International Journal of Engineering and Advanced Technology ISSN : 2249 - 8958 Website: www.ijeat.org
Volume-2 Issue-3, February 2013 Published by: Blue Eyes Intelligence Engineering and Sciences Publication Pvt. Ltd.
IJEat Int er
na
nal Journal t io o
ING
gy lo
L P EX
OR
N O TI VA INNO
ineering an ng d fE
ced Tec hn van d o A
www.ijeat.org
Exploring Innovation
Editor In Chief Dr. Shiv K Sahu Ph.D. (CSE), M.Tech. (IT, Honors), B.Tech. (IT) Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India Dr. Shachi Sahu Ph.D. (Chemistry), M.Sc. (Organic Chemistry) Additional Director, Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., Bhopal (M.P.), India Vice Editor In Chief Dr. Vahid Nourani Professor, Faculty of Civil Engineering, University of Tabriz, Iran Prof.(Dr.) Anuranjan Misra Professor & Head, Computer Science & Engineering and Information Technology & Engineering, Noida International University, Noida (U.P.), India Chief Advisory Board Prof. (Dr.) Hamid Saremi Vice Chancellor of Islamic Azad University of Iran, Quchan Branch, Quchan-Iran Dr. Uma Shanker Professor & Head, Department of Mathematics, CEC, Bilaspur(C.G.), India Dr. Rama Shanker Professor & Head, Department of Statistics, Eritrea Institute of Technology, Asmara, Eritrea Dr. Vinita Kumari Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd., India Dr. Kapil Kumar Bansal Head (Research and Publication), SRM University, Gaziabad (U.P.), India Dr. Deepak Garg Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India, Senior Member of IEEE, Secretary of IEEE Computer Society (Delhi Section), Life Member of Computer Society of India (CSI), Indian Society of Technical Education (ISTE), Indian Science Congress Association Kolkata. Dr. Vijay Anant Athavale Director of SVS Group of Institutions, Mawana, Meerut (U.P.) India/ U.P. Technical University, India Dr. T.C. Manjunath Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India Dr. Kosta Yogeshwar Prasad Director, Technical Campus, Marwadi Education Foundation’s Group of Institutions, Rajkot-Morbi Highway, Gauridad, Rajkot, Gujarat, India Dr. Dinesh Varshney Director of College Development Counceling, Devi Ahilya University, Indore (M.P.), Professor, School of Physics, Devi Ahilya University, Indore (M.P.), and Regional Director, Madhya Pradesh Bhoj (Open) University, Indore (M.P.), India Dr. P. Dananjayan Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry,India Dr. Sadhana Vishwakarma Associate Professor, Department of Engineering Chemistry, Technocrat Institute of Technology, Bhopal(M.P.), India Dr. Kamal Mehta Associate Professor, Deptment of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India Dr. CheeFai Tan Faculty of Mechanical Engineering, University Technical, Malaysia Melaka, Malaysia Dr. Suresh Babu Perli Professor & Head, Department of Electrical and Electronic Engineering, Narasaraopeta Engineering College, Guntur, A.P., India
Dr. Binod Kumar Associate Professor, Schhool of Engineering and Computer Technology, Faculty of Integrative Sciences and Technology, Quest International University, Ipoh, Perak, Malaysia Dr. Chiladze George Professor, Faculty of Law, Akhaltsikhe State University, Tbilisi University, Georgia Dr. Kavita Khare Professor, Department of Electronics & Communication Engineering., MANIT, Bhopal (M.P.), INDIA Dr. C. Saravanan Associate Professor (System Manager) & Head, Computer Center, NIT, Durgapur, W.B. India Dr. S. Saravanan Professor, Department of Electrical and Electronics Engineering, Muthayamal Engineering College, Resipuram, Tamilnadu, India Dr. Amit Kumar Garg Professor & Head, Department of Electronics and Communication Engineering, Maharishi Markandeshwar University, Mulllana, Ambala (Haryana), India Dr. T.C.Manjunath Principal & Professor, HKBK College of Engg, Nagawara, Arabic College Road, Bengaluru-560045, Karnataka, India Dr. P. Dananjayan Professor, Department of Department of ECE, Pondicherry Engineering College, Pondicherry, India Dr. Kamal K Mehta Associate Professor, Department of Computer Engineering, Institute of Technology, NIRMA University, Ahmedabad (Gujarat), India Dr. Rajiv Srivastava Director, Department of Computer Science & Engineering, Sagar Institute of Research & Technology, Bhopal (M.P.), India Dr. Chakunta Venkata Guru Rao Professor, Department of Computer Science & Engineering, SR Engineering College, Ananthasagar, Warangal, Andhra Pradesh, India Dr. Anuranjan Misra Professor, Department of Computer Science & Engineering, Bhagwant Institute of Technology, NH-24, Jindal Nagar, Ghaziabad, India Dr. Robert Brian Smith International Development Assistance Consultant, Department of AEC Consultants Pty Ltd, AEC Consultants Pty Ltd, Macquarie Centre, North Ryde, New South Wales, Australia Dr. Saber Mohamed Abd-Allah Associate Professor, Department of Biochemistry, Shanghai Institute of Biochemistry and Cell Biology, Yue Yang Road, Shanghai, China Dr. Himani Sharma Professor & Dean, Department of Electronics & Communication Engineering, MLR Institute of Technology, Laxman Reddy Avenue, Dundigal, Hyderabad, India Dr. Sahab Singh Associate Professor, Department of Management Studies, Dronacharya Group of Institutions, Knowledge Park-III, Greater Noida, India Dr. Umesh Kumar Principal: Govt Women Poly, Ranchi, India Dr. Syed Zaheer Hasan Scientist-G Petroleum Research Wing, Gujarat Energy Research and Management Institute, Energy Building, Pandit Deendayal Petroleum University Campus, Raisan, Gandhinagar-382007, Gujarat, India. Dr. Jaswant Singh Bhomrah Director, Department of Profit Oriented Technique, 1 – B Crystal Gold, Vijalpore Road, Navsari 396445, Gujarat. India Technical Advisory Board Dr. Mohd. Husain Director. MG Institute of Management & Technology, Banthara, Lucknow (U.P.), India
Dr. T. Jayanthy Principal. Panimalar Institute of Technology, Chennai (TN), India Dr. Umesh A.S. Director, Technocrats Institute of Technology & Science, Bhopal(M.P.), India Dr. B. Kanagasabapathi Infosys Labs, Infosys Limited, Center for Advance Modeling and Simulation, Infosys Labs, Infosys Limited, Electronics City, Bangalore, India Dr. C.B. Gupta Professor, Department of Mathematics, Birla Institute of Technology & Sciences, Pilani (Rajasthan), India Dr. Sunandan Bhunia Associate Professor & Head,, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Jaydeb Bhaumik Associate Professor, Dept. of Electronics & Communication Engineering, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Rajesh Das Associate Professor, School of Applied Sciences, Haldia Institute of Technology, Haldia, West Bengal, India Dr. Mrutyunjaya Panda Professor & Head, Department of EEE, Gandhi Institute for Technological Development, Bhubaneswar, Odisha, India Dr. Mohd. Nazri Ismail Associate Professor, Department of System and Networking, University of Kuala (UniKL), Kuala Lumpur, Malaysia Dr. Haw Su Cheng Faculty of Information Technology, Multimedia University (MMU), Jalan Multimedia, 63100 Cyberjaya Dr. Hossein Rajabalipour Cheshmehgaz Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (UTM) 81310, Skudai, Malaysia Dr. Sudhinder Singh Chowhan Associate Professor, Institute of Management and Computer Science, NIMS University, Jaipur (Rajasthan), India Dr. Neeta Sharma Professor & Head, Department of Communication Skils, Technocrat Institute of Technology, Bhopal(M.P.), India Dr. Ashish Rastogi Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India Dr. Santosh Kumar Nanda Professor, Department of Computer Science and Engineering, Eastern Academy of Science and Technology (EAST), Khurda (Orisa), India Dr. Hai Shanker Hota Associate Professor, Department of CSIT, Guru Ghansi Das University, Bilaspur (C.G.), India Dr. Sunil Kumar Singla Professor, Department of Electrical and Instrumentation Engineering, Thapar University, Patiala (Punjab), India Dr. A. K. Verma Professor, Department of Computer Science and Engineering, Thapar University, Patiala (Punjab), India Dr. Durgesh Mishra Chairman, IEEE Computer Society Chapter Bombay Section, Chairman IEEE MP Subsection, Professor & Dean (R&D), Acropolis Institute of Technology, Indore (M.P.), India Dr. Xiaoguang Yue Associate Professor, College of Computer and Information, Southwest Forestry University, Kunming (Yunnan), China Dr. Veronica Mc Gowan Associate Professor, Department of Computer and Business Information Systems,Delaware Valley College, Doylestown, PA, Allman China
Dr. Mohd. Ali Hussain Professor, Department of Computer Science and Engineering, Sri Sai Madhavi Institute of Science & Technology, Rajahmundry (A.P.), India Dr. Mohd. Nazri Ismail Professor, System and Networking Department, Jalan Sultan Ismail, Kaula Lumpur, MALAYSIA Dr. Sunil Mishra Associate Professor, Department of Communication Skills (English), Dronacharya College of Engineering, Farrukhnagar, Gurgaon (Haryana), India Dr. Labib Francis Gergis Rofaiel Associate Professor, Department of Digital Communications and Electronics, Misr Academy for Engineering and Technology, Mansoura City, Egypt Dr. Pavol Tanuska Associate Professor, Department of Applied Informetics, Automation, and Mathematics, Trnava, Slovakia Dr. VS Giridhar Akula Professor, Avanthi's Research & Technological Academy, Gunthapally, Hyderabad, Andhra Pradesh, India Dr. S. Satyanarayana Associate Professor, Department of Computer Science and Engineering, KL University, Guntur, Andhra Pradesh, India Dr. Bhupendra Kumar Sharma Associate Professor, Department of Mathematics, KL University, BITS, Pilani, India Dr. Praveen Agarwal Associate Professor & Head, Department of Mathematics, Anand International College of Engineering, Jaipur (Rajasthan), India Dr. Manoj Kumar Professor, Department of Mathematics, Rashtriya Kishan Post Graduate Degree, College, Shamli, Prabudh Nagar, (U.P.), India Dr. Shaikh Abdul Hannan Associate Professor, Department of Computer Science, Vivekanand Arts Sardar Dalipsing Arts and Science College, Aurangabad (Maharashtra), India Dr. K.M. Pandey Professor, Department of Mechanical Engineering,National Institute of Technology, Silchar, India Prof. Pranav Parashar Technical Advisor, International Journal of Soft Computing and Engineering (IJSCE), Bhopal (M.P.), India Dr. Biswajit Chakraborty MECON Limited, Research and Development Division (A Govt. of India Enterprise), Ranchi-834002, Jharkhand, India Dr. D.V. Ashoka Professor & Head, Department of Information Science & Engineering, SJB Institute of Technology, Kengeri, Bangalore, India Dr. Sasidhar Babu Suvanam Professor & Academic Cordinator, Department of Computer Science & Engineering, Sree Narayana Gurukulam College of Engineering, Kadayiuruppu, Kolenchery, Kerala, India Dr. C. Venkatesh Professor & Dean, Faculty of Engineering, EBET Group of Institutions, Kangayam, Erode, Caimbatore (Tamil Nadu), India Dr. Nilay Khare Assoc. Professor & Head, Department of Computer Science, MANIT, Bhopal (M.P.), India Dr. Sandra De Iaco Professor, Dip.to Di Scienze Dell’Economia-Sez. Matematico-Statistica, Italy Dr. Yaduvir Singh Associate Professor, Department of Computer Science & Engineering, Ideal Institute of Technology, Govindpuram Ghaziabad, Lucknow (U.P.), India Dr. Angela Amphawan Head of Optical Technology, School of Computing, School Of Computing, Universiti Utara Malaysia, 06010 Sintok, Kedah, Malaysia
Dr. Ashwini Kumar Arya Associate Professor, Department of Electronics & Communication Engineering, Faculty of Engineering and Technology,Graphic Era University, Dehradun (U.K.), India Dr. Yash Pal Singh Professor, Department of Electronics & Communication Engg, Director, KLS Institute Of Engg.& Technology, Director, KLSIET, Chandok, Bijnor, (U.P.), India Dr. Ashish Jain Associate Professor, Department of Computer Science & Engineering, Accurate Institute of Management & Technology, Gr. Noida (U.P.), India Dr. Abhay Saxena Associate Professor&Head, Department. of Computer Science, Dev Sanskriti University, Haridwar, Uttrakhand, India Dr. Judy. M.V Associate Professor, Head of the Department CS &IT, Amrita School of Arts and Sciences, Amrita Vishwa Vidyapeetham, Brahmasthanam, Edapally, Cochin, Kerala, India Dr. Sangkyun Kim Professor, Department of Industrial Engineering, Kangwon National University, Hyoja 2 dong, Chunche0nsi, Gangwondo, Korea Dr. Sanjay M. Gulhane Professor, Department of Electronics & Telecommunication Engineering, Jawaharlal Darda Institute of Engineering & Technology, Yavatmal, Maharastra, India Dr. K.K. Thyagharajan Principal & Professor, Department of Informational Technology, RMK College of Engineering & Technology, RSM Nagar, Thiruyallur, Tamil Nadu, India Dr. P. Subashini Asso. Professor, Department of Computer Science, Coimbatore, India Dr. G. Srinivasrao Professor, Department of Mechanical Engineering, RVR & JC, College of Engineering, Chowdavaram, Guntur, India Dr. Rajesh Verma Professor, Department of Computer Science & Engg. and Deptt. of Information Technology, Kurukshetra Institute of Technology & Management, Bhor Sadian, Pehowa, Kurukshetra (Haryana), India Dr. Pawan Kumar Shukla Associate Professor, Satya College of Engineering & Technology, Haryana, India Dr. U C Srivastava Associate Professor, Department of Applied Physics, Amity Institute of Applied Sciences, Amity University, Noida, India Dr. Reena Dadhich Prof. & Head, Department of Computer Science and Informatics, MBS MArg, Near Kabir Circle, University of Kota, Rajasthan, India Dr. Aashis.S.Roy Department of Materials Engineering, Indian Institute of Science, Bangalore Karnataka, India Dr. Sudhir Nigam Professor Department of Civil Engineering, Principal, Lakshmi Narain College of Technology and Science, Raisen, Road, Bhopal, (M.P.), India Dr. S.Senthilkumar Doctorate, Department of Center for Advanced Image and Information Technology, Division of Computer Science and Engineering, Graduate School of Electronics and Information Engineering, Chon Buk National University Deok Jin-Dong, Jeonju, Chon Buk, 561756, South Korea Tamilnadu, India Dr. Gufran Ahmad Ansari Associate Professor, Department of Information Technology, College of Computer, Qassim University, Al-Qassim, Kingdom of Saudi Arabia (KSA) Dr. R.Navaneethakrishnan Associate Professor, Department of MCA, Bharathiyar College of Engg & Tech, Karaikal Puducherry, India
Dr. Hossein Rajabalipour Cheshmejgaz Industrial Modeling and Computing Department, Faculty of Computer Science and Information Systems, Universiti Teknologi Skudai, Malaysia Dr. Veronica McGowan Associate Professor, Department of Computer and Business Information Systems, Delaware Valley College, Doylestown, PA, Allman China Dr. Sanjay Sharma Associate Professor, Department of Mathematics, Bhilai Institute of Technology, Durg, Chhattisgarh, India Dr. Taghreed Hashim Al-Noor Professor, Department of Chemistry, Ibn-Al-Haitham Education for pure Science College, University of Baghdad, Iraq Dr. Madhumita Dash Professor, Department of Electronics & Telecommunication, Orissa Engineering College , Bhubaneswar,Odisha, India Dr. Anita Sagadevan Ethiraj Associate Professor, Department of Centre for Nanotechnology Research (CNR), School of Electronics Engineering (Sense), Vellore Institute of Technology (VIT) University, Tamilnadu, India Dr. Sibasis Acharya Project Consultant, Department of Metallurgy & Mineral Processing, Midas Tech International, 30 Mukin Street, Jindalee-4074, Queensland, Australia Dr. Neelam Ruhil Professor, Department of Electronics & Computer Engineering, Dronacharya College of Engineering, Gurgaon, Haryana, India Dr. Faizullah Mahar Professor, Department of Electrical Engineering, Balochistan University of Engineering and Technology, Pakistan Dr. K. Selvaraju Head, PG & Research, Department of Physics, Kandaswami Kandars College (Govt. Aided), Velur (PO), Namakkal DT. Tamil Nadu, India Dr. M. K. Bhanarkar Associate Professor, Department of Electronics, Shivaji University, Kolhapur, Maharashtra, India Dr. Sanjay Hari Sawant Professor, Department of Mechanical Engineering, Dr. J. J. Magdum College of Engineering, Jaysingpur, India Dr. Arindam Ghosal Professor, Department of Mechanical Engineering, Dronacharya Group of Institutions, B-27, Part-III, Knowledge Park,Greater Noida, India Dr. M. Chithirai Pon Selvan Associate Professor, Department of Mechanical Engineering, School of Engineering & Information Technology, Amity University, Dubai, UAE Dr. S. Sambhu Prasad Professor & Principal, Department of Mechanical Engineering, Pragati College of Engineering, Andhra Pradesh, India. Dr. Muhammad Attique Khan Shahid Professor of Physics & Chairman, Department of Physics, Advisor (SAAP) at Government Post Graduate College of Science, Faisalabad. Dr. Kuldeep Pareta Professor & Head, Department of Remote Sensing/GIS & NRM, B-30 Kailash Colony, New Delhi 110 048, India Dr. Th. Kiranbala Devi Associate Professor, Department of Civil Engineering, Manipur Institute of Technology, Takyelpat, Imphal, Manipur, India Dr. Nirmala Mungamuru Associate Professor, Department of Computing, School of Engineering, Adama Science and Technology University, Ethiopia Dr. Srilalitha Girija Kumari Sagi Associate Professor, Department of Management, Gandhi Institute of Technology and Management, India
Dr. Vishnu Narayan Mishra Associate Professor, Department of Mathematics, Sardar Vallabhbhai National Institute of Technology, Ichchhanath Mahadev Dumas Road, Surat (Gujarat), India Dr. Yash Pal Singh Director/Principal, Somany (P.G.) Institute of Technology & Management, Garhi Bolni Road , Rewari Haryana, India. Dr. Sripada Rama Sree Vice Principal, Associate Professor, Department of Computer Science and Engineering, Aditya Engineering College, Surampalem, Andhra Pradesh. India. Dr. Rustom Mamlook Associate Professor, Department of Electrical and Computer Engineering, Dhofar University, Salalah, Oman. Middle East. Dr. Ramzi Raphael Ibraheem Al Barwari Assistant Professor, Department of Mechanical Engineering, College of Engineering, Salahaddin University – Hawler (SUH) Erbil – Kurdistan, Erbil Iraq. Dr. Kapil Chandra Agarwal H.O.D. & Professor, Department of Applied Sciences & Humanities, Radha Govind Engineering College, U. P. Technical University, Jai Bheem Nagar, Meerut, (U.P). India. Dr. Anil Kumar Tripathy Associate Professor, Department of Environmental Science & Engineering, Ghanashyama Hemalata Institute of Technology and Management, Puri Odisha, India. Managing Editor Mr. Jitendra Kumar Sen International Journal of Engineering and Advanced Technology (IJEAT) Editorial Board Dr. Soni Changlani Professor, Department of Electronics & Communication, Lakshmi Narain College of Technology & Science, Bhopal (.M.P.), India Dr. M .M. Manyuchi Professor, Department Chemical and Process Systems Engineering, Lecturer-Harare Institute of Technology, Zimbabwe Dr. John Kaiser S. Calautit Professor, Department Civil Engineering, School of Civil Engineering, University of Leeds, LS2 9JT, Leeds, United Kingdom Dr. Audai Hussein Al-Abbas Deputy Head, Department AL-Musaib Technical College/ Foundation of Technical Education/Babylon, Iraq Dr. Şeref Doğuşcan Akbaş Professor, Department Civil Engineering, Şehit Muhtar Mah. Öğüt Sok. No:2/37 Beyoğlu Istanbul, Turkey Dr. H S Behera Associate Professor, Department Computer Science & Engineering, Veer Surendra Sai University of Technology (VSSUT) A Unitary Technical University Established by the Government of Odisha, India Dr. Rajeev Tiwari Associate Professor, Department Computer Science & Engineering, University of Petroleum & Energy Studies (UPES), Bidholi, Uttrakhand, India Dr. Piyush Kumar Shukla Assoc. Professor, Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal (M.P.), India Dr. Piyush Lotia Assoc.Professor, Department of Electronics and Instrumentation, Shankaracharya College of Engineering and Technology, Bhilai (C.G.), India Dr. Asha Rai Assoc. Professor, Department of Communication Skils, Technocrat Institute of Technology, Bhopal (M.P.), India Dr. Vahid Nourani Assoc. Professor, Department of Civil Engineering, University of Minnesota, USA
Dr. Hung-Wei Wu Assoc. Professor, Department of Computer and Communication, Kun Shan University, Taiwan Dr. Vuda Sreenivasarao Associate Professor, Department of Computr And Information Technology, Defence University College, Debrezeit Ethiopia, India Dr. Sanjay Bhargava Assoc. Professor, Department of Computer Science, Banasthali University, Jaipur, India Dr. Sanjoy Deb Assoc. Professor, Department of ECE, BIT Sathy, Sathyamangalam, Tamilnadu, India Dr. Papita Das (Saha) Assoc. Professor, Department of Biotechnology, National Institute of Technology, Duragpur, India Dr. Waail Mahmod Lafta Al-waely Assoc. Professor, Department of Mechatronics Engineering, Al-Mustafa University College – Plastain Street near AL-SAAKKRA square- Baghdad - Iraq Dr. P. P. Satya Paul Kumar Assoc. Professor, Department of Physical Education & Sports Sciences, University College of Physical Education & Sports Sciences, Guntur Dr. Sohrab Mirsaeidi Associate Professor, Department of Electrical Engineering, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia Dr. Ehsan Noroozinejad Farsangi Associate Professor, Department of Civil Engineering, International Institute of Earthquake Engineering and Seismology (IIEES) Farmanieh, Tehran - Iran Dr. Omed Ghareb Abdullah Associate Professor, Department of Physics, School of Science, University of Sulaimani, Iraq Dr. Khaled Eskaf Associate Professor, Department of Computer Engineering, College of Computing and Information Technology, Alexandria, Egypt Dr. Nitin W. Ingole Associate Professor & Head, Department of Civil Engineering, Prof Ram Meghe Institute of Technology and Research, Badnera Amravati Dr. P. K. Gupta Associate Professor, Department of Computer Science and Engineering, Jaypee University of Information Technology, P.O. Dumehar Bani, Solan, India Dr. P.Ganesh Kumar Associate Professor, Department of Electronics & Communication, Sri Krishna College of Engineering and Technology, Linyi Top Network Co Ltd Linyi , Shandong Provience, China Dr. Santhosh K V Associate Professor, Department of Instrumentation and Control Engineering, Manipal Institute of Technology, Manipal, Karnataka, India Dr. Subhendu Kumar Pani Assoc. Professor, Department of Computer Science and Engineering, Orissa Engineering College, India Dr. Syed Asif Ali Professor/ Chairman, Department of Computer Science, SMI University, Karachi, Pakistan Dr. Vilas Warudkar Assoc. Professor, Department of Mechanical Engineering, Maulana Azad National Institute of Technology, Bhopal, India Dr. S. Chandra Mohan Reddy Associate Professor & Head, Department of Electronics & Communication Engineering, JNTUA College of Engineering (Autonomous), Cuddapah, Andhra Pradesh, India Dr. V. Chittaranjan Das Associate Professor, Department of Mechanical Engineering, R.V.R. & J.C. College of Engineering, Guntur, Andhra Pradesh, India
Dr. Jamal Fathi Abu Hasna Associate Professor, Department of Electrical & Electronics and Computer Engineering, Near East University, TRNC, Turkey Dr. S. Deivanayaki Associate Professor, Department of Physics, Sri Ramakrishna Engineering College, Tamil Nadu, India Dr. Nirvesh S. Mehta Professor, Department of Mechanical Engineering, Sardar Vallabhbhai National Institute of Technology, Surat, South Gujarat, India Dr. A.Vijaya Bhasakar Reddy Associate Professor, Research Scientist, Department of Chemistry, Sri Venkateswara University, Andhra Pradesh, India Dr. C. Jaya Subba Reddy Associate Professor, Department of Mathematics, Sri Venkateswara University Tirupathi Andhra Pradesh, India Dr. TOFAN Cezarina Adina Associate Professor, Department of Sciences Engineering, Spiru Haret University, Arges, Romania Dr. Balbir Singh Associate Professor, Department of Health Studies, Human Development Area, Administrative Staff College of India, Bella Vista, Andhra Pradesh, India Dr. D. RAJU Associate Professor, Department of Mathematics, Vidya Jyothi Institute of Technology (VJIT), Aziz Nagar Gate, Hyderabad, India Dr. Salim Y. Amdani Associate Professor & Head, Department of Computer Science Engineering, B. N. College of Engineering, PUSAD, (M.S.), India Dr. K. Kiran Kumar Associate Professor, Department of Information Technology, Bapatla Engineering College, Andhra Pradesh, India Dr. Md. Abdullah Al Humayun Associate Professor, Department of Electrical Systems Engineering, University Malaysia Perlis, Malaysia Dr. Vellore Vasu Teaching Assistant, Department of Mathematics, S.V.University Tirupati, Andhra Pradesh, India Dr. Naveen K. Mehta Associate Professor & Head, Department of Communication Skills, Mahakal Institute of Technology, Ujjain, India Dr. Gujar Anant kumar Jotiram Associate Professor, Department of Mechanical Engineering, Ashokrao Mane Group of Institutions, Vathar, Maharashtra, India Dr. Pratibhamoy Das Scientist, Department of Mathematics, IMU Berlin Einstein Foundation Fellow Technical University of Berlin, Germany Dr. Messaouda AZZOUZI Associate Professor, Department of Sciences & Technology, University of Djelfa, Algeria Dr. Vandana Swarnkar Associate Professor, Department of Chemistry, Jiwaji University Gwalior, India Dr. Arvind K. Sharma Associate Professor, Department of Computer Science Engineering, University of Kota, Kabir Circle, Rajasthan, India Dr. R. Balu Associate Professor, Department of Computr Applications, Bharathiar University, Tamilnadu, India Dr. S. Suriyanarayanan Associate Professor, Department of Water and Health, Jagadguru Sri Shivarathreeswara University, Karnataka, India Dr. Dinesh Kumar Associate Professor, Department of Mathematics, Pratap University, Jaipur, Rajasthan, India Dr. Sandeep N Associate Professor, Department of Mathematics, Vellore Institute of Technology, Tamil Nadu, India Dr. Dharmpal Singh Associate Professor, Department of Computer Science Engineering, JIS College of Engineering, West Bengal, India
Dr. Farshad Zahedi Associate Professor, Department of Mechanical Engineering, University of Texas at Arlington, Tehran, Iran Dr. Atishey Mittal Associate Professor, Department of Mechanical Engineering, SRM University NCR Campus Meerut Delhi Road Modinagar, Aligarh, India Dr. Hussein Togun Associate Professor, Department of Mechanical Engineering, University of Thiqar, Iraq Dr. Shrikaant Kulkarni Associate Professor, Department of Senior faculty V.I.T., Pune (M.S.), India Dr. Mukesh Negi Project Manager, Department of Computer Science & IT, Mukesh Negi, Project Manager, Noida, India Dr. Sachin Madhavrao Kanawade Associate Professor, Department Chemical Engineering, Pravara Rural Education Society’s,Sir Visvesvaraya Institute of Technology, Nashik, India Dr. Ganesh S Sable Professor, Department of Electronics and Telecommunication, Maharashtra Institute of Technology Satara Parisar, Aurangabad, Maharashtra, India Dr. T.V. Rajini Kanth Professor, Department of Computer Science Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India Dr. Anuj Kumar Gupta Associate Professor, Department of Computer Science & Engineering, RIMT Institute of Engineering & Technology, NH-1, Mandi Godindgarh, Punjab, India Dr. Hasan Ashrafi- Rizi Associate Professor, Medical Library and Information Science Department of Health Information Technology Research Center, Isfahan University of Medical Sciences, Isfahan, Iran Dr. Golam Kibria Associate Professor, Department of Mechanical Engineering, Aliah University, Kolkata, India Dr. Mohammad Jannati Professor, Department of Energy Conversion, UTM-PROTON Future Drive Laboratory, Faculty of Electrical Enginering, Universit Teknologi Malaysia, Dr. Mohammed Saber Mohammed Gad Professor, Department of Mechanical Engineering, National Research Centre- El Behoos Street, El Dokki, Giza, Cairo, Egypt, Dr. V. Balaji Professor, Department of EEE, Sapthagiri College of Engineering Periyanahalli,(P.O) Palacode (Taluk) Dharmapuri, Dr. Naveen Beri Associate Professor, Department of Mechanical Engineering, Beant College of Engg. & Tech., Gurdaspur - 143 521, Punjab, India Dr. Abdel-Baset H. Mekky Associate Professor, Department of Physics, Buraydah Colleges Al Qassim / Saudi Arabia Dr. T. Abdul Razak Associate Professor, Department of Computer Science Jamal Mohamed College (Autonomous), Tiruchirappalli – 620 020 India Dr. Preeti Singh Bahadur Associate Professor, Department of Applied Physics Amity University, Greater Noida (U.P.) India Dr. Ramadan Elaiess Associate Professor, Department of Information Studies, Faculty of Arts University of Benghazi, Libya Dr. R . Emmaniel Professor & Head, Department of Business Administration ST, ANN, College of Engineering & Technology Vetapaliem. Po, Chirala, Prakasam. DT, AP. India
Dr. C. Phani Ramesh Director cum Associate Professor, Department of Computer Science Engineering, PRIST University, Manamai, Chennai Campus, India Dr. Rachna Goswami Associate Professor, Department of Faculty in Bio-Science, Rajiv Gandhi University of Knowledge Technologies (RGUKT) DistrictKrishna, Andhra Pradesh, India Dr. Sudhakar Singh Assoc. Prof. & Head, Department of Physics and Computer Science, Sardar Patel College of Technology, Balaghat (M.P.), India Dr. Xiaolin Qin Associate Professor & Assistant Director of Laboratory for Automated Reasoning and Programming, Chengdu Institute of Computer Applications, Chinese Academy of Sciences, China Dr. Maddila Lakshmi Chaitanya Assoc. Prof. Department of Mechanical, Pragati Engineering College 1-378, ADB Road, Surampalem, Near Peddapuram, East Godavari District, A.P., India Dr. Jyoti Anand Assistant Professor, Department of Mathematics, Dronacharya College of Engineering, Gurgaon, Haryana, India Dr. Nasser Fegh-hi Farahmand Assoc. Professor, Department of Industrial Management, College of Management, Economy and Accounting, Tabriz Branch, Islamic Azad University, Tabriz, Iran Dr. Ravindra Jilte Assist. Prof. & Head, Department of Mechanical Engineering, VCET Vasai, University of Mumbai , Thane, Maharshtra 401202, India Dr. Sarita Gajbhiye Meshram Research Scholar, Department of Water Resources Development & Management Indian Institute of Technology, Roorkee, India Dr. G. Komarasamy Associate Professor, Senior Grade, Department of Computer Science & Engineering, Bannari Amman Institute of Technology, Sathyamangalam,Tamil Nadu, India Dr. P. Raman Professor, Department of Management Studies, Panimalar Engineering College Chennai, India Dr. M. Anto Bennet Professor, Department of Electronics & Communication Engineering, Veltech Engineering College, Chennai, India Dr. P. Keerthika Associate Professor, Department of Computer Science & Engineering, Kongu Engineering College Perundurai, Tamilnadu, India Dr. Santosh Kumar Behera Associate Professor, Department of Education, Sidho-Kanho-Birsha University, Ranchi Road, P.O. Sainik School, Dist-Purulia, West Bengal, India Dr. P. Suresh Associate Professor, Department of Information Technology, Kongu Engineering College Perundurai, Tamilnadu, India Dr. Santosh Shivajirao Lomte Associate Professor, Department of Computer Science and Information Technology, Radhai Mahavidyalaya, N-2 J sector, opp. Aurangabad Gymkhana, Jalna Road Aurangabad, India Dr. Altaf Ali Siyal Professor, Department of Land and Water Management, Sindh Agriculture University Tandojam, Pakistan Dr. Mohammad Valipour Associate Professor, Sari Agricultural Sciences and Natural Resources University, Sari, Iran Dr. Prakash H. Patil Professor and Head, Department of Electronics and Tele Communication, Indira College of Engineering and Management Pune, India Dr. Smolarek Małgorzata Associate Professor, Department of Institute of Management and Economics, High School of Humanitas in Sosnowiec, Wyższa Szkoła Humanitas Instytut Zarządzania i Ekonomii ul. Kilińskiego Sosnowiec Poland, India
Dr. Umakant Vyankatesh Kongre Associate Professor, Department of Mechanical Engineering, Jawaharlal Darda Institute of Engineering and Technology, Yavatmal, Maharashtra, India Dr. Niranjana S Associate Professor, Department of Biomedical Engineering, Manipal Institute of Technology (MIT) Manipal University, Manipal, Karnataka, India Dr. Naseema Khatoon Associate Professor, Department of Chemistry, Integral University Lucknow (U.P), India Dr. P. Samuel Associate Professor, Department of English, KSR College of Engineering Tiruchengode – 637 215 Namakkal Dt. Tamilnadu, India Dr. Mohammad Sajid Associate Professor, Department of Mathematics, College of Engineering Qassim University Buraidah 51452, Al-Qassim Saudi Arabia Dr. Sanjay Pachauri Associate Professor, Department of Computer Science & Engineering, IMS Unison University Makkawala Greens Dehradun-248009 (UK) Dr. S. Kishore Reddy Professor, Department of School of Electrical & Computer Engineering, Adama Science & Technology University, Adama Dr. Muthukumar Subramanyam Professor, Department of Computer Science & Engineering, National Institute of Technology, Puducherry, India Dr. Latika Kharb Associate Professor, Faculty of Information Technology, Jagan Institute of Management Studies (JIMS), Rohini, Delhi, India Dr. Kusum Yadav Associate Professor, Department of Information Systems, College of Computer Engineering & Science Salman bin Abdulaziz University, Saudi Arabia Dr. Preeti Gera Assoc. Professor, Department of Computer Science & Engineering, Savera Group of Institutions, Farrukh Nagar, Gurgaon, India Dr. Ajeet Kumar Associate Professor, Department of Chemistry and Biomolecular Science, Clarkson University 8 Clarkson Avenue, New York Dr. M. Jinnah S Mohamed Associate Professor, Department of Mechanical Engineering, National College of Engineering, Maruthakulam.Tirunelveli, Tamil Nadu, India Dr. Mostafa Eslami Assistant Professor, Department of Mathematics, University of Mazandaran Babolsar, Iran Dr. Akram Mohammad Hassan Elentably Professor, Department of Economics of Maritime Transport, Faculty of Maritime Studies, Ports & Maritime Transport, King AbdulAziz University Dr. Ebrahim Nohani Associate Professor, Department of Hydraulic Structures, Dezful Branch, Islamic Azad University, Dezful, Iran Dr. Aarti Tolia Faculty, Prahaldbhai Dalmia Lions College of Commerce & Economics, Mumbai, India Dr. Ramachandra C G Professor & Head, Department of Marine Engineering, Srinivas Institute of Technology, Valachil, Mangalore-574143, India Dr. G. Anandharaj Associate Professor, Department of M.C.A, Ganadipathy Tulsi's Jain Engineering College, Chittoor- Cuddalore Road, Kaniyambadi, Vellore, Tamil Nadu, India
Volume-2 Issue-3, February 2013, ISSN: 2249-8958 (Online)
S. No
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Authors:
Amel Dhahri, Ahmed Omri
Paper Title:
A Review of solar Chimney Power Generation Technology
Page No.
Abstract: The present paper presents an overview of the main characteristics of a novel kind of solar thermal application called solar chimney power plant. It is a technology of electric power generation using solar energy by employing basic physics that when air is heated it rises. The created updraft can be used to turn a turbine placed at an appropriate position within a tall chimney to generate electricity. The paper discusses the principles and characteristics of such a system, its requirements, its construction and its operation. It also focuses on actual research and development of solar chimney projects. Keywords: projects, power generation, solar chimney, solar energy. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
1.
14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35. 36. 37. 38. 39. 40. 41. 42.
R. K. Rajput, Power System Engineering. Firewall Media, 2006,pp.198. Y.Chen, Y.Yang, Y.Wei, Y.Jing-Hui, and Y.Tian, “ 沙漠太阳能热风发电技术及其应用,” Energy Research and Information, vol. 26, no2, p. 117‑121, 2010. S. Terol, “The present state of research at the solar chimney power plant in Manzanares (Spain) and future prospects for large scale plants,” in Proc. International Congress on Renewable Energy Sources, vol.1,p.1644,1987. W. Haaf, K. Friedrich, G. Mayr, and J. Schlaich, “Solar Chimneys Part I: Principle and Construction of the Pilot Plant in Manzanares,” International Journal of Solar Energy, vol. 2, pp. 3-20, 1983. W .Haaf, “Solar Chimneys - Part II: Preliminary Test Results from the Manzanares Pilot Plant,” International Journal of Solar Energy 2 (2), pp.141– 161, 1984. N. Pasumarthi et S. A. Sherif, “ Experimental and theoretical performance of a demonstration solar chimney model—Part I: mathematical model development ”, International Journal of Energy Research, vol. 22, no. 3, pp. 277-288, 1998. N. Pasumarthi et S. A. Sherif, “ Experimental and theoretical performance of a demonstration solar chimney model—Part II: experimental and theoretical results and economic analysis ”, International Journal of Energy Research, vol. 22, no. 5, p. 443-461, 1998. R. Wengenmayr and T. Bührke, Renewable Energy. John Wiley & Sons, 2011. C. Ngo and J. Natowitz, Our Energy Future: Resources, Alternatives and the Environment. John Wiley & Sons, pp.184-186, 2009. C. M. Meyer “Towers of power-the solar updraft tower,” Docstoc.com. [online].Available:http://www.docstoc.com/docs/73010840/Towers-ofpower---the-solar-updraft-tower. [Accessed: 25-nov-2012]. T. Hamilton, Mad Like Tesla: Underdog Inventors and Their Relentless Pursuit of Clean Energy. ECW Press, pp.93-103, 2011. W. Ley, Engineers’ dreams.Viking Press, 1954. T. W. Von Backström, R. Harte, R. Höffer, W. B. Krätzig, D. G. Kröger, H.-J. Niemann, and G. P. a. G. Van Zijl, “State and Recent Advances in Research and Design of Solar Chimney Power Plant Technology,” VGB powertech, vol. 88, no 7, 2008, pp.64-71. I. S. F. Jones, Engineering Strategies for Greenhouse Gas Mitigation. Cambridge University Press, 2011. A. Demirbas, Biofuels: Securing the Planet’s Future Energy Needs. Springer, pp.27-28, 2008. J. Schlaich, Solar Chimney: Electricity from the Sun. Stuttgart; Edition Axel Menges, p.16,1995. F. Cao, L. Zhao, H. Li, and L. Guo, “ Performance analysis of conventional and sloped solar chimney power plants in China ,” Applied Thermal Engineering, vol. 50, no 1, pp. 582-592, 2013. Pasumarthi, N. and S.A. Sherif, “Performance of a demonstration solar chimney model for power generation,” in Proc. the 35th Heat Transfer and Fluid Mechanics, June 1997, Sacramento, USA., pp.203-240. T. P. Fluri, Turbine Layout for and Optimization of Solar Chimney Power Conversion Units. University of Stellenbosch, 2008. A. J. Gannon, Solar chimney turbine performance, Thesis, Stellenbosch: University of Stellenbosch, 2002. I.F.Lombaard and D.G.Kröger, “Solar collector performance,” R AND D Journal , vol 18,n°3, 2002. M. O. Hamdan, “Analysis of a solar chimney power plant in the Arabian Gulf region ”, Renewable Energy, vol. 36, no 10, pp. 2593-2598, 2011. A. O. Babaleye, “Design and Thermodynamic Analysis of Solar Updraft Tower,” 2011. Available: publications.theseus.fi/.../ Babaleye_Ahmed.pdf? J. P. Pretorius and D. G. Kröger, “Critical evaluation of solar chimney power plant performance”, Solar Energy, vol. 80, no 5, pp. 535-544, 2006. N. Ninic, “Available energy of the air in solar chimneys and the possibility of its ground-level concentration,” Solar Energy, vol. 80, no 7, pp. 804811, 2006. A. Koonsrisuk, “Mathematical modeling of sloped solar chimney power plants ,” Energy, vol. 47, no 1, pp. 582-589, 2012. A.J.Gannon and T.W.Von Backström, “Solar chimney cycle analysis with system loss and solar collector performance,” Journal of Solar Energy Engineering, 122, pp.133–7, 2000. X. Zhou, F. Wang, J. Fan, and R. M. Ochieng, “ Performance of solar chimney power plant in Qinghai-Tibet Plateau ,” Renewable and Sustainable Energy Reviews, vol. 14, no 8, p. 2249-2255, 2010. M. A. dos S. Bernardes, A. Voß, and G. Weinrebe, “Thermal and technical analyses of solar chimneys,” Solar Energy, vol. 75, no 6, p. 511-524, 2003. Bonnelle D. Solar chimney, water spraying energy tower, and linked renew-able energy conversion devices: presentation, criticism and proposals. Doctoral thesis. Lyon 1, France: University Claude Bernard; July 2004. Registration Number: 129-2004. S. Bernardes and M. A. Dos, “ Technische, ökonomische und ökologische Analyse von Aufwindkraftwerken,” mai 2004. J. Schlaich, “Tension structures for solar electricity generation,” Engineering Structures, vol. 21 , pp. 658-668,1999. M. Kaltschmitt, W. Streicher, and A. Wiese, Renewable energy: technology, economics, and environment, Springer, 2007. X. Zhou, F. Wang, and R.M. Ochieng, “A review of solar chimney power technology,” Renewable and Sustainable Energy Reviews, vol. 14, pp. 2315-2338, 2010. Z. R. Yabuz and K. Delikanlı, Güneş bacasında konstrüktif iyileştirme çalışmaları ve performans artırıcı yöntemlerin araştırılması. SDÜ Fen Bilimleri Enstitüsü, 2009. G.Schwarz and H.Knauss,“Strömungstechnische Auslegung des Aufwindkraftwerks Manzanares” (Aerodynamic design of the SCPP in Manzanares). Tech.Rep.,Institut Fur Aerodynamik, Universität Sturrgart on German ),1981. J.Schlaich, .Schiel,K.Friedrich,G.Schwarz,P.Wehowsky,W.Meinecke and M.Kiera, “the solar chimney: Transferability of results from the Manzanares solar chimney plant to large scale plants,” Tech.Rep., Schlaich Bergermann und Partner CEs,Stuttgart 1995. F. Denantes and E. Bilgen, “Counter-rotating turbines for solar chimney power plants,” Renewable Energy, vol. 31, no 12, p. 1873-1891, 2006. J. P. Pretorius, “Solar Tower Power Plant Performance,” Thesis, Stellenbosch: University of Stellenbosch, 2004. A. J. Gannon and T. W. von Backström, “ Solar Chimney Turbine Performance ,” Journal of Solar Energy Engineering, vol. 125, no 1, p. 101, 2003. T. W. von Backström and A. J. Gannon, “ Solar chimney turbine characteristics ,” Solar Energy, vol. 76, pp. 235-241, 2004. T. W. von Backström and T. P. Fluri, “ Maximum fluid power condition in solar chimney power plants – An analytical approach,” Solar Energy, vol. 80, n° 11, pp. 1417-1423, 2006.[43] M. Thirugnanasambandam, S. Iniyan, and R. Goic, “A review of solar thermal technologies,” Renewable and Sustainable Energy Reviews, vol. 14, no 1, pp. 312-322, 2010.
1-17
43. S. Nizetic and B. Klarin, “A simplified analytical approach for evaluation of the optimal ratio of pressure drop across the turbine in solar chimney power plants,” Applied Energy, vol.87, no 2, pp.587 591, 2010. 44. M. Tingzhen, L. Wei, X. Guoling, X. Yanbin, G. Xuhu, and P. Yuan, “ Numerical simulation of the solar chimney power plant systems coupled with turbine ,” Renewable Energy, vol. 33, no. 5, pp. 897-905, 2008. 45. A. Koonsrisuk and T. Chitsomboon, “ Theoretical turbine power yield in solar chimney power plants ,” in proc. 3rd International Conference on Thermal Issues in Emerging Technologies Theory and Applications (ThETA), 2010, pp. 339 346. 46. T.Z.Ming, W.Liu, G.L.Xu, Y.B.Xiong, X.H.Guan, and Y.Pan, “Numerical simulation of the solar chimney power plant systems coupled with turbine,” Renewable Energy, 33, pp.897–905, 2008. 47. H. Pastohr, O. Kornadt, and K. Gürlebeck, “Numerical and analytical calculations of the temperature and flow field in the upwind power plant,”International Journal of Energy Research, vol. 28, no 6, pp. 495–510, 2004. 48. G. Xu, T. Ming, Y. Pan, F. Meng, and C. Zhou, “ Numerical analysis on the performance of solar chimney power plant system,” Energy Conversion and Management, vol. 52, no. 2, pp. 876-883, 2011. 49. T.Z.Ming, R.K.de Richter, F.L.Meng, Y.Pan, and W.Liu, “Chimney shape numerical study for solar chimney power generating systems,” International Journal of Energy Research; 2011. Available online:/http://onlinelibrary.wiley.com/doi/10.1002/er.1910/fullS. 50. T. Ming, X. Wang, R. K. de Richter, W. Liu, T. Wu, and Y. Pan, “ Numerical analysis on the influence of ambient crosswind on the performance of solar updraft power plant system, ” Renewable and Sustainable Energy Reviews, vol. 16, no 8, pp. 5567 5583, 2012. 51. A. Al-Dabbas,“A performance analysis of solar chimney thermal power systems , ” Thermal Science, vol. 15, no 3, pp. 619 642, 2011. 52. T.P.Fluri and T.W.von Backström, “Performance analysis of the power conversion unit of a solar chimney power plant,” Solar Energy, 82, pp.999– 1008, 2008. 53. The Solar Chimney. The energy storage. Retrieved 1 December 2001 from;http://wire0.ises.org/wire/Publications/Research.nsf/defaultview/0DED34BF3EB9A985C12569840055F09E/$File/SolarChimney_short_versi on.pdf 54. J. Schlaich, R. Bergermann, W. Schiel, and G. Weinrebe, “Design of Commercial Solar Updraft Tower Systems—Utilization of Solar Induced Convective Flows for Power Generation,” Journal of Solar Energy Engineering, vol. 127, no 1, p. 117, 2005. 55. R. A. Hedderwick,“ Performance evaluation of a solar chimney power plant ,” Thesis, Stellenbosch : University of Stellenbosch, 2000. 56. D. S. H. Hammadi, “ Solar Updraft Tower Power Plant with Thermal Storage ,” Basrah Journal for Engineering Research, 2008. 57. M. Tingzhen, L. Wei, and P. Yuan, “ Numerical Analysis of the Solar Chimney Power Plant with Energy Storage Layer ,” in Proc. of ISES World Congress 2007 (Vol. I – Vol. V), Springer Berlin Heidelberg, 2009, pp. 1800-1805. 58. T. C. Miqdam and A. K. Hussein, “Basement kind effects on air temperature of a solar chimney in Baghdad-Iraq weather,” International Journal of Applied Sciences, vol.2, n° 2, pp.12-20, 2011. 59. Y. Zheng, T. Z. Ming, Z. Zhou, X. F. Yu, H. Y. Wang, Y. Pan, and W. Liu, “ Unsteady numerical simulation of solar chimney power plant system with energy storage layer ,” Journal of the Energy Institute, vol. 83, no 2, p. 86-92, 2010. 60. 明廷臻, 刘伟, and 黄晓明, “ 太阳能热气流发电系统非稳态耦合数值分析 ,” Journal of Engineering Thermophysics, vol. 30, n° 2, p. 4, 2009. 61. M. Fanlong, M. Tingzhen, and P. Yuan, “ A Method of Decreasing Power Output Fluctuation of Solar Chimney Power Generating Systems ,” in proc.Third International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), 2011, vol. 1, p. 114-118. 62. Y. Zhou, X. H. Liu, and Q. L. Li, “ Unsteady Conjugate Numerical Simulation of the Solar Chimney Power Plant System with Vertical Heat Collector ,” Materials Science Forum, vol. 704-705, pp. 535-540, 2011. 63. G. Xu, T. Ming, Y. Pan, F. Meng, and C. Zhou, “ Numerical analysis on the performance of solar chimney power plant system ,” Energy Conversion and Management, vol. 52, no 2, pp. 876-883, 2011. 64. B. Abdulcelil, “An experimental investigation of the effect of periphery and ground temperature changes on the solar chimney system,” Journal of Thermal Science and Technology, vol. 32, n°1, pp.51-58, 2012. 65. http://www.sbp.de/en/sun/technology/101-Solar_Updraft_Tower 66. J.Schlaich, “Renewable energy structures,” Structural Engineering International, pp.76-81, vol.4, n°2, 1994. 67. D. Mills, “Advances in solar thermal electricity technology”, Solar Energy, vol. 76, p. 19-31, 2004. 68. A. Holgate, the Art of Structural Engineering: The Work of J鑟rg Schlaich and His Team. Edition Axel Menges, 1997. 69. S. Quraeshi, “Solar/wind power plants,” Solar& Wind Technology, no 1, pp. 51-54. 70. J. Hoffman and M. J. Hoffman, Green: Your Place in the New Energy Revolution. Palgrave Macmillan, 2008. 71. E. Maynard, Transforming The Global Biosphere.Watchmaker Publishing, 2000. 72. A. Chambers, Renewable Energy in Nontechnical Language. PennWell Books, 2004. 73. A. B. Maia, A. G. Ferreira, R. M. Valle, and M. F. B. Cortez, “ Theoretical evaluation of the influence of geometric parameters and materials on the behavior of the airflow in a solar chimney ,” Computers & Fluids, vol. 38, no 3, pp. 625-636, 2009. 74. http://www.solar-tower.org.uk/ 75. X. Zhou, J. Yang, B. Xiao, and G. Hou, “ Experimental study of temperature field in a solar chimney power setup ,” Applied Thermal Engineering, vol. 27, no 11-12, pp. 2044-2050, 2007. 76. X. Zhou, J. Yang, B. Xiao, and G. Hou, “Simulation of a pilot solar chimney thermal power generating equipment,” Renewable Energy, vol. 32, no 10, pp. 1637-1644, 2007. 77. İ. Üçgül et A. Koyun, “ Güneş bacasi tasarim parametrelerï ve performansinin deneysel olarak ïncelenmesï ”, Pamukkale University Journal of Engineering Sciences, vol. 16, no 3, 2011. 78. C. Ketlogetswe, J. K. Fiszdon, and O. O. Seabe, “Solar chimney power generation project—The case for Botswana,” Renewable and Sustainable Energy Reviews, vol. 12, no 7, pp. 2005-2012, 2008. 79. Z. R. Yabuz and K. Delikanlı, Güneş bacasında konstrüktif iyileştirme çalışmaları ve performans artırıcı yöntemlerin araştırılması. SDÜ Fen Bilimleri Enstitüsü, 2009. 80. T. A. Sabah and T. C. Miqdam, “A study of free Convection in a solar chimney model,” Eng.& Tech. Journal ,Vol. 29, N°. 14, 2011. 81. C. B. Maia, A. G. Ferreira, R. M. Valle, and M. F. B. Cortez, “Theoretical evaluation of the influence of geometric parameters and materials on the behavior of the airflow in a solar chimney,” Computers & Fluids, vol. 38, no 3, pp. 625-636, 2009. 82. T. Cebeci, J. P. Shao, F. Kafyeke, and E. Laurendeau, Computational Fluid Dynamics for Engineers: From Panel to Navier-Stokes Methods with Computer Programs. Springer, 2005. 83. O. H. Mohammad and R. Obada, “experimental solar chimney data with analytical model prediction,” World Renewable Energy Forum Denver, CO May 13-17, 2012. 84. M. Najmi, A. Nazari, H. Mansouri, and G. Zahedi, “ Feasibility study on optimization of a typical solar chimney power plant ,” Heat Mass Transfer, vol. 48, no 3, pp. 475-485, 2012. 85. A. Al-Dabbas, “ A performance analysis of solar chimney thermal power systems ,” Thermal Science, vol. 15, no 3, pp. 619-642, 2011. 86. B. Kasaeian, E. Heidari, and S. N. Vatan, “ Experimental investigation of climatic effects on the efficiency of a solar chimney pilot power plant ,” Renewable and Sustainable Energy Reviews, vol. 15, no 9, pp. 5202-5206, 2011. 87. Z.Ibrahim, etude et réalisation expérimentale du fonctionnement d’une tour solaire, Master thesis, Gafsa University-Tunisia, 2009. 88. Atit Koonsrisuk, “Analysis of flow in solar chimney for an optimal design purpose,” Thesis, Suranaree University of Technology, 2009. 89. M. Santamouris, Advances in Building Energy Research. Earthscan, 2012. 90. M. A. dos Santos Bernardes, R. Molina Valle, and M. F.-B.Cortez, “Numerical analysis of natural laminar convection in a radial solar heater,” International Journal of Thermal Sciences, vol. 38, no. 1, pp. 42-50, 1999. 91. H. Huang, H. Zhang, Y. Huang, and F. Lu, “ Simulation Calculation on Solar Chimney Power Plant System ,” in Challenges of Power Engineering and Environment, Springer Berlin Heidelberg, 2007, pp. 1158-1161. 92. T. Z. Ming, Y. Zheng, C. Liu, W. Liu and Y. Pan, “ Simple analysis on thermal performance of solar chimney power generation systems,” Journal of the Energy Institute, vol. 83, no. 1, pp. 6-11, 2010. 93. T. Chergui, S. Larbi, and A. Bouhdjar, “ Thermo-hydrodynamic aspect analysis of flows in solar chimney power plants—A case study ,” Renewable and Sustainable Energy Reviews, vol. 14, no. 5, p. 1410-1418, 2010.
94. R. Sangi, M. Amidpour, and B. Hosseinizadeh, “Modeling and numerical simulation of solar chimney power plants,” Solar Energy, vol. 85, no. 5, pp. 829-838, 2011. 95. F. J. Hurtado, A. S. Kaiser, and B. Zamora, “ Evaluation of the influence of soil thermal inertia on the performance of a solar chimney power plant ,” Energy, vol. 47, no 1, pp. 213-224, 2012. 96. J. Li, P. Guo, and Y. Wang, “ Effects of collector radius and chimney height on power output of a solar chimney power plant with turbines ,” Renewable Energy, vol. 47, no 0, p. 21-28, 2012. 97. L. Zuo, Y. Zheng, Z. Li, and Y. Sha, “ Solar chimneys integrated with sea water desalination ,” Desalination, vol. 276 , p. 207-213, 2011. 98. F. Cao, L. Zhao, and L. Guo, “Simulation of a sloped solar chimney power plant in Lanzhou, Energy Conversion and Management, vol. 52, no 6, pp. 2360-2366, 2011. 99. S. V. Panse, A. S. Jadhav, A. S. Gudekar, and J. B. Joshi, “ Inclined solar chimney for power production ,” Energy Conversion and Management, vol. 52, no 10, pp. 3096-3102, 2011. 100. X. Zhou et J. Yang, “ A Novel Solar Thermal Power Plant with Floating Chimney Stiffened onto a Mountainside and Potential of the Power Generation in China’s Deserts ,” Heat Transfer Engineering, vol. 30, no 5, pp. 400-407, 2009. 101. E.Bilgen and J.Rheault , “ Solar chimney power plants for high latitudes,” Solar Energy, 79, pp.449–58, 2005. 102. C.D.Papageorgiou, “Floating solar chimney versus concrete solar chimney power plants”, in Proc. International conference on clean electrical power; 2007. pp. 760–5. 103. C.D. Papageorgiou, “ Floating solar chimney,” WO2004/085846 A1/07-10-2004. 104. C.D. Papageorgiou, “Floating solar chimney,” available: http://www.floatingsolarchimney.gr.April 28, 2006. 105. D. Papageorgiou, “Floating solar chimney technology: a solar proposal for China,” in Proc. ISES 2007 solar world congress conference; 2007.pp. 172–6. 106. D. Papageorgiou , “ Floating solar chimney: the link towards a solar future,” in Proc. ISES 2005 solar world congress conference; August 2005. 107. C.D. Papageorgiou, “External wind effects on floating solar chimney,” in IASTED proc. Power and energy systems, EuroPES 2004, conference; July 2004, pp. 159–63. 108. C.D. Papageorgiou, “Optimum design for solar power stations with floating solar chimneys,” in proc.ISES Asia Pacific solar energy conference; October 2004, pp. 763–72. 109. C.D. Papageorgiou, “Turbines and generators for floating solar chimney power stations,” in proc. The IASTED conference on European power and energy systems; June 2006. pp. 26–8 110. A.Hussain, 2007, “Hybrid geothermal/solar energy technology for power generation,” Higher Institute of Engineering. Available: http://www.environmental-expert.com/Files%5C24847%5Carticles%5C14612%5Chgst.pdf. 111. S.P Singh et al., “solar updraft tower-a truly sustainable source of energy,” Available: http://fr.scribd.com/doc/41976191/Final-Paper-SolarUpdraft-Tower-A-Truly-Sustainable-Source-of-Energy 112. A. Akbarzadeh, P. Johnson, and R. Singh, “ Examining potential benefits of combining a chimney with a salinity gradient solar pond for production of power in salt affected areas ,” Solar Energy, vol. 83, no 8, pp. 1345-1359, 2009. 113. L. Zuo, Y. Yuan, Z. Li, and Y. Zheng, “Experimental research on solar chimneys integrated with seawater desalination under practical weather condition,” Desalination, vol. 298, no 0, pp. 22-33, 2012. 114. R. Daba,“ Modeling and Simulation of Solar Chimney Power Plant with\nand without the Effect of Thermal Energy Storage Systems”. Available:http://www.libsearch.com/view/2039376.[Accessed:17-déc-2012]. 115. A. O. Chikere, H. H. Al-Kayiem, and Z. A. Abdul Kari, “ Review on the Enhancement Techniques and Introduction of an Alternate Enhancement Technique of Solar Chimney Power Plant ”, Journal of Applied Sciences, vol. 11, no 11, pp. 1877-1884, 2011.
Authors:
Jeena Mary Abraham, M.S.P. Subathra, Senraj. R
Paper Title:
Single Stage Inverter Topology for Renewable Resources
Abstract: Power sector faces great troubles in the generation of power when the energy sources are renewable resources like wind power, hydro turbines etc. These resources may not be available at a constant rate continuously. Wind power generation is high only when the velocity of the wind is high, but this may not happen all the time. So the input will not be stable, in such situations inorder to produce a stable, stepped up ac voltage with high reliability, high boost gain and efficiency, the use of single stage boost inverter with coupled inductor is suggested Keywords: single stage; coupled inductor; boost gain. References: 2.
3.
F. Z. Peng, “Z-source inverter,” IEEE Trans. Ind. Appl., vol. 39, no. 2, pp. 504–510, Mar. 2003. Y. Huang, M. Shen, F. Z. Peng, and J. Wang, “Z-source inverter for residential photovoltaic systems,” IEEE Trans. Power Electron., vol. 21, no. 6, pp. 1776–1782, Nov. 2006.. 3. M. Shen and F. Z. Peng, “Operation modes and characteristics of the Zsource inverter with small inductance or low power factor,” IEEE Trans. Ind. Electron., vol. 55, no. 1, pp. 89–96, Jan. 2008. 4. J. Anderson and F. Z. Peng, “Four quasi-Z-source inverters,” in Proc. IEEE Power Electron. Spec. Conf., 2008, pp. 2743–2749. 5. K. Nishida, T. Ahmed, andM. Nakaoka, “A cost-effective high-efficiency power conditioner with simple MPPT control algorithm for wind-power grid integration,” IEEE Trans. Ind. Electron., vol. 47, no. 2, pp. 893–900, Jun. 2011. 6. K. Zhou and D. Wang, “Relationship between space-vector modulation and three-phase carrier-based PWM: A comprehensive analysis,” IEEE Trans. Ind. Electron., vol. 49, no. 1, pp. 186–196, Feb. 2002. 7. F. Z. Peng, M. Shen, and Z. Qian, “Maximum boost control of the z-source inverter,” IEEE Trans. Power Electron., vol. 20, no. 4, pp. 833–838, Jul. 2005. 8. M. Shen, J. Wang, A. Joseph, and F. Z. Peng, “Constant boost control of the z-source inverter to minimize current ripple and voltage stress,” IEEE Trans. Ind. Electron., vol. 42, no. 3, pp. 770–778, May/Jun. 2006. 9. G. Zhu and K. Wang, “Modeling and design considerations of coupled inductor converters,” in Proc. IEEE Appl. Power Electron. Conf., 2010, pp. 7–13. 10. Yufei Zhou and Wenxin Huang,”Single-Stage Boost Inverter With Coupled Inductor” IEEE Transactions On Power Electronics, Vol. 27, No. 4, April 2012. 1. 2.
Authors:
B. R. Yadwade, S.B. Patil
Paper Title:
Diagnosis of cardiac deceases by Using ECG signal compression for cffective communication
Abstract: An ECG contains diagnostic information related to cardiac activity. A method to compress diagnostic information without losing data is required to store and transmit them efficiently on a wireless personal area network (WPAN). As electrocardiogram (ECG) signals are generally sampled with a frequency of over 200 Hz, an ECG signal compression method for communications on WPAN, which uses feature points based on curvature, is proposed. The feature points of P, Q, R, S, and T waves, which are critical components of the ECG signal, have large curvature values compared to other vertexes. Thus, these vertexes were extracted with the proposed method, which uses local extrema of curvatures. Furthermore, in order to minimize reconstruction errors of the ECG signal, extra vertexes were added according to the
18-22
23-25
iterative vertex selection method. It was concluded that the vertexes selected by the proposed method preserved all feature points of the ECG signals. In addition, it was more efficient than the amplitude zone time epoch coding method. Keywords: Electrocardiogram (ECG), Curvature, Feature Extraction, Vertex References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.
F. Enseleit and F. Duru, “Long-term continuous external electrocardiographic recording: A review,” Europace, vol. 8, pp. 255–266, 2006. Q. Lin g , Z. Tian, and Y. Li, “Distributed decision-making in wireless sensor networks for online structural health monitoring,” J. Commun. Netw., vol. 11, pp. 350–358, 2009. C. K. Yeo, I. Y. Soon, and C. T. Lau, “Lossless compression of multispectral satellite images,” J. Commun. Netw., vol. 1, pp. 226–230, 1999. B. Schijvennaars, G. V. Herpen, and J. A. Kors, “Intraindividual variability in electrocardiograms,” J. Electrocardiology, vol. 41, pp. 190–196, 2008. H. Kim, R. F. Yazicioglu, P. Merken, C. V. Hoof, and H. Yoo, “ECG signal compression and classification algorithm with quad level vector for ECG holter system,” IEEE Trans. Inf. Technol. Biomed., vol. 14, pp. 93–100, 2010. W. C. Mueller, “Arrhythmia detection program for an ambulatory ECG monitor,” Biomed. Sci. Instrum., vol. 14, pp. 81–85, 1978. J. R. Cox, F. M. Nolle, H. A. Fozzard, and G. C. Oliver Jr., “AZTEC, a preprocessing program for real time ECG rhythm analysis,” IEEE Trans. Biomed. Eng., vol. BME-15, pp. 128–129, 1968. J. Abenstein and W. Tompkins, “A new data-reduction algorithm for realtime ECG analysis,” IEEE Trans. Biomed. Eng., vol. BME-29, pp. 43–48, 1982. U. E. Ruttimann and H. V. Pipberger, “Compression of the ECG by prediction or interpolation and entropy encoding,” IEEE Trans. Biomed. Eng., vol. BEM-26, pp. 613–623, 1979. A. Djohan, T. Q. Nguyen, and W. J. Tompkins, “ECG compression using discrete symmetricwavelet transform,” in Proc. IEEE EMBC., vol. 1, 1995, pp. 167–168. M. L. Hilton, “Wavelet and wavelet packet compression of electrocardiograms,” IEEE Trans. Biomed. Eng., vol. 44, pp. 394–402, 1997 J. Martinez, R. Almeida, S. Olmos, A. P. Rocha, and P. Laguna, “A wavelet-based ECG delineator: Evaluation on standard databases,” IEEE Trans. Biomed. Eng., vol. 51, pp. 570–581, 2004. Q. Zhang, A. I. Manriquez, C. Medigue, Y. Papelier, and M. Sorine, “An algorithm for robust and efficient location of T-wave ends in electrocardiograms,” IEEE Trans. Biomed. Eng., vol. 53, pp. 2544–2552, 2006. M. Benmalek and A. Charef, “Digital fractional order operators for Rwave detection in electrocardiogram signal,” IET Signal Process., vol. 3, pp. 381–391, 2009. B. Yun, S. Lee, J. Cho, J. Choi, and H. Kang, “A new vertex selection scheme using curvature information,” Lecture Note in Artificial Intelligence, vol. 3215, pp. 887–893, 2004. A. A. Iglesias and J. G.Moros, “Automatic real time ECG coding methodology guaranteeing signal interpretation quality,” IEEE Trans. Biomed. Eng., vol. 55, pp. 2519–2527. 2008. Y. Zigel, A. Cohen, and A. Katz, “The weighted eiagnostic distortion (WDD)measure for ECG signal compression,” IEEE Trans. Biomed. Eng., vol. 27, no. 11, 2000.
Authors:
Sanjay Kumar Khadagade, N.K. Mittal Comparison of BER of OFDM System using QPSK and 16QAM over Multipath Rayleigh Fading Channel Paper Title: using Pilot-Based Channel Estimation Abstract: This paper investigate and compare the various channel estimation techniques based on pilot arrangement with the communication system that uses QPSK and 16-QAM to transmit information using OFDM over multipath Rayleigh fading channel. Bit Error Rate (BER) has been considered as the performance index in all analysis. In the block type pilot arrangement, the performance of channel estimation is analyzed with three different algorithms: LS, LMMSE and SVD algorithm. In comb type pilot arrangement, the paper introduces three method of interpolation: linear interpolation, second order interpolation and cubic spline interpolation for channel estimation. The analysis has been carried out with simulation studies under MATLAB environment. Keywords: Channel Estimation, OFDM, Pilot Symbol, Rayleigh Fading channel 4.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
5.
A. R. S. BAHAI AND B. R. SALTZBERG, MULTI-CARRIER DIGITAL COMMUNICATIONS THEORY AND APPLICATIONS OF OFDM, KLUWER ACADEMIC/PLENUM, 1999. J.-J. van de Beek, O. Edfors, M. Sandell, S. K. Wilson, and P. O. Borjesson, “On channel estimation in OFDM systems,” in Proc. IEEE 45th Vehicular Technology Conf., Chicago, IL, Jul. 1995, pp. 815–819. O. Edfors, M. Sandell, J.-J. van de Beek, S. K. Wilson, and P. O. Brjesson, “OFDM channel estimation by singular value decomposition,” IEEE Trans. Commun., vol. 46, no. 7, pp. 931–939, Jul. 1998. M. Hsieh and C.Wei, “Channel estimation for OFDM systems based on comb-type pilot arrangement in frequency selective fading channels,” IEEE Trans. Consumer Electron., vol. 44, no. 1, Feb. 1998. R. Steele, Mobile Radio Communications. London, England: Pentech Press Limited, 1992. R. Van Nee, R. Prasad, OFDM for Wireless Multimedia Communications, 1st ed, Artech House, Norwood, MA, 2000. P. Hoeher, S. Kaiser, P. Robertson, ―Two-dimensional Pilot-Symbol-Aided Channel Estimation by Wiener Filtering‖, Acoustics, Speech, and Signal Processing, 1997. ICASSP-97., 1997 IEEE International Conference, Apr 1997, Vol. 3, pp. 1845-1848. U. Reimers, “Digital video broadcasting,” IEEE Commun. Mag., vol. 36, no. 6, pp. 104–110, June 1998. Louis L. Scharf. Statistical Signal Processing: Detection, Estimation, and Time Series Analysis. Addison-Wesley, 1991. M.X.Chang and Yu T.Su ,” performance analysis of Equalized OFDM systems in Rayleigh fading” IEEE Trans. On wireless comm. Vol. 1 no.4. pp.721-732.oct2002. Design and Implementation of Orthogonal Frequency Division Multiplexing by: Alan C. Brooks • Stephen J. Hoelzer.
