194-202 203-212 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. Power Delivery, vol. 16, pp. 473–477, Oct. 2001. T. Dalstein and B. Kulicke, “Neural network approach to fault classification for high speed protective relaying,” IEEE Trans. Power Delivery, vol. 10, pp. 1002–1011, Apr. 1995. D. K. Ranaweera, “Comparison of neural network models for fault diagnosis of power system,” Elect. Power Syst. Res., pp. 99–104, 1994. K. H. Kim and J. K. Park, “Application of hierarchical neural networks to fault diagnosis of power system,” Int. J. Elect. Power Energy Syst., vol. 15, no. 2, pp. 65–70, 1993. A. L. O. Fernandez and N. K. I. Ghonaim, “A novel approach using a FIRANN for fault detection and direction estimation for high voltage transmission lines,” IEEE Trans. Power Delivery, vol. 17, pp. 894–901, Oct. 2002. Poeltl and K. Frohich, “Two new methods for fast fault type detection by means of parameters fitting and artificial neural networks,” IEEE Trans. Power Delivery, vol. 14, pp. 1269–1275, Oct. 1999. A. Girgis and M. B. Johns, “Ahybrid expert system for faulted section identification, fault type classification and selection of fault location algorithms,” IEEE Trans. Power Delivery, vol. 4, pp. 978–985, Apr. 1989. A. Protopapas, K. P. Psatiras, and A. V. Machias, “An expert system for substation fault diagnosis and alarm processing,” IEEE Trans. Power Delivery, vol. 6, pp. 648–655, Apr. 1991. H. T. Yang, W. Y. Chang, and C. L. Huang, “On line fault diagnosis of power substation using connectionist expert system,” IEEE Trans. Power Syst., vol. 10, pp. 323–331, Feb. 1995. A. Ferrero, S. Sangiovanni, and E. Zapitelli, “A fuzzy set approach to fault type identification in digital relaying,” IEEE Trans. Power Delivery, vol. 10, pp. 169–175, Jan. 1995. H.Wang andW.W. L. Keerthipala, “Fuzzy neuro approach to fault classification for transmission line protection,” IEEE Trans. Power Delivery, vol. 13, pp. 1093–1104, Oct. 1998. T. Adu, “An accurate fault classification technique for power system monitoring devices,” IEEE Trans. Power Delivery, vol. 17, pp. 684– 690, July 2002. M.E. Masoud, M.M.A. Mahfouz, “Protection scheme for transmission lines based on alienation coefficients for current signals”, IET Gener. Transm. Distrib., Vol. 4, Iss. 11, pp. 1236 – 1244. March 2010 W. Hauschild, and W. Mosch, “Statistical Techniques for High Voltage Engineering”, hand book, English edition published by peter pere grinus Ltd., London, United Kingdom, chapter 2, pp. 78-79, 1992. Instruction Manual for Generator Electrical Equipment, Upper Egypt Electricity Production Company, Elkureimat П 750 MW Combined Cycle Project, Steam Turbine Generator & Auxiliaries (Generator Electrical Equipment), Hitachi, Ltd., Tokyo Jaban. ATP - version 3.5 for Windows 9x/NT/2000/XP - Users' Manual – Preliminary Release No. 1.1 - October 2002. Authors: Ghazala Y. Hermiz, Bushra A. Aljurani, Md. Ali H. Al-Beayaty Paper Title: Effect of Mn Substitution on the Superconducting Properties of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ Abstract: The present study includes the preparation of Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ compound with x = 0.0, 0.1, 0.2, 0.3, 0.4 and 0.5 by solid state reaction method. The effect of the substitution of Mn on Ca site on superconducting properties has been investigated to obtain the optimum conditions for the formation and stabilization of the high Tc phase. Energy dispersive X-ray spectroscopy (EDX) analysis was used to test the proportions and energies of the elements of the compound. The crystal structure was examined by XRD for all superconductor samples; it was found that the crystal structure was orthorhombic and all major peaks in the spectra could be pointed to 2223-phase with amount of 2212-phase ; a small volume fraction of impurities like Ca2CuO3, CuO and Sr2Ca2Cu7Oδ were noticed in some samples. The highest Tc obtained for Bi1.7Pb0.3Sr2Ca2-xMnxCu3O10+δ composition was 118K for the sample with x=0.3.Scanning electron microscopy (SEM) has been used to identify the morphology of the superconducting phase and to investigate the influence of substitution effect of Mn on Ca site .The microstructure shows plate –like layered with increasing of voids and defect for samples with x=0.1,0.2,while the grains become smaller with disappear of grain boundaries of sample with x=0.3. Keywords: Bi-based superconductors, Mn substitution, •Scanning electronic microscopy. 44. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 45. P.Vase,R.Flukiger,M.Leghissa and G.Glowacki,“Current status of high-TC wire,” Supercond. Sci. Technol., vol. 13, 2000,pp. R71-R84. Y. Huang, J.Kerby,T. Nicol and T.Peterson,“Progress in Bi=2223 wire performance” presented at CEC-ICMC , Madison, Wisconcin,USA,2001,16-20. B.L. Gyorffy, Z. Szotek, W.M. Temmerman, O.K. Andersen and O. Jepsen, “On the Quasi Particle Spectra of High Temperature Superconductors", Phys.Rev.B vol.58,1998,pp.1025. Retoux R, Studer F, Michel C, Raveau B, Fontaine A, Dartyge E. "Valence state for bismuth in the superconducting bismuth cuprates" Phys Rev. B vol.41(1),1990,pp.193-199 . H.Maeda, Y.Tanaka, M.Fukutomi ,T.Asano"A New High-Tc Oxide Superconductor without a Rare Earth Element"Jpn. J. Appl.Phys. vol.27, 1988,pp.209–210. G.Yildirim,S.Bal,E.Yucel,M.Dogruer,M.Akdogan.A.Varilci,C.Terzioglu" Effect of Mn Addition on Structural and Superconducting Properties of (Bi, Pb)-2223 Superconducting Ceramics "J Supercond. Nov. Magn. vol 25,2012,pp.381–390. I.Verma, R. Rawat, V. Ganesan, D. M. Phase and B. Das ,The Effect of Mn Substitution on Properties of Bi1.6Pb0.4Sr2 Ca2−xMnxCu3Oy Superconductors , IndiaJ Supercond Nov Magn.,vol. 25,2012,pp.85–90. R. Kumar• I.Verma • N.Verma ,V. Ganesan “Effect of Mn on the Surface Morphological Properties of (Bi,Pb)2Sr2Ca2Cu3−x MnxO10+δSuperconductor J. Supercond. Nov. Magn. Vol.25,2012,pp1215–1221. J. S. Hawa,H. Azhan ,S. Y. Yahya ,K. Azman ,H. N. Hidayah and A. W. Norazidah”The effect of Eu substitution onto Ca site in Bi(Pb)2223 superconductor via co-precipitation method” J. Supercond. Nov. Magn., Vol. 26, 2013, pp. 979-983. A.Ashish, “processing–property relationships for high Tc ceramic superconductors in the Bi-Ca-Sr-Cu-O system” Ph.D. Thesis, University of Illinois at Urbana –Champaign, 1992. L.W.Lei, Z.Y. Fu, J.Y.Zhang, "Influence of sintering temperature on microstructure and magnetotransport properties of La0.8Na0.2MnO3 ceramics" Materials Letters vol.60, 2006,pp. 970-973 . V.Primo,F.Sapina,M.J.Sanchis,R.Ibanez,A.Beltran,D.Beltran,"A new improved synthesis of the 110 K bismuth superconducting phase: freeze-drying of acetic solutions” Materials Letters vol.15,1992,pp.149-155. Authors: Ms.Anagha.C.K, Mrs.S.Berclin Jeyaprabha , Ms.Shaema Lizbeth Mathew Paper Title: Optimal Sizing of Building Integrated Hybrid Energy system Abstract: In this study, an optimal sizing for building integrated hybrid photovoltaic, diesel generator and battery system for zero load rejection is performed. The optimization is obtained by considering the loss-of-load probability (LLP) of the system less than 0.01. For this system, the average daily solar radiation is collected from ‘Thondamuthur’region, Coimbatore. The load demand is collected from Civil Department building of Karunya 213-217 218-222 University. The optimization presented in this study aims to calculate the optimum size of a PV array and diesel generator, and battery which examine the minimum system cost. An optimization problem in terms of system unit cost is solved graphically in this study. The results of the optimization show that a photovoltaic/diesel generator choice is more feasible compared to a standalone photovoltaic system or diesel generator system. Keywords: Diesel Generator, Photovoltaic energy, Renewable energy, Sizing of the system References: R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–diesel systems using genetic algorithms‖, Solar Energy 79 (2005) 33–46. 2. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the design and operation strategy of hybrid-PV energy systems‖, Solar Energy 61 (1997)77–87. 3. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40. 4. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖, Solar Energy 66 (1999)1–9. 5. Tamer Khatib, A. Mohamed, K. Sopian, M. Mahmoud, ―Optimal sizing of building integrated hybrid PV/diesel generator system for zero load rejection for Malaysia‖. 6. Ganguly, D. Misra, S. Ghosh, ―Modeling and analysis of solar photovoltaic electrolyzer - fuel cell hybrid power system integrated with a floriculture greenhouse‖, Energy and Buildings42 (2010) 2036–2043. 7. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PV/diesel /battery hybrid powersystem for a remotely located population near Rafha, Saudi Arabia‖, Solar Energy 35(2010)46-48. 8. R. Dufo-López, J.L. Bernal-Agustín, ―Design and control strategies of PV–dieselsystems using genetic algorithms‖, Solar Energy 79 (2005) 33–46. 9. G.C. Seeling-Hochmuth, ―A combined optimisation concept for the designand operation strategy of hybrid-PV energy systems‖, Solar Energy 61 (1997)77–87. 10. S.H. El-Hefnawi, ―Photovoltaic diesel-generator hybrid power system sizing‖,Renewable Energy 13 (1998) 33–40. 11. M. Ashari And, C.V. Nayar, ―An optimum dispatch strategy using set points for aphotovoltaic (PV)–diesel battery hybrid power system‖, Solar Energy 66 (1999)1–9. 12. S. Rehman, L.M. Al-Hadhrami, ―Study of a solar PVedieselebattery hybrid powersystem for a remotely located population near Rafha, Saudi Arabia‖, Solar Energy 35(2010)46-48 1. Authors: Shaema Lizbeth Mathew, S.Berclin Jeyaprabha, Anagha.C.K Optimal Sizing Procedure for Standalone PV System for University Located Near Western Ghats in Paper Title: India Abstract: This paper presents an optimal sizing procedure and tracking for standalone photovoltaic system located in one of the remote areas of India. This work is based on the meteorological data in Thondamuthur region where Karunya University is located and load demand profile of Computer Technology Centre of Karunya University. The PV array tilt angle is designed optimally based on the optimization algorithm. The PV array can be tilted at various angles in order to receive maximum global solar energy in different season. This strategy of tilt angle adjustment can reduce the use of electromechanical or pure mechanical devices, reduce the number of site visits and increase the solar radiation capturing efficiency. PV array size and storage battery capacity are calculated based on numerical method and compared with intuitive method using MATLAB. It is proved in this paper that the system designed by intuitive method is more expensive than the system designed by the numerical method as the former is based on the worst month data. 46. Keywords: Array size, Battery capacity, Optimal Sizing, Optimization of energy sources, PV tilt angle 223-229 References: 1. 2. 3. 4. 5. 6. 7. 47. A. McEvoy, T. Markvart, L. Castaner, “Practical Handbook of Photovoltaics: Fundamentals and Applications”, Elsevier, New York, NY, USA, 2011. M. Benghanem, “Optimization of tilt angle for solar panel: case study for Madinah, Saudi Arabia”, Applied Energy 88 (2011) 1427–1433. G. Shrestha, I. Goel, “A study on optimal sizing of standalone photovoltaic stations”, IEEE Transactions on Energy Conversion 13 (1998) 373–378. J. Hay, “Calculation of monthly mean solar radiation for horizontal and tilted surfaces”, Solar Energy (1979) 23. T. Khatib, A. Mohamed, K. Sopian, M. Mahmoud, “A new approach for metrological variables prediction using ANNs: application for sizing & maintain PV systems”, Journal of Solar Energy Engineering 134 (2) (2012) 205–217. Omidreza Saadatian, K Sopian, B R Elhab, Mh Ruslan, Nilofar Asim, “Optimal Solar Panels’ Tilt Angles and Orientations in Kuala Lumpur, Malaysia”, Advances in Environment, Biotechnology and Biomedicine ISBN: 978-1-61804-122-7. M.Jamil Ahmed, G.N.Tiwari, “ Optimization of tilt angle of solar collector to receive maximum radiation” , Open Renewable Energy Journal, 2009, 2, 19-24. Authors: Manjula Athani, Neelam Pathak, Asif Ullah Khan Paper Title: Dynamic Music Recommender System Using Genetic Algorithm Abstract: Web-based systems are popular in many different areas, with the users they tend to deliver customized information by means of utilization of recommendation methods.The recommender system also has to recognize and provide items corresponding with user favorites. In this paper we presented a dynamic recommender system for music data. This system is able to identifying the n-number of users preferences and adaptively recommend music tracks according to user preferences. we are extracting unique feature of each music track. Then we are applying BLX-a crossover to a extracted features of each music track. User favorite and user profiles are included. Multiuser dynamic recommender system for n-user combines the two methodologies, the content based filtering technique and the interactive genetic algorithm by providing optimized solution every time and which is based on user’s preferences hence it give better result and better user system.. Keywords: recommender system: Interactive genetic algorithm; BLX-a crossover. 230-232 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. Hyun-Tae Kim,Jong-Hyun Lee, Chang Wook Ahn :A Recommender system Based on Genitic Algorithm for Music Data Second International Conference on Computer Engineering and technolory v-6 415 Balabanovic ,M.and Shoham,Y.(1997).Recommender as classification: Using Social and Content Based Information in recommendation. In Proceedings of National Conference on Artificial Intelligence,PP.714-720. Goldberg,D.,Nichols,Oki,B.M.,andTerry,D.(1992).Using Collaborative Recommendation.In Proceedings of European Conference on Research,7,pp 395-410. Balabanovic ,M.,Shoham Y.FAB: Content-based,Collaborative recommendation.Communications of the Association for Comuputing Machinery 40(3)(1997) 66-72. D.E. Goldberg and J.H. Holland. “Genetic Algorithm and Machine Learning” Machine Learning,vol 3,n0 2-3,pp95-99,1988. H. Takagi,” Interactive Evolutionary Computation: Fusion of the Capabilities of EC Optimization and Human Fvalution, ”Proceedings of the IEEEE, vol 89, pp.1275-1296,2001 D.Thierens and D.Goldberg, “Elitist Recombination: An Integrated Selection Recombination GA, “ in Proceedings of the First IEEE Conference on Evoltionary Computation,pp508-512,1994. J.F. Crow and M. Kimura, “ Efficiency of Trucation Selection ,”in Proceedings of the National Academy of Sciences of the United States of America, vol 76, no 1 396-399,1979. F. Herrea,M.Lozano,and J.L. Verdegay, “Trackling Real-coded Genetic Algorithms : Operators and Tools for Behavioural Analysis, ”Artificial Intelligence Review, vol 12,265-319,318. R .Burke. “Hybrid Web Recommender Systems” Lecture Notes in Computer Science,vol.4321,pp 377-408,Sringer Berlin: Heidelberg,2007. M.J.Pazzani, “A Framework for collaborative, content-based and Demographic Filtering, ”Artificial Intelligence Review,vol.13,no 5-6,pp .394-408,1999. Elitist Recombination, An Integrated selection; Recombination GA ,In proceeding of the first of the first IEEE conferences on Evolutionary Computation ,pp 508-512,1994. J.F. Crow and M. Kimura,” Efficiency of Truncation Selection “ in proceedings of the National Academy, of science of the United States of Americal,vol,76 no 1 ,pp 396-399,1979. Authors: Benderradji R, Gouidmi H, Beghidja A Numerical Simulation of the Interaction Shockwave / Turbulent Boundary Layer: Interference Paper Title: RR/MR Abstract: This study focuses on both the development of the turbulent boundary layer in supersonic flow over a flat plate, the distance required for it to invade the entire section of the plate, and the effects of the size of the interaction area on the development of the boundary layer. Increasing the strength of the interaction is an increase in size of the areas of interaction leading to the formation of a recirculation bubble which is an area of the head losses. For this reason, it can increase and decrease the Mach number for a reflection or Mach explains the impact of the incident shock wave with strong boundary layer. The increase and decrease the Mach number has caused the appearance of a hysteresis loop which is represented by the contours of iso fields’ density. These studies are in agreement with respect to the trial that was presented by J. Delery et al (2009). We were given another contribution and investigations of the phenomenon of wave interaction of shock / turbulent boundary layer. The model used in this study is the kw-SST model, it is considered as the most suitable for this kind of problem, with special treatment of the near-wall region. Numerical simulations were performed using FLUENT software. Keywords: Interaction of shockwave/ boundary layer- Interference shockwaves-Polar shock- RR ReflectionReflection MR. References: 1. 2. 48. