International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-2 Issue-4 Published on April 30, 2013
Volume-2 Issue-4 Published on April 30, 2013
  Download Abstract Book

S. No

Volume-2 Issue-4, April 2013, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Asmeeta Mali

Paper Title:

Investigation and Analysis of Efficient Pattern Discovery Method for Text Mining

Abstract:    The concept of text mining is nothing but the mechanism of extracting non-trivial and interesting data from the unstructured text dataset. Text mining is consisting of many computer science disciplines with highly oriented towards the artificial intelligence in general such as the applications like information retrieval, pattern recognition, machine learning, natural language processing, and neural networks. The main difference between the search and text mining is that, search needs users attentions means based users requirement search action will perform whereas text mining is the internal process which attempts to find out information in the pattern which is not known before. To do the text mining, there are many methods presented still to the date those are having their own advantages and disadvantages. The major problems related to such techniques are efficient use and update of discovered patterns, problems related to the synonymy and polysemy etc. In this paper we are investigating the one such method which is presented to overcome above said problems related to the text mining’s. The method presented here is based on innovative as well as effective pattern discovery technique and this consisting of processes like  pattern deploying and pattern evolving in order to improve the effectiveness of using and updating discovered patterns for finding relevant and interesting information.

  Pattern recognition, text mining, knowledge discover, KDD.


1.        K. Aas and L. Eikvil, “Text Categorisation: A Survey,” Technical Report Raport NR 941, Norwegian Computing Center, 1999.
2.        R. Agrawal and R. Srikant, “Fast Algorithms for Mining Association Rules in Large Databases,” Proc. 20th Int’l Conf. Very Large Data Bases (VLDB ’94), pp. 478-499, 1994.

3.        H. Ahonen, O. Heinonen, M. Klemettinen, and A.I. Verkamo, “Applying Data Mining Techniques for Descriptive Phrase Extraction in Digital Document Collections,” Proc. IEEE Int’lForum on Research and Technology Advances in Digital Libraries (ADL ’98), pp. 2-11, 1998.

4.        R. Baeza-Yates and B. Ribeiro-Neto, Modern Information Retrieval.Addison Wesley, 1999.

5.        N. Cancedda, N. Cesa-Bianchi, A. Conconi, and C. Gentile,“Kernel Methods for Document Filtering,” TREC, pubs/trec11/papers/, 2002.

6.        N. Cancedda, E. Gaussier, C. Goutte, and J.-M. Renders, “Word-Sequence Kernels,” J. Machine Learning Research, vol. 3, pp. 1059- 1082, 2003.

7.        M.F. Caropreso, S. Matwin, and F. Sebastiani, “Statistical Phrasesin Automated Text Categorization,” Technical Report IEI-B4-07- 2000, Instituto di Elaborazione dell’Informazione, 2000.

8.        C. Cortes and V. Vapnik, “Support-Vector Networks,” MachineLearning, vol. 20, no. 3, pp. 273-297, 1995.

9.        S.T. Dumais, “Improving the Retrieval of Information fromExternal Sources,” Behavior Research Methods, Instruments, and Computers, vol. 23, no. 2, pp. 229-236, 1991.

10.     J. Han and K.C.-C. Chang, “Data Mining for Web Intelligence,”Computer, vol. 35, no. 11, pp. 64-70, Nov. 2002.

11.     J. Han, J. Pei, and Y. Yin, “Mining Frequent Patterns withoutCandidate Generation,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’00), pp. 1-12, 2000.

12.     Y. Huang and S. Lin, “Mining Sequential Patterns Using GraphSearch Techniques,” Proc. 27th Ann. Int’l Computer Software and Applications Conf., pp. 4-9, 2003.

13.     N. Jindal and B. Liu, “Identifying Comparative Sentences in TextDocuments,” Proc. 29th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’06), pp. 244-251, 2006.

14.     T. Joachims, “A Probabilistic Analysis of the Rocchio Algorithm with tfidf for Text Categorization,” Proc. 14th Int’l Conf. Machine Learning (ICML ’97), pp. 143-151, 1997.

15.     T. Joachims, “Text Categorization with Support Vector Machines:Learning with Many Relevant Features,” Proc. European Conf. Machine Learning (ICML ’98),, pp. 137-142, 1998.

16.     T. Joachims, “Transductive Inference for Text Classification Using Support Vector Machines,” Proc. 16th Int’l Conf. Machine Learning(ICML ’99), pp. 200-209, 1999.

17.     W. Lam, M.E. Ruiz, and P. Srinivasan, “Automatic Text Categorization and Its Application to Text Retrieval,” IEEE Trans. Knowledge and Data Eng., vol. 11, no. 6, pp.865-879, Nov./Dec. 1999. IEEE Trans. Knowledgeand Data Eng., vol. 11, no. 6, pp. 865-879, Nov./Dec. 1999.