Authors:
Sanyam Agarwal, A.K.Gautam
Paper Title:
Analysis of Delay Variation in ATM Network
Abstract: Asynchronous Transfer Mode(ATM). ATM was selected by the telecommunication (Carrier) industry as the technology to deliver the Broadband Integrated Services Digital Network (BISDN) carrier service. ATM is designed to handle different kinds of communication traffic (voice, audio, video and data) in an integrated manner. It is particularly important during periods of congestion that traffic flows with different requirements be treated differently and provided a different Quality of Service (QoS). Keywords: BISDN, QoS, ABR, VBR ,DS
26-32
33-35
References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
N.Saravana Selvam.M.E.and Dr.S.Radhakrishnan , “ Active Services to improve Quality of Service in Networking using Network Processor”, IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, 243-, October 2008 Jason Schareiber, Mehrdad Khodai Joopari and M.A.Rashid, “Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks”, Res. Lett. Inf. Math. Sci., Vol. 7, pp 19-27, 2005. Opnet Technologies Inc.: Opnet Modeler, Version 7.0B, Manual, 2000. Gupta, B.K., Lal, M., and Sharma, S.C., “Evaluation of Cell Loss Probability of Non-Blocking Multiple Input ATM Switches” Indian Journal of Information Science and Technology, Chennai, INDIA in Nov., 2005. J.Paek, C.Oh and K.Kim.: “ An Estimation of Traffic Parameters for VBR services in ATM networks, ”Computer Communications ,Vol.24 , pp.1380-1389, 2001. Orhan Cagri Imer,Sonia Compans, TamersBasar and R.Srokant.: “Available Bit Rate Congestion Control in ATM Network,” IEEE Control System Magazine, pp.38-56, February 2001. Bong Joo Kim, Gang Uk Hwang and Yeon Hwa Chung “Traffic Modelling and Bandwidth Allocation for Video Telephony Service Traffic”,Journal of Industrial and Management Optimization,Volume 5, Number 3, pp. 541–552, August 2009. Andrew S. Tanenbaum, “Computer Networks”, Vrije University Amsterdam, The Netherlands, Published by Pearson Education (Singapore) 4th, Edition, pp 384- 395, 2003. Gupta, B.K., Sharma, S.C., and Lal, M. : “Evaluation of cell loss probability of shared-memory ATM switch,” Journal of the CSI, vol. 30, no. 4, pp. 15-20, Dec. 2000, INDIA
Authors:
Piyush M Asolkar, Vinayak M Umale
Paper Title:
Analysis Of Microcirculation Videos Based On Adaptive Thresholding Technique
Abstract: The study of microcirculation is a key factor in the analysis of blood circulatory system. The blood flow distribution changes, based on the physiological effects of disorders. This study presents a method for analysis of microcirculation. The technique applies advanced image processing methods to the images. micro vessels (capillaries and small blood vessels), and estimate the average Functional Capillary Density on 20 consecutive frames for each subject. The algorithm consists of four main parts: pre-processing, averaging, adaptive local thresholding segmentation and calculation of parameters. The key objective is to analyse the malfunctioning of the microcirculation in various organs. The designed system will help physicians and medical researchers in diagnostic and decision making to determine the functionality of organ sufficiency of resuscitation process and the effect of drug consumption in patients. Calculation of two parameters capillary flow density , functional capillary density and mass flow index allows analysing severity of malfunctioning. Keywords: Capillary flow density , functional capillary density, Image processing microcirculation , Thresholding References: 1.
6.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
12. 13.
14. 15.
7.
Daniel De Backer, Steven Hollenberg, Christiaan Boerma, Peter Goedhart, ‘How to evaluate the microcirculation: report of a round table conference H. Glenn Bohlen ‘The Microcirculation and the Lymphatic System’, chapter 16 V. Cerný, Z. Turek, and R. Pařízková, “Orthogonal polarization spectral imaging: a review”, Physiol. Res. 56, 2007. R. F. Tuma, W. N. Duran, K. Ley. HANDBOOK OF PHYSIOLOGY MICROCIRCULATIO , Elsevier Science, USA, 2008. AR. Pries, D. Neuhaus and P. Gaehtgens, “Blood viscosity in tube flow: dependence on diameter and hematocrit.” Am J Physiol,263: H1770H1778, 1992. Research Chih-Kuang Yeh, Sheng-Yi Lu, and Yung-Sheng Chen, Microcirculation Volumetric Flow Assessment Using High-Resolution, Contrast-Assisted Images ieee transactions on ultrasonics, ferroelectrics, and frequency control, vol. 55, no. 1, january 2008 S. Chaudhuri, S. Chatterjee, N. Katz, M. Nelson, and M. Goldbaum, “Detection of blood vessels in retinal images using two dimensional matched filters:’ IEEE Trans. Medical imaging, vol. 8, no. 3, 1989. Y. Xiao, Z. Cao, and T. Zhang, “Entropic Thresholding Based on Gray Level Spatial Correlation Histogram”, IEEE Trans. On Wireless Communications 7(1): 334-342, 2008. D. De Backer, S. Hollenberg, C. Boerma, P. Goedhart, G. Büchele, G. Ospina-Tascon, I. Dobbe, C. Ince, “How to evaluate the microcirculation: report of a round table condference”. Critical Care, 11:R101, 2007. D. Johnson, "Introducing the MicroScan". MicroVision Medical. July 1,2010
. S Mehmet, S Bulent, “Survey over image thresholding techniques and quantitative performance evaluation” Journal of Electronic Imaging, 2004.1. Groner W, Winkelman JW, Harris AG, Ince C, Bouma GJ, Messmer K, Nadeau RG: Orthogonal polarization spectral imaging: a new method for study of the microcirculation. Nat Med 1999, 5:1209-1212. Ince C: The microcirculation is the motor of sepsis. Crit Care 2005:S13-S19. Trzeciak S, Dellinger RP, Parrillo JE, Guglielmi M, Bajaj J, Abate NL, Arnold RC, Colilla S, Zanotti S, Hollenberg SM: Early microcirculatory perfusion derangements in patients with severe sepsis and septic shock: relationship to hemodynamics, oxygen transport, and survival. Ann Emerg Med 2007, 49:88-98. J. Tang and S. T. Acton, “Vessel boundary tracking for intravital microscopy via multi-scale gradient vector flow snakes,” IEEE Trans. Biomed. Eng., vol. 51, no. 2, pp. 316–324, Feb. 2004. T. S. Koh*, L. H. Cheong, Z. Hou, and Y. C. Soh ’A Physiologic Model of Capillary–Tissue Exchange for Dynamic Contrast-Enhanced Imaging of Tumor Microcirculation ’IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 50, NO. 2, FEBRUARY 2003
Authors:
Zouhair A. Sadouq, Mounia Seraoui, Mohamed Essaaidi
Paper Title:
Tanja: A framework to Conserve Energy in WSN
Abstract: Nowadays, Wireless Sensor Networks raise a growing interest among industries and civil organizations where monitoring and recognition of physical phenomena are a priority. Their possible applications are extremely versatile. WSN represent a significant technology that attracts more and more considerable research attention in recent years. It has emerged as a result of recent advances in low-power digital and analog circuitry, low-power RF design and sensor technology. In this paper we propose a new framework for modeling Wireless Sensor Networks that supports WSN to handle real-time network management by using a hierarchical framework based on general features identified through a careful analysis of existing sensor networks. Our framework is based on the GSM model. In fact, it’s an energy optimization approach based on crosslayer for wireless sensor networks, joining optimal design of the physical, medium access control, and routing layer. It can be considered as a special kind of clustering architecture that extends the network life by efficiently using every node’s energy and distributes management tasks to support the scalability of the management system in densely deployed sensor networks. However, it is more systematic, more robust and more scalable. In our solution we propose dynamic construction of clustering. The network is partitioned into clusters or cells. A cluster is composed with nodes, where every node can play
36-39
40-45
one of three roles: source or sensing role as a slave, router, or a master as a cluster head and a gateway to the external world. We address the energy-consumption efficiency as a major design challenge in succeeding the vision of self-organized WSN. This approach focuses on the computation of optimal transmission power, routing, and duty-cycle schedule that optimize the WSNs energy-efficiency and by the way, reduces node energy consumption and contributes to extending the lifetime of the entire network. Keywords: Energy consumption-efficiency, GSM model, Self-configuration, WSN. References: 1. 2. 3. 4. 5.
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29.
8.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless Sensor Networks: A Survey. Computer Networks, 38(4): March 2002, pp. 393–422. Z. Sadouq and M. Essaaidi. Design Challenges of Wireless Sensor Networks Based on Real-time Middleware. Information and Communication Technologies International Symposium, ICTIS’07, April 3 - 4 - 5, Fez, 2007. M. Tuñón, W. M. López, and Z. Sadouq. Characteristic Analysis of Wireless Sensor Networks with Real-time Middleware. In Proceedings of the II Congreso Español de Informática CEDI 2007, September 12-14, Zaragoza, 2007, pp. 21 - 28 M. Kochhal, L. Schwiebert, and S. Gupta. Role-based hierarchical self-organization for wireless ad hoc sensor networks. In Proceeding of the 2nd ACM International Conference on Wireless Sensor Networks and Applications, 2003, pp.98-107. M. Yebari, T. Addali, Z. Sadouq and M. Essaaidi. Energy Conservation Challenges in Communication Protocols for Wireless Sensors Networks: the state of the art. In Proceedings of the International Journal on Information and Communication Technologies, Vol. 1, No. 1-2, January-June 2008, pp. 29-35. I. Demirkol, C. Ersoy, F. Alagöz, 2006 MAC protocols for wireless sensor networks: a survey. IEEE Communications Magazine, 44 (4) April 2006, pp.115-121. Z. Sadouq, M. Tuñón, and M. Essaaidi. Tanja: A framework for modelling Wireless Sensor Networks. Workshop on Sensor Networks and Applications. WSeNA’08. September 1–5, Gramado, 2008. M. Yu, H. Mokhtar, M. Merabti, A survey of network management architecture in wireless sensor network. In Proceedings of the Sixth Annual Post-Graduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, 2006. J.L. Chen, H.F Lu and C.A Lee. Autonomic self-organization architecture for wireless sensor communications. International Journal of Network Management, Vol.17 No.3, June 2007, pp.197-208. A. T. Tai, K.S.T., and William H. Sanders. Cluster- Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications in Dependable Systems and Networks. DSN'04. 2004. Mklm;energy analysis of multi-hop wireless sensor network. In the proceeding of European Conference on Wireless Sensor Networks EWSN’05, January 31 - February 2, Istanbul, 2005, pp. 33-44. M.C. Vuran and I.F. AKyildiz. Spatial correlation-based collaboration medium access control in wireless sensor network. IEEE/ACM Transaction on Networking 14(2), June 2006. P. Skraba, H. Aghajan, and A. Bahai. Cross-layer optimization for high density sensor networks: Distributed passive routing Decision. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004, vol. 3158, pp. 266–279. M. Zorzi, and R. Rao. Geographic random forwarding GeRaF for ad hoc and sensor networks: multihop performance. IEEE Trans. Mobile Computing 2(4), pp. 337-348. S. Cui, R. Madan, A. Goldsmith, and S. Lall. Joint routing, MAC, and link layer optimization in sensor networks with energy constraints. In the Proceeding of IEEE ICC’05. R. Madan, S. Cui, S. Lall, and A. Goldsmith. Cross-layer design for lifetime maximization in interference-limited wireless sensor networks. In the Proceeding of IEEE INFOCOM’05. A. Bharathidasas, and V. Anand. Sensor networks: An overview. Technical report, Dept. of Computer Science, University of California at Davis, 2002 D. Estrin, R. Govindan, J. Heidemann, and S. Kumar. Next century challenges: Scalable coordination in sensor networks. In Proceedings of ACM Mobicom, Seattle, Washington, USA, August 1999, pp. 263—270. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine, August 2002, pp. 102-114. D. Estrin, L. Girod, G. Pottie, M. Srivastava. Instrumenting the world with wireless sensor networks. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing ICASSP’01. E. S. Biagioni and G. Sasaki. Wireless sensor placement for reliable and efficient data collection. In the proceeding of 36th International Conference on Systems Sciences, Hawaii, January 2003. R. Krishnan and D. Starobinski. Efficient clustering algorithms for self-organizing wireless sensor networks. Ad Hoc Networks, 2005. A. Savvides, C. Han, and M. Strivastava, Dynamic finegrained localization in ad-hoc networks of sensors. In Proceeding of ACM MOBICOM’01, ACM Press, 2001, pp. 166–179. L. Doherty, L. El Ghaoui, and K. S. J. Pister. Convex position estimation in wireless sensor network. In Proceeding of IEEE INFOCOM’01, Anchorage, AK, April 2001. CC1000 A unique UHF RF Transceiver, http://www.chipcon.com. CC2420 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver, http://www.chipcon.com. S. Lin, J. Zhang, G. Zhou, L. Gu, T. He, and J.A. Stankovic. Atpc: adaptive transmission power control for Wireless Sensor Networks. In the Proceeding of SenSys’06. W. Ye, J. Heidemann, and D. Estrin. An energy-efficient MAC protocol for wireless sensor networks. In 21st Conference of the IEEE Computer and Communications Societies (INFOCOM), June 2002. Vol 3, pp. 1567-1576. W.R. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. In Proceedings of the Thirty Third International Conference on System Sciences HICSS ’00, Maui, January 2000.
Authors:
Neeraja Narayanan, S. Paul Sathiyan
Paper Title:
Electronic Ballast for High Intensity Discharge Lamp Based On AC-AC Sepic Converter
Abstract: This project work proposes SEPIC converter topology for developing electronic ballasts, supplying highintensity discharge lamps fed by a pulse width-modulation ac–ac converter, implemented with bidirectional switches. The lamp operates directly from the ac mains; thus, the drawbacks of the low frequency square waveform operation get eliminated. The features of the proposed solution are high efficiency, high power factor, low cost, and the absence of electrolytic capacitors. This paper includes the design of passive elements. Keywords: AC–AC conversion, acoustic resonance (AR) phenomenon, ballasts, current control, high-intensity discharge (HID), ignition, lamps. References: 1.
D. K. W. Cheng, “A simple electronic ballast with high power factor for Metal halide (MH) lamps,” in Proc. PEDS, 2003, pp. 1386–1390.
2. 3. 4. 5. 6.
9.
M. A. Dalla Costa, J. M. Alonso, J. Garcia, J. Cardesin, and M. Rico-Secades, “Acoustic resonance characterization of low-wattage metal-halide lamps under low-frequency square-waveform operation,” IEEE Trans. Power Electron., vol. 22, no. 3, pp. 735–743, May 2007. J. Dannehl, M. Lisere, and F. W. Fuchs(2011) “Implementation of voltage multiplier integrated HID ballast circuit with dimming control for automotive application” IEEE Trans. Ind. Electron., vol. 58, no. 8, pp. 3623–3633. T. B. Soeiro, C. A. Petry, J. C. dos S. Fagundes, and I. Barbi (2011), “Direct AC–AC converters using commercial power modules applied to voltage restorers,” IEEE Trans. Ind. Electron., vol. 58, no. 1, pp. 278–288. G.C varghese,(1996) “The control hand book in power electronics control,” IEEE Trans. Ind. Electron., vol. 58, no. 1, pp. 278–288.
Authors:
V. Venkataramanan, K. Shankar, D. Vinoth, S. Archana
Paper Title:
Analysis of Cluster Based Zone Routing Protocol in MANET through Network Simulator
Abstract: The employment of routing data from a source to a destination in a network is dispute. Many routing protocols are suggested for mobile ad-hoc networks. Usually there are two approaches first one is Proactive and another one is Reactive [3]. In which the Zone Routing Protocol (ZRP) is a composite routing protocol for MANET [2], the ZRP integrates the advantages of the proactive and reactive approaches by conserving an up-to-date topological map of a zone medial on each node. Within the zone, routes are instantaneously available. For destinations outside the zone, ZRP manipulates a route ascertainment procedure, which can profit from the local routing information of the zones. Clustering is a method that divides the network into inter depended substructures, called clusters. Each cluster has a cluster head. It acts as a temporary base station within its zone or cluster and communicates with other cluster heads. In existing system [4], [5], Source cluster node transmits a packet to the source cluster head and then it transmits a packet to destination cluster head through intermediate node and intermediate cluster head. The destination cluster head moves a packet to the destination node. In proposed system the source cluster node transmits a packet to the source cluster head then it transmits a packet to the destination cluster head and it moves to the destination node without using intermediate nodes and cluster heads. The proposed System is simulated in Network Simulator 2 (NS2). The ZRP supplies good packet delivery ratio and curtails time delay compared to existing system. Without using intermediate nodes curtails the time to bring back the route to destination and it utilizes few nodes therefore the packet loss is less. Each cluster heads knows about neighbors cluster head therefore it is easy to identify the destination cluster head and route discovery to the destination is understandable one.
50-53
Keywords: Ad-hoc Network, BRP, IARP, IERP, MANET, Zone Routing Protocol (ZRP), References: 1. 2. 3. 4.
5. 6.
www.ijcse.com/docs/IJCSE10-01-04-61.pdf www.dia.unisa.it/~vitsca/RC-0809I/survey_ad_hoc.pdf www.ijopcm.org/Vol/10/IJOPCM(vol.3.5.11.D.10).pdf Zhijiang Chang, Georgi Gaydadjiev, Stamatis Vassiliadis., “Routing Protocols for Mobile Ad-hoc Networks: Current Development and Evaluation”, In proceedings of the 16th annual work shop on circuits, systems and signal processing, prorisc 2005,pp. 489-494, veldhoven, the Netherlands, November 2005 Yi.-Yu Su, Shiow-Fein Hwang and Chyi-Ren Dow, “An Efficient cluster-based routing algorithm in ad hoc networks with unidirectional links”, Journal of Information Science and Engineering 24, 2007, pp. 1409 – 1428. Arwa Zabian, Ahmed Ibrahim and Fadi Al-Kalani, “Dynamic Head Cluster Election Algorithm for Clustered Ad-Hoc Networks”, Journal of Computer Science 4(1), 2008.
Authors:
Hamed Sadabadi, Adeleh Aftabtalab, Shirzad Zafarian, K.Venkateswara. Rao, V.Rajendar Synthesis and Characterization of -Al2O3 Platelet Nanoparticle as a Direct Product of Solution Paper Title: Combustion Method Abstract: Crystalline -Al2O3 was synthesized by the solution combustion of aluminum nitrate and urea in aqueous media. The effect of conditions was further investigated in detail. The XRD analysis shows that the crystalline -Al2O3 was obtained directly by SC method without annealing at high temperature above 1100oC, and the crystalline size can estimate from XRD result. The SEM micrograph shows the morphology of particles. Thermal behavior of -Al2O3 was evaluated by applying Thermal gravimetric and differential thermal analysis (TG/DTA). Keywords: -Al2O3, Solution combustion, nanostructure, XRD References: 1.
10.
2. 3. 4. 5. 6. 7. 8. 9. 10.
11.
Kikuo Okuyama and Wuled Lenggoro“Nanoparticle Preparation and Its Application- A Nanotechnology Particle Project in Japan” Int. Conf. on MEMS, NANO and Smart Sys.2004, (ICMENS’04). T.Mimani and K.C.Patil, “Solution combustion synthesis of nanoscale oxides and their composites”, Mater.Phys.Mech.J. 4 , 2001,pp134-137. Singanahally T. Aruna and Alexander S. Mukasyan, “Combustion synthesis and nanomaterials”, Cur. Opin. in Solid State and Mater. Sci J. 12, 2008,pp44–50. Robert Ianos, Ioan Lazau and Cornelia Pacurariu, “The influence of combustion synthesis conditions on the a-Al2O3 powder preparation”, J Mater Sci 44, 2009, pp1016–1023. YI Jian-hong, SUN You-yi, GAO Jian-feng, XU Chun-yan ,“Synthesis of crystalline γ-Al2O3 with high purity”, Trans. Nonferrous Met. Soc. China J. 19, 2009,pp1237−1242. Hsing-I Hsiang, Tsung-Hao Chen, and Chia-Che Chuang, “Synthesis of -Alumina Hexagonal Platelets Using a Mixture of Boehmite and Potassium Sulfate”, J. of Am. Ceram. Soc. J. 90 (12), 2007, pp4070–4072. Fu Su Yen, Huei Shan Lo, Hui Lin Wen, Rung Je Yang, “ - to -phase transformation subsystem induced by -Al2O3-seeding in boehmitederived nano-sized alumina powders”, J. of Crys. Gro. 249, 2003, pp283–293. Shani Keysar, Gennady E. Shter, Yoram de Hazan, Yachin Cohen, and Gideon S. Grader, “Heat Treatment of Alumina Aerogels”, Chem. Mater J. 9, 1997,pp2464-2467. Fu-Su Yen, Pei-Ling Chang, Pei-Ching Yu and Rong-Jeh Yang, “Characterization on microstructure homogeneity of θ-Al2O3 powder systems during phase transformation”, Key Eng. Mater. J. 351, 2007, pp81-87. A. Janbey, Ranjan k.pati, Saad tahir, and Panchanan pramanik, “A new chemical rout for for the synthesis of nano-crystalline -Al2O3 powder”, J. of Europ. Ceram. Soc. 21, 2001, pp2285-2286.
Authors:
Jose Anand, K. Sivachandar
Paper Title:
Diverse Sorting Algorithm Analysis for ACSFD in Wireless Sensor Networks
54-56
Abstract: The progression in wireless communications and electronics has emerged the expansion of low-cost sensor networks. Sensor networks exploit large number of wireless sensor nodes to collect information from their sensing terrain. The gathered information will undergo in-network process and send to the remote sink. Sensor networks have wide range of applications including medical, military, home, etc. In the sensor networks, a fault-tolerant distributed decision fusion will occur due to the presence of sensor faults. For this fault detection, Collaborative Sensor Fault Detection (CSFD) scheme was used and this fault detection scheme is very difficult to implement because of the extensive computations. So an Approximated Collaborative Sensor Fault Detection (ACSFD) scheme was developed, which is less cost and utilizes less power than CSFD and has the same performance of CSFD. The important blocks present in the architecture of ACSFD consist of multipliers, logarithms, and sorting. In this paper, analysis has been done with various sorting algorithms and concluded the best sorting technique that can be used in ACSFD scheme to improve the performance of the fault detection scheme in the wireless sensor network. Keywords: ACSFD, fault detection, sorting algorithms, wireless sensor networks. 57-59
References: 1. 2. 3. 4. 5. 6. 7. 8.
Akyildiz I. F., Su W., Sankarasubramaniam Y., and Cayirci E., “Wireless sensor networks: A survey”, Journal on Computer Networks, Vol. 38, pp. 393-422, 2002. Cheng Q., Varshney P. K., Mehrotra K. G., and Mohan C. K., “Bandwidth management in distributed sequential detection”, IEEE Transactions on Information Theory, Vol. 51, No. 8, pp. 2954-2961, Aug. 2005. Chih-Min Chao, and Yi-Wei Lee, “A Quorum-Based Energy-Saving MAC Protocol Design for Wireless Sensor Networks”, IEEE Transactions on Vehicular Technology, Vol. 59, No. 2, pp. 813-822, Feb. 2010. Goldberg D. H., Andreou A. G., Julian P., Pouliquen P. O., Riddle L., and Rosasco R., “A wake-up detector for an acoustic surveillance sensor network: Algorithm and VLSI implementation”, Proceedings of the IPSN’04, pp. 134-141, 2004. Pei-Yin Chen, Li-Yuan Chang, and Tsang-Yi Wang, “A Low-Cost VLSI Architecture for Fault-Tolerant Fusion Center in Wireless Sensor Networks”, IEEE Transactions on Circuits and Systems, Vol. 57, No. 4, pp. 803-813, April 2010. Vijaya Raja V., Rani Hemamalini R., and Jose Anand, “Performance Evaluation of Agent-based Upstream Congestion Control Approach in WSN” International Journal of Computer Technology and Applications (IJCTA), Vol. 2 (6), pp. 1939-1944, (ISSN: 2229-6093), Nov./Dec. 2011. Wang T. Y., Chang L. Y., Duh D. R., Wu J. Y., “Fault-tolerant decision fusion via collaborative sensor fault detection in wireless sensor networks”, IEEE Transactions on Wireless Communication, Vol. 7, No. 2, pp. 756-768, Feb. 2008. Yuanzhu Peter Chen, Arthur L. Liestman, and Jiangchuan Liu, “A Hierarchical Energy-Efficient Framework for Data Aggregation in Wireless Sensor Networks”, IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, pp. 789-796, May 2006.
Authors:
Anandhi, G. Gunasekaran, S.Satthiyaraj
Paper Title:
VC Using Lempel-Ziv-Welch Algorithm
Abstract: Visual cryptography is one of the techniques used to encrypt the images by dividing the original image into transparencies. The transparencies can be sent to the intended person, and at the other end the transparencies received person can decrypt the transparencies using the tool, thus gets the original image. The proposed Visual cryptography provides the demonstration to the users to show how encryption and decryption can be done to the images. In this technology, the end user identifies an image, which is not the correct image. That is, while transmitting the image the sender will encrypt the image using the application here sender gets the two or more transparencies of the same image. The application provides an option to the end user of encryption. The end user can divide the original image into number of different images. Using the application we can send encrypted images that are in the format of GIF and PNG. The encrypted transparencies can be saved in the machine and can be sent to the intended person by other means. Keywords: Image processing, visual Cryptography Scheme (VCS), GIF Encoding, Decoding. References: 12.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
13.
Feng Liu and chuankun Wu.(2011), ‘Embedded Extended Visual Cryptography Schemes’, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 2, pp. 307-322 Shamir A. (1979), ‘How to share a secret’ Commun. ACM, vol. 22, no. 11, pp. 612–613. Blakley G. R. (1979), ‘Safeguarding cryptographic keys’ in Proc. National Computer Conf., vol. 48, pp. 313–317. Naor M. and Shamir A. (1995), ‘Visual cryptography’ in Proc. EUROCRYPT 94, Berlin, Germany, vol. 950, pp. 1–12, Springer-Verlag, LNCS. Naor M. and Pinkas B. (1997), ‘Visual authentication and identification’ in Proc. CRYPTO’97, vol. 1294, pp. 322–336, Springer-Verlag Chen T. H. and Tsai D. S. (2006), ‘Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol’ Pattern Recognit., vol. 39, pp. 1530–1541. Tuyls P., Kevenaar T., Schrijen G. J., Staring T., and Van Dijk M. (2004), ‘Security displays enabling secure communications’ in Proc. First Int. Conf. Pervasive Computing, Boppard Germany, Springer-Verlag Berlin LNCS, vol. 2802, pp. 271–284. Blundo C., De Bonis A., and De Santis A. (2001), ‘Improved schemes for visual cryptography’ Designs, Codes and Cryptography, vol. 24, pp. 255– 278. Ateniese G., Blundo C., De Santis A., and Stinson D. R. (1996), ‘Visual cryptography for general access structures’ Inf. Computat., vol. 129, pp. 86–106. Prakash N. K. and Govindaraju S. (2007), ‘Visual secret sharing schemes for color images using halftoning’ in Proc. Int. Conf. Computational Intelligence and Multimedia Applications (ICCIMA 2007), vol. 3, pp. 174–178. Luo H., Yu F.X., Pan J. S., and Lu Z. M. (2008), ‘Robust and progressive color image visual secret sharing cooperated with data hiding’ in Proc. 2008 Eighth Int. Conf. Intelligent Systems Design and Applications, vol. 3, pp. 431–436. Hou Y. C. (2003), ‘Visual cryptography for color images’ Pattern Recognit., vol. 1773, pp. 1–11. http://en.wikipedia.org/wiki/Lempl-Ziv-Welch http://www.sourcefordgde.com. http://www.ieice.org/eng/shiori/mokuji.html
Authors:
Bhagyshri Lachhwani, Mehul Barot, Poonam Sengar
Paper Title:
Incremental Sequence Mining
Abstract: We are given a large database of customer transactions, where each transaction consists of customer-id, transaction time, and the items bought in the transaction. The discovery of frequent sequences in temporal databases is an important data mining problem. Most current work assumes that the database is static, and a database update requires
60-64
65-69
rediscovering all the patterns by scanning the entire old and new database. We consider the problem of the incremental mining of sequential patterns when new transactions or new customers are added to an original database. In this paper, we propose novel techniques for maintaining sequences in the presence of a) database updates, and b) user interaction (e.g. modifying mining parameters). This is a very challenging task, since such updates can invalidate existing sequences or introduce new ones. In both the above scenarios, we avoid re-executing the algorithm on the entire dataset, thereby reducing execution time. Keywords: Data mining, frequent sequences, minimum support, sequential pattern. References: 1. 2. 3. 4.
M. J. Zaki. Efficient enumeration of frequent sequences. In 7th CIKM, 1998. Florent Masseglia; Pascal Poncelet; Maguelonne Teisseire;, “Incremental mining of sequential patterns in large databases,” Data & Knowledge Engineering, pp. 97-121, 2003. S. Parthasarathy; M. Zaki; M. Ogihara; S. Dwarkadas; , “Incremental and interactive sequence mining,” In Proceedings of the 8th International Conference on Information and Knowledge Management (CIKM’ 99), pp. 251–258, 1999. J. Ayres; J. Gehrke; T. Yiu; J. Flannick; , “Sequential pattern mining using a bitmap representation,” In Proceedings of ACM SIGKDD International Confer ence on Knowledge Discovery and Data Mining, pp. 429–435, 2002.
Authors:
Siva Sankara Raju R, Karun Kumar Y, Pragathi Kumar G
Paper Title:
Design and Analysis of Rocket Motor Casing by Using Fem Technique
Abstract: This paper deals with the design of solid rocket mainly consists of determining the thickness of motor casing which includes the domes at head end, nozzle end and flange for bolted joints. Modeling of solid rocket motor components and its assembly is done in CATIAV5R19. Stress distributions are due to the effect of working stress developed in the components. The maximum working stress is compared with allowable yield stress of the material. Final conclusion brings out a well designed solid rocket motor for the effective storage of propellant for obtaining the required impulse. 2D Axi Symmetric structural analysis for solid propellant rocket motor Casing is performed to determine the stress level of all components using ANSYS 12.0.. Keywords: Design, Analysis, Rocket Thrust Motor. References:
14.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
15. 16. 17. 18. 19.
15.
ASME Pressure vessel code section VIII division 2. NASA SP-8025,”Solid rocket motor metal cases”, April 1970(N72-18785). Model Rocket Construction By Phil Charles Worth, Ukra. Davanas , G.E. Jensen and D. W. Netzer (Eds),”Solid rocket motor design” chapter 4 of tactical missile propulsion vol. 170,progress in aeronautics and astronautics,AIAA,1996. pp 323-379 Alexander blake “Design of mechanical joints”.vol.42 pp:542-553 Twitchell, S. E., Solid Rocket Motor Internal Insulation, SP-8093, NASA, December 1976. NASA SD-805,”Solid rocket motor igniters”, March 1971(N71-30346). ATK Space Propulsion Products Catalog, May 2008, pp. 30 David Heckman, Finite element analysis of pressure vessels, MBARI 1998 George P. Sutton, ‘Rocket propulsion elements’ consultant formerly laboratory associate, Lawrence Livermore national laboratory. ISBN-13: 9780471838364 NASA SP-8039,”Solid rocket motor performance prediction and analysis”, May 1971(N72-18785). NASA SP-8064,”Solid propellant selection and characterization”, June 1971(N72-13737). Sutton, George P. (2000). Rocket Propulsion Elements;7 edition. Wiley-Interscience. ISBN 0-471-32642-9. L. Strand, “Laboratory test methods for combustion-stability properties of solid propellants,” in Nonsteady Burning and Combustion Stability of Solid Propellants, L. De Luca, E. W. Price, and M. Summerfield, Eds., vol. 143 of Progress in Astronautics and Aeronautics, pp. 689–718, American Institute of Aeronautics and Astronautics,Washington, DC, USA, 1992. Ansys 12.0 help desk “Solid Rocket Motor.” http://en.wikipedia.org/wiki/Solid_rocket_motor, en: User: Pbroks13, 19 May 2008. Sutton, G. P. and Biblarz, O., Rocket Propulsion Elements, 7th ed., John Wiley and Sons, New York, 2001 Design Method In Solid Rocket Motors AGARD Lecture Series No.150 Revised Version 1988 (North Atlantic Treaty Organization Advisory Group For Aerospace Research And Development).
Authors:
Mahendra .U. Gaikwad, P.R. Kulkarni
Paper Title:
Static and Dynamic Analysis of End Mill Tool for Chatter Vibration Reduction
Abstract: Milling is a very commonly used manufacturing process in the industry due to its versatility to generate complex shapes in variety of materials at high quality. Due to the advances in machine tool , CNC, CAD/CAM, cutting tool and high speed machining technologies in last couples of decades ,the volume and the importance of milling have increased in key industries such as aerospace ,die/ mold, automotive and component manufacturing. But however the unstable machining (namely chatter vibration) is one of the main limitations for high speed machining which shortens the tool life and decreases machined surface quality. In this paper static and dynamic analysis of end mill tool with different geometry is carried out by Finite element analysis (FEA), also some practical equations are developed to predict the static and dynamic properties of end mill tool And the results obtained by both the methods are nearly same. However in case of static analysis amount of deflection of tool for a particular value of cutting force can be easily determined, while in case of dynamic (modal) analysis natural frequencies and mode shapes can be determined. Keywords: CNC, CAD / CAM, (FEA). References: 1. 2.
E.B. Kivanc, E. Budak, Structural modeling of end mills for form error and stability analysis, International Journal of Machine Tools & Manufacture 44 (2004) A. Tekeli and E. Budak, Maximization of chatter-free material removal rate in end milling using analytical methods, Machining Science and
70-74
75-77
3. 4. 5.
Technology,2005, 9:147–167 Nam H. Kim et al, Numerical Analysis and Parameter Study of a Mechanical Damper for use in long Slender End mills, International Journal of Machine Tools & Manufacture, 2006;46, 2005: 500–507. E. Budak, Analytical models for high performance milling. Part I: Cutting forces, structural deformations and tolerance integrity, International Journal of Machine Tools & Manufacture 46 (2006) 1478–1488 T. Prem Singh Inbaraj* and M. Vinoth: Dynamic Analysis Of Milling Machine Chatter Vibration Reduction, Journal of Mechanical Sciences, Vol. 1, No. 1, pp 48‑58,(2007)
Authors:
Shashank Mittal, Reshu Nautiyal, Swati Mamgain, Kumud Pant,Tribhuvan Chandra
Paper Title:
Signature Patterns for Major Virulent Proteins of HIV1
Abstract: Realizing the importance of understanding major virulent proteins of HIV we are attempting to unravel various amino acid signatures that exist for two major proteins in HIV i.e. Gag and Env. The results have been obtained through freely available software VESPA available at HIV database project funded by the Division of AIDS of the National Institute of Allergy and Infectious Diseases (NIAID), a part of the National Institutes of Health (NIH). The results obtained help us to understand the sites in proteins which can be hot spot of mutations or sites where propensity of finding different amino acid exists. This is a novel work where signature patterns for various HIV proteins have been deduced. Keywords: HIV, AIDS, (NIAID), (NIH). 16. References: 1. 2. 3. 4. 5.
6. 7.
Molecular Epidemiology of HIV Transmission in a Dental Practice, Chin-Yih Ou et.al. SCIENCE * VOL. 256 * 22 MAY 1992. J. S. Smith etal., N. Engi. J. Med. 324, 205 (1991); H. J. Un etal., J. Infect. Dis. 164, 284 (1991); G. P. Holmes et al., Ann. Intem. Med. 112, 833 (1990); R. Rico-Hesse, M. A. Pallansch, B. K. Nottay, 0. M. Kew, Virology 160, 311 (1987). P. Balfe et al., J. Wrol. 64, 6221 (1990). G. Myers et al., Eds., "Human retroviruses and AIDS 1991: A compilation and analysis of nucleic acid and amino acid sequences," (Theoretical Division, T10, Los Alamos National Laboratory, Los Alamos, NM, 1991). Ou C-Y, Cielsielski CA, Myers G, Bandea CI, Luo C-C, Korber BTM, Mullins JI, Shochetman G, Berkelman RL, Nikki Economou AN, Witte J, Furman LJ, Satten GA, MacInnes KA, Curran JW, and Jaffe HW: Molecular epidemiology of HIV transmission in a dental practice. Science, 1992 May; 256(5060):1165-71. B. Korber and G. Myers: Signature Pattern Analysis: A Method for Assessing Viral Sequence Relatedness. AIDS Research and Hum. Retroviruses, 1992 Sep; 8(9):1549-60. The UniProt Consortium, Reorganizing the protein space at the Universal Protein Resource (UniProt) Nucleic Acids Res. 40: D71-D75 (2012).
Authors:
Ahmad Kamil Arshad, Frag Ahmed Ma Kridan, Mohd Yusof Abdul Rahman
Paper Title:
The Effects of Sasobit® Modifier on Binder at High and Intermediate Temperatures
78-80
Abstract: Research in the laboratory was carried out to determine if the addition of warm mix asphalt additive (sasobit®) has effects on the stiffness of the virgin bitumen and if the modified bitumen has the potential to increase the amount of Reclaimed Asphalt Pavement (RAP) used in warm mix asphalt. To fulfil this purpose, two types of samples have been prepared.The first was identified as control samples (virgin bitumen 80/100 penetration grade). The other was modifed using the same bitumen penetration grade with sasobit-additive in concentrations from 1% to 3 % by weight of binder at intervals of 0.5%, identified as saso mixes. Both groups were subjected to viscosity test at high service temperatures (115, 125, 135 °C) and intermediate service temperatures (70, 80, 95°C) as well as penetration test to all samples at 25°C to determine the effect of sasobit additive on binder at ambient temperature. The results showed significant reduction in penetration value to all samples in all concentrations of the modifier on the bitumen. The results also showed decrease in viscosity values at high service temperatures to all modified samples compared to that of control samples. However, these values increased at intermediate temperatures to confirm the similar trend in penetration values, which indicated that the addition of sasobit on virgin binder increase the stiffness at low and intermediate temperatures. With regard to incorporating the recovered binder from RAP, the same trend was observed at high service temperature of 135°C to modified samples at sasobit concentration of 1.5% . This may assist in increasing the amount of RAP materials used with this modifier in the mix compared to the amount allowed in conventional mix. 17.
Keywords: Warm Mix Asphalt, Sasobit additive, viscosity, high service temperature, intermediate service temperature, Reclaimed Asphalt Pavement. 81-84 References: 1. 2. 3. 4. 5. 6. 7. 8.
9. 10. 11. 12. 13.
Arif,C.and Joe, W. B. Review Of Warm MixAsphalt.SWUTC/08/473700-00080-1..TexasTransportation Institute. Texas A&M University System College Station.Texas 777843-3135. 2008. Austroads. Warm Mix Asphalt(WMA) Review. Austroads Technical Report AP-T91/07,Sydney,2007. Austroads,. Review of the Environmental Aspects of Warm Mix Asphalt. Austroads Publication No. AP–T163/10,2010. Brian, D. P. and Graham, C. H. (2005), August). Starting to Warm. [Accessed October 5, 2009 ] www.NACT.com. Frag Ahmed Ma Kridan,Ahmad Kamil Arshad and Mohd Yusof Abdul Rahman. (2010). Development of Warm Mix Asphalt and Compliance WithThe Requirements Set By Specifications. European Journal of Scientific Research ISSN 1450-216X Vol.48 No.1, 2010, page, 118-128. FHWA. (2009, June). Warm Mix Technologies and Reseaerch. Federal High Administration.US.Department Of Transportation.[Accessed October 17, 2009] http:/ /www. fhwa.dot.gov/pavement/wma.html. JKR, SPJ. 20403 . 00030 Standard Specification For Road Works. Section 4 Flexible Pavement.Jabatan. Kerja Raya Malaysia, Kuala Lumpur,2008. John, D. A., Eric, H., John, B., Gaylon, B., Matthew, C. and JACK, C,. Warm Mix Asphalt: European Practice. FHWA-PL-08-007,Office Of International Programs Office of Policy Federal Highway Administration,US.Department Of Transportation American Association Of State of Highway and Transportaion Officials National Cooperative Highway Research Program.,2008. Kristjansdottir, O,. Warm Mix Asphalt For Cold Weather Paving. A thesis For Partial Fulfillment Of the DegreeOfMasterOf Science in Civil Engineering.University Of Washongton.Seattle.Washongton, 2006. M.O. Hamzah, A. Jamshidi, and Z. Shahadan,. Effects of Sasobit® on the Required Heat Energy and CO2 Emission on Blended Asphalt Binder Incorporated With Aged Binder. European Journal of Scientific Research. ISSN 1450-216X Vol.42 No.1, 2010, pp.16-24. NABA. The Role Of Research In Addressing Climate Change In Transportation Infrastructure, testimony of Mike Acott,. 2009. Newcomb, D,. Warm Mix .The Wave Of TheFuture, HMAT, 2005. Olof Kristjansdottir, Stephen, T. M., Larry, M. and Gloria, B,. Assessing Potential For Warm Mix Asphalt Technology. Adoption. Transportation Research Board:Journal Of the Transportation Research Board .No. 2040 Transportation Research Board Of the National Academics. Washington,
D.C, 2007, pp.91-99. 14. SasolWax,http://www.sasolwax.com/Sasobit_Technology.html. [Accessed December 12, 2009] 15. Stacey, D. D., Kevin, K. M. and Bridget, M. D,. Installation Of Warm Mix Asphalt Projects In Virginia. Virginia DepartmentOf Transportation1401 E.Broad Street Richmond .VA23219 .FHWAP.O .Box 10249 Richmond .va23240. FHWA /VTRC 07-R25, 2007.
Authors:
S. Ghanbarnezhad , A. Nemati, M. Bavand-Vandchali, R. Naghizadeh
Paper Title:
Effect of TiO2 in Spinel Formation and Reactive Sintering of Magnesia-rich Ceramics
Abstract: The solid solubility of magnesia in magnesium -aluminate spinel and magnesium-aluminate spinel in magnesia does not change with temperature thus not creating bonds over periclase grains in single stage sintering process. In the present study, magnesia and alumina powders along with tetravalent oxide (TiO2) additive was analyzed for its role in reactive densification of spinel in single stage firing process in order to achieve a better binding system for magnesia-based refractories. This tetravalent oxide on reaction with magnesia from spinel solid solution with MgAl2O4 as they have similar crystal structure. The spinel solid solution formed using oxide additive is expected to higher solubility in magnesia than magnesium- aluminate spinel, resulting in improvement of the bonding during sintering through increased in solid solubility at elevated temperatures, similar to the complex spinel in magnesia-chrome refractories. The formation of spinel during firing remains as a second phase that retards the grain growth of periclase. Keywords: Densification, Periclase, Reaction sintering, Spinel Solid solution, tetravalent oxide. References: 1. 2. 3. 4. 5. 6. 7.
18.
8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35.
19.
E. Ryshkewitch, Oxide ceramics, Academic Press, New York, 1960, 257-274. S,Banerjee. Monolithic Refractories A Compre- hensive Handbook, World Scientific Publishing, 1998, 33-34. Refractories Handbook,The Technical Association of Refractories, June, Japan, 1998, 163-164. G. Ye, G. Opera, T. Troczynski, Synthesis of MgAl2O4 spinel powder by combination of sol-gel and precipitation processes, Journal of the American Ceramic Society, 88(11) , (2005), 3241-3244. A. Ghosh, R. Sarkar, B. Mukherjee and S.K. Das, Effect of spinel content on the properties of magnesia -spinel composite refractory, J. Eur, Ceram, Soc24, (2004), 2079-2085. H. Makino, T. Obana and A. Tsuchinari, Effect of TiO2 concentration on properties of MgO-TiO2-Al2O3 clinker and MgO refractories with clinker addition" Journal of the technical association of refractories, Japan, 25]2[,(2005) 105-108. A. Ikesue, J. Yoshitomi, H. Shikano and T. Eguchi, Formation of precipitated complex spinel in magnesium-chrome refractories and its characteristic- s, Interceram, 41 (6), (1992), 406-412. R.E Carter, Mechanism of Solid State Reaction Between MgO-Al2O3 and MgO-Fe2O3, J. Amer. Ceram. Soc, 44(3) (1965), 116-120. A. Ghosh, S.K. Das, J.R. Biswas, H.S. Tripathi and G.Bannerjee, The effect of ZnO additionon the densification and properties of magnesium aluminate spinel, Ceramics International, 26 (6), (2000), 605-608. R.Sakar, G.Bannerjee, Effect of Addition of TiO2 on Reaction Sintered MgO-Al2O3 spinels, J. Eur, Ceram, Soc, 20 (12), (2000), 2133-2141. R. Lodha, T. Troczynaski and G. Oprea, Role of oxide additives in the synthesis and sintering of magnesium aluminate spinel, Interceram, 57(5), (2008), 324-329. C.A.Schacht: Refractories Handbook, Marcel Dekker Inc.,New York ,2004, 215-257. R. Lodha, T. Troczynaski and G. Oprea, Role of Ti4+ and Sn4+ ions in spinel formation and reactive sintering of magnesia-rich ceramics, Ceramic International, 37, (2011), 465-470. R. Naghizadeh, R.H. Rezaie, F. Golestani-fard Effect of TiO2 on phase evolution and microstructure of MgAl2O4 spinel in different atmospheres, Ceramic International 37, (2010), 349-354. Solmaz Ghanbarnezhad Education: M.S,. In Ceramic Engineering, in the Department of Materials Engineering, Science & Research Branch, Islamic Azad University, Tehran, Iran, 2012. Thesis: The effect of TiO2 on physical, mechanical, thermo-mechanical properties, coating and corrosion resistance of chrome-free basic brick. B.S,. In Ceramic Engineering, Maybod University, Islamic Azad University , Yazd, Iran , 2006. Research work: Ceramics, Refractories, Sensor and Podwer synthesis. Some publications: 4th EFRS, JOMB journal, 6th ISR, ICEEA, ICESD,… Ali Nemati Education: Ph.D., In Materials Science and Engineering (Ceramic major) Case Western Reserve University, Cleveland , Ohio, USA, 1994. Dissertation: The effects of Ce Doping on the PTCR effects of Barium Titanate Advisors: Professor M.R. DeGuire & Professor M. Tabib Azar M.S., In Ceramic, Iran University of Science and Technology, Tehran, Iran, 1988. Thesis: Stabilization and Transformation Toughening in Zirconia Ceramics. B.S., In Ceramic, Iran University of Science and Technology, Tehran, Iran, 1985. PROFESSIONAL AFFILIATIONS: Iranian Ceramic Society, (member & a member of Board of the Society) Iranian Metallurgical Society, (member) Center of excellence in Adv. Eng. Materials, ( Head and member) Member of Biomedical Research Center of Sharif American Ceramic Society (Former member- While living in the USA) Mohamad Bavand-Vandchali Education: Ph.D., Department of Metallurgy & Material Engineering, Iran University of Science & Technology (IUST), Tehran, Iran. M.S., Department of Metallurgy & Material Engineering, Iran University of Science & Technology (IUST), Tehran, Iran. B.S., Department of Metallurgy & Material Engineering, Iran University of Science & Technology (IUST), Tehran, Iran.
Authors:
Sheeja Agustin A, S. Suresh Babu
Paper Title:
A Review of Thyroid Disorder Detection, Segmentation and Classification on Medical Images
Abstract: Thyroid is a small butterfly shaped gland located in the front of the neck just below the Adams apple. Thyroid is one of the endocrine gland, which produces hormones that help the body to control metabolism. Different thyroid disorders include Hyperthyroidism, Hypothyroidism, goiter, and thyroid nodules (benign/malignant). Ultrasound imaging is most commonly used to detect and classify abnormalities of the thyroid gland. Other modalities (CT/MRI) are also used. Computer aided diagnosis (CAD) help radiologists and doctors to increase the diagnosis accuracy, reduce biopsy ratio and save their time and effort. Numerous researches have been carried out in thyroid medical images and that are utilized for the diagnosis process. In this paper, a broad review on the researches that are developed for the thyroid diagnosis using medical images is presented along with the classification. A short description about thyroid, thyroid diseases and thyroid diagnosis are also presented.
85-87
88-93
Keywords: Medical imaging, Thyroid, Thyroid disorders, Segmentation, Classification. References: 1. 2. 3.
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29.
20.
Chuan-Yu Changet al. “A Neural Network for Thyroid Segmentation and Volume Estimation in CT Images”, November 2011 IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE, pp 43-55 Jianrui Ding et al. “A novel quantitative measurement for thyroid cancer detection based on elastography”, 4th International Congress on Image and Signal Processing 2011 Chuan-Yu Chang et al. “Thyroid Segmentation and Volume Estimation in Ultrasound Images”, IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING, VOL. 57, NO. 6, JUNE 2010Chuan-Yu Chang et al. “Classification of the Thyroid Nodules Using Support Vector Machines”, International Joint Conference on Neural Networks (IJCNN) 2008 Deepika Koundal1 et al.,” Computer-Aided Diagnosis of Thyroid Nodule: A Review”,International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.4, August 2012 Singh1 and Mrs Alka Jindal,” A segmentation method and classification of diagnosis for thyroid nodules”, . IOSR Journal of Computer Engineering (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 6 , PP 22-27,2012 Edgar Gabriel et al. “Towards high performance cell segmentation in multispectral fine needle aspiration cytology of thyroid lesions”, computer methods and programs in biomedicine, pp 1-10 M. Savelonas et al. “Variable Background Active Contour Model for Automatic Detection of Thyroid Nodules in Ultrasound Images”, Dept. of Informatics and Telecommunication Nasrul Humaimi Mahmood and Akmal,” Segmentation and Area Measurement for Thyroid Ultrasound Image”, International Journal of Scientific & Engineering Research Volume 2, Issue 12, December 2011 Dimitris E. Maroulis,” Variable Background Active Contour Model for Computer-Aided Delineation of Nodules in Thyroid Ultrasound Images”, IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 11, NO. 5, SEPTEMBER 2007 http;//www.nlm.nih.gov/medlinep/us/ency/article/000371.htm http://www.wikipedia.com http://thyroid.about.com/library/weekly/qathyroid 101-e.htm http://ww.medicinenet.com/script/main/at.asp Preeti Aggarwal et al. “Role of Segmentation in Medical Imaging: A Comparative Study” International Journal of Computer Applications (0975 – 8887) Volume 29– No.1, September 2011 Nikita Singh et al. “ A Segmentation Method and Comparison of Classification Methods for Thyroid Ultrasound Images” International Journal of Computer Applications (0975 – 8887) Volume 50 – No.11, July 2012 Eystratios G.et al.” ΤND: A Thyroid Nodule Detection System for Analysis of Ultrasound Images and Videos” Springer Science+Business Media, LLC 2010 Eleonora Horvath et al.” An Ultrasonogram Reporting System for Thyroid Nodules Stratifying Cancer Risk for Clinical Management”, J Clin Endocrinol Metab 90: 1748–1751, 2009 Yutaka Hatakeyama et al. “Algorithm for Estimation of Thyroid Gland Size in Ultrasonography Images for Extracting Abnormal Thyroid in Medical Practice” Journal of Advanced Computational Intelligence and Intelligent Informatics Vol.16 No.1, 2012 Mary C. Frates et al. “Management of Thyroid Nodules Detected at US: Society of Radiologists in Ultrasound Consensus Conference Statement” Management of Thyroid Nodules Detected at US Volume 237 , Number 3 M.Seetha et al.” ARTIFICIAL NEURAL NETWORKS AND OTHER METHODS OF IMAGE CLASSIFICATION”, Journal of Theoretical and Applied Information Technology,2008 Won-Jin Moon et al.” Benign and Malignant Thyroid Nodules: US Differentiation—Multicenter Retrospective Study” Radiology: Volume 247: Number 3—June 2008 U Rajendra Acharya et al.” Automated Benign & Malignant Thyroid Lesion Characterization and Classification in 3D Contrast-Enhanced Ultrasound”34th Annual International Conference of the IEEE EMBS San Diego, California USA, 28 August - 1 September, 2012 Skrgio Okida et al. “Expert System to Support the Diagnosis of Thyroid Nodules”, Proceedings of the 22"' Annual EMBS international Conference, July 23-28,2000, Chicago IL. D.E. Maroulis et al. “Computer-Aided Thyroid Nodule Detection in Ultrasound Images”, Proceedings of the 18th IEEE Symposium on ComputerBased Medical Systems (CBMS’05) 2005 IEEE Konstantinos K. Delibasis et al.” Computer-Aided Diagnosis of Thyroid Malignancy Using an Artificial Immune System Classification Algorithm”, IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 13, NO. 5, SEPTEMBER 2009 Elpiniki I. Papageorgiou et al.” Fuzzy cognitive map based decision support system for thyroid diagnosis management”, IEEE International Conference on Fuzzy Systems(FUZZ ) 2008. Michalis A. Savelonas et al” Active Contours Guided by Echogenicity and Texture for Delineation of Thyroid Nodulesin Ultrasound Images”, IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, VOL. 13, NO. 4, JULY 2009 Jieming Ma et al. “Differential Diagnosis of Thyroid Nodules with Ultrasound Elastography based on Support Vector Machines” , IEEE International Ultrasonics Symposium Proceedings 2010 D.Selvathi et al. “Thyroid Classification and Segmentation in Ultrasound Images Using Machine Learning Algorithms” Proceedings of International Conference on Signal Processing, Communication, Computing and Networking Technologies (ICSCCN) 2011
Authors:
Sajid Ullah Khan,Wang Yin Chai, Chai Soo See
Paper Title:
A Novel Noise Removal Technique of X-Ray Carry-on Luggage for Detection of Contraband/Illicit Object(s)
Abstract: Luggage inspection systems play an important role in ensuring national security at airports. In this paper, a novel approach of noise removal from dual energy X-ray images is proposed to ensure the national security at airport. This novel approach is used as a key step in our previous framework to get perfect results. High Energy and Low Energy x-ray images are combined, de-noise it with the proposed novel approach and at the end enhance the fused image with histogram specification to improve the contrast. The final image did not only contains the details, but is also background-noisefree and contrast-enhanced, therefore easier to segment automatically or be interpreted by screeners, thus reducing the false alarm rate in X-ray luggage inspection. It is observed that the proposed approach is more suitable for screeners in detecting contraband/illicit objects than using other conventional techniques. 94-99 Keywords: dual Energy x-ray Image enhancement, image restoration, image fusion, De-noising, Histogram specification. References: 1. 2. 3. 4. 5.
Gozani, “The role of neutron based inspection techniques in the post 9/11/ 01 era”,Volume 213, January 2004, Pages 460–463 A. Buffler a, J. Tickner b, “Detecting contraband using neutrons: Challenges and future directions”, Volume 45, Issue 10, December 2010, Pages 1186–1192 George Zentai, “X-ray imaging for homeland security”, Int. J. Signal and Imaging Systems Engineering, Vol. 3, No. 1, 2010 S. Singh and M. Singh, "Review Explosives Detection Systems (EDS) for Aviation Security" Signal Processing, vol. 83, pp. 31-55, 2003 Alexey Guilarte Noa and Edel B, Image Processing Methods for X-Ray Luggage Images: A Survey, Oct, 2011.
6. 7. 8. 9. 10. 11. 12.
13. 14.
Andy Buffler, “Contraband detection by fast neutron scattering”,2ndNational Nuclear Technology Conference, May 13–15, NAC, South Africa (2001) Pawan Patidar, Manoj Gupta,”Image De-noising by Various Filters for Different Noise”, International Journal of Computer Applications (0975 – 8887) Volume 9– No.4, November 2010 James C. Church, Yixin Chen, and Stephen V. Rice Department of Computer and Information Science, University of Mississippi, “A Spatial Median Filter for Noise Removal in Digital Images”, IEEE, page(s): 618-623, 2008. Kenneth.R. Castleman, Translated by ZHU zhigang etc.1998.DIGITAL IMAGE PROCESSING [M].Beijing: Electronic and Industrial Press J.Harikiran, B.Saichandana, B.Divakar, “Impulse Noise Removal in Digital Images”, International Journal of Computer Applications (0975 – 8887) Volume 10– No.8, November 2010 M. Jaya Manmadha Rao, Dr.K.V.V.S.Reddy, “Image Fusion Algorithm for Impulse NoiseReduction in Digital Images”, Global Journal of Computer Science and TechnologyVolume 11 Issue 12 Version 1.0 July 2011 Zhiyu Chen; Yue Zheng; Abidi, B.R.; Page, D.L.; Abidi, M.A.; , "A Combinational Approach to the Fusion, De-noising and Enhancement of DualEnergy X-Ray Luggage Images," Computer Vision and Pattern Recognition - Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on, vol., no., pp.2, 25-25 June 2005 doi: 10.1109/CVPR.2005.386 ZhiYu Chen; Abidi, B.R.; Page, D.L.; Abidi, M.A.; "Gray-level grouping (GLG): an automatic method for optimized image contrast enhancement part II: the variations," Image Processing, IEEE Transactions on, vol.15, no.8, pp.2303-2314, Aug.2006 doi: 10.1109/TIP.2006.875201 X-ray images, Department of Computer Science Engineering Universidad.
Authors:
Adebayo, I.G., Adejumobi, I.A., Olajire, O.S. Power Flow Analysis and Voltage Stability Enhancement Using Thyristor Controlled Series Capacitor Paper Title: (TCSC) Facts Controller Abstract: Power demand increased steadily while the expansion of power generation and transmission has been severely limited due to the inadequate resources and environmental forces. As a result of this, some transmission lines are heavily loaded and the system stability becomes a power transfer-limiting factor. Hence, power flow analysis and Voltage stability enhancement are of paramount essential for a secure power system operation. Presented in this paper is the application of Thyristor Controlled Series Capacitor (TCSC) for power flow analysis and voltage control of Nigerian 330kV grid system. Power flow equations involve solution to nonlinear algebraic equations using mathematical algorithms. In this work, the Newton Raphson iterative algorithm was used for solving the power flow problems due to its ability to converge very fast with small number of iteration. Simulation of power flow solutions with and without TCSC was done using MATLAB 7.90 based programme . Where voltage drops were noticed at the load bus, especially, voltages at buses 9 (Ayede.), 13(New Heaven), 14(Onitsha),and 16(Gombe),TCSC was incorporated to regulate the voltage magnitude at those buses. The application of TCSC improved the voltage profile of the system and furthely enhanced the power flow . Keywords: TCSC; FACTS; Voltage Stability;Power flow, voltage magnitude References: 21.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
22.
S. Sakthivel, D. Mary and M. Deivarajamani, ‘Reactive power planning for voltage stability limit improvement with FACTS Devices in most critical contingency condition’ European Journal of Scientific Research ISSN 1450-216 Vol.66 No.3 2011, pp. 408-420 S.Hadi, “power system analysis” published by McGraw-Hill publishing company limited, New York. 2006 Pp189-237. H. Saadat, “Power System Analysis”. Tata McGraw-Hill publishing company limited, New York. 2002 pp.189-237. E. Acha, H. Ambriz-Perez, C.R. Fuerte-Esquivel, C.S. Chua, “On the Auditing of Individual Generator Contributions to Optimal Power Flows, Losses and Costing of Large, Interconnected Power Networks”, IPEC’97 Proc., Volume II, Nanyang University, Singapore, May 1997, pp. 22–24. G.A. Adepoju, and O.A. Komolafe, “power injection model of high voltage Direct current-voltage source converter for power Flow Analysis”, proceedings of international Conference on power system Analysis, control, and Optimization (PASCO), india, 2008 8pp.67-72. E. Acha, ‘Tracing Wind Power in a Pooled Transmission System’, EPSOM’98, Zurich,Switzerland, September 1998, pp. 23–25. E. Acha,, C.R.Fuerte-Esquivel, C.S. Chua , ‘On the Auditing of Individual Generator Contributions to Power Flows and Losses in Meshed Power Networks’, RVP 96- SIS-10,Reunion de Verano de Potencia, IEEE Seccio´n Me´xico, Acapulco Gro., Mexico, July 1996, pp. 170–173. R. Amold, “Solutions to the power quality problem”.Power Eng. J., 15:2001 pp. 65-73. L. Gyugyi, k.k. Sen. And C.D. Schauder, ‘‘The interline Power Flow Controller Concept: a New Approach to Power Flow Management in Transmission Systems”, IEEE Trans. PWRD,14(3) 1999, pp.1115-1123. L. Dedek , “Loss minimization in the modified Algorithm of load flow analysis in industrial power system”, 2002 pp33-50. N.G.Hingorani, and L. Gyugyi, “Understanding,FACTS concepts and Technology of flexible AC transmission systems”. IEEE Press, New York. M.Nadarajah, A. C. Claudio, R. John and J.R. Graham “comparisons of PSS,SVC, and STATCOM Controller for Damping Power System Oscillations”, IEEE Trans. On Power System, Vol. 18, No. 2, May 2003, pp.786-792. O.S. Onohaebi, and S.T. Apeh, , “Voltage Instability in Electrical Network: A Case study of the Nigerian 330kV Transmission Grid,” Research Journal of Applied Sciences, vol. 2, no. 8,2007 pp. 865-874. O.A. Komolafe, and M.O. Omoigui, “An Assessment of Reliability of Electricity Supply in Nigeria”, Conference Proceedings of the 4th International Conference on Power Systems Operation and Planning (ICPSOP), Accra, Ghana, July 31 – August 3, 2000, pp.89 – 91. S.H Barbani, and K. M. Amit, “load flow study in power system” A published thesis submitted for the Degree of Bachelor of Technology in Electrical Engineering Department,Rourkela.
Authors:
Vishnupriya.A, AlthafKhan.J, Gopalakrishnan.R
Paper Title:
A Fast Serial Multiplier Design using Ripple Counters
Abstract: Multipliers are the fundamental components of many digital systems. Low power and high speed multiplier circuits are highly demanded. It is not possible to achieve both the criteria simultaneously.Therefore, there exists some tradeoff between speed and power consumption in the design of a binary multiplier.The partial product (PP) formation and reduction of the partial product tree height in serial multipliers is our primary concern. In existing CSAS architecture of partial product formation is carried out in 2n clock cycles, where n is the number of operand bits. Here, the critical path is along the full adders and AND gates. The disadvantage of this method is increased delay as it involves 2n computational clock cycles. This disadvantage is overcome by using the concept of data accumulation by ripple counters. Column compression technique is used for the reduction of partial product tree height. Unlike the CSAS architecture, the critical path in this technique is found only along the AND gates. The partial product formation is done in n clock cycles instead of 2n clock cycles and hence delay is reduced. Moreover, the counters change states only when input is ‘1’, which leads to low switching power.The final product is computed by the Ripple carry adder (RCA) in both the above architectures. RCA is replaced by KSA for improved performance. The average connection delay in the multiplier architecture due to KSA is reduced and is expressed in terms of nano seconds.
100-104
105-110
Keywords: Binary multiplication, Partial product, Ripple counters, Serial multiplier. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29.
K. Lenstra and E. Verheul, “Selecting cryptographic key sizes,”J.Cryptology, vol. 14, no. 4, pp. 255–293, 2001. N. R. Strader and V. T. Rhyne, “A canonical bit-sequential multiplier,” IEEE Trans. Comput., vol. C-31, no. 8, pp. 791–795, Aug. 1982. R. Gnanasekaran, “On a bit-serial input and bit-serial output multiplier,”IEEE Trans. Comput., vol. C-32, no. 9, pp. 878–880, 1983. R. Gnanasekaran, “A fast serial-parallel binary multiplier,” IEEE Trans. Comput., vol. C-34, no. 8, pp. 741–744,1985. P. Ienne and M. A Viredaz, “Bit-serial multipliers and squarers,” IEEE Trans. Comput., vol. 43, no. 12, pp. 1445–1450,1994. Mark Vesterbacka, Kent Palmkvist, and Lars Wanhammar, “Serial squarers and serial/serial multipliers”. A. D. Booth, “A signed binary multiplication technique,” Quarterly J.Mechan.Appl. Math., vol. 4, no. 2, pp. 236–240, 1951. C.P. Lerogue, P.Gerard, and J.S. Colardelle, “ A fast 16- bit NMOS parallel multiplier”, IEEE Journal of Solid-state circuits, Vol. 19, no.3, pp. 338342, Mar 1984. Jin-HaoTu and Lan-Da Van, “Power-Efficient PipelinedReconfigurable Fixed-Width Baugh-Wooley Multipliers” IEEE Transactions on computers, vol. 58, No. 10, October 2009. A. Dandapat, S. Ghosal, P. Sarkar, D. Mukhopadhyay (2009), “A 1.2- ns16×16-Bit Binary Multiplier Using. High Speed Compressors”, International Journal of Electrical, Computer, and Systems Engineering, 2009, 234-239. William J. Stenzel, William J. Kumitz,Member IEEE, GillesH.Garcia, “Compact High- Speed Parallel Multiplication Scheme” IEEE Trans. Comput. C-26:948-957(1977). S. Haynal and B. Parhami, “Arithmetic structures for inner-product and other computations based on a latency-free bit-serial multiplierdesign,”presented at the 13th AsilomarConf. Signals, Syst. Comput., Geneva, Switzerland, 1996. ManasRanjanMeher, Ching-ChuenJong,Chip-Hong Chang “High-Speed and Low-Power Serial Accumulator for Serial/Parallel Multiplier” IEEE Xplore,2010. Parhami, Computer Arithmetic: Algorithms and Hardware De-signs. New York: Oxford Univ. Press, 2009. R. Menon and D. Radhakrishnan, “High performance 5:2 compressor architectures,”IEEProc-Circuits Devices Syst., vol. 153, no. 5, pp.447–452, Oct. 2006. G. Bi and E. V. Jones, “High-performance bit-serial adders andmultipliers,”IEEProc G-Circuits Devices Systs, vol. 139, no. 1, pp.109–113, Feb. 1992. “A High Bit Rate Serial-Serial Multiplier With On-the-Fly ccumulation by Asynchronous Counters”ManasRanjanMeher, Student Member, IEEE, ChingChuen Jong, and Chip-Hong Chang, Senior Member, IEEE, IEEE transactions on very large scale integration (VLSI) systems, 2011. Y.Kim and L.S .Kim, “64-bit carry-select adder with reduced area,” Electron. Lett. vol.37, no.10, pp.614-615, May 2001. R.P.BrentandH.T.Kung,“ARegular Layout forParallel Adders,” IEEE Transactions on Computers,vol. C-31,no.3,pp.260–264, 1982. J. Sklansky, “Conditional-sum addition logic,” IRE Transactions on Electronic Computers, vol. 9, pp. 226–231, 1960. http://en.wikipedia.org/wiki/Kogge%E2%80%93Stone_adder P.M. Kogge and H.S. Stone, “A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations,”IEEE Trans. Computers, vol. C-22, no. 8, pp. 786-792, Aug. 1973. J.Rabaey, “Digital Integrated Circuits: A Design Perspective”, Prentice Hill, Second Edition, 2003. S. Ghosh et al., “Tolerance to small delay defects by adaptive clock stretching,” IOLTS, 2007. P. Ndai et al., "Fine-grained redundancy in adders,” ISQED, 2007. W. J. Townsend et al., "Quadruple time redundancy adders," DFT, 2003. W. Johnson, “Design and analysis of fault tolerant digital systems,” Addison Wesley Publishing Company, 1989. J. H. Patel et al., “Concurrent error detection in ALUs by recomputing with shifted operands,” Trans. Comput., 1982. K. Wu et al., “Algorithm level RE-computing with shifted operands - a register transfer level concurrent error detection technique,” ITC, 2000.
Authors:
S.Vaishnavi, R.Karthika, P.Suganya Elimination of Silent Data Corruption by Improved Error Detection using Difference Set Codes for Paper Title: Memories Abstract: Now-a-days, the memory devices are susceptible to Single Event Upsets (SEU) which is one of the soft errors due to radiation effects. Though several error correcting codes (ECC) are available, the simplest and effective ECC for memory application is Difference Set Cyclic Codes (DSCC). These codes are Majority logic decodable codes. This method of error correction will lead to Silent Data Corruption (SDC) in which the additional errors beyond the code’s correction capability are not detected. This SDC will provide faulty word after decoding which actually looks like error free corrected word. This is because the existing method assumes that the input word contains error which is less than the error correction capability and it tends to correct the additional errors, resulting in wrong output. The proposed algorithm will eliminate the SDC and detect the any number of additional errors. The proposed algorithm is coded in VHDL and simulated using Modelsim and Xilinx ISE simulator Keywords: decoding. 23.
Single Event Upsets (SEU), Error Correction Codes (ECC), Difference Set(DS) Codes, Majority logic
References: R. C. Baumann, “Radiation-induced soft errors in advanced semiconductor technologies,” IEEE Trans. Device Mater. Reliabil., vol. 5, no.3, pp. 301–316, Sep. 2005. 2. J. von Neumann, “Probabilistic logics and synthesis of reliable organisms from unreliable components,” Automata Studies, pp. 43–98, 1956. 3. Robin Schriebman, “Error Correcting Codes” http://wwwmath.mit.edu/phase2/UJM/vol1/COOKE7FF.PDF.Viewed, April 13, 2006. 4. S. Lin and D. J. Costello, “Error Control Coding”, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2004. 5. M.Y. Hsiao, “A Class of Optimal Minimum Odd-weight-column SECDED Codes”, IBM Journal of R & D Vol. 14, July 1970, pp. 395-401. 6. R. Naseer and J. Draper, “DEC ECC design to improve memory reliability in sub-100 nm technologies,” in Proc. IEEE ICECS, 2008, pp.586–589. 7. R.W.Hamming, Bell Systems Tech.J.26, No.2, 147 (April 1950). 8. I. S. Reed, “A class of multiple-error-correcting codes and the decoding scheme,” IRE Trans. Inf. Theory, vol. IT-4, pp. 38–49, 1954. 9. V. Beiu, S. Aunet, J. Nyathi, R. R. Rydberg-III, and A. Djupdal. “The vanishing majority gate trading power and speed for reliability”. In Proceedings of NanoArch, 2005. 10. S.-C. Chae and Y.-O. Park. “Low complexity encoding of regular low density parity check codes”. In Proceedings of VTC, 2003. 11. S. Ghosh and P. D. Lincoln, “Low-density parity check codes for error correction in nanoscale memory,” SRI Comput. Sci. Lab. Tech. Rep. CSL0703, 2007. 12. Bane Vasic, Shashi Kiran Chilappagari, “An Information Theoretical Framework for Analysis and Design of Nanoscale Fault-Tolerant Memories Based on Low-Density Parity-Check Codes”, ieee transactions on circuits and systems, vol. 54, no. 11, november 2007. 13. M. A. Bajura et al., “Models and algorithmic limits for an ECC-based approach to hardening sub-100-nm SRAMs,” IEEE Trans. Nucl. Sci., vol. 54, no. 4, pp. 935–945, Aug. 2007. 15 C. W. Slayman, “Cache and memory error detection correction, and reduction techniques for terrestrial servers and workstations,” IEEE Trans. 1.
111-114
16. 17. 18. 19.