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. J. Deleuze, “Structure d’une couche limite turbulente soumise à une onde de choc incident. Thèse doctorat. Université AIX-Marseille II, No. 2079588 (1995). H. Laurent, Turbulence d’une interaction onde de choc/couche limite sur une paroi plane adiabatique ou chauffée, thèse de Doctorat, Université AIX-Marseille II, (1996). J. Délery and J. P. Dussauge, Some physical aspects of shock wave/boundary layer interactions, Shock wave, No. 19 (2009) 453-468. D. S. Dolling, Fifty years of shock-wave/boundary layer interaction research: what next?, AIAA J. No. 39 (8) (2001). A. Hadjadj J, Larsson, B. E. Morgan, J. W. Nichols and S. K. Lele, Large-eddy simulation of shock/boundary layer interaction. Center for turbulence research-proceeding of the Summer ¨Program (2010). S. Deck, P. E. Weiss, M. Pamiès and E. Garnier, Zonal detached Eddy Simulation of spatially developing flat plate turbulent boundary layer, Computer§ Fluids No. 48 (2011) 1-15. K. Sinha, K. Mahesh and G. Candler, Modeling the effect of shock unsteadiness in shock-wave/turbulent boundary layer interactions, AIAA (2004). J. R. Edwards, Numerical simulations of shock/boundary layer interactions using time-dependent modeling techniques: A survey of recent results, Progress in Aerospace Sciences No. 44 (2008) 447-765. J. Y. Choi, I. S. Jeung and Y. Yoon, Scaling effect of the combustion induced by shock-wave boundary layer interaction in premixed Gas, Twenty-seventh symposium (international) on combustion (1998) 2181-2188. S. Pirozzoli and F. Grasso, Direct numerical simulation of impinging shock wave/turbulent boundary layer interaction at M=2.25, Physics of fluids No. 18 065113 (2006). E. Touber and N. D. Sandham, Large-eddy simulation of low-frequency unsteadiness in a turbulent shock-induced separation bubble, Theor. Comput. Fluid Dyn. No. 23 (2009) 79-107. S. Teramoto, Large-Eddy simulation of shock wave/Boundary layer interaction, Trans. Japan Coc. Aero. Space sci. Vol. 47, No. 158 (2005) 268-275. B. Morgan, S. Kawai and S. K. Lele, Large-Eddy simulation of an oblique shock wave impinging on a turbulent boundary layer, 10th fluid dynamics conference and exhibit, AIAA No. 4467 28 june-1 july Chicago, IIIinois (2010). M. Lagha, J. Kim, J. D. Eldredge and X. Zhong, A numerical study of compressible turbulent boundary layers, Physics of fluids No. 23 015106 (2011). M. F. Shahab, G. Lehnasch, T. B. Gatski and P, Comte, DNS of a spatially developing, supersonic turbulent boundary layer flow over a cooled wall, Turbulence, Heat and Masse Transfer 6, (2009). S. Dubos, Simulation des grandes échelles d’écoulement turbulent supersoniques, These Doctorat, INSA de Rouen (2005). C. Hadad, Instationnarités, mouvements d'onde de choc et tourbillons à grandes échelles dans une interaction onde de choc/couche limite avec décollement, Thèse Doctorat, Université de Provence Aix-Marseille I (2005). V. S. Murthy and W. C. Rose, Wall shear stress measurements in shock wave boundary layer interaction, AIAA J. No. 7, 16 (1978) 667672. E. R. Van Driest, Turbulent boundary layer in compressible fluids, J. Aero. Sc. No. 3, 18 (1951) 145-160. Sebastian Deck, Philippe Duvaeu, Paulo d’Espincy et Philippe Guillen: Development and application of Spalart-Allmaras one equation 233-237 turbulence model to three dimensional supersonic complex configurations. Aerospace Science and Technology. (2002) 171-183. 49. Authors: Alsana Bashir, Misba Gul, Javed A Naqash, Ajaz Masood Paper Title: Study of Permeability and Compressive Strength of Silica Fume Concrete Abstract: Qualitatively permeability within concrete may be defined as the ease with which water, air and other substances such as chloride ions or contaminants pass through the concrete pore structure. In general, the relative magnitude of permeability for a given permeant (water, air or any other ion/ salt contaminant) may act as a prima facie indicative parameter of durability of concrete. More the permeability, lesser may be the durability. As durability governs the service life of the structure, thus permeability indirectly affects the service life of the structure. Besides, in relation to durability, permeability invariably becomes a very important aspect for the design of over-head tanks, water retaining structures and open flat roofs where permeability of concrete becomes objectionable. As such making concrete least permeable without harming its compressive strength is of a primal importance for researchers. Present state of knowledge about permeability and methods to decrease it are discretely available from literature. Few pozzolanic materials have been reported to decrease the permeability remarkably. Efforts in this experimental study were primarily aimed at evaluating effect of Silica Fume on important characteristic properties of hardened concrete like crushing strength and permeability. The study was also aimed at optimizing the weight of cement replacing additive (% by weight of the cement), which may be required to cause favorable effects like relatively impermeable concrete, without compromising the strength aspect of the hardened concrete mix. With potential optimization of replacement, the study may also serve as a contrast/guideline, for relative effectiveness of Silica Fume Concrete over conventional Portland Cement Concrete. Keywords: Concrete Permeability, Epoxy Sealing, Permeability cell, Silica Fume, Superplasticizer 238-242 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. M.G.Alexander, and B.J.Magee, “Durability Perfornance of Concrete Containing Condensed Silica Fume”, Cement Concrete Res., 29(6), 1999, pp.917-922. Bayasi, Zing, Zhou, Jing, “ Properties of Silica Fume Concrete and Mortor”,ACI Materials Journal 90 (4) ,1993, pp.349-356. DL.Venkatesh Babu , SC. Nateshan “Investigations on silica-Fume Concrete”, The Indian Concrete Journal, September 2004, pp.57-60 R.Siddique and M. Iqbal Khan, “Supplementary Cementing Materials”, Engineering Materials, Springer-Verlag Berlin Heidelberg ,2011, pp.67-68. Khaloo, A.R; Houseinian, M.R., “Evaluation of Properties of Silica Fume for use in Concrete”, International Conference on Concretes, Dundee, Scotland, 1999. R. Duval, E.H.Kadri, “ Influence of Silica Fume on the workability and Compressive Strength of High Performance Concrete”, Cement and Concrete Research, Vol. 28, Issue 4, Pg. 533 – 547. IS: 4031, Methods of Physical Tests for Hydraulic Cement, Part I, IV, V, VI, 1988. IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards, New Delhi. IS 9103-1999 Concrete Admixtures-Specifications, Bureau of Indian Standards, New Delhi, India. IS: 3085 – 1965, “Indian Standard method of test for permeability of cement mortar and concrete”, Bureau of Indian Standards, New Delhi. IS 5514:1969 Apparatus used in Le-Chatelier test, Indian Standards, New Delhi, India. IS 8112:1989 Specifications for 43 grade ordinary Portland cement, Indian Standards Institution, New Delhi. Authors: Harjot Kaur, Manpreet Kaur Paper Title: Detecting Clones in Class Diagrams Using Suffix Array Abstract: Model Driven Engineering has become standard and important framework in software research field. UML domain models are conceptual models which are used to design and develop software in software development life cycle. Unexpected copy of model elements leads to many problem. Models contain design level similarities and are equally harmful for software maintain -ace as code clones are. So number of clones need to be detected from UML domain models. This paper introduces an approach to detect clones in class diagrams. Class diagram contains redundant element which increases the complexity and need to be removed. Firstly, class diagrams are encoded as XML files. Tokens are extracted and matched using Suffix array technique. The approach is based on finding similarities in tokens known as clones. Keywords: Code clones, Model Clones, Suffix Array. References: 50. Abdul.H.B. and Jarzabek.S.,2005 “Detecting Higher-level Similarity Patterns in Programs” ESEC-FSE’05,ACM,.Lisbon,Portugal. Abdul.H .B., Puglisi.S.J., Smyth.W.F., Turpin.A. and Jarjabek.S., 2007 “Efficient Token Based Clone Detection with Flexible Tokenization” ESEC/FSE’07,ACM ,Cavtat Croatia. 3. Antony.E.P, Alafi.M.H. and Cordy.J.R,,2013 “ An-Approach to clone detection in Behavioral Models” Queen’s university,Kingston,Canada,AAC-WCRE. 4. Deissenboeck.F, Hummel.B,Juergens.E, Pfaehler.M .and Schaetz, B.,2010”Model Clone Detection in Practice``, IWSC`10,Cape Town, South Africa.,pp.37-44. 5. Deissenboeck.F.,Hummel,B.,Juergens,E.,Schatz,B.,Wagner, S.,Giard,J.F. and Teuchert,S.,2008 “Clone Detection in Automotive modelBased Development” ICSE` 08,ACM, Leipzig,Germany.pp.603-612. 6. Falke, R., Koschke, R. and Frenzel, P.,2008.” Empirical Evaluation of Clone Detection Using Syntax Suffix Trees”, Empirical Software Engineering, Vol. 13, No. 6, pp. 601-643. 7. Hummel, B.,Juergens, E. and Steidl, D., 2011” Index-Based Model Clone Detection”, Proceedings of 5th International Workshop on Software Clones, Honolulu, USA, pp-21-27. 8. Lin.H.J. and Peng.L.F.,,2009 “Quick Similarity Measurement of Source Code based on Suffix Array”, International Conference on Computational Intelligence and Security” ,DOI 10.1109/CIS.2009.175. 9. Liu.H, Zhiyi.M , Zhang.L. and Shao.W.,” Detecting Duplications in Sequence Diagrams Based on Suffix Trees” Software Institute, School of Electronics Engineering and Computer SciencePeking University, Beijing , China.. 10. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Comparison and Evaluation of Clone Detection Tools: An Experimental Approach.” CSI journal of computing, Vol 1: No of 4,Pg 44-55,2012. 1. 2. 243-246 11. Kaur M.,Rattan D.,Bhatia R. and Singh M.,”Clone detection in Models : an Empirical Study.” 3rd IBM Collaborative Academia Research Exchange(I-CARE) 2011,New Delhi, India,October 13,2011. 12. Pham.N.H, H. A.,Nguyen, T. T., Nguyen, J.M.Kofahi and Nguyen,T.N.,2009.“ Complete and Accurate Clone Detection in Graph-based Models”, ICSE’09,Vancouver,Canada, IEEE. 13. Petresen.H,2012 “Clone Detection in Matlab Simulink Models” ,IMM-M.Sc,Berlin.. 14. Purchase.H.C, Colpoys.L., McGill.M., Carrington.D. and Britton.C.,2001 “UML class diagram syntax: an empirical study of comprehension”, Australian Symposium on Information Visualization, Sydney,vol.9. 15. Rattan.D, Bhatia.R, and Singh.M ,2013. “Software clone detection: A systematic review”, Information and Software Technology 55 pp.1165-1199. 16. Rattan.D, Bhatia.R and Singh.M, 2012 “ Model Clone detection based on tree comparison”,IEEE ,. 17. Roy, C.K., Cordy J.R. and Koschke, R., 2009. “Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach”, Science of Computer Programming , Vol.74,No. 7,pp. 470-495. 18. Roy, C.K., Cordy J.R. and Kosher, R.,2008. “An Empirical Study of Function clones in Open Source Software Systems”, Proceedings of 15 th Working conference on Reverse Engineering,pp-81-90. 19. Roy, C.K., Cordy J.R. and Koschke, R.,2007.” A Survey on Software Clone Detection Resarch”, Technical Report 2007-541, Queen’s University at Kingston Ontario,Canada,115pp. 20. Storrle.H“ Towards Clone Detection in UML domain models”, DOI:10.1007/s10270-011-0217-9. 21. Yamashina.T, H.Uwano,K.Fushida,Y.Kamei,M.Nagura,S.Kawaguchi and H.Lida,”Shinobi: A Real Time Code Clone Detection Tool for Software Maintenance” nara institute of science and technology. Authors: S B Chikalthankar, G D Belurkar, V M Nandedkar Paper Title: Factors Affecting on Springback in Sheet Metal Bending: A Review Abstract: Spring-back is a very common and critical phenomenon in sheet metal forming operations, which is caused by the elastic redistribution of the internal stresses after the removal of deforming forces. Spring-back compensation is absolutely essential for the accurate geometry of sheet metal components. This paper reviews the various parameters affecting spring back such as punch angle, grain direction of sheet metal material, die opening, ratio of die radius to sheet thickness, sheet thickness, punch radius, punch height, coining force, pre bend condition of strip etc. Keywords: Bending, Die opening, Grain Direction Springback References: 1. 2. 51. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 52. Huang, H. M., Liu, S. D., and Jiang, S. Stress and strain histories of multiple bending–unbending springback process. Trans. ASME, J. Eng. Mater.and Technol.,2001, 123, 384–390. Seo, D. G., Chang, S. H., and Lee, S. M. Springback characteristics of steel sheets for warm U-draw bending.Metals Mater. Int., 2003, 9, 497–501. D’Acquisto, L. and Fratini, L. Springback effect evaluation in three-dimensional stamping processes at the varying blank holder force. J. Mech. Eng. Sci., 2006,220, 1827–1837. Carden, W. D., Geng, L. M., Matlock, D. K., and Wagnor, R. H. Measurement of springback.Int. J. Mech. Sci., 2002, 44, 79–101. Ivina Suchi, Die Design Hnadbook, Edition Second H K Yi1, D W Kim1, C J Van Tyne2, and Y H Moon1, Analytical prediction of springback based on residual differential strain during sheet metal bending.Int. J. Mech. Sci., 2008, 117-129 Recep Kazan, Mehmet Fırat, Aysun Egrisogut Tiryaki, “Source-Prediction of spring back in wipe-bending process of sheet metal using neural network”, Materials and Design 30 (2009) 418–423. SutasnThipprakmas, Finite element analysis of punch height effect on V-bending angle, Materials and Design 31 (2010) 1593–1598 You-Min Huang and Daw-KweiLeu, effects of process variables on v-die bendingprocess of steel sheet, Int. J. Mech. Sci. Vol. 40, No. 7, 631 - 650, 1998 W.M.Chan*, H.I. Chew, H.P.Lee, B.T.Cheok Finite Element analysis of springback of V bending sheet metal forming processes, Journal of Materials Processing Technology 148 (2004) 15-24 Sutasn Thipprakmas, Wiriyakorn Phanitwong, Process parameter design of springback and spring-go in V bending process using Taguchi Technique, Material and Design 32 (2011) 4430-4436. Vijay Gautam, Parveen Kumar, Aadityeshwar Singh Deo, Effect of Punch Profile Radius and Localised Compression on Springback in VBending of High Strength Steel and its FEA Simulation, International Journal Of Mechanical EngineeringAnd Technology (Ijmet) , Volume 3, Issue 3, (2012), 517-530 Luc Papelux, Jean-Philippe Ponthot, “Finite element simulation of spring back in sheet metal forming”, Material Processing Technology, 125-126 (2002) 785-791. Authors: Tahseen Flaih Hasan Paper Title: FPGA Design Flow for SDR Transceiver using System Generator Abstract: Software defined radio (SDR) is highly configurable hardware platform that provides technology for realizing the rapidly expanding third (even future) generation digital wireless communication infrastructure. While among the silicon alternatives available for implementing the various functions of SDR, field programmable gate array (FPGA) is an attractive option in terms of performance, power consumption, and flexibility. This paper examines 16-QAM (Quadrature Amplitude Modulation) SDR transmitter and receiver with an appropriate timing recovery system using FPGA. We provide a tutorial style overview of techniques and schemes for system (abstraction) level design of the 16-QAM SDR transmitter and receiver using Xilinx System Generator, ModelSim and Synplify Pro software, and FPGA implementation (realization) using Xilinx ISE software. Two design alternatives are presented to highlight the rich design space accessible using the FPGA configurable logic. At last, this new design technique would help in designing and realizing SDR to 3G wireless communication system and accelerate the transition to 4G wireless communication system. Keywords: FPGA, 16QAM, SDR, System Generator References: 1. 2. A. Pal, “FPGA-based (Xilinx) Embedded System Design,” Workshop on Microcontroller and FPGA-based Embedded System Design, July 2007. The MathWorks, Inc.. DSP – Digital Signal Processing & Communications. , 2009, [Online]. Available: 247-251 252-258 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 53. http://www.mathworks.com/applications/dsp_comm Xilinx, Inc., DSP Design Flows in FPGA Tutorial Slides, 2003. J. G. Prokis, Digital Communications, 4th ed., New York: McGraw-Hill,2001 D. Haessig, J. Hwang, S. Gallagher, and M. Uhm, “Case-Study of a Xilinx System Generator Design Flow for Rapid Development of SDR Waveforms,” in Proc. SDR 05 Forum Tech. Conf. and Product Exposition, Orange County, California, 2005. C. Dick, F. Harris, and M. Rice, “Synchronization in Software Radios Carrier and Timing Recovery Using FPGAs,” , pp. 195- 204. IEEE, 2000. System Generator for DSP User Guide, Release 9.2.01, Xilinx, Inc., 2007. Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007. P240 Analog Module User Guide, Rev 1.0, Avnet, Inc., May 2006. [Online]. Available: http://www.files.em.avnet.com/files/177/p240_analog-ug.pdf Virtex-4 MB Development Board User’s Guide, Ver. 3.0, AvnetMemec, Dec. 2005. [Online]. Available: http://www.files.em.avnet.com/files/177/v4mb_user_guide_3_0.pdf “ADS5500: 14-bit, 125 Msps, Analog-to-Digital Converter Data Sheet,” Texas Instrument, Inc., Feb. 2007. [Online]. Available: http://focus.ti.com/lit/ds/symlink/ads5500.pdf “DAC5687: 16-bit, 500 Msps, 2x-8x, Interpolation Dual-Channel Digital-to-Analog Converter (DAC) Data Sheet,” Texas Instrument, Inc., June 2005. [Online]. Available: http://focus.ti.com/lit/ds/symlink/dac5687.pdf Synplicity FPGA Synthesis Reference Manual, Synplicity, Inc., 2007. Authors: S.S. Lavhate, Saurabh R. Keskar, Vishal P.Unhale, Avinash Sangale Paper Title: Advanced Paper Cutting Machine using ARM7 Abstract: The proposed system will be an intelligent automated length measurement device composed of the rotary encoder, proximity switches, motor and embedded design consisting microcontroller with digital circuitry etc. this device used as control panel of paper cutting machine, which is used to cut the various kind of paper products, plastic, thin film, leather, slice of nonferrous metal etc. This system can be applicable in paper cutting industry and proves how it can be a low cost solution in the production practice. Keywords: Cutting, Rotary encoder, Safety, touch screen. 259-261 References: 1. 2. 3. Gheorghe Livinţ, VasilHorga, Marcel Răţoi and Mihai Albu Gheorghe Asachi Technical University of Iaşi Romania. Abdel Azzeh, Richard duke “CAN control system for Electric Vehicle”, ENZCon 2005, the 12th Electronics New Zeland Conference. Manukau City, New Zealand, November 2005. Kumar, M. A.Verma, and A. Srividya, Response-Time “Modeling of Controller Area Network (CAN). Distributed Computing and Networking, Authors: Amita Kumari, Rajesh Mehra Paper Title: Design of Hybrid Method PSO & SVM for Detection of Brain Neoplasm Abstract: In the field of medical field ,Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body .This methodology consist of 4 steps: image processing ,image enhancement ,feature extraction and image classification. Image preprocessing is done with the help different gradient operator. Image enhancement step uses the noise removal and histogram equalization. Wavelet based texture feature are extracted from normal and tumor regions. At last optimization is done with the help of PSO and SVM classifier 54. Keywords: MRI, GA, HAAR wavelet, ANN, PSO References: 1. 