18.     D.D. Lewis, “An Evaluation of Phrasal and Clustered Representations on a Text Categorization Task,” Proc. 15th Ann. Int’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR ’92), pp. 37-50, 1992.




Shashi Kant Dargar, Himanshu Purohit, S C Mahajan

Paper Title:

An Iterative Pruning Approach of Neural Network for Proficient Noise Cancellation

Abstract:    For Active Noise Cancellations various algorithms run and result in standard output and better performance. Technique to pruning is related to prune nonfunctional neuron’s (algorithm) from ANC network, which makes only best neurons responsible for noise cancellation. Neurons are classified as different algorithms. Performance of neurons depends upon instantaneous surrounding conditions. So a proficient novel approach for ANC has been proposed. The wiener filter based on least means squared (LMS) algorithm family is most sought after solution of ANC. This family includes LMS, NLMS, VSLMS, VSNLMS, VFXLMS, FX- sLMS and many more. Some of these are nonlinear algorithm, which provides better solution for non linear noisy environment. The components of the ANC systems like microphones and loudspeaker exhibit nonlinearities themselves. The non linear transfer function create worse situation. For example, FX-sLMS algorithm behaves well than the second order VFXLMS algorithm in conditions of non-minimum phase and most important is the mean square error. The classical approach to RBF implementation is to fix the number of hidden neurons based on some property of the input data, and estimate the weights connecting the hidden and output neurons using linear least square method.

   Least Mean Square; RBF neural network; Artificial neural Network, Filter bank design, ANC


1.       S.M. Kuo and D.R.Morgan, Active Noise Control –Algorithms and DSP Implementations. New York: Wiley, 1996.
2.       Lu Yingwei, N.Sundararajan, P.Saratchandran “Adaptive Nonlinear Systems Identification Using Minimal Radial Basis Function Neural Networks “in IEEE 1996.

3.       Shoji  Makino,  Member, IEEE, Yutaka  Kaneda, Member,  IEEE  and  Nobuo Koizumi, “Exponentially weighted step size NLMS adaptive filter based on the statistics  of  a  room  impulse  response”,  IEEE  Trans.  on speech and audio Processing, vol. 1, No.1, pp.101-108, Jan 1993.

4.       S. Qureshi, “Adaptive Equalization,” Proceedings of the IEEE, vol.73, No.9, pp.1349-1387, Sept. 1985.

5.       S. Haykins, “Adaptive Filter Theory”, Prentice Hall, New Jersey, 1996.

6.       Raymond H.  Kwong and Edward W. Johnston, “A Variable Step Size LMS Algorithm”, IEEE Transactions on Signal Processing vol. 40, No.7, pp. 1633-1642,   July, 1992.

7.       Tyseer Aboulnasr, Member, IEEE, and K.Mayyas, “A robust variable step size LMS   type   algorithm:  Analysis and Simulations”, IEEE Trans.  On Signal Processing vol. 45, No.3, pp. 631-639, March 1997.

8.       Debi Prasad Das ,”Filtered –s LMS Algorithm for Multichannel Active control Of Nonlinear Noise Processes” in IEEE Transactions on Speech And Audio Processing , vol 14 ,no.5 September 2006.

9.       Debi Das and Ganpati Panda, “Active Mitigation of Nonlinear Noise Processes Using A Novel Filtered-s LMS Algorithm” in IEEE Transactions of Speech and Audio Processing, vol. 12, No.3, May 2004




Surjan Singh, Dinesh Kumar, K. N. Rai

Paper Title:

Wavelet Collocation Solution for Convective Radiative Continuously Moving Fin with Temperature-Dependent Thermal Conductivity

Abstract:    In this paper, the temperature distribution in convective radiative continuously moving fin with variable thermal conductivity, which is loosing heat by simultaneous convection radiation to surroundings, is studied. We consider three particular cases, namely thermal conductivity is (I) constant (II) a linear function of temperature and (III) an exponential function of temperature. Wavelet Collocation Method is used to solve this nonlinear heat transfer problem. The exact solution obtained in absence of radiation- conduction fin parameter are compared with Wavelet Collocation solution are same. The fin efficiency is computed in absence of radiation- conduction fin parameter. The whole analysis is presented in dimensionless form and effect of different parameters such as thermal conductivity parameter ‘a’, Peclet number ‘Pe’, convection-conduction parameter ‘Nc’, radiation-conduction parameter ‘Nr’, dimensionless convection sink temperature ‘θa’ and dimensionless radiation sink temperature ‘θs’ on the fin temperature is discussed in detail.