Device Mater. Reliabil., vol. 5, no. 3, pp. 397–404, Sep. 2005. H. Naeimi and A. DeHon, “Fault secure encoder and decoder for NanoMemory applications,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., vol. 17, no. 4, pp. 473–486, Apr. 2009. E. J.Weldon, Jr., “Difference-set cyclic codes,” Bell Syst. Tech. J., vol.45, pp. 1045–1055, 1966. C. Tjhai, M. Tomlinson, M. Ambroze, and M. Ahmed, “Cyclotomic idempotent-based binary cyclic codes,” Electron. Lett., vol. 41, no. 6, Mar. 2005. T. Shibuya and K. Sakaniwa, “Construction of cyclic codes suitable for iterative decoding via generating idempotents,” IEICE Trans. Fundamentals vol. E86-A, no. 4, pp. 928–939, 2003
Authors:
S.Jananee, N.Annu, K.Jayapriyadharshini Round Rescheduling Technique for Hash Function Blake using Carry Select Adder with Binary to Excess Paper Title: Converter Abstract: Cryptographic hash functions are used widely in many applications mainly for its high speed and security. NIST organized SHA-3 competition and the final round candidates are BLAKE, KECCAK, SKEIN, JH AND GROSTL. Among the five finalists design and architecture of BLAKE is analyzed in this paper. Hash function BLAKE is the one-way cryptography which means no key is used while sending and receiving the message. In the field of cryptography speed and secrecy are the tradeoffs. To obtain high speed and efficiency, Round Rescheduling Technique is incorporated. To make BLAKE more efficient, modular addition is replaced with Carry Select Adders (CSA) using Binary to Excess Converter (BEC). The Existing and Proposed architecture of BLAKE is designed using CSA whereas Modified BLAKE is designed using CSA with BEC. So that the Area and Power consumed in Proposed method is less compared with Existing methods. BLAKE-32 and BLAKE-64 are coded in VHDL language and simulated in Mentor Graphics Front-End tool - Modelsim. Area and Power results are shown in Xilinx ISE simulator. Keywords: Hash Function, SHA-3, NIST CSA, BEC, VHDL, Xilinx ISE simulator. References: 1. 2. 3.
4.
24.
5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.
18. 19. 20. 21. 22. 23. 24.
25.
25.
J.-P. Aumasson, L. Henzen, W. Meier, and R. C.-W Phan, “SHA-3 Proposal BLAKE, submission to NIST,” 2008. [Online]. Available:http://131002.net/blake/ Cryptanalysis of Dynamic SHA 2 by Jean-philipe, Orr Dunklemen, Bart Preneel Sabastian Indesteege. SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1,International Journal of Computer Trends and Technology- volume3Issue2- 2012, ISSN: 2231-2803 Page 272 1995, available on line at www.itl.nist.gov/fipspubs/ fip1801.htm X. Wang and H. Yu, “How to break MD5 and other hash functions,” in Advances in Cryptology—EUROCRYPT 2005, ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2005, vol. 3494, pp.19–35. NIST, Gaithersburg, MD, “Announcing the secure hash standard,” FIPS180-2, 2002. NIST, Gaithersburg, MD, “SP 800-106, Randomized hashing Digital Signatures,” 2007. L. Ji and X. Liangyu, “Attacks on round-reduced BLAKE,” 2009. Xu Guo , Meeta Srivastav , Sinan Huang , Leyla Nazhandali and Patrick Schaumont Silicon Implementation of SHA-3 Final Round Candidates: BLAKE, Gr_stl, JH, Keccak and Skein dec. 2009, Ryan Toukatly SHA-3: The BLAKE Hash Function – 2009 Luca Henzen, Pietro Gendotti, Patrice Guillet, Enrico Pargaetzi, Martin Zoller, and Frank K. Gurkaynak. Developing a Hardware evaluation method for sha-3candidates. In Mangard and Standaert [21], pages 248{263. National Institute of Standards and Technology (NIST). Cryptographic Hash Algorithm CompetitionWebsite. J.Sklansky, “Conditional-sum Addition Logic”, IRE Transactions on Electronic Computers, EC-9,p 226-231, 1960 O.J Bedrij, “Carry-select adder,” IRE Transactions on Electronic Computers,pp. 340- 344, 1962. R.P Brent and H.T.Kung, “A Regular Layout for Parallel Adders”, IEEE Transactions on Computers,vol. C-31, No.3,p.260-264, march, 1982. Tyagi, “A reduced are scheme for carry- select adders”, IEEE Transactions on Computers, vol.42, pp.1163-1170, 1993. Paul F.Stelling, “Design strategies for optimal hybrid final adders in parallel multiplier”, Journal of VLSI signal processing, vol 14, pp. 321-331, 1996. T.Y.Ceiang and M.J.Hsiao, “Carry-select adder using single Ripple carry adder,” Electron .Lett., vol.34, no.22,pp.2101-2103, oct. 1998. K.Rawwat, T.Darwish and M. Bayoumi, “A low power Carry select adder with reduces area,” proc. of Midwest Symposium on Circuits and Systems, pp.218221, 2001. A.Shams, T.Darwish and M.Byoumi,”performance analysis of low power 1-bit CMOS full adder cells,” IEEE Trans.VLSI Systems, vol.10,pp.2029, Feb.2002. Massimo Alioto and Gaetano Palumbo, “Analysis and Comparison on Full Adder Block in Submicron Technology”, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, vol. 10, No.6, December 2002. Y.He ,C.H.Chang and J.Gu, “An area efficient 64-bit square root carry-elect adder for low power applications,” in Proc. IEEE Int . Symp.Circuits Syst.,2005, vol. 4,pp.4082-4085. Behnam Amelifard, Farzan Fallah and Massoud Pedram, “Closing the gap between carry select adder and ripple carry adder: a new class of lowpower high performance adders”, in Proc. of IEEE International Symposium on Quality Electronic Design (ISQED), 2005. Yan Sun, Xin Zhang, Xi Jin “High performance Carry select adder using fast All-one Finding Logic”, IEEE Int conf modelling and simulation , pp 1012-1014, 2008. Padma Devi,Ashima Girdhar and Balwinder Singh “Improved Carry select adder with Reduced Area and low power consumption” Int Jou of Com Appl(0975-8887) vol3-no.4,June 2010. St_ephanie Kerckhof1, Fran_cois Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale2, Fran_cois-Xavier Standaert. University catholique de Louvain, UCL Crypto Group,B-1348 Louvain-la-Neuve, Belgium on Compact FPGA Implementations of the Five SHA-3 Finalists. St_ephanie Kerckhof1, Fran_cois Durvaux, Nicolas Veyrat-Charvillon, Francesco Regazzoni, Guerric Meurice de Dormale2, Fran_cois-Xavier Standaert. University catholique de Louvain, UCL Crypto Group,B-1348 Louvain-la-Neuve, Belgium on Compact FPGA Implementations of the Five SHA-3 Finalists.
Authors:
Suguna, Logesh Kumar, Lavanya
Paper Title:
Lossy Image Compression and Data Embedded In Compressed Encrypted Image
Abstract: This work is based on lossy image compression and data embedded in compressed encrypted image. In this, the original image is compressed by lossy compression method and encrypted using the encryption key. Data is hided into the compressed encrypted image using the data hiding key. If the receiver has encryption key then he can recover the image after decompression, if data hiding key he can extract the data, if both data hiding key and encryption key then he can extract the data and recover the original image after decryption and decompression.
115-119
120-123
Keywords: Lossy Compression, Encrypting an image, Data hiding, Recovery of image/ Extraction of data. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
M.Johnson, P.Ishwar, V. M. Prabhakaran, D. Schonberg, and K.Ramchandran, “On compressing encrypted data” . IEEE Trans. Signal Process. vol. 52, no. 10, pp. 2992–3006, Oct. 2004. W. Liu, W. Zeng, L. Dong, and Q. Yao, “Efficient compression of encrypted grayscale images,” IEEE Trans. Image Process., vol. 19, no. 4,pp. 1097–1102, Apr. 2010. [3] X.Zhang, “Lossy compression and iterative reconstruction for encrypted image,” IEEE Trans. Inform. Forensics Security, vol. 6, no. 1,pp. 53– 58, Feb. 2011. J. Tian, “Reversible data embedding using a difference expansion ,”IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896,Aug. 2003. Z. Ni, Y.-Q. Shi, N. Ansari, and W. Su, “Reversible data hiding,” IEEE Trans Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar.2006. M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, “Lossless generalized-LSB data embedding,” IEEE Trans. Image Process., vol. 14, no.2, pp. 253–266, Feb. 2005. C.-C. Chang, C.-C. Lin, and Y.-H. Chen, “Reversible data-embedding scheme using differences between original and predicted pixel values,” IET Inform. Security, vol. 2, no. 2, pp. 35–46, 2008. X. Zhang, “Reversible data hiding in encrypted Image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. X. Zhang, “Separable Reversible Data Hiding in Encrypted Image, ”IEEE transactions of information forensics and security” ,vol 7,No.2, Apr 2012
Authors:
Saad Abdulqader Ali, Ismail bin Yusof, Madi Hermadi, Marwan B.S. Alfergani, Abdalla Ab Sinusi
Paper Title:
Pavement Performance with Carbon Black and Natural Rubber (Latex)
Abstract: Many studies have been done to find other alternative material to use as modifiers in asphalt mixes on the improvement of its properties and highway quality. In this research Carbon Black and Natural Rubber (Latex) have been used as bitumen modifiers, bitumen is sensitive to rate of traffic load and temperature susceptibility. Therefore, bitumen modification has become the main factor to improve the hot mix asphalt properties and permanent deformation (Rutting).The use of carbon black and natural rubber in this project was identified to have the potential of becoming a modifier in HMA mixes due to the elastic behavior and in reducing the rutting potential. This study presents the viability of carbon black and natural rubber as an additive in bitumen as binder and hot mix asphalt concrete with different ratios of 10,15,20% CB and 1,3,5% NR blended separately and with each other. The behaviors of the two modifiers were investigated by comprehensive laboratory testing and evaluation. The DSR was used to determine the rheology of the modifiers with bitumen and Superpave mix design method was used to determine the optimum bitumen content and one aggregate gradation was considered under this investigation. The performance of carbon black and natural rubber mixtures at 40° C was determined by the dynamic creep test and indirect tensile test. It was observed that the addition of carbon black and natural rubber gave better overall performance in the bituminous mixes. The stiffness modulus decreases as the addition of carbon black and natural rubber increase. However, the performance of 10% CB gave better stiffness modulus whereas, the stiffness is higher. The creep values are also the lowest with 10% CB. Thus, this shows carbon black and natural rubber may contribute toward better flexible roads in the future. Keywords: Carbon Black, Natural Rubber (Latex), Polymers, Modified Bitumen. References: 1.
26.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.
27.
Astana, D.A. (2008/2009). The Effect of Epoxy Bitumen Modification on Hot Mix Asphalt Properties and Rut Resistance. University Technology Malaysia pp. 5-6. Brown, S. F., and Bouncher, J. L. (1990). Asphalt Modification. Proceedings of the 1990 Conference on Highway Research: Sharing the Benefits. 29-31 October. London: 181-200. Chowdhury, A., Button, J. W. & Grau, J. D. (2001). Evaluation of Superpave Aggregate Specifications.The Texas A&M University System: Ph.D Thesis. Hunter, N. R. (Ed.) (2000). Asphalts in Road Construction. London: Thomas Telford Publisher. pp 77 Hisazumi, Y. Carbon Black Manufacturing: Challenges and Opportunities in View of Global Warming. Tokai Carbon Co., LTD Illinois Department of Transportation, IDOT. (2005, February). Performance graded binder material for hot mix asphalt, PTA-04 Lavin G (2003). Asphalt Pavements: A Practical Guide to Design, Production, and Maintenance for Engineers and Architects. London and New York, Spon Press. p. 39. Lee, K.H. (1996). The use of waste materials (Air-cooled furnace slag and pyrolyzed carbon black) in hot mix asphalt, PhD Thesis. Purdue University p 1. Long, F. M. (2001). Permanent Deformation of Asphalt Concrete Pavements: A Nonlinear Viscoelastic Approach to Mix Analysis and Design..University of California, Berkeley: PH.D. Thesis Mathew, T.V. and Rao, K.V.K. (2007). Pavement Material: bitumen. Introduction to transportation engineering. p. 31.1. Mamlouk, M. J., Zaniewski, J.P. (2006). Material for Civil and Construction Engineers.2nd ed.United States of America. pp 348 Nicholls, J. C. (1998). Asphalt Surfacings: Cambridge University Press. Newsletter of the Rubber Foundation Information Center for Natural Rubber 2005.pp. 1-4. Park,T. (2005). Application of pyrolized carbon black from scrap tires in pavement design (Hot mix asphalt). Purdue University, p. 14. Richard, R., and Bent, T. (2004). Road Engineering for Development. London. 2nd ed: Spon Press. Robinson, H.L. ( 2004). Polymers in Aspahlt. Rapra Technology Limited. Vol 15, pp. 15-17-29. Roberts, L.F., Kandhal, P.S., Brown, R.E., Lee, D.Y., Kennedy, T.W. (1996). Hot Mix Asphalt Materials, Mixture, Design and Construction. NAPA Education Foundation. Maryland Shell Bitumen. (2003). The Shell Bitumen Handbook, published for shell bitumen by Thomas Telford publishing. pp. 61-65-125. Shell Bitumen. (1995). The Shell Bitumen Handbook, published by shell bitumen. p. 23. Tripathi, R. & Others. (2000). Toner-Modified Asphalt Composition. Patent 6, 113, 681. Tuntiworawit N, Lavansiri D and Phromson C (2005). The modification of asphalt with natural rubber latex. Proceedings of the Eastern Asia Society for Transportation Studies, Vol. 5. pp. 679-694. Uranga, O.G. (2008). Rheological properties of bitumen modified with polyethylene and polyethylene based blends. Universidad del pais. p. 122. Yen, T.F. and Chilingaraian, G.V (1994). Asphaltenes and Aspahlts,1. pp. 381-384. Zahran, S.Z. (1988). A Mechanistic Evolution of Modified Asphalt, PhD thesis, North Carolina State University. p. 12.
Authors:
D. B. Salunke, R. S. Kawitkar
Paper Title:
Analysis of LMS, NLMS and MUSIC Algorithms for Adaptive Array Antenna System
124-129
Abstract: As technology developed this decade proves communication is the most important factor for the data interchange. Smart antennas have been considered to be one of the most demanding communication technologies. It adapted as most demanding technology because of high-bit rate or high quality in broadband commercial wireless communication. Direction-of-arrival (DOA) estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the smart antenna system. Adaptive beam forming is achieved using the LMS algorithm for directing the main beam towards the desired source signals and generating deep nulls in the directions of interfering signals. The smart antenna system designed involves a hardware part which provides real data measurements of the incident signals received by the sensor array. Results obtained verify the improved performance of the smart antenna system when the practical measurements of the signal environment surrounding the sensor array are used. This takes the form of sharper peaks in the MUSIC angular spectrum and deep nulls in the LMS array beam pattern. 130-133 Keywords: Smart antenna, Angle of arrival, LMS, NLMS and MUSIC. References: 1. 2. 3. 4. 5. 6.
Bellofiore, S.; Balanis, C.A.; Foutz, J.; Spanias, A.S.; Smart-antenna systems for mobile communication networks. Part I. Overview and antenna design Volume 44, Issue 3, and Page: 145 – 154 Jun 2002 S. Haykin, “Adaptive Filter Theory”, Prantice-Hall, 4ThEdition, 2002. Frank Gross, “Smart Antennas for Wireless Communications with Matlab”, McGraw Hill, New-York, 2005. B. Widrow and S.D. Steams, Adaptive Signal Processing (New Jersey, Prentice-Hall Inc., 1985). L.C. Godara, "Applications of Antenna Arrays to Mobile Communications.I. Performance Improvement, Feasibility, and System Considerations,"Proceedings of IEEE, Volume 85, Issue 7, Pages1031-1060, July 1997. L.C. Godara, "Application of Antenna Arrays to Mobile Communications.II. Beamforming and Direction-of-Arrival Considerations,"Proceedings of IEEE, Volume 85, Issue 8, , Pages1195-1245. August 1997
Authors:
Anwar M. Mousa
Paper Title:
Promising Communication Technologies for Emergency and Safety Systems
Abstract: this article discusses the uses of promising modern communication technologies for emergency and safety systems focusing on cognitive radio technologies and their roles in effective spectrum use. Given that only 10% to 30% of licensed spectrum is occupied in a specific time and locations, the remaining unused spectrum constitutes a huge room for increasing bandwidth and hence the number of served users in emergency events. Based on cognitive radio and sensed spectrum holes, the paper developed new approximated linear relations between the total number of served users in emergency situations as a function of total available bandwidth. Results show that increasing the number of channels per cell, as a result of sensed spectrum holes, yields a significant increase in cell capacity and the number of served users. The paper begins with highlighting the impact of current andpromising communications technologies on strengthening disaster awareness and mitigation. Keywords: emergency communications, trunking, cognitive networks, spectrum holes, system capacity. References: 28.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
29.
www.tetra.com www.etsi.com TETRA MoU group, www.tetramou.com http://www.etsi.org/technologies-clusters/technologies/tetra TETRA Advanced Packet Service (TAPS), ETSI TS 101 962 V1.1.1 (2001-07) www.idenetwork.org/ H. Aïache et al. “WIDENS: Wireless Ad-Hoc Network for Public Safety”, in 14th IST Mobile & Wireless Communications Summit, 2005, Dresden, Germany. Project MESA, a transatlantic initiative for future public safety broadband communication systems, www.projectmesa.org http://www.sensor-networks.org/ URL: http://www.3gpp.org URL: http://www.wi-fi.org URL: http://www.wimaxforum.org www.vsat-systems.com/ http://www.gps.gov/ R.K.Jain, Risal Singh, “Role of Nanotechnology in future wireless and communication systems”, National seminar proceeding, Academy of Business & Engineering Science Ghaziabad, pp-19-28, 16-17th January 2009. High Altitude Platforms for Wireless Communications, T.C.Tozer, D. Grace, Electronics & Communication Engineering Journal June 2001. Mike Faulkner, Phil Conder, “COGNITIVE RADIO: Spectrum, the next frontier” Lund Circuit Design Workshop-2009. S. Haykin, “Cognitive Radio: Brain–Empowered Wireless Communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, February 2005, pp. 201–220. Ian F. Akyildiz, et al. “A survey on Spectrum Management in Cognitive Radio Networks” Communications Magazine, IEEE, vol 46, April 2008, pp. 40-48 Theodore S. Rappaport, (Wireless Communications-Principles and Practices), Second Edition 2004 Teletrafic-engineering,http://en.wikiversity.org/wiki/Teletraffic_engineering/Trunking.
Authors:
Shweta Chawla, Ramanand Harijan, Harpal Singh
Paper Title:
Design Low Power 32-Bit Barrel shifter using Efficient Charge Recovery Logic
Abstract: Today power dissipation has become the main concern as the circuit size become larger and larger. Especially in this paper we presented the reduction of the power dissipation which shows an increasing growth as the technology is scaled down. Various theories have been formulated regarding this problem. Out of which Adiabatic Logic is gaining much attention because of its exemplary results. By adiabatic technique, power dissipation in transistors can be minimized as well as energy stored in load capacitance can be reused instead of dissipation as heat. In these circuits we can reduce the energy dissipation during switching process as well as reuse the energy from the load capacitance by making a feedback path from load capacitance to the supply.In this paper we first study of various adiabatic techniques and will lay emphasis on one of its
134-139
140-145
widely used technique called the Efficient Charge Recovery Logic (ECRL). We will study how ECRL technique is better than the rest and how circuits are implemented using it.Using this technology we will design a 32 bit barrel shifter and perform various tests on the circuit. We will also compare the results of this adiabatic technology with the normal CMOS technology and show the drastic reduction in power dissipation. All the design structures based on Adiabatic Switching Logic are designed and simulated using standard TSMC 0.18 μm CMOS technology and 5 V voltage supply at an operating temperature of 27º C. Mentor Graphics Corporation based tool known as IC Design Architect have been used for all the design and analysis. Keywords: Low power, Adiabatic, ECRL, Fully Adiabatic., Partially Adiabatic Circuit (Quasi),Barrel shifter, Multiplexor References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
A. P. Chandrakasan, S. Sheng, and R. W. Brodersen, “Low Power CMOS Digital Design,” IEEE Journal of Solid-state Circuits, Vol. 27, No. 04, pp. 473-484, April 1999. J. S. Denker, “A Review of Adiabatic Computing”, 1994 IEEE Symposium on Low Power Electronics, pp 94-97, 1994. T. Indermauer and M. Horowitz, “Evaluation of Charge Recovery Circuits and Adiabatic Switching for Low Power Design,” Technical Digest IEEE Symposium Low Power Electronics, San Diego, pp. 102-103, October 2002. W. C. AthaS, J. G. Koller, L. Svensson, “An Energy- Efficient CMOS Line Driver using Adiabatic Switching” Fourth Great Lakes symposium on VLSI, California, March 2005. A. Kamer, J. S. Denker, B. Flower, et al., “2N2D-order Adiabatic Computation with 2N-2P and 2N-2N2P Logic Circuits,” In Proc. of the International Symposium on Low Power design, Dana Point, pp. 191-196, 1995. A. Blotti And R. Saletti, “Ultralow- Power Adiabatic Circuit Semi-Custom Design”, IEEE Transaction on VLSI system, vol. 12, no. 11, pp. 12481253, November 2004. Dragan Maksimovic´, G. Vojin, Oklobdžija, and et all, “Clocked CMOS Adiabatic Logic with Integrated Single-Phase Power-Clock Supply,” IEEE Transactions on VLSI Systems, Vol. 08, No. 04, pp. 460-463, August 2000. Y. Moon and D. K. Jeong, “An Efficient Charge Recovery Logic Circuit,” IEEE JSSC ,Vol.31, No. 04, pp. 514-522, April 1996. S.S. Rajput and S.S. Jammuar, “Low Voltage Analog Circuit Design Techniques”, IEEE Transactions on Circuits and System Magazine, Vol no.-2, pp. 24 -42, 2002.
Authors:
E. Suresh Kumar, Bijan Sarkar
Paper Title:
Fault Tree Analysis of Failures in Fire Detection System of Grid Connected Photovoltaic System
Abstract: The reliability of the grid connected photovoltaic system is primarily and strongly depends on the reliability of the electrical protection systems, failure of which may lead to fire. So a fire detection system is the crucial component in a grid connected PV system. So its reliability is directed related to the overall reliability of the PV system. A literature review of reliability data of fire detection system was made resulting to rough estimates of some failure frequencies. No theoretical or technical articles on the structure of reliability models of these installations were found. In this paper the classifications of failure severity were made from the system point of view by counting failures of components when possible. Since there are no established fault tree structures available for fire detection system in photovoltaics, these component failure frequencies are intended to be used in the first round of iteration in the fault trees suggested here. The analysis leads to the necessity of the estimation of reliability of fire detection system for the assessment of the reliability of the grid connected photovoltaic power system. Keywords: Fault tree analysis, Top event, Reliability, Fire detectors, Boolean input 30.
31.
References: 1.
Paul K. Kuhn, Cynthia Furse, Paul Smith, (2006) - Locating Hidden Hazards in Electrical Wiring, Symposium on Aged Electrical Systems Research Application October 18-19, 2006, Chicago, Illinois, USA. 2. Mohammad Sadegh Javadi1, Azim Nobakht2, Ali Meskarbashee (2011) - Fault Tree Analysis Approach in Reliability Assessment of Power System, International journal of multidisciplinary sciences and engineering, vol. 2, no. 6, september 2011. 3. Casey C. Grant, P.E. (2010) - Fire Fighter Safety and Emergency Response for Solar Power Systems, The Fire Protection Research Foundation, © Copyright Fire Protection Research Foundation, May 2010. 4. Wang Cheng-gang, Wang Zi-zhen (2010) - Design and Implementation of Safety Expert Information Management System of Coal Mine Based on Fault Tree , Journal of Software, Volume 5, NO. 10, October 2010, Pages : 1114 -1120. 5. R. Karimi, N. Rasmussen and L. Wolf (May 1980 ) – Qualitative and quantitative reliability analysis of safety systems, Energy Laboratory Report No. MIT-EL 80-015, Energy Laboratory and Department of Nuclear Engineering Massachusetts Institute of Technology Cambridge, Massachusetts 02139.\ 6. Sanjay Kumar Tyagi, D. Pandey and Reena Tyagi (2010) -Fuzzy set theoretic approach to fault tree analysis, International Journal of Engineering, Science and Technology Vol. 2, No. 5, 2010, pp. 276-283. 7. John Andrews (2012) - Introduction to Fault Tree Analysis, 2012 Annual RELIABILITY and MAINTAINABILITY Symposium. 8. Lei Zhang, and Gaofeng Wang (2009) - Design and Implementation of Automatic Fire Alarm System based on Wireless Sensor Networks, ISBN 978952-5726-02-2 (Print), 978-952-5726-03-9 (CD-ROM) Proceedings of the 2009 International Symposium on Information Processing (ISIP’09) Huangshan, P. R. China, August 21-23, 2009, pp. 410-413. 9. Merton Bunker ( 2007) - Fire Alarm Systems Getting It Right The First Time, IMSA Journal Pages : 32-49. 10. Marsh (2008) - Effectiveness of Fire Safety Systems for Use in Quantitative Risk Assessments, New Zealand Fire Service Commission Research Report Number 89, ISBN Number 978-1-877349-83-6 (on-line), ISBN Number 978-1-877349-82-9 (paperback) © Copyright New Zealand Fire Service Commission
Authors:
E. Suresh Kumar, Bijan Sarkar, Dhiren Kumar Behera
Paper Title:
Failure of Photovoltaic Modules under Lightning and Thunderstorms
Abstract: Lightning strikes can affect photovoltaic generators and their exposed installation sites as well as the sensitive electronics of the inverter. Therefore, it is necessary, to estimate the risk by lightning strikes, and to take these results into account for the design. IEC (EN) 62305-2 states procedures and data for the calculation of the risk resulting from lightning strikes into structures and for the choice of lightning protection systems. Actually, the technical guidelines for installation suggest protecting with SPD’s (surge protective device) both the DC and AC sides of the PV plant. The aim of this paper is to estimate voltages due to lightning discharges and to determine the effective need of lightning protection measures on the basis of the risk analysis and the protection costs.
146-151
152-156
Keywords: Lightning electromagnetic impulse, Lightning current arresters, Earth Termination System, Lightning protection level, Lightning flash count. References: 1.
Roberto Pomponi, Riccardo Tommasini (2012) - Risk assessment and lightning protection for PV systems and solar power plants, International Conference on Renewable Energies and Power Quality (ICREPQ’12), Santiago de Compostela (Spain), 28th to 30th March, 2012. 2. National Lightning Safety Institute, U.S.A (2012) - Structural Lightning Safety, May 12, 2012. 3. Jonathan Woodworth (2008) - The Lightning Surge and Arresters, Arrester Facts 011 The Lightning Surge and Arresters. 4. F.Heidler, W. Zischank, Z. Flisowski, C. Bouquegneau, C. Mazzetti (2008)- Parameters of lightning current given in IEC 62305Background, experience and outlook.-29th international conference on lightning protection, 23rd -26th June, 2008. 5. Robert E. Schlesinger (1982)- "Analysis of Three-Dimensional Thunderstorm Model Output in Terms of Geosynchronous Satellite Observations", Semiannual Status Eeport, 1, Mar. .- 31 Aug. 1982 (Hisconsin Univ.) 3 p 00/47. 6. Josef Birkl, Peter Zahlmann , Ottmar Beierl (2009) - Surge protection for PV generators: Requirements, testing procedures and practical applications , X International Symposium on Lightning Protection 9th -13th November, 2009 – Curitiba, Brazil. 7. Colin Price ( 2008) – Thunderstorms, Lightning and Climate Change, 29th International Conference on Lightning Protection, 23rd – 26th June, 2008 – Uppsala, Sweden. 8. Giovanni Luca Amicucci, Fabio Fiamingo ( 2009) – Lightning Risk to Photovoltaic Power Generating Systems, Prevention Today, Volume 5, No. 1/2, Page 51 – 65. 9. S. S. Kandalgaonkar, M.K. Kulkarni, H.K. Trimbake (2005)- Study of thunderstorm and rainfall activity over the region, Atmosfera-Pages 91-101. 10. Asha Nath, G K Manohar, KKDani, and P C S Devara ( 2009) - A study of lightning activity over land and oceanic regions of India, J. Earth Syst. Sci. 118, No. 5, October 2009, pp. 467–481.
Authors:
Jesinth santhaseelan.J, S.Jebarani Evangeline
Paper Title:
Hysteresiscontrol of Multilevel Inverter
Abstract: Multilevel inverters are used for converting DC to AC in places where the conversion is required. However harmonics are present in all types of multilevel inverters. This causes major problems in the output voltage as well as current. In order to reduce these harmonics, several methods are used among them hysteresis control is one of the powerful method. A three phase multilevel inverter with hysteresis current control is proposed to control the current in order to reduce the total harmonic distortion, current ripples and Control over maximum switching frequency and tested using MATLAB/Simulink. Keywords: Hysteresis modulation, multiband (MB). 32.
References: 1. 2. 3. 4. 5.
6. 7.
AnshumanShukla, Member, IEEE, ArindamGhosh, Fellow, IEEE, and Avinash Joshi, Hysteresis Modulation of Multilevel Inverters IEEE TRANSACTIONS ON POWER ELECTRONICS, VOL. 26, NO. 5, MAY 2011. S. Srikanthan, M. K. Mishra, and R. K. V. Rao, (2009) “Improved hysteresis current control of three-level inverter for distribution static compensator application,” in Proc. IET Power Electron., vol. 2 S. R. Bowes and D. Holliday, (2007) “Optimal regular-sampled PWM inverter control techniques,” IEEE Trans. Ind. Electron., vol. 54. Z.Yao, L. Xiao, andY.Yan, (2009) “Dual-buck full-bridge inverter with hysteresis current control,” IEEE Trans. Ind. Electron., vol. 56. AnshumanShukla, Student Member, IEEE, ArindamGhosh, Fellow, IEEE, and Avinash Joshi (2007) “Hysteresis Current Control Operation of Flying Capacitor Multilevel Inverter and Its Application in Shunt Compensation of Distribution Systems” IEEE TRANSACTIONS ON POWER DELIVERY, VOL. 22 P. C. Loh, G. H. Bode, and P. C. Tan, (2005) “Modular hysteresis current control of hybrid multilevel inverters,” in Proc. IEE Electric. Power Appl., vol.152. P. N. Tekwani, R. S. Kanchan, and K. Gopakumar, (2005) “Current-error space vector-based hysteresis PWM controller for three-level voltage source inverter fed drives,” in Proc. IEE Electric. Power Appl., vol. 152.
Authors:
S. S. Gaikwad, P. S. Kachare
Paper Title:
Static Analysis of Helical Compression Spring Used in Two-Wheeler Horn
157-160
Abstract: Every two-wheeler has a provision of horn. It is used for maintaining a safe distance or to communicate for safe drive. The horn is critical element in vehicle. It is directly related to safety as well as goodwill of the company. Static analysis determines the safe stress and corresponding pay load of the helical compression spring. The present work attempts to analyze the safe load of the helical compression spring. A typical helical compression spring configuration of two wheeler horn is chosen for study. This work describes static analysis of the helical compression spring is performed using NASTRAN solver and compared with analytical results. The pre processing of the spring model is done by using HYPERMESH software. 33.
Keywords: Geometric modeling, Helical compression spring, Static analysis, Two-wheeler horn.
161-165
References: 1. 2. 3. 4. 5.
G. Harinath Gowd and E. Venugopal Goud, “Static analysis of leaf spring”, International Journal of Engineering Science and Technology, Vol. 4, pp. 3794-3803, 2012. Mr. V. K. Aher and Mr. P. M. Sonawane, “Static and fatigue analysis of multi leaf spring used in the suspension system of LCV”, International Journal of Engineering Research and Applications, Vol. 2, pp. 786-1791, 2012. Shigley, “ Mechanical Engineering Design”, Eighth Edition, Budynas−Nisbett, McGraw−Hill Primis , 2006, Ch. 10. Mehdi Bakhshesh and Majid Bakhshesh, “Optimization of steel helical spring by composite spring”, International Journal of Multidisciplinary Sciences and Engineering, Vol. 3, pp. 47-51, 2012. M. Senthil Kumar and S. Vijayarangan,“Static analysis and fatigue life prediction of steel and composite leaf spring for light passenger vehicles”, Journal of Scientific & Industrial Research, Vol. 66, pp. 128-134, 2007.
Authors: 34.
Sudarshan D. Kore, S.S.Patil Analysis and Design of R.C. Deep Beams Using Code Provisions of Different Countries and Their Paper Title: Comparison Abstract: This paper describes analysis and design of deep beams subjected to two equal point loads acting 1/3/rd of span 166-169
with different L/D ratios and codes referred were INDIAN.STANDERD CODE (I.S.-456-2000), NEWZEALAND (NDS3101-2006),CANADIAN(CSA-A23.3-2004.),CIRIA GUIDE-2(1977) and APPENDIX-A of ACI -318 {STRUT and TIE METHOD) for design purpose. The parameters obsevered were Lever Arm, Theoretical steel required and strength of deep beam. Keywords: Deep Beam, Finite,strength, code provisions, Design. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
AASHTO, “AASHTO LRFD Bridge Specifications for Highway Bridges” (2001 Interim Revisions), American Association of Highway and Transportation Officials, Washington, D.C., 1998. APENDIX A OF ACI-318 AMERICAN CONCRETE INSTITUTE (BUILDING CODE REQUIREMENT FOR STRUCTURAL CONCRETE ACI -318-2005 AND COMMENTARY ACI- 318R-2005). ACI-318-2005 AMERICAN CONCRETE INSTITUTE (BUILDING CODE REQUIREMENT FOR STRUCTURAL CONCRETE ACI -318-2005 AND COMMENTARY ACI- 318R-2005). ‘British code of practice’ B.S.8110-02(BRITISH STANDARD Structural Use of concrete part-1 Code of practice for design and construction) CANADIAN CODE (CSA-A23.3-2004)(CANADIAN STANDARD ASSOCIATION Design of Concrete Structures) CIRIA Guide 2 (1977), “The design of deep beams in reinforced concrete”, Over Arup and Partners and Construction Industry Research and Information Association, London, (reprinted 1984), 131 p. ‘Design by Strut and Tie method using ACI Appendix A’ from STM website. Indian Standard Code of Practice Plain and Reinforced Concrete’ IS 456:2000-. Bureau of Indian Standards, Manak Bhavan, New Delhi, India. Marti Peter, ‘Basic Tools of Reinforced Concrete Beam Design’ ACI journal, Title no. 82-4, January-February 1985. Kong. F. K. ‘Reinforced Concrete Deep Beam’, Van No strand Reinhold, New York Mr.Kotsovos, ‘Design of Reinforced Concrete Deep Beams’ Journal of Structural Egg., 28-32, January 1988. Matamoros and Wong, ‘Design of Simply Supported Deep Beam using strut and tie models’ ACI Structural journal, 100-S72, November/ December 2003. Mohammed Reza Salamy,Hiroshi Kobayashi and Shigeki Unjoh. ‘Experimental and Analytical Study on Deep Beams’ ‘NEWZEALAND CODE (NZS-3101-2006)New Zealand Standard CONCRETE STRUCTURES STANDARD Part-1 The Design Of Concrete Structures Nagarajan P, Dr Pillai M M T and Dr Ganesan N, ‘Design of simply supported Deep Beam using IS 456: 2000 and Strut and Tie Method’. IE (I) Journal-CV Vol.88 38-43, May 2007. Park R. and Pauly T. ‘Reinforced Concrete Structures', Wiely-Interscience Publications Quintero-Febres, Parra-Montesinos and Wight, ‘Strength of Struts in Deep Concrete Members using Strut and Tie Method’, ACI Structural journal, 103-S61, July/ August 2006. Rogowsky. David M., MacGregor James G. and See Y. Ong, ‘Tests of Reinforced Concrete Deep Beam’. ACI Journal 614-623, july-August-1986. Schleicher J. and Schafer .K.’ Design and Detailing of Structural Concrete using Strut–and–Tie Models’. The Structural Engineer, vol 69, 1991, 113. Varghese and Krishnamurthy, ‘Strength and Behavior of Deep Reinforced Concrete Beams’ Indian Concrete Journal, 104-108, March 1966. Varghese P.C. ‘Advanced Reinforced Concrete Design’, Prentice Hall of India Pvt.Ltd. New Delhi.
Authors:
Tanuja S. Dhope (Shendkar) Sulakshana Patil,Vijaya Rajeshwarkar, Dina Simunic Performance Analysis of Hard Combing Schemes in Cooperative Spectrum Sensing for Cognitive Radio Paper Title: Networks Abstract: The basic idea of cognitive radio is to reuse the spectrum whenever it finds the spectrum holes in wireless environment. However, detection performance in practice is often compromised with multipath fading, shadowing, receiver uncertainty and even hidden node problem due to primary users activity that is not spatially localized. To mitigate the impact of these issues, cooperative spectrum sensing has been shown to be an effective method to improve the probability of detection by exploiting spatial diversity by collaborating.This paper studies cooperative spectrum sensing and signal detection in cognitive radio system by implementing hard combining in data fusion centre using energy detector to observe the presence of primary user signal.In this paper, we analyzed the detector performance exploiting TV white space by employing OR and AND rules as decision combining under AWGN, Rayleigh time varying fading channel by setting probabilities of false alarm and measuring probability of detection.The simulation results show that cooperative spectrum sensing employing OR rule has better performance than non-cooperative.The performance of signal detection degrades in time varying fading Rayleigh channel compared to flat fading Rayleigh channel. Keywords: IEEE 802.11af, energy detection, fading channels, spectrum sensing, cognitive radio, cooperative sensing, hard decision. 35.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
FCC, “Spectrum policy task force report,” in Proceedings of the Federal Communications Commission (FCC ‟02), Washington, DC, USA, Nov. 2002. T. Dhope, D. Simunic and M. Djurek, “Application of DOA Estimation Algorithms in Smart Antenna Systems,” Studies in informatics and Control, vol.19, Issue 4, pp.445-452, Dec. 2010. J. Mitola and G. Q. Maguire, “Cognitive radio: Making software radiosmore personal,” IEEE Pers. Commun., vol. 6, no. 4, pp. 13–18, Aug. 1999. K-C. Chen and R. Prasad, “Cognitive radio networks,” John Wiley & Sons Ltd, 2009. 802.11 Working Group, IEEE P802.11af D0.06: Draft Standard for InformationTechnology,Oct.2010,„http// www.ieee802.org/11/” T. Dhope, D. Simunic and R.Prasad, “TVWS opportunities and regulation:-empowering rural India,”14th International Symposium on WPMC ‟11, Brest, France, pp.201-205, Oct‟2011. T. Dhope, D. Simunic and R.Prasad, “TVWS opportunities and regulatory aspects in India,” 14th International Symposium on WPMC ‟11, Brest, France, pp. 566-570, Oct‟2011. T. Dhope, D. Simunic and R.Prasad, “Hybrid Detection Method for Cognitive Radio”,13th International conferenace on SoftCOM SoftCOM2011,Split-Hvar-Dubrovnik,SS1-78741-1609,Sept.2011. T. Dhope, D. Simunic, “Performance Analysis of Covariance Based Detection in Cognitive Radio”, 35th Jubilee International Convention MIPRO 2012 under Green ICT world, Opatija, Croatia, pp.737-742, May.2012.. D. Simunic ,T. Dhope, “Hybrid Detection Method for Spectrum Sensing in Cognitive Radio”, 35th Jubilee International Convention MIPRO 2012 under Green ICT world. Opatija, Croatia, pp. 765-770, May 2012. Ian F. Akyildiz, Brandon F. Lo, Ravikumar Balakrishnan, “Co-operative spectrum sensing in Cognitive Radio networks: A survey”,in the journal of Physical Communication, Elesvier, Vol.4 , pp . 40–62 ,2011(Available on line 2010). T. Dhope, D. Simunic, “Cluster Based Cooperative Spectrum Sensing in Cognitive Radio Networks:-A Survey”, accepted and presented in International conference on Communication, Information and Computing Technology (ICCICT)-2012 , Mumbai, India, Oct.18th -20th 2012.
170-175
13. 14. 15. 16. 17. 18. 19. 20.
J. N. Laneman and D. N. C. Tse, “Cooperative diversity in wireless networks: efficient protocols and outage behavior,” IEEE Trans. on Information Theory, Vol. 50, pp. 3062 – 3080. Dec.2004. L. S. Cardoso, M. Debbah, P. Bianchi and J. Najim, “Cooperative Spectrum Sensing Using Random Matrix Theory,” IEEE ISWPC2008, Santorini, Greece, pp.334-338,May 2008. Z. Quan, S. Cui, A. Sayed, “Optimal linear cooperation for spectrum sensing in cognitive radio networks,” IEEE Journal of Selected Topics in Signal Processing Vol.2,Issue1,pp. 28–40,2008. J. Ma, G. Zhao, Y. Li, “Soft combination and detection for cooperative spectrum sensing in cognitive radio networks,” IEEE Transactions on Wireless Communications 7 (11) (2008) 4502–4507. W. Zhang, R. K. Mallik and K. B. Letaief, “Cooperative Spectrum Sensing Optimization in Cognitive Radio Networks,” IEEE ICC 2008, Beijing, China, May 2008 L. S. Cardoso, M. Debbah, P. Bianchi and J. Najim, “Cooperative Spectrum Sensing Using Random Matrix Theory,” IEEE ISWPC2008, Santorini, Greece, pp.334-338,May 2008. http://www.etsi.org/DVB-terristerial standards. S. S. Shellhammer, G. Chouinard, M. Muterspaugh, and M. Ghosh,Spectrum Sensing Simulation Model, Jul. 2006. [Online]. Available: „http://grouper.ieee.org/groups/802/22
Authors:
Arti Deshpande, Anjali Mahajan
Paper Title:
Domain Driven Multi-Feature Combined Mining for Retail Dataset
Abstract: Association Mining is used to generate the patterns from static data available. But from the business perspective, usefulness and understandability of those rules are more important. Through classical association mining many redundant rules are generated which may be not useful for business analysis. The proposed framework helps in generating the combined rules which gives informative knowledge for business by combining static and transactional data. This paper gives pruning method to remove the redundant rules before generating the combined rules. Finally Rule Clusters are generated for similar group customer or similar transaction characteristics which provide more interesting knowledge and actionable result than traditional association rule. Experimental result demonstrate the proposed techniques. Keywords: Domain Driven Data Mining, Combined Patterns, Association Rule, Pruning References: 1. 2. 3. 4.
36.
5. 6. 7. 8.
9. 10. 11. 12. 13. 14. 15. 16. 17.
37.
Longbing Cao, Yanchang Zhao, Chengqi Zhang, “Mining Impact Targeted Activity Patterns in Imbalanced Data” IEEE Trans Knowledge And Data Engineering, Vol. 20, No. 8, August 2008, pp 1053-1066. Dina A. Salem, Rania Ahmed A. A. Abul Seoud, and Hesham A. Ali, “DMCA: A Combined Data Mining Technique for Improving the Microarray Data Classification Accuracy”, in Proc International Conference on Environment and BioScience, IPCBEE vol.21 (2011), pp. 36-41. Ambikavathi .V, Veeraiah.A, Prabhu.R, Actionable Knowledge Discovery”, International Journal Of Computational Engineering Research, Vol. 2, Issue No.1, pp 56-59. Longbing Cao, Yanchang Zhao, Chengqi Zhang and huaifeng zhang, “Activity Mining: From Activities to Actions” International Journalof Information Technology and decision making, Vol . 7 No 2, pp 259-273. Longbing Cao, Huaifeng Zhang Yanchang Zhao, Dan Luo, and Chengqi Zhang, “Combined Mining: Discovering Informative Knowledge in Complex Data”, IEEE Trans Systems, Man, And Cybernetics—Part B: Cybernetics, Vol. 41, No. 3, June 2011pp-699-712. Longbing Cao, Huaifeng Zhang, Yanchang Zhao and Chengqi Zhang, “General Frameworks for Combined Mining: Discovering Informative Knowledge in Complex Data” IEEE Trans Syst Man Cybern B Cybern. 2011 Jun;41(3):699-712. Yanchang Zhao, Huaifeng Zhang, Longbing Cao, Chengqi Zhang, and Hans Bohlscheid, “Combined Pattern Mining: From Learned Rules to Actionable Knowledge”, Lecture Notes in Computer Science, 2008, Volume 5360/2008, pp. 393-403. Marie Plasse, Ndeye Niang, Gilbert Saporta, Alexandre Villeminot, and Laurent Leblond , “Combined use of association rules mining and clustering methods to find relevant links between binary rare attributes in a large data set”, Computational Statistics & Data Analysis Volume 52, Issue 1, 15 September 2007, Pages 596–613. Longbing Cao, “Domain Driven Data Mining (D3M)”, IEEE International Conference on Data Mining Workshops, 2008, pp 74-76. Yanchang Zhao, Longbing Cao, Yvonne Morrow,Yuming Ou, Jiarui Ni, and Chengqi Zhang, “Discovering Debtor Patterns of Centrelink Customers”, in Proc. AusDM '06 fifth Australasian conference on Data mining and analystics - Volume 61 Pp 135-144. Xiaoxin Yin, Jiawei Han, Jiong Yang, and Philip S. Yu, “Efficient Classification across Multiple Database Relations: A CrossMine Approach”, IEEE Trans On Knowledge And Data Engineering, Vol. 18, No. 6, June 2006. pp 770 -783 Y. Alp Aslandogan, Gauri A. Mahajani,“Evidence Combination in Medical Data Mining”, Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004, Volume: 2 pp 465 – 469. Yanchang Zhao, Huaifeng Zhang, Fernando Figueiredo, “Mining for Combined Association Rules on Multiple Datasets”, Workshop on Domain Driven Data Mining (DDDM2007), August 12, 2007 T. Nandhini, and N. K. Sakthivel, “A Smart Hybrid Data Mining Technique for Improving Classification Accuracy in Complex Data Sets”, European Journal of Scientific Research, Vol.71 No.2 (2012), pp. 233-242. Guimei Liu, Haojun Zhang, Limsoon Wong,“Controlling False Positives in Association Rule Mining”, Proceedings of the VLDB Endowment, Vol. 5, No. 2 (2011) Sotiris Kotsiantis, Dimitris Kanellopoulos, “Association Rules Mining: A Recent Overview”, GESTS International Transactions on Computer Science and Engineering, Vol.32 (1), 2006, pp. 71-82 Evelina Lamma, Fabrizio Riguzzi and Sergio Storari, “Improving the K2 Algorithm Using Association Rule Parameters”, c 2005 Elsevier B.V.
Authors:
Zeinab Raveshi, Sonali R. Idate
Paper Title:
Investigation and Analysis of SQL Injection Attacks on Web Applications: Survey
Abstract: SQL injection attacks are a serious security threat to Web applications. They allow attackers to gain unrestricted access to the databases underlying the applications and to retrieve sensitive information from databases. Many researchers and practitioners have proposed various methods to solve the SQL injection problem, current ways either fail to solve the full scope of the problem or have limitations that prevent their use. Many researchers and practitioners are familiar with only a subset of the wide range of techniques available to attackers who are trying to take advantage of SQL injection vulnerabilities. Many solutions proposed in the literature solve only some of the issues related to SQL injection. To solve this problem, we give an extensive review of the different types of SQL injection attacks. For each type of attack, we provide descriptions and examples of how attacks of that type could be performed. We also analyze existing detection and prevention techniques against SQL injection attacks. Keywords: SQL injection, SQL injection vulnerabilities, security thread in web application.
176-181
182-187
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Halfond, W., Viegas, J., & Orso, A. (2006). "Classification of SQLInjection Attacks and Countermeasures." SSSE 2006. Sandeep Nair Narayanan, Alwyn Roshan Pais, & Radhesh Mohandas. Detection and Prevention of SQL Injection Attacks using Semantic Equivalence. Springer 2011 Preventing SQL Injections in Online Applications: Study, Recommendations and Java Solution Prototype Based on the SQL DOM .Etienne Janot, Pavol Zavarsky Concordia University College of Alberta, Department of Information Systems Security. Hackers jack thousands of sites, including U.N. domainshttp://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9079961 Hackers hijack a half-million sites in latest attackhttp://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9084991 http://www.breach.com/resources/whitepapers/downloads/WP_WebHackingIncidents_2008.pdf. Jaroslaw Skaruz, Jerzy Pawel Nowacki, and Aldona Drabik, “Soft Computing Techniques for Intrusion Detection of SQL-Based Attacks,” Springer-Verlag Berlin Heidelberg, LNAI 5990, pp. 33-42, 2010. Buehrer, G., Weide, B. W., and Sivilotti, P. A. G. Using parse tree validation to prevent sql injection attacks. In SEM (2005). Prithvi Bisht, P. Madhusudan, V. N. VENKATAKRISHNAN. CANDID: Dynamic Candidate Evaluations for Automatic Prevention of SQL Injection Attacks. ACMTransactions on Information and System Security,Vol. 13, No. 2, Article 14, Publication date: February 2010. Ke Wei, M. Muthuprasanna, Suraj Kothari. Preventing SQL Injection Attacks in Stored Procedures. IEEE Software Engineering Conference, 2006. Australian.
Authors:
Prabhdeep Kaur, Sheveta Vashisht
Paper Title:
Mingle Intrusion Detection System Using Fuzzy Logic
Abstract: Intrusion detection system must be proficient of known and unknown vulner-abilities.In order to obtain superior accuracy an appropriate dataset should be there to detect the known and unknown attacks. In this research work new approach will be proposed which will utilize fuzzy if-then rules to detect known and unknown attacks i.e. sequential multilevel misuse along fuzzy if-then rules. In order to evaluate the performance of proposed algorithm and KDD’99 data set will be used. As fuzzy if-then rules comes up with overheads so overhead will be evaluated in this research work. Keywords: KDD’99 dataset, Known and Unknown attacks, Misuse and Anomaly Detection. References: 38.
Mahbod Tavallaee, Ebrahim Bagheri, Wei Lu, and Ali A. Ghorbani “A Detailed Analysis of the KDD CUP 99 Data Set proceeding on 2009” Lei Li, De-Zhang Yang, Fang-Cheng Shen,” A Novel Rule-based Intrusion detection System Using Data Mining “international conference 2010. Radhika Goel, Anjali Sardana, and Ramesh C. Joshi” Parallel Misuse and Anomaly Detection Model” International Journal of Network Security, Vol.14, No.4, PP.211-222, July 2012 4. K. Kendall “A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems, M. Eng.Thesis” Massachusetts Institute of Technology, Massachusetts, United States, June 1999. 5. Mrudula Gudadhe, Prakash Prasad” A New Data Mining Based Network Intrusion Detection Model” International conference on computer and communication technology, |ICCCT’10| 6. Duanyang Zhao,” Analysis of an intrusion detection system”” in second international conference on security and management 2012(3):12713ISSN. 7. K.Nageswara Rao, D.Rajya Lakshmi, T.Venkateswara Rao” Robust Statistical Outlier based Feature Selection Technique for Network Intrusion Detection” International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-1, March 2012 8. A.A.Olusola, A.S.Oladele and D.O.Abosede, “Analysis of KDD ’99 Intrusion Detection Dataset for Selection of Relevance Features”. Proceedings of the World Engineering and Computer Science, vol. 1, Oct-2010. 9. Vipin Das, Vijaya Pathak” Network intrusion detection system on machine learning algorithm “International Journal of Computer Science & Information Technology (IJCSIT), Vol 2, No 6, December 2010. 10. A. S. Ashoor and S. Gore, “Importance of Intrusion Detection system (IDS)”. International Journal of Scientific and Engineering Research, vol. 2, no. 1, pp.1-4 Jan-2011. 11. http://www.britannica.com/EBchecked/topic/10 56150/data-mining. 1. 2. 3.
Authors:
Paramjit Kaur, Rupinder Kaur
Paper Title:
Approaches for Generating Test Cases Automatically to Test the Software
188-190
Abstract: Testing the software is very important phase in software development life cycle. So to test the software automatically is the best way to test the software because it consume less time where testing software manually is consuming process. To test the software automatically, test case generation is the best way. One way to generate the test cases is with the help of UML diagrams. In this paper we study the various techniques to generate the test cases from the UML diagrams to test the software automatically. Different tools are used to generate the UML diagrams. A new method is also proposed which will help in testing software automatically by generating test cases. Techniques in which different approaches are used like model based approach, novel approach. approach in which genetic algorithm is implemented as data mining technique are used to generate the test cases automatically, function minimization technique used for finding the minimum predicate function. The different tools like AGEDIS, TGV and GOTCHA are used for test generation. These approaches have been proposed to bring out all possible test cases of given object diagram 39. Keywords: object diagrams, test cases, UML, genetic algorithm, data mining, tabu search algorithm. References: 1. 2.
3. 4. 5. 6. 7.
Bertolino.A, “Software Testing: Guide to the software engineering body of knowledge”, IEEE Software, Vol. 16, 1999, pp. 35-44. Clay E.Williams, “Software Testing from UML Specifications”, Second International Conference on Hitesh Tahbildar, Bichitra Kalita, “Automated Software Test Data Generation: Direction Of Research”, International Journal of Computer Science and Engineering Survey (IJCSES) vol.2, No.1, Feb 2011, pp. 99-120. Alessandra Cavarra, Thierry Jeron, Alan Hartman, “Using UML for Test Generation”, ISSTA, 2002. M. Prasanna, K.R.Chandran, “Automatic Test Case Generation for UML Object Diagrams Using Genetic Algorithm”, Int. J. Advance. Soft comput. Appl., vol.1, no. 1, July 2009, pp. 19-32. L.C.Briand, Y. Labiche, S.He, “Automating Regression Test Selection based on UML designs”, Information and Software Technology 51(2009)1630. A.V.K.Shanthi, Dr.G.Mohan Kumar, “Automated Test Cases Generation for Object Oriented Software”, Indian Journal of Computer Science and Engineering (IJCSE), vol.2, no.4, Aug-Sep 2011, pp. 543-546. Sangeeta Sabharwal, Ritu Sibal, Chayanika Sharma, “ Applying Genetic Algorithm for Prioritization of Test Case Scenarios Derived from UML
191-193
8. 9. 10. 11. 12. 13. 14.
Diagrams”, International Journal of Computer Science Issues, vol.8, issue 3, no.2, May 2011, pp. 433-444. Marlon Vieira, Johanne Leduc, Bill Hasling, Rajesh Subramanyan , Juergen Kazmeier, “ Automation of GUI Testing Using a Model – Driver Approach”, Proceeding of International Workshop on Automation of Software Test, 2006, pp. 9-14. Manoj Kumar, Dr. Mohammad Husain, Gyanendra K. Gupta and Amarjeet Singh, “An Efficient Algorithm for Evaluated for Object Oriented Models”, International Journal of Computer Application, vol.24, no.8, 2011, pp. 11-15. Ranjit Swain, Vikas Panthi, Prafulla Kumar Behera, Durga Prasad Mahapatra, “Test Case Generation Based on State Machine Diagram”, International Journal of Computer Information Systems, vol.4, no.2, 2012, pp. 99-124 A.V.K.Shathi, G.Mohan Kumar, “ A Heuristic Approach for Automated Test Case Generation From Sequence Diagram Using Tabu Search Algorithm”, European Journal of Scientific Research, vol.85, no.4, Sep 2012,pp. 534-540. A.V.K.Shanthi, G.Mohan Kumar, “ Automated Test Cases Generation from UML Sequence Diagram”, International Conference on Software and Computer Application, vol.41, 2012, pp. 83-89. Philp Samuel, R.Mall, A.K.Bothra, “Automatic Test Case Generation Using UML State Diagram”, IET Software, 2008, pp. 79-93. Ashalatha Nayak, Debasis Samanta, “Automated Test Data Synthesis Using UML Sequence Diagram”, Journal of Object Technology , vol. 9,no.2, 2010,pp. 75-104.
Authors:
Manpreet Kaur, Kunwarpal
Paper Title:
Optimize OLSR with Cognitive in Wireless Mesh Network
Abstract: In this paper, we review the COLSR; Cognitive Optimized Link State Routing in Wireless Mesh Network. COLSR is the extension of OLSR Protocol. With the use of COLSR the throughput and performance are enhanced. COLSR provide better solution to the problem of congestion on the nodes, with surely data are transmitted. In this paper, we also discuss the enhancement of OLSR which is purely different from existing OLSR, and also discuss the generation, reputedtrust mechanism along with weighting mechanism from the nodes and COLSR perform re-routing for degrade the packet dropping problem and enhance throughput devoid of congestion on nodes in WMN. Keywords: Congestion, WMN, Routing protocol. References: 40.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
Mohamed ELshaikh et.al:”High Throughput Routing Algorithm Metric for OLSR Routing Protocol in Wireless Mesh Networks”, 2009 IEEE. Francesco Saverio Proto et.al:” A Framework for Packet-Droppers Mitigation in OLSR Wireless Community Networks”, 2011 IEEE ICC. S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” in MobiCom ’00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 255–265. Venkaiahnaidu.A et.al:”A New OLSR Routing Protocol in Cognitive Wireless Mesh Networks”, IJMER Vol.2, Issue.1, Jan-Feb 2012 pp-496-498. Yu Li”, A Reputation System for Wieless Mesh Network using Mutli-path Routing Protocol,” 2011 IEEE. Sepandar D. Kamvar et.al,” The Eigen Trust Algorithm for Reputation Management in P2P Networks”, WWW2003, May 20–24, 2003, Budapest, Hungary. Dominic C. Follett-Smith:”Smart Wireless Mesh Networking: Introduction coginition in the protocol stack.” S. Zakhary and M. Radenkovic, “Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments,” in Proceedings of WONS 2010, Kranjska Gora, Slovenia, February 2010. Sonja Buchegger et.al:” A Test-Bed for Misbehavior Detection in Mobile Ad-hoc Nteworks- How Much Can Watchdogs Really Do?” 2004 ICC WMCSA. C. Adjih et.al, “Attacks against OLSR: Distributed key management for security,” in 2005 OLSR Interop and Workshop, Ecole Polytechnique, Palaiseau, France. D. Raffo et.al, “An advanced signature system for OLSR,” in Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04). Washington, DC, USA: ACM Press, October 25 2004, pp. 10–16. Sepandar D. Kamvar et.al,” The Eigen Trust Algorithm for Reputation Management in P2P Networks”, WWW2003, May 20–24, 2003, Budapest, Hungary. http://www.ece.gatech.edu/research/labs/bwn/surveys/mesh.pdf. http://www.justha ckitnow.com
194-196
Authors:
Christhu Raj M R, Edwin Prem Kumar G, Kartheek Kusampudi
Paper Title:
A Survey on Detecting Selfish Nodes in Wireless Sensor Networks Using Different Trust Methodologies
Abstract: A Wireless Sensor Networks (Wsn) Is A Network Used For Computing, Sensing. There Are Various Resource Constrains In Wsn Like Energy, Computational Power, Memory, Design Challenges. The Problem In The Sensor Nodes That Nodes May Get Compromised. The Trust Management Schemes Consist Of Effective Tools To Identify Unexpected Behavior Of Sensor Nodes In The Network. Trust Has Been Effective And Provides Secure Mechanism For Managing Each Sensor Node In Network. In This Paper We Investigated Some Trust Techniques And Present The Effective Methodologies To Calculate The Trust Of A Sensor Node To Eliminate The Selfish Or Compromised Nodes In The Network. Keywords: Entropy, Reputation, Bayesian, Fuzzy model, Trust References: 41.
1. 2.
Kazem sohraby , Daniel Minoli , Taieb znati,Wireless Sensor Networks Technology ,protocol and applications, Second edition 1991 Edwin prem kumar, Baskaran Kaliapermal, Elijah blessing Rajsingh ”Research issues in Wireless sensor network Applications: A Survey”International Journal of information and electronics engineering,Vol 2 No 5 September 2012 3. Kazem sohraby Applications of Sensor networks. First edition 2012 4. Yanli Yu,Keigiu Li, Ping Li “Trust Mechanism in wireless sensor networks :Attacks analysis and countermeasures”, Journal of networks and computer applications press 2011 5. Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures”, Journal of Network and Computer Applications 6. Javier Lopez, Rodrigo Roman, Isaac Agudo, Carmen Fernandez-Gago “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures” International Journal of information and electronics 7. I.F.Akyildiz,.Su Y.Sankara E. Cayirci “Wireless sensor networks:a survey 8. Blaze M, Feigenbaum J, Lacy J. “Decentralized trust management”. In: Proceeding of the 1996 IEEE symposium on security and privacy, Washington, 1996. p. 164–73. 9. Sun yl, Han z , YU w , Liu KJP “A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks , “IEEE INFOCOM ’06 2006 p-1-13” 10. Nielsen N , Krukow K , Sassone V , Model for event-bases trust” Electronic Notes on Theortical Computer Science (ENTCS) 2007 , vol 172,2007 p 499-521
197-200
11. Qi J-J Li- Z-Z Wel L .”A trust model based on Bayesian approach” Advances in Web Intelligence(AWIC), 2005 p-374-379 12. Jarmillo, J Srikant R. “Darwin: Distributed and adaptive reputation mechanism for wireless adhoc networks” MOBICOM ’07 2007 p 87-98 13. Komathy K. Narayanasamy P. “Trust-AODV routing against selfishness”,Journal of Network and Computer applications vol 31 , Issue 4 ,2008 p 446-471 14. S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Trans. Sensor Networks., vol. 4, no. 3, pp. 1–37, May 2008. 15. Mohammad Mormani , Subash Challa ”Bayesian fusion algorithm for interfering Trust in wsn ,”Jouranl of networks” vol 5 No 7 2010 16. Suat Ozedemir , “Functional reputation based reliable data aggregation and transmission for Wireless Sensor Networks” Computer communications vol 31 2008 p 3941-3953 17. Hani Alzaid , Ernest Foo , Juan Nieto “RSDA Reputation-based secure data aggregation in Wireless sensor networks”, International conference on Parallel and distributed applications and technologies , 2008 18. Zahra Taghikkaki “Energy efficient Trust based Aggregation in WSN ” INFOCOM WKSHPS ‘2011 2011 p 584-589 19. Boukerche A.Ren “A trust based security system for ubiquitous and pervasive computing”, Computer Communications vol 31 Issue 18,’08 20. Felix Gomez “TRIP, a trust and reputation infrastructure-based proposal for VANET ” Journal of Network and Computer Applications 21. E. Aivaloglou and S. Gritzalis, “Hybrid trust and reputation management for sensor networks,” Wireless Networks, vol. 16, no. 5, pp. 1493–1510, July 2010. 22. Junhai Luo “A trust model based on fuzzy recommendations for MANET ”, Computer Networks vol 53 2009 p 2396-2407 23. Dai Hongjun “An entropy based trust modeling and evaluation for Wireless sensor networks” International conference on Embedded Software systems ,ICESS 2008 24. Afrand ,”A game theory based approach for security in wsn”, IEEE International conference on Performance ,Computing and communication 2005 p 259-263 25. K. Liu, N. Abu-ghazaleh, and K. D. Kang, “Location verification and trust management for resilient geographic routing,” J. Parallel Distrib.Computing, vol. 67, no. 2, pp. 215–228, Feb.07. 26. R. A. Shaikh, et al., “Group-based trust management scheme for clustered wireless sensor networks,” IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 11, pp. 1698–1712, Nov. 2009.
Authors:
Gunjan Talaviya, Rahul Ramteke, A.K.Shete AVCOE, Sangamner
Paper Title:
Wireless Fingerprint Based College Attendance System Using Zigbee Technology
Abstract: In this paper we propose a system that takes attendance of student and maintaining its records in an academic institute automatically. Manually taking the attendance and maintaining it for a long time makes it difficult task as well as wastes a lot of time. For this reason an efficient system is designed. This system takes attendance with the help of a fingerprint sensor module and all the records are saved on a computer. Fingerprint sensor module and LCD screen are dynamic which can move in the room. In order to mark the attendance, student has to place his/her finger on the fingerprint sensor module. On identification of particular student, his attendance record is updated in the database and he/she is notified through LCD screen. In this system we are going to generate Microsoft excel attendance report on computer. This report will generate automatically after 15 days (depends upon user). This report will be sent to the respected HOD, teacher and student’s parents email Id. Keywords: Fingerprints, Enrollment, Fingerprint sensor, Failure to enroll (FTE), Failure to capture (FTC), Verification, Fingerprint templates, identification. 42. References: 1. 2.
3. 4.
5.
6. 7.
K.G.M.S.K. Jayawardana, T.N. Kadurugamuwa, R.G. Rage and S. Radhakrishnan”, Timesheet: An Attendance Tracking System”, Proceedings of the Peradeniya University Research Sessions, Sri Lanka, Vol.13, Part II, 18th December 2008. Yohei KAWAGUCHI, Tetsuo SHOJI , Weijane LIN ,Koh KAKU-SHO, Michihiko MINOH ,“Face Recognition-based Lecture Attendance System”, Department of Intelligence Science and Technology, Graduate School of Informatics, Kyoto University. Academic Center for Computing and Media Studies, Kyoto University Anil K. Jain, Arun Ross and Salil Prabhakar,” An introduction to biometric recognition”, Circuits and Systems for Video Technology, IEEE Transactions on Volume 14, Issue 1, Jan. 2004 Page(s):4 – 20. O. Shoewu, Ph.D.1,2* and O.A. Idowu, B.Sc. 1 , “ Development of Attendance Management System using Biometrics” Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.1 Department of Electrical and Electronics, University of Benin, Edo State, Nige-ria.2 TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN “Development of Academic Attendence Monitoring System Using Fingerprint Identification” Software Engineering Department Faculty of Telecommunication & Information Engineering University of Engineering & Technology Taxila, Punjab L. Hong, Y.Wan, and Anil K. Jain. \Fingerprint Image En-hancement: Algorithm and performance algorithm". IEEE Transactions on Pattern Analysis andMachine Intelligence, 20(8):777-789, May 1998. J. Ortega-Garcia, J. Bigun, D. Reynolds and J.Gonzalez-Rodriguez, “Authentication gets personal with biometrics”, Signal Processing Magazine, IEEE, 21(2), pp 50-62 (2004).
Authors:
Sandeep Kaur
Paper Title:
Database Management by Using Java Database Connectivity Architecture of JAVA
201-203
Abstract: This paper consist of Java database connectivity (JDBC).The JDBC consists of a set of interfaces and classes written in the Java programming language .This shows how the JDBC environment provides the facility to manage database for multiple applications for updating, retrieving, modify. First three steps are, Selecting the required driver for DSN, specifying the connection details for DSN and testing the creating DSN. The DSN consist of specific information for data. 43.
Keywords: Java database connectivity, Data source name database connectivity. 204-206 References: 1. 2. 3. 4. 5. 6.
44.
Database Programming with JDBC and JAVA by “George Reese” June 1997 1st edition. Introduction to database for web developers. www.extropia.com/tutorials/sql/jdbc.html. The java tutorial “docs.orcle.com/javase/tutorial/jdbc/overview/architecture.html”. Java soft by “Graham Hamilton & Rich Cattel” January 10,1997
Authors:
Lavanya, Saranya, Uma Maheshwari
Paper Title:
Increased Speed for Network Security through Multi-Character Processing
Abstract: A clear trend that can be observed in the Internet is the increasing amount of packet data that is being inspected before a packet is delivered to its destination. More recently, Network Intrusion Detection Systems (NIDS), virus scanners, spam filters and other content-aware applications go one step further by also performing scans on the packet payload. Pattern matching algorithm is used in Network Intrusion Detection System (NIDS). The system is used to detect network attacks by identifying attack patterns. This paper proposes a memory-efficient pattern matching algorithm which can significantly reduce the number of states and transitions by merging pseudo-equivalent states while maintaining correctness of string matching. Pattern matching is achieved through Aho-Corasick (AC) algorithm. By comparison result we say our matching algorithm is memory efficient than previously proposed method. As an extension of our work, through Multi-character processing, sufficient speed has been increased. The reduction in clock cycle indirectly increases speed in operation.The architecture is coded in VHDL and simulated using Modelsim and Xilinx. Keywords: Aho-Corasick (AC) algorithm, Finite State Machine (FSM), Non-Deterministic Automation (NFA). References: R. Sidhu and V. K. Prasanna, “Fast regular expression matching using FPGAS,” in Proc. 9th Ann. IEEE Symp. Field-Program.CustomComput. Mach. (FCCM), 2001, pp. 227–238. 2. C. R. Clark and D. E. Schimmel, “Scalable pattern matching on high speed networks,” in Proc. 12th Ann. IEEE Symp. Field Program.CustomComput. Mach. (FCCM), 2004, pp. 249–257. 3. Z. K. Baker and V. K. Prasanna, “High-throughput linked-pattern matching for intrusion detection systems,” in Proc. Symp. Arch. For Netw.Commun. Syst. (ANCS), Oct. 2005, pp. 193–202. 4. A. V. Aho and M. J. Corasick, “Efficient string matching: An AID to bibliographic search,” Commun. ACM, vol. 18, no. 6, pp. 333–340, 1975. 5. Y. H. Cho and W. H. Mangione-Smith, “A pattern matching co-pro-cessor for network security,” in Proc. 42nd IEEE/ACM Des. Autom. Conf., Anaheim, CA, Jun. 13–17, 2005, pp. 234–239. 6. Y. H. Cho and W. H. Mangione-Smith, “Fast reconfiguring deep packet filter for 1 + Gigabit Network,” i n Proc. 13th Ann. IEEE Symp. Field Program.CustomComput. Mach. (FCCM), 2005, pp. 215–224. 7. S.Dharmapurikar and J. Lockwood, “Fast and scalable pattern matching for content filtering,” in Proc. Symp. Arch. for Netw.Commun. Syst. (ANCS), Oct. 2005, pp. 183–192. 8. B. Brodie, R. Cytron, and D. Taylor, “A scalable architecture for high-throughput regular-expression pattern matching,” in Proc. 33rd Int. Symp.Comput. Arch. (ISCA), 2006, pp. 191–122. 9. L. Tan and T. Sherwood, “A high throughput string matching architecture for intrusion detection and prevention,” in Proc. 32nd Annu. Int. Symp. Comput. Arch. (ISCA), 2005, pp. 112–122. SangKyunYun, Member, IEEESComputer Society 10. “An Efficient TCAM-Based Implementation of Multipattern Matching Using Covered State Encoding”, IEEE TRANSACTIONS ON COMPUTERS, VOL. 61, NO. 2, FEBRUARY 2012 1.
Authors:
Karan Mahajan, Manish Mahajan
Paper Title:
Navigating the Current Location without the Availability of GPS
207-212
Abstract: Today in this world we are surrounded of technologies like smart phone technology.In smart phone there is an option GPS that is being used these days very much for checking in our location and navigate the google maps.But what about those cell phones which are having ANDROID operating system but no having option of GPS.This paper deals with the NAVIGATING THE CURRENT LOCATION WITHOUT THE AVAILABILITY OF GPS.Because GPS is having some limitations.First GPS may or may not be available in all smart phones.This application which we developed will work in the phones which are not having feature of GPS. Keywords: GPS, LBS, GIS, MGIS, Android, Ecllipse, SQLITE3, PDA, Toast. References: 1.