2. 3. 4. 5. 55. 262-266 Kharrat , A; Gasmi K.; Ben Messaoud ,M; Benamrane N. and Abid M. “ A hybrid approach for automatic classification of brain MRI using genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010. E.F Badran,.; E.G Mahmoud, N Hamdy .“An algorithm for brain tumor in MRI images”, International Conference on Communication Computer Engineering and Systems(ICCES), Networking & Broadcasting, pp 368-373, June, 2010. Abdullah, N.; Lee Wee Chuen; Ngah, U.K.; Ahmad, K.A. “Improvement of MRI brain classification using Principles Component Analysis”, IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011. Lejian Huang, Elizabeth A. Thompson, Vincent Schmithorst, Scott K. Holland, and Thomas M. Talavage. “partially adaptive STAP algorithm approaches to functional MRI” ,IEEE transaction on biomedical engineering ,vol56, no2,February 2009 M Kociolek , A.Materka,M.Strzelecki P.Szczypinski “Discrete wavelet transform –derived features for digital image texture analysis ,proc. of international confrernce on signal and Electronic System, 18-21 ,sep 2001,Lodz,Poland ,pp.163-168 Authors: Sunil Kumar Yadav, Rajesh Mehra Paper Title: Analysis of Different IIR Filter based on Implementation Cost Performance Abstract: In this paper we examine the optimal implementation cost performance of various IIR Filter, which are relevant for real time application therefore these filter can realize any transfer function .these IIR filter is designed and analyzed by FDATOOL and the implementation cost has been analyzed on the basis of filter order, multiplier, adder, and input samples. The Elliptical IIR Filter is examined and comparison from the Butterworth and Chebyshev is done. The Elliptical Filter is minimize the order of filter op to 96.59% to Butterworth Filter, and 85.7% to Chebyshev. Keywords: Filter, IIR, MATLAB, FDATOOL References: 1. 2. 3. Soo-Chang Pei, Huei-Shan Lin “Tunable FIR and IIR Fractional-Delay Filter Design and Structure Based on Complex Cepstrum”IEEE Transactions on circuits and systems—i: regular papers, VOL. 56, pages:2195-2206, OCTOBER 2009. Bojan Jovanovi , and Milun Jevti “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium pages:61-66, February 2010 Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer 267-270 4. 5. 6. 7. 8. 9. Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter using FPGA Devices” International Technology Research Letters, pages:25-31, 2012 Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013 Fábio Fabian Daitx, Vagner S. Rosa, Eduardo Costa, Paulo Flores, Sérgio Bampi, “VHDL Generation of Optimized FIR Filters”, 2008 International Conference on Signals, Circuits and Systems Ke, Zhang, et al. "The application of the IIR filters based on FPGA in the DTV field." On Computer Science-Technology and Applications,. International Forum on. Vol. 3. IEEE, pages: 406-409 2009. Vagner S. Rosa, Fábio F. Daitx, Eduardo Costa, Sergio Bampi, “Design Flow for the Generation of Optimized FIR Filters”, ICECS 2009. Victor DeBrunner, Linda S. DeBrunner, and Anand Mohan “Using 2nd-0rder information to reduce average coefficient length in IIR Filters” IEEE Conference Publications pages 189-192, 2002 Authors: M.Natheera Banu Paper Title: FPGA Based Hardware Implementation of Encryption Algorithm Abstract: Reprogrammable devices such as Field Programmable Gate Arrays (FPGA) are used for hardware implementations of cryptographic algorithm. This paper presents an FPGA based Hardware implementation of advanced encryption standard (AES) with 128-bit key as a constant which is used for encrypting the text file and image for secure transmission. Timing report for the files are taken and conclude that text file of 128 bit size is taking less time to encrypt and decrypt compare to the image file. Synthesizing and implementation (Translate, Map and Place and Route) of the VERILOG code is carried out on Xilinx - Project Navigator ISE 12.3 software. Keywords: AES, decryption, encryption, image and text. References: 1. 2. 56. 3. 4. 5. 6. 7. 8. 9. 10. 11. 13. Xinmiao Zhang and Keshab K. Parhi “HIGH-SPEED VLSI ARCHITECTURES FOR THE AES ALGORITHM” IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, VOL. 12, NO. 9, SEPTEMBER 2004. Jia Zhao, Xiaoyang Zeng*, Jun Han, Jun Chen State-Key Lab ofASIC and System,“VERY LOW-COST VLSI IMPLEMENTATION OF AES ALGORITHM” IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS,2006 Bin Liu, and Bevan M. Baas “PARALLEL AES ENCRYPTION ENGINES FOR MANY- CORE PROCESSOR ARRAYS IEEE TRANSACTIONS ON COMPUTERS, VOL. 62, NO. 3, MARCH 2013 Stefan Mangard Student Member, IEEE, Manfred Aigner, and Sandra Dominikus “A HIGHLY REGULAR AND SCALABLE AES HARDWARE ARCHITECTURE” IEEE TRANSACTIONS ON COMPUTERS, VOL. 52, NO. 4, APRIL 2003 P.Karthigaikumar Soumiya Rasheed “SIMULATION OF IMAGE ENCRYPTION USING AES ALGORITHM” IJCA Special Issue on Computational Science - New Dimensions & Perspectives” NCCSE, 2011. Manoj.B, Manula N Harihar “IMAGE ENCRYPTION AND DECRYPTION USING AES” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012. Jawad Ahmad and Fawad Ahmed “EFFICIENCY ANALYSIS AND SECURE VALUATION OF IMAGE ENCRYPTION SCHEMES” International Journal of Video & Image Processing and Network Security IJVIPNS-IJENS Vol:12 No:04. Mr. Antosh M. Dyade, Prof. Raafiya Gulmeher “MODIFIED SHIFTROW TRANSFORMATION OF AES FOR IMAGE ENCRYPTION” International Journal of Communications And Engineering Vol. 4 Issue 3, Sept. 2013 Sourabh Singh, Anurag Jain “AN ENHANCED TEXT TO IMAGE ENCRYPTION TECHNIQUE USING RGB SUBSTITUTION AND AES” International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue5- May 2013 Amandeep Kaur, Puneet Bhardwaj, Naveen Kumar” FPGA IMPLEMENTATION OF EFFICIENT HARDWARE FOR THE ADVANCED ENCRYPTION STANDARD” International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-3, February 2013 Chityala Prathyusha, P. Sharmila Rani “IMPLEMENTATION OF FAST PIPELINED AES ALGORITHM ON XILINX FPGA” International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Mg Suresh, Dr.Nataraj.K.R” AREA OPTIMIZED AND PIPELINED FPGA IMPLEMENTATION OF AES ENCRYPTION AND DECRYPTION” International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. Authors: Sabah SHehd Abdulabas Paper Title: Efficient Timing Recovery Technique for Software Defined Radio Receiver using FPGA 271-277 Abstract: This paper presents the timing recovery in software defined radio receiver as a widely used technique nowadays. Software defined radios (SDR) is the more configurable hardware platforms that provide the technology for realizing the fast growing third and new generation digital wireless communication structure. The more complex duty performed in a high data rate wireless system is the synchronization. The timing synchronization in SDRs using FPGA based signal processors is introduced. The 16-QAM loop for performing coherent demodulation were described and reported on the suggestion of FPGA automation. A matched filter control system is used to provide and addressed the symbol timing recovery technique. To explain the operations of the timing recovery loop and reflection, much approach is adopted and outlined for FPGA performance. 57. Keywords: Timing Recovery, SDR, FPGA References: 1. 2. 3. 4. 5. 6. 7. 8. Chris Dick, fred harris and Michael Rice, “Synchronization in Software Radios - Carrier and Timing Recovery Using FPGAs”, IEEE, 2000, PP.195-204 H. Meyr, M. Moeneclaey and S. A. Fechtal, Digital Communication Receivers, John Wiley & Sons Inc., New York, 1998. B. Sklar, Digital Communications Fundamentals and Applications, Prentice Hall, Englewood Cliffs, New Jersey, 1988. D. R. Brown III and H. Poor, “Time-slotted round-trip carrier synchronization for distributed beamforming,” IEEE Transactions on Signal Processing, 2008 D. R. Brown III, G. B. Prince, and J. A. McNeill, “A method for carrier frequency and phase synchronization of two autonomous cooperative transmitters,” IEEE 6th Workshop on Signal Processing Advances in Wireless Communication, 2005 Chan, Tsui, Yeung, and Yuk,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007 Durke (2009), “Field Programmable Gate Array Based SDR Design” phd. Thesis, Naval postgraduate school, Department of Electrical and Computer Engineering,California:http://edocs.nps.edu/npspubs/scholarly/theses/2009 Ezra, Joseph and kahn, “Carrier Synchronization for 3-bita and 4-bits per symbol optical transmission”, IEEE, Journal of light wave 278-286 technology, Vol.23, pp.4110-4124, 2005 Jeffry H. Reed, “Software Radio a modern approach to radio engineering”, Prentice Hall PTR, A division of person education Inc, ISBN 013-081158-0, pp.33-123, 2002 10. Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal, online available: http://www.anacom.pt/render.jsp?contentId=761239, 2008 11. Tony, “RF and Digital Signal Processing for Software-Defined Radio”, Elsevier, ISBN 978-0-7506-8210-7, UK, pp. 319, 2009 12. Proakis, and Salehi,. “Digital Communications”, 5th ed., New York, NY: McGraw-Hill, Ch. 3, pp. 95-148, 2008 9. Authors: Varun Singh Nagar, Subhash Chand Gupta Paper Title: Voice and Location Based Appliance Automation System Using Mobile Cloud Abstract: We are in the information technology age. Mobile technology is getting a fast pace in this older population has more ratio than other age group. Smart phones are a great enhancing the use of technology and its advancement. In this paper we are going to present the modular based home automation system environment and the technologies required to achieve the goal of automation. This concept uses voice commands to act as commands to control the appliances in context to home office or car. Cloud platform is used for processing of commands on the air and dispatched from cloud server to controlling modules at home, office or car respectively. As cloud computing is the future of information sharing and shared resource utilization with optimization. This also brief the challenges involved in implementing voice based appliance automation using cloud platform. As it is evident that home automation is in its immature state so other technological challenges should be considered which can affect the system. 58. Keywords: Android, Cloud, Home automation, Speech recognition, Voice based. 287-288 References: Vu Le , Sumit Gulwani , Zhendong Su “SmartSynth: Synthesizing Smartphone Automation Scripts from Natural Language 2013 ACM“ Mitali Patil , Aswini Bedare, Varsha Pacharne “ The Design and Implementation of Voice Controlled Wireless Intelligent Home Automation System Based on ZigBee.“ 978-1-4244-4738-1/09/ 2013 IJARCSSE. 3. Syed Anwaarullah , S.V.Altaf “RTOS based Home Automation System using Android “ Jan-2013 IJATCSE. 4. Humaid Al Shu’eili “ Wireless Home Automation based on Voice Recognition” 5. Andre Coucopulus “Voice Processing for Home Automation Systems” Network Systems Design Line January 2007 6. R.Gadalla “Speech Recognition System for Massey SmartHouse” 7. Jianliang Meng , Jhunwei Zhang “Overview of the Speech Recognition Technology” 978-0-7695-4789-3/12 $26.00 © 2012 IEEE. 8. Rawan T.Khalil , AlaF.Khalifeh , Khalid A Dhrabakh “Mobile-Free Driving with Android Phones: System Design and Performance Evaluation” 2012 – 9th International Multi-Conference on Systems. 9. Fengyu Zhou, Guohui Tian, Yang Yang, Hairong Xiao and Jingshuai Chen “Research and Implementation of Voice Interaction System Based on PC in Intelligent Space” Proceedings of the 2010 IEEE International Conference on Automation and Logistics August 16-20 2010, Hong Kong and Macau 10. M. Saadeq Rafieee , Ali Akbar Khazaei “A Novel Model Characteristics for Noise-Robust Automatic Speech Recognition Based onHMM” 978-1-4244-5849-3/10/$26.00 ©2010 IEEE. 1. 2. Authors: N.Sasirekha, M.Hemalatha Paper Title: Quantum Cryptography using Quantum Key Distribution and its Applications Abstract: Secure transmission of message between the sender and receiver is carried out through a tool called as cryptography. Traditional cryptographical methods use either public key which is known to everyone or on the private key. In either case the eavesdroppers are able to detect the key and hence find the message transmitted without the knowledge of the sender and receiver. Quantum cryptography is a special form of cryptography which uses the Quantum mechanics to ensure unconditional security towards the transmitted message. Quantum cryptography uses the distribution of random binary key known as the Quantum Key Distribution (QKD) and hence enables the communicating parties to detect the presence of potential eavesdropper. This paper also analyses few application areas of quantum cryptography and its limitations. Keywords: Classical Cryptography, Photon polarization, Qubit, Quantum Cryptography, Quantum entanglement, Quantum Key Distribution, Sifting key. References: 59. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Wiesner, Stephen., 1983. "Conjugate coding." ACM Sigact News 15.1: 78-88. Henle, F., 2002. BB84 Demo. http://www.cs.dartmouth.edu/~henle/Quantum/cgi-bin/Q2.cgi Ford, James., 1996. "Quantum cryptography tutorial." http://www.cs.dartmouth.edu/~jford/crypto.html. Harrison, David M., 2001. "Quantum Teleportation, Information and Cryptography." http://www.upscale.utoronto.ca/GeneralInterest/Harrison/QuantTeleport/ QuantTeleport.html. Knight, Will., 2004. "Entangled photons secure money transfer." Newscientist.com. http://www.newscientist.com/news/news.jsp?id=ns99994914. Quantum cryptography. Wikipedia, the free encyclopedia. http://en.wikipedia.org/wiki/Quantum_cryptography. Modified 17 September 2004. The BB84 Quantum Coding Scheme, June 2001. http://www.cki.au.dk/experiment/qrypto/doc/QuCrypt/bb84coding.html Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., "Quantum Cryptography", Reviews of Modern Physics, vol. 74, January 2002, pp. 146 195.http://www.gap-optique.unige.ch/Publications/Pdf/QC.pdf Martinez-Mateo, Jesus, David Elkouss, and Vicente Martin. "Key reconciliation for high performance quantum key distribution." Scientific reports 3 (2013). C. H. Bennett and G. Brassard. 1984.Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proc. IEEE Int. Conf. on Comp.,Sys. and Signal Process., pages 175–179, Bangalore. A. K. Ekert. Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67(6):661–663, 1991. Hughes, Richard J., et al. 1995. "Quantum cryptography." Contemporary Physics 36.3: 149-163. Hoque, S., Fairhurst, M., Howells, G., & Deravi, F. (2005, March 17). Feasibility of generating biometric encryption keys. Electronics Letters, 41(6), 1-2. Webb, W. (2006, July 20). Hack-proof design. (Cover story). EDN, 51(15), 46-54. Lovoshynovskiy, S., Deguillaume, F., Koval, O., & Pun, T. (2005, January). Information-theoretic data-hiding:: recent achievements and 289-294 openproblems. International Journal of Image & Graphics, 5(1), 5-35. 16. Floyd, D. (2006, Fall2006). Mobile application security system (MASS). Bell Labs Technical Journal, 11(3), 191-198. 17. Hughes, D. (2007, May). Cyberspace Security via Quantum Encryption. Military Technology,31(5), 84-87. 18. Sasirekha, N., And M. Hemalatha. "A Hybrid Indexed Table And Quasigroup Encryption Approach For Code Security Against Various Software Threats." Journal of Theoretical & Applied Information Technology 60.2 (2014). 19. Sasirekha, N., and M. Hemalatha. "Novel Secure Code Encryption Techniques Using Crypto Based Indexed Table for Highly Secured Software." International Review on Computers & Software 8.8 (2013). 20. Sasirekha, N., and M. Hemalatha. “A Quasigroup Encryption Based Cryptographic Scheme for Software Protection.” International Journal of Advances in Engineering and Emerging Technology 3.1(2013). Authors: Anamika Mishra, Anju Jaiswal, Ankita Jaiswal, A.K.Niketa Design and Analysis of Conventional CMOS and Energy Efficient Adiabatic Logic for Low Power Paper Title: VLSI Application Abstract: In recent years, low power circuit design has been an important issue in VLSI design areas. Adiabatic logics, which dissipate less power than static CMOS logic, have been introduced as a promising new approach in low power circuit design. energy. This paper proposes an Adder circuit based on energy efficient two-phase clocked adiabatic logic. A simulative investigation on the proposed 1-bit full adder has been implemented with the proposed technique and hence compared with standard CMOS, Positive Feedback Adiabatic Logic (PFAL) and Two-Phase Adiabatic Static Clocked Logic (2PASCL) respectively. Comparison has shown a significant power saving to the extent of 70% in case of proposed technique as compared to CMOS logic in 10 to 200MHz transition frequency range. Comparative results has also been shown by a histogram which represents the least power dissipation of proposed technique. In this paper all circuits are analyzed in terms of power using 0.35um technology and simulated using Pspice . Keywords: Adiabatic logic, energy recovery ,power supply, low power ,Full adder, Positive feedback adiabatic logic, 2PASCL References: 1. 60. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. A.K.Maurya, G. Kumar, "Energy Efficient Adiabatic Logic for low power VLSI APPLICATION," IEEE International Conference on Communication Systems & Network Technologies, pp 460-463,2011. H.M.Meimand and A.A.Kusha and M.Nourani, "Adiabatic Carry look-ahead Adder with Efficient Power Clock Generator," IEEE Proc.Circuit Devices Systems, Vol. 148, No. 5, pp. 229-234,October.2001 S.Kim,M.C.Papefthymiou, "True Single-Phase Adiabatic Circuitry," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 9, No. 1, pp. 52-63, February 2001. W.C.Athas,L.J.Svensson,J.G.Koller,et al.,"Low power digital systems based on adiabatic switching principles,"IEEE Trans.On VLSI systems,2(4),Dec.1994,pp:398-407. P.Saxena ,Prof. D.Chandra and S.Kumar.V, "An Adiabatic Approach for Low Powerful Adder Design," International Journal On Computer Science & Engineering, Vol.3, No. 9,pp.3207-3221,2011 A.Sajid, A.Nafees & S. Rahman, "Design and Implementation of Low Power 8-bit Carry-lookAhead Adder Using Static CMOS Logic and Adiabatic Logic," International Journal Information Technology and Computer Science, Vol.11, pp. 78-92,2013. N.Anuar, Y.Takahashi, and T.Sekine, "Two Phase Clocked Adiabatic Static CMOS Logic and its Logic Family," Journal of Semiconductor Technology and Science, Vol. 10,No. 1, pp. 1-10, 2010. M.S.Dhaka, Gayatri and P.Singh Dhaka, "Adiabatic Logic Gate for Low Power Application," International Journal of Engineering Research and Applications, Vol. 2, No. 3, pp. 2474-2478, 2012. M.Sharma, "Design & Analysis of CMOS Cells using Adiabatic Logic," International Journal of Networks & Systems, Vol. 1, No. 2, pp. 5257, 2012. S.K.Kelly and J.L.Wyatt, "A Power Efficient Neural Tissue Stimulator with Energy Recovery," IEEE Transactions on Biomedical Circuits and Systems, Vol.5, No. 1, pp. 20-29, Feb. 2011. G.Singh ,R.Kumar and M.K.Sharma, "Comparative Analysis of Conventional CMOS and ENERGY Efficient Adiabatic Logic Circuits," International Journal of Emerging Technology and Advanced Engineering,Vol. 3,No.9,pp 260-264,September 2013. D.Maksimovic´, V.G.Oklobdžija, B.Nikolic´, and K. Wayne Current, "Clocked CMOS Adiabatic Logic with Integrated Single-Phase PowerClocked Supply," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.8, No. 4, pp. 460-463, August 2000 P.Teichmann(2012),"Fundamental of Adiabatic Logic," Chapter 2,pp 5-22. S.Goel,A.Kumar and M.A.Bayoumi,(2006),"Design of robust,energy efficient full adders for deep-submicro meter design using hybrib CMOS logic styles," IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol.14, No. 12, pp.1309-1321. Authors: A.Vaishnavi, B.Chanakya Raju, G.Prathiksha, L.Harshitha Reddy, C.Santhosh Kumar Paper Title: Comparison of Two Speaker Recognition Systems 295-299 Abstract: This paper presents a comparison between two speaker recognition systems. One system uses 30 Shannon entropy values extracted from a four level wavelet packet decomposition method in addition to the first three formant frequencies as features and a cascaded feed forward back propagation neural network is used as classifier. The second system uses Mel frequency cepstral coefficients (MFCC) as features and a support vector machine (SVM) as classifier. Results suggest that wavelet based system has better performance than the classic MFCCs with an efficiency of 89.56%. 61. Keywords: Shannon entropy, Formant frequencies, cascaded neural network, MFCC, SVM. References: 1. 2. 3. 4. 5. T. Kinnunen and H. Li, “An overview of text-independent speaker recognition from features to super vectors,” Speech communication.vol. 52, pp. 12-40. 2010. K. Daqrouq, “Wavelet entropy and neural network for text-independent speaker identification,” Engineering Applications of Artificial Intelligence., vol. 24, pp. 796-802. 2011. K. Daqrouq, T. Abu Hilal, M. Sherif, S. El-Hajjar and A. Al-Quawasmi, “Speaker identification system using wavelet transform and neural network,” Advances in Computational Tools for Engineering Applications (ACTEA)., ZoukMosbeh, Lebanon, pp. 559-564. Jul. 2009. R. Sarikaya, J.H.L. Hansen and L. Bryan, “Wavelet transform features with application to speaker identification,” in Proc. of IEEE Nordic Signal Processing Symp., Visgo, pp. 81-84. 1998. M. Siafarikas, T. Ganchev and N. Fakotakis, “Objective wavelet packet features for speaker verification,” in Proc. Of the InterSpeech-2004ICSLP., Jeju, Korea, pp. 2365-2368. Oct. 2004. 300-303 6. 7. Kuruvachan K. George, Arunraj K and Sreekumar K.T, “Towards Improving the Performance of Text/Language Independent Speaker Recognition Systems.” D. A. Reynolds, Thomas F. Quatieri and Robert B. Dunn,“Speaker verification using Adaptive Gaussian Mixture Models,” in Digital Signal Processing Vol. 10.Nos. 1-3,January 2000. Authors: Misba Gul, Alsana Bashir, Javed A Naqash Paper Title: Study of Modulus of Elasticity of Steel Fiber Reinforced Concrete Abstract: Plain, unreinforced concrete is a brittle material, with a low tensile strength, limited ductility and little resistance to cracking. In order to improve the inherent tensile strength of concrete there is a need of multidirectional and closely spaced reinforcement, which can be provided in the form of randomly distributed fibers. Steel fiber is one of the most commonly used fibers. Short, discrete steel fibers provide discontinuous three-dimensional reinforcement that picks up load and transfer stresses at micro-crack level. This reinforcement provides tensile capacity and crack control to the concrete section prior to the establishment of visible macro cracks, thereby promoting ductility or toughness. The modulus of elasticity of concrete is a very important parameter reflecting the ability of concrete to deform elastically. In addition, in order to make full use of the compressive strength potential, the structures using high strength concrete tend to be slimmer and require a higher elastic modulus so as to maintain its stiffness. Therefore, knowledge of the modulus of elasticity of high strength concrete is very important in avoiding excessive deformation, providing satisfactory serviceability, and avoiding the most cost-effective designs. The present experimental study considers the effect of steel fibers on the modulus of elasticity of concrete. Hook end steel fibers with aspect ratio of 50 and 71 at volume fraction of 0.5%, 1.0% and 1.5% were used. Study on effect of volume fraction and aspect ratio of fibers on the modulus of elasticity of concrete was also deemed as an important part of present experimental investigation. The results obtained show that the addition of steel fiber improves the modulus of elasticity of concrete. It was also analyzed that by increasing the fiber volume fraction from 0.5% to 1.5% and aspect ratio of fibers from 50 to 71 there was a healthy effect on modulus of elasticity of Steel Fiber Reinforced Concrete. 62. Keywords: Aspect ratio, Compressometer, Modulus of Elasticity, Steel fiber reinforced concrete, volume fraction. 304-309 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. Chen, S, 2004. “Strength of Steel Fibre Reinforced Concrete Ground Slabs”. Proceedings of the Institute of Civil Engineers, Structures and Buildings (157), Issue SB2, pp. 157-163 Banthia,N,Chokri,K, and Trottier,JF,1995. Impact tests on Cement-Based Fiber Reinforced Composites. ACI Publications, Detroit, USA, SP, 155-9, pp.171-188 Khaloo, A R and Kim, N, 1997. “Influence of Concrete and Fiber Characteristics on Behaviour of Steel Fiber Reinforced Concrete under Direct Shear”. ACI Materials Journal, 94, No. 4, pp. 592-601. Johnston, CD, and Zemp, WR, 1991. “Flexural Fatigue performance of Steel Fibre reinforced concrete- Influence of Fibre Content, Aspect Ratio, and Type”. ACI Material Journal, 88, No.4, pp. 374-383. Elsaigh,WA and Kearsley,EP,2002.”Effect of Steel Fibre Content on Properties of Concrete”. Journal of Concrete/Beton, South Africa, No 102, pp. 8-12. Johnston Gopalaratnam, V.S. and S. Shah, 1987. “Failure mechanism and Fracture of fibre reinforced concrete, Fibre reinforced concrete – Properties and Application”, American Concrete Institute, Detroit, pp: 1-25 A.M Shende et al.. “Comparative Study on Steel Fiber Reinforced cum Control Concrete” International Journal Of Advanced Engineering Sciences And Technologies Vol. No. 6, Issue No. 1, 116 – 120 Mohammed Alias Yusof et al., “Mechanical Properties of Hybrid Steel Fibre Reinforced Concrete with Different Aspect Ratio.” Australian Journal of Basic and Applied Sciences, 5(7): 159-166, 2011 Er Prashant Y.Pawade et al. “Effect of Steel Fibres on Modulus of Elasticity of Concrete” (IJAEST) International Journal Of Advanced Engineering Sciences And Technologies Vol No. 7, Issue No. 2, 169 – 177 Osman Gencel et al.. “ Workability and Mechanical Performance of Steel Fiber-Reinforced Self-Compacting Concrete with Fly Ash” Composite Interfaces 18 (2011) 169–184 Saravana Raja Mohan. K, Parthiban. K “Strength and behaviour of Fly Ash based Steel Fibre Reinforced Concrete Composite. J. Mater. “Mechanical Properties of Steel Fiber Reinforced Concrete”, Journal of Materials in Civil Engineering ,Volume 19 , Issue 5, 2007 IS: 383-1970, “Indian standards specification for coarse and fine aggregates from natural sources for concrete”, Bureau of Indian Standards, New Delhi BS 1881: Part 121:1983,” Testing concrete Method for determination of static modulus of elasticity in compression”. ASTM C 469-94” Standard Test Method for Static Modulus of Elasticity and Poisson’s Ratio of Concrete in Compression” Authors: K.V.Rama Krishna Rao, K.Durga Rani, S.S.S.V.Gopala Raju Paper Title: Feasibility Study on Motor Cycle Lanes in Visakhapatnam City Abstract: The present study addresses a comprehensive analysis and feasibility of motor cycle lanes in two important city roads, “CMR central to Thatichetlapalem via., Gurudwara junction”, and “Jagadamba junction to old post office via., Poorna market in Greater Visakhapatnam Municipal Corporation[GVMC]” which are carrying 52% and 55% of motor cycles in total traffic. The paper discusses the basic understanding of travel time benefits and travel comfort by separating two wheeler motor cycle traffic from mixed traffic. 63. Keywords: Exclusive motor cycle lanes, Inclusive motor cycle lanes, Motor cycle traffic, Mixed traffic. References: 1. 2. 3. Radin Umar R.S., Barton, E. (1997) Preliminary Cost-Benefit Analysis of the Exclusive Motorcycle Lanes in Malaysia, REAAA Journal No. 9,1997pp 2-6 Radin Umar R.S., Murray, G. Mackay and Brian, L. Hills (1995) Preliminary Analysis on Impact of Motorcycle Lanes Along Federal Highway F02, Shah Alam, Malaysia, Journal of IATSSResearch Vol. 19, No. 2, pp 93-98 Gopala Raju SSSV, Duraga Rani K (2012) Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal of innovations & development, Vol.1, No.6, pp.469-471 310-312 4. 5. 6. 7. Gopala Raju SSSV (2011) Vehicular growth and its management: Visakhapatnam city in India– A case study, Indian Journal of Science and Technology, Vol.4, No.8,pp. 903-906. Kumar P.S, Gopala Raju SSSV, Murali M, Prasad CSRK (2007), Assessment of Noise level due to vehicular traffic at Warangal city, International journal of environment and pollution, Vol.30, No.1, pp137-153. Hussain, H., Radin Umar, R. S., Ahmad Farhan, M. S., & Dadang, M. M. (2005). Key components of a motorcycle-traffic system - A study along the motorcycle path in Malaysia. IATSS Research, Vol. 29(1),pp.50-56. Tung, S. H., Wong, S. V., Law, T. H., and Radin Umar, R. S. (2008). Crashes with roadside objects along motorcycle lanes in Malaysia. International Journal of Crashworthiness, Vol. 13(2), pp.205-210. Authors: A.Praveena, M.Jayashree Paper Title: Mitigation of Voltage SAG using Dynamic Voltage Restorer Abstract: Power quality problem is an occurrence manifested as an nonstandard voltage ,current or frequency that results in failure of end use equipments .one of the major problem in power quality is voltage sag .To improve the power quality, custom power devices are used. The custom power device used here is DVR(Dynamic Voltage Restorer) is role to compensate load voltage during the different fault conditions like voltage sag ,single line to ground ,double line to ground faults .In this work ,PI controller and discrete PWM pulse generator are used for the control purpose Keywords: component; PWM(pulse width modulation) technic,DVR(dynamic voltage restorer),PI(proportional integral) controller 64. References: 1. 2. 3. 4. 5. 6. 7. D. Daniel Sabin, Senior member IEEE ,and Ambra Sannino, IEEE “A summary of the draft IEEE P1409 Custom Power Application Guide” Transmission and Distribution Conference and Exposition, IEEE PES, vol.3,pp.931-936,2003. Yash Pal, A. Swarup Senior Member, IEEE,and Bhim Singh, Senior Member IEEE”A Review of Compensating Type Custom Power Devices for Power Quality Improvement” IEEE Power India Conference,2008. Michael D. Stump, Gerald J. Keane “The Role, of Custom Power Products in Enhancing Power Quality at Industrial Facilities”, Energy Management and Power Delivery.vol. 2,507-517,International Conference 1998. Bingsen Wang, Giri Venkataramanan and Mahes Illindala,” Operation and Control of a Dynamic Voltage Restorer Using Transformer Coupled H-Bridge Converters”, IEEE Transactions on power electronics,vol.21,pp.1053-1061,july 2006. Fawzi AL Joeder” Modelling and Simulation of Different System Topologies for Dynamic Voltage Restorer” Electric Power and Energy Conversion Systems,EPECS’09.InternationalConferences,IEEE,pp.1-6,2009. D.N.Katole Research Scholor :Department of Electrical Engg. G. H.Raisoni College of Engineering Nagpur, Maharashtra India.”Analysis and Mitigation of Balanced Voltage Sag with The Help of Energy Storage System” ICETET pp.317-321,2010. H.P.Tiwari and Sunil Kumar Gupta “Dynamic Voltage Restorer against Voltage Sag” International Journal Of Innovation, Management and Technology.vol. 1,no. 3,pp.232-237,2010. Authors: Amita Kumari, Rajesh Mehra Paper Title: Hybridized Classification of Brain MRI using PSO & SVM 313-318 Abstract: Magnetic resonance imaging (MRI) provides detailed anatomic information of any part of the body. In this method a hybrid approach for classification of brain tissue in MRI based on Particle Swarm Optimization (PSO) and Support Vector Machine (SVM) wavelet based texture feature are extracted from normal and tumor region by using HAAR wavelet. These features are given as input to the SVM classifier which classified them into normal & abnormal brain neoplasm. The algorithm incorporates steps for pre-processing, image segmentation and image classification using SVM classifier. Keywords: MRI, Classification PSO, SVM, HAAR wavelet References: 1. 65. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 66. A .Kharrat, K Gasmi , M Ben Messaoud , N Benamrane and M Abid . “ A hybrid approach for automatic classif ication of brain MRI using genetic algorithm and support vector machine”, Leonardo journal of sciences, Issue 17, pp 71-82, July-Dec ,2010. E F Badran, E G Mahmoud, N Hamdy “An algorithm for brain tumor in MRI images”, International Conference on Communication Computer Engineering and Systems (ICCES), Networking & Broadcasting, pp 368-373, June, 2010. N Abdullah, Lee Wee Chuen; U K Ngah, KA Ahmad, “Improvement of MRI brain classification using Principles Component Analysis”, IEEE International Conference on Control System, Computing and Engineering (ICCSCE), ,pp 567-571, March, 2011. M Hasanzadeh ,S Kasaei.”Multispectral brain MRI segmentation using genetic fuzzy systems” international conference on communication ,networking and broadcasting(ISSPA),pp 1-4,June,2001 V.vapnik “the nature of statistical learning theory, springer-verlag, newyork, 1995 S N Deepa, B A Devi .”Artificial neural networks design for classification of brain tumor” IEEE International Conference on Computer Communication and Informatics(ICCII), pp 1-6, 2012. E. I.Zacharaki ,Sumei Wang ,S Chawla, Dong Soo Yoo, R Wolf ,E.R Melhem, C.Davatzikos.”MRI based classification of brain tumor type and grade using SVMRFE”.IEEE Symposium on bioengineering,pp-1035-1038,April ,2009. M .C Clark, L. O Hall, D.B.Goldgof, R.Velthuizen, F.R. Murtagh, and M.S Silbiger. “Automatic tumor segmentation using knowledge based technique, IEEE transaction on medical imaging, vol 17,no 2,pp-187-192,April,1998. W. E. Reddick , J.O Glass, E. N. Cook , T. D Elkin ,R. J. Deaton. “Automated segmentation and classification of multispectral magnetic resonance images of brain using artificial neural networks”, IEEE transaction on medical imaging, vol 16, no 6,pp 911-918 ,1997. Huazhu Song , Zichun Ding, Cuicui Guo , Zhe Li, Hongxia Xia. “ Research on combination kernel function of Support Vector Machine .” International Conference on Computer science and software engineering, pp-345-356, 2008 Mcconnell Brain Imaging centre (june 2006) stimulated data base [online] available http://www.bic .mni.mcgill.ca /brainweb). Y.J .Kennedy ,R.Eberhart. “ Particle Swarm Optimization.” IEEE International Conference on Neural Network,pp-1942- 1948, 1995. Vladimir N. Vapnik “ The Nature of Statistical Learning Theory” New York: Springer –Verlag,2000 Authors: Azher Jameel Paper Title: A Comparative Study of XFEM and EFGM in Solving Frictional Contact Problems Abstract: In this paper, the extended finite element method (XFEM) and the element free Galerkin method (EFGM) have been employed to model and simulate the contact type of nonlinearities caused by the discontinuities due the frictional contact. In order to model these discontinuities, few modifications are made in XFEM and EFGM 319-323 324-331 to incorporate these discontinuities in the formulation. The contact interface between the two bodies is modeled by applying an appropriate enrichment function. The classical approximate solution is enriched with the Heaviside jump function to simulate the contact behavior between the two surfaces. Gaussian quadrature has been used for the numerical integration of the weak formulation. Finally, three model problems are solved using XFEM and EFGM and the results obtained by the two techniques are compared with each other. The results obtained by XFEM show a good agreement with the results obtained by EFGM. Keywords: XFEM, EFGM, slip criterion, slip rule, penalty factor, level set, Heaviside jump function. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 67. T. Liszka, J. Orkisz, "The finite difference method at arbitrary irregular grids and its application in applied mechanics", Computers and Structures, vol. 11, 1980, pp. 83-95. J. Oliver, A. E. Huespe, P. J. Sanchez, "A finite element method for crack growth without remeshing", International Journal for Numerical Methods in Engineering, vol. 46, 1999, pp. 131-150. J. A. A. Portela, M. Aliabadi, D. Rooke, "The dual boundary element method: effective implementation for crack problems", International Journal for Numerical Methods in Engineering, vol. 33, 1991, pp. 1269-1287. U. Haussler, C. Korn, "An adaptive approach with the element free Galerkin method", Computer Methods in Applied Mechanics and Engineering, vol. 162, 1998, pp. 203-222. A. R. Khoei, S. O. R. Biabanaki, M. Anahid, "Extended finite element method for three-dimensional large plasticity deformations on arbitrary interfaces", Computer Methods in Applied Mechanics and Engineering, vol. 197, 2008, pp. 1100-1114. J. H. Chen, N. Kikuchi, "An incremental constitutive relation of unilateral contact friction for large deformation analysis", Journal of Applied Mechanics, vol. 52, 1985, pp. 639-648. P. Papadopoulos, R. L. Taylor, "A mixed formulation for the finite element solution of contact problems", Computer Methods in Applied Mechanics and Engineering, vol. 94, 1992, pp. 373-389. K. J. Bathe, A. Chaudary, "A solution method for planar and axisymmetric contact problems", International Journal for Numerical Methods in Engineering, vol. 21, 1985, pp. 65-88. N. Sukumar, D. L. Chopp, N. Moes, T. Belytschko, "Modeling holes and inclusions by level sets in the extended finite-element method", Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6183-6200. J. M. Melenk, I. Babuska, "The partition of unity finite element methods: basic theory and applications", Computer Methods in Applied Mechanics and Engineering, vol. 139, 1996, pp. 289-314. J. Dolbow, N. Moes, T. Belytschko, "An extended finite element method for modeling crack growth with frictional contact", Computer Methods in Applied Mechanics and Engineering, vol. 190, 2001, pp. 6825-6846. N. Moes, T. Belytschko, "Extended finite element method for cohesive crack growth", Engineering Fracture Mechanics, vol. 69, 2002, pp. 813-833. I. V. Singh, B. K. Mishra, S. Bhattacharya, R. U. Patil, "The numerical simulation of fatigue crack growth using extended finite element method", International Journal of Fatigue, vol. 36, 2012, pp. 109-119. S. Glodez, Z. Ren, "Modelling of crack growth under cyclic contact loading", Theoretical and Applied Fracture Mechanics, vol. 30, 1998, pp. 159-173. P. M. A. Areias, T. Belytschko, "Analysis of three-dimensional crack initiation and propagation using the extended finite element method", International Journal for Numerical Methods in Engineering, vol. 63, 2005, pp. 760-788. A. R. Khoei, A. Shamloo, A. R. Azami, "Extended finite element method in plasticity forming of powder compaction with contact friction", International Journal of solids and structures, vol. 43, 2006, pp. 5421-5448. M. Anahid, A. R. Khoei, "New development in extended finite element modeling of large elasto-plastic deformations", International Journal for Numerical Methods in Engineering, Vol. 75, 2008, pp. 1133-1171. B. Prabel, A. Combescure, A. Gravouil, S. Marie, "Level set X-FEM non-matching meshes: application to dynamic crack propagation in elasto-plastic media", International Journal for Numerical Methods in Engineering, vol. 69, 2006, pp. 1553-1569. S. Mariani, U. Perego, "Extended finite element method for quasi-brittle fracture", International Journal for Numerical Methods in Engineering, vol. 58, 2003, pp. 103-126. L. B. Lucy, "A numerical approach to the testing of the fission hypothesis", Astronomical Journal, vol. 82, 1977, pp. 1013-1024. J. W. Swegle, D. L. Hicks, S. W. Attaway, "Smoothed particle hydrodynamics stability analysis", Journal of Computational Physics, vol. 116, 1995, pp. 123-134. S. W. Attaway, M. W. Heinstein, J. W. Swegle, "Coupling of smooth particle hydrodynamics with the finite element method", Nuclear Engineering and Design, vol. 150, 1994, pp. 199-205. T. Belytschko, L. Gu, Y. Y. Lu, "Fracture and crack growth by element free Galerkin methods", Modeling and Simulation in Materials Science and Engineering, vol. 2, 1994, pp. 519-534. N. Moes, M. Cloirec, P. Cartraud, J. F. Remacle, "A computational approach to handle complex microstructure geometries", Computer Methods in Applied Mechanics and Engineering, vol. 192, 2003, pp. 3163-3177. J. C. Simo, T. A. Laursen, "An augmented Lagrangian treatment of contact problems involving friction", Computers and Structures, vol. 42, 1992, pp. 97-116. C. Eck, O. Steinbach, W. L. Wendland, "A symmetric boundary element method for contact problems with friction", Mathematics and Computers in Simulation, vol. 50, 1999, pp. 43-61. A. R. Khoei, M. Nikbakht, "An enriched finite element algorithm for numerical computation of contact friction problems", International Journal of Mechanical Sciences, vol. 49, 2007, pp. 183-199. Authors: R.Gunasekar Paper Title: Performance Evaluation of Rotary Vane Compressor Using Oil Separator in Car AC System Abstract: One of the primary functions of an automobile climate control system is to provide the desired cooling and stabilize cabin temperatures to comfortable levels in hot climatic conditions. With the increasing demand for more energy efficient systems and thermal comfort in automobiles, the automobile AC system needs to be optimized to deliver the required cooling performance with minimum AC power consumption. Proper selection and integration of AC compressor with other system aggregates results in improved energy efficiency of the system. There are varies ideas to improve compressor efficiency .But considering manufacturing feasibility ,design and validation lead time and cost as many of the ideas dropped down. Oil separator is one of the way to improve cooling efficiency of compressor in which low investment and lead time involved. The function of oil separator is that separate the oil and refrigerant from the AC system.AC System contains compressor ,condenser, evaporator and txv as main parts. During AC system on condition, refrigerant flow on in the compressor ,condenser and evaporator txv too. Compressor contains OIL which is used for lubrication purpose for compressor internal parts.So that compressor 332-334 moving parts will not damage as wear and tear. During compressor on condition oil also mix with refrigerant which can circulate the system.This paper response to implication of oil separator in Rotary vane compressor. Keywords: Compressor, Oil separator References: 1. 2. 3. 4. 68. G H Hundy ,A.R Trott,TC Welch Refrigeration and Air-conditioning Tata McGraw Hill education Pvt Ltd.,4th Edition (2010). P.N Ananthanarayanan., “Basic Refrigeration and Air conditioning”., Tata McGraw Hill education Pvt Ltd.,3rd Edition (2006). C.P.Arora., “Refrigeration and Air conditioning” Tata McGraw Hill education Pvt Ltd.,17th Edition (2006). Valeo Japan Handbook and test reports. Authors: Shakeel Ahmad, Rehan Ahmad Khan, Hina Gupta Paper Title: Seismic Performance of a Masonry Heritage Structure Abstract: World-wide experience from past earthquakes shows un-reinforced masonry structures are the most vulnerable and represent overall the largest threat to human life and property in future earthquakes. This highlights the structural inadequacy of buildings, especially unreinforced masonry buildings, to carry seismic loads and requires an urgent assessment of existing buildings in terms of the strength, expected performance and safety of existing buildings during earthquake as well as for carrying out the necessary rehabilitation. As it is a heavy, brittle material with low tensile strength and exhibits little ductility when subjected to seismic effects, unreinforced masonry is highly susceptible to earthquake damage than various other types of construction material. Unreinforced masonry buildings are usually characterized by sudden and dramatic collapse. Present study deals with an evaluation of the seismic performance of an old unreinforced masonry building structure. The 137 years old masonry heritage school building is located at Aligarh Muslim University, Aligarh (seismic zone IV). The building does not show any cracks under gravity loads. Since the historical building was built before the inception of seismic IS code, the point of concern is performance of building under seismic loads. In the present study, the building is modelled using finite element technique and its seismic evaluation is carried out using the commercially available Finite Element software assuming a homogeneous and nonlinear behaviour of the material. The building is subjected to different PGA levels (0.1g, 0.2g, 0.3g, 0.4g ) as input ground motion to determine its seismic performance.The results thus obtained will be useful for detecting the weak failure zones of the buildings under future seismic forces and retrofit accordingly using proper retrofitting techniques. 335-340 Keywords: Heritage masonry building, finite element modelling, seismic performance, peak ground acceleration. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. IS: 1905-1987, Indian Standard Code of Practice for Structural Use of Unreinforced Masonry, Bureau of Indian Standards, New Delhi. IS 1893–2002, Criteria for Earthquake Resistant Design of Structure. Suggested draft IS: 1905, Code of practice for structural use of unreinforced masonry (Draft suggested by IITK GSDMA Program on Building Codes which is available from www.nicee.org). M. Sirajuddin, N. S. Potty and J. Sunil, “Nonlinear seismic analysis of masonry structures,”, India, Journal of Design and Built Environment, Vol. 9, December 2011, pp. 1–16. Ueli Camathias (Master Thesis) “Seismic Performance Evaluation of a Historic Unreinforced Masonry Building Structure”, 2013. M. J. DeJong (Ph.D Thesis). “Seismic Assessment Strategies for Masonry Structures”, 2009. S.S. Khadka,” Seismic Performance of Tradational Unreinforced Masonry Building in Nepal,” Kathmandu University Journal of Science, Engineering and Technology Vol. 9, No. I, July, 2013, pp 15-28. G. Angjeliu1, M. Baballëku,” Seismic assessment of historical masonry structures. The former Italian Embassy,” 2nd International Balkans Conference on Challenges of Civil Engineering, BCCCE, 23-25 May 2013, Epoka University, Tirana, Albania. P.B. Lourenço,”Computations on historic masonry structures”, Prog. Struct. Engng. Mater., 4, 2002, pp. 301-319. R. Capozucca,” Shear Behaviour of Historic Masonry Made of Clay Bricks,” The Open Construction and Building Technology Journal, 2011, 5, (Suppl 1-M6) pp. 89-96. H. R. Parajuli, J. Kiyono, H. Taniguchi, K. Toki, A. Furukawa, P.N. Maskey, “Parametric study and dynamic Analysis of a Historical Masonry Building of Kathmandu” Disaster Mitigation of Cultural Heritage and Historic cities, Vol.4, July 2010. Authors: Sunil Kumar Yadav, Rajesh Mehra Paper Title: Analysis of FPGA Based Recursive Filter Using Optimization Techniques for High Throughput Abstract: In this paper we examine the optimal throughput of recursive filter using varies optimization techniques, which are relevant for real time application. By formulating filter design as a multi-objective optimization problem and approaching. Different approaches use for implementing of these methods on hardware. In this work FPGA implementation of recursive filters are examined and the comparison of these methods is done by analyzing the hardware cost and performance. 69. Keywords: IIR filter, VHDL, FPGA References: 1. 2. 3. 4. 5. Bojan Jovanovi , and Milun Jevti “An approach to Digital Low-Pass IIR Filter Design” IEEE Small Systems Simulation Symposium pages:61-66, ebruary 2010 Arjuna Madanayake• Thushara K.Gunaratne•Leonard T. Bruton “Reducing the Multiplier-Complexity of Massively Parallel Pollyphase 2D IIR Broadband Beam Filters” pages:1231-1243, November 2011© Springer Mariza Wijayanti1, Abdul Hakim2& Sunny Arief Sudiro3 “Designing and Simulation Of Band-Pass Infinite Impulse Response Digital Filter using FPGA Devices” International Technology Research Letters, pages:25-31, 2012 Marek Cieplucha “High Performance FPGA-based Implementation of a Parallel Multiplier-Accumulator” 20th International Conference on"Mixed Design of Integrated Circuits and Systems", pages:485-489 June 2013 Kamboh, Hamid M., and Shoab A. Khan. "An algorithmic transformation for FPGA implementation of high throughput filters." Emerging Technologies 7th International Conference on. IEEE,pages 1-6 2011. 341-343 Authors: Ravi Prakash Yadav, Ritesh Kumar Mishra Paper Title: Performance Analysis of OFDM System Employing an Efficient Scheme of ICI Self- Cancellation Abstract: Orthogonal frequency division multiplexing (OFDM) is very sensitive to frequency offset caused by Doppler frequency drift or frequency drift between transmitter and receiver oscillator. This leads to a loss in the orthogonality between sub-carriers and results in inter-carrier-interference (ICI). In this paper we proposed an efficient ICI self-cancellation scheme to reduce ICI in OFDM system and its performance is compared with existing methods of self-cancellation in terms of carrier-to-interference ratio (CIR) and bit-error rate (BER). Simulation result shows that the proposed scheme outperforms the existing schemes. Keywords: Inter-carrier-interference (ICI), OFDM, self-cancellation (SC), data-conjugate, data-conversion. References: 1. 2. 70. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 71. J. Armstrong, “Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM”, IEEE Trans. Commun., vol. 47, no. 3, pp. 365–369, Mar. 1999. P. H. Moose, “A technique for orthogonal frequency division multiplexing frequency offset correction”, IEEE Trans. Commun., vol. 42, no.10, pp. 2908–2914, 1994. J. Ahn and H. S. Lee, “Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,” Electronics letters, vol. 29, no. 16, pp. 1476-1477, Aug. 1993. C. Muschallik, “Improving an OFDM reception using an adaptive Nyquist windowing,” IEEE Transactions on Consumer Electronics, vol. 42, pp. 259-269, Aug. 1996. P. Tan and N. C. Beaulieu , “Reduced ICI in OFDM System Using the “Better Than” Raised Cosine Pulse”, IEEE Commun., letters , vol.8 , no.3 , march 2004. Y. Zhao and S. G. Haggman, “Intercarrier Interference Self-Cancellation Scheme for OFDM Mobile Communication Systems”, IEEE Trans. on Commun., vol.49, no. 7, July 2001. K .Sathananthan, R.M.A.P.Rajatheva and S.B.Slimane, “Cancellation technique to reduce intercarrier interference in OFDM, IEEE Elect. Lett. , Dec. 2000. Y. Fu and C.C. Ko, “A new ICI self-cancellation scheme for OFDM systems based on a generalized signal mapper”, Proc. 5th wireless Personal Multimedia Communications, pp.995-999, 2002. Y-H Peng, “Performance Analysis of a New ICI-Self- Cancellation Scheme in OFDM Systems”, IEEE Trans. on Consumer Electronics, vol.53, no.4, pp.1333-1338, 2007. H.G. Ryu, Y. Li, J.S.Park, “An Improved ICI Reduction Method in OFDM Communication System”, IEEE Trans. Broadcasting, vol.51, no.3 pp.395-400, Sep.2005. Q. Shi, Y. Fang, M. Wang, “A novel ICI self-cancellation scheme for OFDM systems”, in IEEE WiCom, pp.1-4, 2009. H. Zhou and Y-F Huang, “A Maximum Likelihood Fine Timing Estimation for Wireless OFDM Systems”, IEEE Trans. on Broadcasting, Vol.55, No.1, pp.31-41, Mar.2009. Q. Shi, “ICI Mitigation for OFDM Using PEKF”, IEEE Signal Process. Lett. , vol.17, no. 12, pp.981-984, Dec.2010. Authors: Chithrakshi, Taranath H.B Paper Title: Image Compression Using Fuzzy Enhancement 344-347 Abstract: Fuzzy logic is a way to embed an engineer’s experience into the system. It mathematically emulates human reasoning, provides an intuitive way to design function blocks for intelligent control systems, advanced fault detection and other complex applications. The fuzzy logic, unlike conventional logic system, is able to model inaccurate or imprecise models. The fuzzy logic approach offers a simpler, quicker and more reliable solution that is clear advantages over conventional techniques. It can significantly improve response so we are actively incorporating fuzzy logic into many real time applications. Image processing is one of the area where fuzzy can be utilized for the image enhancement. Image compression is one of the major image processing techniques that is widely used in medical, automotive, consumer and military applications. In this project fuzzy technique has been used in image compression with Discrete Wavelet Transforms (DWT) technique. Discrete wavelet transforms is the most popular transformation technique adopted for image compression. Complexity of DWT is always high due to large number of arithmetic operations. In order to minimize the complexity of DWT, modified DA split architecture has been proposed and implemented on FPGA. Keywords: DA split architecture, Discrete wavelet transforms (DWT), Fuzzy logic, Image processing 348-351 References: 1. 2. 3. 4. 5. 6. 7. 72. David S. Taubman, Michael W. Marcellin - JPEG 2000 - Image compression, fundamentals, standards and practice", Kluwer academic publishers, Second printing - 2002. G. Knowles, "VLSI Architecture for the Discrete Wavelet Transform," Electronics Letters, vo1.26, pp. 1184-1185,1990. M, Vishwanath, R. M. Owens, and M. 1. Irwin, "VLSI Architectures for the Discrete Wavelet Transform," IEEE Trans. Circuits And Systems II, vol. 42, no. 5, pp. 305-316, May. 1995. AS. Lewis and G. Knowles, "VLSI Architectures for 2-D Daubechies Wavelet Transform without MUltipliers".Electron Letter, vo1.27, pp. 171-173, Jan 1991. K.K. Parhi and T. Nishitani "VLSI Architecture for Discrete Wavelet Transform", IEEE Trans. VLSI Systems, vol. 1, pp. 191-202, June 1993. M. Vishwanath, R.M. Owens and MJ. Irwin, "VLSI Architecture for the Discrete Wavelet Transform", IEEE Trans. Circuits and Systems, vol. 42, pp. 305-316, May 1996. C. Chakrabarti and M. Vishwanath, "Architectures for Wavelet Transforms: A Syrvey", Journal of VLSI Signal Processing, Kulwer, vol.lO, pp. 225-236,1995. Authors: S.Senthil Kumar, V.Parthasarathy Paper Title: Juggler Radio Network Using Virtual Wi-Fi Abstract: A mobile ad hoc network is a kind of wireless communication network that does not rely on a fixed infrastructure and is lack of any centralized control. Any single radio interface that is dynamically switched to a wireless channel in different frequency bands to communicate with different nodes. This however incurs frequent 352-355 channel switching overhead of the order of 100s of microseconds which is comparable to packet transmission times. A more practical method for concurrent channel usage is to use multiple radio interfaces .A multi-channel wireless mesh network architecture (called Hyacinth) that equips each mesh network node with multiple 802.11 NICs. We address the problem of interference aware routing in multi-radio infrastructure mesh networks where in each mesh node is equipped with multiple radio interfaces and a subset of nodes serve as Internet gateways. In proposed Virtual Refined Wi-Fi Additional interfaces can support parallelism in network flows, improve handoff times, and provide sideband communication with nearby peers. Completely, such benefits are outweighed by the added costs of an additional physical interface. Instead, virtual interfaces have been proposed as the solution, multiplexing a single physical interface across more than one communication endpoint Keywords: Ad-hoc, Virtual Wi-Fi, Radio interface, Multiracial, WMN. References: 1. A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou. A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks. In Broadnets, 2004. R. Draves, J. Padhye, and B. Zill; .Routing in Multi-radio, Multi-hop Wireless Mesh Networks.; ACM MobiCom '04. 