   Wavelet, Collocation, Convection, Radiation, heat transfer, fin, Conductivity.


1.        D. Kraus, A. Aziz, J.R. welty, Extended Surface Heat Transfer (Wiley, New York, 2002)  
2.        M.V. Karwe, Y. Jaluria, Thermal transport from a heated moving surface, ASME Journal of  Heat Transfer 108       (1986)728-733.

3.        Y. Jaluria, A.P. Singh , Temperature distribution in a moving material subjected to surface   energy transfer, Computer Methods in Applied Mechanics and Engineering. 41 (1983) 145-156

4.        S. R. Choudhury, y. Jaluria, Analytical solution for the transient temperature distribution  in a moving rod or plate of finite length with surface heat transfer, International Journal of Heat and Mass Transfer 37(1994) 1193-1205.

5.        Mohsen Torabi,Hessameddin Yaghoobi and A. Aziz Analytical Solution for Convective-Radiative  Continuously Moving Fin with Temperature-Dependent Thermal Conductivity  Int. J. Thermophysics (2012) 33: 924-941.          

6.        A. Aziz, Robert J. Lopez , Convection-radiation from a continuously moving, variable thermal conductivity sheet or rod  undergoing thermal processing, I. J. of Thermal  Sciences 50 (2011) 1523-1531.                                                                       

7.        Abdul Aziz, F. Khani,  Convection-radiation from a continuously moving fin of variable thermal conductivity, J. of Franklin Institute 348 (2011) 640-651.                                                                                                                   

8.        M. Razzaghi and S. Yosefi,  the Legendre wavelets operational matrix of integration,  Int. J.  of Systems Science, (2001), vol.32, No.4, p- 495-502.




B.Gopinath, S.Suresh Kumar, Juvan Michael

Paper Title:

Unified Power Flow Controller (UPFC) for Dynamic Stability in Power System using Modern Control Techniques

Abstract:    Flexible AC Transmission System (FACTS) technology was introduced to overcome the operational difficulties with conventional method of power compensation. Unified Power Flow Controller (UPFC) is a sort of multi-function controller that can influence the transmission parameters individually or simultaneously. UPFC allows precise control of both real and reactive power flow in transmission line. This paper deals with the advanced control technique for UPFC to provide effective real and reactive power compensation. Adaptive Neuro Fuzzy Inference Controller (ANFIC) concept is introduced to control the system under different operating conditions. The system is tested on a 5-bus system. The computer simulations are done by MATLAB/SIMULINK.

   Adaptive Neuro Fuzzy Inference Controller, Flexible AC Transmission System, Fuzzy based PSO, Fuzzy-PI Controller, Particle swarm optimization algorithm.


1.       N. G. Hingorani and L. Gyugyi,“Understanding FACTS”, IEEE Press, 1999.
2.       Kalyan K. Sen, Member, IEEE Eric J. Stacey UPFC - Unified Power Flow Controller: Theory, Modeling, and Applications, IEEE Transactions on Power Delivery, Vol. 13, No. 4, October 1998

3.       Q. Yu, L. Norum, T. Undeland, and S. Round, “Investigation of dynamic controllers for a unified power flow controller,” in Proc. IEEE 22nd Int. Conf. Ind. Electron., Control Instrum., Taiwan, Aug. 1996,pp. 1764–1769.

4.       P. Papic, D. Povh, and M. Weinhold, “Basic control of unified power flow controller,” IEEE Trans. Power Syst., vol. 12, no. 4, pp. 1734–1739, Nov. 1997.

5.       H. Fujita, Y. Watanabe, and H. Akagi, “Control and analysis of a unified power flow controller,”IEEE Trans. Power Electron., vol. 14, no. 6, pp.  1021–1127, 1999.

6.       S. Mishra, P. K. Dash, and G. Panda, “TS-fuzzy controller for UPFC in a multimachine power system,” Proc. Inst. Elect. Eng., Gen. Transm. Distrib., vol. 147, no. 1, pp. 15–22, 2000.

7.       R. Orizondo, and R. Alves, Member, IEEE. UPFC Simulation and Control Using the ATP/EMTP and MATLAB/Simulink Programs, 2006 IEEE PES Transmission and Distribution Conference and Exposition Latin America, Venezuela

8.       A. Edris, A. S. Mehraban, M. Rahman, L. Gyugyi, S. Arabi, and T. Reitman, “Controlling the flow of real and reactive power,” IEEE Comput. Appl. Power, vol. 11, no. 1, pp. 20–25, Jan. 1998.