45.
2. 3.
4. 5. 6. 7. 8.
9. 10.
46.
Jisheng Xia, Peiyan Chen, “Time Efficiency Optimization Technique of Mass Data Rendering by Mobile GIS,”National Natural Science Foundation 2011. Huajun Chen, Keyan Xiao "The Design and Implementation of the Geological Data Acquisition System Based on Mobile GIS"School of Geoscience Yangtze University, Jingzhou, China,2011 Haidong ZHONG, Ping LI, Yingjie HU "A Solution For The Data Collection in The Field Survey Based on Mobile And Wireless GIS" Key Laboratory of Geographic Information Science, Ministry of Education, East China Normal University, 3663 North Zhongshan Road, Shanghai, 200062, P.R.China,2010. Mohamed A. Eleiche,Prof. Dr. Bela Markus "Network Analysis Methods for Mobile GIS" UNIVERSITY OF WEST HUNGARY ‘KITAIBEL PÁL’ PHD SCHOOL Sopron ,2011. Feixiang CHEN, Chongjun YANG, Wenyang YU, Xiaoqiu LE, Jianyu YANG "Research on Mobile GIS Based on LBS"The State Key Laboratory of Remote Sensing Information Sciences Institute of Remote Sensing Applications, Chinese Academy of Sciences Beijing, China,2005. Chen Feixiang , Zhao Ming, Qi Jiandong , Jiang Xiaoru "Research on Mobile GIS Based for Information Collection"2009 International Forum on Information Technology and Applications,2009. Justin Deoliveira "GeoServer: Uniting the “GeoWeb” and Spatial Data Infrastructures",2009. Maruto Masserie Sardadi, "Quadtree Spatial Indexing Use to Make Faster Showing Geographical Map in Mobile Geographical Information System Technology Using an Oracle 10g Application Server and Map Viewer Applications,", IJCSNS International Journal of Computer Science and Network Security, 2008. E.Poorazizi, "Developing a Mobile GIS for Field Geospatial data Acquisition,". A.A.Alesheikh and S.Behzadi, Ed. Asian Network for Scientific Information: Journal of Applied Sciences, 2008. E. Mensah, "Designing a Prototype Mobile GIS to Support Cadastral Data Collection in Ghana," 2007.
Authors:
Prashanth L Gopal, F.T Josh
Paper Title:
Elimination of Lower Order Harmonics in Multilevel Inverters Using Genetic Algorithm
Abstract: This project presents the Genetic optimization method for harmonic elimination in a cascaded multilevel inverter and an optimal solution for eliminating pre specified order of harmonics from a stepped waveform of a multilevel inverter topology with equal dc sources. The main challenge of solving the associated non linear equation which are transcendental in nature and therefore have multiple solutions is the convergence of the relevant algorithm. The main objective of selective harmonic elimination pulse width modulation strategy is eliminating low-order harmonics by solving
213-214
215-220
nonlinear equations. The performance of cascaded multilevel inverter is compared based on computation of switching angle using Genetic Algorithm as well as conventional Newton Raphson approach. A significant improvement in harmonic profile is achieved in the GA based approach. A nine level cascaded multi level inverter is simulated in MATLAB/Simulink and a hardware model has been fabricated to validate the simulation results. Keywords: Genetic Algorithm (GA), Multilevel inverters, Selective harmonic elimination (SHEPWM). References: Dahidah m.s.a and Agelidis v.g, jul. (2008),”selective harmonic elimination pwm control for cascaded multilevel voltage source converter: a generalised fomula,” ieee trans. power electron.,vol .23,no.4,pp.1620-1630. 2. Flourentzou. n, Agelidis v.g and Demetriades g.d, mar. (2009),”vsc based hvdc power transmission system: an overview,” ieee trans. power electron, vol. 24, no. 3, pp. 592–602. 3. Fei.w, Ruan.x and wu.b, may 25–27, (2009), pso, “a generalised formulation of quarter-wave symmetry SHE-PWM problems for multilevel inverters,” ieee trans. power electron. vol. 24, no. 7, pp. 1758–1766. 4. Farokhnia.n, and Fathi.s.h, june. (2010),”comparison between approximate and accurate calculation of line voltage thd in multilevel inverters with unequal dc sources,”in proc.iciea, pp.1034-1039. 5. Hagh .m. t, Taghizadeh.h and Razi. k, oct. (2009),”harmonic minimization in multilevel inverters using modified species-based particle swarm optimization,” ieee trans. power electron., vol. 24, no. 10, pp. 2259–2267. 6. Kaviani .a, Fathi.s.h, Farokhnia.n, sep.(2010),”pso, an effective tool for harmonic elimination and optimisation in multilevel inverters,” proc. 4th ieee conf. ind. electron. appl.,pp.2902-2907. 7. Deb.k, zare, f ,(2001) “multi objective optimization using evolutionary algorithm,wiley 8. Malinowski. m,. Gopakumar k,. Rodriguez. j, and Perez. m. a., jul. (2010). “a survey on cascaded multilevel inverters,” ieee trans. ind. electron. vol. 57, no. 7, pp. 2197–2206. 9. Michalewicz.z, Schoenaner.m,(1996),”evolutionary algorithm for constrained parameter optimization problems,” vol.4,pp.1-32 10. Homaifar.a, Gi.c.x, Lai.s.h (1994) ,”constrained optimization via genetic algorithm simulation,”vol-62,no.4,pp 242-254. 1.
Authors:
Sreelal Elamana, A. Rathinam Interarea Oscillation Damping By Unified Power Flow Controller-Superconducting Magnetic Paper Title: Energystorageintegrated System Abstract: Interarea oscillations are turned to be a severe problem in large interconnected power systems, hence they cause severe problems like damage to generators, reduce the power transfer capability of transmission lines, increase line losses, increase wear and tear on the network components etc. This paper introduces a new control technique that uses unified power flow controllers (UPFC) with superconducting magnetic energy storage system (SMES) in order to damp the interarea oscillation in an effective manner Keywords: Unified Power Flow Controllers (UPFC), Super Conducting Magnetic Energy Storage Systems (SMES), Inter Area Oscillations References: 1. 2. 3. 4. 5. 6. 7.
47.
8. 9. 10. 11. 12. 13.
14. 15. 16. 17. 18. 19. 20. 21.
MahyarZarghami, Mariesa L. Crow, , JagannathanSarangapani, Yilu Liu, and StanAtcitty, “A Novel Approach to Interarea Oscillation Damping by Unified Power Flow Controllers Utilizing Ultra capacitors ,”IEEE Transactions On Power Systems, Vol. 25, No. 1, February 2010. M.klein, G.J Rogers, Kundur, “A Fundamental Study of Interarea Oscillations In Power Systems,”transactions on power systems vol.6, no.3, august 1991. J.V.Milanovic, I.A.Hiskens, “Effects of Load Dynamics on PowersystemDamping,”IEEETransactions on power systems, vol.10 no.2, may 1995. M. Mahdavian,G. Shahgholian,N. Rasti, “Modelling and Damping Controller Design for Static Synchronous Compensator,”IEEE ,978-1-42443388,2009. S.Round, Q. Yu, et al, “Performance of a Unified Power Flow Controller Using a d-q Control System,"AC and DC Transmission Conference, April 1996. N.G.Hingorani, L.Gyugyi, Understanding FACTS,‖Concepts and Technology of Flexible AC Transmission Systems. IEEE press, 2000. R.MohanMathur and R.K.Varma, “Thyristor based FACTS Controllers for Electrical Transmission System,”IEEE Series on Power Engineering, US, 2002. S. Muthukrishnan,Dr. A.Nirmalkumar , G. Murugananth, “Modelling and Simulation Five Level Inverter based UPFC System,” India International Journal of Computer Applications (0975 – 8887)Volume 12– No.11, January 2011. R. D. Saxena, K. D. JoshiG. H. Raisoni, “Application of Unified Power Flow Controller (UPFC) for Damping Power System Oscillations – A Review,”International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 4, June – 2012. A. Kazemi and M.R. Shadmesgaran, “Extended Supplementary Controller of UPFC to Improve Damping Inter-Area Oscillations Considering Inertia Coefficient,”International Journal Of Energy, Issue 1, Vol. 2, 2008. M.Thangavel, S.Shiny Jasmine, “Enhancement of Voltage Stability and Power Oscillation Damping Using Static Synchronous Series Compensator with SMES,”IJART, Vol. 2 Issue 3, 2012, 94-98. Ravi Gupta, N K Sharma, P Tiwari, Astha Gupta, Nitisha Nigam, Anubha Gupta, “Application of energy storage devices in power systems,”International Journal of Engineering, Science and Technology,Vol. 3, No. 1, 2011, pp. 289-297. S. Padma, Dr. R. Lakshmipathi, K. Ramash Kumar and P. Nandagopal, “A PI Controller for Enhancing the Transient Stability of Multi Pulse Inverter Based Static Synchronous Series Compensator (SSSC) With Superconducting Magnetic Energy Storage (SMES),”International Journal of Electrical and Electronics Engineering, 2010. P. Kumkratug and M.H. Haque, “Improvement of Damping of A Power System By STATCOM,”IEEE Transactions On Circuits And Systems- 1: REGULAR PAPERS, VOL 55, and NO.3 APRIL 2009. Dr.K.Vadirajacharya , “Super conducting Magnetic Energy Storage Based DVR,”International Journal of Engineering Research & Technology (IJERT), Vo3. 1 Issue 4, June – 2010. D. Harikrishna1, N.V. Srikanth, Y. Chandrasekhar, “Improvement of Transient Stability Using Fuzzy Logic Controlled SMES,”Majlesi Journal of Electrical Engineering Vol. 5, No. 4, December 2011. NuraddeenMagaji and M. W. Mustafa ,“Optimal Location of TCSC Device For Damping Oscillations,”MalaysiaARPN Journal of Engineering and Applied Sciences,VOL. 4, NO. 3, MAY 2009 Alberto D.Delrosso, Claudio A. Canizares and Victor M.Dona. “A study of TCSC controller Design for Power System Stability Improvement” IEEE Transactions on Power Systems,Feb, 2003, pp 1-10. S.Panda, RamnarayanN.Patel. “Improving Power System Transient Stability with an off–CentreLocation of Shunt Facts Devices” Journal of Electrical Engg, vol 57, no 6, 2006, pp 365-368. L Gyugyi, C D Schauder, S L Torgerson and A Edris.“The Unified Power Flow Controller: A New Approach to Power Transmission Control.” IEEE Transactions on Power Delivery, vol 10, no 2, 1995, p 1088. P K Dash, S Mishra and G Panda. “Damping Multimodal Power System Oscillation using a Hybrid Fuzzy Controller for Series Connected Facts Devices”, IEEE Transactions on Power Systems, vol15, no 4, November, 2000, p 1360.
221-225
Authors:
M.Aruna, R.Dhivya, D.Mousabin Rani, A.Sharmila L.J.Arthiha
Paper Title:
Electronic Toll Collection System Using Radio Frequency Technology
Abstract: This paper focuses on an electronic toll collection (ETC) system using radio frequency (RF) technology. Research on ETC has been around since 1992, during which RFID tags began to be widely used in vehicles to automate toll processes [1]. Next method proposes a very simple method for enhancing the performance of infrared electronic-tollcollection systems, resulting in longer communication time interval for the data transmission between the on board unit (OBU) and the road side unit (RSU). The proposed RF system uses antenna that are mounted on the windshields of vehicles, through which information embedded on the tags are read by RF readers, the toll debit will be taken from the owner’s bank account. The proposed system eliminates the need for motorists and toll authorities to manually perform ticket payments and toll fee collections, respectively. Data information are also easily exchanged between the motorists and toll authorities, thereby enabling a more efficient toll collection by reducing traffic and eliminating possible human errors. 48.
Keywords: Electronic Toll Collection (ETC) , On board Unit (OBU) , Road side System (RBU) , Radio Frequency (RF) . 226-229 References: D.-W. Lim and J.-S. Jun, “Free-flow multi-lane ETC system using real-time individual vehicle tracking,” in Proc. 5th Asia-Pacific Intelligent Transportation System (ITS) Forum, Seoul, Korea, Jul. 2–5, 2002, pp. TS1–TS3. H. Hashimoto, H. Ohno, M. Konishi, K. Morishita, and K. Sugimoto, “Multi-lane electronic road pricing system in Singapore,” Mitsubishi Juko Giho, Mitsubishi Heavy Industries Ltd., vol. 36, no. 1, pp. 36–45, 1999. W.-H. Lee, B.-S. Jeng, S.-S. Tseng, and C.-H. Wang, “Electronic toll collection based on vehicle-positioning system techniques,” in Proc. IEEE Int. Conf. Networking, Sensing, and Control, Taipei, Taiwan, R.O.C., Mar. 21–23, 2004, pp. 643–648. D. M. Grimes and T. O. Jones, “Automotive radar: A brief review,” Proc. IEEE, vol. 62, no. 6, pp. 804–822, Jun. 1974. W.-Y. Shieh,W.-H. Lee, S.-L. Tung, B.-S. Jeng, and C.-H. Liu, “Analysis of the optimum configuration of roadside units and onboard units in dedicated short-range communication systems,” IEEE Trans. Intell. Transp. Syst., vol. 7, no. 4, pp. 565–571, Dec. 2006. J. D. Kraus, Antennas, 2nd ed. New York: McGraw-Hill, 1988. ch. 3. J. M. Kahn and J. R. Barry, “Wireless infrared communications,” Proc. IEEE, vol. 85, no. 2, pp. 265–298, Feb. 1997. L. Dorst, A. Hoekstra, J. M. van den Akker, J. Breeman, F. C. A. Groen, J. Lagerberg, A. Visser, H. Yakali, and L. O. Hertzberger, “Evaluating automatic debiting systems by modeling and simulation of virtual sensors,” IEEE Instrum. Meas. Mag., vol. 1, pp. 18–25, June 1998.
1. 2. 3. 4. 5. 6. 7. 8.
Authors:
Adebayo I.G., Adejumobi, I.A., Adepoju, G.A. Power Flow Analysis Using Load Tap – Changing Transformer (LTCT): A Case Study of Nigerian 330kv Paper Title: Transmission Grid System Abstract: In order to ensure that electrical power transfer from generator to consumers through the grid system is stable, reliable and economical , it becomes imperative to carry out power flow studies. This paper presents power flow solution incorporating load tap changing transformer (LTCT) for solving the steady-state problems of longitudinal power system using Nigerian 330kV transmission system as a case study . In this work, the adopted numerical technique for solving the power flow problems was the Newton Raphson iterative algorithm. Modified power flow algorithm was implemented by the application of voltage control method using a load tap changing transformer (LTCT). Simulations were done using MATLAB software package .The results obtained from the existing condition of the Nigerian 330 kV transmission Network indicate that the bus voltages at New Heaven (0.929p.u), Gombe (0.886p.u), and Kano(0.880p.u) were below the set of binding limits that is, tolerance. With the incorporation of LTCT, voltage magnitudes of 0.995p.u, 0.950p.u and 0.996p.u were obtained at New Heaven, Gombe and Kano respectively, while the total system active power loss on the transmission line also reduced by about 5.1%. Keywords: Power Flow, LTCT, power system, active power loss, voltage magnitude References:
49.
1. 2. 3.
4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
14.
15.
Nagrath,. and D. Kothari. Power System Engineering. United Kingdom: Tata McGraw-Hill Education, 2006, pp. 194-196. J. J. Grainger, and W. D Stevenson. Power System Analysis. New York: McGraw-Hill Inc.pp. 1994, 329-376. I. G. Adebayo, I. A. Adejumobi and G. A. Adepoju; Application of Load Tap – Changing Transformer (LTCT) to the Optimal Economic Dispatch of Generation of the Nigerian 330kV grid System International Journal of Emerging Technologies in Sciences and Engineering IJETSE, 5(3) : 2012, pp. 40-50. L. Dedek. Loss minimization in the modified Algorithm of load flow analysis in industrial power system, United Kingdom: University of New South Wales. 2002 J. E., Van Ness, and J. H. Griffin, Elimination methods for toad flow studies, IEEE Transactions On Power Apparatus And Systems. 86 (11): 1961, pp. 1449- 1460. W. F. Tinney, and C. E. Hart. Power Flow Solution by Newton Method IEEE Transactions on Power Apparatus and Systems, Vol. PAS-86, No. 1, 1967, pp. 449- 460. H. Saadat “power system analysis” published by McGraw-Hill publishing company limited, New York., 2006, pp189-237. N. Dusko “Tap Adjustment in AC Load Flow” UMIST, September, 2002 , pp.1- 10. E. Acha, C. R. Fuerte-Esquivel, A. Ambriz-Pe´rez and C. Angeles-Camacho. FACTS; Modeling and Simulation in Power Networks. England: John Wiley and Sons Ltd, 2004 pp: 267-270 . P. K. Chattopadhyay and G. Purkayastha. “Newton-Raphson Method of Load Flow Analysis Using Coordinate Systems”, IEE (I) Journal, Vol. 54, 1974, pp. 221-224. Y. Yare and G. K. Venayagamoorthy (2010) , “A Differential Evolution Approach to Optimal Generator Maintenance Scheduling of the Nigerian Power System”, , IEEE Trans W. F. Tinney and J. W. Walker “Direct solutions of sparse network equations by optimally ordered triangularfactorization”proc. IEEE, 55 (11) : 1976, pp. 1801-1809. O.S. Onohaebi “Reduction of the High Technical power loss Associated with the Nigerian 330kv transmission network.” International journal of electrical and power engineering. 1(4) : 2007, pp. 421-431 , Department of electrical and electronics engineering, University of Benin, Benin city Nigeria . O. S. Onohaebi and O. S. Omodamwen “Estimation of bus voltages, line flows and losses in the Nigerian 330kv transmission grid.” International journal of academic research, vol.2 No3. Department of electrical and electronics engineering, University of Benin, Benin city Nigeria, 2010, pp 27. O. S. Onohaebi and S. T. Apeh “voltage instability in electrical network:- a case study of the Nigerian 330kv transmission grid.” Research journal of applied sciences 2(8). Department of electrical and electronics engineering, University of Benin, Benin city Nigeria.
230-237
16. B. Caven “A study of voltage profile in the National Electrical Power Authority network: Analysis and Recommendations”, NSE Engineering focus, vol.4, no.1, 1991, pp.3-12.
Authors:
Sandeep Kaur, Manisha Bhardwaj
Paper Title:
Review Paper on Image Processing in Distributed Environment
Abstract: In distributed image processing framework consist of analysing the performance through distributed control. It is also includes data association and dynamic data control. In this paper various distributed environments are discussed and shows how distributed image processing algorithms work by using dynamic data for a particular application. Keywords: Distributed Image processing, data association. References: 50.
1. 2. 3. 4. 5. 6. 7. 8.
A.Tchernykh,A.Cristobal-salas,”Partial Evaluation techniques for distributed image processing”2007,vol 17,no 3,pp 390-398 in Pleiades publishing ltd. Joel guillod,philippe schmid-saugeon etc,(2003)”An open internet plateform to distributed image processing applied to dermoscopy” published in cross network Ltd swissMedia center vevay,Switzerla. MarkO.guild,Christianthis,benedikt fischer(2003)”A plateform for distributed image processing and image retieval” department of medical informatics, university of technology, Aachen, germany. Noel t Goldsmith(2000)”A digital image processing techniques to produce improves focal depth ”in austrelia. Sam H.Minelli,Andera de polo”Image segmentation search engine applied to a distributed archiving architecture for content retrieval system to educational products” Florence, Italy X.L.Li,B.Veeravali, and C.C.Ko “Distributed image processing on a network of workstation”2003 international journal of computers and applications, vol 25,no 2. Sonaka,Hlavac,Boyle,”Digital image processing and computer vision”2008 indian edition by Cengage learning. A.Fakhri,A nasir,(2012)”A study of image processing in agriculture application under high performance computing environment” international journal of computer science and telecommunications
Authors:
S Mohamed Ashiq, K Karthikeyan, S Karthikeyan
Paper Title:
Fabrication of Semi Automated Pressurized Flushing System in Indian Railway Toilet
238-239
Abstract: It is a well known fact that large number of people of all age groups travel by train. Irrespective of the type of train or class, one facet of the train that needs improvement is the cleanliness of toilets. An unclean toilet causes bad smell, which makes people uncomfortable. Further it affects people by spreading various diseases. One main reason for the lack of cleanliness is that people forget to flush the toilet often. To maintain toilets clean, separate routines are adopted but only periodically at major stations. Hence most of the time, toilet remains unclean. This project aims to design and fabricate the semi automated flushing system in toilets in railway toilets. The system will be fabricated in such a way that the water is flushed only when the passenger open and close the door. For this operation, a piston mounted on the door will follow the reciprocating motion; consequently the flush system will be actuated. Possible benefits are that minimum quantity of the water will be used efficiently, which reduces wastage of water. In order to make the cleaning more effective, the pressure of the flushing system is to be increased. Keywords: flushing system, Indian railways, cleanliness, water saving, pressurized, simple, comfort References: 1.
51.
2. 3. 4. 5. 6. 7.
8. 9. 10. 11. 12. 13. 14. 15. 16. 17.
52.
Khan et al, “Sanitation in Indian railways premises: A great cause of concern”, International Journal of Advanced Engineering Technology , Vol.III/ Issue I/January-March, 2012/50-55 "Flushing squat toilets", naturesplatform.com Virginia Sarah Smith (2007), Clean: a history of personal hygiene and purity, p. 28, ISBN 978-0-19-929779-5, retrieved 30 July 2010 Rodda, J. C. and Ubertini, Lucio (2004). The Basis of Civilization - Water Science? pg 161. International Association of Hydrological Sciences (International Association of Hydrological Sciences Press 2004). C.Michael Hogan. 2007. Knossos fieldnotes, The Modern Antiquarian "Sulabh International Museum of Toilets". Sulabhtoiletmuseum.org. Retrieved 2011-11-18. Rosheim, Mark E. (1994), Robot Evolution: The Development of Anthrobotics, Wiley-IEEE, pp. 9–10, ISBN 0-471-02622-0 Kinghorn, Jonathan (1986), "A Privvie in Perfection: Sir John Harrington's Water Closet", Bath History 1: 173–188.ISBN 0-86299-294-X. Kinghorn supervised a modern reconstruction in 1981, based on the illustrated description by Harington's assistant Thomas Coombe in the New Discourse. Eveleigh, David J. (2008), Privies and Water Closets, Oxford: Shire Publications, ISBN 978-0-7478-0702-5 GB 189804990, Giblin, Albert, "Improvements in Flushing Cisterns" Mario Theriault, Great Maritime Inventions 1833-1950, Goose Lane Editions, 2001, p. 34. T. Asano, E. Diamadopoulos, & G. Tschobanoglous (Eds.), Proceedings of the Second International Symposium on Wastewater Reclamation and Reuse (pp. 55±62). October 17±20, 1995, Iraklio, Crete, Greece (Symposium Reprint Book 1). "Low-flow revolution: As water concerns rise, toilet makers meeting the challenge", Lacrosse Tribune, 26 November 2007; accessed 3 January 2009 Sandy Fleishman (5 September 1999). "Mich. Congressman offers measure to flush low-flow toilet laws". Sunday Gazette. Washington Post: p. D3. Low-Flow Toilets All Wet, Some Lawmakers Say". Los Angeles Times. Associated Press (Washington). 28 July 1999. "Period Style sanitaryware and Antique Bathrooms". Thomas Crapper. Retrieved 2011-11-18. Norton, Sheriff, Katzman, Blight and Chudacoff (2008). A People and A Nation. Houghton Mifflin. ISBN 0-618-95196-2. "Do bathtubs drain counterclockwise in the Northern Hemisphere?", The Straight Dope, April 15, 1983]
Authors:
S.Freeda Angeline Rachel, J.Jency Joseph
Paper Title:
An ZVS DC-DC converter for High voltage and Efficiency gain With Reduced Ripple Current
Abstract: The power-generation market, has shown obvious growth. However, a high voltage and efficiency gain is essential for the fuel cell and PV panel and for other appliances. The high step –up converter in the proposed converter provides ripple- free input current. The full bridge converter provides high voltage gain. An APWM Full Bridge Boost converters are widely used in application where the output voltage is considerably higher than the input voltage. Zero Voltage Switching(ZVS )is typically implemented in the switches.ZVS APWM DC-DC Full bridge converter that does not
240-244
245-248
have any drawbacks of that other converters of this type have such as complicated auxillary circuit,.increased current stress in the main power switches and the load dependent ZVS operation. In this proposed method an interleaved technique of Boost and Full Bridge converter is used..The different modes of operation of MOSFET has been discussed.. Moreover converter has high efficiency because of soft switching operation in switches. A 24V input voltage, 350V output voltage, and 168W output power simulation circuit of the proposed converter has been implemented and its efficiency is up to 87.5% Keywords: Full bridge converter, Boost converter, Zero-voltage switching, Soft switching, ZVS-APWM clamping circuit. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
Fernandez, A. Sebastian, J. Alou, P. Cobos, J.A. Rascon, M. Tecnologia Electronica Edificio 3, “Low output voltage AC/DC converter with a new scheme of synchronous rectification that complies with IEC 1000-3-2 regulations ”, IEEE Transactions on Power Electronics, July 2003. M. Jain, M. Daniele, and P. K. Jain, “A bidirectional DC–DCconverter topology for low power application,” IEEE Trans. Power Electron.,vol. 15, no. 4, pp. 595– 606, Jul. 2000.. P. Jose and N. Mohan, “A novel ZVS bidirectional cuk converter for dual voltagesystems in automobiles,” in Proc. IEEE IECON Conf. Rec., 2003, pp. 117–122 R.Li, A.Pottharst, N. Frohleke, and J. Bocker, “Analysis and design of improved isolated full-bridge bidirectional DC–DC converter,” in Proc. IEEE PESC Conf. Rec., 2004, pp. 521–526. L. Zhu, “A novel soft-commutating isolated boost full-bridge ZVS-PWM DC– DC converter for bidirectional high power applications,” in Proc. IEEE PESC Conf. Rec., 2004, pp. 2141–2146. J. Wang, F. Z. Peng, J. Anderson, A. Joseph, and R. Buffenbarger, “Low cost fuel cell converter system for residential power generation,” IEEE Trans. Power Electron., vol. 19, no. 5, pp. 1315–1322, Sep. 2004 J.Wang ,M.Reinhard, F. Z. Peng, and Z. Qian, “Design guideline of the isolated DC-DC converter in green power applications,” in Proc. IEEE Power Electron. Motion Control Conf., 2004, vol. 3, pp. 1756–1761... V. Vlatkovic, J. A. Sabate, R. B. Ridley, F. C. Lee, and B. H. Cho, “Small signal analysis of the phase-shifted PWM converter,” IEEE Trans. Power Electron., vol. 7, no. 1, pp. 128–135, Jan. 1992.. Fernandez, A. Sebastian, J. Alou, P. Cobos, J.A. Rascon, M. Tecnologia Electronica Edificio 3, “Low output voltage AC/DC converter with a new scheme of synchronous rectification that complies with IEC 1000-3-2 regulations ”, IEEE Transactions on Power Electronics, July 2003. J.-M. Kwon and B.-H. Kwon, “High step-up active-clamp converter with input-current doubler and output-voltage doubler for fuel cell power systems,” IEEE Trans. Power Electron., vol. 24, no. 1, pp. 108–115, Jan.2009.
Authors:
Kapil sharma, Sheveta Vashisht, Richa Dhiman A hybrid Approach Using Rule Induction And Clustering Techniques In Terms Of Accuracy And Paper Title: Processing Time In Data Mining Abstract: Data Mining: extracting useful insights from large and detailed collections of data. With the increased possibilities in modern society for companies and institutions to gather data cheaply and efficiently, this subject has become of increasing importance. This interest has inspired a rapidly maturing research field with developments both on a theoretical, as well as on a practical level with the availability of a range of commercial tools. In this research work titled a hybrid approach using rule induction and clustering techniques in terms of accuracy and processing time in Data Mining we using induction algorithms and clustering as a hybrid approach to maximize the accurate result in fast processing time. This approach can obtain better result than previous work. This can also improves the traditional algorithms with good result. In the above section we will discuss how this approach results in a positive as compares to other approaches.
Keywords: Rule induction, clustering, SOM algorithm, decision list induction, CN2 References: 53.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
54.
http://en.wikipedia.org/wiki/Inductive_Logic_Programming. Khurram Shehzad(2012)” EDISC: A Class-Tailored Discretization Technique for Rule-Based Classification”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 8, AUGUST 2012. Ning Zhong, Yuefeng Li(2012)” Effective Pattern Discovery for Text Mining”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 24, NO. 1, JANUARY 2012. Anil Rajput, S.P. Saxena(2012)” Rule based Classification of BSE Stock Data with Data Mining”, International Journal of Information Sciences and Application. ISSN 0974-2255 Volume 4, Number 1 (2012), pp. 1-9. K. Shehzad(2011)” Simple Hybrid and Incremental Post-pruning Techniques for Rule Induction”, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING. Alexander Borisov(2011)” Rule Induction for Identifying Multilayer Tool Commonalities”, IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, VOL. 24, NO. 2, MAY 2011. Alexander Borisov(2011)” Rule Induction for Identifying Multilayer Tool”,IEEE. Fernando E. B. Otero(2011)” A New Sequential Covering Strategy for Inducing Classification Rules with Ant Colony Algorithms”,IEEE. Thomas R. Gabriel and Michael R. Berthold(2010)” Missing Values in Fuzzy Rule Induction”, IEEE. Nick F Ryman-Tubb(2010)” SOAR – Sparse Oracle-based Adaptive Rule Extraction: Knowledge extraction from large-scale datasets to detect credit card fraud”, IEEE. Alberto Fern´andez(2010)” Genetics-Based Machine Learning for Rule Induction: State of the Art, Taxonomy, and Comparative Study”, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 14, NO. 6, DECEMBER 2010. Jeremy Davis(2010)” Methods of Information Hiding and Detection in File Systems”, 2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering. Richard Jensen, Chris Cornelis(2009)” Hybrid Fuzzy-Rough Rule Induction and Feature Selection”, R. Jensen and Q. Shen are with the Department of Computer Science, Aberystwyth University, UK.
Authors:
Taranjeet Kaur, Rupinder Kaur
Paper Title:
Comparison of Various Lacks of Cohesion Metrics
Abstract: In software engineering there are plenty of applications used for reduced complexity and improved fault prediction approaches. In this paper we study various metrics that are not very much suitable to find fault classes in software. Basically using the concept of metrics to find fault classes and reduced complexity of classes. . various techniques like linear regression, logistic regression, one way ANOVA, principal component analysis, radial basis function network, support vector machines, single layer perceptron, multilayer perceptron, error correction learning, back propagation algorithm. all
249-251
252-254
these techniques are used to find faulty classes and reduced complexity in software. Keywords: Object oriented classes, class cohesion metrics, software quality, statistical approach. References: Malkit singh and Dalwinder singh salaria (2012 )”Approaches for software fault prediction “IJCST ,Vol 3.Jehad al dallal(2010)”using TLCOM based OO lack of cohesion metrics”,procedia computer science,Vol 3. 2. S.P.Sreeja And Dr.R.Sridaran(2012)”A survey on different approaches of determining cohesion based object oriented metrics”international journal of engineering research and development, Vol 4. 3. Ezekie okike(2010)”a proposal for normalized lack of cohesion in methods metrics using field experiment”,IJCSI international journal of computer science issues,Vol(7) 4. Linda badri,Mourad badri and fadal tour(2011)”an empirical analysis of lack of cohesion metric for predicting testability of classes”international journal of software engineering and applications 5. J.al.dallal(2008)”software similarity based functional cohesion metrics”journal of software engineering and applications 6. Jehad.al dallas (2010)”mathematical validation of object oriented class cohesion metrics”international journal of computer science,IEEE,volume 4. 7. J,bosnia, etzkorn c.davis and w.li”a class cohesion metrics for object oriented design”journal of object oriented programming. 8. S counsells t.hall d bowes(2009)”theoretical and empirical analysis of three slice based metrics for cohesion” 9. Shouki a ebad Moataz ahmed(2011)”evaluation framework for package level cohesion metrics”international conference on future information technology IACSIT volume 13 10. letha etzkorn,carl davis and wei li”a practical look at lack of cohesion in methods metrics 11. Ezikel okikie(2010)”a pedagogical evaluation and discussion about lack of cohesion in methods using field experiment. 1.
Authors:
Ahmad Kamil Arshad, Md Diah J, Salah Mohamed Khalil Developing and validating HMA Workability Prediction Model for Determining the best Paddle as a Paper Title: Machine component for Workability Device Abstract: In extending the previous work in which the authors develop a workability measuring device, this paper presents a laboratory assessment which looks into the relationship between Temperature (T), speed (S), torque (Tq), power (P) and Energy E, under different types of asphaltic concrete mixes using transducer recording devices. Seven types of mix and 210 samples at six different mixing temperatures were used and at five different RPMs on three types of Paddle configurations (A, B & C) to determine the Paddle which produces the highest R2 and P- values. Statistical analyses by the MINITAB software was used to develop and validate the model for Energy (workability) for the HMA and the selection of the best Paddle for inclusion, as the component for the workability measuring device. It was found that paddle B was the most suitable and the model was therefore developed using this paddle, as a result of the significant P-value and the highest coefficient of domination (R2) for mixing Temperature, Speed, Power, Energy and Torque. The results of the sensitivity analyses demonstrate that Energy exhibits the highest increase when Speed is kept at minimum, mean and maximum values. Keywords: Workability Model, Paddle, Development, Validation, sensitivity analysis. References: 1. 2. 34.
55.
5. 6. 7. 8. 9. 10.
11. 12. 13.
14. 15. 16. 17. 18. 19. 20. 21-
56.
Celik, O.N., and Atis, C. D: 2008, Compactibility of hot bituminous mixtures made with crumb rubber-modified binders. In: Construction and Building Materials, Vol. 22, pp. 1143–1147. Khweir, K.A.J. The Influence of Material Ingredients on Asphalt Workability, Unpublished Ph.D Thesis. Heriot-Watt University, Edinburgh, UK 1991. Khalil, S.M., Rahman A. and Arshad, A.K: 2011, Development of Workability Measuring device for Asphalt Mixture using Transducer by means of Energy and Temperature Regulator. In: European Journal of Scientific Research, Vol. 51, pp 396-405 Marvillet, J. and Bougault, P: 1979, Workability of bituminous mixes: Development of a workability meter. In: Proceedings of the Association of Asphalt Paving Technologists, Vol. 48, pp. 91–110. Gudimettla, J.M., Cooley, L.A. Jr., and Brown, E.R. (2003). Workability of Hot Mix Asphalt. National Center for Asphalts Technology, NCAT Report 03-03, Auburn University, AL, USA. Gudimettla, J.M., Cooley, L.A. Jr., and Brown, E.R: 2004, Workability of Hot-Mix Asphalt. In: Transportation Research Record, No.1891, pp. 229–237. Cabrera J.G: 1992, Hot bituminous mixtures: Design for performance, In: Proceedings of the 1st National Conference on Bituminous Mixtures and Flexible Pavements. University of Thessaloniki, Greece, pp. 1-12. Cabrera, J.G: 1991, Assessment of the Workability of Bituminous Mixtures. In: Journal of Highways and Transportation, University of Leeds, Vol. 11, pp. 17-23. Cabrera, J. G. Hot Bituminious Mixture Design for Performance, In J. G. Cabrera & J. R. Dixon (Eds.), Performance and Durability of Bituminious Materials (1st ed., pp. 101-113). London: E & FN SPON 1996. Mohamed, A.A., Hamzah, M.O. and Omar, H: 2008, Performance related mix design evaluation of asphaltic concrete. In: EASTS International Symposium on Sustainable Transportation incorporating Malaysian Universities Transport Research Forum Conference (MUTRFC08), Universiti Teknologi Malaysia, 12-13 August, 1-9. Oliver, J., and Alderson, A. A Development of an Asphalt workablity index: Pilot study, Austroads Incorporated, Sydney: Australia 2006. Kalil, S. M., Arshad, .A.K., and Abdul Rahman, M.Y: 2012, The Development of Workability Measurement for Asphalt Mixture Using Transducer by Torque. In: Int. J. Pavement Res. Technol; Vol. 5 (Number 3): 203-208. Abdelgalil, S. M. K., Rahman, M. Y. A., and Arsha, A. K: 2011, Towards Improving the Device For Measurement Of Workability And Compactibility Of Asphalt Mixture Using Electronic Transducer And Temperature Regulator. In: The International Journal of Organizational Innovation, Vol.3, pp.217-231 PWD Malaysia. Standard Specification For Road Works. Section 4 Flexible Pavement. Jabatan. Kerja Raya Malaysia, Kuala Lumpur 2008. BS 812 Part 105, 107, 112. Standard Method of Aggregate Testing. British Standard Institute (BSI) London 1990, 1995. ASTM. Standard. Test Designation C 131, ASTM D 5; ASTM D 36; ASTM D 113. ASTM D 1559. Annual Book of ASTM Standards (Section 04). West Conshohocken, Philadelphia, USA 2004. Kandhal, P.S. and Mallick, R.B. Pavement Recycling Guidelines for State and Local Governments:Participant’s Reference Book. National Centre for Asphalt Technology and Federal Highway Administration: Publication No. FHWA-SA-98-042 1997. Soper, D. Statistics Calculators. [Online] February 2012. http://danielsoper.com/statcalc3/default.aspx. Freedman. A.D. Statistical Models: Theory and Practice, Cambridge University Press, The Edinburgh Building, Cambridge CB2 8RU, UK 2009. Ryan, T.P. Modern Engineering Statistics, John Wiley & Sons, Inc., Hoboken, New Jersey, New Jersey 2007. National Institute of Standards and Technology (NIST) /SEMATECH e-Handbook of Statistical Methods [Online] 2012.
Authors:
V.Thiyagarajan, V.Sekar
Paper Title:
Conversion of IC Engine Driven Bike into Electric Engine Driven Bike
255-261
Abstract: India has large two wheelers for personal and private transportation and these two-wheeled vehicles are driven by IC engine. Around 1.3 million vehicles are sold per month. Out of these, 600,000 are motorbikes, 400,000 are scooters, 200,000 are mopeds and 150,000 are 3-wheelers. This gives a total of around 16 million 2 and 3 wheelers sold per year in India. Many of our cities and towns suffer from severe air pollution caused partly by the large number of 2 and 3 wheelers with inefficient and polluting engines. Also few millions of vehicles are scraped every year due to the condemned IC engines which goes for least price value. Rather, if we have a technology to recycle those vehicles for next 10 to 15 years that would enable the users to reuse their vehicles and decrease the massive manufacturing process and import/export of brand new vehicles produces a far greater impact, or carbon footprint, than running an older vehicle for many years. The technology is the conversion process of an internal combustion engine to an electric vehicle powered by batteries comprises many steps from choosing the vehicle, sizing a motor, and the type of batteries. By using an existing vehicle with this conversion technology, you are not only extending the life cycle of that unit, but saving the huge energy input of recycling, new parts production and new manufacturing. This paper takes an old, condemned motor bike of model 1997 and converts into an allelectric engine driven vehicle with a DC motor and lead acid batteries and explains the process of conversion Keywords: EV Conversion, Peukert’s Effect, Conversion Process, Vehicle Mechanics, Transmission Stages References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30.
57.
Dhameja, S. (2001). “Electric Vehicle Battery Systems” New Delhi. Michael Brown, Shari. “Convert It”. Larminie, J. , Lowry, J., “Electric Vehicle Technology Explained”. Daniel Spring., “Future Drive – Electric Vehicles and Sustainable Transportation”. Seth Leitman ., Bob Brant., “ Build your own Electric Vehicle”. “Designing an Electric Vehicle Conversion”, Southcon/95. IEEE Conference Record. Keoun, B.C. (1995). “Designing an Electric Vehicle Conversion”, Southcon/95 Conference. Caumont, O., Moigne, P. (2000, September 3), Energy Gauge for Lead Acid Batteries in Electric Vehicle. IEEE Transactions on Energy Conversion Vol 15. Ibanez, J., Dixon ,J., (2004), "Monitoring Battery System for Electric Vehicle, Based On 'One Wire' Technology", IEEE Vehicular Power Propulsion, pp. 6-8. Prange. A step-by-step guide through the entire conversion process from Electro Automotive. (ISBN 1879857944). Retrieved from http://www.electroauto.com. Bob Brant . Build Your Own Electric Vehicle. (ISBN 0830642315). Michael Hackelman. The New Electric Vehicles: A Clean and Quiet Revolution. (ISBN 096295887). http://www.eaaev.org http://eaaev.org/eaalinks.html http://www.evadc.org/build_an_ev.html. Examples of vehicles conversions. Retrieved from http:// www.evalbum.com. Electric car manufacturers. Retrieved from http:// www.smart.com . The electric auto association . Retrieved from http:// www.eaaev.com. Reva Electric car manufacturer. Retrieved from http://www.revaindia.com. DC Power Systems is a component supplier. Retrieved from http://www.dcpowersystems.com. AC Propulsion offers many EV technologies. Retrieved from http://www.acpropulsion.com. EV Parts, Inc is a component supplier. Retrieved from http://www.evparts.com/firstpage.php. Manzanita Micro EV components. Retrieved from http://www.manzanitamicro.com . Café Electric EV controllers. Retrieved from http://www.cafeelectric.com. KTA Services provides EV components and kits. Retrieved from http://www.kta-ev.com. Victor Tikhonov imports Siemens AC drives. Retrieved from http://www.metricmind.com. EV conversion vehicles. Retrieved from http://www.evworld.com/archives/hobbyists.html. EV discussion group. Retrieved from http://geocities.com/ev_list. EV conversions. Retrieved from http://www.grassrootsev.com. The Electric Drive Transportation Association. Retrieved from http://www.electricdrive.org/index.php?tg=articles&topics=48&new=0&newc=0
Authors:
B.Saranya, V.Ramanivetha, M.Vinodhini, R.Sujipriya, A.Shankar
Paper Title:
An Embedded Based Code Finder Using Robotic Arm Movement
Abstract: Robotics is the science of designing and building robots suitable for real-life applications in automated manufacturing and other non- manufacturing. Robots are meant to aid people, making a task easier or aiding a person who wants or needs help. The main use of robots has so far been in the automation of mass production industries, where the same, definable tasks must be performed repeatedly in exactly the same fashion. There are some places that still maintain manual records. This project is used for the concern that do not process with mass products instead to deal with ledgers and old records. The main aim of this system is to find a particular code present in a book. The code has been developed using embedded C. A barcode scanner is used to scan the barcode in the paper and it sends to the microcontroller to compare with the predefined barcode. If the code is matched then the microcontroller stops the process of the stepper motor, servo motor and electromagnet. Thus the particular person’s record is found out using this system. The experimental results in software illuminate the reliability of this Code finder system as compared with the existing system is also much cheaper and ‘smarter’ than the traditional ones. Keywords:
Degree Of Freedom (DOF), Printed Circuited Board (PCB), Microelectromechanical Systems (MEMS)
References: 1. 2. 3. 4. 5.
Calgar Elbuken, Mir Behrad Khamesee, and Mustafa Yavuz, ‘Design and Implementation of a micromanipulation System using a Magnetically Levitated MEMS Robot,’ IEEE/asme transactions on mechatronics, Vol. 14, pp. 4, August 2009 Ritsuya Oshima, Toshio Takayama, Toru Omata, Kazuyuki Kojima, Kozo Takase, and Naofumi Tanaka, ‘Assemblable Three-Fingered NineDegrees-of-Freedom Hand for Laparoscopic Surgery’, IEEE/asme transactions on mechatronics, vol. 15, no. 6, december 2010 Kurt E. Clothier and Ying Shang, ‘A Geometric Approach for Robotic arm kinematics with Hardware Design, Electrical Design, and Implementation’ Hindawi Publishing Corporation, Journal of Robotics, Volume 2010, Article ID 984823, 10 pages, doi:10.1155/2010/984823 Yong Zhang, Brandon K. Chen, Xinyu Liu, and Yu Sun, ‘Autonomous Robotic Pick-and-Place of Microobjects’, IEEE transactions on robotics, vol. 26, no. 1, february 2010 Michael Dumiak,”Book Scanning Robots for Degitize Delicate Texts” IEEE Spectrum,vol 1,January 2008 in www.spectrum.ieee .org
262-266
267-270
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.
N. Zemiti, G. Morel, T. Ortmaier, and N. Bonnet, “Mechatronic design of A new robot for force control in minimally invasive surgery,” IEEE/ASME Trans. Mechatronics, vol. 12, no. 2, pp. 143–153, Apr. 2007. S. Fatikow, T. Wich, H. Hulsen, T. Sievers, and M. Jahnisch, “Microrobot System for automatic nanohandling inside a scanning electron microscope,”IEEE/ASME Trans.Mechatronics, vol. 12, no. 3, pp. 244–252, Jun. 2007. W. Ding, H. Zhang, and C. Cetinkaya, “Rolling resistance moment-based Adhesion characterization of microspheres,” J. Adhes., vol. 84, no. 12,Pp. 996–1006, 2008. W. H. Wang, X. Y. Liu, and Y. Sun, “Contact detection in microrobotic Manipulation,” Int. J. Robot. Res., vol. 26, pp. 821–828, 2007. R. H. Taylor and D. Stoianovic, “Medical robotics in computer-integrated Surgery,” IEEE Trans. Robot. Autom., vol. 19, no. 5, pp. 765–781, Oct.2003, 2010. I. W. Park, B. J. Lee, S. H. Cho, Y. D. Hong, and J. H. Kim,“Laser-based kinematic calibration of robot manipulator using differential kinematics,” IEEE/ASME Transactions on Mechatronics, pp. 1–9, 2011. W. K. Veitschegger and C. H.Wu, “Robot calibration and compensation,”IEEE Journal of Robotics and Automation, vol. 4,No. 6, pp. 643–656, 1988. Y. Sun and J. M. Hollerbach, “Active robot calibration algorithm,”In Proceedings of the IEEE International Conference onRobotics and Automation (ICRA ’08), pp. 1276–1281, May 2008. I. W. Park, B. J. Lee, S. H. Cho, Y. D. Hong, and J. H. Kim,“Laser-based kinematic calibration of robot manipulator Using differential kinematics,” IEEE/ASME Transactions on Mechatronics, pp. 1–9, 2011. F. Salewski and A. Taylor, “Fault handling in fpgas and microcontrollers In safety-critical embedded applications: A comparative Survey,” in Proc. IEEE 10th Euromicro Conf. Digital System Design (DSD’07), H. Kubatova, Ed., Aug. 2007, pp. 124–131. U.Wappler and C. Fetzer, “Software encoded processing: Building dependable Systems with commodity hardware,” in Proc. Int. Conf. Computer Safety, Reliability and Security (SAFECOMP’07), Sep. 2007, vol.4680/2007, LNCS, pp. 356–369, Springer Takahiro Endo, Haruhisa Kawasaki, Tetsuya Mouri, Yasuhiko Ishigure, Hisayuki Shimomura, Masato Matsumura, and Kazumi Koketsu, (2011)‟Five-Fingered Haptic Interface Robot:HIRO III,‟ IEEE Transactions on haptics, volume. 4, no. 1. Kawasaki .H ,Ohtuka .Y, Alhalabi .M.O and Mouri .T, (2006) „Haptic Rendering and Perception of Frictional Moment,‟ Proc. Euro- Haptics Conference., pp. 201-206 M.A.Mazidi,J.C.Mazidi,R.D.McKinaly,”The 8051 Microcontroller and Embedded Systems”,Pearson Education,2006 Kawasaki .H ,Ohtuka .Y, Alhalabi .M.O and Mouri .T, (2006) „Haptic Rendering and Perception of Frictional Moment,‟ Proc. Euro- Haptics Conference., pp. 201-206
Authors:
John Major. J, Shajin Prince, Akuluri Rakesh
Paper Title:
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
Abstract: several data aggregation schemes based on privacy homomorphism encryption have been designed and reviewed on wireless sensor networks. Cluster heads can exactly aggregate the cipher texts without decryption; thus, transmission overhead is reduced. Though, the base station only fetches the aggregated result, which origin two problems. First, the usage of aggregation function is obliged. Second, the base station cannot confirm the data integrity and authenticity. This paper go to overcome the above two drawbacks. In the design, the base station can recover all the sensing data even the data has been aggregated. Besides, the design has been concluded and adopted on both homogeneous and heterogeneous wireless sensor networks. Keywords: Data aggregation; Wireless sensor networks; Privacy homomorphism encryption. References: 1.
58.
2.
3.
4. 5. 6. 7. 8. 9. 10.
R. Rajagopalan and P. Varshney, “Data-Aggregation Techniques Sensor Networks: A Survey,” IEEE Comm. Surveys Tutorials, vol. 8, no.4, pp. 48-63, Oct.-Nov. 2006. S. Madden, M.J. Franklin, J.M. Hellerstein, and W. Hong, “TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks,” Proc. Fifth Symp. Operating Systems Design and Implementation, 2002G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15–64. J.-Y. Chen, G. Pandurangan, and D. Xu, “Robust Computation of Aggregates in Wireless Sensor Networks: Distributed Randomized Algorithms and Analysis,” IEEE Trans. Parallel Distributed Systems, vol. 17, no. 9, pp. 987-1000, Sept. 2006W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA: Wadsworth, 1993, pp. 123–135. H. C¸ am, S. O ¨ zdemir, P. Nair, D. Muthuavinashiappan, and H. Ozgur Sanli, “Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks,” J. Computer Comm., vol. 29, pp. 446-455, 2006. H. Sanli, S. Ozdemir, and H. Cam, “SRDA: Secure Reference- Based Data Aggregation Protocol for Wireless Sensor Networks,” Proc. IEEE 60th Int’l Conf. Vehicular Technology (VTC ’04-Fall), vol. 7, pp. 4650-4654, Sept. 2004. D. Westhoff, J. Girao, and M. Acharya, “Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. C. Castelluccia, E. Mykletun, and G. Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” Proc. Second Ann. Int’l Conf. Mobile and Ubiquitous Systems, pp. 109-117, July 2005. E. Mykletun, J. Girao, and D. Westhoff, “Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Comm., vol. 5, pp. 2288-2295, June 2006. D. Boneh, C. Gentry, B. Lynn, and H. Shacham, “Aggregate and Verifiably Encrypted Signatures from Bilinear Maps,” Proc. 22nd Int’l Conf. Theory and Applications of Cryptographic Techniques (Eurocrypt), pp. 416-432, 2003. Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, and Hung-Min Sun "RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks" IEEE transactions on parallel and distributed computing, VOL. 23, NO. 4, APRIL 2012
Authors:
59.
271-275
Vijoy Kumar Peddiny, P.Swaminathan Improved Natural Balancing Of Ripple Rejection LC-Filter with Modified Phase-Shifted PWM for SinglePaper Title: Leg Five-Level Flying-Capacitor Converters Abstract: Multilevel power electronic converters are the converter of choice in medium-voltage applications due to their reduced switch voltage stress, better harmonic performance, and Lower switching losses. Flying-capacitor multilevel converter has a distinct advantage in terms of its ease of capacitor voltage balancing. This paper analyses the natural voltagebalancing characteristic of a flying capacitor multilevel converter when it is operated under the spectrally modified Phase Shifted-pulse width modulation (PWM) strategy. Filter network connection is proposed that significantly improves the 276-280 natural balancing response of a flying capacitor converter for either PWM strategy. This is most significantly done by simulation. Keywords: Multilevel inverter, Phase shifted-PWM, Single leg five level Flying capacitor converter, self pre-charging.
References: Shukla, A. Ghosh, and A. Joshi, “Hysteresis modulation of multilevel inverters,” IEEE Trans. Power Electron., vol. 26, no. 5, pp. 1396–1409, May 2011. 2. K. Sadigh, S. H. Hosseini, M. Sabahi, and G. Gharehpetian, “Double flying-capacitor multicell converter based on modified phase-shifted pulse width modulation,” IEEE Trans. Power Electron., vol. 25, no. 6, pp. 1517–1526, Jun. 2010. 3. F. Defay, A. M. Llor, and M. Fadel, “Direct control strategy for a four level three-phase flying-capacitor inverter,” IEEE Trans. Ind. Electron., vol. 57, no. 7, pp. 2240–2248, Jul. 2010. 4. M. Khazraei, H. Sepahvand, K. Corzine, and M. Ferdowsi, “A generalized capacitor voltage balancing scheme for flying-capacitor multilevel converters,” in Proc. 25th Annu. IEEE Appl. Power Electron. Conf. Expo., Feb. 2010, pp. 58–62. 5. P.McGrath and D.G.Holmes, “Enhanced voltage balancing of a flying capacitor multilevel converter using phase disposition (PD) modulation,” IEEE Trans. Power Electron., vol. 26, no. 7, pp. 1933–1942, Jul. 2011 6. Vahid Dargahi, Arash Khoshkbar Sadigh, “Flying Capacitors Reduction in an Improved Double Flying Capacitor Multicell Converter Controlled by a Modified Modulation Method,” IEEE Trans. Power Electron., vol. 27, NO. 9, Sep. 2012. 7. Ruderman and B. Reznikov, “Five-level single-leg flying-capacitor converter voltage balance dynamics analysis,” in Proc. IEEE 35th Annu. Conf. Proc. Ind. Electron., Nov. 2009, pp. 486–491. 8. S. Thielemans, A. Ruderman, B. Reznikov, and J. Melkebeek, “Self-precharge for single-leg odd-level multilevel converter,” in Proc. IET 5th Int. Conf. Proc. Power Electron., Mach. Drives, Apr. 2010, pp. 1–6. 9. R. H.Wilkinson, T. A. Meynard, and H. du Toit Mouton, “Natural balance of multicell converters: The general case,” IEEE Trans. Power Electron., vol. 21, no. 6, pp. 1658–1666, Nov. 2006. 10. Thielemans, A. Ruderman, and J. Melkebeek “Flying capacitor multilevel converter voltage balance dynamics for pure resistive load” in Proc. IET 5th Int. Conf. Proc. Power Electron., Mach. Drives, Apr. 2010. 1.
Authors:
Keta Raval, Rajni Bhoomarker, Sameena Zafar Implementation of Digital Watermarking For Image Security with EBCOT Algorithm and Error Paper Title: Correcting Codes Abstract: In the cutting edge of technology, secured communication media becomes the essential need of multimedia broadcasting. In the reference of multimedia broadcasting, digital audio, video, internet data needs copyright authentication to prevent unauthorized access of data. Digital Watermarking by DWT-DCT with secrete key provides robustness as well as securing information. Digital Watermarking is processed by some way before it reaches to the receiver. The uncompressed digital image has lots of problems related to bandwidth. We can do effective image compression by EBCOT Algorithm. Error correcting codes reduces the effect of noises and attacks on communication channel. Digital watermarking provides cost effective solution for image security and communication. 60.
Keywords: Discrete Cosine Transform, Discrete Wavelet Transform, Embedded Block Coding With Optimal Truncation. References: 1. 2. 3. 4. 5. 6. 7.
281-285
J. Cox, M. L. Miller, J. A. Bloom, “Digital Watermarking”, Morgan Kaufmann Publishers, 2001. A.M.Kothari, A.C.Suthar, R.S.Gajre. “Performance Analysis of Digital Image Watermarking Technique –Combined DWT–DCT over individual DWT”, Published in International Journal of Advanced Engineering & Applications, Jan. 2010. K. J. Raval & S.Zafar, “Image Communication For Digital Watermarking ’’,Published in International Journal of Engineering and Research,IJESR,2012 K. J. Raval & S. Zafar, “Digital Watermarking With Copyright Authentication for Image Communication’’, International Conference On Signal and Image Processing, ISSP-2013. K. J. Raval & S. Zafar, “Implementation of Digital Watermarking by Combined Transform Domain Algorithm for Error Correcting Codes’’, Published in International Journal for Research, Paripex, 2012. S. AI Zahir & W .Islam, ‘‘A New Wavelet Based Image Watermarking Techniques’’, International Conference Consumer Electronics, IEEE, 2010. Feng Liu & Yongtao Qian , “A Novel Robust Watermarking Based on Levels DCT and Two levels SVD”, International Conference On Measuring Technology & Mechatronics, IEEE, 2011.
Authors:
Solmaz Ghanbarnezhad, Ali Nemati, Maryam Abolfazli Effect of Calcination Temperatures on Synthesis of Zinc Titanate Nano-Crystal Powders via Combustion Paper Title: Technique Abstract: Zinc titanate (ZnTiO3; ZT) powders were successfully prepared by a combustion technique. ZT powders were heated at various calcination temperatures, ranging from 500 to 850 ºC, for 2 h at a heating/cooling rate of 5 ºC/min. Powder samples were characterized using thermogravimetric (TGA), differential thermal analysis (DTA), X-ray diffractrometer (XRD), scanning electron microscopy (SEM) and laser particle size analyzer (LPSA). The second phases such as ZnO and TiO2 were detected in the powders calcined below 800 ºC. A single perovskite of the ZT powders was found with calcination temperatures at 800 ºC. The TGA-DTA results corresponded to the XRD investigation. The shape of crystalline will be changed as increasing the time of calcination temperature. According to SEM and LPSA analysis ultra-fine powders of ZT were obtained. 61.
Keywords: Combustion Technique, Calcination, Zinc titanate, Perovskite, Ultra-fine References: 1. 2. 3. 4. 5. 6. 7.
F.H. Dulin, D.E. Rase, Phase equilibria in the system ZnO–TiO2, J. Am. Ceram. Soc. 43 (1960) 125–131. S.F. Bartram, R.A. Slepetys, Compound formation and crystal structure in the system ZnO-TiO2, J. Am. Ceram. Soc. 1961, 44, 493–499. H.T. Kim, S. Nahm, J.D. Byun, Low-fired (Zn, Mg) TiO3 microwave dielectrics, J. Am. Ceram. Soc. 82 (12) (1999) 3476–3480. H. Obayashi, Y. Sakurai, T. Gejo, Perovskite-type oxide as ethanol sensors. J. Solid State Chem. (1976), 17, 299–303. A.T. McCord, H.F. Saunder, Preparation of pigmentary materials. US Patent 2379019, 1945. O. Yamaguchi, M. Morimi, H. Kawabata, K. Shimizu, Formation and transformation of ZnTiO3, J. Am. Ceram. Soc. 70 (1987) c97–c98. Y.S. Chang, Y.H. Chang, I.G. Chen, G.J. Chen, Y.L Chai, Synthesis and characterization of zinc titanate nano-crystal powders by sol-gel technique. J. Cryst. Growth 2002, 243, 319–326. 8. J.H. Swisher, J. Yang, R.P. Gupta, Attrition-resistant zinc titanate sorbent for Sulfur. Ind. Eng. Chem. 1995, 34, 4463–4471. 9. U. Steinike, B. Wallis, Formation and Strusture of Ti-Zn-Oxides. Cryst. Res. Technol. 1997, 32, 187–193. 10. H. Idrissi, A. Aboujalil, J. P. Deloume, G. Fantozzi. Molten salt prepared lead titanate. Journal of the European Ceramic Society,19(11), 1997-2004. 11. K. C. Patil., S. T.Aruna, and S. Ekambaram, Combustion synthesis. Current Opinion in Solid State & Materials Science, (1997), 2(2), 156-l 65. 12. E. Hosono, S. Fujihara, M. Onuki, T. Kimura, Low-temperature synthesis of nanocrystalline zinc titanate materials with high specific surface area. J. Am. Ceram. Soc. (2004), 87, 1785–1788.
286-289
13. H.Kagata, T. Inoue, J. Kato, I. Kameyama, T. Ishizaki, Low-fire microwave dielectric ceramics. Ceram. Trans. (1993), 32, 81–90. 14. B.D. Cullity, Elements of X-ray diffraction, 2nd Edition, Addison-Wesley Publishing Company, Inc., Reading, MA, 1978. 15. N. Vittayakorn, G. Rujijangul, T. Tunkasiri, X. Tan, and D.P Cann.. Influence of processing conditions on the phase transition and ferroelectric properties of PZNPZT ceramics. Material Science and Engineering B.,(2004) 108(3), 258-265.
Authors:
T.S. Starlin, D. Jasmine David
Paper Title:
Routing Analysis in Wireless Mesh Network with Bandwidth Allocation
Abstract: Wireless Mesh Network (WMN) is an important network to provide Internet access to remote areas and wireless connections in a metropolitan scale. As part of the Internet, WMN has to support diversified multimedia applications to all its users. It is essential to provide efficient Quality-of-Service (QoS) support to the networks. Searching the path with the maximum available bandwidth is one of the fundamental issues for supporting QoS in the WMN. The available path bandwidth is defined as the maximum additional rate a flow can push through saturating its path. Therefore, if the rate of traffic in a new flow on a path is no greater than the available bandwidth of this path, accepting the new traffic will not exit the bandwidth guaranteed of the existing flows. Due to interference among channel links, the bandwidth is a bottleneck metric in wired networks, is neither a defect nor additive in wireless networks. In this paper a computing path weight which captures the available path bandwidth information is proposed. This paper also show that the efficient routing protocol based on the new path weight which provides the consistency and loop-freeness to the network. The consistency property guarantees that each node makes an appropriate packet forwarding decision, so that a data packet does traverse through the exact path. The simulation experiments also show that the proposed path weight gives high-throughput paths. Keywords: Wireless mesh networks, routing, efficient routing proactive hop-by-hop routing, distributed algorithm. References: 1. 2. 3. 4. 5.
62.
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.
63.
Q. Zhang and Y.-Q. Zhang, “Cross-Layer Design for QoS Support in Multihop Wireless Networks,” Proc. IEEE, vol. 96, no. 1, pp. 234-244, Jan. 2008. T. Salonidis, M. Garetto, A. Saha, and E. Knightly, “Identifying High Throughput Paths in 802.11 Mesh Networks: A Model-Based Approach,” Proc. IEEE Int’l Conf. Network Protocols (ICNP ’07), pp. 21-30, Oct. 2007. C.-Y. Chiu, Y.-L. Kuo, E. Wu, and G.-H. Chen, “Bandwidth- Constrained Routing Problem in Wireless Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 1, pp. 4-14, Jan. 2008. J. Tang, G. Xue, and W. Zhang, “Interference-Aware Topology Control and QoS Routing in Multi-Channel Wireless Mesh Networks,” Proc. ACM MobiHoc, pp. 68-77, May 2005. Y. Yang and R. Kravets, “Contention-Aware Admission Control for Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, Apr. 2009. H. Li, Y. Cheng, C. Zhou, and W. Zhuang, “Minimizing End-to- End Delay: A Novel Routing Metric for Multi-Radio Wireless Mesh Networks,” Proc. IEEE INFOCOM, pp. 46-53, Apr. 2009. Y. Yang and J. Wang, “Design Guidelines for Routing Metrics in Multihop Wireless Networks,” Proc. IEEE INFOCOM, pp. 2288- 2296, Apr. 2008. J.L. Sobrinho, “Algebra and Algorithms for QoS Path Computation and Hop-by-Hop Routing in the Internet,” Proc. IEEE INFOCOM, pp. 727-735, Apr. 2001. R. Draves, J. Padhye, and B. Zill, “Comparison of Routing Metrics for Static Multi-Hop Wireless Networks,” Proc. ACM SIGCOMM, pp. 133-144, Sept. 2004. D. Couto, D. Aguayo, J. Bicket, and R. Morris, “A High- Throughput Path Metric for Multi-Hop Wireless Routing,” Proc. ACM MobiCom, pp. 134-146, Sept. 2003. M. Campista, D. Passos, P. Esposito, I. Moraes, C. Albuquerque, D. Saade, M. Rubinstein, L. Costa, and O. Duarte, “Routing Metrics and Protocols for Wireless Mesh Networks,” IEEE Network, vol. 22, no. 1, pp. 6-12, Jan. 2002. R. Draves, J. Padhye, and B. Zill, “Routing in Multi-Radio, Multi- Hop Wireless Mesh Networks,” Proc. ACM SIGCOMM, pp. 114- 128, Oct. 2004. A.P. Subramanian, M.M. Buddkihot, and S. Miller, “Interference Aware Routing in Multi-Radio Wireless Mesh Networks,” Proc. Second IEEE Workshop Wireless Mesh Networks (WiMesh ’06), pp. 55- 63, Sept. 2006. Y. Yang, J. Wang, and R. Kravets, “Designing Routing Metrics for Mesh Networks,” Proc. IEEE Workshop Wireless Mesh Networks (WiMesh ’05), Sept. 2005. M. Genetzakis and V.A. Siris, “A Contention-Aware Routing Metric for Multi-Rate Multi-Radio Mesh Networks,” Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. And Networks (SECON ’08), pp. 242-250, 2008. H. Li, Y. Cheng, and C. Zhou, “Multi-Hop Effective Bandwidth Based Routing in Multi-Radio Wireless Mesh Networks,” Proc. IEEE Global Telecomm. Conf. (GlobeCom ’08), pp. 1-5, Nov. 2008. T. Liu and W. Liao, “Interference-Aware QoS Routing for Multi- Rate Multi-Radio Multi-Channel IEEE 802.11 Wireless Mesh Networks,” IEEE Trans. Wireless Networks, vol. 8, no. 1, pp. 166- 175, Jan. 2009. L. Chen and W.B. Heinzelman, “QoS-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 23, no. 3, pp. 561-572, Mar. 2005. Q. Xue and A. Ganz, “Ad Hoc QoS On-Demand Routing (AQOR) in Mobile Ad Hoc Networks,” J. Parallel and Distributed Computing, vol. 63, pp. 154-165, 2003. W. Liao, Y. Tseng, and K. Shih, “A TDMA-Based Bandwidth Reservation Protocol for QoS Routing in a Wireless Mobile Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’02), pp. 3186-3190, Apr. 2002. K. Shih, C. Chang, Y. Chen, and T. Chuang, “Dynamic Bandwidth Allocation for QoS Routing on TDMA-Based Mobile Ad Hoc Networks,” Computer Comm., vol. 29, pp. 1316-1329, 2006 C. Zhu and M.S. Corson, “QoS Routing for Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, pp. 958-967, June 2002. H. Zhai and Y. Fang, “Impact of Routing Metrics on Path Capacity in Multirate and Multihop Wireless Ad Hoc Networks,” Proc. 14th IEEE Int’l Conf. Network Protocols (ICNP ’06), pp. 86-95, Nov. 2006.
Authors:
Preeti Chopra, Md. Ataullah
Paper Title:
A Survey on Improving the Efficiency of Different Web Structure Mining Algorithms
Abstract: With the rapid increase in internet technology, users get easily confused in large hyper text structure. Providing the relevant information to user is primary goal of the website owner. In order to achieve this goal, they use the concept of web mining. Web mining is used to categorize users and pages by analyzing the users’ behavior, the content of the pages, and the order of the URLs that tend to be accessed in order [1]. Web structure mining plays very important role in this approach. It’s defined as the process of analyzing the structure of hyperlink using graph theory. There are many proposed algorithms for web structure mining such as Pagerank Algorithm, HITS, Weighted pagerank Algorithm, Topic Sensitive Pagerank Algorithm (TSPR), weighted page content rank Algorithm (WPCR ) etc. In this paper, we have described the
290-295
296-298
outline of all the algorithms and identify their strengths and limitations. Keywords: HITS, Pagerank algorithm, TSPR, Web mining weighted pagerank algorithm, WPCR etc. References: R. Kosala and H. Blockeel, “Web Mining Research: A survey”, In ACM SIGKDD Explorations, Q. Lu and L. Getoor. Link-based classification. In Proceedings of ICML-03, 2003. L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report Stanford Digital Libraries SIDL-WP-1999-0120, 1999. 4. S. Pal, V. Talwar, and P. Mitra. Web mining in soft computing framework: Relevance, state of the art and future directions IEEE Trans. Neural Networks, 13(5):1163–1177 2002. 5. Mishra Shesh Narayan et al (2012), “An Effective algorithm for web mining based on Topic sensitive pagerank algorithm”, International journal of computer science and software engineering. 6. Wenpu Xing and Ali Ghorbani, “Weighted Pagerank Algorithm”, In proceedings of the 2rd Annual Conference on Communication Networks & Services Research, PP. 305-314, 2004. 7. Bhatia Tamanna (2011), “Link analysis algorithm for web mining”, International journal of computer science and software engineering.(0976-8491) 8. Munibalaji T and , Balamurugan C (2012), “Analysis of Link Algorithms for Web Mining”, International Journal of Engineering and Innovative Technology (IJEIT) Volume 1, Issue 2, 9. Mukhopadhyay et al.(2006),” A Syntactic Classification based Web Page Ranking Algorithm”, 6th International Workshop on MSPT Proceedings 10. http://www.csbdu.in/econtent/Data%20Mining%20&%20 Warehousing/Unit%20III.pdf 11. http://www.ieee.org.ar/downloads/Srivastava-tut-pres.pdf 1. 2. 3.
Authors:
Mohammed Shareef Mahmoud Shareef, R.K. Pandey
Paper Title:
Study of Management of Risk and Loss Control Program in Civil Engineering Projects
Abstract: Most of the construction projects are having their own risks and loss factors involved, and hence in order to control such damages we have use strategies to control those risk and loss factors related to project. In this article we are presenting the study over techniques for management of risk and loss control in construction projects. For construction projects, there are many risk and loss facets as well as complicated relations, which will influence it. The complicated relations include direct, indirect, obvious, implicit or unpredictable, What's more, the various risk factors will cause different severity of the consequences. If you do not consider these risk factors, or ignore the major factors, they all will cause damage because of decision-making errors. Quality targets, time targets, cost targets are the three objectives of project management. In the construction project, the time objective is closely and inseparably related to the cost objective. Hence risk and loss management of construction period is a key part in the risk management of construction. Keywords: Quality targets, time targets, cost targets are the three objectives of project management. In 64.
65.
References: 1.