2. P. Hsiao, A. Hwang, H. Kung, D. Vlah; .Load-Balancing Routing for Wireless Access Networks.; Proc. of IEEE INFOCOM '01. 3. I. Katzela, M. Naghshineh; .Channel assignment schemes for cellularmobile telecommunication systems: a comprehensive survey.; IEEE Personal Communications (June '96) 4. T. R. Jensen, B. Toft; .Graph Coloring Problems.; Wiley Inter science, New York, '95. 5. Jie Gao, Li Zhang; .Load Balanced Short Path Routing in Wireless Networks.; Proc. of INFOCOM '04 . 6. H. Hassanein, A. Zhou; .Routing with load balancing in wireless Adhoc networks.; Proc. of ACM MSWiM '01. 7. S.J. Lee and M. Gerla; .Dynamic Load-Aware Routing in Ad hoc Networks.; Proc. of ICC '01. 8. A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.;ACM Mobile Computing & Comm Review (MC2R), April '04. 9. C. Villamizar, R. Chandra, R. Govindan; .Internet RFC 2439 – BGP Route Flap Damping. A. Raniwala, K. Gopalan, T. Chiueh; .Centralized Channel Assignment and Routing Algorithms for Multi-channel Wireless Mesh Networks.; ACM Mobile Computing & Comm Review (MC2R), April '04. A. Adya, P. Bahl, R. Chandra, and L. Qiu. Architecture and techniquesfor diagnosing faults in ieee 802.11 infrastructure networks. In Proceedings of the International Conference on Mobile Computing .Networking (MobiCom), pages 30–44, Philadelphia, PA, Sept. 2004. 10. M. Shin, S. Lee and Y.-A. Kim, “Distributed Channel Assignment for Multi-Radio Wireless Networks”, IEEE Internat. Conf. on Mobile Adhoc and Sensor Systems (MASS), Oct. 8–11, 2006, pp. 417–426. 11. J. Tang, X. Guoliang, and W. Zhang, “Interference-aware topology control and QoS routing in multi-channel wireless mesh networks,” in Proceedings of the 6th ACM International Symposium on Mobile AdHoc Networking and Computing, MobiHoc 2005,. 73. Authors: Abhay Limaye, Shraddha Kakne, Priti Tiple, Shubhangi Bhamare Paper Title: Scrutinizing the Art of Intrusion Detection Abstract: Internet services and applications have become an inextricable part of quotidian life, enabling communication and the management of confidential information from any place imaginable. These internet services are bound to be vulnerable to attackers. Billions of dollars are lost every year in mending the systems hit by the intrusions. The means for pinpointing and tracking these intrusions are called as Intrusion Detection Systems (IDS). Intrusion Detection Systems are procuring mainstream adulation as companies move more of their critical business interactions to the Internet. Thus, hereby, in this paper, we present the dissertation on the notion of Intrusion Detection wherein we first focus on the assorted genres of attacks or intrusions. Furthermore we attempt to discern the paradigm of Intrusion Detection Systems. Denouement of this paper elaborates pragmatic benefits and unrealistic conjectures of prevalent Intrusion Detection Systems. Keywords: Intrusion Detection System (IDS), Dos (Denial of Service), brute force Attack, SQL injection attack. 356-361 References: 1. 2. 3. 4. 5. 6. 74. Amrita Anand,Brajesh Patel"International Journal of Advanced Research in Computer Science and Software Engineering",International Journal of Advenced Research in Computer Science and Software Engineering 2 (8), August- 2012. Sapna S. Kaushik, Dr.Prof.P.R.Deshmukh"Detection of Attacks in an Intrusion Detection System" (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011 Renaud Bidou “Denial of Service Attacks” John Bellardo and Stefan Savage “802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions” Faizal, M.A., MohdZaki M., Shahrin Sahib, Robiah, Y., SitiRahayu, S., and AsrulHadi, Y. “Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System”, Second International Conference on Network Applications, Protocols and Services, IEEE, 2010. Christopher Kruegel, Fredrik Valeur, Giovanni Vigna(2005). Intrusion Detection and Correlation, Challenges and Solution, Springer Science+Business Media Inc, USA. Authors: Munaga Siva Prasanth, Kallepalli Venkatesh Paper Title: Fire Suppression System in Locomotives Abstract: Still we had seen a lot of fire accidents and gas leakages are present in trains. So in this paper it is a remedy to reduce the death loss occurring due to fire accidents in trains. Fire on a running train is more catastrophic than on a stationary one, since fanning by winds helps spread the fire to other coaches. The damage is heavier due to improper reach of service at right time due to improper communication. This time delay is causing heavier damage. Thus, eliminating the time between when an accident occurs and when first responders are dispatched to the scene decreases the damage. This projects help in notifying the passengers and emergency services. The project consists of a microcontroller which is interfaced with the thermistor, gas sensors, water sprinkler and GSM modem, Once the sensors attached in the compartments of train sense the gas detection and fire detection, it assumes a fire accident. The controller assumes it as an emergency and power supply will be automatically off, starts the buzzer, doors are opened, Sprinkler on and GSM modem present in the train sending the message alert to loco pilot and near the railway stations. 362-364 Keywords: Sprinkler, D.C. Motor, Thermistor (NTC) & Smoke sensors, GSM, Buzzer, Submergible pump or centrifugal pump. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. “The 8051 Microcontroller and Embedded Systems” by “Muhammad Ali Mazidi, Janice Gillispie Mazidi, Rolin D.McKinlay” “Practical electrical motor handbook” by “Irving Gottlieb” Microcontroller AT89C52 datasheet Thermistor NTC datasheet http://en.wikipedia.org/wiki/Thermistor http://www.ti.com/general/docs/lit/getliterature.tsp? genericPartNumber= lm35® =en&fileType=pdf http://www.8085projects.info/Block-diagram-and-working-of-ADC0809.html http://www.dnatechindia.com/Tutorial/8051-Tutorial/Interfacing-Relay-to-Microcontroller.html http://www.systemsensor.com/en-us/Pages/Aspiration.aspx http://www.sohofireprotection.us/water-based-fire-sprinklers.html http://9circuits.com/store/products/pololu/flammable-gas-smoke-sensor/ Authors: 75. Amrita Razdan, M. F. Wani Experimental Characterization for Wear Rate of Silicon Carbide and Nickel-Base Alloy for Human Paper Title: Implants Abstract: Among the available ceramic materials for load bearing bio-implant applications, silicon carbide is superior for its better biocompatibility, which can increase the longevity of prosthetic joints. The major cause of revision surgery and implant failure is Osteolysis (aseptic loosening of the prosthetic joint). The product of bearing wear, microscopic particulate debris in the joint space leads to implant loosening. Prosthetic joint mainly consists of acetabular cup, acetabular lining and femoral head. The best material for manufacturing acetabular cup is nickel – base alloy. For manufacturing acetabular lining and femoral head, silicon carbide is the best chosen material. The acetabular cup or knee cap is prone to catastrophic failures due to walking, stumbling etc. A sliding distance test was performed on polished surface of silicon carbide and nickel-base alloy (mirror- like finish, 1µm) by using Reciprocating Friction Monitor (Courtesy; National Institute of Technology, Srinagar) for the evaluation of wear coefficient by standard test procedures and equation outlined in ASTM F 603. The test was carried out in ambient temperature. The results obtained showed drastically reduced wear rates. The experiments on Reciprocating Friction Monitor for Silicon carbide and nickel –base alloy showed that the best choice for prosthetic joint replacement would be a combination of two materials; silicon carbide for femoral heads and acetabular lining, and nickel-base alloy for acetabular cup. 365-367 Keywords: Aseptic loosening, Nickel base alloy, Silicon Carbide, Total joint replacement, Wear rate. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 76. Willert HG, Bertam H, Buchhorn GH. Osteolysis in Alloarthroplasty of the hip: The role of ultra- high monolecular weight polyethylene wear particles. Clin Orthop Relat Res 1990;258:95-107. Ceramic on ceramic bearing Sukree khumrak, Bangkok medical journal vol.4. Capello WN, D’Antonio JA, Feinberg JR, et al. Ceramicon- ceramic total hip arthroplasty: update. J Arthroplasty Chevillotte C, Pibarot V, Carret JP, et al. Hip squeaking: A 10 years Follow up Study. J Arthroplasty 2012;27: 1008-13 Nevelos JE, Ingham E, Doyle C, et al. Wear of HIPed and non-HIPed alumina-alumina hip joints under standard and severe simulator testing conditions. Biomaterials 2001;22:2191-7. Hannouche D, et al. Ceramics in Total Hip Replacement. Clin Orthop Relate Res 2005;430:62-71. Chevillotte C, Trousdale RT, Chen Q, et al. Hip Squeaking : A Biomechanical study of Ceramic-on-Ceramic Bearing Surfaces. Clin Orthop Relat Res 2010;468:345-50. Walter WL, Insley GM, Walter WK, et al. Edge loading in third generation alumina ceramic-on-ceramic bearings: stripe wear. J Arthroplasty 2004;19:402-13. Tribochemical polishing of silicon carbide in oxidant solution Zhize Zhu ), Viktor Muratov, Traugott E. Fischer.Department of Materials Science and Engineering, SteÍens Institute of Technology, Hoboken, NJ 07030, USA . Authors: Abdulaziz S. Al-Aboodi Paper Title: Kinematic Simulation of Three Rollers in Circular Motion Using 2D Planar FE Modeling Abstract: A method is established for joining a tube to a tubesheet by expanding the tube to the tubesheet. The expansion done using different method such as rolling. The joint integrity is important to ensure the roundness of the structure of the heat exchanger, and to prevent leakage. Many parameters affect the joint integrity such as the initial clearance, wall reduction and material properties. The residual contact stress is the main parameter indicating the strength of the joint. In this paper, the two dimensional planar FE model is established for the tube to tubesheet roller expansion. The planar model is great way for our attempt to understand and analyze the problem. The planar model reveals a realistic motion of the rollers in addition to the exact geometry of the tubesheet. This eliminates the need for the assumption of uniform expansion and tubesheet sleeve diameter sets on the axisymmetric model. That, the ligament dimensional effect will be shown on this model. Keywords: Kinamatic, Simulation, Finite Element, Rolling, Modeling. References: 1. 2. 3. Al-Aboodi A (2006) Finite element analysis of roller expanded tubetubesheet joints with overenlarged tubesheet holes. PhD thesis, KFUPM Al-Aboodi A, Merah N, Shuaib AR, Al-Nassar Y, Al-Anizi SS (2008) Modeling the effects of initial tube-tubesheet clearance, wall reduction and material strain hardening on rolled joint strength. ASME J Press Vessel Technol 130/4:041204-1–041204-6 368-372 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. Al-Aboodi A, Merah N, Shuaib AN, Al-Nassar Y (2009) FEA of groove geometry effect on roller and hydraulically expanded tube to tubesheet joint strength. Int J Precis Technol 1(2):201–207 Allam M, Bazergui A (2002) Axial strength of tube-to tubesheet joints: finite element and experimental evaluations. J Press Vessel Technol 124:23–31 Allam M, Chaaban A, Bazergui A (1998) Estimation of residual stresses in hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 120:129–137 Andrieux S, Voldoire F (1995) Stress identification in steam generator tubes from profile measurements. Nucl Eng Design 158:417–427 ANSYS (2004) Version 9.0, program and help documentations, Swanson Analysis System, Inc. Aufaure M (1987) Analysis of residual stresses due to roll-expansion process: finite element computation and validation by experimental tests. In: Transaction of the 9th international conference of SMIRT, pp 499–503 Cizelj L, Mavko B (1995) Propagation of stress corrosion cracks in steam generator tubes. Int J Press Vessel Piping 63:35–43 Cooper Power Tools (2005) Tube cleaners and expanders airetool manual. SP-1100EN0405–410M Jawad MH, Clarkin EJ, Schuessler RE (1987) Evaluation of tube-totubesheet junctions. J Press Vessel Technol 109:19–26 Merah N, Al-Zayer A, Shuaib A, Arif A (2003) Finite Element evaluation of clearance effect on tube-to-tubesheet joint strength. Int J Press Vessel Piping 80:879–885 Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y, Al-Anizi SS (2009) Combined effects of tube projection, initial tube-tubesheet clearance and tube material strain hardening on rolled joint strength. ASME J Press Vessel Technol 131/5 Merah N, Al-Aboodi A, Shuaib AN, Al-Nassar Y (2010) 3-D FEA of the effects of large overtolerances on roller expanded tubetubesheet joint strength. In: Abstract published on IVth European conference on computational mechanics, Paris 16–21, 2010 Metzger DR, Sauve RG, Nadeau E (1995) Prediction of residual stress by simulation of the rolled joint manufacturing process for steam generators, PVP vol 305. In: Current topics in computational mechanics. ASME, New York Scott DA, Wolgemuth GA, Aikin JA (1984) Hydraulically expanded tube-to-tubesheet joints. J Press Vessel Technol 106:104–109 Shuaib AN, Merah N, Khraisheh MK, Allam IM, Al-Anizi SS (2003) Experimental investigation of heat exchanger tubesheet hole enlargement. J Press Vessel Technol 125:19–25 Standard of the Tubular Exchanger Manufacturer Association ‘TEMA’, 7th edn (1988) TEMA, Terrytown Updike DP, Kalnins A, Caldwell SM (1992) Residual stresses in transition zone of heat exchanger tubes. J Press Vessel Technol 114:149– 156 Williams DK (1996) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs—part 1: 2-D solution, PVP vol 327. In: Residual stresses in design, fabrication, assessment and repair, ASME, New York, pp 173–180 Williams DK (1997) Prediction of residual stresses in the mechanically expanded 0.750” diameter steam generator tube plugs-part 2: 3-D solution, PVP vol 354. In: Current topics in the design and analysis of pressure vessels and piping. ASME, New York, pp 17–28 Williams DK (2003) Prediction of residual stresses in the mechanical roll of HX tubes into TEMA grooves, PVP vol 2003–1937. In: Design and analysis methods and fitness for service, ASME, New York, pp 121–29. Authors: Ambika Oad, Himanshu Yadav, Anurag Jain Paper Title: A Review: Image Encryption Techniques and its Terminologies Abstract: In today’s environment, security becomes an important issue in communication. For secure transmission of data in open network, encryption is very important methodology. Though encryption we can prevent our data from unauthorized access during transmission. In recent years many image encryption methods have been proposed and used to protect confidential data. In this paper, we survey on existing work which is used different techniques for image encryption and we also give general introduction about cryptography. Keywords: Cryptography, Image Encryption, Decryption, Security. References: 1. 2. 3. 4. 5. 6. 7. 77. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. http://en.wikipedia.org/wiki/Encryption http://en.wikipedia.org/wiki/Plaintext http://en.wikipedia.org/wiki/Ciphertext http://en.wikipedia.org/wiki/Decryption http://en.wikipedia.org/wiki/Cryptography Chang-Mok Shin, Dong-Hoan Seo, Kyu-Bo Chol, Ha-Wmn Lee, and SmJmng Kim, “ Multilevel Image Encryption by Binary Phase XOR Operations “, IEEE Proceeding in the year 2003. M.-R. Zhang, G.-C. Shao and K.-C. Yi, ― T-matrix and its applications in image processing‖, IEEE Electronics Letters 9th December 2004 Vol. 40 No. 25 Wang Ying, Zheng DeLing, Ju Lei, et al., ―The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System‖, Proceeding of 2004 IEEE Conference on Cybernetics and Intelligent Systems, Singapore, pp. 1172-1176, December. 2004 Guosheng Gu ,Guoqiang Han “An Enhanced Chaos Based Image Encryption Algorithm”, IEEE Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC'06) in 2006. N.K. Pareek, Vinod Patidar, "Image encryption using chaotic logistic map", Elsevier, Image and Vision Computing 24 (2006) 926–934. Saroj Kumar Panigrahy, Bibhudendra Acharya and Debasish Jen, Image Encryption Using Self-Invertible Key Matrix of Hill Cipher Algorithm 1st t International Conference on Advances in Computing, Chikhli, India, 21-22 February 2008 Mohammad Ali Bani Younes and Aman Jantan, An Image Encryption Approach Using a Combination of Permutation Technique Followed by Encryption , IJCSNS International Journal of Computer Science and Network Security, VOL.8 , April 2008. Mohammad Ali Bani Younes and Aman Jantan ImageEncryption Using Block-Based Transformation Algorithm IAENG International Journal of Computer Science, 35,2008. Zhang Yun-peng, Liu Wei, Cao Shui-ping, Zhai Zheng-jun, Nie Xuan , Dai Wei-di, Digital image encryption algorithm based on chaos and improved DES, IEEE International Conference on Systems, Man and Cybernetics, 2009. Sesha Pallavi Indrakanti , P.S.Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887) Volume 28– No.8, 2011. Amnesh Goel, Reji Mathews & Nidhi Chandra, "Image Encryption based on Inter Pixel Displacement of RGB Values inside Custom Slices", International Journal of Computer Applications (0975 – 8887), Volume 36– No.3, December 2011. Reji Mathews, Amnesh Goel, Prachur Saxena & Ved Prakash Mishra, "Image Encryption Based on Explosive Inter-pixel Displacement of the RGB Attributes of a PIXEL", Proceedings of the World Congress on Engineering and Computer Science 2011 Vol I WCECS 2011, October 19-21, 2011, San Francisco, USA. ISBN: 978-988-18210-9-6. S.Bosu Babu & S.S.P Kumar “Enhanced Color Visual Cryptography” Engineering Science and Technology: An International Journl, , ISSN: 2250-3498, Vol.2, No. 5, October 2012 Quist-Aphetsi Keste,“ Image Encryption based on the RGB PIXEL Transposition and Shuffling” I.J.Computer Network and Information Security, 2013,7, 43-50,2013. Keerti Kushwah, Sini Shibu “New Image Encryption Technique Based On Combination of Block Displacement and Block Cipher Technique,” International Journal of Computer Science and Information Technologies, Vol. 4 (1) , 2013, 61 - 65 Nehal Kandele, Shrikant Tiwari “A New Combined Symmetric Key Cryptography CRDDBT Using - Relative Displacement (RDC) and 373-376 Dynamic Base Transformation (DBTC)”, International Journal of Engineering Research & Technology, Vol.2 - Issue 10 (October - 2013)( 2278-0181) Authors: Aparna A Nair, S.K Sudheer, M. Jayaraju Paper Title: Analysis of Optical Characteristics for Photonic Crystal Fiber at Small Core Diameters Abstract: In the present study photonic crystal of eight ring with modified inner most ring has been considered. The important optical properties like chromatic dispersion, effective area, nonlinear coefficient and confinement loss has been studied. Each characteristic has been investigated under different core diameter of the photonic crystal fiber. Each iteration has been done within range of wavelength 1000nm -1600nm .Using software like COMSOL MULTIPHYSICS and MATLAB, each parameter were realized. This design has made the propagation of electromagnetic waves of higher wavelength through the core under tight confinement. The novel design has made the light of higher wavelength to be trapped inside the core of very small diameters (1μm-3μm).A good confinement loss has been achieved due to increase of the number of rings Keywords: Photonic crystal fiber (PCF), Finite Element Method, Chromatic Dispersion, Confinement Loss, and Nonlinear Coefficient. References: R. K. Sinha and Shailendra K. Varshney, “Dispersion Properties Of Photonic Crystal Fibers”, Microwave And Optical Technology Letters, Vol. 37, No. 2, 2003 . 2. Tzong-Lin Wu, Senior Member, IEEE, Jung-Sheng Chiang, and Chia-Hsin Chao, “ A Novel Approach for Calculating the Dispersions of Photonic Crystal Fibers”, IEEE Photonics Technology Letters, Vol. 16, No. 6, 2004. 3. P. St. J. Russell, “Photonic-Crystal Fibers,” J. Lightwave Technol., No. 24 , pp. 4729- 4749, 2006 4. Jianguo Liu, Lifang Xue, Zhi Wang, Guiyun Kai, Yange Liu, Weigang Zhang, and Xiaoyi Dong, “Large Anomalous Dispersion at Short Wavelength and Modal Properties of a Photonic Crystal Fiber With Large Air Holes” , IEEE Journal Of Quantum Electronics, Vol. 42, No. 9, 2006. 5. Lars Grüner-Nielsen, and Bera Pálsdóttir , “Highly nonlinear fibers for very wideband supercontinuum generation” , Proc. of SPIE Vol. 6873, 68731B, 2008 6. Feroza Begum, Yoshinori Namihira , S.M. Abdur Razzak , Shubi Kaijage , Nguyen Hoang Hai ,Tatsuya Kinjo , Kazuya Miyagi , Nianyu Zou, “Design and analysis of novel highly nonlinear photonic crystal fibers with ultra-flattened chromatic dispersion” Optics Communications 282 ,1416–1421,2009. 7. Rekha Mehra , Pawan Kumar Inaniya, “Design of Photonic Crystal Fiber for Ultra Low Dispersion in Wide Wavelength Range with Three Zero Dispersion Wavelengths” , AIP Conf. Proc. 1324, 175 ,2010. 8. Md. Anwar Hossain,Yoshinori Namihira, Jingjing Liu, S.M.Abdur Razzak, Md. Asraful Islam, Yuki Hirako, Kazuya Miyagi, Shinya Nozaki, “Dispersion Flattened Photonic Crystal Fibers For Supercontinuum Generation In A Telecommunication Window” , Proceedings of ICCTA2011. 9. WANG XiaoYan, LI ShuGuang, HAN Ying, DU Ying, XIA ChangMing & HOU LanTian, “The polarization-dependent supercontinuum generation in photonic crystal fibers with high birefringence and two-zero dispersion”, Science China:Physics, Mechanics & Astronomy, Vol.55 No.2: 199–203, Feb 2012. 10. M. Samiul Habib, M. A. Motin, M. I. Hasan, M. Selim Habib, S.M. Abdur Razzak, and M. A. Goffar Khan, “Dispersion and Confinement Loss Control with Decagonal Photonic Crystal Fibers for Wideband Transmission Systems”, IEEE 2013. 11. Aparna A Nair, Dr. S.K Sudheer, Dr. M Jayaraju, “Research on Optical Properties of Photonic Crystal Fiber (PCF) at Telecommunication Windows”, in proceedings of International Conference on Recent trends in Engineering Technology, ICRTET Cochin, Kerala, pp-8085,January 2014 1. 78. 377-380 Authors: Reshma Elizabeth Regi, Haris P.A. Performance of PAPR Reduction in OFDM System with Complex Hadamard Sequence using SLM Paper Title: and Clipping Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is an efficient method of data transmission for high speed communication systems. However, the main drawback of OFDM system is that, it exhibits high Peak to Average Power Ratio (PAPR) of the transmitted signals. OFDM consist of large number of independent subcarriers, as a result of which the amplitude of such a signal can have high peak values. The Selected Mapping (SLM) technique is one of the promising PAPR reduction techniques for OFDM. This technique however increases the computational and phase search complexity and PAPR reduction performance is largely dependent on the selection of random phase sequences. In this paper, a new SLM method which rotates the phase of input data after IFFT by using matrices generated from complex Hadamard code is proposed. After phase rotation, clipping technique is used to further reduce the PAPR. From simulation results, we can find that the proposed method has lower PAPR than conventional SLM combined with clipping technique. 79. Keywords: Sequence. OFDM-Orthogonal frequency division multiplexing, Clipping, SLM-Selected Mapping, Hadamard References: 1. 2. 3. 4. 5. 6. 7. 8. Y. Wu and W. Y. Zou, ”Orthogonal frequency division multiplexing: a multi-carrier modulation scheme,” IEEE Transactions on Consumer Electron, Aug. 1995. L. J. Cimini Jr., ”Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,” IEEE Trans. Commun., vol. COM-33, pp. 665-675, July 1985. Dov Wulich,”Definition of Efficient PAPR in OFDM ,” IEEE communication Letters, vol. 9, no. 9, Sept 2005 R. van Nee and A. de Wild, “Reducing the Peak-to-Average Power Ratio of OFDM,” in Proc. of Vehicular Technology Conference, IEEE, vol. 3, pp. 2072-2076.May 1998. L. Wang and C. Tellambura, ”A simplified clipping and filtering technique for par reduction in ofdm systems, ”IEEE Signal Process. Lett, vol. 12, no. 6, pp. 453–456, 2005 J. Armstrong, ”Peak-to-average power reduction for ofdm by repeated clipping and frequency domain filtering,” Electron. Lett, vol. 38, no. 5, pp. 246–247, 2002. Xiaodong Li and Leonard J. Cimini, Jr. “Effects of Clipping and Filtering on the Performance of OFDM, ”IEEE Comm. Letters vol. 2, no. 5, pp. 131-133,1998 Steve C. Thompson, John G. Proakis, and James R. Zeidler, “The Effectiveness of Signal Clipping for PAPR and Total Degradation 381-384 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. Reduction in OFDM Systems,” IEEE Globecom., vol. 30, pp. 2807-2811, 2005. Guoguang Chen, Rashid Ansari, Yingwei Yao,“ Improved Peak Windowing for PAPR Reduction in OFDM,” IEEE Conference Publications pp. 1-5,2009. A. E. Jones, T. A. Wilkinson, and S. K. Barton, “Block coding scheme for reduction of peak to mean envelope power ratio of multicarrier transmission schemes,” Electron. Lett., vol. 30, pp. 2098-2099, 1994. Wattanasuwakull, T. ; Benjapolakul, W,”PAPR Reduction for OFDM Transmission by using a method of Tone Reservation and Tone Injection” in proc. of Information, Communications and Signal Processing, Conference, IEEE ,pp. 273 - 277,2005 B. S. Krongold and D. L. Jones. “PAR reduction in OFDM via active constellation extension,”IEEE Trans. Broadcasting, April 2002. R.W. Bguml, R.F.H. Fischer and J.B. Huber “Reducing the peak-to-average power ratio of multicarrier modulation by selected mapping,” Electronics letters, vol. 32, no. 22, pp. 259– 268, October 1996. Sang -Woo Kim, Jin-Kwan Kim and Heung-Gyoon Ryu “A Computational Complexity Reduction Scheme Using Walsh Hadamard Sequence in SLM Method. ” IEEE conference Publications, pp. 762-766, 2006 S.H. Muller and J.B. Huber “OFDM with reduced peak to-average power ratio by optimum combination of partial transmit sequences” Electronics letters, vol. 33,no. 5 ,pp. 368- 369, february 1997. Asma Latif; N. D. Gohar, “Reducing Peak-to-Average Power Ratio (PAPR) Using Partial Transmit Sequence in OFDM Systems, ” Proc of lEEE, pp. 126-130,2003 Aparna P. More, Sunil B. Somani, “The Reduction of PAPR in OFDM Systems Using Clipping and SLM Method, ” Proc on lEEE conference, pp. 593-597,2013 Aye Aung, Boon Poh Ng, and Susanto Rahardja,”Sequence- Ordered Complex Hadamard Transform Properties,Computational Complexity and Applications” ,IEEE Transactions on signal processing , vol. 56, no. 8,pp. 3562-3571 , 2008 Authors: 80. Bibi Ayesha.H.Patel, K.Indira Automatic Recognition of Rodent Species based on Mathematical Morphological Characterization of Paper Title: Skull Abstract: Morphological image processing is a collection of non-linear operations related to the shape or morphology of features in an image. Digital image processing technique applied to extract morphological features of skull image taken from optical camera. Based on the prominent nine extracted morphological features of rodent species, the closed form univariate two-factor analysis is derived. These two factor analysis is used for real time autorecognition uniqueness of rodent species such as Meriones unguiculatus, Microtus brandti and Rattus norvegicus. The same two-factor auto-recognition analysis is used over x-ray image of rodent's skull as well as other rodent species like squirrel. The considered morphological features are short axis(X1), perimeter(X2), eccentricity(X3), sphericity(X4), bump area(X5), paraxial area of enclosing rectangle(X6), hu1(X7), hu2(X8), hu3(X9). 385-387 Keywords: Morphological image processing , Hu- moments, Rodent species. References: 1. 2. 3. 4. 81. Onboard Autonomous Rock Shape Analysis For Mars Rovers, IEEE 2002 Zhihu Huang, Jinsong Leng "Analysis of Hus Moment Invariants on Image Scaling and Rotation", IEEE 2010 J. F. Boyce and W. J. Hossack, " Moment Invariants for Pattern Recognition," Pattern Recognition Letters, vol. 1, pp. 451-456, 1983 Jan Flusser and Tomas Suk, "A Moment-based Approach to Registration of Images with Affine Geometric Distortion," IEEE transaction on Geoscience and Remote Sensing, vol. 32, pp. 382-387, 1994 Authors: Monali Chaudhari, Amogh Waghmare, Sheldon Fernandes, Sagar Sinkar Paper Title: Dual Axes Maximum Light Intensity Tracker Abstract: Efficiency of any solar powered system reduces due to mismatch between the direction of the sun’s rays and axis of the solar panel. Aim of the proposed and implemented scheme is to increase the efficiency of such a system, by reorienting the plane of the solar panel orthogonal to the sun’s radiation by using a simple low powered system. To achieve this, the panel is moved about two axes after a certain interval of time depending upon the ambient light conditions. Keywords: LDR, Gimbal Structure, ADC, LSB 388-391 References: 1. 2. 3. Saravanan C. , Dr .M.A. Panneerselvam, I. William Christopher, “A Novel Low Cost Automatic Solar Tracking System”. Design, Development and Performance Test of an Automatic Two-Axis Solar Tracker system by Bajpai, P. (Electr. Eng. Dept., IIT Kharagpur, Kharagpur, India) et.al. India Conference (INDICON), 2011 Annual IEEE Design, Manufacturing and Performance Test of a Solar Tracker Made by a Embedded Control by Beltran, J.A. et.al. Electronics, Robotics and Automotive Mechanics Conference,25-28 Sept. 2007 Page(s): 129 – 134 Print ISBN: 978-0-7695-2974-5 Authors: 82. Syed Shujauddin Sameer Privacy Preserving Data Mining: A Novel Approach to Secure Sensitive Data Based on Association Paper Title: Rules Abstract: The availability of data on the internet is increasing on a larger basis daily .Privacy Preservation data mining has emerged to address one of the side effects of data mining Technology. The threat to individual privacy through data mining is able to infer sensitive information from Non-sensitive information or unclassified data. There is a n urgent need to be able to infer some mechanism to avoid the projection of all the sensitive information .An approach in data mining techniques is very much essential. Alteration of data, filtering of the data, blocking of the data are Some of the approaches. Given specific rules to be hidden, the techniques involve is to hide only the given sensitive data. In this work we assume that only sensitive datais given and we analyze the approaches to secure 392-395 sensitive data in the database. Keywords: Privacy preserving data mining, Association rules ,Sensitive data. References: 1 Privacy Preserving Decision Tree Learning Using Unrealized Data Sets ,Issue No 02- February 2012.Vol. 24,Knowledge and Data 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 Engineering ,IEEE Transactions D. Agrawal and C. C. Aggarwal, “On the design and quantification of privacy preserving data mining algorithms”, In Proceedings of the 20th Symposium on Principles of Database Systems, Santa Barbara,California, USA, May 2001. R. Agrawal, T. Imielinski, and A. Swami, “Mining Association Rules between Sets of Items in Large Databases”, In Proceedings of ACM SIGMOD International Conference on Management of Data, Washington DC, May 1993. R. Agrawal and R. Srikant, ”Privacy preserving data mining”, In ACM SIGMOD Conference on Management of Data, pages 439–450, Dallas, Texas, May 2000. Ljiljana Brankovic and Vladimir Estivill-Castro, “Privacy Issues in Knowledge Discovery and Data Mining”, Australian Institute of Computer Ethics Conference, July, 1999, Lilydale. C. Clifton and D. Marks, “Security and Privacy Implications of Data Mining”, in Workshop on Research Issues on Data Mining and knowledge Discovery, 1996. C. Clifton, “Protecting Against Data Mining Through Samples”, in Proceedings of the ThirteenthAnnual IFIP WG 11.3 Working Conference on Database Security, 1999. C. Clifton, “Using Sample Size to Limit Exposure to Data Mining”, Journal of Computer Security, 8(4), 2000.SIGMOD Chris Clifton, Murant Kantarcioglu, Xiaodong Lin and Michael Y. Zhu, “ Tools for Privacy PreservingDistributed Data Mining”, SIGKDD Explorations, 4(2), 1-7, Dec. 2002. E. Dasseni, V. Verykios, A. Elmagarmid and E. Bertino, “Hiding Association Rules by Using Confidence and Support” in Proceedings of 4th Information Hiding Workshop, 369-383, Pittsburgh,PA, 2001. A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, “Privacy preserving mining of association rules”, In Proc. Of the 8th ACM SIGKDD Int’l Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, July 2002. Alexandre Evfimievski, “Randomization in Privacy Preserving Data Mining”, SIGKDD Explorations, 4(2), Issue 2, 43-48, Dec. 2002. Alexandre Evfimievski, Johannes Gehrke and Ramakrishnan Srikant, “Limiting Privacy Breaches in Privacy Preserving Data Mining”, PODS 2003, June 9-12, 2003, San Diego, CA. M. Kantarcioglu and C. Clifton, “Privacy-preserving distributed mining of association rules onhorizontally partitioned data”, In ACM SIGMOD Workshop on Research Issues on Data Miningand Knowledge Discovery, June 2002. Y. Lindell and B. Pinkas, “Privacy preserving data mining”, In CRYPTO, pages 36–54, 2000. D. E. O’ Leary, “Knowledge Discovery as a Threat to Database Security”, In G. Piatetsky-Shapiro and W. J.Frawley, editors, Knowledge Discovery in Databases, 507516, AAAI Press/ MIT Press, Menlo Park, CA, 1991. S. Oliveira, O. Zaiane, “Algorithms for Balancing Privacy and Knowledge Discovery i Association Rule Mining”, Proceedings of 7th International Database Engineering and ApplicationsSymposium (IDEAS03), Hong Kong, July 2003. S. Oliveira, O. Zaiane, “Protecting Sensitive Knowledge by Data Sanitization”, Proceedings of IEEE International Conference on Data Mining, November 2003. S. J. Rizvi and J. R. Haritsa, “Privacy-preserving Association rule mining”, In Proc. of the 28th Int’l Conference on Very Large Databases, August 2002. Y. Saygin, V. Verykios, and C. Clifton, “Using Unknowns to Prevent Discovery of Association Rules”, SIGMOD Record 30(4): 45-54, December 2001. Surajit Chaudhuri. “Efficient evaluation of queries with mining predicates”, In Proc. ofthe 18th Int’l Conference on Data Engineering (ICDE) 529-540,2002. Authors: Prabodh Sarmah, Devajit Mahanta Paper Title: Computational Methods for Enzyme Design and Its Biological Significance Abstract: Enzymes are large biological molecules responsible for the thousands of metabolic processes that sustain life. They are highly selective catalysts, greatly accelerating both the rate and specificity of metabolic reactions, from the digestion of food to the synthesis of DNA. Most enzymes are proteins, although some catalytic RNA molecules have been identified. Enzymes adopt a specific three-dimensional structure, and may employ organic (e.g. biotin) and inorganic (e.g. magnesium ion) cofactors to assist in catalysis. Multiple experimental approaches have been applied to generate nearly all possible mutations of target enzymes, allowing the identification of desirable variants with improved properties to meet the practical needs. Meanwhile, an increasing number of computational methods have been developed to assist in the modification of enzymes during the past few decades. With the development of bioinformatics algorithms, computational approaches are now able to provide more precise guidance for enzyme engineering and make it more efficient and less laborious. In this review, we summarize the recent advances of method development with significant biological outcomes to provide important insights into successful computational protein designs. Keywords: Enzymes, computational approaches 83. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. Smith AL (Ed) (1997). Oxford dictionary of biochemistry and molecular biology. Oxford [Oxfordshire]: Oxford University Press. ISBN 019-854768-4. Grisham, Charles M.; Reginald H. Garrett (1999). Biochemistry. Philadelphia: Saunders College Pub. pp. 426–7. ISBN 0-03-022318-0. Bairoch A. (2000). "The ENZYME database in 2000" (PDF). Nucleic Acids Res 28(1): 304–5. doi:10.1093/nar/28.1.304. PMC 102465. PMID 10592255. Lilley D (2005). "Structure, folding and mechanisms of ribozymes". Current Opinion in Structural Biology 15 (3): 313–23. doi:10.1016/j.sbi.2005.05.002. PMID 15919196. Cech T (2000). "Structural biology. The ribosome is a ribozyme". Science 289 (5481): 878–9. doi:10.1126/science.289.5481.878. PMID 10960319. Groves JT (1997). "Artificial enzymes. The importance of being selective". Nature 389(6649): 329–30. doi:10.1038/38602. PMID 9311771. de Réaumur, RAF (1752). "Observations sur la digestion des oiseaux". Histoire de l'academie royale des sciences 1752: 266, 461. Williams, H. S. (1904) A History of Science: in Five Volumes. Volume IV: Modern Development of the Chemical and Biological Sciences Harper and Brothers (New York) Accessed 4 April 2007 Payen, A. et J.-F. Persoz (1833) "Mémoire sur la diastase, les principaux produits de ses réactions et leurs applications aux arts industriels" (Memoir on diastase, the principal products of its reactions and their applications to the industrial arts), Annales de chimie et de physique, 2nd series, 53 : 73–92. Dubos J. (1951). "Louis Pasteur: Free Lance of Science, Gollancz. Quoted in Manchester K. L. (1995) Louis Pasteur (1822–1895)—chance and the prepared mind".Trends Biotechnol 13 (12): 511–5. doi:10.1016/S0167-7799(00)89014-9.PMID 8595136. Kühne coined the word "enzyme" in: W. Kühne (1877) Jump up^ Text of Eduard Buchner's 1907 Nobel lecture at http://nobelprize.org. Retrieved 4 April 2007. The naming of enzymes by adding the suffix "-ase" to the substrate on which the enzyme acts, has been traced to French scientist Jump up^ Willstätter, R. (1927). Problems and Methods in Enzyme Research. Cornell University Press, Ithaca. quoted in Blow, David (2000). "So do we understand how enzymes work?" (pdf). Structure 8 (4): R77–R81. doi:10.1016/S0969-2126(00)00125-8.PMID 10801479. 396-403 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42. 43. 44. 45. 46. 47. 48. 49. 50. 51. 52. 53. 54. 55. 56. 57. 58. 1946 Nobel prize for Chemistry laureates at http://nobelprize.org. Retrieved 4 April 2007. Blake CC, Koenig DF, Mair GA, North AC, Phillips DC, Sarma VR. (1965). "Structure of hen egg-white lysozyme. A three-dimensional Fourier synthesis at 2 Angstrom resolution". Nature 206 (4986): 757–61. doi:10.1038/206757a0. PMID 5891407. Chen LH, Kenyon GL, Curtin F, Harayama S, Bembenek ME, Hajipour G, Whitman CP (1992). "4-Oxalocrotonate tautomerase, an enzyme composed of 62 amino acid residues per monomer". J. Biol. Chem. 267 (25): 17716–21. PMID 1339435. Smith S (1 December 1994). "The animal fatty acid synthase: one gene, one polypeptide, seven enzymes". FASEB J. 8 (15): 1248–59. PMID 8001737. Anfinsen C.B. (1973). "Principles that Govern the Folding of Protein Chains". Science181 (4096): 223–30. doi:10.1126/science.181.4096.223. PMID 4124164. Dunaway-Mariano D (2008). "Enzyme function discovery". Structure 16 (11): 1599–600. doi:10.1016/j.str.2008.10.001. PMID 19000810. The Catalytic Site Atlas at The European Bioinformatics Institute. Retrieved 4 April 2007. Jaeger KE, Eggert T. (2004). "Enantioselective biocatalysis optimized by directed evolution". Current Opinion in Biotechnology 15 (4): 305– Shevelev IV, Hubscher U. (2002). "The 3' 5' exonucleases". Nature Reviews Molecular Cell Biology 3 (5): 364– Tymoczko, John L.; Stryer Berg Tymoczko; Stryer, Lubert; Berg, Jeremy Mark (2002).Biochemistry. San Francisco: W.H. Freeman. ISBN Ibba M, Soll D. (2000). "Aminoacyl-tRNA synthesis". Annu Rev Biochem. 69: 617–50.doi:10.1146/annurev.biochem.69.1.617. PMID 10966471. Rodnina MV, Wintermeyer W. (2001). "Fidelity of aminoacyl-tRNA selection on the ribosome: kinetic and structural mechanisms". Annu Rev Biochem. 70: 415–35.doi:10.1146/annurev.biochem.70.1.415. PMID 11395413. Tawfik, O. K. A. D. S.; Tawfik, D. S. (2010). "Enzyme Promiscuity: A Mechanistic and Evolutionary Perspective". Annual Review of Biochemistry 79: 471–505.doi:10.1146/annurev-biochem-030409-143718. PMID 20235827. edit Fischer E. (1894). "Einfluss der Configuration auf die Wirkung der Enzyme" [Influence of configuration on the action of enzymes]. Berichte der Deutschen chemischen Gesellschaft zu Berlin 27 (3): 2985–93. doi:10.1002/cber.18940270364Jump up^ Koshland D. E. (1958). "Application of a Theory of Enzyme Specificity to Protein Synthesis". Proc. Natl. Acad. Sci. 44 (2): 98–104. doi:10.1073/pnas.44.2.98.PMC 335371. PMID 16590179. Davies GJ, Bohm M. (2002). "Glycosidase mechanisms". Current Opinion in Chemical Biology 6 (5): 619–29. doi:10.1016/S13675931(02)00380-0.PMID 12413546. Boyer, Rodney (2002) [2002]. "6". Concepts in Biochemistry (2nd ed.). New York, Chichester, Weinheim, Brisbane, Singapore, Toronto.: John Wiley & Sons, Inc. pp. 137–8. ISBN 0-470-00379-0. OCLC 51720783. Savir Y & Tlusty T (2007). "Conformational proofreading: the impact of conformational changes on the specificity of molecular recognition". In Scalas, Enrico. PLoS ONE 2(5): e468. doi:10.1371/journal.pone.0000468. PMC 1868595. PMID 17520027. Chou K.C. (1996). "Review: Prediction of human immunodeficiency virus protease cleavage sites in proteins". Analytical Biochemistry 233 (1): 1–14.doi:10.1006/abio.1996.0001. PMID 8789141. Gan, Y. R., Huang, H., Huang, Y. D., Rao, C. M., Zhao, Y., Liu, J. S., Wu, L. & Wei, D. Q. (April 2006). "Synthesis and activity of an octapeptide inhibitor designed for SARS coronavirus main proteinase". Peptides 27 (4): 622–625.doi:10.1016/j.peptides.2005.09.006. PMID 16242214. Du, Q. S., Wang, S., Wei, D. Q., Sirois, S. & Chou, K. C. (2005). "Molecular modelling and chemical modification for finding peptide inhibitor against SARS CoV Mpro". Analytical Biochemistry 337 (2): 262–270. doi:10.1016/j.ab.2004.10.003.PMID 15691506. Du, Q. S., Sun, H. & Chou, K. C. (2007). "Inhibitor design for SARS coronavirus main protease based on "distorted key theory"". Medicinal Chemistry 3 (1): 1–6.doi:10.2174/157340607779317616. PMID 17266617. Fersht, Alan (1985). Enzyme structure and mechanism. San Francisco: W.H. Freeman. pp. 50–2. ISBN 0-7167-1615-1. Jencks, William P. (1987). Catalysis in chemistry and enzymology. Mineola, N.Y: Dover. ISBN 0-486-65460-5. Villa J, Strajbl M, Glennon TM, Sham YY, Chu ZT, Warshel A (2000). "How important are entropic contributions to enzyme catalysis?". Proc. Natl. Acad. Sci. U.S.A. 97(22): 11899–904. doi:10.1073/pnas.97.22.11899. PMC 17266. PMID 11050223. Warshel A, Sharma PK, Kato M, Xiang Y, Liu H, Olsson MH (2006). "Electrostatic basis for enzyme catalysis". Chem. Rev. 106 (8): 3210–35. doi:10.1021/cr0503106.PMID 16895325. Eisenmesser EZ, Bosco DA, Akke M, Kern D (2002). "Enzyme dynamics during catalysis". Science 295 (5559): 1520–3. doi:10.1126/science.1066176.PMID 11859194. Agarwal PK (2005). "Role of protein dynamics in reaction rate enhancement by enzymes". J. Am. Chem. Soc. 127 (43): 15248–56. doi:10.1021/ja055251s.PMID 16248667. Eisenmesser EZ, Millet O, Labeikovsky W (2005). "Intrinsic dynamics of an enzyme underlies catalysis". Nature 438 (7064): 117–21. doi:10.1038/nature04105.PMID 16267559. Yang LW, Bahar I (5 June 2005). "Coupling between catalytic site and collective dynamics: A requirement for mechanochemical activity of enzymes". Structure 13 (6): 893–904. doi:10.1016/j.str.2005.03.015. PMC 1489920. PMID 15939021. Agarwal PK, Billeter SR, Rajagopalan PT, Benkovic SJ, Hammes-Schiffer S. (5 March 2002). "Network of coupled promoting motions in enzyme catalysis". Proc Natl Acad Sci USA. 99 (5): 2794–9. doi:10.1073/pnas.052005999. PMC 122427.PMID 11867722. Agarwal PK, Geist A, Gorin A (2004). "Protein dynamics and enzymatic catalysis: investigating the peptidyl-prolyl cis-trans isomerization activity of cyclophilin A".Biochemistry 43 (33): 10605–18. doi:10.1021/bi0495228. PMID 15311922. Tousignant A, Pelletier JN. (2004). "Protein motions promote catalysis". Chem Biol. 11(8): 1037–42. doi:10.1016/j.chembiol.2004.06.007. PMID 15324804 Flomenbom O, Velonia K, Loos D et al. (2005). "Stretched exponential decay and correlations in the catalytic activity of fluctuating single lipase molecules". Proc. Natl. Acad. Sci. U.S.A. 102 (7): 2368–2372. doi:10.1073/pnas.0409039102.PMC 548972. PMID 15695587. English BP, Min W, van Oijen AM et al. (2006). "Ever-fluctuating single enzyme molecules: Michaelis-Menten equation revisited". Nature Chemical Biology 2 (2): 87–94.doi:10.1038/nchembio759. PMID 16415859. Lu H, Xun L, Xie X S (1998). "Single-molecule enzymatic dynamics". Science 282(5395): 1877–1882. doi:10.1126/science.282.5395.1877. PMID 9836635. Olsson, MH; Parson, WW; Warshel, A (2006). "Dynamical Contributions to Enzyme Catalysis: Critical Tests of A Popular Hypothesis". Chem. Rev. 106 (5): 1737–. Neet KE (1995). "Cooperativity in enzyme function: equilibrium and kinetic aspects".Meth. Enzymol. Methods in Enzymology 249: 519– 67. doi:10.1016/0076-6879(95)49048-5. ISBN 978-0-12-182150-0. PMID 7791626. Changeux JP, Edelstein SJ (2005). "Allosteric mechanisms of signal transduction".Science 308 (5727): 1424–8. doi:10.1126/science.1108595. PMID 15933191. de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Cofactor". International Union of Pure and Applied Chemistry. Retrieved 30 October 2007. de Bolster, M.W.G. (1997). "Glossary of Terms Used in Bioinorganic Chemistry: Coenzyme". International Union of Pure and Applied Chemistry. Retrieved 30 October 2007. Fisher Z, Hernandez Prada JA, Tu C, Duda D, Yoshioka C, An H, Govindasamy L, Silverman DN and McKenna R. (2005). "Structural and kinetic characterization of active-site histidine as a proton shuttle in catalysis by human carbonic anhydrase II".Biochemistry. 44 (4): 1097– 115. doi:10.1021/bi0480279. PMID 15667203. Wagner, Arthur L. (1975). Vitamins and Coenzymes. Krieger Pub Co. ISBN 0-88275-258-8. BRENDA The Comprehensive Enzyme Information System. Retrieved 4 April 2007. Törnroth-Horsefield S, Neutze R (2008). "Opening and closing the metabolite gate".Proc. Natl. Acad. Sci. U.S.A. 105 (50): 19565–6. doi:10.1073/pnas.0810654106.PMC 2604989. PMID 19073922. Ferguson, S. J.; Nicholls, David; Ferguson, Stuart (2002). Bioenergetics 3 (3rd ed.). San Diego: Academic. ISBN 0-12-518121-3. Henri, V. (1902). "Theorie generale de l'action de quelques diastases". Compt. Rend. Hebd. Acad. Sci. Paris 135: 916–9. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. 76. 77. 78. 84. Sørensen,P.L. (1909). "Enzymstudien {II}. Über die Messung und Bedeutung der Wasserstoffionenkonzentration bei enzymatischen Prozessen". Biochem. Z. 21: 131–304. Michaelis L., Menten M. (1913). "Die Kinetik der Invertinwirkung". Biochem. Z. 49: 333–369. English translation. Retrieved 6 April 2007. Briggs G. E., Haldane J. B. S. (1925). "A note on the kinetics of enzyme action".Biochem. J. 19 (2): 339–339. PMC 1259181. PMID 16743508. Xue X, Liu F, Ou-Yang ZC (2006). "Single molecule Michaelis-Menten equation beyond quasistatic disorder". Phys. Rev. E 74 (3): 030902. doi:10.1103/PhysRevE.74.030902.PMID 17025584. Radzicka A, Wolfenden R. (1995). "A proficient enzyme". Science 267 (5194): 90–931.doi:10.1126/science.7809611. PMID 7809611. Ellis RJ (2001). "Macromolecular crowding: obvious but underappreciated". Trends Biochem. Sci. 26 (10): 597–604. doi:10.1016/S09680004(01)01938-7.PMID 11590012. Kopelman R (1988). "Fractal Reaction Kinetics". Science 241 (4873): 1620–26.doi:10.1126/science.241.4873.1620. PMID 17820893. Savageau MA (1995). "Michaelis-Menten mechanism reconsidered: implications of fractal kinetics". J. Theor. Biol. 176 (1): 115–24. doi:10.1006/jtbi.1995.0181.PMID 7475096. Schnell S, Turner TE (2004). "Reaction kinetics in intracellular environments with macromolecular crowding: simulations and rate laws". Prog. Biophys. Mol. Biol. 85 (2–3): 235–60. doi:10.1016/j.pbiomolbio.2004.01.012. PMID 15142746. Xu F, Ding H (2007). "A new kinetic model for heterogeneous (or spatially confined) enzymatic catalysis: Contributions from the fractal and jamming (overcrowding) effects".Appl. Catal. A: Gen. 317 (1): 70–81. doi:10.1016/j.apcata.2006.10.014. Garcia-Viloca M., Gao J., Karplus M., Truhlar D. G. (2004). "How enzymes work: analysis by modern rate theory and computer simulations". Science 303 (5655): 186–95.doi:10.1126/science.1088172. PMID 14716003. Olsson M. H., Siegbahn P. E., Warshel A. (2004). "Simulations of the large kinetic isotope effect and the temperature dependence of the hydrogen atom transfer in lipoxygenase". J. Am. Chem. Soc. 126 (9): 2820–8. doi:10.1021/ja037233l.PMID 14995199. Masgrau L., Roujeinikova A., Johannissen L. O., Hothi P., Basran J., Ranaghan K. E., Mulholland A. J., Sutcliffe M. J., Scrutton N. S., Leys D. (2006). "Atomic Description of an Enzyme Reaction Dominated by Proton Tunneling". Science 312 (5771): 237– 41.doi:10.1126/science.1126002. PMID 16614214. Cleland, W.W. (1963). "The Kinetics of Enzyme-catalyzed Reactions with two or more Substrates or Products 2. {I}nhibition: Nomenclature and Theory". Biochim. Biophys. Acta 67: 173–87. Price, NC. (1979). "What is meant by 'competitive inhibition'?". Trends in Biochemical Sciences 4 (11): pN272. doi:10.1016/09680004(79)90205-6. R Poulin; Lu, L; Ackermann, B; Bey, P; Pegg, Yoshikawa S and Caughey WS. (15 May 1990). "Infrared evidence of cyanide binding to iron and copper sites in bovine heart cytochrome c oxidase. Implications regarding oxygen reduction". J Biol Chem. 265 (14): 7945–58. PMID 2159465. Hunter T. (1995). "Protein kinases and phosphatases: the yin and yang of protein phosphorylation and signaling". Cell. 80 (2): 225–36. doi:10.1016/0092-8674(95)90405-0. PMID 7834742. Berg JS, Powell BC, Cheney RE (1 April 2001). "A millennial myosin census". Mol. Biol. Cell 12 (4): 780–94. doi:10.1091/mbc.12.4.780. PMC 32266.PMID 11294886. Meighen EA (1 March 1991). "Molecular biology of bacterial bioluminescence".Microbiol. Rev. 55 (1): 123–42. PMC 372803. PMID 2030669. Authors: Anil Sai Bodepudi, Anil Kumar Kopparthy, Annavarapu Santosh Kumar Paper Title: Mobile Operated Control System for Humanoid Robot Abstract: In this paper a control system is designed to operate a Humanoid Robot “Bioloid Premium” using DTMF (Dual-Tone-Multiple- Frequency) technology of mobile phones for long range operations. The mobile phone with the operator acts as a transmitter and the one attached to the Robot acts as a receiver and hence no additional communication devices are required. The operator calls the mobile installed in the humanoid Robot which gets activated through auto answering mode. In the course of a call, if any button is pressed, a DTMF tone corresponding to the button pressed is heard at the other end of the call. The Humanoid Robot perceives this DTMF tone with the help of the phone placed on it. The received tone is processed by the Arduino microcontroller with the help of DTMF decoder. The decoder decodes the DTMF tone into its equivalent binary digit and the same is sent to the microcontroller. The microcontroller is programmed to take a decision for any given input and outputs its decision to the CM-530 controller through a Zigbee wireless interface. The output decision of the CM-530 processor is sent to motor driver in order to control the servo motors in required direction for human like moves. Auto answering video calling is done in order to control the humanoid very easily and precisely. Experiment based on the DTMF has been carried out which can be implemented in the humanoid robot for various applications like security or safety, defence, assistance in medical and environmental hazards and other humanitarian services. 404-407 Keywords: Humanoid Robot, DTMF, Microcontroller. References: 1. 2. 3. 4. 85. Siegmund M. Redl, Matthias K. Weber, Malcolm W. Oilphant, GSM and Personal Communications Handbook, Artech House Boston, London, 1998 . Sabuj Das Gupta, Arman Riaz Ochi, Mohammad Sakib Hossain, Nahid Alam Siddique, Designing and Implementation of Mobile Operated Toy Car by DTMF, International Journal of Scientific and Research Publications, Vol 3, Issue 1, pp 1-7, 2013. 4Online Available: www.natalnet.br/~aroca/afron/mt8870.pdf Online Available: http://www.arduino.cc/ Online Available: http://www.robotis.com/xe. Authors: Wail N. Al-Rifaie Paper Title: An Approximate Method for the Design of Ferrocement Beams Abstract: A simple analytical model is proposed to design the ferrocement rectangular beam subjected to flexural loading. The predicted results of cross sectional resistance moment obtained using the proposed model is compared with ACI (trial and error) method. A parametric study was conducted to estimate the influence of volume fraction of reinforcement and the depth of the beam. The comparison between the proposed and ACI methods was quite satisfactory. Keywords: Frrocement, pre-fabricated building, moment, eco-housing. References: 1. IFS Committees 10, 2001”Ferrocement Model Code,” Building Code Recommendations for Ferrocement (IFS 10-01). 408-410 2. 3. ACI Publication SP.61, 1979 “Ferrocement–Materials and Applications”, pp 1-195. ACI committee 549, 1980, “Guide for the Design, Construction, and Repair of Ferrocement” ACI Structural Journal, May. June, pp 325-351.