9.       J. Shing and R. Jang, “ANFIS: Adaptive network-based fuzzy inference system,” IEEE Trans. Syst., Man Cybern., vol. 23, no. 3, pp. 665–685,May/Jun. 1993.

10.     Tamer S. Kamel M. A. Moustafa Hassan,Adaptive Neuro Fuzzy Inference System (ANFIS) For Fault Classification in the Transmission Lines, The Online Journal on Electronics and Electrical Engineering (OJEEE) Vol. (2) – No. (1)

11.     Sudath R. Munasinghe, Adaptive Neurofuzzy Controller to Regulate UTSG Water Level in Nuclear Power Plants, IEEE transactions on nuclear science, vol. 52, no. 1, 2005

12.     H.Shayeghi, H.A Shayanfar, A.Safari, “A PSO based unified power flow controller for damping of   power system oscillations”Elsevier,2009.




Neeraj Kumar, Amit Sharma

Paper Title:

A review on BPR and RSCM in an Auto Ancillary Industry: A Combined Thought

Abstract:    Ecological and fiscal issues have significant impacts on Reverse Supply Chain Management (RSCM) and are consideration to shape one of the developmental keystones of sustainable supply chain. Business Process Reengineering is a subterfuge- determined organizational inventiveness, basically reexamine and redesign business practice with the intention of accomplishing competitive step forward in quality, receptiveness, expenditure, customer fulfillment and other critical process performance measures. In this research paper we offer an appraisal of BPR vision focusing upon the use of informational techniques to facilitate a shift way from linear sequential work organization towards parallel work and multidisciplinary team work.

   Introduction, Review on Methodology, Product Development Cycle, Frame of Work, Results & Conclusion, References


1.        Lee, D-H. and Dong, M. (2008) „heuristic approaches to logistics network design for end-of-lease computer products recovery‟, Transportation Research Part E: Logistics and Transportation Review, Vol. 44, No. 3, pp.455–474.
2.        Fleischmann M, Bloemhof-Ruwaard JM, Dekker R, van der Laan E, van Nunen JAEE, van Wassenhove LN. Quantitative models for reverse logistics: a review. European Journal of Operational Research 1997; 103(1):1–17.

3.        Feldmann Clarence.G, (1998),The Practical Guide to Business Process Reengineering using IDEF0., Dorset House Publishing, New York.

4.        Chouinard Marc, 2005, “Integration of reverse logistics activities within a supply chain information system”, Computers Industry, Vol.56, pp.105-124.

5.        Gonzalez-Torre, 2004, “Environmental and reverse logistics polices in European bottling and packaging firms”, International Journal Production Economics, Vol.88, pp.95-104.

6.        Grover Varun, 1994, “Exploring the Seven of Information Technology Enable Business Process Re-engineering”, IEEE transactions on Engineering Management, Vol.41, No.3, pp.276-283.

7.        Manganelli, Raymond.L., Klein, Mark.M., (1994), The Reengineering Handbook: A Step-by-Step Guide to Business Transformation. American Management Association, New York.

8.        Subramanian Muthu, Larry Whitman, and S. Hossein Cheraghi (1999) the 4th Annual International Conference on Industrial Engineering Theory, Applications and Practice November 17-20, 1999, San Antonio, Texas, USA

9.        Mayer, Richard.J., Dewitte, Paula.S., (1998), Delivering Results: Evolving BPR from art to engineering.

10.     Kumar Sanjay, 2007, “Optimization of Material”, Industrial Engineering Journal, Vol.36, No.8, pp.32-34.

11.     Jeremy F. Shapiro, 2004, “Challenges of strategic supply chain planning and modeling”, Computers and Chemical Engineering, Vol.28, pp. 855–861.

12.     Korpela Jukka, 2001, “An analytic approach to supply chain development”, International Journal Production Economics, Vol.71, pp.145-155.

13.     Grover Varun, 1994, “Exploring the Seven of Information Technology Enable Business Process Re-engineering”, IEEE transactions on Engineering Management, Vol.41, No.3, pp.276-283.

14.     “Going Backwards: Reverse Logistics Trends and Practice” by |Dr dale S. Rogers and Dr Ronald s  Tribben- Lembke ( University of Nevada Reno, Centre for Logistic Management)

15.     “Perspectives in Reverse Supply Chain Management(R-SCM): A State of the Art Literature Review” by Arvind Jayant, P. Gupta, S.K.Garg




Prabhishek Singh, R S Chadha

Paper Title:

Review to Digital Watermarking and a Novel Approach to Position the Watermark in the Digital Image

Abstract:    Digital watermarking technology is a frontier research field and it mainly focuses on the intellectual property rights, identification and authentication of the digital media to protect the important documents. According to the basic analysis of digital image watermarking the digital watermarking model consists of two modules, which are watermark embedding module and watermark extraction and detection module Since it is known that digital image transmitted and spread over the network so there is a chance of being polluted by the noise or it may be attacked by the malicious users. The watermark embedded in the digital image may be incorrectly detected due to shortage of algorithms, so to precisely position the watermark is the main issue. A review to Digital watermarking is being presented in the paper and a novel watermark positioning approach is proposed in this paper which uses the statistical characteristics of the pixels to embed the watermark into brightness values of the pixels using image segmentation on the Windows platform using Matlab programming language.