Jaafari, A. (2001). Management of risks, uncertainties and opportunities on projects: time for a fundamental shift. International Journal of Project Management, 19(2), 89-101. 2. Azinim, M. & Edum-Fotwe, F. T. (2006, 18-20 October). Risk management practices of construction project staff: Preliminary lessons. Paper presented at the Construction in the XXI Century- Local and global challenges, Rome. 3. L.P. Gragg and J.M. Cassell, Progress in Management Engineering,pp. 173 - 197.2009 Nova Science Publishers, Inc. 4. CarL.Pritchard, risk management ,concepts and guidance pp28-54,2005 third edition. printed in the United states of America 5. R.max wideman fellow,PMI, risk management - a guide to managing project risks and opportunities, 1992,project management insitiute .inc. 6. Kajsa Simu, The Construction Site Manager’s Impact on Risk Management Performance, doctoral thesis, 2009,Lulea, Sweden 7. Aalto, P., Järvinen, P., Tuovinen, M, 2003, Riskijatkumot projektiliiketoimintaverkostossa: teoriaa ja käytäntöä, Teknillinen korkeakoulu, TAI tutkimuslaitos, Espoo. 8. Artto, K., Kähkönen, K., Management of Uncertainty, yet unpublished Artto, K., Kähkönen, K., Pitkänen P.J., 2000, Unknown Soldier Revisited: A Story of risk Management, Project Management Association Finland, Helsinki. 9. Artto, K., Kujala, J., Martinsuo, M., 2005, Projektiliiketoiminta, Tuotantotalouden osasto, Teknillinen korkeakoulu, Espoo. 10. Axelsson, B., 1994, Corporate strategy models and networks – diverging perspectives, in Axelsson, B., and Easton, G., (eds.) Industrial Networks: A new View of Reality, Routledge, London. 11. Baccarini, D., Archer, R., The risk ranking of projects: a methodology, International Journal of Project Management, 2001. 12. Baloi, D., Price, A.D.F., Modelling global risk factors affecting construction cost performance, International Journal of Project Management, 2003. 13. Beach, R., Webster, M., Campbell, K.M., An evaluation of partnership development in the construction industry, International Journal of Project Management, 2005.
Authors:
Anusuya Venkatesan, Latha Parthiban
Paper Title:
Hybridized Algorithms for Medical Image Segmentation
Abstract: Clustering analysisis a unsupervised pattern recognition and groups similar data items into same cluster while dissimilar data item will be moved into different clusters.The purpose of data clustering is to reveal the data patterns and gain some initial insights regarding data distribution.Similarly Image segmentation groups pixels of an image into multiple segments with respect to intensities. This in turn helps to segment objects of interest from the images. In this paper we discuss various segmentation algorithms such as Fuzzyc-means, Maximum Entropy optimized with Particle swarm Optimization to detect abnormalities present in the image. We apply these algorithms on MRI image and Ultra sound images. In order to improve the visibility of ultra sound images, we apply morphological filtering before segmentation. The results section of this paper show the outcome of the algorithms. Keywords: FCM, Maximum Entropy, PSO, MRI and Ultra sound image. References: 1. 2. 3.
Robust non-local fuzzy c-means algorithm with edge preservation for SAR image segmentation Signal Processing, Volume 93, Issue 2, February 2013, Pages 487-499 JieFeng, L.C. Jiao, Xiangrong Zhang, Maoguo Gong, Tao Sun Fuzzy c-means clustering with weighted image patch for image segmentation Applied Soft Computing, Volume 12, Issue 6, June 2012, Pages 16591667 ZexuanJi, Yong Xia, Qiang Chen, Quansen Sun, Deshen Xia, David Dagan Feng Single point iterative weighted fuzzy C-means clustering algorithm for remote sensing image segmentation Pattern Recognition, Volume 42, Issue
299-304
305-307
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
11, November 2009, Pages 2527-2540 Jianchao Fan, Min Han, Jun Wang Yuhua G, Lawrence OH. Kernel based fuzzy ant clustering with partition validity. In: IEEE international conference on fuzzy systems. Vancouver (BC, Canada): Sheraton Vancouver WallCentre Hotel; 2006. p. 16–21. J. C. Dunn, “A Fuzzy Relative of the ISODATA Process and its Use in Detecting Compact Well-Separated Clusters”, J. Cybernetics, vol. 3,No. 3, pp. 32-57, 1973. J. C. Bezdek, “Pattern Recognition with Fuzzy Objective Function Algorithms”, New York, Plenum, 1981 Kennedy, J. and Eberhart, R.C.: “Particle Swarm Optimization”, Proceedings of IEEE International conference on Neural Networks, Piscataway, New Jersey, pp. 1942-1948, 1995. Kennedy, J. and Eberhart, R.C.: “Particle Swarm Optimization”, Proceedings of IEEE International conference on Neural Networks, Piscataway, New Jersey, pp. 1942-1948, 1995 M. Clerc, and J. Kennedy.: “The particle swarm - explosion, stability, and convergence in a multidimensional complex space”, IEEE Transactions on Evolutionary Computation, vol. 6(1), pp. 58-73, 2002. J. Kennedy.: “Some issues and practices for particle swarms”, in IEEE Swarm Intelligence Symposium, pp. 162-9, 2007. AnusuyaVenkatesan, LathaParthiban ,Improving Visibility of Gall Stones from Gall Bladder in Ultrasound Images Using Clustering, International Journal of Science and Applied Information Technology,pp.117-121 ISSN 2278-3083. Du Feng,Shi, Wenkang,Chen, Liangzhou,Deng and Yong,ZhuZhenfu. 2005. Infrared image segmentation with 2-D maximum entropy method based on particle swarm optimization (PSO).Pattern Recognition LettersVolume 26, Issue 5, 597–603. Di Zhou, Jun Sun, Choi-Hong Lai, WenboXu and Xiaoguang Lee. 2011. An improved quantum-behaved particle swarm optimization and its application to medical image registration. International Journal of Computer Mathematics Volume 88, Issue 6. Shannon, C.E. and Weaver, W. 1949. The Mathematical Theory of Communication. Univ. of Illinois Press, Urbana, IL.
Authors:
Bilal Abdullah Nasir
Paper Title:
Design of High Efficiency Cross-Flow Turbine for Hydro-Power Plant
Abstract: The cross-flow hydraulic turbine was gaining popularity in low head and small water flow rate, in establishment of small hydro-power plant, due to its simple structure and ease of manufacturing in the site of the power plant. To obtain a cross-flow turbine with maximum efficiency, the turbine parameters must be included in the design. In this paper all design parameters of cross-flow turbine were calculated at maximum efficiency. These parameters include runner diameter, runner length, runner speed, turbine power, water jet thickness, blade spacing, number of blades, radius of blade curvature, attack angle and the blade and exit angles. Keywords: Cross-flow turbine, hydro-power plant, design parameters, maximum efficiency. 66.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
http:// www.ossberger.de / cms /en / hydro / the ossberger-turbine |# C152. Mockmore, C. A. and Merryfield, F.: "The Banki water turbine", Engineering Experiment Station Bulletin Series, No. 25, February, 1949. Javed, A. C. et al: "Design of a cross-flow turbine for micro-hydro power application", proceeding of ASME 2010 Power Conference, July, Chicago, Illinois, USA, 2010. Durgin, W. W. and Fay, W. K.: "Some fluid flow characteristic of cross-flow type turbine", The Winter Annual Meeting of ASME, New Orleans, pp. 77-83, Dec., 1984. Nadim, M. A. and Desia, V. R.: "An experiment study of the effect of some design parameters in cross-flow turbine efficiency", Engineering report, Department of Civil Engineering, Clemson University, 1991. Hayati, O.: "Effect of interior guide tubes in cross-flow turbine runner on turbine performance", International Journal of Energy Research, pp. 953964, John Wiley and Sons, 2000. Costa Pereira, N. H. and Borges, J. E.: "Study of the nozzle flow in cross-flow turbine", International Journal of Mechanical Science, Vol. 38, No. 3, pp. 283-302, 1996. Wakati, R.: "Development of cross-flow turbine for local manufacturing", M. Sc. Thesis, University of Dar Es Salaam, 2010. CelsoPenche: "layman's Guide book on how to develop a small hydro site", Published by ESHA, Second Edition, Belgium, June, 1998.
Authors:
Lavanya Pamulaparty, C.V. Guru Rao
Paper Title:
A Novel Approach to Perform Document Clustering Using Effectiveness and Efficiency of Simhash
308-311
Abstract: Similarity is the most important feature of document clustering as the amount of web documents and the need of integrating documents from the huge multiple repositories, one of the challenging issues is to perform clustering of similar documents efficiently. . A measure of the similarity between two patterns drawn from the same feature space is essential to most clustering procedures. From huge repositories, similar document identification for clustering is costly both in terms of space and time duration, and specially when finding near documents where documents could be added or deleted. In this paper, we try to find the effectiveness of Simhash based similarity measurement technique for detecting the similar documents which are used to perform clustering of documents using novel based K-means clustering method. Keywords: document clustering, Simhash similarity measure, k-means clustering, near documents, fingerprints. 67.
References: C. Gong., Y. Huang., X. Cheng. and S. Bai., “Detecting Near-Duplicates in Large-Scale Short Text Databases,” Proc. of PAKDD 2008, LNAI, vol. 5012, pp. 877-883. Springer, Heidelberg 2. G.S. Manku, A. Jain. and A.D. Sarma, “Detecting Near-Duplicates for Web Crawling,” Proc. of 16th International World Wide Web Conference (WWW), 2007. 3. Xiao, C., Wang, W., Lin, X., Yu, J. X., Wang, G. 2011. “Efficient Similarity Joins for Near Duplicate Detection”. ACM Trans. Database System. 4. M. Charikar, “Similarity Estimation Techniques from Rounding Algorithm,” Proc. of 34th Annual Symposium on Theory of Computing (STOC), 2008, pp 380-388. 5. M.R. Henzinger, “Finding near-duplicate web documents: a large-scale evaluation of algorithms,” Proc. of ACM SIGIR, 2006, pp 284-291. 6. S.Brin, J.Davis and H.Garcia-Molina, “Copy detection mechanisms for digital documents,” Proc. of the ACM SIGMOD Annual Conference, San Francisco, CA, 1995. 7. M.Zini, M.Fabbri and M.Mongelia. “Plagiarism detection through multilevel text comparison,” Proc. of the 2nd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution, Leeds, U.K., 2006. 8. Z.P.Tian, H.J.Lu and W.Y.Ji, “An n-gram-based approach for detecting approximately duplicate data records,” International Journal on Digital Libraries, 5(3):325-331, 2001. 9. K.Muthmann, W.M.Barczynski, F.Brauer and A.Loser,”Near-duplicate detection for web-forums,”, 142- 152, International Database Engineering and Applications Symposium(IDEAS), 2009. 10. J. Dean and S.Ghemawat, “MapReduce: Simplified data processing on large cluster,” Proc. of 6th Symposium on Operating System Design and 1.
312-315
Implementation (OSDI), 2004. 11. N.Shivakumar and H.Garcia-Molina, “SCAM : A copy detection mechanism for digital documents, ” Proc. of 2nd International Conference in Theory and Practice of Digital Libraries, Austin, Texas, 1995. 12. N.Shivakumar and H.Garnia-Molina, “Finding nearreplicas of documents on the web,” Proc. of Workshop on Web Databases, Valencia, Spain, 1998. 13. Jiawei Han and Micheline Kamber, “Data Mining – concepts and techniques”, second edition, Morgon Kaufmann publishers 14. Z.P.Tian, H.J.Lu and W.Y.Ji, “An n-gram-based approach for detecting approximately duplicate data records,” International Journal on Digital Libraries, 5(3):325-331, 2001.
68.
Authors:
S. L. Bangare, A. D. Kadam, P. S. Bangare, P. V. Katariya, C. A. Khot, N. R. Kankure
Paper Title:
Solutions Concerning Information Systems for Real Time Bus Arrival
Abstract: In today’s world public transport systems plays an important role in the development of the country. Many factors such as mobility, environmental and energy objectives place demands on public transport systems. Current systems which are old and in need of upgrading, must expand service area, improve efficiency and increase service frequency to serve these demands of the public travelling through the improved transportation system. Research is necessary to solve operating problems, to adapt appropriate new technologies from other industries, and to introduce innovations into the transport industry and provide people with the real time arrival predictions so as to save their time over waiting & measure the performance of different transport systems. This paper provides means by which the transport industry can develop innovative near-term solutions to meet demands placed on it. Keywords: Automatic vehicle location (AVL), Automatic passenger counter (APC), Passenger system, Real Time Bus
316-319
References: 1. 2. 3. 4. 5.
TRANSIT COOPERATIVE RESEARCH PROGRAM, Transportation Research Board on National Academics, WASHINGTON, D.C., 2003, www.TRB.org http://www.imassindia.com/Passenger-Information-System.html YU Bo, LU Jing, “An Adaptive Bus Arrival Time Prediction Model”, Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009. http://www.arinc.com/products/rail_control_ctr/passenger_info_systems.html Dihua Sun, Hong Luo, “Predicting Bus Arrival Time on the Basis of Global Positioning System Data”, Journal of the Transportation Research Board, No. 2034, Transportation Research Board of the National Academies, Washington, D.C., 2007, pp. 62–72. DOI: 10.3141/2034-08.
Authors:
69.
A. D. Prasad, Kamal Jain, Ajay Gairola Surface Temperature Estimation using Landsat Data for part of the Godavari and Tapi Basins, India: A Paper Title: Case Study Abstract: This paper presents results of surface temperatures for a part of the Godavari and Tapi Basins, India. Thermal infrared remote sensing proved its capability in monitoring temperature field. Landsat data of the study area have been used for the surface temperature estimation and analysis. The method used to extract surface radiance from the digital number (DN) values is based on USGS, 2001. Landsat 7 Science Data User’s Handbook. The surface temperature is then extracted from the surface radiance. Based on Landsat image, average temperature of the study area is 25°C, minimum temperature as 15oC, maximum temperature as 35oC respectively, are inferred. The results have been compared with data obtained by India Meteorological Department data. The comparison of observed temperatures has shown a good correlation, with a difference of 2- 2.5°C. Keywords: GIS, Godavari, Landsat7, Temperature.
320-322
References: 1. 2. 3. 4.
70.
El-Sayed Ewis Omran, Detection of Land-Use and Surface Temperature Change at Different Resolutions, Journal of Geographic Information System, 2012, 4, 189-203 P K Srivastava, T J Majumdar and Amit K Bhattacharya, Study of land surface temperature and spectral emissivity using multi-sensor satellite data, J. Earth Syst. Sci. 119, No. 1, February 2010, pp. 67–74 Sun, D. and Pinker, T. (2004). Case study of Soil Moisture effect on Land Surface Temperature Retrieval. IEEE Geoscience And Remote Sensing Letters. Vol. 1. No. 2 : 127 – 130. USGS, 2001. Landsat 7 Science Data User’s Handbook
Authors:
Kalyan Chatterjee, Mandavi, Prasannjit, Nilotpal Mrinal, S.Dasgupta
Paper Title:
Adaptive Filtering and Compression of Bio-Medical Signals Using Neural Networks
Abstract: Biomedical signals are often contaminated by noise. Thus, noise removal and subsequently their lossless compression is also very necessary. This paper presents an adaptive filtering technique for removing noise from ECG signal using the Recursive Least Square (RLC) method. Twelve significant features are extracted from an echocardiogram (ECG) dataset. After carrying out noise cancellation followed by Recursive Least Square method filtered, ECG signal is obtained. Moreover we have also compressed the ECG signals. The filtered signals are used as input to the artificial neural network. Finally these samples which are used in the database are trained and tested using the Back Propagation Algorithm. The compression ratio is observed to be 0.9745583.It is further observed that input signals are same as the supervised signals used in the network. This paper presents experimental results which demonstrates the usefulness of adaptive filtering and data compression in several bio-medical applications. Keywords: Adaptive filtering, Data compression, back propagation, Recursive least square method. References: 1. 2. 3. 4.
Anuradha Pathak and A. K. Wadhwani, "Data Compression of ECG Signals Using Error Back Propagation (EBP) Algorithm", International Journal of Engineering and Advance Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-4, April 2012. Monica Fira and Liviu Goras, "Biomedical Signal Compression based on Basis Pursuit", International Journal of Advance Science and Research, Volume-14, January 2012. R. Rojas, "The Back propagation Algorithm", Neural Networks, Springer-Verlag, Berlin, 1996 http://archive.ics.uci.edu/ml/datasets.html for database of Echocardiogram.
323-327
5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23.
A.Yilmaz & M.J.English, "Adaptive Non-Linear Filtering of ECG Signals: Dynamic Neural Network Approach, Artificial Intelligence Methods for Biomedical Data Processing". Y. Nagasaka, A. Iwata, "Performance Evaluation of BP and PCA Neural Networks for ECG Data Compression. Neural Networks", 1993. IJCNN '93-Nagoya. Proceedings of 1993 International Joint Conference on, Volume: 1 , 25-29 Oct. 1993 R. Battiti, A. Sartori, G. Tecchiolli, P. Tonella and A. Zorat, "Neural compression: an integrated application to EEG signals, in: Proceedings of the International Workshop on Applications of Neural Networks" , Stockholm, 1995, pp. 210–219 World Congress on Neural Networks, San Diego: 1994, International Neural Network Society - 1994 - Psychology - 3580 pages "Data compression technique using neural networks", June 5-9, 1994 Md. Zia Ur Rahman, Rafi Ahamad Shaik & D V Rama Koti Reddy, Noise Cancellation in ECG Signals using Computationally Simplified Adaptive Filtering Techniques: Application to Biotelemetry Signal Processing: An International Journal (SPIJ) Volume (3) : Issue (5) Widrow, J. Glover, J. M. McCool, J. Kaunitz, C. S. Williams, H.Hearn, J. R. Zeidler, E.Dong, and R. Goodlin,“Adaptive noise cancelling: Principles and applications ”, Proc. IEEE, vol. 63, pp.1692-1716, Dec. 1975. N. V. Thakor and Y.-S. Zhu, ``Applications of adaptive filtering to ECG analysis: noise cancellation and arrhythmia detection," IEEE Transactions on Biomedical Engineering, vol. 38, no. 8, pp. 785-794, 1991. Ziarani. A. K, Konrad. A, ``A nonlinear adaptive method of elimination of power line interference in ECG signals", IEEE Transactions on Biomedical Engineering, Vol49, No.6,pp.540-547, 2002. Farhang-Boroujeny, B., “Adaptive Filters- Theory and applications”, John Wiley and Sons, Chichester, UK, 1998. P. Laguna, R. Jane, S. Olmos, N. V. Thakor, H. Rix, and P. Caminal, ``Adaptive estimation of QRS complex by the Hermite model for classification and ectopic beat detection," Med. Bio. Eng. Comput., vol. 34, pp. 58-68, Jan. 1996. Farhang-Boroujeny, B.: Adaptive Filters, Theory and Application. Wiley England: Wiley-Verlag (1998) R. E. Kalman, A New Approach to Linear Filtering and Prediction Problems, Transaction of the ASME - Journal of Basic Engineering, March 1960 R. E. Kalman, R. S. Bucy, New Results in Linear Filtering and Predictive Theory, Transaction of ASME Journal of Basic Engineering,Series 83D, pp. 95-108, Martch 1961 Dejan Kihas, ˇ Zeljko M. Djurovi´c, Branko D. Kovaˇcevi´,”Adaptive Filtering based on Recurrent Neural Networks”, JOURNAL OF AUTOMATIC CONTROL, UNIVERSITY OF BELGRADE, VOL. 13(1):13-24, 2003 C.K. Chui, G. Chen, Kalman Filtering with Real-Time Applications,Second Edition, Springer Series in Information Sciences, Springer-Verlag, 1991 Z. Djurovi´c, B. Kovaˇcevi´c, An Adaptive Kalman Filtering Using Recurrent Neural Networks, Proc. 4th Seminar on Neural Network Applications in Electrical Engineering, NEUREL-97 Z. Djurovi´c, B. Kovaˇcevi´c, Robust Estimation with Unknown Noise Statistics, IEEE Trans. on Automatic Control, Vol. 44, No. 6, June 1999 W.S. Chaer, R.H. Bishop, J. Ghosh, Hierarchical Adaptive Kalman Filtering for Interplanetary Orbit Determination, IEEE Trans. On Aerospace and Electronic Systems, Vol. 34, No. 3, July 1998
Authors:
Sakkeer Hussain C.K, R. Muthukumar, A. Rathnam
Paper Title:
A Novel Control Strategy for High Efficient SSPFC Topology
Abstract: The conventional SSPFC (single-stage power factor correction) converters suffer from low efficiency because of high voltage and current stresses acting on switching devices and other circuit parameters. The introduction of resonant converters along with the conventional SSPFC provides a very sensible solution for the above mentioned problem. Since this resonant SSPFC converter operation carried out with variable frequency, it provides an efficient operation only at full load. Below full load, the operation results in efficiency drop due to the shift from resonant frequency. A load dependent strategy helps in maintaining the efficiency level as constant even below full load. Two variables are to be controlled in this circuit, which are resonant frequency and duty ratio. Normally two controllers are essential to perform the operation which cause increased cost and requires more processing time. This paper proposes a single PI controller to control the both variables to provide high converter efficiency and to reduce the cost and the processing time. The proposed system provides a constant efficiency in conversion process up to 50% of full load current. The MATLAB simulation is presented to verify the performance analysis. Keywords: AC/DC converters, power factor correction converters, PI controller, resonant converter. 71.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
M. Jovanovic & D. Crow, “Merits and Limitations of Full Bridge Rectifier with LC Filter in Meeting IEC 100-3-2 Harmonic Limit Specification,” IEEE Transactions on Industry Applications, Vol. 33, No. 2, March 1997, pp. 551-557. Z. Yang & P. Sen, “Recent Developments in High Power Factor Switch-Mode Converters,” Proceedings of the Canadian Conference on Electrical and Computer Engineering (CCECE) 1998, pp. 477-480. G. Spiazzi & S. Buso, “Power Factor Pre-Regulator Based on Combined Buck- Fly back Topologies,” IEEE Transactions on Power Electronics, Vol. 15, No. 2, March 2000, pp. 197-204. M. Daniele, P. Jain & G. Joos, “Single Stage Power Factor Corrected AC/DC Converter,” IEEE Transactions on Power Electronics, Vol. 14, No. 6, Nov. 1999, pp. 1046-1055. Huai Wei & Issa Batarseh, “Comparison of Basic converter Topologies for Power Factor Correction” IEEE 1998 pp. 348-353. Changming Qiao & Keyue M. Smedly, “A Topology Survey of Single-Stage Power Factor Corrector” IEEE 2000 pp.460-467. O. Garcia, J. Cobos, R. Preito, P.Alou & J. Uceda, “Single Phase Power Factor Correction: A Survey” IEEE Transactions on Power Electronics vol.18, No.3, May 2003 pp. 749-755. Yu-Lung Ke & Ying-Chun Chuang, “A Novel Single-Stage Power-Factor-Correction Circuit with High Frequency Resonant Energy tank for DClink Inverter” IEEE Transaction on circuits & systems-II, vol.53, No.2 Feb 2006. M.S. Agamy & P.K. Jain, “A new single stage power factor corrected three level resonant AC/DC converter with and without active current control”, IEEE Oct. 2005 pp. 1992-1999. M.S. Agamy & P.K. Jain, “A single stage PFC three level resonant AC/DC converter using combined phase shift and frequency control” IEEE Nov.2005 pp. 1166-1171. M.S. Agamy & P.K. Jain, “An adaptive energy storage technique for efficiency improvement of single-stage three-level resonant AC/DC converters” IEEE Transactions on industry applications Vol.47, No.1 Feb.2011.
Authors:
72.
328-334
Pankaj N. Shrirao, Rajeshkumar U.Sambhe, Pradip R.Bodade Convective Heat Transfer Analysis in a Circular Tube with Different Types of Internal Threads of Constant Paper Title: Pitch Abstract: This work presents an experimental study on the mean Nusselt number, friction factor and thermal enhancement factor characteristics in a circular tube with different types of internal threads of 120 mm pitch under uniform wall heat flux boundary conditions. In the experiments, measured data are taken at Reynolds number in range of 7,000 to 335-340 14,000 with air as the test fluid. The experiments were conducted on circular tube with three different types of internal threads viz. acme, buttress and knuckle threads of constant pitch. The heat transfer and friction factor data obtained is
compared with the data obtained from a plain circular tube under similar geometric and flow conditions. The variations of heat transfer and pressure loss in the form of Nusselt number (Nu) and friction factor (f) respectively is determined and depicted graphically. It is observed that at all Reynolds number, the Nusselt number and thermal performance increases for a circular tube with buttress threads as compared with a circular tube with acme and knuckle threads. These are because of increase in strength and intensity of vortices ejected from the buttress threads. Subsequently an empirical correlation is also formulated to match with experimental results with ± 8% and ± 9%, variation respectively for Nusselt number and friction factor. Keywords: Internal threads, Enhancement, heat transfer and turbulent flow References: 1.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
Kumbhar D.G. and Dr. Sane N.K, .”Heat Transfer Enhancement in a Circular Tube Twisted with Swirl Generator: A Review”, Proc. of the 3rd International Conference on Advances In Mechanical Engineering, January 4-6, 2010,S V. National Institute of Technology, Surat - 395 007, Gujarat, India Kumar, R., Varma, H. K., Mohanty, B. and Agarwal, K. N. Augmentation of heat transfer during film wise condensation of steam and R-134a over single horizontal finned tubes. International Journal of Heat and Mass Transfer, 2002, 45, 201–211. Suresh Kumar, P., Mahanta, P. and Dewan, "A Study of laminar flow in a large diameter annulus with twisted tape inserts." In Proceedings of 2nd International Conference on Heat Transfer, Fluid Mechanics, and Thermodynamics, Victoria Falls,Zambia, 2003, paper KP3. M. Sozen and T M. Kuzay (1996), “Enhanced heat transfer in round tubes with porous inserts”, International Journal Heat and Fluid Flow, Vol. 17, pp.124-129 Golriz, M. R. and Grace, J. R. Augmentation of heat transfer by deflectors on circulating fluidized bed membrance walls.Int. J. Heat and Mass Transfer, 2002, 45, 1149–1154. Wang, L. and Sunden, B. "Performance comparison of some tube inserts." International Communication. Heat Transfer, 2002, 29, 45--56 Q. Liao and M.D. Xin (2000), “Augmentation of convective heat transfer inside tubes with three-dimensional internal extended surfaces and twistedtape inserts”, Chemical Engineering Journal, Vol. 78, pp. 95-105 Chang, S. W., Su, L. M., Hawang, C. C. and Yang, T. L. Heat transfer in a reciprocating duct fitted with transverse ribs. J. Expl. Heat Transfer, 1999, 12, 95–115. D. Angirasa (2001), “Experimental investigation of forced convection heat transfer augmentation with metallic porous materials”, International Journal of Heat Mass Transfer, pp. 919-922 H. L. Fu, K.C. Leong, X.Y. Huang and C.Y. Liu (2001), “An experimental study of heat transfer of a porous channel subjected to oscillating flow”, ASME Journal of Heat Transfer, Vol. 123, pp.162-170. Afanasyev, V. N., Chudnovsky, Y. P., Leontiev, A. I. and Roganov, P. S. Turbulent flow friction and heat transfer characteristics for spherical cavities on a flat plate. Expl. Thermal Fluid Sci., 1993, 7, 1. S.S Hsieh, M.H. Liu, H.H. Tsai (2003), “Turbulent heat transfer and flow characteristic in a horizontal circular tube with strip-type inserts part-II (heat transfer)”, International Journal of Heat and Mass Transfer, Vol. 46, pp.837-849. Smith Eiamsa-ard, Chinaruk Thianpong, Petpices Eiamsa-ard and Pongjet Promvonge (2009), “Convective heat transfer in a circular tube with shortlength twisted tape insert”, International communications in heat and mass transfer (2009). Chinaruk Thianpong, Petpices Eiamsa-ard, Khwanchit Wongcharee and Smith Eiamsaard (2009), Compound heat transfer enhancement of a dimpled tube with a twisted tape swirl generator, International Communications in Heat and Mass Heat and Mass Transfer, Vol. 36, pp. 698-704. Whitham, J. M (1896), The effects of retarders in fire tubes of steam boilers, Street Railway, Vol. 12(6), pp. 374. Date, A. W. and Singham, J. R. (1972), “Numerical prediction of friction and heat transfer characteristics of fully developed laminar flow in tubes containing twisted tapes”, Trans. ASME, Journal of Heat Transfer, Vol. 17, pp. 72 S.K.Saha, U.N.Gaitonde and A.W. Date (1989), “Heat transfer and pressure drop characteristics of laminar flow in a circular tube fitted with regularly spaced twisted-tape elements”, Journal of Exp. Thermal Fluid Sci., Vol. 2, pp.310-322. Rao, M. M. and Sastri, V. M. K. (1995), “Experimental investigation for fluid flow and heat transfer in a rotating tube twisted tape inserts”, International Journal of Heat and Mass Transfer, Vol.16, pp.19–28. Sivashanmugam, P. and Suresh, S. (2007), “Experimental studies on heat transfer and friction factor characteristics of turbulent flow through a circular tube fitted with regularly spaced helical screw tape inserts”, Experimental Thermal and Fluid Science, Vol. 31, pp. 301-308. Agarwal, S. K. and Raja Rao, M. (1996), “Heat transfer augmentation for flow of viscous liquid in circular tubes using twisted tape inserts”, International Journal of Heat Mass Transfer, Vol. 99, pp.3547–3557. Peterson, S. C., France, D. M. and Carlson, R. D. (1989), “Experiments in high-pressure turbulent swirl flow”, Trans. ASME, Journal of Heat Transfer, Vol. 108, pp.215–218.
Authors:
Satish bykkam, K.Venkateswara Rao, Ch.Shilpa Chakra, V.Rajendar, Rotte Naresh Kumar, J.Ananthaiah
Paper Title:
Graphene Oxide Thin Films: A Simple Profilometer for Film Thickness Measurement
Abstract: Graphene oxide (GO) films are a few hundred nanometers thick semi-transparent films which have recently become commercially available. GO, used to make the films, is the oxidized form of graphene which can be visualized as a graphene sheet with its basal plane decorated by oxygen-containing groups. GO, produced using the Hummers method, is hydrophilic, solution processable, and an insulator. GO can also be treated to be converted into reduced Graphene Oxide (rGO), which is conductive. The GO can be deposited onto a substrate such as FTO, ITO and glass, to create films. The resulting graphene oxide film measured by a simple profilometer based upon a commercial strain gauge force transducer is described. It has been used on polymer film coated substrates to determine film thicknesses on the order of 20 mn. Measured film thicknesses agree with gravimetrically determined values to within 20 nm and also suitable to potential applications. 73.
Keywords: Hummers’method, Graphene oxide thin film, spin coating, profilometer 341-344 References: 1. 2. 3. 4. 5. 6.
Sasha Stankovi, Dmitriy A. Dikin, Geoffrey H. B. Dommet, Kevin M. Kohlhaas, Eric J. Zimney, Eric A. Stach, Richard D. Piner, SonBinh T. Nguyen & Rodney S. Ruoff “Graphene-based composite materials”, Nature, Vol. 442, 20 July 2006,pp. 282-286. G. Eda, G. Fanchini, and M. Chhowalla, Nat. ‟ Large-area ultrathin films of reduced graphene oxide as a transparent and flexible electronic materialˮ, Nanotechnol.Vol. 3, 6 April 2008,pp. 270-274 Zhao X, Zhang Q, Hao Y, Li Y, Fang Y, Chen D. Alternate multilayer films of poly (vinyl alcohol) and exfoliated graphene oxide fabricated via a facile layer-by-layer assembly. Marcomolecules.2010; 43:9411-9416. Novoselov, K. S.,Geim, A. K., Morozov, S. V., Jiang, D., Zhang, Y., Dubonos, S. V., Grigorieva, I. V., Fisov, A.A ., ‟ Electric Field Effect In Atomically Thin Carbon Filmˮ, Science, Vol. 306,22 Oct 2004, pp. 666-669. J. Coraux, A.T. N’Diaye, C. Busse, T. Michely, ‟structural coherency of graphene on Ir(111) ˮ,Nano lett. Vol. 8, 12 January 2008, pp. 565-570. Li, X. S., Cai, W. W., An, J. H., Kim, S., Nah, J., Yang, D. X., Piner, R., Velamakanni, A., Jung, I., Tutuc, E., Banerjee, S. K., Colombo, L., Ruoff, R .S., ‟Large-Area Synthesis of High-Quality and Uniform Graphene Films on Copper Foils ˮ, Science. Vol. 324, 7 May 2009 , pp. 1312.
7. 8. 9. 10. 11. 12. 13. 14.
Hu Young Jeong et al “Graphene Oxide Thin Films for Flexible Nonvolatile Memory Applications.”, Nano Letters, Vol. 10 , 4 october 2010, pp. 4381-4386. W.S. Hummers, R.E. Offeman, “Preparation of Graphitic Oxide”, J. Am. Chem. Soc. Vol. 80, March 1958, pp. 1339. X.Y.Zhang, H.P.Li, X.L.Cui. Y. Lin, “Graphene/TiO2 nanocomposites: synthesis, characterization and application inhydrogen evolution from water photocatalytic splitting”J. Mater. Chem.Vol. 20, 07 Jan 2010, pp. 2801-2806. J. T. Robinson, M. Zalautdinov, J. W. Baldwin, E. S. Snow, Z. Wei, P. Sheehan, B. H. Houston, “Wafer-scale Reduced Graphene Oxide Films for Nanomechanical Devices”, Nano Lett.Vol.8, 10 september 2008, pp. 3441-3445. J. T. Robinson, F. K. Perkins, E. S. Snow, Z. Wei, P. E. Sheehan, “Reduced Graphene Oxide Molecular Sensors”, Nano Lett.Vol. 8, 3 September 2008, pp. 3137-3140. H. A. Becerril, J. Mao, Z. Liu, R. M. Stoltenberg, Z. Bao, Y. Chen, “Evaluation of Solution-Processed Reduced Graphene Oxide Films as Transparent Conductors”,ACS Nano , Vol. 2, 09 Feb 008, pp. 463-470. S. Pang, H. N. Tsao, X. Feng, K. Muullen, “ patterned graphene electrodes from solution processed graphite oxide films for organic field effect transistors ” Adv. Mater. Vol. 217 May 2009, pp. 3488-3491. H. Yamaguchi, G. Eda, C. Mattevi, H. Kim, M. Chhowalla, “ Highly Uniform 300 mm Wafer-Scale Deposition of Single and Multilayered Chemically Derived Graphene Thin Films”,ACS Nano,Vol. 4, 5 Jan pp.524-528.
Authors:
Karrar Raoof Kareem, R.K. Pandey
Paper Title:
Study of Management and Control of Waste Construction Materials in Civil Construction Project
Abstract: Now days, the increased economic growth as well as urbanization in developing countries have led into extensive construction activities that generate large amounts of wastes. Material wastage in construction projects resulted into huge financial setbacks to builders and contractors. In addition to this, it may also cause significant effects over aesthetics, health, and the general environment. These wastes needs to be managed as well as their impacts needs to be ascertained to pave way for their proper management, however in many cities of India wastes materials management is still a problem. In this research work we are discussing the method for the management and control of waste construction materials. The main objective of this work is present the waste control procedures included as part of particular site management in general based on pull learning process and focusing process transparency principle based on qualitative and quantitative data collection techniques. Additionally we are presenting the literature survey study over waste management system as well as construction waste management. Keywords: These wastes needs to be managed as well as their impacts needs to be ascertained to pave way for their proper 74.
References: 1.
Abd. Majid, M. Z. and McCafer R. (1997), Discussion of Assessment of labor Performance of Maintenance Contractors in Asian nation. Journal of Management in Engineering, ASCE. Vol. 13, No. 5, pp91 2. Addis, B. Talbot, R (2002). property Construction procural : A Guide to Delivering Environmentally responsible comes. CIRIA, London, CIRIA C571 3. Azizi Yahya, Shahrin Hashim, Jamaludin Ramli, Yusof Boon, Abd. Rahim Hamdan (2007). Menuasai Penyelidikan Dalam Pendidikan. PTS delicate 4. Christini G., Micheal F., Chris H (2004). Environmental Management systems and ISO 14001 Certification for Construction corporations. Journal of Construction Engineering and Management. 330 - 336 5. hired Institute of Building (CIOB) (1989). Project Management in Building. hired Institute of Building 6. leased Institute of Building (CIOB) (1989). decide to Reducing Building Waste. UK: hired Institute of Building. 7. City of Burnaby (n.d.). Management and disposal of construction waste. out there at: WWW.city.burnaby.bc.ca cityhalldepartmentsdepartments_building bldng_artcls bldng_artcls_mnmnt.html. (Accessed01/08/08) 8. CIRIA (1994). Environmental reference for Building and technology Projects- Construction section. London: CIRIA Special Publication. 9. Conway H. (1990). setting ought to modification the angle. Transport 10. Department of setting (1987). Environmental Impact Assessment (EIA), Procedure and requirements in Asian country. Minister of Science, Technology and conjointly the setting. 11. Electrical and Mechanical Services Department (2006). observe Agreement No. CAOL013 – observe Study on Life Cycle Energy Analysis of Building Construction : Final Report. Ove Arup & Partners metropolis Ltd. 12. Formoso, C.T., Isatto, E.L., Hirota, E.H. (1999). technique for Waste management at intervals the Building business. Proceedings IGLC-7, seventh Conference of the International cluster for Lean Construction, Berkeley, CA, 26-28 July.
75.
345-350
Authors:
A. El Barkany, A. Benali, M. El Ghorba, A. Choukir
Paper Title:
The Inspection of Crane Wire Ropes in Moroccan Service: Discard Criteria and Monitoring Procedure
Abstract: The reliable and safe use of wire rope is crucial for crane operations. Wire rope is a very useful and long lasting structural element when properly used and maintained. Therefore, wire rope safety is (or should be) a constant concern of wire rope operators and safety authorities. Safe use of the crane wire ropes depends directly on the rope condition, and on the in-time and reliable rope inspection. This study is focused on the failure analysis of crane wire ropes in service in Morocco. Wire defects and condition of a lifting rope have been studied and presented in this paper. Special attention is given to conditions that can lead to internal damage such as broken wires, wear as well as corrosion. Various nondestructive tests methods have been used in this application for wire ropes control such as visual inspection, radiographic and electromagnetic. The results of the nondestructive testing have made it possible to determine the safety status of a rope and establish preventive maintenance procedures to extend the useful life of a rope. It is concluded that maintenance, inspection and discard policy must be determined in recognition of the degradation mechanisms that operate in different rope applications. Keywords: Wire rope, Degradation mechanisms, Nondestructive methods, Electromagnetic inspection, Discard criteria, Safety, Maintenance. References: 1. 2. 3. 4. 5.
ISO 4308–1:2003, Cranes and lifting appliances – Selection of wire ropes - Part 1: General. Chaplin CR. Failure mechanisms in wire ropes. Eng Fail Anal 1995; 2(1):45–57. ISO 4309:2010, Cranes – Wire ropes – Care, maintenance, installation, examination and discard, Beuth Verlag, Berlin, 2010-08, 60 pp. El barkany A., “Behavior and failure mechanisms in lifting wire ropes,” Diploma of the Thorough Higher Learning (DESA), ENSEM, Casablanca, June 2000. BREVET P., Pathology of the shrouds and cables, corrosion - fatigue, Cables day, Metals Division, Reinforcements and Cables Engineering
351-364
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
Structures LCPC, Nantes, September 21, 2005. El barkany A., “Contribution to the analysis of the behavior of lifting wire ropes: Modeling and Experimentation,” PhD Thesis, National Higher School of Electricity and Mechanics (ENSEM), Casablanca, February 2007. A. El barkany, A. Benali, M. El Ghorba, M. Chergui, A. Choukir, “Nondestructive evaluation methods of broken wire ropes of lifting,” International Journal of Research and Reviews in Mechatronics Design and Simulation (IJRRMDS), ISSN: 2046-6234, Vol. 2, No. 2, pp. 126-136, June 2012. A. Meksem, “Probabilistic approach and experimental characterization of the behavior of hosting wire ropes,” Ph.D. Thesis, ENSEM, University Hassan 2, Aîn Chock, Casablanca, October 2010. A. Meksem, M. El Ghorba, A. Benali, A. El barkany, “Optimization by the reliability of the damage by tiredness of a wire rope of lifting,” Applied Mechanics and Materials Journal, Vol. 61 (2011), pp. 15-24, June 2011. Weischedel H.R., and Chaplin C.R., “The inspection of offshore wire ropes: The state-of-the-art,” 24th Offshore Technology Conference, Houston, May 4-7, 1992. Weischedel H R, Ramsey R P., “Electromagnetic testing: a reliable method for the inspection of wire ropes in service,” NDT International, 1989, 22(3): 155–161. Weischedel HR., “The magnetic flux leakage inspection of wire ropes,” NDT Technologies Inc., pp. 1-19. ASTM E1571-01, Standard practice for electromagnetic examination of ferromagnetic steel wire rope. ASTM, 2001.3.03(15): 848–52. Halec P., “Apparatus for nondestructive testing of cable,” Grenoble, Halec SA., France, 1998. El barkany A., Benali A., El Ghorba M. and Choukir A., Electromagnetic ropes inspections, 5th Congress of Mechanical, Meknes, April 17-20, 2001. Chu J X, Gu W. The study of electromagnetic non-destructive testing of wire ropes. Shanghai Maritime University Journal, 1994, 15(2): 23–30. Chaplin, C.R., Ridge, I.M.L. and Tytko, A.A., “Measurement of abrasive wear on wire ropes using non-destructive electro-magnetic testing,” OIPEEC Technical Meeting, Krakow, September 1999, p.13-28. Jomdecha C., Prateepasen A., Methong W., “Characterization of wire rope defects from magnetic flux leakage signals,” Thammasat International Journal of Science and Technology, 2003;8(1):54–63.
Authors:
G Padmanabha Sivakumar, S.Rameshwari Devi
Paper Title:
A Comparative Study: Multiplier Design using Reversible Logic Gates
Abstract: Low power consumption and smaller area are some of the most important criteria for the high performance systems. Optimizing the speed and area of the multiplier is a major design issue. However, area and speed are usually conflicting constraints so that improving speed results mostly in larger areas..Hence in this paper we try to determine the best solution to this problem by using reversible logic gates. reversible logic has emerged as a promising technology having its applications in low power CMOS, Reversible logic circuits have theoretically zero internal power dissipation because they do not lose information, the classical set of gates such as AND, OR, and EXOR are not reversible. The most significant aspect of the reversible gates used in this paper , are that it can work singly as a reversible full adder, that is reversible full adder can now be implemented with a single gate only.General multiplier is based on two concepts. The partial products can be generated in parallel and thereafter the addition can be reduced by using reversible parallel adder.The entire power analysis can be done using HSPICE tool,and hence by the comparions done we can conclude that the proposed system can reduce the power consumption . Furthermore, it has been demonstrated that the proposed design of reversible multiplier circuit using modified full adder,needs fewer garbage outputs and constant inputs. The multipliers can be generalized for NxN bit multiplication. Thus, this job will be of significant value as the technologies mature. Keywords: Reversible logic gates, Reversible logic circuit, Adders, multipliers, power analysis, simulation outpus References: 1. 2. 3. 4.
76.
5. 6.
7. 8. 9. 10. 11.
12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25.
R. Landauer, “Irreversibility and Heat Generation in the Computational Process”, IBM Journal of Research and Development, 5, pp. 183-191, 1961. C.H. Bennett, “Logical Reversibility of Computation”, IBM J. Research and Development, pp.525-532, November 1973. Kerntopf, P., M.A. Perkowski and M.H.A. Khan, 2004. On universality of general reversible multiple valued logic gates, IEEE Proceeding of the 34th international symposium on multiple valued logic (ISMVL’04), pp: 68-73. Perkowski, M., A. Al-Rabadi, P. Kerntopf, A.Buller, M. Chrzanowska-Jeske, A. Mishchenko, M. Azad Khan, A. Coppola, S. Yanushkevich, V. Shmerko and L. Jozwiak, 2001. A general decomposition for reversible logic, Proc. RM’2001, Starkville, pp: 119-138. Perkowski, M. and P. Kerntopf, 2001. Reversible Logic. Invited tutorial, Proc. EURO-MICRO, Sept 2001, Warsaw, Poland. Thapliyal Himanshu, and M.B. Srinivas, 2005.Novel reversible TSG gate and its application for designing reversible carry look ahead adder and other adder architectures, Proceedings of the 10th Asia-Pacific Computer Systems Architecture Conference (ACSAC 05). Lecture Notes of Computer Science, Springer-Verlag, 3740: 775-786. Saiful Islam, M.D. and M.D. Rafiqul Islam, 2005.Minimization of reversible adder circuits. Asian J. Inform. Tech., 4 (12): 1146-1151. Azad Khan, Md.M.H., 2002. Design of full adder with reversible gate. International Conference on Computer and Information Technology, Dhaka, Bangladesh, pp: 515-519. Haghparast, M. and K.Navi, 2007.”A Novel Reversible Full Adder Circuit for Nanotechnology Based Systems”. J. Applied Sci., 7 (24): 3995-4000. Haghparast M. and K.Navi, 2008.”A Novel reversible BCD adder for nanotechnology based systems”. Am. J. Applied Sci., 5 (3): 282-288. Himanshu Thapliyal and M.B Srinivas, “Novel Reversible TSG Gate and Its Application for Designing Reversible Carry Look Ahead Adder and Other Adder Architectures”, Tenth Asia-Pacific Computer Systems Architecture Conference (ACSAC05), Singapore, October 24-26, 2005, pp 805817. M. Shams, M. Haghparast and K. Navi, "Novel reversible multiplier circuit in nanotechnology", World App!. Sci. 1., 3 (2008) 806. H. Thapliyal and M. B. Srinivas, "Novel reversible TSG gate and its application for designing reversible carry look ahead adder and other adder architectures", Proceedings of the 10th Asia-Paci_c Computer Systems Architecture Conference (ACSAC 05), 3740 (2005) 805. M. Haghparast and K. Navi, "A Novel Reversible Full Adder Circuit for Nanotechnology Based Systems". J. Applied Sci., 7 (2007) 3995. M. Haghparast and K. Navi, "Design of a novel reversible multiplier circuit using HNG gate in nanotechnology", Am. 1. Applied Sciences, 5 (2008) 282 M. Haghparast, S. J. Jassbi, K. Navi and O. Hashemipour, "Design of a novel reversible multiplier circuit using HNG gate in nanotechnology", World Appl. Sci. 1., 3 (2008) 974. Yu-Ting Pai and Yu-Kumg Chen, "The Fastest Carry Look ahead Adder", Proceedings of the Second IEEE International Workshop on Electronic Design, Test and Applications (DELTA'04), 434-436. Fredkin, E. and T. Toffoli, 1982. Conservative logic. Int’l J. Theoretical Physics, 21: 219-253. Feynman, R., 1985. Quantum mechanical computers, Optics News, 11: 11-20. Toffoli T., 1980. Reversible computing, Tech Memo MIT/LCS/TM-151. MIT Lab for Computer Science. Fredkin, E. and T. Toffoli, 1982. Conservative logic. Int’l J. Theoretical Physics, 21: 219-253. Peres, A., 1985. Reversible logic and quantum computers, Physical Review: A, 32 (6): 3266-3276. Azad Khan, Md.M.H., 2002. Design of full adder with reversible gate. International Conference on Computer and Information Technology, Dhaka, Bangladesh, pp: 515-519. Himanshu Thapliyal and M.B Srinivas ”Novel Reversible Multiplier Architecture Using Reversible TSG Gate”, 2006 IEEE. Maryam Ehsanpour, Payman Moallem, Abbas Vafaei,” Design of a Novel Reversible Multiplier Circuit Using Modified Full Adder”, 2010 International Conference On Computer Design And Appliations (ICCDA 2010)
365-369
Authors:
Kirti Inamdar, Y. P. Kosta, S. Patnaik
Paper Title:
A Novel Criss-Cross Shape Metamaterial
Abstract: Metamaterials have been an attractive topic for research in the field of electromagnetic in recent years. This paper highlights the review work of some pioneers whose work has been very promising for scientific and engineering community. In the latter part, a new shape for metamaterial namely Criss-Cross shape has been discussed and its study has been presented in this paper. This shape has been inspired from the famous Jerusalem Cross and Cross with square loops structures. The unit cell response for this shape has been investigated for giving negative response of ε and µ. Keywords: Metamaterials, negative index, effective medium parameter, Jerusalem cross, DNG. References: 1. 2. 3.
77.
4. 5. 6. 7. 8. 9. 10. 11. 12.
13. 14.
Veselago, V. G., “The electrodynamics of substances with simultaneously negative values of permittivity and permeability,” Sov. Phys. Usp., Vol. 10, 509, 1968. R.A. Shelby, D.R. Smith, and S. Schultz, “Experimental Verification of a Negative Index of Refraction,” Science, vol. 292, pp. 77-79, Apr. 2001. J. Huangfu et al., “Experimental Confirmation of Negative Refractive Index of a Metamaterial Composed of Ω–like Metallic Patterns,” Appl. Phy. Lett., vol. 84, no. 9, pp.1537-1539, 2004. T.M. Grzegorczyk et al., “Refraction Experiments in Waveguide Environments,” in Metamaterials: Physics and Engineering Explorations, N. Engheta and R.W. Ziolkowski (eds.), Wiley-Interscience, pp. 113-140, 2006. H. Chen et al., “Left-Handed Materials Composed of Only SShaped Resonators,” Phy. Rev. E, vol. 70, 057605, 2004. L. Markeley and G.V. Eleftheriades, “A Negative-Refractive-Index Metamaterial for Incident Plane Waves of Arbitrary Polarization,” IEEE Antennas Propag. Lett., vol. 6, pp. 28-31, 2007. Dongho Kim and Jaeick Choi, “Novel Planar Metamaterial with a Negative refractive Index”, ETRI Journal, Vol. 31, No. 2, April 2009. R. W. Ziolkowski, “Design, fabrication, and testing of double negative metamaterials”, IEEE TransAnt. And Prop. Vol. 51, no. 7, pp. 1516-1529, 2003. T. Koschny, P. mrkos, d.R Smith, C.M. Soukoulis, “Resonant and antiresonant frequency dependence of the effective parameters of metamaterials”, Phys. Rev. vol. 68, pp. 065602 1-4, 2003. Y. Yuan, C. Bingham, T. Tyler, S. Palit, T. H. Hand,et. Al., “Dual-band planar electric metamaterial in the terahertz regime”, Optics Express vol 16, no. 13, pp. 9746-9752, 2008. T. H. Hand, J. Gollub, S. Sajuyigbe, D.R Smith, S. A Cummer, “Characterization of complementary electric field coupled resonant surfaces”, Appl. Phys. Lett. Vol. 93, pp. 212504 1-3, 2008. L. Li, D. H. Werner, J. A. Bossard, T. S. Mayer. “A model based parameter estimation technique for wide-band interpolation of periodic moment method impedance matrices with application to genetic algorithm optimization of frequency selective surfaces”. IEEE Trans. Ant. And Prop. Vol. 54, no. 3, pp. 908-924, 2006. R. S Kshetrimayum, L. Zhu. “Guided-wave characteristics of waveguide based periodic structures loaded with various FSS strip layers”. IEEE Trans Ant. And Prop. Vol. 53, no. 1, pp. 120-124, 2005. Alexander Remely Katko, “Artificial negative permeability based on a fractal Jerusalem Cross”, Undergraduate Honors Thesis, 2009.
Authors:
A. Duraisamy, M.Sathiyamoorthy
Paper Title:
Mesh Based Peer to Peer Live Video Streaming using ANT Algorithm
370-374
Abstract: Data distribution and data retrieval has always been an integral part of the Internet. In particular, video streaming has been gaining popularity over the last few decades. Though there has been no shortage of innovations and Experimentations, no single system has been able to deliver highly scalable and reduce congestion to the requesting users. The development of p2p technologies brings unprecedented new momentum to Internet video streaming. This work proves that p2p is indeed more efficient by taking into account the factors of scalability, response time and reliability of serving the request. This work is broadly and logically divided into joining the network group, requesting, retrieving and video playing segments. The Requester takes care of receiving the file and storing it in the buffer. The video receiver takes care of sensing the user connections and playing the appropriate video on the requesting peer side. To provide video in efficient manner, this work use ACO (Ant Colony Optimization) algorithm and bandwidth for choosing optimized peer. From that optimized peer, user can get video. We also take care of scheduling and scalability issues. Keywords: Ant Colony Optimization, Peer to Peer, Mesh network, Video Streaming, Bandwidth Optimization. References: 78.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
Guo Y, Margharei N, and Rejaie R, 2007, “ Mesh or multiple tree: A comparative study of live p2p streaming approaches”, In Proceedings of IEEE INFOCOM , pp. 1424 – 1432. BitTorrent, http://www.bittorrent.com Garbacki P, Pouwelse D.E.JA, and Sips HJ, February 2005 "The bittorrent p2p file-sharing system: Measurements and analysis," in 4th International Workshop On Peer-To-Peer Systems (Iptps). Helen J. Wang, Philip A. Chou, and Venkata N. Padmanabhan Microsoft Research: ” Supporting Heterogeneity and Congestion Control in Peer-toPeer Multicast Streaming”. Liu J, Yum T.S.P, and Zhang B.Xd, March 2005 "CoolStreaming/DONet: A data-driven overlay network for peer-to-peer live media streaming," in Twenty Fourth Annual joint Conference of IEEE on Computer Communication Societies, pp. 2101-2111. Sen J.S and Towsley D, March 1999 "Proxy prefix caching for multimedia streams," in Eightieth Annual joint Conference of IEEE on Computer Communication Societies, pp. 1310-1319. YouTube, http://www.youtube.com Castro M, Druschel P, Kermarrec A-M, A. Nandi, Rowstron A, and Singh A. February 2003 SplitStream: High-bandwidth Content Distribution in a Cooperative Environment. In Proceedings of IPTPS. Castro M, Druschel P, Kermarrec A-M, and Rowstron A. October 2002 SCRIBE: A Large-scale and Decentralized Application-level Multicast Infrastructure. IEEE JSAC, 20(8):pp.100–110. Jannotti J, Gifford D, Johnson K.L, Kaashoek M.F, and O’Toole J.W. October 2000 Overcast: Reliable Multicasting with an Overlay Network. In Proceedings of OSDI. Padmanabhan V.N, Wang H.J, Chou P.A, and Sripanidkulchai K. May 2002 Distributing Streaming Media Content Using Cooperative Networking. In Proceedings of NOSSDAV. Pendarakis D, Shi S, Verma D, and Waldvogel M. ALMI: March 2001 An Application Level Multicast Infrastructure. In Proceedings of USITS. Zhuang S.Q, Zhao B.Y, Joseph A.D, Katz R.H, and Kubiatowicz J.D. April 2001 An Architecture for Scalable and Fault-tolerant Wide-Area Data Dissemination. In Proceeding of NOSSDAV.
375-380
Authors:
Sonam Wadhwa, Kunwar Pal
Paper Title:
Providing Security in VPN by using Tunneling and Firewall
Abstract: The use of security increased consistently day by day. Huge amount of network requires large amount of security. For maintain things consistent and proper functioning, people require secure way to share information over the network. To accomplish this goal Virtual Private Network is one of the popular techniques. It constructs logical link by using existing public infrastructure. Internet is one of the public networks and VPN utilize the internet to connect the users. IPSec Protocol is a protocol suite based on VPN to protect the communication. For uninterrupted VPN services, it is necessary to provide some mechanism by the combination of tunneling and firewall. This paper proposes a new kind of configuration for security to the public network. Keywords: Tunneling, Firewall, IPSec, Virtual Private Network, Algorithm. References: 79.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
Samuel Patton, Bryan Smith, David Doss, William Yurcik, “A Layered Framework of Deploying High Assurance VPNs”, Department of Applied Computer Science Illinois State University, USA, November 2000. Beyong-Ho Kang and Maricel O. Balitanas, “Vulnerabilities of VPN using IPSec and Defensive Measures”, Department of Multimedia Engineering, University of Tasmania and Hannam University, Australia, July 2009. Ritu Malik and Rupali Syal, “Performance Analysis of IP Security VPN”, International Journal of Computer Application, Volume 8-N0.4, October 2010. Vishal Sharma and Manish Kalra, “Performance Analysis and Enhancement in IPSec VPN to Reduce Connection Establishment Overhead and Transmission Delay: Part 1”, International Journal of Advanced Science and Technology, Volume 8, July, 2009. M.Sreedevi and Dr.R.Seshadri, “An Innovative Kind of Security Protocol Using Fusion Encryption In Vitual Private Networking”, International Journal of Distributed and Parallel System, Vol.3, No.1,January 2012. S.Saraswathi and P.Yogesh, “Mitigating Strategy to Shield the VPN Service from DoS Attack, International Journal on Cryptography and Information Security,Vol.2,No.2,June 2012. Aruna Malik and Harsh K.Verma, “ Performance Analysis of Virtual Private Network for Securing Voice and Video Traffic”, International Journal of Computer Application ,Volume 46-N0.16,May 2012. William Stallings (2007); “Network Security Essentials: Applications and Standards”, Prentice Hall, Publications. Kent S, Atkinson R. Security architecture for the internet protocol, RFC2401, 1998. Kenneth Ingham and Stephanie Forrest, “A History and Servey of Network Firewalls”, ACM Journal, Vol V, NO. N, 2000. http://www.nta-monitor.com/
Authors:
VJ Earnest Praisen R. Narciss Starbell
Paper Title:
Simulation of Single Phase Photovoltaic Inverter in PSIM
381-382
Abstract: In this paper presents a simulation of single phase inverter with MPPT Buck-Boost converter and SHE PWM pattern for reduction of lower level of Harmonics. This method will be usefulinreduces the loses in photovoltaicinverter circuitry for the power produced by solar panel is costly and lower in amount specially compared with conventional energy sources, but the MPPT circuit will increase the efficiency of the solar electrification and the selective harmonic elimination inverter methodology (SHE) will also increases the efficiency by reducing the losses at the inverter with lower total harmonic distortion (THD) ,The perturb and observe algorithm is used in MPPT control methodology.The simulation of this total circuit simulated in PSIM. Keywords: MPPT in PSIM, Single phase solar photovoltaics, PWM based Harmonic elimination in PSIM, 80.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
81.
Akkaya, R., Kulaksiz, A., 2004. “A microcontroller-based standalone photovoltaic powersystem for residential appliances”. Applied Energy 78, 419– 431. Hohm, D.P., Ropp, M.E., 2003. “Comparative study of maximum power point tracking algorithms”. Progress in Photovoltaics Research and Applications, 47–62. Koutroulis, E., Kalaitzakis, K., Voulgaris, N., 2001. “Development of a microcontroller based photovoltaic maximum point tracking control system”. IEEE Transactions on Power Electronics 16, 46–54. “photovoltaic maximum point tracking control system”. IEEE Transactions on Power Electronics 16, 46–54. TarikDuru, H., 2006. “A maximum power tracking algorithm based on Impp = f(Pmax) function for matchingpassive and active loads to a photovoltaic generator”. Solar Energy 80, 812–822. Lin Luo, F., Hong, Y., 2007.” Small signal analysis of energy factor and mathematical modeling for power DC–DC converters”. IEEE Transactions on Power Electronics 22, 69–79. LSanots, J., Autunes, F., Chehab, A., Cruz, C., 2006. A “maximum power tracker for PV systems using a high performance boost converter”. Solar Energy 80, 772–778. Messenger, Roger A., Ventre, Jerry, 2004.”Photovoltaic Systems Engineering”, 2, 59–60. H. S. Patel, R. G. Hoft, “Generalized Techniques of Harmonic Elimination and Voltage Control in Thyristor Inverter: Part I-Harmonic Elimination,” IEEE Transactions on Industry Applications, IA.1973,31.
383-386
Authors:
Hardik Patel, Rajnikant Soni
Paper Title:
Low Voltage, High Gain CMOS Op Amp Using Nested Transconductance Compensation Capacitance
Abstract: An analytic design guide was formulated for the design of 3-stage CMOS OP amp with the nested GmC(NGCC) frequency compensation. The proposed design guide generates straight-forwardly the design parameters such as the W/L ratio and current of each transistor from the given design specifications, such as, gain-bandwidth, phase margin, the ratio of compensation capacitance to load capacitance. The applications of this design guide to the 10pF load capacitances, shows that the designed OP amp work with a reasonable performance in both cases, for the range of compensation capacitance from 10% to 100% of load capacitance. Keywords: Low voltage OP amp, design guide, frequency compensation, nested Gm-C
387-390
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
P. E. Allen and D. R. Holberg, CMOS analog circuit design, 2nd edition R.J. Baker, H.W. Li, D.E. Boyce, CMOS circuit design layout and Simulation jae-seung lee, jun hyun bae, ho-young kim, ji-yong um, jae-yoon sim, and hong june park “a design guide of 3-stage cmos operational amplifier with nested gm-c frequency compensation” journal of semiconductor technology and science, vol.7, no.1, march, 2007 f. Schlogl and H. Zimmennann “1.5 GHZ OPAMP in 120nm digital CMOS” institut fiir elektrische mess- und schaltungstechnik, technische universitat wien gusshausstrasse 25, A-I040 wien, Austria pp 239-242 , 2004 Matteo Perenzoni, Mattia Malfatti, Fabrizio De Nisi, David Stoppa, Andrea vaschirotto “A Systematic Design Procedure for High-Speed Opamp Performance Optimization” University of Lecce, Dept. of Innovation Engineering, 73100 Lecce – Italy pp 1-4 IEEE 2011 Hassan Khameh, Hossein Mirzaie, Hossein Shamsi” A New Two-Stage op-Amp Using Hybrid Cascode Compensation, Bulk-Driven, and Positive Feedback Techniques”IEEE 2010 pp109-112 Priyanka Kakoty, “Design of a high frequency low voltage CMOS operational amplifier”, VLSICS, Vol.2, No.1, pp 73-85, 2011. Amana Yadav, DESIGN AND SYNTHESIS OF TWOSTAGE CMOS OP-AMP International Journal of Advances in Engineering & Technology,pp 677-688 Jan 2012
Authors:
Baburaja.C, J.Jayakumar
Paper Title:
Transformer less Soft Switching Bidirectional DC-DC Chopper
Abstract: Transformer less Soft Switching Bidirectional DC-DC Chopper has been proposed in this paper. The above mentioned system can be operated with ZVS, fixed switching frequency, and a ripple-free inductor current regardless of the power flow direction. To provide ZVS of the power switches and a ripple-free inductor current, the proposed converter utilizes a simple auxiliary circuit that consists of an additional winding to the main inductor and an auxiliary inductor. In the ZVS operation, the reverse recovery problem of the anti parallel body diode of the power switch does not occur. The ripplefree inductor current can reduce the voltage ripple. Analysis of the proposed bidirectional DC-DC converter a discussed in detail, and the experimental results obtained on 100-W prototype are analyzed in this paper. Keywords: Bidirectional DC-DC converter, DC-DC power conversion ,zero-voltage-switching References: 1. 2. 3. 4.
82. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16.
83.
H. Tao, J. L. Duarte, and M. A. M. Handrix, “Line-interactive UPS using a fuel cell as the primary source,” IEEE Trans. Ind. Electron., vol. 55, no. 8, pp. 3012–3021, Aug. 2008. L. R. Chen, N. Y. Chu, C. S. Wang, and R. H. Liang, “Design of a reflexbased bidirectional converter with the energy recovery function,” IEEE Trans. Ind. Electron., vol. 55, no. 8, pp. 3022–3029, Aug. 2008. F. Shang and Y. Yan, “Novel forward-flyback hybrid bidirectional DC-DC converter,” IEEE Trans. Ind. Electron., vol. 56, no. 5, pp. 1578–1584, May 2009. T.-F. Wu,Y.-C. Chen, J.-G. Yang, and C.-L. Kuo, “Isolated bidirectional full-bridge DC-DC converter with a flyback snubber,” IEEE Trans. Power Electron., vol. 25, no. 7, pp. 1915–1922, Jul. 2010. R.-J.Wai, C.-Y. Lin, andY.-R. Chang, “High step-up bidirectional isolated converter with two input power sources,” IEEE Trans. Ind. Electron., vol. 56, no. 7, pp. 2629–2643, Jul. 2009. H.Krishnsawami and N. Mohan, “Three-port series-resonant DC-DC converter to interface renewable energy sources with bidirectional load and energy storage ports,” IEEE Trans. Power Electron., vol. 24, no. 10, pp. 2289–2297, Oct. 2009. A. L. Kirsten, T. B. Marchesan, M. A. D. Costa, and R. N. do Prado, “Resonant technique for bidirectional flyback converter,” IET Electron.Lett., vol. 45, no. 25, pp. 1345–1346, Dec. 2009. H. Kim, C. Yoon, and S. Choi, “An improved current-fed ZVS isolated boost converter for fuel cell applications,” IEEE Trans. Power Electron., vol. 25, no. 9, pp. 2357–2364, Sep. 2010. P. Das, S. A. Mousavi, and G. Moschopoulos, “Anaysis and design of a nonisolated bidirectional ZVS-PWM DC-DC converter with coupled inductor,” IEEE Trans. Power Electron., vol. 25, no. 10, pp. 2630–2641, Oct. 2010. T. Bhattacharya, V. S. Giri, K. Mathew, and L. Umanand, “Multiphase bidirectional flyback converter topology for hybrid electric vehicles,” IEEE Trans. Ind. Electron., vol. 56, no. 1, pp. 78–84, Jan. 2009. W. Yu, H. Qian, and J.-H. Lai, “Design of high-efficiency bidirectional DC-DC converter and high-precision efficiency measurement,” IEEE Trans. Power Electron., vol. 25, no. 3, pp. 650–658, Mar. 2010. J. Zhang, J.-S. Lai, R.-Y Kim, and W. Yu, “High-power density design of a soft-switching high-power bidirectional DC-DC converter,” IEEE Trans.Power Electron., vol. 22, no. 4, pp. 1145–1153, Jul. 2007. L. Schuch, C. Rech, H. L. Hey, H. A. Grundling, H. Pinheiro, and J.R. Pinheiro, “Analysis and design of a new high-efficiency bidirectional integrated ZVT PWM converter for DC-bus and battery-bank interface,” IEEE Trans. Ind. Appl., vol. 42, no. 5, pp. 1321–1332, Sep. 2006. P. Das, B. Laan, S. A. Mousavi, and G. Moschopoulos, “A nonisolated bidirectionalZVS-PWMActive clampedDC-DC converter,” IEEE Power Electron., vol. 24, no. 2, pp. 553–558, Feb. 2009. Y. Tsuruta, Y. Ito, and A. Kawamura, “Snubber-assisted zero-voltage and sero-current transition bilateral buck and boost chopper for EV drive application and test evaluation at 25 kW,” IEEE Trans. Ind. Electron., vol. 56, no. 1, pp. 4–11, Jan. 2009. S. Dwari and L. Parsa, “An efficient high-step-up interleaved DC-DC converter with a common active clamp,” IEEE Trans. Power Electron., vol. 26, no. 1, pp. 66–78, Jan. 2011.
Authors:
Y. Angeline Christobel, P.Sivaprakasam
Paper Title:
A New Classwise k Nearest Neighbor (CKNN) Method for the Classification of Diabetes Dataset
Abstract: The general problem for data quality is missing data. The real datasets have lot of missing values. Mean method of imputation is the most common method to replace the missing values. In our previous work [23], we address the negative impact of missing value imputation and solution for improvement while evaluating the performance of kNN algorithm for classification of Diabetes data. In this paper, we address a new Class-wise k Nearest Neighbor (CkNN) method for the Classification of Diabetes Dataset. We selected diabetes dataset because it contains lot of missing values and the impact of imputation is very obvious. To measure the performance, we used Accuracy, Sensitivity and Specificity and Error rate as the metrics. The arrived results show the significant improvement measured with respect to the above metrics. Keywords: Data Mining, Classification, kNN, Imputation, Data Normalization and Scaling. References: 1. 2.
Roshawnna Scales, Mark Embrechts, “Computational intelligence techniques for medical diagnostics”. World Health Organization. Available: http://www.who.int
391-395
396-400
3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19.
20. 21. 22. 23. 24. 25. 26. 27. 28.
29. 30. 31. 32. 33. 34. 35. 36.