   Digital Watermarking, Image segmentation, Matlab functions, Otsu’s method thresholding, Patchwork algorithm.


1.       Jiang Xuehua, “Digital Watermarking and Its Application in Image Copyright Protection”, 2010 International Conference on Intelligent Computation Technology and Automation.
2.       Ersin ELBAŞI, “Survey on Transformation Based Algorithms in Digital Image Watermarking”, 3rd Information Security & Cryptology Conference with International participation.

3.       Manpreet kaur, Sonia Jindal, Sunny behal, “A Study of Digital image watermarking”, Volume2, Issue 2, Feb 2012.

4.       Vidyasagar M. Potdar, Song Han, Elizabeth Chang, “A Survey of Digital Image Watermarking Techniques”, 2005 3rd IEEE International Conference on Industrial Informatics (INDIN).

5.       Zhu, W., Xiong, Z., and Zhang, Y.-Q., "Multiresolution Watermarking for Images and Video", in IEEE Trans. on circuit and System for Video Technology, vol. 9, no. 4, pp. 545-550, June, 1999.

6.       Pereira, S., Pun, T., "Robust Template Matching for Affine Resistant Image Watermarks," in IEEE Transactions on Inage Processing, vol.9, no. 6, pp. 1123-1129, June 2000

7.       “Techniques for data hiding”, by W. Bender, D. Gruhl, N. Morimoto, A. Lu








Ramandeep Singh Chaudhary, Santosh Deshmukh, Sanjay Waykar

Paper Title:

Adaptive Transmission of Data over the Internet

Abstract:    Internet is a heterogeneous network environment and the network resources that are available to real time applications can be modified very quickly. Today, the underlying infrastructure of the Internet does not sufficiently support quality of service (QoS) guarantees. The new technologies, which are used for the implementation of networks, provide capabilities to support QoS in one network domain but it is not easy to implement QoS among various network domains, in order to provide end-to-end QoS to the user. In addition, some researchers believe that the cost for providing end-to-end QoS is too big, and it is better to invest on careful network design and careful network monitoring, in order to identify and upgrade the congested network links [4] Real time applications must have the capability to adapt their operation to network changes. In order to add adaptation characteristics to real time applications, we can use techniques both at the network and application layers



1.        Bouras, C., & Gkamas, A. (2003). Multimedia transmission with adaptive QoS based on real time protocols. International Journal of Communications Systems, Wiley InterScience, 16(2), 225-248
2.        Byers, J., Frumin, M., Horn, G., Luby, M., Mitzenmacher, M., Roetter, A., & Shaver, W. (2000). FLID-DL: Congestion control for layered multicast. In Proceedings of NGC (pp. 71-81).

3.        Cheung, S. Y., Ammar, M., & Xue, L. (1996). On the use of destination set grouping to improve fariness inmulticast video distribution. In Proceedings of INFOCOM 96, San Francisco.

4.        Diot, C. (2001, January 25-26). On QoS & traffic engineering and SLS-related work by Sprint. Workshop on Internet Design for SLS Delivery, Tulip Inn Tropen, Amsterdam, The Netherlands.

5.        Floyd, S., & Fall, K. (1998, August). Promoting the use of end-to-end congestion control in the Internet.In IEEE/ACM Transactions on Networking. Li, X., Ammar, M. H., & Paul, S. (1999, April). Video multicast over the Internet. IEEE Network Magazine.

6.        Parry, M., & Gangatharan, N. (2005). Adaptive data transmission in multimedia networks. American Journal of Applied Sciences, 2(3), 730-733.

7.        Ramanujan, R., Newhouse, J., Kaddoura, M., Ahamad, A., Chartier, E., & Thurber, K. (1997). Adaptive streaming of MPEG video over IP networks. In Proceedings of the 22nd IEEE Conference on Computer Networks,398-409.

8.        Vandalore, B., Feng, W., Jain, R., & Fahmy, S., (1999). A survey of application layer techniques for adaptive streaming of multimedia. Journal of Real Time Systems (Special Issue on Adaptive Multimedia).