Cover, T., Hart, P.: Nearest neighbor pattern classification. IEEE Transactions on Information Theory 13(1), 21–27 (1967) Denoeux, T. 1995: A k-nearest neighbor classification rule based on Dempster-Shafer theory. IEEE Transactions on Systems, Man and Cybernetics:, 25, 804–813. E. Blanzieri and F. Melgan (2008). Nearest Neighbor Classification of Remote Sensing Images With the Maximal Margin Principle. IEEE Trans.Geoscience and Remote Sensing, 46(6): 1804-1811. Chen, J., and Shao, J., (2001). Jackknife variance estimation for nearest-neighbor imputation. J. Amer. Statist. Assoc. 2001, Vol. 96: 260-269. Wu, XD., et al. (2008). Top 10 Algorithms in Data Mining, Knowledge and Information Systems, 14(1): 1-37. Michie.D, Spiegelhalter. D.J and Taylor .C.C. Machine Learning, Neural and Statistical Classification, Chapter 9 page No 157,158. Lena Kallin Westin, Missing data and the preprocessing perceptron, page 3,ISSN-0348-0542. Misra .B.B, Dehuri. S, 2007, Functional Link Artificial Neural Network for Classification Task in Data Mining, Journal of Computer Science 3 (12):948-955, ISSN 1549-3636 Science Publications. Estebanez .C, Aler .R and Valls. M, Genetic Programming Base Data Projections for Classification Tasks, World Academy of Science, Engineering and technology 2005, Pages 56-61. Jeatrakul .P and Wong .W.K, Comparing the Performance of Different Neural Networks for Binary Classification Problems, 2009 Eighth International Symbosium on Natural Language Processing, Page 111-115. Twala, M.C. Jones, and D.J. Hand.” Good methods for coping with missing data in decision trees”,Pattern Recognition Letters, 29:950–956, 2008. D. Vijayalaksmi, K, Thilagavathi, “ An approach for prediction of Diabetic Siseases by Using b-colouring Technique in Clustering Analysis” International Journal of Applied Mathematical Research, 1 (4) (2012) 520-530 Ajita Satheesh, Ravindra Patel, “Dynamic Nearest Neighbours Classifier For Integrated Data Using Object Oriented Concept Generalization” IJSSST, Vol.11, No. 1 H. Temurtas, N. Yumusak, and F. Temurtas, “A comparative study on diabetes disease diagnosis using neural network: Expert System with Applications”, 36, 2009, 8610-8615. A. J. Seibel, “Diabetes Guide WebMD”, http://diabetese.webmd.com/guide/oral-glucose-tolerance-test, 2007 R.S. Somasundaram and R. Nedunchezhian, "Evaluation of Three Simple Imputation Methods for Enhancing Preprocessing of Data with Missing Values", International Journal of Computer Applications Issn-09758887, 2011 Angeline Christobel. Y, P. Sivaprakasam “Improving the Performance of K-Nearest Neighbor Algorithm for the Classification of Diabetes Dataset with missing values”, International Journal of Computer Engineering and Technology” (IJCET), Volume 3, Issue 3, October - December (2012), pp. 155-167 Brian D. Ripley (1996), Pattern Recognition and Neural Networks, Cambridge University Press, Cambridge. J. Han and M. Kamber,”Data Mining Concepts and Techniques”, Morgan Kauffman Publishers, USA, 2006. UCI Machine Learning Repository [http://archive.ics.uci.edu/ml/datasets] Angeline Christobel.Y, P.Sivaprakasam,” The Negative Impact of Missing Value Imputation in Classification of Diabetes Dataset and Solution for Improvement”, IOSRJCE, Volume 7, Issue 4(Nov-Dec).pp 16-23 R. J. Little and D. B. Rubin. “Statistical Analysis With Missing Data”, Hoboken, NJ: Wiley,(1987). Gustavo E. A. P. A. Batista and Maria Carolina Monard, An Analysis of Four Missing Data Treatment Methods for Supervised Learning, Applied Artificial Intelligence 17(5-6): 519-533 , 2003 Alireza Farhangfar, Lukasz Kurgan, Jennifer Dy,”Impact of imputation of missing values on classification error for discrete data”, Pattern Recognition, Volume 41, Issue 12, December 2008, Pages 3692–3705 Qinbo Song, Martin Shepperd.”A new imputation method for small software project data sets”, Journal of Systems and Software, Volume 80, Issue 1, January 2007, Pages 51–62 José M. Jerez Ignacio Molina ,, Pedro J. García-Laencina ,Emilio Alba, Nuria Ribelles, Miguel Martín, Leonardo Franco,” Missing data imputation using statistical and machine learning methods in a real breast cancer problem”, Artificial Intelligence in Medicine, Volume 50, Issue 2, October 2010, Pages 105–115 Vidan Fathi Ghoneim, Nahed H. Solouma, Yasser M. Kadah,” Evaluation of Missing Values Imputation Methods in cDNA Microarrays Based on Classification Accuracy”, 978-1-4244-7000-6/11 IEEE. K.T. Chuang, K. P. Lin, and M. S. Chen. “Quality-Aware Sampling and Its Applications in Incremental Data Mining”, IEEE Transactions on knowledge and data engineering,vol.19,no. 4,2007. Li.Liu, Y. Tu, Y. Li, and G. Zou. “Imputation for missing data and variance estimation whenauxiliary information is incomplete”, Model Assisted Statistics and Applications, 83-94,2005 Y Shi, Z Cai, G Lin, Classification accuracy based microarray missing value imputation. in Bioinformatics Algorithms: Techniques and Applications, ed. by Mandoiu I, Zelikovsky A (Wiley-Interscience, Hoboken, NJ, USA, 2007), pp. 303–328 J Hua, T Waibhav, ER Dougherty, Performance of feature-selection methods in the classification of high-dimension data. Pattern Recognition 42(3), 409–424 (2009). Brian A. Cattle1, Paul D. Baxter, Darren C. Greenwood, Christopher P. Gale1, Robert M. West, “Multiple imputation for completion of a national clinical audit dataset”, Statistics in Medicine Volume 30, Issue 22, pages 2736–2753, 30 September 2011 Awawtam. "Pima Stories of the Beginning of the World." The Norton Anthology of American Literature. 7th ed. Vol. A. New York: W. W. Norton &, 2007. 22-31 Angeline Christobel, SivaPrakasam,”An Empirical Comparison of Data mining Classification Methods”, International Journal of Computer Information Systems, Vol. 3, No. 2, 2011
Authors:
Ankit Upadhyay, Rajanikant M. Soni
Paper Title:
3-bit
R-2R Digital to Analog Converter with Better INL&DNL
Abstract: In this paper analysis of 3-bit R-2R ladder DAC proposed with most of the specification in the last decade has been done. All analysis have been supported by simulations results. To carry out the simulations Eldo spice, IC Station and Design architect from Mentor Graphics Tools is used. For all about Pre Layout simulation has been realized using (0.35um) CMOS process Technology. Keywords: digital-to-analog converters(DAC),R-2R ladder network., DNL,INL 84. References: 1. 2. 3. 4. 5. 6.
85.
401-403
P. E. Allen and D. R. Holberg, CMOS Analog Circuit Design, 2nd edition, Oxford University Press, 2002.pp.270-280,453-454. R.J. Baker, H.W. Li, D.E. Boyce, CMOS Circuit Design Layout and Simulation, Chapter 29, IEEE Press, 1998. Zhi-Yuan Cui, Hua-Lan Piao, and Nam-Soo Kim, ―A 10-bit Currentsteering DAC in 0.35-μm CMOS Process‖ Transactions On Electrical And Electronic Materials Vol. 10, No. 2, April 25, 2009. Mircea Tomoroga, Lucian Jurca, ―Study of Matching Errors in Unit Element Approach of Current-Steering Segmented DAC Design.‖ 6th WSEAS International Confeence on System Science and Simulation in Engineering, 2007. Eulalia Valestrieri, SomeCritical Notes on DAC Time Domain Specifications Instrumentation and Measurement Technology Conference, Italy, April-2006. J Jacob Wikner, ―Studies on CMOS Digital-to-Analog Converters‖, Dissertation No. 667, Linköping Studies in Science and Technology, 2001.
Authors:
Bouzidi Abdelkader, Khelfi Djillali, Rebhi Fayçal
Thermal Conductivity Calculation at Moderate Pressure for Polyatomic Gases Using a Neural Network Approach Abstract: The main aim of the present work was the development of a new method based on neural network to accurately evaluate thermal conductivity of pure polyatomic gases included both polar and no polar gases at atmospheric pressure and over wide range of temperature. Two multilayer feed forward neural networks have been trained using five and four physicochemical properties for polar and no polar gases respectively; molecular weight (M), boiling point (Tb), critical temperature (Tc), critical pressure (Pc) and dipole moment ( ), for polar gases, combined with absolute temperature (T) as their inputs . The thermal conductivity and the properties for each individual gas were compiled on different temperatures, ranging from their boiling points to 1100 K. The maximum absolute error in thermal conductivity, predicted by the artificial neural networks ANNs, was less than 4%. Paper Title:
Keywords: Conductivity, Polar gases, No polar gases, Artificial neural networks. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
R.C. Reid, J.M. Prausnitz, and T.K. Sherwood, The Properties of Gases and Liquids, McGraw-Hill Book Company, USA, 1977. A. Gosse, A. Déroulède, and C. Dutheuil, Propriétés de Transport des Gaz à Pression Modérée; Viscosité, Conductivité Thermique, Coefficient de Diffusion, Données Thermodynamiques des Fluides, Paris, 1991, pp. (K425) 1-17. J. Homer, S.C. Generalis, and J.H. Robson, “Artificial neural networks for prediction of liquids viscosity, density, heat of vaporisation, boiling point and Pitzer’s acentric factor”, Phys. Chem. Chem. Phys., 1, (1999), pp. 4075-4081. M.J. Lee, S.M. Hwang, and Chen J. T., “Density and viscosity calculations for polar solutions via neural networks”, Journal of Chemical Engineering of Japan, 27, (1994), 6. V. Chang, et al., A sensor for on-line measurement of viscosity of non-Newtonian fluids using a neural network approach. Elsevier Science Sensor and Actuators A. 46, (1995), pp. 332-336. M., Adel Elsharkwy, R.B.C. Gharbi, “Comparing classical and neural regression techniques in modelling crude oil viscosity”, Elsevier Science. Advances in engineering software, 32, (2001), pp. 215-224. Division Scientifique de L’AIR LIQUIDE, Encyclopédie des Gaz, Elsevier. Netherlands, 1976. A. Bouzidi, S. Hanini, F. Souahi, B. Mohammedi, and M. Touiza, “Viscosity calculation at moderate pressure for nonpolar gases via neural network”, ANSI, journal of Applied Sciences, 7, 17, (2007), pp. 2450-2455. D. Tsaptsinos, Back-propagation and its Variation. In Bulsari A. B. (Ed.), neural networks for chemical engineers, computer-aided chemical engineering, Elsevier Science, 1995. G. Dreyfus, et al., Réseaux de Neurones Méthodologie et Applications, Editions Eyrolles, Paris, 2002.
Authors:
Syed Imran Ali Qasim Ali, V A Kulkarni
Paper Title:
Computer Oriented Load Flow Study of Electrical S/S
404-409
Abstract: The power flow computation consists of imposing specified power and voltage input conditions to a power network and producing the complete voltage information at all the system buses. The calculation is required for both the steady state analysis and the dynamic performance evaluation of power systems. It is also used to initialize other computeraided power system software. This paper presents a novel production grade load flow program that can perform the power flow computations of modern electric power systems efficiently and accurately. The new program is capable of providing the power flow information of independent subsystems simultaneously. It possess a unique feature of changing the power levels of generators and loads locally or globally in power systems. The paper also describes the under going integration and initialization of the well-known system software MATLAB with the load flow program.
86.
Keywords: The new program is capable of providing the power flow information of independent subsystems simultaneously. References:
410-412
I.G. Nagrath and D.P. Kothari, “Modern Power System Analysis”, book, Second Edition 1995, Tata McGraw Hill Publishing Company Ltd, New Delhi, pp. 163-200. 2. R.N. Dhar, “Computer Aided Power System Operation and Analysis”, book, Third Edition 1987, Tata McGraw Hill Publication, New Delhi, pp68-87. 3. Stagg and EI Abiad, “Computer Methods in Power System Analysis”, book, McGraw Hill International Students Edition 1995, pp.258-262. 4. S.Abe, N. Hamada, A. Isono, “Power Apparatus and System”, IEEE Transactions on Vol. PAS 97, No: 6, Nov/Dec-1978, pp10-35. 5. Y. Kanetkar, “Let Us C” book, Third Edition, 1999, BPB Publication New, Delhi, pp1-150. 6. Y. Kanetkar, “C Projects” book, BPB Publication, New Delhi, pp20-52. 7. T.D. Brown Jr. “Basic C for Basic Programmers”,book, Tata McGraw Hill Edition 1988, pp.1-10. 8. N.N. Bengiamin, “Regulating Transformer Model For Use in Load Flow Analysis,” IEEE Transactions on Power Apparatus and System, Vol. PAS104, No.5, May 1985. 9. Jim See, Wayne Carr “Real Time Distribution Analysis for Electric Utilities,” IEEE Transactions on Load Flow Analysis of Power System, Vol. PAS115, No18, May 1993. 10. G.M. Gilburt, “Comparison of Load Flow Analysis by Iterative Methods”,” IEEE Transactions on Power Apparatus and System, Vol. PAS-110, No.9, 1988. 1.
Authors:
87.
A.B. Shinde, V.N. Dhage, K.M. Jadhav Structural And Magnetic Properties of Indium Substituted Cobalt Ferrite Nanoparticles Synthesized by Paper Title: Sol-Gel Auto-combustion Technique Abstract: The indium substituted cobalt ferrite having general molecular formula CoInxFe2-xO4 (for x= 0.0, 0.3,0.5) have been prepared by sol-gel auto combustion technique. The as prepared sample was sintered at 6000C for 4hr. The X-ray diffraction pattern reveals the formation of single phase indium substituted cobalt ferrite samples. The lattice constant obtained from XRD data increases with increase in indium substitution x. The Particle size obtained from XRD data is in the nanometer range. The particle size decreases with increase in indium substitution x. The average grain size obtained from 413-416 Scanning electron microscopy technique is in nanometer range. The pulse field hysteresis loop tracer technique is used to determine the magnetic parameters such as saturation magnetization (Ms), remanent magnetization (Mr) remanent ratio (Mr/Ms) and coercivity of the samples. The saturation magnetization (Ms), Magneton number (nB) decreases with increase in indium substitution in cobalt ferrite samples.
Keywords: Cobalt ferrite, Magnetization, Nanoparticles, Sol-gel auto-combustion References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
88.
Navneet Singh, Ashish Agarwal, Sujata Sanghi, “dielectric-relaxation-conductivity-behavior-and-magnetic-properties-of-mg-substituted-zn-li ferrites”, Current Appl. Phys. 11 (2011) 783. D. Carta, M. F. Casula, A. Falqui, D. Loche, G. Mountjoy, C. Sangregorio, A. Corrias, “A Structural and Magnetic Investigation of the Inversion Degree in Ferrite Nanocrystals MFe2O4 (M) Mn, Co, Ni)”,J. Phys. Chem. C 113 (2009) 8606. B. Visuanathan and V.R.K. Murthy, “Ferrites Materials Science and Technology”, Narosa Publishing House (1990) A. Moser, K. Takano, D.T. Margulies, M. Albrecht, Y. Sonobe, Y. Ikeda, S. Sun, E. E. Fullerton, Magnetic recording: advancing into the Future” ,J. Phys. D: Appl. Phys. 35 (2002) R157. I.H. Gul, Erum Pervaiz, “Carrier concentration dependence of donor activation energy in n-type GaN epilayers grown on Si (1 1 1) by plasmaassisted MBE”, Mater. Res. Bull. 47 (2012) 1353. Sonal Singhal , Rimi Sharma, Tsering Namgyal, Sheenu Jauhar, Santosh Bhukal and Japinder Kaur, “Structural, electrical and magnetic properties of Co0.5Zn0.5Alx Fe2-x O4 (x =0, 0.2, 0.4, 0.6, 0.8 and 1.0) prepared via sol-gel route”.Ceramics International 38 (2012) 2773. Saroaut Noor, M. A. Hakim, S. S. Sikder, S. Manjura Hoque, Kazi Hanium Maria and Per Nordblad, “Magnetic behavior of Cd2+ substituted cobalt ferrites” J. Phys. Chem. Sol. 73 (2012) 227. N.M. Deraz and A. Alarifi “Microstructure and Magnetic Studies of Zinc Ferrite Nano Particles”J. Analyt. Appl. Pyrol. 94 (2012) 41. H. Jiang, T. Zhao, C. Li and J. Ma, “Hierarchical self-assembly of ultrathin nickel hydroxide nanoflakes for high-performance supercapacitors”,J. Mater. Chem. 21 (2011) 3818. K. J. Standley, Oxide Magnetic Materials, 2nd edition (1972) M.S. Khandekar, R.C. Kambale, J.Y. Patil , Y.D. Kolkar and S.S. Suryavanshi, “Conductivity Study of Polyaniline-Cobalt Ferrite (PANI-CoFe2O4) Nanocomposite”, Sonal Singhal, Tsering Namgyal, Sandeep Bansal and Kailash Chandra, “Effect of Zn Substitution on the Magnetic Properties of Cobalt Ferrite Nano Particles Prepared Via Sol-Gel Route”, J. Electromagnetic Analysis & Applications, 2 (2010) 376-381. S.T. Alone and K.M. Jadhav, “Structural and magnetic properties of zinc- and aluminum- substituted cobalt ferrite prepared by co-precipitation method”, J. Pram., 70 (2008)173. Sonal Singhal, S.K. Bharatwal and Kailash Chandra, “Cation distribution in the nanosize aluminium substituted cobalt ferrites using XRD, magnetic and Mossbauer spectral studies”, Indian J. Pure and applied Physics. 45 (2007) 821-825. K. KRIEBLE, C. C. H. LO AND Y. MELIKHOV AND J. E. SNYDER, “INVESTIGATION OF CR SUBSTITUTION IN CO FERRITE „COCRXFE2−XO4 USING MOSSBAUER SPECTROSCOPY NANOSCALE”, RESEARCH LETTERS 6 (2011) 499. M. Bradiceanu, P.Vlazan, S. Novaconi, I. Grozescu and P. Barvinschi Cobalt Ferrite Nanostructures Obtained by Chemical Coprecipitation and Hydrothermal Method” Chem. Bull. "POLITEHNICA" Univ. Volume 52(66), 1-2, 2007. Panchal N.R. and Jotania R.B, “Cobalt ferrite nano particles by microemulsion route”, Nanotechnology and Nanoscience Vol. 1, Issue 1, 2010, PP-17-18. P.S. Aghav, V.N. Dhage, M.L. Mane,D.R. Shengule, R.G. Dorik and K.M. Jadhav, “Effect of aluminum substitution on the structural and magnetic properties of cobalt ferrite synthesized by sol-gel auto combustion process”, Physica B: Condensed Matter, 406, 23(2011) 4350-4354. Jian-Ping Zhou, Li Lv , Xian-Zhi Chen, “Dielectric and magnetic properties of ZnO-doped cobalt ferrite”, J. Ceramic Process. Res. 11(2) (2010) 263. S.S. Jadhav, S.M. Patange and K.M. Jadhav, “Dielectric behaviourstudy of nanocrystalline Co-Zn ferrite”, Journal of Biomedical and Bioengineering,1 (1), 2010)21-29 L. Neel, Ann. Phys. 3 (1948) 137.
Authors:
P.B.Buchade
Paper Title:
Development of a Versatile Mathematical Routine Library with Microcontroller
Abstract: A software tool for micro controller applications with assembly language programming for interfacing concepts having a multipurpose routine library is developed. This library is intended to solve different mathematical equations like linear equations, first polynomial, second polynomial etc encountered in data acquisition and analysis. Routines are also developed for proper formatted display on LCD. Some of the unique features of this method are highlighted. A multipurpose mathematical routine library which can be used as a easy tool in designing and implementation of microcontroller based instrumentation systems. The analog voltage on a selected channel read from instrumentation is converted to digital form with ADC stored in internal memory..The subroutine programs for performing the mathematical operations like addition, subtraction, multiplication, division etc in 16 bit format are tested with Integrated Development Environment (IDE) simulator. This subroutine programs are then further used to solve the equations with asm51 cross assembler. The program can debug, erased and reprogrammed immediately and online tested. After assembly completion, error free program is downloaded with FLASH MAGIC in a microcontroller chip 417-419 Keywords: Embedded, Microcontroller, Routine Library, software References: 1. 2. 3. 4. 5. 6. 7. 8.
Hernandez Rosales, R.Femat,E.Ruiz Velazquez, G.Soils Perales (2005) A standard microcontroller based discrete time Pi for controlling the motion of a dc gearmeter, C journal of applied research and technology, Vol no1. Richard’s. Barnett, Prentice Hall (1995), “The 8051 family of Microcontroller” Scott MacKenzie ,(1995), “The 8051 Microcontroller I” Prentice Hall 2nd edition Nigel Gardner “A beginners Guide to microchip” Character press, Ltd UK. Greg Osborn, (2010) “Embedded Microcontrollers and Processor Design” First edition published by Pearson Education ISBN No 978-81-317-64732,pp11 Kenneth Hintz and Daniel Tabak(1992). “Architecture, Implementation, and programming,” , Mc Graw Hill Inc Muhammad Ali Mazdi, Janice Gillispie Mazidi,(2002). “The 8051 Microcontroller and Embedded Systems,” Pearson Education PVT Ltd Kenneth J.Ayala (1997). “The 8051 Microcontroller Architecture, programming and applications”, ,2nd Edition, Penram International publishing PVT LTD.
Authors: 89.
R.G. Tambe, M.B. Vaidya Implementing Mobile Crawler Using JINI Technology to Reduce Network Traffic and Bandwidth Paper Title: Consumption Abstract: To search any information on the web users extensively use the search engines. As the growth of the World Wide Web exceeded all expectations, the search engines rely on web crawlers to maintain the index of billions of pages for 420-425 efficient searching. The web crawlers have to interact with millions of hosts and retrieve the pages continuously to keep the
index up-to-date. According to literature survey, most of the network traffic and bandwidth is consumed by web crawlers so instead of using them, we are proposing mobile crawler developed using JINI technology with the help of remote page selection, filtration and compression at web servers and not search engine. Keywords: JINI Technology, Mobile Agent, Mobile Crawler, web Crawler References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
90.
Fiedler and J. Hammer. Using the Web Efficiently: Mobile Crawling. In Proc. Of the 7th Int'l Conf. of the Association of Management (AoM/IAoM) on Computer Science, San Diego, CA, pp. 324-329., August 1999. Bal, S. and Nath, R. Filtering the Non-modified pages at remote site during crawling using Mobile Crawlers. In Proc. of IEEE International Advance Computing Conference (IACC‟09), Ashutosh Dixit and Dr. A. K. Sharma,A Mathematical Model for Crawler Revisit Frequency‟‟, 2010 IEEE 2nd International Advance Computing Conference. Satinder Bal and Rajender Nath, ”A Novel Approach to Filter Non-Modified Pages at Remote Site without Downloading During Crawling”, 2009 International Conference on Advances in Recent Technologies in Communication and Computing. Ashutosh Dixit and A.K Sharma, “Self Adjusting Refresh Time Based Architecture For Incremental Web Crawler”, International Journal of Computer Science and Network Security (IJCSNS), Vol 8, No12, Dec 2008. L. Page and S. Brin, “The anatomy of a search engine”, Proc. of the 7th International WWW Conference (WWW 98), Brisbane, Australia, April 1418, 1998. Junghoo Cho and Hector Garcia-Molina.2000a.“The evolution of the web and implications for an incremental crawler”., In Proceedings of the 26th International Conference on Very Large Databases. Cho, J., Garcia-Molina, H., Page, L., “Efficient Crawling: Through URL Ordering”, Computer Science Department, Stanford University, Stanford, CA, USA, 1997. J Prasanna Kumar and P Govindarajulu, “Duplicate and Near Duplicate Documents Detection: A Review”, European Journal of Scientific Research ISSN 1450-216X Vol.32 No.4(2009), pp.514-52 © Euro Journals Publishing, Inc. 2009. J. Fiedler and J. Hammer. “Using Mobile Crawlers to Search the Web Efficiently,”International Journal of Computer and Information Science, vol.1, no.1, pp.36-58,2000. H. S. Nwana, “Software Agents: An Overview,” Knowledge Engineering Review, Cambridge University Press, 11:3, pp. 1996 Complete code listings for the agent and agent host architecture components described in this article: Gauri. S. Bhagat, M.S. Bewoor, Prof. Suhas H. Patil, “Improved Search Engine Using Cluster Ontology”,IJAET,November,2011, ISSN-2231-1963
Authors:
Sunanda Kisanrao Kapde, S.V.Patil
Paper Title:
Image Compression Method
Abstract: Data transmission and storage cost money. The more information being dealt with, the more it costs. In spite of this, most digital data are not stored in the most compact form. Rather, they are stored in whatever way makes them easiest to use. Data compression is the general term for the various algorithms and programs developed to address this problem. A compression program is used to convert data from an easy-to-use format to one optimized for compactness. Here two algorithms were selected namely, the original block truncation coding (BTC) and Absolute Moment block truncation coding (AMBTC) and a comparative study was performed. The results have shown that the ATBTC algorithm outperforms the BTC. It has been show that the image compression using AMBTC provides better image quality than image compression using BTC at the same bit rate. Moreover, the AMBTC is quite faster compared to BTC. 426-429 Keywords: BTC, AMBTC, Q level quantizer, image compression; mean, standard deviation References: Doaa Mohammed, Fatma Abou-Chadi,” Image Compression Using Block Truncation Coding Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), February Edition, 2011. S. Vimala, M. Sathya , K. Kowsalya Devi ,” Enhanced AMBTC for Image Compression using Block Classification and Interpolation” International Journal of Computer Applications (0975 – 8887) Volume 51– No.20, August 2012 Edward J. Delp, Martha Saenz, and Paul Salama BLOCK TRUNCATION CODING (BTC)”Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette, Indiana
1. 2. 3.
91.
Authors:
Sohini Mondal, Bishnu Prasad De
Paper Title:
New Delay and Power Analysis for a CMOS Inverter Driving RLC Interconnect
Abstract: In this era, the on-chip interconnect delay is significantly more dominating than the gate delay. Several approaches have been proposed to capture the interconnect delay accurately and efficiently. Here delay and power analysis for a CMOS inverter driving a resistive-inductive-capacitive load is presented. A closed form delay and power model of a CMOS inverter driving a resistive-inductive-capacitive load is discussed. The model is derived from Sakurai’s alpha-power law and exhibits good accuracy. The model can be used for the design and analysis of the CMOS inverters that drive a large interconnect RLC load when considering both speed and power. Closed form expressions are also presented for the propagation delay and transition time which exhibit less than 15% error compared to the SPICE for a wide range of RLC loads. Explicit methods are also provided for modeling the short-circuit power dissipation of a CMOS inverter driving a RLC line. The average error is within 22% compared to SPICE for most practical loads. 430-434 Keywords: Electronics, CMOS, Delay , Power, RLC Interconnect, SPICE,VLSI (Very large scale integration) References: 1. 2. 3. 4. 5.
S.Bothra, B.Rogers, M.Kellam, and C.M. Osburn, “Analysis of the effects of scaling on interconnect delay in ULSI circuits”, IEEE Transactions on Electron Devices ED-40, 591 (1993). H. B. Bakoglu and J. D. Meindl, “Optimal Interconnection Circuits for VLSI,” IEEE Transactions on Electron Devices, ED-32,. 903 (1985). S. Dhar and M. A. Franklin, “Optimum Buffer Circuits for Driving Long Uniform Lines” IEEE Journal of Solid-State Circuits, SC-26, 32, (1991). M. Nekili and Y. Savaria, “Optimal Methods of Driving Interconnections in VLSI Circuits,” Proceedings of the IEEE International Symposium on Circuits and Syetems, pp. 21-23, May 1992. C. Y. Wu and M. Shiau, “Delay Models and Speed Improvement Techniques for RC Tree Interconnections among Small-Geometry CMOS Inserters,” IEEE Journal of Solid-State Circuits, SC-25, 1247, (1990).
6. 7. 8. 9. 10. 11. 12. 13. 14.
15.
J. Cong and C. K. Koh, “Simultaneous Driver and Wire Sizing for Performance and Power Optimization”, IEEE Transactions on VLSI Systems VLSI-2, 408 (1994). R. J. Antinone and G. W. Brown, “The modeling of Resistive Interconnects for Integrated Circuits”, IEEE Journal of Solid State Circuits SC-18, 200 (1983). L. Bisdounis, S. Nikolaidis, O. Koufopavlou, and C. E. Goutis, “Modeling the CMOS Short-Circuit Power Dissipation”, Proceedings of the IEEE International Symposium on Circuits and Systems, pp. 4.469, 4.472, May 1996. A. M. hill and S. M. Kang, “Statistical Estimation of Short-Circuit Power in VLSI Circuits”, IEEE International Symposium on Circuits and Systems, pp. 4.105-4.108, May 1996. Hirata, H. Onodera, and K. Tamaru, “Estimation of short-Circuit Power Dissipation and its Influence on Propagation Delay for Static CMOS Gates”, IEEE International Symposium on Circuits and Systems, pp. 4.751-4.754, May 1996. V. Adler and E. G. Friedman, “Delay and Power Expressions of a CMOS inverter driving a Resistive-Capacitive Load”, IEEE International Symposium on Circuits and Systems, pp. 4.101-4.104, May 1996. A.I. Kayssi, K.A. Sakallah, and T. M. Burks, “Analytical Transient Response of CMOS Inserters,” IEEE transactions on Circuits and Systems-I CAS I-39, 42 (1992). Madhumanti Datta, Susmita Sahoo, Rajib Kar, “An Explicit Model for Delay and Rise Time for Distributed RC On-Chip VLSI Interconnect”, IEEE International Conference on Signal and Image Processing(ICSIP), pp. 368-371, Dec.15t -17th , 2010, Chennai. Chandan Datta, Madhumanti Datta, Sushmita Sahoo, Rajib Kar, “A Closed Form Delay Estimation Technique for High Speed On-Chip RLC Interconnect Using Balanced Truncation Method”, IEEE International Conference on Devices and Communications (ICDeCom-11), Feb 24-25, 2011, pp. 1-4, BIT Mesra, India. Rajib Kar, V. Maheshwari, A. K. Mal, A. K. Bhattacharjee, “Delay Analysis for On-Chip VLSI Interconnect using Gamma Distribution Function”, International Journal of Computer Application (Foundation of Computer Science (FCA) Press, USA), 1, 65 (2010).
Authors:
Mukta, Balwinder Singh Surjan Load Frequency Control of Interconnected Power System in Deregulated Environment: A Literature Paper Title: Review Abstract This paper reviews the requirements and the procedure used to obtain Grid Stability. The Grid stability requirements , Interconnected System, Automatic Generation Control (AGC), requirement for intelligent controller ,Fuzzy logic Controller and High Voltage DC transmission are discussed with their usage in Grid Stability. Keywords: Automatic Generation Control, Integral Controller, Fuzzy logic Controller, Deregulated Environment, Wind Turbine Generator References: 1. 2. 3. 4. 5.
7. 8. 9.
92.
10.
12. 13.
15. 16. 17. 18. 19. 20.
21. 22. 23. 24. 25. 26. 27.
Yogendra Arya, Narender Kumar, Hitesh Dutt Mathur, “Automatic Generation Control in Multi Area Interconnected Power System by using HVDC Links” IJPEDS( International Journal of Power Electronics and Drive System) Vol.2,No.1,March 2012, pp.67~75, ISSN :2088-8694. The Grid of Tommorow, http://www.swissgrid.ch/swissgrid/en/home/grid/development.html V. Sitnikov, D. Povh, D. Retzmann ,E. Teltsch, “Solution For Large Power system Interconnections” Conference paper for East-West Interconnection in Europe , CIGRE Russian National Committee,September 2003.pp1~8. Naimul Hasan, “An Overview of AGC Strategies in Power System”IJETAE(International Journal of Emerging Technology and Advanced Engineering,Vol.2,Issue 8,August 2012, ISSN 2250-2459,pp 56~64. Pardeep Nain, K.P.Singh Parmar,A.K. Singh, “Automatic Generation Control of an Interconnected Power System Before and After Deregulation” International Journal of Computer Applications(IJCA) (0975 – 8887) Volume 61– No.15, January 2013,pp 11~16. 6. C.B.Bangal “Automatic generation control of interconnected power systems using artificial neural network techniques”, A PhD Thesis Report, Bharat University, Department of Electrical Engineering, May 2009. Nasser Jaleeli, Donald N. Ewart, Louis S. VanSlyck, Lester H. Fink, “Understanding Automatic Generation Control”IEEE Trans. Power App.Syst vol. PAS-7, no. 3, pp. 1106–1122, Aug. 1992. Aprajita Salgotra, “Assessment of Automatic Generation Control in a deregulated Environment” M.E. Thesis report ,Thapar University, Department of Electrical Engineering, July 2012. Rani Thottungal P Anbalagan, T. Mohanaprakash, A. Sureshkumar, G.V.Prabhu, “Frequency Stabilisation in Multiarea System using HVDC Link” IEEE International Conference on Industrial Technology, ICIT,Mumbai, ISBN 1-4244-0726-5,December 2006, pp 590~595. Issarachai Ngamroo, “A Stabilization of Frequency Oscillations in a Parallel AC-DC Interconnected Power System via an HVDC Link” Research Article by Science Asia 28(2002),pp173~180. http://www.scienceasia.org/2002.28.n2/v28_173_180.pdf 11. Manuel A. Matos, Eduardo M. Gouveia, “The Fuzzy Power Flow Revisited” IEEE Transactions on Power Systems, Vol. 23, No. 1, February 2008,pp213~218. E. C. TACKER, T. W. REDDOCH, 0. T. TAN, T. D. LINTON, “Automatic Generation Control of Electric Energy Systems-A Simulation Study” IEEE Trans. Syst. Man Cybern., vol. SMC-3, no. 4, pp. 403–5, Jul. 1973. Kamalesh Chandra Rout, “Dynamic Stability Enhancement of Power System Using Fuzzy Logic Based Power System Stabilizer”, M.Tech Thesis Report,NIT RourKela,May,2011. 14. I.J. Nagrath and D.P. Kothari, “Modern Power System Analysis” 3rd Edition, Sixteenth reprint 2009, Tata McGraw Hill publication. Mukta, Balwinder Singh, “Grid Stability of Interconnected System with Fuzzy-logic controller & HVDC in Deregulated Environment” IJSCE( International Journal of Soft Computing and Engineering)Vol.2,Issue 6,January 2013,pp. 283~288,ISSN :2231-2207. Furat Abdal Rassul Abbas and Mohammed Abdulla Abdulsada, “Simulation of Wind-Turbine Speed Control by MATLAB” International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010,pp 912~915,ISSN:1793-8163. Lucas Friedrich, Matthias Gautschi, “Grid Stabilization Control and Frequency Regulation for Inverter‑connected Distributed Renewable Energy Sources” Master Thesis report, University of Wisconsin-Madison, September 2009. Charles Vartanian, “Grid Stability Battery Systems for Renewable Energy Success” IEEE Conference on Energy Conversion Congress and Exposition (ECCE), ISBN 978-1-4244-5287,pp 132 - 135 , October 2010. Transmission Planning Guide report by National Grid USA Service Company, TGP26, Issue3, November 22, 2009. http://www.nationalgridus.com/non_html/transmission_planning_guide.pdf S.N.Soonie, S.C.Saxena, “Frequency Response Characteristics of an Interconnected Power System in India-A Case Study of Regional Grids in India” 6th R&D International Conference Report on Sustainable development of Water and Energy resources-Needs and Challenges”February,2007. http://www.nrldc.in/docs/documents/Papers/frc.pdf “Multi Dimensional Issues in International Electric Power Grid Interconnections” Report by United Nations, Department of Economic and Social Affairs ,New York, 2006, http://sustainabledevelopment.un.org/content/documents/interconnections.pdf “Power Interconnection in APEC region Current status and Future Potentials”,Report by Asia Pacific Energy Research Centre Institute of Energy Economics, Japan, March 2000. http://www.ieej.or.jp/aperc/final/interconnection.pdf Anjan Roy, S. A. Khaparde, P. Pentayya, S. Usha, A. R. Abhyankar, “ Operating Experience of Regional Interconnections In India” IEEE Conference Power Engineering Society General Meeting, Vol. 3,ISBN 0-7803-9157-8 ,pp 2528 - 2535 ,June 2005. “Simulation and Fault Analysis of HVDC on MATLAB” Project Report by 1000projects.org/ October 13, 2011. ABB Review Special report on Power transmission, ISSN: 1013-3119, 2003, pp1~67. “High Voltage DC transmission”, A review report by Siemens Energy ,2011,pp1,http://www.energy.siemens.com/hq/pool/hq/powertransmission/HVDC/HVDC_References.pdf Rafiqul Islam Sheikh, S.M. Muyeen, Rion Takahashi and Junji Tamura, “ Multi-Area Frequency and Tie-Line Power Flow Control by Fuzzy Gain Scheduled SMES”, Energy Storage, Rafiqul Islam Sheikh (Ed.), ISBN:978-953-307-119-0, http://www.intechopen.com/books/energy-storage/multi-
435-441
areafrequency-and-tie-line-power-flow-control-by-fuzzy-gain-scheduled-smes 28. Kanika Wadhwa, Sourav Choubey, Pardeep Nain, “Study of Automatic Generation Control Of two area thermal-thermal system with GRC and without GRC” First National conference on Power System Engineering(PSEC’12) Paper code PS1015, 2012. http://upload.wikimedia.org/wikipedia/commons/5/58/AGC_with_grc_and_without_grc.pdf 29. Bongani Malinga ,Dr. John E. Sneckenberger, Dr. Ali Feliachi, “Modeling and Control of a Wind Turbine as a Distributed Resource” IEEE Conference on System Theory ,Proceedings of the 35th Southeastern Symposium, ISBN 0-7803-7697-8. pp 108~112,2005 30. Jorris Soens, Johan Driesen, Ronnie Belman, “Equilvalent Transfer Function for a Variable Speed Wind Turbine in a Power System Dynamic Simulations” International Journal of Distributed Energy Resources ,Vol. 1 ,Number 2, ISSN 1614-7138, Pp 111-131. 31. Clemens Jauch, Syed M. Islam, “Identification of a Reduced Order Wind Turbine Transfer Function from the Turbine’s Step Response” AUPEC’05,Vol.1,S115 http://itee.uq.edu.au/~aupec/aupec05/AUPEC2005/Volume1/S115.pdf 32. Dr. A. Taifour Ali, Dr. Eisa Bashier M Tayeb, Ms. Kawthar A. Adam, “ A Multi-Machine Power System Stabilizer Using Fuzzy Logic Controller” International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 6,pp28~33, ISSN 2250-3005,October’ 2012. 33. Jenica Ileana Corcau, Eleonor Stoenescu, “Fuzzy Logic Controller as a Frequency Stabilizer” INTERNATIONAL JOURNAL OF CIRCUITS, SYSTEMS AND SIGNAL PROCESSING,Vol.1,Issue3,2007,pp266~273 http://www.naun.org/multimedia/NAUN/circuitssystemssignal/cssp-44.pdf 34. Glenn V. Hicks, “An Investigation of Automatic Generation Control for an Isolated Power System” Master Thesis of Mernorial University of Newfoundland, September’97. http://onlyengineering.wordpress.com/2012/06/26/thesis-1-automatic-generation-control-agc-part-1/ 35. Manuel A. Matos, “The Fuzzy Power Flow Revisited”, IEEE Transactions on Power Systems, Vol.23, No.1, ISSN : 0885-8950,pp213~218,February 2008. 36. Timothy J. Ross, “Fuzzy Logic with Engineering Applications” Second Edition, Wiley Publication, John Wiley & Sons, Aug-2004. 37. MATLAB help with simulink www.mathworks.com/products/matlab38. A.R.Abhyanker,S.A.Khaparde, “Introduction to deregulation in power industry”, Report by Indian Institute of Technology, Mumbai, http://nptel.iitm.ac.in/courses/Webcourse-contents/IIT%20Bombay/Power%20System%20Operation%20and%20Control/Module%207/L01Introduction%20to%20Deregulation-1.pdf 39. “Basic Process Controllers” by 40. http://www.engineeringtoolbox.com/process-controllers-d_499.html 41. Mukta,Balwinder Singh,”Load Requency Control through Fuzzy Logic Controller in a Deregulated Environment”National Conference on Recent Innovations in Electrical Electronics and Communication Engineering(RIEECE),November 2012,paper code, RIEECE-173. 42. Teofilo De la Torre James W. Feltes Tomis Gdmez San Romiin ,“Deregulation, Privatization, And Competition: 43. Transmission Planning Under Uncertainity” IEEE Transactions on Power Systems, Vol. 14, No. 2,ISSN: 0885-8950 ,May 1999,pp460~465. 44. Multi Dimensional Issues in International Electric Power Grid Interconnections, “Technical Aspects of Grid Interconnections – the United Nations”,Chapter-2,pp.15~48. www.un.org/esa/sustdev/publications/energy/chapter2.pdf 45. Wolfgang Hammer, “Dynamic Modeling of Line and Capacitor Commutated Converters for HVDC Power Transmission” DOCTOR OF TECHNICAL SCIENCES Thesis report of SWISS FEDERAL INSTITUTE OF TECHNOLOGY ,ZURICH,2000-2003. 46. Stephen M. Hoyt, Charles E Abell, Thomas Kennedy, “Variable Non-Linear Tie Line Frequency Bias for Interconnected System Control” IEEE Transactions on Power Systems, Vol. 3, No. 3, ISSN: 0885-8950, August 1988,pp1244~1253. 47. Hassan Bevrani, “Robust Power System Frequency Control” Book published by Springer Science Business Media, LLC,ISBN:978-0-387-84877-8 48. Colin Pearson,Marc Yeung, “Wind Generation Integration with emphasis on grid stability” Conference presentation by BECA power, 49. http://windenergy.org.nz/documents/conference09/ColinPearson.pdf 50. Preghnesh Bhatt, S.P. Ghoshal, and Ranjit Roy, “Automatic Generation Control of Two-area Interconnected Hydro-Hydro Restructured Power System with TCPS and SMES” ACEEE Int. Journal on Control System and Instrumentation, Vol. 02, No. 02, June 2011,pp1-5, 51. http://www.slideshare.net/ideseditor/automatic-generation-control-of-twoarea-interconnected-hydrohydro-restructured-power-system-with-tcps-andsmes 52. J. Nanda, Lalit Chandra Saikia, “Comparison of Performances of Several Types of Classical Controller in Automatic Generation Control for an Interconnected Multi-Area Thermal System” IEEE conference on Power Engineering,Australasian Universities Power Engineering Conference (AUPEC), Paper P-022,ISSN : 978-0-7334-2715-2 ,pp1-6,2008. 53. Peigao Zhang, Xingyuan Li, Yuhong Wang, Hongqiang Deng, “Research on frequency stability in isolated power grid” IEEE Conference on Power and Energy Engineering(APPEEC), ISBN: 978-1-4577-0545-8 ,pp1~4,March 2012. 54. Dr. Prabhat Kumar,Ram Naresh Mishra, “Optimal Control of 3-Area Interconnected Hydro-Thermal System with EHVAC/HVDC Links” XXXII NATIONAL SYSTEMS CONFERENCE, NSC 2008, December 17-19, 2008,pp 536~541. 55. Vijay Rohilla, K. P. Singh Parmar, Sanju Saini, “Optimization of AGC Parameters in the Restructured Power System Environment Using GA” International Journal of Engineering Sciences & Emerging Technologies, Oct. 2012.ISSN: 2231 – 6604 Volume 3, Issue 2, pp: 30-40 56. Cuicui Wu, Lin Gao ,Junrong Xia ,Yiping Dai, “Analysis of Effects on Primary Frequency Control and Power Grid Stability of Different Control Logic” 5th IEEE Conference on Industrial Electronics and Applications, ISBN: 978-1-4244-5045-9,June 2010,pp887-892. 57. Yipping Dai, Pan Zhao, Shuping Chang, “Primary Frequency Control Characteristics of a grid” IEEE Conference on Industrial Electronics and Applications (ICIEA),ISBN : 978-1-4244-1717-9,pp1493~1497,June 2008 58. N. Cohn, ‘Some aspects of tie-line bias control on interconnected power systems,’ IEEE Transaction on Power Apparatus and Systems, Part III. Transactions of the American Institute of Electrical Engineers, Vol. 75, Issue 3,pp. 1415-1436, ISSN : 0018-9510, Feb. 1957. 58. N. Cohn, ‘Some aspects of tie-line bias control on interconnected power systems,’ IEEE Transaction on Power Apparatus and Systems, Part III. Transactions of the American Institute of Electrical Engineers, Vol. 75, Issue 3,pp. 1415-1436, ISSN : 0018-9510, Feb. 1957. 59. C. Concordia and L.K. Kirchmayer, ‘Tie line power and frequency control of electric power systems,’ IEEE Transaction on Power Apparatus and Systems, Amer. Inst. Elect. Eng. Trans., Pt. II, Vol. 72,Issue 2, ISSN: 0018-9510 ,pp. 562-572, Jun. 1953. 60. L. Shanmukha Rao, N.Venkata Ramana, “Recent Philosophies of AGC of a Hydro-thermal System in a Deregulated Environment” International Journal of Advances in Engineering & Technology(IJAET), Vol. 1 Issue 6, p282, ISSN: 2231-1963,Jan 2012. 61. Vaibhav Donde, M. A. Pai,Ian A. Hiskens, “Simulation and Optimization in an AGC System after Deregulation” IEEE Transactions on Power Systems, Vol. 16, No. 3,ISSN: 0885-8950, August 2001,pp481-489. 62. Yong-Hua Song “Applications of fuzzy logic in power systems. I. General introduction to fuzzy logic” IEEE Journal on Power engineering, Volume: 11 , Issue: 5 ,ISSN: 0950-3366,Pp 219 – 222,Oct 1997
93.
Authors:
Nirmal Sharma, S. K. Gupta
Paper Title:
Data Warehousing: A Logical Approach in Organization
Abstract: In this research paper will decide manage the design, development, and logical operation of even a single organization’s warehouse can be a difficult and time consuming program. In this paper, we present the first steps to ensure a successful data warehouse development effort. The paper of objective is the problem should be clear, be specific, and have testable criteria for success. If specify these problems and get customer and organization report. This approach is successfully identified on our client's data warehouse and data development tool. The data warehouse is developing by scratch; the user uses strange data by the easiest way. In this condition counts the data through online analysis tools. The data analysis tools will compare in terms of cost, purpose and user friendliness logical approach. It is not upgrading existing databases or converting from one or more legacy systems. It will have a long list “things about that don't work right” to start with. Keywords: Data warehousing, development, manage warehouse & Logical data.
442-444
References: W. H. Inmon, “Building the Data Warehouse”, John Wiley & Sons, Inc, NY, 2005. Englsh, L, “Data Quality: Meeting Customer Needs”, Pitney Bowes white paper, (1998). Andrews Consulting Group, “ Why You Need a Data Warehouse Inc. 2011 M. Jarke, Y. Vassiliou, “Foundations of data warehouse quality – a review of the DWQ project”, Proc. 2nd Intl. Conf. Information Quality (IQ-97), Cambridge, Mass., 1997. 5. Williams, J. (1997). “Tools for Traveling Data” DBMS Online, June 1997. 6. I.D. Centric, “Customer Data Quality: Building the Foundation for a One-to-One Customer Relationship”, i.d. Centric white paper, 7. Griffin, J,. Author, Title: “Fundamental Pitfalls to Avoid in Your Data Warehouse”. Revised Edition, April 2003. 8. Data Quality Tools for Data Warehousing - A Small Sample Survey”, center for technology in government 1998. 9. Kimball et al., “The Data Warehouse Lifecycle Toolkit”, ISBN 978-0-470-14977-5, 116–117, Third Edition. New York, Wiley, 2008. 10. Imhoff, Galemmo, Geiger, Mastering Data Warehouse Design, Wiley Publishing Inc., 2003. 11. Horowitz, A. (1998). “Ensuring the Integrity of Your Data”, Beyond Computing, May 1998. 12. Christopher Adamson, Michael Venerable, “Data Warehouse Design Solutions”, Wiley Publishing Inc., 1998 1. 2. 3. 4.
Authors:
Hitesh Modi, Nilesh D. Patel
Paper Title:
Design and Simulation of Two Stage OTA Using 0.18μm and 0.35μm Technology
Abstract: The OTA is an amplifier whose differential input voltage produces an output current. Thus, it is a voltage controlled current source. Operational transconductance amplifier is one of the most significant building-blocks in integrated continuous-time filters. Here we design a two stage operational transconductance amplifier in TSMC 0.18μm and 0.35μm technology with all the transistor in the saturation region. The simulated output frequency response is shown for a supply voltage of 1.8V and 3.3V using IC studio in Mentor Graphics. DC gain is 47.86dB and 46.75dB, power consumption is 2mW and 3.2mW and slew rate is 37.58 V/μs and 31.67 V/μs for 1.8V and 3.3V respectively. Keywords: Two stage operational transconductance amplifier, CMOS analog integrated circuits, Gain and Phase Margin. 94.
References: 1. 2. 3. 4. 5. 6. 7. 8.
Majid Memarian Sorkhabi and Siroos Toofan, “Design And Simulation of High performance Operational Transconductance Amplifier”, Canadian Journal on Electrical and Electronics Engineering Vol. 2, No. 7, July 2011. Bhavesh H. Soni, Rasika N. Dhavse, “Design of Operational Trans-conductance Amplifier Using 0.35µm Technology”, International Journal of Wisdom Based Computing, Vol. 1(2), August 2011. Reetesh V. Golhar and Mahendra A. Gaikwad and Vrushali G. Nasre, “ Design and Analysis of High Performance Operational Transconductance Amplifier”, International Journal of Scientific and Research Publications, Volume 2, Issue 8, August 2012. Carsten Wulff and Trond Ytterdal, “High Speed, High Gain OTA in a Digital 90nm CMOS Technology”. M.Yousefi and A.Vatanjou and F.Nazeri, “High-Speed High-Gain CMOS OTA for Switched Capacitor Applications”, World Academy of Science, Engineering and Technology 2012. Zahra Haddad Derafshi and Mohammad Hossein Zarifi, “Low-Power High-Speed OTA in 0.35μm CMOS Process”, European Journal of Scientific Research ISSN 1450-216X Vol.37 No.3, 2009. Behzad Razavi, Design of Analog CMOS Integrated Circuits, McGRAW-Hill international edition, p.p. 291-335 R. Jacob Baker, Harry W. Li and David E. Boyce, CMOS Circuit Design, Layout, and Simulation, IEEE press, p.p 617-674
Authors:
Gaurav Chandra, D.K.Saxena, Gaurav Bhandari
Paper Title:
Performance Tradeoff of PTS & SLM Technique Using Various Modulator in 802.11g
445-448
Abstract: Orthogonal Frequency Division Multiplexing technique (OFDM) is a most widely used technology in today’s wireless communication system. This technology suffer with a shortcoming known as Peak to Average Power Ratio (PAPR), due to this, the High Power Amplifiers (HPA) are worked in nonlinear region and cause inter-modulation distortion and unwanted out of band radiation. To combat the PAPR various PAPR reduction technique are developed. In this paper the most efficient signal distortion-less technique, Partial Transmit Sequence (PTS) and Selected Mapping (SLM) are used under different modulator namely Quadrature Phase Shift Key (QPSK) and Quadrature Amplitude modulator and analyzing and comparing the techniques simultaneously and varying the different parameters like Modulation factor, Sub-band, oversampling factor has been done. Keywords: CCDF, ODFM, PAPR, PTS, QPSK, QAM and SLM References: 1.
95. 2. 3. 4. 5. 6.
7. 8. 9. 10.
C. Nade, P. N. Landin, W. V. Moer, N. Bjorsell, and P.Hande, “Performance Evaluation of Peak-to-Average-Power-Ratio Reduction and Digital Pre Distortion for OFDM Based System” IEEE Trans. on Microwave Theory and Techniques vol. 59, no. 12, Dec. 2011. L. Yang, K. K. Soo, S. Q. Li, and Y. M. Siu, “PAPR Reduction Using Low Complexity PTS to Construct of OFDM Signals Without Side Information” IEEE Trans. on Broadcasting, vol. 57, no. 2, Jun.2011. S.Eom, H. Nam, Y.C. Ko “Low Complexity PAPR Reduction Scheme without Side information For OFDM Systems” IEEE Trans. on Signal Processing, vol. 60, no. 7, Jul.2012. J. Hou, J. Ge, and J. Li, “Peak-to-Average Ratio Reduction of OFDM Signal Using PTS Scheme With Low Computational Complexity ”, IEEE Trns. on Broadcasting, vol. 57, no. 1, Mar.2011. Md. I. Abdullah, Md. Z. Mahmud, Md. S. Hossain, Md. N. Islam “Comparative Study of PAPR Reduction Techniques in OFDM”, ARPN Journal of Systems and Software, vol. 1, no. 8, Nov. 2011. K. A. Mahajan, S. V. Mukhare, “Comparison of Signal Scrambling PAPR Reduction Techniques with Signal Distortion Techniques in OFDM Signal”, International Conference on Recent Trends in Information Technology and Computer Science (IRCTITCS) 2011 Proceedings published in International Journal of Computer Applications® (IJCA). M.V.R.Vittal, “Performance enhancement of OFDM signals using PAPR reduction Techniques and the Comparison of their Performance”, International Journal of Computer Applications (0975 – 8887) Volume 41– No.19, March 2012. G. Kaur, R. Kaur “Comparative study of SLM and PTS techniques for PAPR Reduction of an MC-CDMA system”, International Journal of Engineering Research and Applications (IJERA), vol. 2, Issue 4, Jul.-Aug. 2012. S. Cho and S. K.Park, “A New Selected Scheme without Additional IFFT Operation in OFDM Systems” IEEE Trans. on Consumer Electronics, vol. 57, no. 4, Nov. 2011. V. Cuteanu, A. Isar , “ PAPR Reduction of OFDM Signals Using Selective Mapping and Clipping Hybrid Scheme”, 20th European Signal Processing Conference (EUSIPCO 2012) , Bucharest, Romania, Aug. 27 - 31, 2012.
449-455
11. 12. 13. 14. 15. 16.
J. Armstrong, “New Peak-to-Average Power Reduction scheme”, Proc.of IEEE Vehicular Technology, May 2001. M. Deumal, C. Vilella, J. L. Pijoan, and P. Bergadà, “Partially Clipping (PC) Method for the Peak-to-Average Power Ratio (PAPR) Reduction in OFDM”, IEEE Int. Symposium on Personal Indoor and Mobile Radio Communications, vol.1, Sept. 2004. S. Yu “PAPR Reduction in OFDM System based on Clipped Power Re-allocation”, in Proc. Int. Conf. Wireless Commun. Signal Process, Nov.2009. W. Xu, H.-G. Ryu, B.-I. Jin, and I.-B. Kim, “PAPR Reduction Using Soft Clipping and ACI rejection in OFDM system,” IEEE Trans. Consum. Electron. vol. 48, no. 1, pp. 17–22, Feb. 2002. A. Tarighat and A. H. Sayed “MIMO OFDM Receiver for system with IQ Imbalance”IEEE Trans. on Signal Processing, VOL. 53, NO. 9, SEPTEMBER 2005. Gaurav Sikri and Rajni “A Comparison of Different PAPR reduction techniques in OFDM Using Various Modulation” International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.4, August 2012.
Authors:
Enas Fathi Taher, R.K. Pandey
Paper Title:
Study of Delay in Project Planning and Design Stage of Civil Engineering Projects
Abstract: As we know that delay occurs in every phase of construction project. One of the key characteristics of the construction projects is executing the scope of work in a specific amount of time. As project time overrun may have bad consequences for the project performing organization such as cost overrun, damage of company’s reputation, etc. it is important to clarify between causes of excusable delays and causes of non-excusable delays. While most previous studies have focused on finding causes or overcoming delays in the construction phase, few studies have analyzed delay problems in the planning and design phases. The main purpose of proposed research work is to identify and rank delay causes in the planning and design phases. A structured questionnaire was sent to engineers at the A/E companies for public construction projects in INDIA. Based on 95 valid responses, this study identified the delay causes and analyzed the importance and frequency of delays using the relative importance index. Analytical results reveal that “changes in client’s requirement” are the main causes of delays in both planning and design phases. The finding is good justification for many public clients who usually change their requirements during the planning and design phases that really delay construction projects. Keywords: Civil construction projects, delay, executable delays, non-executable delays, delay factors. References: 96.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
97.
Sambasivan, M. and Soon, Y.W. “Causes and effects of delays in Malaysian construction industry”, International Journal of Project Management, 25(5) (2007) 517-526. Odeh, A. M. and Battaineh, H.T., “Causes of Construction Delay: Traditional Contracts”, International Journal of Project management, Elsevier, 20 (2002) 67-73. Long, D. N., Ogunlana, S.O., Quang T. and Lam, K.C., “Large Construction Projects in Developing Countries, a case study from Vietnam”, International Journal of Project Management, Elsevier, 22 (2004) 553-561. Ogunlana, S.O., Promkuntong, K. and Jearkjirm, V., “Construction Delays in a Fast-Growing Economy: Comparing Thailand with Other Economies”, International Journal of Project Management, Elsevier, 14(1) (1996) 37-45. Assaf, S.A. and Al-Hejji, S., “Causes of delay in large construction projects”, International Journal of Project Management, 24 (2006) 349–357. Belassi, W. and Tukel, O.I., A new framework for determining critical success/failure factors in projects, International Journal of Project Management, 14(3) (1996) 141-51. Hatush, Z. and Skitmore, M., “Evaluating contractor prequalification data: selection criteria and project success factors”, Construction Management and Economics, 15(2) (1997) 129-47. Walker, D.H.T., “An investigation into construction time performance”, Construction Management and Economics, 13(3) (1995) 263-74. Chan, D.M.W. and Kumaraswamy, M.M., “A Comparative Study of Causes of Time Overruns in Hongkong Construction Projects”, International Journal of Project Management, Elsevier. 15(1) (1996) 55-63. Mezher T.M., and Tawil W., “Causes of Delays in the Construction Industry in Libanon”, Engineering Construction and Architectural Management Journal, Emerald, 5 (3) (1998) 251-60. Frimpong, Y., Oluwoye, J., and Crawford, L., “Causes of delay and cost overruns in construction of groundwater projects in developing countries: Ghana as a case study”, International journal of project management 21.5 (2003) 321-326. Alaghbari, W., Kadir, M.R.A., Salim, A., and Ernawati “The significant factors causing delay of building construction projects in Malaysia”, Engineering, Construction and Architectural Management, 14 (2) (2007) 192-206. Fugar, F D K and Agyakwah‑Baah, A B “Delays in building construction projects in Ghana”, Australasian Journal of Construction Economics and Building, 10 (1/2) (2010) 103‑116.
Authors:
Seshadri Sekhar.N. Raghunath.P.N.
Paper Title:
Static and Cyclic Behaviour of High Performance Corroded Steel Concrete Beams
Abstract: Experimental investigations were carried out on corroded reinforced High Performance Concrete (HPC) beams of size 150 mm X 250 mm X 3000 mm under both static and cyclic loading, separately under four point bending. Some of the beams were provided with 10%corroded steel and some with 25%. Corrosion of reinforcement was induced by immersing the RC beams in NaCl solution and by electrical conductivity and monitored with the corrosion analyser. The trend of the load-deflection relation of the beams was similar to that in the case of normal reinforced concrete beams under static loading. The strain energy absorbed by the both categories of the beams was calculated. It was found that the energy absorbed by corroded beams were lower by 10%, 25%, respectively. Some of the beams were also tested under cyclic load separately. It was observed that the deflection, compressive strain, tensile strain of the beams increase with the number of cycles. The paper presents in detail the experimental investigations conducted on beams and pertinent conclusions drawn there from. Keywords: High performance Concrete, Corroded steel, Silica Fume, Hyper Plasticizer. References: 1. 2. 3. 4. 5.
Indian standard code specification for 53 grade Ordinary Portland Cement 12269-1997 Sammy, Y.N. and Xihuang Ji, ”High performance concrete incorporating zeolite, fly ash, and silica fume,” SP172-50, American Concrete Institute, December 1, 1999, pp. 951 to 970. Wei, S., Ganghua, P., and Dajun. D., “Effect of combined use of ultra fine fly ash and silica fume on strength of HPC, “SP172-16, American Concrete Institute, pp. 299 to 312 . Neville, A. and Aitcin, P. C., ”High performance concrete - An overview,” Materials and Structures, Vol. 31, Mar 1998 , pp. 111 to117. Chang.P.K.,”Stress curves and mechanical properties of high performance concrete,” Journal of the Chinese Institute of Engineers, Vol. 27, No.7,
456-461
462-466
6. 7. 8. 9. 10. 11. 12. 13. 14.
2004, pp.1081-1085 Jaffer. S.J., Hansson. C.M. ”The influence of cracks on chloride-induced corrosion of steel in ordinary Portland cement and high performance concretes subjected to different loading conditions” Corrosion Science 50, 2008, pp. 3343-3353 Apostolopoulos. Ch. Alk.,” Mechanical behaviour of corroded reinforcing steel bars S500s tempcore under low cycle fatigue” Construction and Building Materials 21, 2007, pp. 1447-1456. Rodriguez J., Ortega.J., Casal L.M., “ Load carrying capacity of concrete structures with corroded reinforcement” Construction and Building Materials, Vol.ii, No 4, 1997, pp.239-248. Wrong H.S. et.al. ”On the penetration of corrosion products from reinforcing steel in to concrete due to chloride induced corrosion”. Corrosion Science 52, 2010, pp. 2469-2480. Wang.M.L and Shah S.P., ”Reinforced concrete hysteresis model based on the damage concept, Earthquake Engineering and Structural dynamics.Vol.15, 1987, pp. 993-1003. Verna, J.R., and Stelson, T.E., “Failure of small reinforced concrete beams under repeated loads,” ACI Journal proceedings Vol. 59, No.11, Nov. 1962, pp. 1489-1504. Hefferman. P.J., Erki, M.A., and Duquesnay. D.L., “Stress redistribution in cyclically loaded reinforced concrete beams”, ACI Structural Journal Vol.101. No. 2, Mar-Apr 2004, pp. 261-268 Balaguru, P., and Shah, S.P., "A Method of Predicting Crack Widths and Deflections for Fatigue Loading," American Concrete Institute, Special Publications, SP75.7, 1982, pp. 153-176. Houssam Toutanji et al. ”Cyclic behaviour of RC beams strengthened with carbon fiber sheets bonded by inorganic matrix”, Journal of Materials in Civil engineering, ASCE, Vol.18 Jan-Feb 2006, pp.28-35
Authors:
R. Raju, J. Mohanapriya
Paper Title:
Truthful Mechanisms for Scheduling Selfish Related Machines Using ACO
Abstract: Task scheduling is a major challenge in parallel and distributed systems. Task scheduling techniques in distributed systems are usually based on trusting the Accuracy of the information about the status of resources. In a commercial multi- Cloud environment, individual providers are focused towards increasing their own profits and do not care about the utility of users and other providers. In such an environment, we cannot trust the information presented by the providers.To address the scheduling problem in a commercial multi-Cloud environment using reverse auctions, propose a new truthful mechanism for scheduling single tasks on the set of resources. Then adapt the proposed mechanism to dynamically schedule workflow applications. A new pricing model and truthful scheduling mechanism to find the best resource for executing a task, Ant Colony Optimization is introduced. The proposed system is used to dynamically schedule multiple tasks using multiple servers. Also task rescheduling is achieved when the task is not completed within the time.The monetary cost and execution time of the task is more concentrated in the proposed system. Keywords: Ant colony optimization, Dynamic scheduling, Multi-Cloud environment, Task re-scheduling. References: 1. 2.
98.
3. 4. 5. 6.
7. 8.
9. 10. 11. 12. 13. 14. 15.
99.
Houidi, M. Mechtri, W. Louati, D. Zeghlache, Cloud Service Delivery across Multiple Cloud Platforms, Services Computing (SCC), 2011 IEEE International Conference on , vol., no., pp.741-742, 4-9 July 2011. “A Truthful Dynamic Workflow SchedulingMechanism for Commercial Multi-CloudEnvironments” Hamid Mohammadi Fard, Radu Prodan and Thomas Fahringer, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS. S.K. Nair, S. Porwal, T. Dimitrakos, A.J. Ferrer, J. Tordsson, T.Sharif, C. Sheridan, M. Rajarajan, A.U. Khan, Towards SecureCloud Bursting, Brokerage and Aggregation. In: 8th IEEE EuropeanConference on Web Services (ECOWS 2010), pp. 189-196, 2010. H. Izakian, A. Abraham, and B. Tork Ladani. 2010. An auction method for resource allocation in computational grids. Future Gener. Comput. Syst. 26, 2, pp. 228-235, February 2010. A. Danak, S. Mannor, Efficient Bidding in Dynamic Grid Markets, IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. RapidPosts, 2011. M. Amini Salehi, R. Buyya, Adapting Market-Oriented Scheduling Policies for Cloud Computing, Proceedings of the 10th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP 2010, LNCS 6081, Springer, Germany), pp. 351- 362, Busan, South Korea, May 21-23, 2010. R.Prodan, M. Wieczorek, and H. Mohammadi Fard, Double Auction-based Scheduling of Scientific Applications in Distributed Grid and Cloud Environments, Journal of Grid Computing, Volume 9, Number 4, pp. 531-548, 2011. H. Mohammadi Fard, R. Prodan, J. J. Durillo Barrionuevo and T. Fahringer, A Multi-Objective Approach for Workflow Scheduling in Heterogeneous Computing Environments, in proceeding of the 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid 2012), pp. 300-309, Ottawa, Canada, 2012. H. Mohammadi Fard, R. Prodan, G. Moser, T. Fahringer, A Bi-Criteria Truthful Mechanism for Scheduling of Workflows inClouds. In Third IEEE International Conference on Cloud ComputingTechnology and Science (Cloudcom 2011), pp. 599-605, Athens,Greece, 2011. M. Mao and M. Humphrey, Auto-scaling and Bio-objective scheduling strategy to minimize cost and meet application deadlines in cloud workflows. In Proceedings of Supercomputing 2011 (SC 11), 2011. Ant Colony Optimization for Software Project Scheduling and Staffing with an Event-Based Scheduler, Wei-neng Chen and Jun Zhang, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2012. N. Jain, I. Menache, J. Naor, and J. Yaniv. A truthful mechanism for value-based scheduling in cloud computing. In SAGT, pp. 178- 189, 2011. J. J. Durillo, A.J. Nebro, E. Alba The jMetal Framework for Multi- Objective Optimization: Design and Architecture. CEC 2010, pp. 4138-4325. July 2010. K. Keahey, M. Tsugawa, A. Matsunaga and J. Fortes, Sky Computing,IEEE Internet Computing, pp. 43-51, September/October,2009. A. Danak and S. Mannor, Bidding efficiently in repeated auctions with entry and observation costs, in Proc. IEEE Int. Conf. Game Theory for Networks, pp. 299-307, May 2009.
Authors:
R. Raju, P.Subhapriya
Paper Title:
A Neural Network Approach for Randomized Unit Testing Based On Genetic Algorithm
Abstract: The goal of unit testing is to isolate each part of the program and show that the individual parts are correct. A unit test provides a strict, written contract that the piece of code must satisfy. As a result, it affords several benefits. Unit tests find problems early in the development cycle. In continuous unit testing environments, through the inherent practice of sustained maintenance, unit tests will continue to accurately reflect the intended use of the executable code in the face of any change. Depending upon established development practices and unit test coverage, up-to-the-second accuracy can be maintained. In this paper, a genetic algorithm to evolve a set of inputs. So the system called Nighthawk, which uses a genetic algorithm (GA) to find parameters for randomized unit testing that optimize test coverage. Therefore using a feature subset selection (FSS) tool to assess the size and content of the representations within the GA. The enhancement in this work is to introduce Neural network based unit testing , include some training sets for possible output and then apply the Genetic
467-472
473-478
Algorithm. Therefore these results shows a better efficiency in the unit testing and reduce the test coverage. Keywords: Unit testing, Genetic algorithm, Neural network, FSS. References: 1. 2. 3.
4. 5.
6. 7.
8. 9. 10. 11. 12. 13. 14. 15.
100.
Feedback-directed Random Test GenerationCarlos Pacheco1, Shuvendu K. Lahiri2, Michael D. Ernst1, and Thomas Ball21MIT CSAIL, 2Microsoft Research. A Theory of Predicate-Complete Test [email protected] Research April 23, 2004. Nighthawk: A Two-Level Genetic-RandomUnit Test Data Generator. James H. Andrews and Felix C. H. Li Department of Computer Science University of Western Ontario London, Ontario, CANADA N6A 5B7 andrews,[email protected] Tim Menzies Lane Department of Computer Science West Virginia University PO Box 6109, Morgantown, WV, USA 26506 [email protected] Randomized Differential Testing as a Prelude to Formal Verification Alex Groce, Gerard Holzmann, and Rajeev JoshiLaboratory for Reliable Software _Jet Propulsion LaboratoryCalifornia Institute of TechnologyPasadena, CA 91109. USA. On the Value of Combining Feature Subset Selection with Genetic Algorithms: Faster Learning of Coverage Models James H. AndrewsUniversity of Western OntarioDepartment of Computer ScienceLondon, Ont., Canada, N6A 2B7 [email protected]. Tim Menzies Lane Department of CS & EE Morgantown, WV, USA [email protected]. Randomized Unit Testing: Tool Support and Best Practices James H. Andrews, SusmitaHaldar, Yong Lei and Felix Chun Hang Li Report No. 663 Jan 2006. Using Neural Networks for Data Mining. Using Neural Networks for Data Mining Mark W.Craven School of Computer ScienceCarnegie Mellon University Pittsburgh PA mark craven_cs cmu edu Jude W Shavlik Computer Sciences Department University of Wisconsin_Madison Madison WI shavlik_cs .wisc .edu “.Software Testing Fundamentals—Concepts, Roles. and Terminology John E. Bentley, Wachovia Bank, Charlotte NC. “Genetic Algorithms for Randomized Unit Testing James H. Andrews, Member, TimMenzies, IEEE and Felix C.H.Li.IEEETRANSACTIONSONSOFTWAREENG,VOL.37,NO.1,JAN/FEB2011. SWAT: A Spiking Neural Network Training Algorithm for Classification Problems John J. Wade, Liam J. McDaid, Jose A. Santos, and Heather M. Sayers IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 21, NO. 11, NOVEMBER 2010 Effective Software Fault Localization Using an RBF Neural Network W. Eric Wong, Vidroha Debroy, Richard Golden, Xiaofeng Xu, and Bhavani Thuraisingham IEEE TRANSACTIONS ON RELIABILITY, VOL. 61, NO. 1, MARCH 2012 P. Rowcliffe and J. Feng, “Training spiking neuronal networks with applications in engineering tasks,” IEEE Trans. Neural Netw., vol. 19, no. 9, pp. 1626–1640, Sep. 2008 Semi-Supervised Learning via Regularized Boosting Working on Multiple Semi-Supervised Assumptions Ke Chen, Senior Member, IEEE, and Shihai Wang IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 33, NO. 1, JANUARY 2011 Evalution of genetic algorithm for confict probe testing Computer science at rovanuniversity ,October 19,2011 IEEE Transaction. Toward the Training of Feed-Forward Neural Networks With the D-Optimum Input Sequence Marcin Witczak IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 17, NO. 2, MARCH 2006
Authors:
Vakkalagadda Prasad, MadaYaswanth Manikanta, M.V.D Prasad
Paper Title:
Modular Architecture for Industrial Automation
Abstract: Industrial automation is the wide area of FPGA based nodes and zigbeebasedcommunicationdevoted to industrial applications, Commercialapplications andmedical equipment. Industrial automation which are mainly depend on the power systems and requires to control over long distances which require wireless sensor networks and Zigbee based communication systems. The wireless technology require for the sensing, processing, power monitoring and communication among the industrial machines. These can be achieved by the various technologies like FPGA Based nodes for wireless sensor networks andZigbee based communication etc. This paper proposes a digital system for the sensing, processing ,power monitoring and communication using the FPGA Based nodes for wireless sensor networks and the Zigbee based technology.The growth of sensor networks during the last years is a fact and within this field, wireless sensor networks are growing particularly as there are many applications that demand the use of many nodes even hundreds or thousands. More and more applications are emerging to solve several problems in data acquisition and control in different environments, taking advantage of this technology. In this context, hardware design of the sensor network node becomes critical to satisfy the hard constraints imposed by wireless sensor networks, like low power consumption, low size and low cost. With this goal in mind, we propose a modular architecture for the nodes, composed of four layers: communication, processing, power supply and sensing. The purpose is to minimize the redesign effort as well as to make the node flexible and adaptable to many different applications. In a first prototype of the node, we present a node with a mixed design based on a microcontroller and an FPGA for the processing layer and Zigbee technology for communications.Zigbeeprotocol as the communication medium between the transmitter and receiver modules which transfers the data efficiently
479-482
Keywords: These can be achieved by the various technologies like FPGA Based nodes for wireless sensor networks andZigbee based communication etc. References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
101.
http://en.wikipedia.org/wiki/Wireless sensor network http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.126.6482&rep=rep1&type=pdf http://en.wikipedia.org/wiki/OCARI http://www.sciencedirect.com/science/article/pii/S1389128601003024 http://www.pervasive.ifi.lmu.de/adjunct-proceedings/demo/p077-080.pdf Shizhuang Lin, Jingyu Liu, Yanjun Fang. “ZigBee Based Wireless Sensor Networks and Its Applications in Industrial”, IEEE International Conference on Automation and Logistics, 2007 .pp:1979 – 1983 Christoph Spiegel, Sebastian Rickers, Guido H. Bruck, Peter Jung, Woojin Shim, Rami Lee, Jaehwang Yu. “Low Power Networks – The ZigBee Competition”, 2009 IEEE http://www.maxstream.net/wireless/zigbee.php Zengyou Sun, Tao Zhao, Chenghua Che “Design Of Electric Power Monitoring System Based On ZigBee and GPRS”, June 2009 IEEE
Authors:
Jayesh D. Kamble, Gaurav S. Apshete, Rekha V. Nagargoje, Sonam R. Jain
Paper Title:
Process Adaptive Web Services with Container Management System
Abstract: In highly dynamic and heterogeneous environment such as mobility transactional system and ubiquitous computing, software must be able to adapt at runtime and react to the environment. Furthermore it should be independent of
483-485
a certain hardware platform and implementation protocol. Our application determines the service of determined fertilizer industry with service based market for different dynamic transactions. On line services in the current Fertilizer Resource Planning web structure is not sufficient for working environment & not extractable for daily utility trancsactional sections. The daily transaction on the featured product won’t be possible technically, physically, logically. There are certain Loop holes in this System .Hurdles comes day by day for Physical oriented activity And hence it is more time consuming activity. To overcome certain issues & loop holes about the plant of dynamic culture, we designed system for implementing calculus transaction filler between the manufacturer, trader, and franchisee daily utility report transaction with highly dynamic & heterogeneous environment. A CMS facilitates document control, auditing, editing and timeline management. Keywords: Mobile transactions, CMS, runtime environment, Portal Alert Explorer References: 1. 2. 3. 4. 5. 6. 7.