9.        Vickers, B. J., Albuquerque, C. V. N., & Suda, T. (1998). Adaptive multicast of multi-layered video: Rate-based and credit-based approaches. In Proceedings of IEEE Infocom, 1073-1083.

10.     Rizzo, L. (2000) pgmcc: A TCP-friendly single-rate multicast congestion control scheme. In Proceedings of SIGCOMM 2000, Stockholm.




Maheswari G, Akiladevi R

Paper Title:

Real-Time Group Editors 

Abstract:    Group editors allow a cluster of dispersed human users to edit a communal multimedia document at the same time in excess of a computer network. In this study a standard process transformation framework is developed to professionally split the text and graphical data to the diverse users or an exacting user associated in the network. The basic idea of operation transformation is to execute any restricted operation as soon as it is produced for high local receptiveness. Remote operations are transformed against simultaneous operations that have been executed locally before its execution Operation transformation has been well conventional in group editors for achieve high local receptiveness and unconstrained collaboration. It is also well recognized method for optimistic consistency control. Operation transformation framework is recognized which formalizes two reliability criteria, causality conservation and convergence. The Operational transformation framework is developed in the projects and the weaknesses of the existing system are conquering based on the concept called operation effects relation.

   Group editor, Server, Transformation, Object Model technique, Class Responsibility, Collaborator.


1.        Professional Java Network Programming
2.        Java Complete Reference

3.        E. Altman, T. Boulogne, R. E. Azouzi, and T. Jimenez,   “A Survey on networking games,” Telecomm. Syst., Nov. 2000.

4.        D. O. Awduche, “MPLS and traffic engineering in IP networks,” IEEE Comm. Mag., vol. 37, no. 12, pp. 42–47, Dec. 1999.                                      

5.        I. Castineyra, N. Chiappa, and M. Steenstrup, “The Nimrod Routing Architecture,” RFC 1992, 1996.




S.Sunil Kumar Reddy, V. Pandurangadu, S.P.Akbar Hussain¬

Paper Title:

The Effect of Turbulence on the Emissions of an Insulated DI Diesel Engine With Insulted Combustion Chamber

Abstract:   The available petroleum fossil fuels are rapidly depleting and also creating much pollution. As our country is producing sugar cane more, this leads to the recognition of alcohols as an alternative fuels to diesel in diesel engines because these are derived from indigenous sources and are renewable. However due to alcohols lower cetane number and high latent heat of vaporization, it won’t vaporize in the existing diesel engines ; it requires higher temperatures in the combustion chambers for the combustion. So in the present work a thermally insulated engine (IE) is developed which reduces the ignition delay and aids combustion. In an insulated engine, the energy loss is avoided by applying a layer of insulating material over the components (air gap piston and ceramic coated cylinder head, valve and cylinder liner) of the combustion chamber. This improved the efficiency of the engine and further reduces the emissions. Tests are conducted on a single cylinder 4-stroke water cooled 3.68 KW diesel engine with alcohol as a fuel. Due to lower viscosity of alcohol the fuel injection pressure is reduced to165 bar for the experimentation. Further the efficiency of the engine can be improved by providing turbulence in the combustion chamber. So in the present work the turbulence is provided in the combustion chamber with grooves on the piston insert. So during the experimentation brass piston with various numbers of grooves is used on the test engine with an objective to find the best one in terms of performance, emissions and other combustion parameters with alcohol as fuel. For comparison the engine is also operated with brass piston. Out of all these pistons tested, one of them (brass Piston with 9 grooves) is found to be best in terms of efficiency and emissions. 

   air-gap insulation, alcohol, ceramics, grooves and Insulated engine


1.        Myers P.S. and Uyehava O.A., “Efficiency, Heat transfer and   pre-ignition in I.C. engines”, SAE 960130, Vol 75
2.        Pradeepram, O., et al, Development and Testing of a Semi-Adiabatic Engine, 8th  National Conference on  I.C. Engines and combustion, Trivandrum, 1983

3.        Miyari, Y., Matsnnisa, T., Ozawa, T., Oikawa: “Selective heat insulation of   combustion chamber wall, for a DI diesel engine with Monolithic Ceramics”, SAE Paper No.2010141,2001.

4.        Domingo, N. and Graves R.L“A study of Adiabatic Engine Performance”, on National Laboratory report under preparation (2003).

5.        W. Bryzik and R.Kamo,‟‟ TACOM/Cummins adiabatic engine program „‟ SAE 830314.

6.        R.KAMO and W. BRYZIK,‟‟Cummins / TACOM advanced adiabatic engine program‟,  SAE 840428.

7.        F.J. Wallance, T.K. kao, M. Tarabad, W.D. alexander, and A. Cole, “Thermally insulated diesel engine” proc. Of the institution of Mech.Engg., Vol 198, No.:5,97-105

8.        T. Morel, E.F Fort and P.M Blumberg “Effect of insulation strategy and design parameter of diesel engine heat rejection and performance”, SEA 850506

9.        C.C.J. French, “ceramics on reciprocating internal combustion engine” SEA 841135

10.     M. Arunachalam, “investigations on the performance of a diesel engine with ceramic  thermal barrier coating on parts of the combustion chamber surface”,proc. Of the QIP short term Course on recent developments in I.C, engines, IIT, madras, 1988.

11.     C.M.Varaprasad, M.V.S.Muralikrishna , K.Sudhakarareddy and C.Prabhakara Reddy : ”Third Asian- Pacific International Symposium on Combustion and Energy Utilization ,Hongkong”,December 2000.




Zareen J. Tamboli, S.R.Khot

Paper Title:

Estimated Analysis of Radial Basis Function Neural Network for Induction Motor Fault Detection

Abstract:    Faults in induction motors may cause a system to fail. Hence it is necessary to detect and correct them before the complete motor failure. In the paper, induction motors faults are studied and detected with the use of Radial basis function neural network. Radial Basis Function is trained and tested in this paper. Simple parameters like set of currents are taken as an input and fed to a Radial basis Function Neural Network. The comparison of different Radial Basis Functions is shown in this paper.

   Currents,  Faults,  Induction Motors, Radial Basis Function, Neural Network


1.       Ching Cheng Lee, Pau-Choo Chung, Jea-Rong Tsai and Chein-I-Chang, “Robust Radial Basis Function Neural Networks”,IEEE, Cybernetics, vol 29, No.6, December 1999
2.       Vilas N. Ghate and Sanjay V. Dudul, “Cascade Neural-Network-Based Fault Classifier for Three-Phase Induction Motor”, vol. 58, no. 5, May 2011

3.       Sitao Wu and Tommy W. S. Chow “Induction  Machine Fault Detection Using SOM-Based RBF Neural Networks”  vol. 51, no. 1, February 2004

4.       K. Gulez, B. Karlik, S. Vakkas Ustun, “Designing Artificial Neural Networks for Fault Detection in Induction Motors with the TMS320C30 DSP”, ESIEE, Paris   September 1996 SPRA333.

5.       Giovanni Betta, Consolatina Liguori, and Antonio Pietrosanto, “An Advanced Neural-Network-Based Instrument Fault Detection and Isolation Scheme” vol. 47, no. 2, April 1998

6.       Hao Yu,”Advantages of Eadial Basis Function Networks for Dynamic System Design”, IEEE, vol 58, no. 12, December 2011

7.       Hyun Cheol Cho, Jeremy Knowles, M. Sami Fadali and Kwon Soon Lee, “Fault Detection and isolation of Induction Motors using Recurrent Neural Networks and
Dynamic Bayesian Modeling” vol 18, no.2, march 2010

8.       Pablo Serrano, Antonio Zamarró, Arturo Hernandez, Alberto Ochoa, “Artificial Neural Networks for Diagnosing Stator Induction Motor Faults”, Mexico 

9.       Jarmo Lehtonen Heikki N. Koivo  “Fault Diagnosis of Induction Motors with Dynamical Neural Networks”  Helsinki University of Technology Espoo, Finland

10.     Matlab Artificial Neural Network toolbox

11.     Matlab Radial basis function toolbox

12.     Rudra Narayan Dash, “Fault diagnosis in induction motor using soft computing techniques”,National Institute of technology, Rourkela




Lamia Bouchhima, Mohamed Jamel Rouis, Mohamed Choura  

Paper Title:

Engineering Properties of Wade Sand-Lime-Cement-Phosphogypsum Building Brick Grade MW

Abstract:    This study concerns the analysis of wade sand -natural hydraulic lime-cement-phosphogypsum (WS-NHL-C-PG) solid bricks grade MW. In Tunisia, for several years, a set of phosphoric acid production factories have produced a waste product such as phosphogypsum (PG) in large quantities (approximately 10 million tons per year). Currently, in Sfax (Center-East of Tunisia), the PG is stored into piles in the vicinity of the factory, by dry or wet process. The storage of PG, even though presenting a low radioactivity, causes pollution to the water table and to the soil (due to the infiltration of acid and heavy metals). After treatment, the Tunisian PG was presented in the full bricks with different mass percentages of 60, 70 and 80%. The study involved physical, chemical, mechanical and environmental tests on the obtained bricks.The obtained results showed that WS-NHL-C-PG bricks successfully satisfied the standard requirements of bricks grade MW. Notwithstanding the techno-economic virtues, phosphogypsum-based bricks comply with the criteria for environmentally friendly products manufactured with industrial by-product and the manufacturing process is totally energy conservative.