Specification and Implementation of Dynamic Web Site Benchmarks, Cristiana Amza, Anupam Chanda, Alan L. Cox, Sameh Elnikety, Romer Gil, Karthick Rajamani and Willy Zwaenepoel, IEEE lnfocom Conference, 2002. Enterprise Content Management: An Overview, Heather E. McNay Siemens Energy & Automation, Inc. Duluth, Georgia, IEEE lnfocom Conference, 2003. Context-Based Matching and Rankingof Web Services for Composition Aviv Segev and Eran Toch IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 2, NO. 3, JULY-SEPTEMBER 2009 Dynamic Web Service Selection for Reliable Web Service Composition San-Yih Hwang, Member, IEEE Computer Society, Ee-Peng Lim, Senior Member, IEEE, Chien-Hsiang Lee, and Cheng-Hung Chen An Online Monitoring Approach for Web Service Requirements Qianxiang Wang, Member, IEEE, Jin Shao, Fang Deng, Yonggang Liu, Min Li, Jun Han, Member, IEEE, and Hong Mei, Senior Member, IEEE Realization of Dynamic Web Page Based on ASP Internet Computing & Information Services (ICICIS), 2011 International Conference 17-18 Sept. 2011 Dr. Rachna Soni , Gurmeet Kaur ‘Basic Approaches to Semantic Web Services : A Comparative Study’ Volume 2, Issue 3, March 2012 ISSN: 2277 128X from ‘International Journal of Advanced Research in Computer Science and Software Engineering ‘
Authors:
Jagadeesha Kumar B G, R Prabhakara, Pushpa H.
Paper Title:
Effect of Bacterial Calcite Precipitation on Compressive Strength of Mortar Cubes
Abstract: In this paper results are presented on an experimental investigation carried out on mortar cubes which were subjected to bacterial precipitation by different bacterial strains and influence of bacterial calcite precipitation on the compressive strength of mortar cube on 7, 14 and 28 days of bacterial treatment. Three bacterial strains Bacillus Flexus, isolated from concrete environment, Bacillus pasturii and Bacillus sphaericus were used. The cubes were immersed in bacterial and culture medium for above mentioned days with control cubes immersed in water and was tested for compressive strength. The result indicates that there was improvement in the compressive strength in the early strength of cubes which were reduced with time. Among the three strains of bacteria, Cubes treated with Bacillus flexus which is not reported as bacteria for calcite precipitation has shown maximum compressive strength than the other two bacterial strains and control cubes. Bacillus flexus which is capable of surviving at high pH, precipitate high calcite, and has less generation time can be used for bacterial calcite precipitation as concrete crack remediation and improvement of compressive strength of both mortar and concrete. Keywords: Bacillus flexus, calcite, compressive strength, mortar cubes. References: 1. 2.
102.
3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
N. Chahal, R. Siddique, and A. Rajor, “Influence of bacteria on the compressive strength, water absorption and rapid chloride permeability of fly ash concrete,” Construction and Building Materials, vol.28, no.1, 2012, pp.351-356 K. D. Arunachalam, K. S. Sathyanarayanan, B. S. Darshan, and R. B. Raja, “Studies on the characterization of Bio sealant properties of Bacillus sphaericus,” International Journal of Engineering Science and Technology, vol.2, no.3, 2010, pp. 270–277. V. Ramakrishnan, R. K. Panchalan, S. S. Bang, and R.City, “Improvement Of Concrete Durability By Bacterial Mineral Precipitation,” International Conference on Fracture, 2005. H. M. Jonkers and E. Schlangen, “A two component bacteria-based self-healing concrete,” Concrete Repair, Rehabilitation and Retrofitting II, 2009, pp. 215–220. N. De Belie and W. De Muynck, “Crack repair in concrete using bio deposition,” Concrete Repair, Rehabilitation and Retrofitting II, 2009, pp.777– 782. J. L. Day, A. V. Ramakrishnan, and S. S. Bang, “Microbiologically Induced Sealant For Concrete Crack Remediation,” 16th Engineering Mechanics Conference, 2003, pp.1–8. V. Bang, S.S., Galinat, J.K., and Ramakrishnan, “Cal- cite Precipitation Induced by Polyurethane Immobilized Bacillus Pasteurii,” Enzyme and Microbial Technology, vol.28, 2001, pp. 404–409. S. S. Bang, J. J. Lippert, U. Yerra, S. Mulukutla, and V. Ramakrishnan, “Microbial calcite, a bio-based smart nanomaterial in concrete remediation,” International Journal of Smart and Nano Materials, vol.1, no.1, 2010, pp. 28–39. Stocks-Fischer, S., Galinat, J.K., and Bang, S.S.”Microbiological Precipitation of CaCO3,” Soil Biology and Biochemistry, 31, 1999, 1563-1571. P. Tiano, L. Biagiotti, G. Mastromei, “Bacterial biomediated calcite precipitation for monumental stones conservation: methods of evaluation”, Journal of Microbiological Methods, Vol.36, Issues 1–2, 1999, pp.139-145. F. Hammes, N. Boon, J. De Villiers, W. Verstraete, S. D. Siciliano, and J. De Villiers, “Strain-Specific Ureolytic Microbial Calcium Carbonate Precipitation,” Applied And Environmental Microbiology, vol.69, no.8, 2003, pp. 4901–4909. J. G. Holt, Ed., Bergey’s Manual of Determinative Bacteriology, 9th ed. Williams & Wilkins, Baltimore, 1994. J. P. Prescott and M. Harley Lansing, Laboratory Exercises in Microbiology, Fifth edit. The McGraw−Hill, 2002, pp. 57–77. Horner-Devine MC, Carney KM, Bohannan BJM, “An ecological perspective on bacterial biodiversity”. Proceedings Royal Society Biological Science B 271, 2004, pp.113–122. Ciurli S, Marzadori C, Benini S, Deiana S, Gessa C., “Urease from the soil bacterium: Bacillus pasteurii immobilization on Ca-polygalacturonate.” Soil Biol Bio chem 28, 1996, pp. 811-817. Benini S, Rypniewski W, Wilson KS, Miletti S, Ciurli S, Mangani S., “A new proposal for urease mechanism based on the crystal structures of the native and inhibited enzyme from Bacillus pasteurii: why urea hydrolysis costs two nickels.” Structure7, 1999, pp.205-216. Bachmeier KL, Williams AE, Warmington JR, Bang SS., “Urease activity in microbiologically-induced calcite precipitation.” Journal of Biotechnology 93, 2002, pp. 171-181. Ghosh P, Mandal S, Chattopadhyay BD, Pal S., “Use of microorganism to improve the strength of cement mortar.” Cement and Concrete Research 35,
486-491
2005, pp.1980-1983. 19. Muynck W, Dick J, De Graef B, De Windt W, Verstraete W, De Belie N., “Microbial ureolytic calcium carbonate precipitation for remediation of concrete surfaces.” Proceedings of International conference on concrete repair, rehabilitation and retrofitting, South Africa, Cape Town, 2005, pp. 296297.
Authors:
Fahd Alharbi
Paper Title:
Secure Steganography System for RGB Images
Abstract: Steganography is the process of embedding data into a media form such as image, voice, and video. The Lest Significant Bit (LSB) is consider as the most widely used embedding technique. LSB embeds the secret message's bits into the least significant bit plane of the image in a sequentially manner . The LSB is simple, but it poses some critical issues. The secret message is easily detected and attacked duo to the sequential embedding process. Moreover, embedding using a higher bit plane would degrade the image quality severely. Using more bits for hiding in a gray scale image (8-bit) would result in a poor image quality. Thus, the color image which is represented by three bytes one for each color (Red, Green, Blue) are more suitable for hiding more data bits .To increase the security of the data hiding system, we are using a bit plane decomposition based on Fibonacci numbers to decode the RGB pixels' values. This will allow for using higher bit plane without degrading the image quality. Also, the image's pixels used for embedding data are selected by using a Pseudo Random Number Generator(PRNG). Keywords: Steganography, Image, LSB, Fibonacci, PRNG. 103. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
S. Katzenbeisser, F.A.P. Petitcolas, Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, MA, 2000. W. Bender, D. Gruhl, N. Morimoto, A. Lu, ―Techniques for data hiding‖ IBM Syst. J. 35 (3&4) (1996) 313–336. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2Nd Ed. ISBN: 978-0123725851 Chi-Kwong Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognition, pp. 469–474, Mar. 2004. Cox, I., Miller, M., Bloom, J., Fridrich, J., Kalker, T.: Digital Watermarking and Steganography, 2Nd Ed. ISBN: 978-0123725851 Swanson, M. D., Kobayashi, M., Tewfik, A. H.: Multimedia Data-Embedding and watermarking Technologies, Proc. IEEE, vol. 86, 1064 – 1087, 1998 N. Johnson, Digital Watermarking and Steganography: Fundamentals and Techniques , The Computer Journal. (2009) A. Hordam, "A generalized Fibonacci sequence", American Mathematical Monthly, no. 68, pp 455 — 459, 1961. Sigler, Laurence E., "Fibonacci's Liber Abaci", Springer-Verlag, translation, 2002. Vorobiev Nikolai N., Mircea M., “Chapter 1. Fibonacci Numbers”, Birkhauser, pp. 5–6. ISBN 3- 7643-6135-2, 2002 Brown, J. L. Jr. "Zeckendorfs Theorem and Some Applications", Fib. Quart. 2, 16 3-168, 1964. Phillips G.M., “Zeckendorf representation”, in Hazewinkel, Michiel, Encyclopaedia of Mathematics, Springer, ISBN 978-1556080104, Picione, 2001. L. T. Wang and E. J. McCluskey, “Linear feedback shift register design using cyclic codes,” IEEE Trans. Comput., vol. 37, pp. 1302-1306, Oct. 1988. A. Fuster and L. J. Garcia, “An efficient algorithm to generate binary sequences for cryptographic purposes,” Theoretical Computer Science, vol. 259, pp. 679-688, May 2001.
492-494
Authors:
Vivek Chandra, Sagar Deokar, Siddhant Badhe, Rajesh Yawle Removal of High Density Salt and Pepper Noise Through Modified Decision Based Unsymmetric Trimmed Paper Title: Adaptive Median Filter Abstract: An algorithm based on adaptive and unsymmetric trimmed median filter is proposed in this paper. This algorithm is proposed for restoration of gray-scale as well as color images which are highly corrupted by salt and pepper noise. The proposed algorithm replaces the noisy pixel by a value which is either a mean or a median of all other non-noisy pixels in the selected window. The proposed algorithm also adaptively controls the window size depending on the relative amount of noisy pixels compared to non-noisy pixels in the selected window. This proposed algorithm substantially outperforms all existing median-based filters, in terms of suppressing salt and pepper noise while preserving image details. The proposed algorithm is tested against different gray-scale and color images giving better Peak Signal-to-Noise Ratio (PSNR) and Image Enhancement Factor (IEF) at different noise densities. 104. Keywords: adaptive, median filter, restoration, salt and pepper noise.
495-499
References: 1. 2. 3. 4. 5. 6.
105.
Pratt William, "Digital Image Processing," John Wiley & Sons, Fourth Edition, 2007. Gonzalez and Woods, "Digital Image Processing," Pearson Education, Second Edition, 2005. H. Hwang and R. A. Hadded, “Adaptive median filter: New algorithms and results,” IEEE Trans. Image Process., vol. 4, no. 4, pp. 499 502, Apr. 1995. P. E. Ng and K. K. Ma, “A switching median filter with boundary discriminative noise detection for extremely corrupted images,” IEEE Trans. Image Process., vol. 15, no. 6, pp. 1506–1516, Jun. 2006. K. S. Srinivasan and D. Ebenezer, “A new fast and efficient decision based algorithm for removal of high density impulse noise,” IEEE Signal Processing Letters, vol. 14, no. 3, pp. 189–192, Mar. 2007. S. Esakkirajan, T. Veerakumar, Adabala N. Subramanyam and C. H. PremChand, “Removal of high density salt and pepper noise throughmodified decision based unsymmetric trimmed median filter,” IEEE Signal Processing Letters, vol. 18, no. 5, pp. 287-290, May 2011.
Authors:
R. D. Vaidya, P. N. Shende, N. A. Ansari, S. M. Sorte
Paper Title:
Analysis Plant Layout for Effective Production
Abstract: This research aims to improve the plant layout of manufacturing industry to make optimum space utilization, eliminate obstructions in material flow and thus obtain maximum productivity. The present layout and operation process of each section (i.e. material storage, cutting, machining shop, fabrication shop, assembly and inspection section and finish product storage) have been investigated. The problem in the space utilization and material flow pattern was identified. Flow process chart of each product is studied and it is analyze by Minimum Product Travel Method and CRAFT (Computerized Relative Allocation of Facilities Technique). The result showed that raw material section, cutting section and fabrication shops should be allocated to make the good material flow. The suitable of new plant layout can decrease the Distance of Material Flow and Transportation Cost which rises production.
500-504
Keywords: CRAFT, Plant Layout, Production References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25.
Anucha Watanapa, Phi chit Kajondecha, Patcharee Duangpitakwong, and Wisitsree Wiyaratn, Analysis Plant Layout Design for Effective Production. International Multiconference of Engineers and Computer scientists (IMECS 2011) Vol II, Hong Kong. W. Wiyaratn, and A. Watanapa,, Improvement Plant Layout Using Systematic Layout Planning (SLP) for Increased Productivity. World Academy of Science, Engineering and Technology 72 2010. Pinto Wilsten, Layout Design of a Furniture Production Line Using Formal Methods. Journal of Industrial and Systems Engineering Vol. 1, No. 1, pp 81-96, 2007. Saifallah Benjaafar, Design of Flexible Plant Layout. Department of Mechanical Engineering University of Minnesota, 2010. R. Jayachitra and P. S. S. Prasad, Design and selection of facility layout using simulation and design of experiments. Indian Journal of Science and Technology, Vol. 3 No. 4 (Apr. 2010), 437-446. Uttapol Smutkupt, and Sakapoj Wimonkasame, Plant Layout Design with Simulation. Proceedings of the International MultiConference of Engineers and Computer Scientists 2009 Vol II, IMECS 2009, March 18 - 20, 2009, Hong Kong. Dhamodharan Raman, Towards measuring the effectiveness of a facilities layout. Robotics and Computer-Integrated Manufacturing 25 (2009) 191– 203. Eida Nadirah Roslin and Ong Gee Seang, A Study on Facility Layout in Manufacturing Production Line Using WITNESS. The 9th Asia Pasific Industrial Engineering & Management Systems Conference,(APIEMS 2008) 412-421. Kevin so, Facility layout improvement. The University of British Columbia (2008), 1-37. Taho Yang, Multiple-attribute decision making methods for plant layout design problem. Robotics and Computer-Integrated Manufacturing 23 (2007) 126–137. Stefan Bock, Kai Hoberg, Detailed layout planning for irregularly-shaped machines with transportation path design. Elsevier European Journal of Operational Research 177 (2007) 693–718. Amine Drira, Henri Pierreval, Facility layout problems: A survey. Elsevier Annual Reviews in Control 31 (2007) 255–267. Sukanto Bhattacharya, Optimal Plant Layout Design for Process-focused Systems. School of Information Technology Bond University, Australia (2002) 1-13. Hamed Tarkesh, Facility layout design using virtual multi-agent system. Proceedings of the Fifth Asia Pacific Industrial Engineering and Management Systems Conference (2004). Pedro M. Vilarinho, A Facility Layout Design Support System. Departamento de Economia, Engenharia Industrial, Universidade de Aveiro (2003). C.N. Potts and J.D. Whitehead, Workload balancing and loop layout in the design of a flexible manufacturing system. European Journal of Operational Research 129 (2001) 326-336. Robin S. Liggett, Automated facilities layout: past, present and future. Automation in Construction Elsevier 9,197–215, (2000). Saifallah Benjaafar and Mehdi Sheikhzadeh, Design of Flexible Plant Layouts with Queueing Effects. Department of Mechanical Engineering University of Minnesota, Minneapolis (1997), MN 55455. Andrew KUSIAK and Sunderesh S. HERAGU,The facility layout problem. European Journal of Operational Research 29, North-Holland (1987), 229-251 . Uttapol Smutkupt, and Sakapoj Wimonkasame, Plant Layout Design with Simulation. International MultiConference of Engineers and Computer Scientists 2009, vol 2, IMECS, March 18 - 20, 2009, Hong Kong. Sukanto Bhattacharya, Optimal Plant Layout Design for Process-focused Systems. School of accounting and Finance Fiffith University, Australia. Nittaya Ngampak, Cellular Manufacturing Layout Design and Selection: A Case Study of Electronic Manufacturing Service Plant. International MultiConference of Engineers and Computer Scientists 2011, vol 2, IMECS, March 16 - 18, 2011, Hong Kong. T.S. Ogedengbe, Computer Aided Plant Layout Development for an Aluminum Product Factory. The Pacific Journal of Science and Technology, Volume 13. Number 1. May 2012 (spring). Robble Holt, Layout Analysis using Discrete Event Simulation: A Case Study. Proceedings of the 2010 Industrial Engineering Research Conference. Andrew Greasley, Using simulation for facility design: A case study. Elsevier. Simulation Modelling Practice and Theory 16 (2008) 670–677.
Authors:
N. A. Ansari, P. N. Shende, M. J. Sheikh, R. D. Vaidya
Paper Title:
Study and Justification of Body Postures of Workers Working In SSI by Using Reba
Abstract: An efficient and effective system, which is the base of a productive system, depends on the manner of service delivery by human operators. Important aspect is an ergonomics in order to improve performance of workers at work, develop an independent measure at work which will coordinate psychological, physical, and physiological aspects that is dependable for person behavior and effectiveness at work and stand as a key factor deciding workers efficiency. This paper center of attention on the ergonomics thought required to be governed in the small scale industries (SSIs), a precise case of Cultivators and Harvestor manufacturing unit is considered, which is different from all these aspects. mainly, an important & large component ‘turn table’ is consider for analyzing the ergonomic manufacturing methods. The crack between ergonomic considerations and actual practices at the place of work gives the standpoint to design the workstation. The data of musculoskeletal disorder of employee working at workplace of Cultivators and Harvestor manufacturing unit is collected, analyzed and justified by using REBA. Keywords: Ergonomic, Small Scale industries (SSIs), Cultivators and Harvestor, musculoskeletal disorders, REBA etc. 106. References: 1. 2. 3. 4. 5. 6. 7. 8. 9.
Isa Halim & Abdul Rahman Omar, “A Review on Health Effects Associated with Prolonged Standing in The Industrial Workplaces,” International Journal Of Research And Review In Applied Science, vol 8, issue 1, July 2011 D. N. Agrawal et al.,” Study And Validation Of Body Postures Of Workers Working In Small Scale Industry Through Rula,” International Journal of Engineering Science and Technology, Vol. 3 No.10 October 2011 Aide Maldonado-Macias et al., “Ergonomic Evaluation of Work Stations Related With the Operation of Advanced Manufacturing Technology Equipment: Two Cases of Study”, XV CONGRESO INTERNACIONAL DE ERGONOMIA SEMAC, 2009 Jaspreet Singh et al., “Musculoskeletal Disorder Risk Assessment in small scale forging Industry by using RULA Method,” International Journal of Engineering and Advanced Technology, Volume-1, Issue-5, June 2012 Krishnamoorthy Muthukumar et al., “Discomfort Analysis in Computerized Numeric Control Machine Operations,” Saf Health Work, 2012; 3:14653 Isa Halim et al., “Posture, muscle activity and oxygen consumption Evaluations among metal stamping operators: A pilot study in Malaysian small and medium Industries,” Journal - The Institution of Engineers, Malaysia, Vol. 72, No. 4, December 2011 Aman Sachdeva et al., “Minimizing Musculoskeletal Disorders in Lathe Machine Workers,” International Journal of Ergonomics, Volume 1 Issue 2 2011 M. C.I. Javier Antonio Lom Holguín et al., “Ergonomics and its relationship to the design of production processes,” PonenciaConergo2008 Mohammad Iqbal et al., “Ergonomics and Design,” International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, January 22 – 24, 2011
505-509
10. 11. 12.
L P Singh, “Work Posture Assessment in Forging Industry: An Exploratory Study in INDIA,” International Journal of Advanced Engineering Technology, vol. 1 issue III Oct.-Dec. 2010 Parimalam P. et al., “Ergonomic interventions to improve work environment in garment manufacturing units,” Indian Journal of Occupational and Environmental Medicine, August 2006 -Volume 10 - Issue 2 Hignett, S. and McAtamney, L. (2000), "REBA: A Survey Method for the Investigation of Work-Related Upper Limb Disorders," Applied Ergonomics, (31), p. 201-205.
Authors:
Vedavathi, N., Dharmaiah Gurram
Paper Title:
Theorems on Planar Graphs
Abstract: Graph coloring is a well-known and well-studied area of graph theory with many applications. In this paper, we will discuss list precoloring extensions. Keywords: 5-list-coloring, 2-connected, P -separating 3-cycle. 107.
References: 1. 2. 3. 4. 5. 6.
Dimitris Achlioptas and Cristopher Moore. Almost all graphs with average degree 4 are 3-colorable. J. Comput. System Sci., 67(2):441{471, 2003. Special issue on STOC2002 (Montreal, QC). Michael O. Albertson. You can't paint yourself into a corner. J. Combin. Theory Ser. B, 73(2):189{194, 1998. Michael O. Albertson, Alexandr V. Kostochka, and Douglas B. West. Precoloring extensions of Brooks' theorem. SIAM J. Discrete Math., 18(3):542{553, 2004/05. Noga Alon. Restricted colorings of graphs. In Surveys in combinatorics, 1993 (Keele), volume 187 of London Math. Soc. Lecture Note Ser., pages 1{33. Cambridge Univ. Press, Cambridge, 1993. Noga Alon. Degrees and choice numbers. Random Structures Algorithms, 16(4):364{368, 2000. Kenneth Appel and Wolfgang Haken. Every planar map is four colorable. Bull. Amer. Math. Soc., 82(5):711{712, 1976.
510-512
Authors:
Kanwalvir Singh, Himanshu Aggarwal Critical Factors in Consumers Perception towards Mobile Commerce in E-Governance Implementation: An Paper Title: Indian Perspective Abstract: Mobile commerce (M-commerce) tools and its services are growing at a much faster pace in this digitized world. The competitive race between the various mobile phone companies and the products that they make, offer much competitive price and services to the citizens in their day to day lives. But the common man and the Government in every country are all confused and helpless with this dynamic state of the mobile technology and its M-services. The need is so as to be par with or have equally capable standards viz. M-commerce technologies with such new innovative and technological wonderful services so as to offer efficient services to the common citizens. This paper provides an opportunity for the common citizens perceptions based on mobile commerce to be studied and also, finding the critical factors in consumer’s perception towards mobile commerce in e-Governance implementation. Keywords: Mobile commerce, E-Governance, Citizen Perception, Adoption factors, Mobile services References: 1. 2.
108.
3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
109.
Chang, C.M., Hung, S.Y. and Yu, T.J., Determinants of user acceptance of the e-government services: the case of online tax filing and payment system”, Government Information Quarterly, Vol. 23, No. 1, 2006, pp. 97-122. Ana, O., Santiago, “M-Modeler: A Framework Implementation for Modeling M-commerce Applications”,6th ACM international conference on Electronic commerce(ICEC), The Netherlands, ACM International Conference Proceeding Series, Vol. 60, 2004, pp. 596 -602. Keniston, K., “Grassroots ICT Projects in India: Some Preliminary Hypotheses”, ASCI Journal of Management 31{1&2},2002. Bhasin, M.L., “E-commerce and M-commerce Revolution: Perspectives, Problems and Prospects”, The Chartered Accountant, 2005, pp. 828829. Meera, S., Jhamtani, A., Rao, “Information and Communication Technology in Agricultural Development: A Comparative Analysis of three Projects from India”, AgREN (Agricultural research and Extension network), Network paper no. 135, 2004, ISBN no: 0-85003-705-0. Tandon, R., Mandal, S., Saha, D., “M-commerce-Issues and Challenges”, The 10th Annual International Conference on High Performance Computing (HiPC), Hyderabad, Paper Poster No.4, 2003 Mariam Rehman, Vatcharaporn Esichaikul, Muhammad Kamal, “Factors influencing e- Government adoption in Pakistan”, Transforming Government: People, Process and Policy, Vol. 6, Issue: 3, 2012, pp. 258-282. Dimitrova, D.V. and Chen, Y.C., “Profiling the adopters of e-government information and services: the influence of psychological characteristics, civic mindedness, and information channels”, Social Science Computer Review, Vol. 24, No. 2, 2006, pp. 172-88. Kotler, P., “Marketing insights from A to Z: 80 concepts every manager needs to know”,John Wiley & Sons Inc., New Jersey,2003. Ribbink, D., van Riel, A.C.R., Liljander, V. and Streukens, S. , “Comfort Your Online Customer: Quality, Trust and Loyalty on the Internet, Managing Service Quality”, 14(6), 2004,pp. 446-456. Carlos, B., Miguel, B., Isabel, A., “Entertainment and Informativeness as Precursory Factors of Successful Mobile Advertising Messages”, IBIMA Publishing Communications of the IBIMA, Vol. 2010, Article ID 130147, 2010, pp. 1-11. Huh, Y.E., S-H., Kim, “ Do Early Adopters Upgrade Early?Role of Post-adoption Behavior in the Purchase of Next-generation Products”, Journal of Business Research, Vol. 61, No. 1, 2008, pp. 40-46. Saha, S., Dey M., Bhattacharyya, S., “Factors affecting consumer buying behavior of shoes in Kolkata: A Case Study”, IUP Journal of Management research, Vol. 9, No.4, 2010. Valcourt,E., Robert,J., Beaulieu,F., “Investigating mobile payment: supporting technologies, methods,and use”, Proceedings of IEEE International conference on Wireless And Mobile Computing, Networking And Communications(WiMobapos); Volume 4, 2005,pp. 29-36.
Authors:
Anuradha Garg, Ajay Tiwari, Hemant Kumar Garg
Paper Title:
A Secure Energy Efficiency Routing Approach In Wireless Sensor Networks
Abstract: For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks. We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behaviors attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve
513-520
521-524
dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection. Keywords: Wireless Sensor Network, Energy efficiency, node compromised, trust management. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
K. Lin, C-F Lai, (2012) Dalian Univ. of Technology, Dalian, Liaoning, China. Chen M, Leung V, Mao S, Yuan Y (2007) DGR: directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Computer Communication 30(17):3368–3383. Lin K, Wang L, Li K, Shu L (2010) Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks. KSII Trans Internet Information Systems 1(1):5–24. Chen M, Leung V, Mao S, Kwon T (2009) RLRR: receiver- oriented load-balancing and reliable routing in wireless sensor networks. Wireless Communication Mobile Computer 9(3):405–416. Lin K, Chen M, Ge X (2010) Adaptive reliable routing based on cluster hierarchy for wireless multimedia sensor networks. EURASIP J Wireless Communication Network 341–349. Peng M, Xiao Y, Chen H, Hao Q, Vasilakos AV, Wu J (2010) Sensor distribution on coverage in sensor networks. QShine. Fan Q, Wu Q, Magoules F, Xiong N, Vasilakos AV, He Y(2009) Game and balance multicast architecture algorithms for sensor grid. Sensors 9:7177–7202. Chen M, Kwon T, Yuan Y, Choi Y, Leung V (2007) MADD: mobile-agent-based directed diffusion in wireless sensor networks. EURASIP J Application Signal Process 2007(1):219–242. Spyropoulos T, Rais R, Turletti T, Obraczka K, Vasilakos AV (2010) Routing for disruption tolerant networks: taxonomy and design. Wireless Network 16(8):2349–2370. Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay tradeoffs. IEEE Trans Veh Technology 58(9):4976–4988. Chen M, Kwon T, Choi Y (2006) EDDD: energy-efficient differentiated directed diffusion (EDDD) for real-time traffic in wireless sensor networks. Elsevier Computer Communication 29(2):231–245. Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. Mobile Network Application 14(2):220–229. Chen M, Gonzalez S, Leung V (2007) Applications and design issues of mobile agents in wireless sensor networks Wireless Communication Management 14(6):20–26. Giridhar A, Kumar PR (2005) Maximizing the functional lifetime of sensor networks. In: Proceedings of the 4th international conference on information processing in sensor networks (IPSN), pp 5–12. Li J, Mohapatra P (2007) Analytical model and mitigation techniques for the energy hole problems in sensor networks Pervasive Mobile Computer 3(8):233–254. Powell O, Leone P, Rolim J (2007) Energy optimal data propagation in wireless sensor networks. J Parallel Distributing Computer 67:302–317. Efthymiou C, Nikoletseas S, Rolim J (2006) Energy balanced data propagation in wireless sensor networks. Wireless Network 12:691–707. Mhatre V, Rosenberg C (2004) Design guidelines for wireless sensor networks: communication, clustering and aggregation. Ad Hoc Networks 2:45– 63. Wood A, Stankovic J (2002) Denial of service in sensor net works. IEEE Computer 35(10):54–62. Douceur J (2002) The sybil attack. In: Proc. of first international workshop on peer-to-peer systems (IPTPS’02). LNCS 2002, vol. 2429. Cambridge, MA, USA, pp 251–260. Hu Y, Perrig A, Johnson U (2002) Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University Tech. Rep. TR01-384.
Authors:
Madhuri V. Joseph
Paper Title:
Data Mining and Business Intelligence Applications in Telecommunication Industry
Abstract: Telecommunication companies today are operating in highly competitive and challenging environment. Huge volume of data is generated from various operational systems and these are used for solving many business problems that required urgent handling. These data include call detail data, customer data and network data. Data Mining methods and business intelligence technology are widely used for handling the business problems in this industry. The main application areas of BI and Data Mining in telecommunication industry include fraud detection, network fault isolation and improving market effectiveness. Keywords: Data Mining, Telecommunications, Business Intelligence, Fraud Detection, Network fault Isolation, Marketing & CR.M References:
110.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
Liebowitz, J. (1988). Expert System Applications to Telecommunications. New York, NY: John Wiley & Sons. Pareek, D.: Business Intelligence for Telecommunications. Auerbach Publications, Taylor & Francis Group LLC. (2007). Aggarwal, C. (Ed.). (2007). Data Streams: Models and Algorithms. New York: Springer. Weiss, G. (2004). Mining with rarity: A unifying framework. SIGKDD Explorations, 6(1), 7-19. Rosset, S., Neumann, E., Eick, U., & Vatnik (2003). Customer lifetime value models for decision support. Data Mining and Knowledge Discovery, 7(3), 321- 339. Freeman, E., & Melli, G. (2006). Championing of an LTV model at LTC. SIGKDD Explorations, 8(1), 27-32. Wei, C., Chiu, I.: Turning Telecommunications call details to Churn Predictions: A Data Mining Approach. In Expert Systems with Applications 23, pp. 103-112. (2002). Mozer, M., Wolniewicz, R., Grimes, D., Johnson, E., & Kaushansky, H. (2000). Predicting subscriber dissatisfaction and improving retention in the wireless telecommunication industry. IEEE Transactions on Neural Networks, 11, 690-696. Mani, D., Drew, J., Betz, A., & Datta, P (1999). Statistics and Data Mining techniques for lifetime value modeling. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 94-103). New York, NY: ACM Press. Weiss, G., Ros, J., & Singhal, A. (1998). ANSWER: Network monitoring using object-oriented rule. Proceedings of the Tenth Conference on Innovative Applications of Artificial Intelligence (pp. 1087-1093). Menlo Park: AAAI Press. Klemettinen, M., Mannila, H., & Toivonen, H. (1999). Rule discovery in telecommunication alarm data. Journal of Network and Systems Management, 7(4), 395-423. Weiss, G., & Hirsh, H (1998). Learning to predict rare events in event sequences. In R. Agrawal & P. Stolorz (Eds.), Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (pp. 359-363). Menlo Park, CA: AAAI Press. Sterritt, R., Adamson, K., Shapcott, C., & Curran, E. (2000). Parallel Data Mining of Bayesian networks from telecommunication network data. Proceedings of the 14th International Parallel and Distributed Processing Symposium, IEEE Computer Society. Sasisekharan, R., Seshadri, V., Weiss, S. Data Mining and forecasting in large-scale telecommunication networks. IEEE Expert 1996; 11(1):37-43. Fawcett, T., & Provost, F. (2002). Fraud Detection. In W. Klosgen & J. Zytkow (Eds.), Handbook of Data Mining and Knowledge Discovery (pp. 726-731). New York: Oxford University Press.
525-528
16. 17.
Shortland, R., Scarfe, R.: Data Mining Applications In BI. In BT Technology Journal, Vol 25, Nos 3 & 4, July/October 2007. Rosset, S., Murad, U., Neumann, E., Idan, Y., & Gadi, P. (1999). Discovery of fraud rules for telecommunications—challenges and solutions. Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 409-413). New York: ACM Press.
Authors:
Nishu kalia, Kundan Munjal
Paper Title:
Multiple Black Hole Node Attack Detection Scheme in MANET by Modifying AODV Protocol
Abstract: Mobile Ad hoc Networks (MANET) is a self-configuring, infrastructure less network consists of independent mobile nodes that can communicate via wireless medium. Each mobile node can move freely in any direction, and changes their links to other devices frequently. Security is an essential part of ad hoc networks. Due to its dynamic topology, resource constraints, no centralized infrastructure and limited security, it is vulnerable to various attacks and black hole attack is one of them. In this attack, the malicious node advertises itself as having the shortest path to the destination and falsely replies to the route requests, and drops all receiving packets. In this paper, a mechanism to detect the multiple black hole nodes has been proposed by modifying AODV protocol. Keywords: MANET, fake RREQ, Record field, multiple black hole nodes. References: 1. 2. 3. 4. 5.
111.
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18.
112.
http://cwi.unik.no/images/Manet_Overview.pdf Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour, and Yoshiaki Nemoto, “Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, Issue 3, Nov 2007, pp 338–346. Wu B, Chen J, Wu J, Cardei M , “ A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security. On Signals and Communication Technology. Springer, New York,2009 Hongmei Deng, Wei Li, and Dharma P.Agarwal, “Routing Security in Wireless Ad Hoc Network”, IEEE Communications Magazine, Volume 40, Number 10, 2002, pp 70-75. Payal N. Raj and PrashantB.Swadas, “DPRAODV: A Dynamic learning system against black hole attack in AODV based MANET”, International Journal of Computer Science Issues (IJCSI), Volume 2, Number 3, 2009, pp 54-59. S. Ramaswamy, H.Fu, M.Sreekantaradhya, J. Dixon, and K.Nygard, “Prevention of Cooperative black hole attack in wireless ad hoc networks,” International conference (ICWN‟03), Las Vegas, Nevada, USA,2003, pp 570-575. Hesiri Weerasinghe “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, Proceedings of the Future Generation Communication and Networking, Volume 2, 2008, pp 362-367. N.Mistry, D.C.Jinwala and M.Zaveri, “Improving AODV protocol against black hole attacks”, international multiconference of engineers and computer scientists 2010, vol 2, IMECS 2010, march 17-19 2010, Hong Kong. LathaTamilselvan and V Sankarnarayana, “ Prevention of Black Hole Attack in MANET”, Journal of Networks, Volume 3, Number 5, 2008, pp 1320. E.A. Mary Anita, V. Vasudevan, “Black Hole Prevention in Multicasting Routing Protocols for Mobile Ad hoc Networks using Certificate Chaining”, IJCA, Volume 1, 2011 K. Lakshmi et al. “Modified AODV Protocol Against Black hole Attacks in MANET” International Journal of Engineering and Technology Vol.2 (6), 2010, 444-449. Maha Abdelhaq, Sami Serhan, Raed Alsaqour and Rosilah Hassan “A local Intrusion Detection Routing Security over MANET Network”, IEEE, July 2011, Bandung, Indonesia. Yiebeltal Fantahun Alem, Zhao Chenh Xuan, “ Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anamoly Detection”,2nd International Conference on Future Computer and Communication, IEEE, Volume 3, 2010 S.Marti, T.J.Giuli, K.lai and M.bakery “Mitigating routing misbehaviour in mobile ad hoc networks”, 6th MobiCom, Boston, Massachusetts, August 2000. Mohammad Al-Shurman, Seong-Moo Yoon and Seungjin park, “Black Hole Attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference, Proceedings of the 42nd annual southeast regional conference , 2004, pp 96-97. J.Sen, S.Koilakonda and A.Ukil, “A mechanism for detection of cooperative black hole attack in mobile ad hoc networks”, Second International Conference on Intelligent System, Modeling and Simulation ,Innovation lab, Tata consultancy services ltd. , Kolkata, 25-27January 2011. Chang Wu Yu, Tung-Kuang Wu, Rei Heng Cheng (2007) “A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network”. Paper presented at the PAKDD workshops, Nanjing, China, 22-25 May 2007. Sun B, Guan Y, Chen J, Pooch UW (2003) “Detecting Black-hole Attack in Mobile Ad Hoc Networks”, 5th European Personal Mobile Communications Conference, Glasgow, United Kingdom, 22-25 April 2003.
Authors:
Jyotsna Yadav, Arpita Bharti, Rohit Patel, Mukesh Kumar
Paper Title:
Implementation and Performance Comparison Study of 1-D and 2-D FIR Filter using MATLAB
Abstract: FIR filters have only a finite number of terms in their impulse response. These filters have a number of advantages over the IIR filter types. FIR filter is always stable, realizable, and provides a linear phase response under specific conditions. These characteristics make FIR filters attractive to many filter designers. However, the major disadvantage of FIR filters is that the number of coefficients needed to implement a specific filter is often much larger than for IIR designs. Finite Impulse Response (FIR) filter is a filter structure that can be used to implement almost any sort of frequency response digitally. An FIR filter is usually implemented by using a series of delays, multipliers, and adders to create the filter's output. A Multirate digital signal processing is required in digital system where more than one Sampling Rate is required. This paper brings the performance comparison between the FIR designing methodologies like the 1-D, 2- D FIR Filters. In this paper 1-D, 2-D FIR filters using their operation have been implemented and simulated in the MATLAB and Simulink environment and their response has been studied in the waveforms. Simulation result shows that 2-D filter has increased computation speed as compared to 1-D, and is more efficient in reducing the noise in the signal. Keywords: Digital Filters, FIR Filters, 2-D FIR Filters, MATLAB. References: 1. 2. 3. 4. 5. 6.
S. Salivahanan, A. Vallavaraj, Gnanapriya, Digital Signal Processing”, McGraw-Hill / TMH, 2000. Amanpreet Singh Bharat Naresh Bansal,“ Analysis of Adaptive LMS Filtering in contrast to ultirate Filtering” IEEE 2012. Komal R. Borisagar, Dr. G.R. Kulkarni “Simulation and Performance Analysis of Adaptive Filter In Real Time Noise over Conventional Fixed Filter”IEEE 2012. Chonghua Li Design and Realization of FIR Digital Filters Based on MATLAB .IEEE 2010. Multirate Multistage Filtering: Using ATLAB and Simulink to design and implement very narrow filters. Mathworks. Proakis John G., Manolakis Dimitris. Digital Signal Processing -Principles, Algorithms and Applications, Pearson, 2009.
529-532
533-535
7.
Signal Processing in MATLAB by MathWorks, Advanced Filter Designing in MATLAB, 2006.
Authors:
R.N.Muneshwar, S.K.Sonkar
Paper Title:
Virtual Environments Provide Mammoth Security for Critical Server
Abstract: Security is the key factor of resolution of computer era. In every field of computer it may be cloud computing, neural network, data ware house, data mining, or grid computing in every field the security is central theme. We can provide the security by means of authentication process. Authentication is nothing but the process of validating who you are to whom you claim to be. The most common approach for authentication is alphanumeric passwords. Traditionally, alphanumeric passwords have been used for authentication. The textual passwords meets with the two conflicting things a) Passwords should be easy to remember, at the same time (b) Passwords hard to guess. Users tend to choose meaningful words from dictionaries, which make textual passwords easy to break and vulnerable to dictionary or brute force attacks. Many available graphical passwords have a password space that is less than or equal to the textual password space. Now day’s graphical passwords are other alternatives. Our paper reports to the comparison study between the different graphical password schemes and the alphanumeric passwords. Through we present and evaluate the 3-D password. The 3-D password is a multifactor authentication scheme. The 3-D password presents a 3-D virtual environment containing various virtual objects. The user navigates through this environment and interacts with the objects. The 3-D password is simply the combination and the sequence of user interactions that occur in the 3-D virtual environment. The 3-D password can combine recognition-, recall-, token-, and biometrics-based systems into one authentication scheme. This can be done by designing a 3-D virtual environment that contains objects that request information to be recalled, information to be recognized, tokens to be presented, and biometrical data to be verified. 113.
Keywords: Authentication, biometrics, graphical passwords, multifactor, textual passwords, 3-D passwords, 3-D virtual environment. 536-541 References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
X. Suo, Y. Zhu, and G. S. Owen, “Graphical passwords: A survey,” in Proc. 21st Annu. Comput.. Security Appl. Conf., Dec. 5–9, 2005, pp. 463– 472. D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,” in Proc. USENIX Security Workshop, 1990, pp. 5–14. NBC news, ATM Fraud: Banking on Your Money, Dateline Hidden Cameras Show Criminals Owning ATMs, Dec. 11, 2003. T. Kitten, Keeping an Eye on the ATM. (2005, Jul. 11). [Online]. Available: ATMMarketPlace.com BC news, Cash Machine Fraud up, Say Banks, Nov. 4, 2006. G. E. Blonder, “Graphical password,” U.S. Patent 5 559 961, Sep. 24, 1996. R. Dhamija and A. Perrig, “Déjà Vu: A user study using images for authentication,” in Proc. 9th USINEX Security Symp., Denver, CO, Aug. 2000, pp. 45–58. Real User Corporation, The Science Behind Passfaces. (2005, Oct.). [Online]. Available: http://www.realusers.com D. Davis, F. Monrose, and M. K. Reiter, “On user choice in graphical password schemes,” in Proc. 13th USENIX Security Symp., San Diego, CA, Aug. 2004, pp. 1–14. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Effects of tolerance and image choice,” in Proc. Symp. Usable Privacy Security, Pittsburgh, PA, Jul. 2005, pp. 1–12. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Authentication using graphical passwords: Basic results,” in Proc. HumanComput. Interaction Int., Las Vegas, NV, Jul. 25–27, 2005. S. Wiedenbeck, J. Waters, J.-C. Birget, A. Brodskiy, and N. Memon, “Pass Points: Design and longitudinal evaluation of a graphical password system,” Int. J. Human-Comput. Stud. (Special Issue on HCI Research in Privacy and Security), vol. 63, no. 1/2, pp. 102–127, Jul. 2005. I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, “The design and analysis of graphical passwords,” in Proc. 8th USENIX Security Symp., Washington DC, Aug. 1999, pp. 1–14. J. Thorpe and P. C. van Oorschot, “Graphical dictionaries and the memorable space of graphical passwords,” in Proc. USENIX Security, San Diego, CA, Aug. 9–13, 2004, p. 10.
Authors:
Rahul Vivek Purohit, Syed .A. Imam
Paper Title:
Learning Role of Facial Marks in Automatic Face Recognition for Forensic Science Applications
Abstract: In forensic science applications, when an image is partially damaged or occluded, some ancillary information like facial marks and gender can be used to enhance the face recognition accuracy. This information coupled with traditional face matcher provides more descriptive evidence and at the same time may speed up the recognition process. This paper proposes a method to utilize facial marks for improving face image matching. Keywords: soft biometric, facial marks, global features, face vacs References: 114.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
N. A. Spaun, “Forensic biometrics from images and video at the Federal Bureau of Investigation,” in Proc. BTAS, 2007, pp. 1–3. Medical Gross Anatomy/Head and Neck/ University of Michigan [Online]. Available: http://anatomy.med.umich.edu/surface H. Tuthill and G. George, Individualization: Principles and Procedures in Criminalistics. Florida: Lightning Powder Company, Inc., 2002. N. A. Spaun, “Facial comparisons by subject matter experts: Their role in biometrics and their training,” in Proc. ICB, 2009, pp. 161–168. L. Wiskott, J.M. Fellous, N. Kruger, and C. von der Malsburg, “Face recognition by elastic bunch graph matching,” IEEE Trans. PatternAnal Mach. Intell., vol. 19, no. 7, pp. 775–779, Jul. 1997. P. S. Penev and J. J. Atick, “Local feature analysis: A general statistical theory for object representation,” Comput. Neural Syst., vol. 7, pp 477–500, 1996 P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. fisherfaces: Recognition using class specific linear projection,” IEEE Trans Pattern Ana Mach Intell., vol. 19, no. 7, pp. 711–720, Jul. 1997. X. He, S. Yan, Y. Hu, P. Niyogi, and H.J. Zhang, “Face recognition using laplacianfaces,” IEEE Trans. Pattern Anal Mach. Intell., vol. 27,no. 3, pp. 328–340, Mar. 2005. F. Wang, J. Wang, C. Zhang, and J. T. Kwok, “Face recognition using spectral features,” Pattern Recognit., vol. 40, no. 10, pp. 2786–2797,2007. A. K. Jain and U. Park, “Facial marks: Soft biometric for face recognition,” in Proc. IEEE ICIP, 2009, pp. 1–4. L. G. Farkas and I. R. Munro, Anthropometric Facial Proportions in Medicine New York: Thomas Publishing, 1987. P. Ekman, W. Friesen, and J. Hager, The Facial Action Coding System, 2nd ed. London: Weidenfeld & Nicolson, 2002. J.-E. Lee, A. K. Jain, and R. Jin, “Scars, marks and tattoos (SMT): Soft biometric for suspect and victim identification,” in Proc. Biometric Symposium, Biometric Consortium Conf., 2008, pp. 1–8.
542-544
14. N. Kumar, A. C. Berg, P. N. Belhumeur, and S. K. Nayar, “Attribute and simile classifiers for face verification,” in IEEE Int. Conf. Computer Vision (ICCV), 2009, pp. 1–8. 15. S. Pamudurthy, E. Guan, K. Mueller, and M. Rafailovich, “Dynamic approach for face recognition using digital image skin correlation,” in Proc. Audio- and Video-based Biometric Person Authentication (AVBPA), 2005, pp. 1010–1017 16. J. Phillips, H. Wechsler, J. S. Huang, and P. J. Rauss, “The feret database and evaluation procedure for face recognition algorithms,” Image vision Computer vol. 16, no. 5, pp. 295–306, 1998. 17. T. Lindberg, “Feature detection with automatic scale selection,” Int. J. Comput. Vision (IJCV), vol. 30, no. 2, pp. 79–116, 1998 18. FaceVACS Software Developer Kit Cognitec Systems GmbH [Online] Available: http://www.cognitec-systems.de
Authors:
Amruta S. Moon, Rajiv Srivastava Yogdhar Pandey
Paper Title:
Impact of Kernel Fisher Analysis Method on Face Recognition
Abstract: Human Face recognition is a challenging task in computer vision and pattern recognition. Face recognition is difficult because it is a real world problem. The Human Face is complex, natural object that tends not to have easily identified edges and features. Because of this, it is difficult to develop a mathematical model of that face that can be used as prior knowledge when analyzing a particular image.This paper deals with the correspondence presents Color and Frequency Features based face recognition. The CFF method, which applies an Enhanced Fisher Model (EFM), extracts the complementary frequency features in a new hybrid color space for improving face recognition performance. The new color space, the RIQ color space, which combines the component image of the RGB color space and the chromatic components and of the YIQ color space, displays prominent capability for improving face recognition performance due to the complementary characteristics of its component images. The EFM then extracts the complementary features from the real part, the imaginary part, and the magnitude of the image in the frequency domain. The complementary features are then fused by means of concatenation at the feature level to derive similarity scores for classification. The complementary feature extraction and feature level fusion procedure applies to the I and Q component images as well. The hybrid color space improves face recognition performance significantly, and the complementary color and frequency features further improve face recognition performance. In CFF method particular, the Indian database had used for experimental analysis. There are many problems with face recognition such as facial expression, pose, age and occlusion. The Training set contains 200 images that are either controlled or uncontrolled. The Target set has 400 controlled images and the Query set has 100 uncontrolled images. While the faces in the controlled images have good image resolution, the faces in the uncontrolled images have lower image resolution and . These uncontrolled factors pose grand challenges to the face recognition performance. The face images used in our experiments are normalized to 64×64 to extract the facial region, which contains only face and the performance of face recognition is thus not affected by the factors not related to face, such as hair styles. These experimental results show that the combination of the hybrid color and frequency features by the CFF method is able to further improve face recognition performance. In particular the CFF method achieves the face verification rate (corresponding to the TestSet3) of 80.3% at the false accept rate of 0.1%. Future research will be considerd applying kernel methods, such as the multiclass Kernel Fisher Analysis (KFA) method to replace the EFM method for improving face recognition performance. And Note that the KFA method achieves, at 0.1% false accept rate, 84% face verification rate (FVR) respectively. Experimental result shows that the proposed method is efficient and improves the face recognition performance by large margin 115.
Keywords: KFA(Kernel Fisher Analysis),CFF(Color and Frequency Features based face recognition),EFM, RIQ. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20.
Zhiming Lie and Chengjun Liu “A Hybrid Color and Frequency Features Method For Face Recognition,” IEEE Trans. on Image Processing.vol no.10, Oct 2008” P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, “Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection,” IEEE Trans Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 711–720, Jul.1997. J. R. Beveridge, D. Bolme, B. A. Draper, and M. Teixeira, “The csu face identification evaluation system: Its purpose, features, and structure,” Mach Vis. Appl., vol. 16, no. 2, pp. 128–138, 2005. R. C. Gonzalez and R. E. Woods, Digital Image Processing, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 2002. W. Hwang, G. Park, J. Lee, and S. C. Kee, “Multiple face model of hybrid fourier Feature for large face image set,” IEEE Conf. Computer Vision And Pattern Recognition (CVPR), 2006. A. K. Jain, K. Nandakumar, and A. Ross, “Score normalization in multimodel Biometric systems,” Pattern Recognition., vol. 38, pp. 2270–2285, 2005. V. Kumar, M. Savvides, and C. Xian, “Correlation pattern recognition for face recognition,” Proc. IEEE, vol. 94, no. 11, pp. 1963–1976, Nov. 2006. C. Liu, “Capitalize on dimensionality increasing techniques for improving face recognition grand challenge performance,” IEEE Trans. Pattern Anal. Mach Intell., vol. 28, no. 5, pp. 725–737, May 2006. C. Liu, “The Bayes decision rule induced similarity measures,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 6, pp. 1086–1090, Jun.2007. C. Liu and H. Wechsler, “Robust coding schemes for indexing and retrieval from Large face databases,” IEEE Trans. Image Process., vol. 9, no. 1, pp. 132–137, Jan. 2000. A. J. OToole, H. Abdi, F. Jiang, and P. J. Phillips, “Fusing face recognition Algorithms and humans,” IEEE Trans. Syst., Man, Cybern., vol.37, no. 5, pp. 1149– 1155, May 2007. J. OToole, P. J. Phillips, F. Jiang, J. Ayyad, N. Penard, and H. Abdi, “Face recognition algorithms surpass humans matching faces across changes in illumination,” IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no. 9, pp. 1642–1646, Sep. 2007. P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques,J. Min, and W. Worek, “Overview of the face recognition grand challenge,” presented at the IEEE Conf. Computer Vision and Pattern Recognition, 2005. P. Shih and C. Liu, “Comparative assessment of content-based face image retrieval in different color spaces,” Int. J. Pattern Recognit. Artif. Intell., vol. 19, no. 7, pp. 873–893, 2005. X. Tan and B. Triggs, “Enhanced local texture feature sets for face recognition under difficult lighting conditions,” IEEE Int. Workshop on Analysis and Modeling of Faces and Gestures, Oct. 2007. M. Turk and A. Pentland, “Eigenfaces for recognition,” J. Cogn. Neurosci. vol. 13, no. 1, pp. 71–86, 1991. A. K. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition," IEEE Trans. on CSVT, Special Issue on Image- and VideoBased Biometrics, August, 2003. L. Wiskott, J.-M. Fellous, N. Krueuger, C. von der Malsburg, Face Recognition by Elastic Bunch Graph Matching. P. J. Phillips, H. Moon, S. A. Rizvi, and P. J. Rauss, "The Feret Evaluation Methodology for Face-Recognition Algorithms", IEEE Trans. on PAMI, Vol. 22, No.10,Oct. 2000. Kevin W. Bowyer, Patric Flynn, A Survey Of approaches and challenges in 3 D and multi-modal 3D + 2D face recognition. Elsevier Publication
545-551
Y.N. Vapnik, The Nature of Statistical Learning Theory, second ed. Springer- Verlag, 1999. 21. J.G. Daugman, “Two-Dimensional Spectral Analysis of Cortical Receptive Field Profiles,” Vision Research, vol. 20, pp. 847-856, 1980. 22. J.G. Daugman, “Uncertainty Relation for Resolution in Space, Spatial Frequency, and Orientation Optimized by Two-Dimensional Cortical Filters,” J. Optical Soc. Am., vol. 2, no. 7, pp. 1160- 1169, 1985. 23. J. Daugman, “Face and Gesture Recognition: Overview,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 675-676, July 1997. 24. G. Donato, M.S. Bartlett, J.C. Hager, P. Ekman, and T.J. Sejnowski, “Classifying Facial Actions,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 21, no.10, pp. 974-989, Oct. 1999. 25. P.J. Phillips, P. Grother, R.J. Micheals, D.M. Blackburn, E. Tabassi, and J.M. Bone,“FRVT 2002: Evaluation Report,” technical report, http://www.frvt.org/, Mar. 2003. 26. K. Fukunaga, Introduction to Statistical Pattern Recognition, 2nd Ed. New York Academic, 1990 27. R.C. Gonzalez and R.E. Woods, Digital Image Processing. Prentice Hall, 2001. 28. http://krishnauniversity.academia.edu/ SATISHCHANDRAPULIPAKA/ Papers/533939/Face_recognition_A_literature_survey
Authors:
Ranjeet Srivastva, Aditya Raj, Tushar Patnaik, Bhupendra Kumar
Paper Title:
A Survey on Techniques of Separation of Machine Printed Text and Handwritten Text
Abstract: In many documents such as admission form, bank cheques, memorandums, letters and application forms machine printed and handwritten characters are mixed. Since the algorithms for recognition of machine-printed texts and handwritten texts are different, it is necessary to distinguish between these two types of texts before giving it to respective OCR systems to process it. This separation will definitely increase the performance and overall system quality. The paper discusses some observations about characteristics of these two types of texts and various techniques of separation of machine printed and handwritten text into three categories (Structural and statistical features, Gradient features and Geometric features) based on feature extraction method. Keywords: Feature Extraction, Handwritten Text, Machine Printed Text, OCR. References: 1.
116.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
Lincoln Faria da Silva, Aura Conci, Angel Sanchez, Automatic discrimination between printed and handwritten text in documents, IEEE, 15301834/2009. E. Kavallieratou, and S. Stamatatos, Discrimination of Machine-Printed from Handwritten Text Using Simple Structural Characteristics, Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, v. 1, 23 - 26 Aug., pp.437 - 440, 2004. K. Kuhnke, L. Simoncini, and Z. M. Kovacs-V, A System for Machine- Written and Hand-Written Character Distinction, Proceedings of the Third International Conference on Document Analysis and Recognition,v.2,14 - 16 Aug.,pp 811 - 814, 1995. U. Pal, and B. B. Chaudhuri, Automatic separation of machine-printed and hand written text lines, ICDAR ’99. Proceedings of the Fifth International Conference on Document Analysis and Recognition, pp. 645-648, 1999. S.Imade, S.Tatsuta and T.Wada, Segmentation and Classification for Mixed Text/Image Document Using Neural Network, In Proc. 2nd ICDAR, pp. 930-934, 1993. Seung Ick Jang, Seon Hwa Jeong and Yun-Seok Nam, Classification of Machine Printed and Handwritten Addresses on Korean Mail Piece Images Using Geometric Features, Proc. 17th International Conference on Pattern Recognition (ICPR’04) 1051-4651/04. J. Franke and M. Oberlander,Writing Style Detection by Statistical Combination of Classifiers in Form Reader Applications, Proceedings of 2nd ICDAR, 1993, pp. 581-584. Yefeng Zheng, Huiping Li, David Doermann, Machine Printed Text and Handwriting Identification in Noisy Document Images, IEEE Transactions on Pattern Analysis & machine intelligence, Vol. 26, No. 3, 0162-8828 march 2004. Ranju Mandal, Partha Pratim Roy, Umapada Pal, Signature Segmentation from Machine Printed Documents using Conditional Random Field, ICDAR.2011.236, IEEE, 1520-5363. Sean Violante, Robert Smith and Mike Reiss, A computationally efficient technique for discriminating between handwritten and printed text, IEE, 1995. Faisal Farooq, Karthik Sridharan, Venu Govindraju, Identifying handwritten text in mixed document, IEEE, 0-7695-2521-0/2006. Jinhong K.Guo,Matthew y.ma, Separating handwritten material from machine printed text using hidden markov models, IEEE, 0-7695-1263-1/2001.
Authors:
Yashima Ahuja, Sumit Kumar Yadav
Paper Title:
Statistical Approach to Support Vector Machine
552-555
Abstract: This paper provides you a brief description about support vector machine. In this, we have explained other universal approximators rather than layered feed-forward network and radial-basis function networks. Here, we have also explained mathematical concepts of support vector machine. Keywords: Dual Problem, Linearly Separable, Non-linear Separable, Primal Problem, Support Vector Machine References: 117.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
118.
Simon Haykin, “Neural Networks- A Comprehensive Foundation”, Published by Pearson, Second Edition. Jiawei Han, Micheline Kamber and Jian Pei, “Data Mining- Concepts and Techniques” Published by Elsevier, Third Edition. Ingo Steinwart and Andreas Christmann, “Support Vector Machines”, Published by Springer 2008. Yashima Ahuja, Sumit Kumar Yadav, “Multiclass Classification and Support Vector Machine, Published in Global Journals of Computer Science and Engineering (GJCST) December 2012, Volume 12, Issue 11, Version 1.0, pp 15-19. Kristin P. Bennett, Colin Campbell, “Support Vector Machine: Hype or Hallelujah?” Published in SIGKDD Explor December 2000, Volume 2 and Issue 2, pp 1-13. Andre Guggenberger, “Another Introduction to Support Vector Machine”, Unpublished. Cunhe Li, Kangwei Liu, Hongxia Wang, “The incremental learning algorithm with support vector machine based on hyper plane-distance”, Published by Springer April 2009, pp 19-27. Leon Bottou, Chih-Jen Lin, “Support Vector Machine Solvers”, Unpublished. Chih-Wei Hsu, Chih-Chung Chang and Chih-Jen Lin, “A Practical Guide to Support Vector Classification” pp 1-12. Tristan Fletcher, “Support Vector Machines Explained” Unpublished pp 1-19. Support Vector Machine, Available on http://homepages.cae.wisc.edu/~ece539/spring00/notes/wordfile/svm.doc Support Vector Machine, http://www.mathworks.in/help/bioinfo/ug/support-vector-machines-svm.html#bs3tbev-11
Authors:
R.Balamurugan, S.Muruganand
556-559
Paper Title:
Digital Image Processing Technique in Laser Speckle Pattern Interferometer for Phase Evaluation
Abstract: In this paper, Electronic laser speckle pattern technique has been adopted to measure small deformation/displacement of a specimen. A low cost Laser Speckle Interferometer has been designed with minor modification of Michelson Interferometer. Laser speckle images are recorded before the deformation (reference image) and then after deformation. By simple subtraction of the digital speckle images, a fringe pattern obtained using image processing technique. It gives information about the displacement by means of its phase evaluation. Keywords: Laser speckle, image Subtraction, displacement/deformation. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
Svanbro A, Huntley J M, Davila A, “Optimal referencing rating for in plane dynamic speckle interferometry,”Appl Opt, 42, (2003), pp.251-258 Archbold, E., M. Burch and A. E. Ennos “Recording of in- plane surface displacement by double exposure speckle photography”, Opt. Acta, 17, (1970), pp.883-889. Leendertz, J.A.“Interferometric displacement measurement”on scattering surface utilizing speckle effect, J.Phys.E, 3, (1970), pp. 214-218. Leendertz, J. A. and J. N. Butters “An image shearing speckle pattern interferometer for measuring bending moments”, J. Phys. E, 6,(1973),pp.107-1110. Lekberg O J and Slettemoen G A, Applied optics engineering, Academic, press, Eds: Shannon and Wyant (1987). Meinlschmidt P, Hinsch K D and Sirohi R S, Selected papers on Electronic Speckle Pattern Interferometry, Principles Practice, SPIE Milestone Series MS 132, Bellingham, Washington (1996). M.Sjödahl, “Electronic speckle photography: increased accuracy by nonintegral pixel shifting”, Applied Optics 33, (1994), pp. 6667-6673. Maurizio Vannonia and Giuseppe Molesini “Speckle interferometry experiments with a digital photocamera” Am. J. Phys. 72 (7), July 2004. Vest C M, Holographic Interferometry, John Wiley, NewYork, (1979). A.R. Ganesan “Holographic and Laser Speckle Methods in Non-Destructive Testing” Proceedings of the National Seminar&Exhibition on NDE 2009, December 10-12, 2009. Dainty JC, Laser speckle and related phenomenon, Berlin: Springer; 1984. Rastogi PK. Speckle shearing photography: A tool for direct measurement of surfacestrains.Appl.Op Vol.37 :( 1998), pp.1292–98. Joenathan.C.Speckle photography, shearography and ESPI, Optical measurement techniques and applications, vol. 6. Boston: Artech House, Inc. Chapter 6. (1997), Pp. 151–82. Sihori RS, Speckle metrology, New York: Marcel Dekker, 1993.
Authors:
Pawan S. Amrutkar, Sangram R. Patil
Paper Title:
Automotive Radiator Performance – Review
560-562
Abstract: Automotive engine cooling system takes care of excess heat produced during engine operation. It regulates engine surface temperature for engine optimum efficiency. Recent advancement in engine for power forced engine cooling system to develop new strategies to improve its performance efficiency. Also to reduce fuel consumption along with controlling engine emission to mitigate environmental pollution norms. This paper throws light on parameters which influence radiator performance along with reviews some of the conventional and modern approaches to enhance radiator performance. Keywords: Automotive engine cooling system, Performance, Radiator References: 119.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10.
C. Oliet, A. Oliva, J. Castro, C.D. Pe´rez-Segarra, “Parametric studies on automotive radiators”, Applied Thermal Engineering, 27, 2007 JP Yadav and Bharat Raj Singh, “Study on Performance Evaluation of Automotive Radiator”, S-JPSET : ISSN : 2229-7111, Vol. 2, Issue 2, 2011 Mazen Al-Amayreh, “Experimental Study of Thermal Conductivity of Ethylene Glycol Water Mixtures”, European Journal of Scientific Research, ISSN 1450-216X Vol.44 No.2, 2011 P. K. Trivedi, N. B. Vasava, “Effect of Variation in Pitch of Tube on Heat Transfer Rate in Automobile Radiator by CFD Analysis”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-6, 2012 Pitambar Gadhave, Shambhu Kumar, “Enhancement of forced Convection Heat Transfer over Dimple Surface – Review”, International Multidisciplinary e – Journal, 2012 P. Gunnasegaran, N. H. Shuaib, and M. F. Abdul Jalal. “The Effect of Geometrical Parameters on Heat Transfer Characteristics of Compact Heat Exchanger with Louvered Fins”, ISRN Thermodynamics, Volume 2012 Prof. D. K. Chavan, Prof. Dr. G. S. Tasgaonkar, “Thermal Optimization of Fan assisted Heat Exchanger (Radiator) by Design Improvements”, International Journal of Modern Engineering Research (IJMER), Vol.1, Issue 1, 2011 K.Y. Leong, R. Saidur, S.N. Kazi, A.H. Mamun, “Performance investigation of an automotive car radiator operated with nanofluid- based coolants (nanofluid as a coolant in a radiator)”, Applied Thermal Engineering , 30, 2010 John Vetrovec, “Engine Cooling System with a Heat Load Averaging Capability”, SAE International, 2008 M.H. Salah, P.M.Frick, J.R.Wagner, D.M.Dawson, “Hydraulic actuated automotive cooling systems—Nonlinear control and test”, Control Engineering Practice, 17, 2009.
Authors:
120.
563-565
Aditya Raj, Ranjeet Srivastava, Tushar Patnaik, Bhupendra Kumar A Survey of Feature Extraction and Classification Techniques Used In Character Recognition for Indian Paper Title: Scripts Abstract: The Constitution of India has recognized 22 languages as official languages of India. Among these most of the recognition research work has been done for Devanagari, Gurumukhi, Telugu, and Bangla scripts etc. OCR system development for Indian script has many application areas like preserving manuscripts and ancient literatures written in different Indian scripts and making digital libraries for the documents. Feature extraction and classification are essential steps of character recognition process affecting the overall accuracy of the recognition system. This paper gives a detailed overview of different feature extraction and classification techniques for recognition process of different Indian scripts by 566-568 the researchers over the past few decades Keywords: Optical Character Recognition (OCR), Feature Extraction, Classification. References: 1.
Veena Bansla and R M K Sinha, “A Complete OCR for printed Hindi Text in Devanagari Script”, IEEE 800 - 804 2001 .
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.
Sinha. M. K., Mahabala., “Machine Recognition of Devnagari Script”, IEEE T. SYST. MAN Cyb., vol.. 9,pp.435-449,1979. Pritpal Singh and Sumit Budhiraja, “Feature Extraction and Classification Techniques in O.C.R. Systems for Handwritten Gurmukhi Script”. International Journal of Engineering Research and Applications (IJERA), Vol.1, ISSUE 4,pp.1736-1739. Gita Sinha Rajneesh Rani Renu Dhir , “Handwritten Gurmukhi Numeral Recognition using Zone-based Hybrid Feature Extraction Techniques”, International Journal of Computer Applications(0975-8887), Volume 47- No. 21 June 2012. Jalal Uddin Mahtnud, Mohammed Feroz Raihan and Chowdhury Mofizur Rahman, “A Complete OCR System for Continuous Bengali Characters”,IEEE 1372 - 1376 Vol. Oct. 2003 . B. B. Chaudhuri and U. Pal, “An OCR System to Read Two Indian Language Scripts: Bangla and Devnagari (Hindi)”, IEEE 1011 - 1015 vol.2, Aug 1997. Atul Negi, Chakravarthy Bhagvati, B. Krishna, “An OCR system for Telugu”, IEEE 1110 – 1114 -2001. Vasantha Lakshmi, C. Patvardhan, C. , “A high accuracy OCR system for printed Telugu text”, IEEE 725 - 729 Vol.2 , Oct-2003. R Sanjeev Kunte, R D Sudhaker Samuel, “An OCR System for Printed Kannada Text Using Two - Stage Multi-network Classification Approach Employing Wavelet Features”, IEEE 349 – 353,Dec-2007. Sagar, B.M. , Shobha, G. , Kumar, P.R. , “Complete Kannada Optical Character Recognition with syntactical analysis of the script”, IEEE 1 – 4 , Dec. 2008. Chaudhuri, B.B, Pal, U. , Mitra, M. , “Automatic recognition of printed Oriya script”, IEEE 795 – 799, 2001. Tariq, J, Nauman, U, Naru, M.U , “Softconverter: A novel approach to construct OCR for printed Urdu isolated characters”, IEEE V3-495 - V3498 ,April 2010. Sardar, S, Wahab, A, “Optical character recognition system for Urdu”,IEEE 1 - 5 , June 2010. Reena Bajaj, Lipika Dey and Santanu Chaudhury, “Devnagari numeral recognition by combining decision of multiple connectionist classifiers”, Vol. 27, Part 1, February 2002, pp. 59–72. Sandhya Arora , “A Two Stage Classification Approach for Handwritten Devanagari Characters”, IEEE 399 - 403 vol 2. G. S. Lehal and Chandan Singh, “Feature Extraction and Classification for OCR of Gurmukhi Script”. Dharamveer Sharma, Puneet Jhajj, “Recognition of Isolated Handwritten Charactersin Gurmukhi S Volume 4– No.8, August 2010cript”, International Journal of Computer Applications (0975 – 8887), U. Bhattacharya1, M. Shridhar, and S.K. Parui1, “On Recognition of Handwritten Bangla Characters”. Arun K Pujari, C Dhanunjay Naidu, “An Adaptive Character Recognizer for Telugu Scripts using Multiresolution Analysis and Associative Memory”, T V Ashwin and P S Sastry, “A font and size-independent OCR system for printed Kannada documents using support vector machines”, Vol. 27, Part 1, February 2002, pp. 35–58. G. Tauschek, “Reading machine,” U.S. Patent 2 026 329, Dec. 1935. P. W. Handel, “Statistical machine,” US. Patent 1915 993, June 1933
Authors:
Alok Kumar, Madhuri Yadav, Tushar Patnaik, Bhupendra Kumar
Paper Title:
A Survey on Touching Character Segmentation
Abstract: Character segmentation is an important step of Optical Character Recognition (OCR) system. The segmentation of touching symbols is one of the key factors which affect the performance of recognition system. Therefore, to make OCR systems more effective and accurate, segmentation of touching characters is an important task. This paper explains the concepts of touching characters and presents the survey of various approaches for touching character segmentation. Keywords: Optical Character Recognition systems, Recognition rate, Segmentation, Touching Characters. References: 121.
1. 2.
3. 4.
5. 6. 7. 8. 9.
122.
G. Congedo, G. Dimauro, S. Impedovo, G. Pirlo, “Segmentation of Numeric Strings”, 1995, IEEE, p.p- 1038-1041 Utpal Garain and B. B. Chaudhuri , “Segmentation of Touching Symbols for OCR of Printed Mathematical Expressions: An Approach based on Multifactorial Analysis”, Proceedings of the 2005 Eight International Conference on Document Analysis and Recognition (ICDAR’05), ,IEEE , 2005. Dong-Yu Zhang, Xue-Dong Tian, and Xin-Fu Li “An Improved Method for Segmentation of Touching Symbols in Printed Mathematical Expressions”. 2nd International Conference on Advanced Computer Control (ICACC), vol.2, pp. 251 - 253, 2010 U.K.S. Jayarathna G.E.M.D.C. Bandara, “A Junction Based Segmentation Algorithm for Offline Handwritten Connected Character Segmentation”, International Conference on Computational Intelligence for Modelling Control and Automation,and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC'06),IEEE, 2006. K. B. M. R. Batuwita, G.E.M.D.C. Bandara, “An online Adaptable fuzzy system for offline handwritten Character recognition”, Proceedings of 11th World Congress of International Fuzzy Systems Association (IFSA 2005), Beijing ,China, Springer-Tsinghua, 2005, Vol. II, p.1185-1190. Salman Amin Khan “Character Segmentation Heuristics for Check Amount Verification” U. Garain and B.B. Chaudhuri. “Segmentation of Touching Characters in Printed Devnagari and Bangla Scripts Using Fuzzy Multifactorial Analysis.” IEEE Transaction on Systems, Man and Cybernetics,Vol. 32(4), 449-459, 2002. U. Pa1, A. Belai and C. Choisy, “Water Reservoir Based Approach for Touching Numeral Segmentation”.2001 George Nagy, Thomas A. Nartker, Stephen V. Rice, Optical Character Recognition: “An illustrated guide to the frontier”, Procs. Document Recognition and Retrieval VII, SPIE Vol. 3967, 58-69.
Authors:
Pallavi Hemant Dixit, Uttam L. Bombale
Paper Title:
Arm Implementation of LSB Algorithm of Steganography
Abstract: Network security and protection of data have been of great concern and a subject of research over the years There are many different forms of steganography mechanisms like LSB, Masking and filtering and Transform techniques. All of them have respective strong and weak points. The Least Significant Bit (LSB) embedding Technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB embedding technique and Presents the evaluation for various file Formats. In a network, the success of the algorithm depends on hiding technique used to store information into the image. This paper is based on the study of steganography with its LSB algorithm. Human biometrics like iris, fingerprint, and face are the unique things for human. That’s why we propose a unique authentication and encryption technique using IRIS biometric pattern of a person. Text message encrypted by cryptographic key which is generated by iris image. Then using LSB algorithm this encrypted text message hide into the iris image. LSB algorithm is implemented in ARM7 LPC2148. Keywords: iris image, steganography, LSB. References:
569-574
575-578
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.
Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf., Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004 Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal,February 1998 Owens, M., “A discussion of covert channels and steganography”, SANS Institute, 2002 Anderson, R.J. & Petitcolas, F.A.P., “On the limits of steganography”, IEEE Journal of selected Areas in Communications, May 1998 Krenn, R., “Steganography and Steganalysis”, http://www.krenn.nl/univ/cry/steg/article.pdf NXP & Security Innovation Encryption for ARM MCUs ppt, ‘UM10139 LPC214x User manual’ pdf. B. Gladman. A Speci cation for Rijndael, the AES Algorithm. Available at http://fp.gladman.plus.com, May 2002 G. Bertoni, L. Breveglieri, P. Fragneto, M. Macchetti and S.Marchesin, “Efficient Software Implementation of AES on 32-bit Platforms,” CHES 2002, LNCS 2523, pp. 159–171, 2003. Intel Strong ARM SA-1110 Microprocessor. Developer's Manual 278240-003, Intel Corporation, Jun 2000. Sim Hiew Moi, Nazeema Binti Abdul Rahim,Puteh Saad, Pang Li Sim, Zalmiyah Zakaria,Subariah Ibrahim,“Iris Biometric Cryptography for Identity Document”, 2009 International Conference of Soft Computing and Pattern Recognition. Sujay Narayana1and Gaurav Prasad” Two New Approaches For Secured Image Steganography Using Cryptographic Techniques And Type Conversions” Signal & Image Processing: An International Journal (SIPIJ) Vol.1, No.2, December 2010 Hassan Mathkour , Batool Al-Sadoon, Ameur Touir ” A New Image Steganography Technique” Mamta Juneja 1, Parvinder Singh Sandhu2 “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption” 2009 International Conference on Advances in Recent Technologies in Communication and Computing. V.V.Satyanrayanarayana Tallapragada , Dr. E.G.Rajan, “Multilevel Network Security Based on Iris Biometric” 2010 International Conference on Advances in Computer Engineering. http://www.casia.com/iresdatabase
Authors:
Asmita Joshi, J.S.Sodhi, Roopali Goel
Paper Title:
Contextual Advertising through Entity Extraction
Abstract: Contextual Advertising is a type of Web advertising Content match has greater potential for content providers, publishers and advertisers, because users spend most of their time on the Web on content pages. In past researches, Contextual targeting technology works by searching the website and looks up relevant keywords But Nowadays, In contextual advertising, matching is determined automatically by the page content, which complicates the task considerably. We Proposed a System which can target the large group of consumer on internet. In Our system we make contextual targeting more relevant with Extraction of relevant entities from the web page. We extract the entities from web page, which is of interest to the consumer. We target the interest of internet user and put up the ads according to their interest. The system is designed in such a way that it can extract entities (Name, Place, Title, Location, date etc) from web page and ad publisher put up a advertise on that page which include those entities which are extracted from page. This Process will extract different types of entities, which will identify by different patterns prepared by the rules based approach. The described system able to find out the entities in many context using pattern identification. Once pattern will match entities are extracted and used by ad publisher for publishing the ads according to the context of entities. The above described method is more relevant and effective and it will target more consumers and generate revenue by advertising. Keywords: (Name, Place, Title, Location, date etc) from web page and ad publisher put up a advertise on that page which include those entities which are extracted from page. References: 1. 2. 3.
123.
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24.
Zaiqing Nie, Ji-Rong Wen, and Wei-YingMa ”Statistical Extraction from Web Manuscript” ID 0094-SIP-2011-PIEEE.R1 Jasmeen Kaur, Vishal Gupta,”Effective Approaches For Extraction Of Keywords” ,IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 6, November 2010 Massimiliano Ciaramita, Vanessa Murdock, Vassilis Plachouras,”Semantic Associations For Contextual Advertising”, Journal of Electronic Commerce Research, VOL 9, NO 1, 2008 Andrei Broder, Marcus Fontoura, Vanja Josifovski ,Lance Riedel” A Semantic Approach to Contextual Advertising” ,SIGIR 2007 Proceedings David Nadeau,Peter D. Turneyand Stan Matwin,” Unsupervised Named- Recognition:Generating Gazetteers and Resolving Ambiguity” Stefan Dietze, Diana Maynard, Elena Demidova, Thomas Risse, Wim Peters, Katerina Doka, Yannis Stavrakas,” Extraction and Consolidation for Social Web Content Preservation” Paul Bennett, Introduction to Text Categorization 20-760: Web-Based Information Architectures July 23, 2002 2004. ACE. Annotation guidelines for entity detection and tracking. Agichtein, “Extracting relations from large text collections,” PhD thesis, Columbia University, 2005. E. Agichtein and V. Ganti, “Mining reference tables for automatic text segmentation,” in Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, USA,2004. E. Agichtein and L. Gravano, “Snowball: Extracting relations from large plaintext Collections,” in Proceedings of the 5th ACM International Conference on Digital Libraries, 2000. E. Agichtein and L. Gravano, “Querying text databases for efficient information extraction,” in ICDE, 2003. R. Agrawal, H. Mannila, R. Srikant, H. Toivonen, and A. I. Verkamo, “Fast discovery of association rules,” in Advances in Knowledge Discovery and Data Mining, (U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, eds.), ch. 12, pp. 307–328, AAAI/MIT Press, 1996. J. Aitken, “Learning information extraction rules: An inductive logic programming approach,” in Proceedings of the 15th European Conference on Artificial Intelligence, pp. 355–359, 2002. R. Ananthakrishna, S. chaudhuri, and V. Ganti, “Eliminating fuzzy duplicates in data warehouses,” in International Conference on Very Large Databases (VLDB), 2002. R. Ando and T. Zhang, “A framework for learning predictive structures from multiple tasks and unlabeled data,” Journal of Machine Learning Research, vol. 6, pp. 1817–1853, 2005. D. E. Appelt, J. R. Hobbs, J. Bear, D. J. Israel, and M. Tyson, “Fastus: A finite-state processor for information extraction from real-world text,” in IJCAI, pp. 1172–1178, 1993. A. Arasu, H. Garcia-Molina, and S. University, “Extracting structured data from web pages,” in SIGMOD ’03: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 337–348, 2003. S. Argamon-Engelson and I. Dagan,“Committee-based sample selection for probabilistic classifiers,” Journal of Artificial Intelligence Research, vol. 11, pp. 335–360, 1999. M.-F. Balcan, A. Beygelzimer, and J. Langford, “Agnostic active learning,”in ICML, pp. 65–72, 2006. Sunita sarawagi “information Extractiuon” Vol. 1, No. 3 (2007) 261–377 N. Bansal, A. Blum, and S. Chawla, “Correlation clustering,” in FOCS ’02: Proceedings of the 43rd Symposium on Foundations of Computer Science, USA, Washington, DC: IEEE Computer Society, 2002. G. Barish, Y.-S. Chen, D. DiPasquo, C. A. Knoblock, S. Minton, I. Muslea, and C. Shahabi, “Theaterloc: Using information integration technology to rapidly build virtual applications,” in International Conference on Data Engineering (ICDE), pp. 681–682, 2000.
579-582
25. R. Baumgartner, S. Flesca, and G. Gottlob, “Visual web information extraction with lixto,” in VLDB ’01: Proceedings of the 27th International Conference on Very Large Data Bases, pp. 119–128, USA, San Francisco, CA: Morgan Kaufmann Publishers Inc, 2001.
124.
Authors:
N.G.Shankarwar, V.A.Deodhar-Kulkarni
Paper Title:
Load Flow Study of six bus System by Digital Computer
Abstract: Power flow analysis is the backbone of power system analysis and design. They are necessary for planning, operation, economic scheduling and exchange of power between utilities. The principal information of power flow analysis is to find the magnitude and phase angle of voltage at each bus and the real and reactive power flowing in each transmission lines. Power flow analysis is an importance tool involving numerical analysis applied to a power system. In this analysis, iterative techniques are used. This process is difficult and takes a lot of times to perform by manually. The objective of this project is to develop a tool for power flow analysis that will help for analysis become easier. The economic load dispatch plays an important role in the operation of power system, and different techniques have been used to solve these problems.
583-587
Keywords: This process is difficult and takes a lot of times to perform by manually. References: I.G. Nagrath and D.P. Kothari, “Modern Power System Analysis”, book, Second Edition 1995, Tata McGraw Hill Publishing, Company Ltd, New Delhi, pp. 163-200. R.N. Dhar, “Computer Aided Power System Operation and Analysis”, book, Third Edition 1987, Tata McGraw Hill, Publication, New Delhi, pp6887. Stagg and EI Abiad, “Computer Methods in Power System Analysis”, book, McGraw Hill International Students Edition,1995, pp.258-262
1. 2. 3.
Authors:
T. Ratna Reddy, M.V.S. Murali Krishna, Ch. Kesava Reddy, P.V.K.Murthy
Paper Title:
Comparative Performance of Ceramic Coated Diesel Engine with Mohr Oil in Crude and Biodiesel Form
Abstract: Investigations were carried out to evaluate the performance of a low grade low heat rejection (LHR) diesel engine with ceramic coated cylinder head with 3-mm air gap with different operating conditions [normal temperature and pre-heated temperature] of crude mohr oil (CMO) and mohr oil based biodiesel (MOBD) with varied injection pressure and injection timing. Performance parameters of brake thermal efficiency, exhaust gas temperature, volumetric efficiency and sound intensity were determined at various values of brake mean effective pressure (BMEP).Exhaust emissions of smoke and oxides of nitrogen (NOx) were recorded at the various values of BMEP. Combustion characteristics at peak load operation of the engine were measured with TDC (top dead centre) encoder, pressure transducer, console and special pressure-crank angle software package. Conventional engine (CE) showed compatible performance, while LHR engine showed marginally increased performance with vegetable oils (CMO & MOBD) operation at recommended injection timing and pressure. The performance of both version of the engine improved with advanced injection timing and at higher injection pressure when compared with CE with pure diesel operation. Keywords: Crude Mohr oil, Bio-diesel, CE, LHR engine, Fuel Performance, Exhaust Emissions, Combustion Characteristics. References: 1. 2. 3.
125.
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
15. 16. 17.
M.Canaker, A.N Ozsezen and A.Turkcan, “Combustion analysis of preheated crude \sunflower oil in an IDI diesel engine”, Biomass Bio-energy, 2009, vol.33, pp.760770. Mustafa Canakei., Ahmet Necati Ozsezen., Erol Areaklioglu and Ahmet Erdil. “Prediction of performance and exhaust emissions of a diesel engine fueled with biodiesel produced from waste frying oil”, Expert Systems with Applications, 2009, vol.36 (5), pp.9268-9280. B.K.Venkanna, and C.Venkatarama Reddy, “Performance, emission and combustion characteristics of DI diesel engine running on blends of honne oil/diesel fuel/kerosene”, International Journal of Agriculture and Biology Engineering, vol. 4(3), pp.1-10. R.D. Misra, M.S.Murthy, M.S, “Straight vegetable oils usage in a compression ignition engine—A review”, Renewable and Sustainable Energy Reviews, 2010,vol.14, pp.3005–3013. Hanbey Hazar and Huseyin Aydin, “Performance and emission evaluation of a CI ngine fueled with preheated raw rapeseed oil (RRO)-diesel blends”, Applied Energy, 2010, vol. 19(87), pp.786-790. M.V.S.Murali Krishna, “Performance evaluation of low heat rejection diesel engine with alternate fuels”, 2004, PhD Thesis, J. N. T. University, Hyderabad. Venkatramn., G.Devaradjane, “Experimental investigation of performance and ission characteristics of diesel-pungam oil, methyl esters diesel blends fueled DI engine at optimum engine operating parameters” International Journal of Green energy and env, 2010, vol. 1, pp.7-12. Rambabu Kantipudi, B.V.Appa Rao, B.V., N. Hari Babu. and Ch.Satyanarayana,, “Studies on DI diesel engine fueled with rice brawn methyl ester injection and ethanol carburetion”, International Journal of Applied Engineering Research, Dindigul, 2010, vol.1 (1), pp.61-67. B.Rasim,”Performance and emission study of waste anchovy fish biodiesel in a diesel engine”, Fuel Processing Technology, 2011, vol.92, pp.11871194. S.Jaichandar, and K.Annamalai, K, “The status of biodiesel as an alternative fuel for diesel engine- An Overview”, Journal of Sustainable Energy & Environment, 2011, vol.2, pp.71-75. Ridvan Arslan, ”Emission characteristics of a diesel engine using waste cooking oil as a bio-diesel fuel”, African Journal of Bio-Technology, 2011, vol.9, pp.3790-3794. A.Parlak, H.Yasar, and O.Eldogan O, ‘The effect of thermal barrier coating on a turbocharged Diesel engine performance and exergy potential of the exhaust gas”, Energy Conversion and Management, vol.46(3), pp.489–499. B.Ekrem, E.Tahsin and C.Muhammet, “Effects of thermal barrier coating on gas emissions and performance of a LHR engine with different injection timings and valve adjustments”, Journal of Energy Conversion and Management, 2006, vol.47, pp.1298-1310. M.Ciniviz, C.Hasimoglu, F.Sahin and M.S.Salman, “Impact of thermal barrier coating application on the performance and emissions of a turbocharged diesel engine”. Proceedings of the Institution of Mechanical Engineers Part D-Journal of Automobile Engineering, 2008, vol.222 (D12), pp.2447–2455. Ch.Kesava Reddy, M.V.S.Murali Krishna, P.V.K.Murthy, and T.Ratna Redd, “Performance evaluation of a low grade low heat rejection diesel engine with crude pongamia oil”, International Scholarly Research Network (ISRN) Renewable Energy, 2012, Article ID 489605, 1-10. A.J. Modi, D.C.Gosai, “Experimental study on thermal barrier coated diesel engine performance with blends of diesel and palm bio-diesel”, SAE International Journal of Fuels and Lubricants, 2010, vol.3 (2), pp.246-259. B.P. Rajendra Prasath, P.Tamilporai, F.Mohd.Shabir, “Analysis of combustion, performance and emission characteristics of low heat rejection engine using biodiesel”, International Journal of Thermal Sci, vol. 49, pp.2483-2490.
588-596
18. M.MohamedMusthafa, S.P.Sivapirakasam and M.Udayakumar, “Comparative studies on fly ash coated low heat rejection diesel engine on performance and emission characteristics fueled by rice bran and pongamia methyl ester and their blend with diesel”, Energy, 2011, vol.36(5), pp.2343-2351.
Authors:
S. Ramasamy and B. Sivaraman
Paper Title:
Heat Transfer Enhancement of Solar Still Using Phase Change Materials (PCMs)
Abstract: In the recent scenario, distillation process with solar still plays vital role for getting pottable water from brackish and sea water. In this paper, attempt has been made to enhance the productivity of the solar still with the help of LHTESS(Latent heat thermal energy storage sub-system). Latent heat storage in a phase change material PCMs is very attractive because of its high storage density with small temperature difference. For experimentation and comparison purpose, a Cascade Solar Still with and without LHTESS were designed and constructed for water purification with a view of enhancing productivity. Solar still of the present study mainly consists of stepped absorber plate integrated with phasechange energy storage sub-system or LHTESS and single slope glass plate. This setup will be placed at an angle of 25° to the horizontal. Paraffin wax is used as LHTESS due to its feasible general and economic properties [1]. The hourly productivity is slightly higher in case of solar still without LHTESS during sunny days. The disadvandages of phase change material is corrosion when in direct contact with metal pipings or housings [5]. Keywords: Distillation, Solar Still, LHTESS, Paraffin wax, salt hydrated phase change materials, PCMs. References: 126.
1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14.
127.
F.F. Tabrizi, Mohammad Dashtban, Hamid Moghaddam “Experimental investigation of a Weir – Type cascade solar still with built – in latent heat thermal energy storage”, Journal of Desalination (2010), doi: 10.1016/ j. desal 2010.03.033 Antony.J. Farell, Brain Norton, David M Kennedy “ Corrosive effects of salt hydrated phase change materials used with copper and aluminium “, Journal of Material Processing and Technology 175 (2006),198-205 F.F. Tabrizi, Mohammad Dashtban, Hamid Moghaddam, “Effect of water flow rate on internal heat and mass transfer and daily productivity of a weir- type cascade solar still”, Journal of Desalination (2010), doi: 10.1016/ j.desal 2010.03.033 A.A. El-Sebail, A.A. Al-Ghamdi, F.S. Al-Hazmi, Adel S. Faidah, “Thermal performance of a single basin solar still with PCM as s storage medium”, Journal of Applied Energy 86 (2009), 1187 -1195. Anant Shukla, D. Buddhi, R.L. Sawhney, “Thermal cycling of few selected inorganic & organic phase change materials, Journal of Renewable energy 33(2008), 2606 – 2614. Antony J Farell, Brain Norton, David M. Kannedy “Corrosive effects of selected phase change materials” Journal of Material Processing Technology 175 (2006) 198 – 205. Jinjia Wei, Yasuo Kawaguchi, Satoshi Hirano, Hiromi Takeuchi “Study on a PCM heat storage system for rapid heat supply” Journal of Applied Thermal Energy 25 (2005) 2903 – 2920. Atul Sharma, V.V Tyagai, C.R.Chen, D.Buddhi, “Review On Thermal Energy Storage With Phase Change Materials and Applications”, Renewable and Sustainable Energy Reviews 13 (2009) , 318-345 Mona M. Naim, et.al., “Non-Cnventional solar stills with energy storage element” Desalination, 153 (2002) 71-80 M.Faith Demirbas, “ Thermal energy storage and phase change material: An Overview” Taylor & Francis, Part B , 1:85-95,2006 David. R. Lide, CRC hand book, , G.N. Tiwari, “Solar Energy Storage” H.P. Garg, S.C. Mullick & A.K. Bhargava “Thermal Energy Storage” G. D. Rai “Solar Energy Utilization”
Authors:
Philip A. Adewuyi, Muniru O. Okelola, Adewale O. Jemilehin
Paper Title:
PIC Based Model of an Intelligent Gate Controller
597-600
Abstract: To have an idea is good but to have the idea replicated with a good model is better. This explains the decision to have sensitive places protected, using an intelligent gate controller system, from unwanted individuals or group of individuals that usually take advantages of loose security systems at the point of entry. The microcontroller used for this model is PIC16F84A programmed using “miKroBasic pro for pic”. This microcontroller serves as the main controller linking the software components with the hardware components. Features that serve as the input are the face of the driver as well as the plate number of the vehicle. These features are extracted using pattern recognition protocols and processed in Luxand SDK interface and character recognition is done using the OCR tool. In addition, voice control module is embedded in the design using Java programming language to make the process audible via a speech rendering element. This model is built using hardware components, such as; electronic switches in form of relays, the 12V step down transformer, a wooden cabinet, surveillance cameras, dc motor, a monitor, and a host of others. Keywords: DC motor, microcontroller, mikroBasic, OCR, Surveillance, voice recognition
601-605
References: 1. 2. 3. 4. 5. 6. 7. 8.
128.
O. Shoewu and O. T. Baruwa, “Design of a Microprocessor Based Automatic Gate”, Pacific Journal of Science and Technology, 7(1), 2006: 31 – 44. V. Onut, D. Aldridge, M. Mindel, and S. Perelgut, “Smart surveillance system applications”, CASCON ’10 Proceedings of the 2010 Conference of the Center for Advanced studies on Collaborative Research, 2010, pp. 430 – 432. I. Muthumani and C. R. Uma Kumari “Online Character Recognition of Handwritten Cursive Script”, International Journal of Computer Science, Vol. 9, 2012, Iss. 3, 352 - 354 Free dictionary [Online]. Available: http://www.thefreedictionary.com/automatic+face + recognition. Article retrieved on 15th January, 2013. “PIC16F84A Data Sheet” [Online]. Available: http://ww1.microchip.com/downloads/en/devicedoc/35007b.pdf Retrieved on 5th February, 2013. “PIC16F84A Application Notes” [Online]. Available: http://www.tech-tools.com/files/picapp.pdf. Retrieved on 5th February, 2013. A. J. Goldstein, L. D Harmon, and A.B. Lesk “Identification of Human Faces”, Proc. IEEE, May 1971, Vol. 59, No. 5, 748-760. M. A. Turk and A. P. Pentland Face Recognition Using Eigenfaces Proc. IEEE, 1991, 586-591.
Authors:
S. Naghibzadeh, M. A. Faghihi-Sani , S. Baghshahi
Paper Title:
Synthesis of Beige Pigment on the Basis of (Fe, Zn, Cr, Al) Spinel
Abstract: The beige pigment based on (Fe, Zn, Cr, Al) Spinel structures were successfully synthesized by solid reaction of oxides. At first a reference beige pigment CBD3002 from Qumisar company has been analysed by XRF, XRD, SEM and
606-609
LPSA. Then according to these results, various formulations have been prepared and calcined at different conditions. The obtained pigments have been analysed by XRD, SEM/EDS, LPSA and CIE-Lab. The prepared pigments as well as the reference pigments, have been added to the glaze. Then, after glaze firing, their colors have been measured in CIE-Lab system. The results showed that color quality of the optimized pigment (i.e. ZnO/Cr2O3=4.16, Fe2O3/Cr2O3=1.50 and Cal at 1200°C) prepared it in this work was better than the reference one. Adding more than 3Wt.% of the pigments in the glaze does not induce significant changes in color. The prepared pigment showed good thermal and chemical stability. Keywords: Beige, Synthesis, Spinel, Ceramic pigment References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
F. Bondioli, T. Manfredini, A.P.N. Oliveira, Ceram. Ind. 3 (4 – 6) (1998) 13. A. Burgyan, R.A. Eppler, Ceram. Bull. (1982) 1001. P.E. Lo´pez, J.P. Castello´ , E.C. Cordoncillo, Esmaltes y Pigmentos Ceramicos, Faeza Edictre Ibe´rica, Castello´n, 2001, pp. 189– 246. M. Kakihana, J. Sol-Gel Sci. Technol. 6 (1996) 7. M.P. Pechini, Method of Preparing Lead and Alkaline-Earth Titanates and Niobates and Coating Method Using the Same to Form a Capacitor-US PAT., 3.330.697, 1967. L.S. Ettre, Pigment surfaces, in: P.A. Lewis (Ed.), Pigment Handbook, Wiley-Interscience Publication, Ohio, 1987, pp. 139– 153. Handbook 128. Handbook of Chemistry and Physics, 47th ed., The Chemical Ruber, pp. 1966– 1967. E. Ozel, S. Turan, Production and characterisation of iron chromium pigments and their interactions with transparent glazes. J. Eur. Ceram. Soc. 23(2003), 2097-2104. Italian Ceramic Society, Colour, Pigments and Colouring in Ceramics. SALA, Modena, (2003), Chapters 1, 2 and 5. R. A. Eppler, D. R. Eppler, Glazes and glass coating. Amer Ceramic Society, (1998), Chapter 8. R. A. Candeia, M. A. F. Souza, M. I. B. Bernardi, S. C. Maestrelli, I. M. G. Santos, A. G. Souza, E. Longo, Monoferrite BaFe2O4 applied as ceramic pigment. Ceram. Int. 33(2007), 521-525. S. Dietrich, K. Akos, H. Jenny, Brown spinel pigments based on zinc chromite, method of their production and use. US Patent 5254162, (1993). R. J. D. Tilley, Colour and optical properties of materials. John Wiley & Sons, (2000). B.D. Cullity, Elements of X-ray diffraction, 2nd Edition, Addison-Wesley Publishing Company, Inc., Reading, MA, 1978. CIE, Recommendations of Uniform Color Spaces, Color Difference Equations, Phychometrics Color Terms. Supplement No. 2 of CIE Publ. no. 15 (E1-1.31) 1971, Bureau Central de la CIE, Paris, 1978.
Authors:
129.
B.Damodhara Reddy, S.Aruna Jyothy, I.V.Ramana Reddy Influence of Microsilica on the Properties of Ordinary Portland cement and Portland Slag Cement with and Paper Title: without Super plasticizers Abstract: The development of the construction industry in the global level needs more and more quantity of cement for sustainable growth. But, the production of each tonne of cement clinker releases one tonne of carbondioxide, which affects the earth’s ecosystem. The construction industry is now slowly becoming aware of the environmental issues and other sustainable development issues for cement and concrete industries. It is looking for the ways and means to develop building products, which will increase the life span and quality. In this regard the merits of using certain industrial by products such as fly ash, ground granulated blast furnace slag, microsilica, and rice husk ash have been well recognized by the construction industry. Therefore, it should be obvious that certain scale cement replacement with industrial by products is highly advantageous from the stand point of cost, economy, energy efficiency, durability and overall ecological and environmental benefits. In the present investigation an attempt is made to find various properties based on the experimental results, mathematical models were elaborated to predict the strength of mortar cubes with partial replacement of cement by Microsilica admixture with 5% , 10% and 15%of total powder content by weight both with and without the presence of Superplasticizer. Strength of cubes with Ordinary Portland Cement (OPC) and Portland Slag Cement (PSC), after 3,7,28 ,90 days and 365 days of curing and also durability tests after 60 days, were analysed to evaluate the effect of addition content, the time of curing and the compressive strength changes. The investigation revealed that use of one of such waste materials microsilica which is a waste material obtained from alloy industries can be used for partial replacement of cement, which leads to economy and in addition by utilizing the industrial wastes in the useful manner the environment pollution is also reduced to great extent and which leads to sustainable development.Test results indicate that the use of microsilica has improved the performance of cement in strength as well as in durability aspect. Keywords: (MS).
Compressive Strength, Durability, Ordinary Portland cement (OPC), Portland Slag cement (PSC), Microsilica
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
V.Ramasamy, S.Biswas, “Mechanical properties and durability of rice husk ash concrete”, International Journal of Applied Engineering Research, December 1, 2008, pp.206-212. M.G.Alexander, and B.J.Magee, “Durability Perfornance of Concrete Containing Condensed Silica Fume”, Cement Concrete Res., 29(6), 1999, pp.917-922. Bayasi, Zing, Zhou, Jing, “ Properties of Silica Fume Concrete and Mortor”,ACI Materials Journal 90 (4) ,1993, pp.349-356. DL.Venkatesh Babu , SC. Nateshan “Investigations on silica-Fume Concrete”, The Indian Concrete Journal, September 2004, pp.57-60. Faseyemi Victor Ajileye “Investigations on Micro silica (Silica Fume) as Partial Cement Replacement in concrete”, Global Journal of Researches in Engineering Civil and Structural Engineering, Volume 12 Issue 1 Version 1.0, January,2012, pp.17-23. R.Siddique and M. Iqbal Khan, “Supplementary Cementing Materials”, Engineering Materials, Springer-Verlag Berlin Heidelberg ,2011, pp.67-68. A. Tiwari, I. Momin, “Improving early age strength of PSC with indigenous silica fume”, The Indian Concrete Journal, October 2000, pp.595-98. P. Murthi, V. Siva Kumar “Studies on the Relationship between Compressive Strength and Splitting Tensile Strength of Ternary Blended Concrete”, Journal of The Institution of Engineers (India).Volume 89, February 18,2009. Nabil Bouzoubaa, Alain Bilodeau, Vasanthy Sivasundaram, Benoit Fournier and Dean M Golden. “Development of Ternary Blends for High Performance Concrete”,. ACI Material Journal, Vol 101, No.1, January-February 2004, pp 19-29. A.K. Mullick, “Performance of Concrete with Binary and Ternary Cement Blends”,The Indian Concrete Journal, January 2007, pp 15. E E Berry “Strength Development of Some Blended Cement Mortars”, Cement and Concrete Research, Vol 10, No 1, 1980, pp 1-11. M.Nehdi. “Ternary and Quaternary Cements for Sustainable Development”. Concrete International, Vol 23, No4, April 2004, pp 34 - 42. IS 8112:1989 Specifications for 43 grade ordinary Portland cement, Indian Standards Institution, New Delhi. IS 9103-1999 Concrete Admixtures-Specifications, Bureau of Indian Standards, New Delhi, India. IS 5514:1969 Apparatus used in Le-Chatelier test, Indian Standards, New Delhi, India.
610-616
16. IS 516:1959 Methods of test for Strength of Concrete, Indian Standards, New Delhi, India.
Authors:
Ashima Aggarwal, Gour Sundar Mitra Thakur
Paper Title:
Techniques of Performance Appraisal-A Review
Abstract: Performance appraisal system is used in the organizations to measure the effectiveness and efficiency of their employees. Performance Appraisal system is needed because every employee has a different attitude to handle the work. Performance Appraisal tends to improve the work performance, communication expectations, determining employee potential and aiding employee counseling. In this paper we present the review of some popular performance appraisal techniques along with their pros and cons. Ranking, Graphic Rating Scale, Critical Incident, Narrative Essays, Management By Objectives, Assessment Centers, BARS, 360 Degree and 720 Degree are some performance appraisal techniques. Keywords: Ranking, Graphic Rating Scale, Critical Incident, Narrative Essays, MBO, Assessment Centers, BARS, Human Resource Accounting, 360 degree appraisal,720 degree appraisal References: 1.
130.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17.
131.
Anupama and D. M.B.T. and Dulababu T., “The Need of ‘720 Degree Performance Appraisal in the New Economy Companies”,International Journal of Multidisciplinary Research,vol.1(4),2011. Blstakova I.J. ,“Employees’ Appraisal is an indicator of the quality of human resource management in organizations in slovakia”,MegaTrend Review:The International Review of Applied Economics,vol.7(2),2010. Bracken D.W. and Timmreck C.W. and Church A.H.,Handbook of Multisource Feedback,First Edition,Jossey Bass Inc,2001. Byham W.C.,The Assessment Center Method and Methodology:New Applications and Methodologies,Development Dimensions International,1986. Dessler and Gary ,Human Resource Management,Tenth Edition, Prentice Hall,2011. Elverfeldt A.V.,Performance Appraisal-how to improve its effectiveness,University of Twenty,Enschede,2005. Jafari M. & Bourouni A. & Amiri H. A.,A New Framework for selection of the best performance appraisal method,European Journal of Social Sciences,vol.7(3),2009. Johanson U. & Eklov G. & Holempren M. & Martensson M.,Human Resource Costing and Accounting versus the Balanced ScoreCard : A Literature Survey of Experience with the concepts,OECD,Paris,1998. Castillo J.C. ,The User Reported Critical Incident Method for Remote Usability Evaluation,1997. Kohli A.S. & Deb T., Performance Management, First Edition, Oxford University Press, 2008. Kondrasuk J.N. ,“ So what would an Ideal Performance Appraisal Look Like?” ,University of Portland ,Journal of Applied Business and Economics ,vol.12(1),2011 . Landy F.J. & Barness J.L.,Scaling Behavioral Anchors,West Publishing Co.,1978. Mondy & Wayne,Human Resource Management,Tenth Edition, Pearson Education,Prentice Hall,2008. Sapra N.,Current trends in performance appraisal,IJRIM,vol.2(2),2012. Sharma S. Z & Shukla R.K.,Application of Human Resource Accounting in Heavy Industries, ISSN,vol.1(2),2010. Weihrich H.,A new approach to MBO Updating a time honored technique,2000. Wu B.,The philosophy and practice of Management by Objectives, Troy State University,2005.
Authors:
Nitish Soman,Ulhas Shelke, Shahanawaj Patel
Paper Title:
Automated Examination Using QR Code
617-621
Abstract: QR codes are developed by a Japanese company has been around for over fifteen years. With the advent of smart and Web capable mobile devices, we witness a steady growth of interesting commercial applications using QR codes. It cannot be denied that documents in the form of hardcopy are still being used, especially important documents such as land titles, application forms, contracts and tickets. However there are reports of forgery cases over the years and as such, it is imperative to have a mechanism for integrity verification of hardcopy document. The research proposed the usage of twodimensional (2D) barcodes, which has the capability of storing data, to assist in reducing the action of hardcopy forgeries. We introduce an application for the automated examination using the QR code. In this, we make use of QR code to generate an question paper, the snap of the QR code is taken by every student and the required data is decoded and question paper is generated on the mobile phone. Students can give the answers by using their mobile phone itself. 622-627 Keywords: QR Code,MCQ,SCA,MCA) References: 1. 2. 3. 4.
Yeu Liu,Hu Yang,Ningjun Liu, recognition of QR code with mobile phones,2008 Chinese and Decision Conference ,university of jinan,jinan 250022,china. QR Code Security Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl SBA Research Favoritenstrasse 16 AT-1040 Vienna, Austria. The jaltcall journal issn 1832-4215 Vol. 5, No. 2 Pages 15–28 ©2009 jalt call sig “Utilizing the quick response (QR) code within a Japanese EFL environment” Law, C. & So, S. (2010). QR codes in education. Journal of Educational Technology Development and Exchange, 85-100.
Authors:
132.
B. Rama Rao, K. Srivani, D Sai Prasanna ICI Cancellation Schemes and Selection Criteria in Orthogonal Frequency Division Multiplexing System: A Paper Title: Review Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is considered as a digital multi carrier modulation technique. This technique will use a large number of closely spaced orthogonal subcarriers to avoid cross-talk. It provides high data rates with sufficient robustness to radio channel damages. A major problem in OFDM is carrier frequency offset error between the transmitted and received signals. Due to this the orthogonality of the subcarriers is no longer maintained which results in ICI (Inter carrier Interference). As a result the power leakage among the subcarriers which results in 628-631 reduction in the system performance. In this paper, different ICI cancellation techniques such as frequency domain equalization, time domain windowing, pulse shaping and ICI self-cancellation are studied and our main concentration is on the ICI self-cancellation scheme. Keywords:
Carrier frequency offset (CFO), crosstalk, Inerter Carrier Interference, frequency domain equalization, pulse
shaping, self-cancellation, multicarrier modulation. References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.
Alka Karla and Rajesh Kanna-A Survey of Intercarrier Interference Cancellation Schemes in OFDM System, The IUP Journal of Telecommunications, Vol. III, No. 1, 2011 J. Armstrong, ― Analysis of new and existing methods of reducing intercarrier interference due to carrier frequency offset in OFDM,‖ IEEE Trans. Commun., vol. 47, no. 3, pp. 365–369, Mar. 1999. P. H. Moose, A technique for orthogonal frequency division multiplexing frequency offset correction, IEEE Trans. Commun., vol. 42, no.10, pp. 2908–2914, 1994. H. Harada and R. Prasad, Simulation & Software Radio for Mobile Communications, Artech house Publisher, London, 2002. M V.N. Richard and R. Prasad, OFDM for Wireless Multimedia Communication, Artech house Publisher, London, 2000. Wikipedia the Free encyclopedia: http://www.wikipedia.org A. Peled and A. Ruiz, ― Frequency domain data transmission using reduced computational complexity algorithms‖, Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP '80, vol. 5, pp.964 –967, Apr. 1980 B. Hirosaki, ―An analysis of automatic equalizers for orthogonally multiplexed QAM systems,‖ IEEE Trans. Commun. , vol. COM-28, pp.73-83, Jan.1980. J. Ahn and H. S. Lee, ―Frequency domain equalization of OFDM signal over frequency nonselective Rayleigh fading channels,‖ Electron. Lett., vol. 29, no. 16, pp. 1476–1477, Aug. 1993. N.A. Dhahi., ―Optimum finite-length equalization for multicarrier transceivers, IEEE Trans. Commun., vol. 44, pp. 56–64, Jan. 1996. Y. Zhao and S. G. Häggman, ―Sensitivity to Doppler shift and carrier frequency errors in OFDM systems—The consequences and solutions,‖ in Proc. IEEE 46th Vehicular Technology Conf., Atlanta, GA, Apr. 28–May 1, 1996, pp. 1564–1568. C. Muschallik, Improving an OFDM reception using an adaptive Nyquist windowing, IEEE Trans. Consum. Electron., vol. 42, no. 3, pp. 259–269, 1996. Y.Zhaoand S.G. Haggman, ―Intercarrier interference self-cancellation scheme for OFDM mobile communication systems,‖ IEEE Trans. Commun., vol. 49, no. 7, pp.1185–1191, July 2001
Authors:
Ramanand Harijan, Padma Devi, Pawan Kumar
Paper Title:
Design of A Low Voltage Low Power CMOS Current Mirror with Enhanced Dynamic Range
Abstract: A novel cascode current mirror (CM), suitable for operation at low voltage levels is presented. The mirror has high input and high output voltage swings. The presented current mirror circuit combines the advantages of wide input swing, wide output swing and large output resistance capability which makes it attractive for low-voltage and low power application. Based on IBM 0.18um MOS model parameters, TSPICE simulation results show that the input current range of 1uA to 2mA with 882.83MHz bandwidth for the presented level shifted low voltage current mirror circuit. The power dissipation has improved by more than 40%. Keywords: Current mirror, Low voltage current mirror, level shifted Current mirror, Level shifted low voltage current mirror, Dynamic range. 133.
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
134.
S.S.Rajput, “Low Voltage Current Mode circuit structure and their application Ph.D. Thesis”, Indian Institute of Technology” , 2002. Behzad Razabi, “Design of analog CMOS integrated circuits”, Tata McGraw Hills, fourth edition New Delhi.”, 2002. S.S Rajput, “Advanced Current Mirror for Low Voltage Analog Designs”, IEEE, ICSE, Proc, vol. 148, pp. 258-263, 2004. S. Yan and E.Sanchez – Sinencio, “Low Voltage Analog Circuits Design Techniques : A Tutorial”, IEICE transaction on Analog Integrated Circuits Systems, vol E00A,no.2, pp. 1-17 , 2000. Ying-Chuan Liu, Hung-Yu Wang, Yuan-Long Jeang and Yu-Wei Huang, “A CMOS Current Mirror with Enhanced Input Dynamic Range”, 3rd International Conference on Innovative Computing Information and Control (ICICIC'08) , 2008. M.Ismail and T.Fiez, “Analog VLSI Signal and Information Processing”, New York: McGraw-Hill,2004. S.S. Rajput and S.S. Jammuar, “Low Voltage Analog Circuit Design Techniques”, IEEE Transactions on Circuits and System Magazine, Vol no.-2, pp. 24 -42, 2002. Garcia Rafael Ledesma Francisco and Ramirez-Angulo Jaime, “Comparison of new and conventional low voltage current mirrors”, Proc IEEE Journals, pp. 49-52, 2002. Bruun E and Shah P, “Dynamic range of low-voltage cascode current mirrors”, Proc Circuit and system IEEE Journals, pp.1328-1331, 1995. S.S.Rajput and S.S.Jamuar,“Low voltage, low power, high performance current mirror for portable analogue and mixed mode applications”, IEEE Proc-Circuits Device system,Vol. 148,No 5, pp.273-278, 2001. Lee, S.hyun. & Kim Mi Na, “This is my paper”, ABC Transactions on ECE, Vol. 10, No. 5, pp120-122 , 2008.
Authors:
Felixkala T and Sethuraman V.S
Paper Title:
Shrinkage Properties of HPC using Granite Powder as Fine Aggregate
Abstract: Shrinkage is the time-dependant decrease in concrete volume compared with the original placement volume of concrete. Shrinkage potential of a high performance concrete is perhaps the most important consideration which affects the long-term strength and durability, and hence efforts are being made to reduce the shrinkage and shrinkage cracks. The main objective of this experimental work was to investigate the shrinkage properties of concrete made with granite powder as fine aggregate and partial replacement of cement with combination of admixtures. The granite powder, one of the byproducts in stone crushing process, not being used for any applications other than filling-up low lying areas was identified as a replacement material for river sand in concrete. Admixtures such as silica fume, fly ash, slag and superplasticiser have the inherent ability to contribute to continued strength development and very high durability. In the present work, concrete made with 25% of granite powder as a replacement of sand and with 10% of Fly ash, 10% of ground granulated blast-furnace slag, 7.5% of silica fume and 1% of superplasticiser as a replacement of cement were considered. The results indicated that concrete specimens produced with admixture and granite powder has lesser shrinkage parameters like maximum length of crack, minimum width of crack, total number of cracks as compared with conventional concrete specimens. The test results also indicated that the values of both plastic and drying shrinkage strains of concrete in the granite powder with admixture concrete specimens were greater than those of ordinary concrete specimens. Keywords: HPC, Granite powder, admixtures, plastic shrinkage, drying shrinkage and crack.
632-636
637-343
References: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11.
D. K. Kulkarni, and K. B. Prakash, “Shrinkage Properties of Concrete Containing Combination of Admixtures” Journal of Applied Science Research, 2008, pp.100-108. Xiaofeng Cong, Shanglong Gong, David Darvin, and Steven L.Mccabe “Role of Silica fume in compressive strength of cement paste, mortar, and Concrete” ACI Materials Journal, 1992, Vol. 89, No. 4, pp.375-386. B. H. Bharatkumar, R. Narayan, B. K. Raghuprasad, and D. S. Ramachandramurthy, “Mix Proportioning of High Performance Concrete” Cement & Concrete Composites, 2001, Vol.23, pp.71– 80. Kefeng Tan and PU. Xincheng, “Strengthening effects of finely ground fly ash, granulated blast furnace slag, and their combination” Cement and Concrete Research, 1998, Vol.28, No. 12, pp.1819 –1825. C. Kanmalai Williams, P. Partheeban, and T. Felix kala, “Mechanical Properties of High Performance Concrete Incorporating Granite Powder as Fine Aggregate” International Journal on Design and Manufacturing Technologies, 2008, Vol. 2, No.1, pp.67-73. T. Felix kala, and P. Partheeban, “Study on the effect of granite powder on concrete properties” Proceedings of the Institution of Civil Engineers Journal Construction materials, Article number: COMA-D-08-00061R3, 2008, pp.63 – 67. T. Felix kala, and P. Partheeban, “Investigations on High Performance Concrete Using Granite Powder as Fine Aggregate” Emerging Journal on Engineering Science and Technology (EJEST) ISSN 0974-2050, Code: EJEST/ SUMMER/2009/11/07, No.3, pp. 27 – 34. Koh, Kyungtaek, Ryu, Gumsung, Kang, Sutae, Park, Jungjun, Kim, Sungwook, “Shrinkage Ultra High Performance Concrete (UHPC)” Advanced Science letters, March 2011, Vol. 4, No. 3, pp. 948-952. Al. Amoudi OSB, M. Maslehuddin, and MA. Bader, “Characteristics of silica fume and its impact on concrete in the Arabian Gulf” Concrete Construction, 2001, pp.45-50. BIS-Bureau of Indian Standards, (1982) BIS: 10262-1982, New Delhi, India. M.S. Shetty, “Concrete Technology-Theory and Practice” S.Chand and Company Ltd, New Delhi, Reprint, 2007, pp.458 – 503.
Authors:
Ramandeep Kaur, Neha Malhotra
Paper Title:
A Method for Estimating the Effects of Functionality Risk
Abstract: In the field of Software Engineering software risk management is an important area. Due to the complex nature of software development industry there are many types of risks which can cause project failure. From such risks developing wrong software functions is one due to which many problems can arise. If effects of this risk are not estimated it would pose problems for the success of the project. By estimating the effects of developing wrong software functions developer will come to know which problem they have to face with the occurrence of this risk and considering these effects developer can take appropriate action to manage this risk. So, We are proposing a FCM based tool to estimate the effects of developing wrong software functions. Keywords: Risk Management, Fuzzy Cognitive map. References: 1.
135.
2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12.
136.
Cristina Lopez ,Jose L. Salmeron ,Sebastian Lozano” Software Maintenance Scenarios Simulation with Fuzzy Cognitive Maps” IEEE International Conference on Fuzzy Systems June 27-30, 2011, Taipei, Taiwan Neha Malhotra ,Manisha Bhardwaj and Rajwinder Kaur ”Estimating the Effects of Gold Plating Using Fuzzy Cognitive Maps” International Journal of Computer Science and Information Technologies, Vol. 3 (4) , 2012. Jose L. Salmeron and Cristina Lopez “Forecasting Risk Impact on ERP Maintenance with Augmented Fuzzy Cognitive Maps “IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,VOL 38,NO.2 MARCH/APRIL2012. Surbhi Anand and Vinay Chopra“ Decision Support System for Software Risk Analysis during Software Development “International Journal for Science and Emerging Technologies with Latest Trends” 2(1): 29-35 (2012) Gerogiannis,V. C., Papadopoulou and S. Papageorgiou, E. I.” Identifying Factors of Customer Satisfaction from Smartphones: A Fuzzy Cognitive Map Approach “ International Confereneeringnce on Contemporary Marketing Issues (ICCMI) 2012. Elpiniki Papageorgiou and Areti Kontogianni”Using Fuzzy Cognitive Mapping in Environmental Decision Making and Management: A Methodological Primer and an Application” International Perspectives on Global Environmental Change. Boehm B. W, “Software RiskManagement: Principles and Practices.” IEEE Software, January 1991, pp. 32-41. Rashmita Das and Rajashree Das “Risk Assessment Techniques for Software Development” European Journal of Scientific Research ISSN 1450216X Vol.42 No.4 (2010), pp.629-636 Janne Ropponen and Kalle Lyytinen”Components of Software Development Risk: How to Address Them? A Project Manager Survey” IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 26, NO. 2, FEBRUARY 2000. G.N.K. Suresh Babu1 and S.K. Srivatsa” Increasing Success of Software Projects through Minimizing Risks” International Journal of Research and Reviews in Software Engineering Vol. 1, No. 1, M Timothy C.Lethbridge “Object oriented software Engineering practical software development using UML and java” Tata McGraw Hill Education Private Limited.
Authors:
Ali, E. S. and Abd-Elazim, S. M
Paper Title:
Statistical Assessment of New Coordinated Design of PSSs and SVC via Hybrid Algorithm
Abstract: The assessment of new coordinated design of Power System Stabilizers (PSSs) and Static Var Compensator (SVC) in a multimachine power system via statistical method is proposed in this paper. The coordinated design problem of PSSs and SVC over a wide range of loading conditions is formulated as an optimization problem. The Bacterial Swarming Optimization (BSO), which synergistically couples the Bacterial Foraging (BF) with the Particle Swarm Optimization (PSO), is employed to search for optimal controllers parameters. By minimizing the proposed objective function, in which the speed deviations between generators are involved; stability performance of the system is improved. To compare the capability of PSS and SVC, both are designed independently, and then in a coordinated manner. Simultaneous tuning of the BSO based coordinated controller gives robust damping performance over wide range of operating conditions and large disturbance in compare to optimized PSS controller based on BSO (BSOPSS) and optimized SVC controller based on BSO (BSOSVC). Moreover, a statistical T test is performed to ensure the effectiveness of coordinated controller versus uncoordinated one. Keywords: Statistical T test, SVC, PSSs, Multimachine Power System, Coordinated design, Bacteria Swarm Optimization. References: 1. 2.
P. Kundur, “Power System Stability and Control”, McGraw-Hill, 1994. Y. S. Lee, and S. Y. Sun, “STATCOM Controller Design for Power System Stabilization with Sub-optimal Control and Strip Pole Assignment”, Int. J. of Electrical Power and Energy Systems, Vol. 24, No. 9, November 2002, pp. 771-779.
644-646
647-654
3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.
16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 33. 34. 35.
M. A. Abido, “Optimal Design of Power System Stabilizers using Particle Swarm Optimization” IEEE Transactions on Energy Conversion, Vol. 17, No. 3, September 2002, pp. 406-413. Y.L. Abdel-Magid, and M.A. Abido, “Coordinated Design of a PSS and a SVC Based Controller to Enhance Power System Stability”, Int. J. of Electrical Power and Energy Systems, Vol. 25, No. 9, November 2003, pp. 695-704. J. Baskaran, and V. Palanisamy, “Optimal Location of FACTS Devices in a Power System Solved by a Hybrid Approach”, Int. J. of Nonlinear Analysis, Vol. 65, No. 11, December 2006, pp. 2094-2102. S. Kodsi, C. Canizares, and M. Kazerani, “Reactive Current Control Through SVC for Load Power Factor Correction”, Int. J. of Electric Power Systems Research, Vol. 76, No. 9-10, June 2006, pp. 701-708. S. A. Al-Baiyat, “Design of a Robust SVC Damping Controller Using Nonlinear Technique”, The Arabian Journal for Science and Engineering, Vol. 30, No. 1B, April 2005, pp. 65-80. K. Ellithy, and A. Al-Naamany, “A Hybrid Neuro-Fuzzy Static Var Compensator Stabilizer for Power System Damping Improvement in the Presence of Load Parameters Uncertainty”, Int. J. of Electric Power Systems Research, Vol. 56, No. 3, December 2000, pp. 211-223. P. K. Modi , S. P. Singh , and J. D. Sharma, “Fuzzy Neural Network Based Voltage Stability Evaluation of Power Systems with SVC”, Applied Soft Computing , Vol. 8 , No.1, January 2008, pp. 657-665. M. H. Haque, “Best Location of SVC to Improve First Swing Stability of a Power System”, Int. J. of Electric Power System Research, Vol. 77, No. 10, August 2007, pp. 1402-1409. Y. Chang, and Z. Xu, “ A Novel SVC Supplementary Controller Based on Wide Area Signals”, Int. J. of Electric Power System Research, Vol. 77, No. 12, August 2007, pp. 1569-1574. S. Panda, N. P. Patidar, and R. Singh, “Simultaneous Tuning of SVC and Power System Stabilizer Employing Real- Coded Genetic Algorithm”, Int. J. of Electrical and Electronics Engineering, Vol. 4, No. 4, 2009, pp. 240-247. C. Rakpenthai, S. Premrudeepreechacharn, and S. Uatrongjit, “Power System with Multi-Type FACTS Devices States Estimation Based on Predictor-Corrector Interior Point Algorithm”, Int. J. of Electrical Power and Energy Systems, Vol. 31, No. 4, May 2009, pp. 160–166. E. Zhijun, D. Z. Fang, K. W. Chan, and S. Q. Yuan, “Hybrid Simulation of Power Systems with SVC Dynamic Phasor Model”, Int. J. of Electrical Power and Energy Systems, Vol. 31, No. 5, June 2009, pp. 175–180. Y. Yuan, G. Li, L. Cheng, Y. Sun, J. Zhang, and P. Wang, “A Phase Compensator for SVC Supplementary Control to Eliminate Time Delay by Wide Area SignalInput”, Int. J. of Electrical Power and Energy Systems, Vol. 32, No. 3, March 2010, pp. 163-169.[16] E. S. Ali, “Static Var Compensator Design for Power System Stabilization Using Bacteria Foraging Optimization Algorithm”, 13th International Middle East Power Systems Conference (MEPCON 2009), Assiut University, Assiut, Egypt, December 20-23, 2009, pp. 578-582. S. M. Abd-Elazim, and E. S. Ali, “Bacteria Foraging Optimization Algorithm Based SVC Damping Controller Design for Power System Stability Enhancement", Int. J. of Electrical Power and Energy Systems, Vol. 43, No. 1, December 2012, pp. 933-940. X. Y. Bian , C. T. Tse , J. F. Zhang , and K. W. Wang, “Coordinated Design of Probabilistic PSS and SVC Damping Controllers”, Int. J. of Electrical Power and Energy Systems, Vol. 33, No. 3, March 2011, pp. 445-452. M. A. Furini, A. L. S. Pereira, and P. B. Araujo, “Pole Placement by Coordinated Tuning of Power System Stabilizers and FACTS POD Stabilizers”, Int. J. of Electrical Power and Energy Systems, Vol. 33, No. 3, March 2011, pp. 615-622. S. Panda, “Multi-objective PID Controller Tuning for a FACTS Based Damping Stabilizer Using Non-dominated Sorting Genetic Algorithm-II”, Int. J. of Electrical Power and Energy Systems, Vol. 33, No. 7, September 2011, pp. 1296-1308. E. S. Ali, and S. M. Abd-Elazim, "Coordinated Design of PSSs and TCSC via Bacterial Swarm Optimization Algorithm in a Multimachine Power System", Int. J. of Electrical Power and Energy Systems, Vol. 36, No. 1, March 2012, pp. 84-92. S. M. Abd-Elazim, and E. S. Ali, “Coordinated Design of PSSs and SVC via Bacteria Foraging Optimization Algorithm in a Multimachine Power System ", Int. J. of Electrical Power and Energy Systems, Vol. 41, No. 1, October 2012, pp. 44-53. J. Kennedy and R. Eberhart, “Particle Swarm Optimization”, Proceedings of IEEE International Conference on Neural Networks, 1995, pp. 19421948. D. P. Rini, S. M. Shamsuddin, and S. S. Yuhaniz, “Particle Swarm Optimization: Technique, System and Challenges”, Int. J. of Computer Applications, Vol. 14, No. 1, January 2011, pp. 19-27. V. Selvi and R. Umarani, “Comparative Analysis of Ant Colony and Particle Swarm Optimization Techniques”, Int. J. of Computer Applications, Vol. 5, No. 4, August 2010, pp. 1-6. K. M. Passino, “Biomimicry of Bacterial Foraging for Distributed Optimization and Control”, IEEE. Control System Magazine, Vol. 22, No. 3, June 2002, pp. 52-67. S. Mishra, “A Hybrid Least Square Fuzzy Bacteria Foraging Strategy for Harmonic Estimation”, IEEE Trans. Evolutionary Computer, Vol. 9, No.1, February 2005, pp. 61-73. D. B. Fogel, “Evolutionary Computation towards a New Philosophy of Machine Intelligence”, IEEE, New York, 1995. E. S. Ali and S. M. Abd-Elazim, “Bacteria Foraging Optimization Algorithm Based Load Frequency Controller for Interconnected Power System”, Int. J. of Electrical Power and Energy Systems, Vol. 33, No. 3, March 2011, pp. 633-638. E. S. Ali, and S. M. Abd-Elazim, “TCSC Damping Controller Design Based on Bacteria Foraging Optimization Algorithm for a Multimachine Power System", Int. J. of Electrical Power and Energy Systems, Vol. 37, No. 1, May 2012, pp. 23-30. A. Biswas, S. Dasgupta, S. Das, and A. Abraham, “Synergy of PSO and Bacterial Foraging Optimization: A Comparative Study on Numerical Benchmarks”, Innovations in Hybrid Intelligent Systems, ASC 44, 2007, pp. 255-263. W. Korani, “Bacterial Foraging Oriented by Particle Swarm Optimization Strategy for PID Tuning”, GECCO’08, July 12-16, 2008, Atlanta, Georgia, USA, pp. 1823-1826. P. Kundur, M. Klein, G. J. Rogers, and M. S. Zywno, “Application of Power System Stabilizers for Enhancement of Overall System Stability”, IEEE Trans. Power System, Vol. 4, No. 2, 1989, pp. 614-626. P. M. Anderson and A. A. Fouad, “Power System Control and Stability”, Iowa State University Press, Iowa, 1977. S. M. Abd- Elazim, “Comparison between SVC and TCSC Compensators on Power System Performance”, Master thesis, 2006, Zagazig University, Egypt. S. M. Abd-Elazim, and E. S. Ali, “A Hybrid Particle Swarm Optimization and Bacterial Foraging for Power System Stability Enhancement”, IEEE, 15th International Middle East Power Systems Conference “MEPCON’12”, Alexandria University, Egypt, December 23-25, 2012.
Authors:
Sudarshan D. Kore, S.S. Patil Analysis and Design of R.C. Deep Beams by Using Newzealand Code and Comparison with Experimental Paper Title: Results Using Strain Gauges Abstract: This paper describes analysis and design of beams subjected to two points loading with three different L/D ratios using non linear finite element analysis. The codes used were I.S.456-2000, NEWZEALAND, CANADIAN, CIRIA GUIDE-2(1977) and ACI 318 are used for design purpose, to plot the variation of flexural stress, strains and shear stress in deep beam. 137. Keywords: Deep Beam, code provisions, strain, stress etc. References: 1. 2. 3.
AASHTO, “AASHTO LRFD Bridge Specifications for Highway Bridges” (2001 Interim Revisions), American Association of Highway and Transportation Officials, Washington, D.C., 1998. APENDIX A OF ACI-318 AMERICAN CONCRETE INSTITUTE (BUILDING CODE REQUIREMENT FOR STRUCTURAL CONCRETE ACI -318-2005 AND COMMENTARY ACI- 318R-2005). ACI-318-2005 AMERICAN CONCRETE INSTITUTE (BUILDING CODE REQUIREMENT FOR STRUCTURAL CONCRETE ACI -318-2005
655-660
4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21.
AND COMMENTARY ACI- 318R-2005). ‘British code of practice’ B.S.8110-02 (BRITISH STANDARD Structural Use of concrete part-1 Code of practice for design and construction) CANADIAN CODE (CSA-A23.3-2004) (CANADIAN STANDARD ASSOCIATION Design of Concrete Structures) CIRIA Guide 2 (1977), “The design of deep beams in reinforced concrete”, Over Arup and Partners and Construction Industry Research and Information Association, London, (reprinted 1984), 131 p. ‘Design by Strut and Tie method using ACI Appendix A’ from STM website. Indian Standard Code of Practice Plain and Reinforced Concrete’ IS 456:2000-. Bureau of Indian Standards, Manak Bhavan, New Delhi, India. Marti Peter, ‘Basic Tools of Reinforced Concrete Beam Design’ ACI journal, Title no. 82-4, January-February 1985. Kong. F. K. ‘Reinforced Concrete Deep Beam’, Van No strand Reinhold, New York Mr. Kotsovos, ‘Design of Reinforced Concrete Deep Beams’ Journal of Structural Egg., 28-32, January 1988. Matamoros and Wong, ‘Design of Simply Supported Deep Beam using strut and tie models’ ACI Structural journal, 100-S72, November/ December 2003. Mohammed Reza Salamy,Hiroshi Kobayashi and Shigeki Unjoh. ‘Experimental and Analytical Study on Deep Beams’ ‘NEWZEALAND CODE (NZS-3101-2006) New Zealand Standard CONCRETE STRUCTURES STANDARD Part-1 The Design Of Concrete Structures Nagarajan P, Dr Pillai M M T and Dr Ganesan N, ‘Design of simply supported Deep Beam using IS 456: 2000 and Strut and Tie Method’. IE (I) Journal-CV Vol.88 38-43, May 2007. Park R. and Pauly T. ‘Reinforced Concrete Structures', Wiely-Interscience Publications. Quintero-Febres, Parra-Montesinos and Wight, ‘Strength of Struts in Deep Concrete Members using Strut and Tie Method’, ACI Structural journal, 103-S61, July/ August 2006. Rogowsky. David M., MacGregor James G. and See Y. Ong, ‘Tests of Reinforced Concrete Deep Beam’. ACI Journal 614-623, july-August-1986. Schleicher J. and Schafer .K.’ Design and Detailing of Structural Concrete using Strut–and–Tie Models’. The Structural Engineer, vol 69, 1991, 113. Varghese and Krishnamurthy, ‘Strength and Behavior of Deep Reinforced Concrete Beams’ Indian Concrete Journal, 104-108, March 1966. Varghese P.C. ‘Advanced Reinforced Concrete Design’, Prentice Hall of India Pvt.Ltd. New Delhi.
Authors:
Anjali Singla, Jagpreet Kaur
Paper Title:
A Survey on Parallel Partition Prime Multiple Algorithm
Abstract: One of the important problems in data mining research is discovering Association rules from databases of transactions, where each transaction contains a set of items. In this dissertation work and improved approach proposed for parallel association rule mining. I proposed a new parallel partition prime multiple algorithms for association rule mining. Partition prime multiple algorithm addresses the shortcoming of previously proposed parallel buddy prime algorithm. New efficient algorithm proposed for load balancing. The proposed algorithm for parallel frequent item set mining and load balancing reduces the time and data complexity and divide transactional database efficiently for good load balancing among the processor. Keywords: Association Rule, Load Balancing Algorithm References: 1. 2. 3. 4. 5.
138.
6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22.
139.
Jiawei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann Publishers, San Francisco, USA, 2001, ISBN 1558604898. Arun K. Pujari.” Data Mining Techniques”, Universities Press (India) Private Limited. IBM Research Report “Parallel Mining of Association Rules: Design”, Implementation and Experience and Data Eng., vol. 8, no. 6, pp. 962± 969, Dec. 1996. Mohammed J.Zaki. “Parallel & Distributed Association Mining: A Survey.” IEEE Trans. Knowledge & Data Engg. 1999. Sotiris Kotsiantis, Dimitris Kanelloponles, “Association Rules Mining: A Recent Overview”, GESTS International Transactions on Computer Science and Engineering, Vol 32(1), 2006. Yanbo Wang, “Categorization of Association Rule Mining Algorithms”, Department of computer sciences, University of Liverpool, U.K. R. Agrawal and J.C. Shafer, ªParallel Mining of Association Rules,º IEEE Trans. Knowledge Dr.S.N.Sivanandam, Dr.S.Sumathi, Ms.T.Hamsapriya, Mr.K.Babu “Parallel Buddy Prima – A Hybrid Parallel Frequent item set mining algorithm for very large databases”P.S.G College of Technology Coimbatore, Tamilnadu, India. Pieter Adriaans and Dolf Zantinge,Two Crows Corporation, Introduction to Data Mining and Knowledge Discovery, Third Edition (Potomac, MD: Two Crows Corporation, 1999); Data Mining (New York: Addison Wesley, 1996). Jeffrey W. Seifert, Data Mining: An Overview: Updated December 16, 2004 Analyst information Science and Technology Policy Resources, Science, and Industry Division. Sourav S. Bhowmick Association Rule Mining: A Survey: Qiankun Zhao Nanyang Technological University, Singapore Nanyang Technological University, Singapore Osmar R. Zaïane, 1999 CMPUT690 Principles of Knowledge Discovery in Databases. Agrawal, R.; Imielinski, T.; and Swami, A. Database Mining: A performance Perspective IEEE Transactions on Knowledge and Data Engineering, Special issure on Learning and Discovery in Knowledge-Based Datadabases, 5(6):914-925, December 1993. M. Hegland, “Algorithms for Association Rules”, Lecture Notes in Computer Science, Vol. 2600, Jan 2003. Brain, S.; Motwani, R.; and Silverstein, C. Beyond Market Baskets: Generalizing Association Rules to Correlations. In Proc. Of the 1997 SIGMOD Conf. on the Management of Data, pp. 265-276 Michael Goebel “A survey of Data Mining and knowledge Discovery software Tools” Department of Computer Science University of Auckland Le Grunewald School of Computer Science University of Oklahoma. Data Mining Lecture Notes http:// ww.db.stanford.edu/~ullman/mining/ Data Mining Lecture Notes C. Győrödi, R. Győrödi. “Mining Association Rules in Large Databases”. Proc. of Oradea EMES’02: 45-50, Oradea, Romania, 2002 R. Győrödi, C. Győrödi. “Architectures of Data Mining Systems”. Proc. Of Oradea EMES’02: 141-146, Oradea, Romania, 2002. Cornelia Győrödi, Robert Győrödi, prof. dr. Stefan Holban,“A Comparative Study of Association Rules Mining Algorithms” Eui-Hong (Sam) Han, George Karypis, Member, IEEE, and Vipin Kumar, Fellow, IEEE “Scalable Parallel Data Mining for Association Rules”. C. Győrödi, R. Győrödi, S. Holban, M. Pater. “Mining Knowledge in Relational Databases”. Proc. of CONTI 2002, 5th International Conference on Technical Informatics: 1-6, Timisoara, Romania, 2002.
Authors:
Arshi Salamat
Paper Title:
A Simple Scheme for Measurement of Power Frequency Deviation
Abstract: Measurement of power frequency deviation is important for the design of power system equipments such as stabilizers, frequency meters etc. This paper has suggested a monitoring scheme using a 90 0 phase shifter. The use of phase shifter makes it easier to compare the two frequencies, the nominal and deviated frequency.The shifted and normal frequency signals are combined through EX-OR gate. If the power frequency differs from its nominal value, a difference in
661-664
665-668
the pulse counts of two successive pulses occur which will be proportional to amount of deviated frequency. This method has advantage of providing high resolution. Also it is very simple and less expensive as compare to other methods. The scheme is implemented using 8085 microprocessor. Keywords: Zero Crossing Detector, Deviation, Phase shifter, Resolution References: 1. F.W. Keay and W.H. South, “Design of a Power system Stabilizer sensing frequency deviation”, IEEE Trans. Vol. PAS 90, pp 707-712, 1971. 2. M.S. Sachdev, M.M. GIRAY "A Least Squares Technique for Determining Power System Frequency" IEEE Transactions on Power Apparatus and Systems, Vol. PAS-104, Feb. 1985, pp. 437-443. 3. Hamilakis, Q.V. and N.C. Voulgaris, “An accurate method for measurement of line frequency and its deviation using a microprocessor”, IEEE Trans., IM-36, No. 1, 1987 4. W. Ahmad, “A Simple Pulse Duration or Frequency Deviation Meter”, IETE Technical review, vol. 4, No. 6, p. 249, 1987 5. Ahmad Mukhtar, “Power System Frequency Deviation Measurement using Electronic Bridge” IEEE Trans. on Insttn. and measurement, 1988 6. J. Dwidevi, M. Shukla, K.S. Verma, R.K. Singh, “A novel technique for indication of power frequency deviations in electrical systems”. Power Electronics and Insttn Engg. Vol 102, Springer, 2010, PP 80-82. 7. Saber Nourizadeh, Vahi Yari, Ali Mohammad Ranjbar, “Frequency monitoring and control during power system restoration based on wide Area Measurement System”. Mathematical Problems in Engg. Vol.2011, article ID 489841.(2011) 8. Z.W. Li, O. Samuelson, R. Garcia Valle, “Frequency deviations and generation scheduling in Nordic system”, PowerTech IEEE 2011. 9. K.P. Singh Parmar, S. Majhi, D.P. Kothari, “Load Freq control of a realistic power system with multi source power generation”, International Journal of Electrical power and Energy system, Vol 42, 2012. Elsevier.