   hosphogypsum; Full brick grade MW; strength; Durability


1.       Rutherford PM, Dudas MI, Samek RA. Envir nmental impacts of phosphogypum. Sci Total Environ. 149 199(4).pp.1–38.
2.       Sfar Felfoul H, Clastres P, Carles GA, Ben Ouezdou M. Proprietes et perspectives d’utilisation du phosphogypse l’exemple de la Tunisie. In: Proceeding of the international symposium on environmental pollution control and waste management ‘‘EPCOWM”, Hammamet, Tunisia, vol. I, (2002),  pp. 510–20, [in French].

3.       Singh M. Treating waste phosphogypsum for cement and plaster manufacture. Cem Concr Res. 32/7, (2002), pp. 1033–8,

4.       Singh M. Effect of phosphatic and fluoride impurities of phosphogypsum on the properties of selenite plaster. Cem Concr Res. 33/9, (2003), pp. 1363–9.

5.       Singh M. Role of phosphogypsum impurities on strength and microstructure of serenity plaster. Constr Build Mater 19/6, (2005), pp. 480–6.

6.       Mullins GL, Mitchell CC. Wheat forage response to tillage and sulfur applied as PG. In: Proceedings of the third international symposium on PG, Orlando, USA, vol. I. Publication FIPR no. 01-060-083; (1990). pp. 362–75.

7.       Potgieter JH, Potgieter SS, McCrindle RI, Strydom CA. An investigation into the effect of various chemical and physical treatments of a South African phosphogypsum to render it suitable as a set retarder for cement. Cem Concr Res. 33 (2003), pp. 1223–7.

8.       Altun IA, Sert Y. Utilization of weathered phosphogypsum as set retarder in Portland cement. Cem Concr Res. 34, (2004), pp. 677–80.

9.       Kacimi L, Simon-Masseron A, Ghomari A, Derriche Z. Reduction of clinkerization temperature by using phosphogypsum. J Hazard Mater.  B137, (2006). pp. 129–37.

10.     Degirmenci N, Okucu A, Turabi A. Application of phosphogypsum in soil stabilization. Build Environ. 42, (2007).pp. 3393–8.

11.     Sunil K. Fly ash-lime-phosphogypsum hollow blocks for walls and partitions. Building and Environment; 38, (2003). pp. 291-295.

12.     Abalı YK, Yurdusev MA, Zeybek MS, Kumanlıog˘lu AA. Using PGe and boron concentrator wastes in light brick production. Constr Build Mater. 21, (2007). pp. 52–6.

13.     Karray MA, Mensi R. Etude de la Deformabilite des Poutrelles en Beton Arme a base du Ciment Ultimax. Ann Batiment Travaux Publics 2, (2000),  pp. 5–14 [in French].

14.     Charfi FF, Bouaziz J, Belayouni H. Valorisation du phosphogypse de Tunisie en vue de son utilisation comme substituant au gypse naturel dans la fabrication du ciment. Dechets Sci Tech. 20, (2000)  pp. 24–32, [in French].

15.     Moussa D, Crispel JJ, Legrand CL, Thenoz B. Laboratory study of the structure and compactibility of Tunisian phosphogypsum (Sfax) for use in embankment construction. Resour Conserv. 11/2, (1984)  pp. 95–116, [in French].

16.     Kuryatnyk T, Angulski da Luz C, Ambroise J, Pera J. Valorization of phosphogypsum as hydraulic binder. J Hazard Mater. 160/2–3, (2008), pp. 681–7.

17.     Sfar Felfoul H. Etude du phosphogypse de Sfax (Tunisie) en vue  d’une valorisation en technique routiere. PhD thesis, Department of Civil Engineering, National Engineering School of Tunis/INSA Toulouse; 2004.

18.     Sfar Felfoul H, Clastres P, Carles GA, Ben Ouezdou M. Amelioration des caracteristiques du phosphogypse en vue de son utilisation en technique routiere. Dechets Sci Tec 28, (2002), pp. 21–5 [in French].

19.     Marcelo CT, Alexandre BP. The use of cement stabilized phosphogypsum mixes in road construction. In: Proceedings of the international geotechnical and geological engineering. GeoEng 2000, Mellourne, Australia; November (2000), pp.19–21.

20.     Degirmenci N. Utilization of phosphogypsum as raw and calcined material in manufacturing of building products. Constr Build Mater. 22/18, (2008), pp. 57–62.

21.     Ahmadi BH. Use of high strength by product gypsum bricks in masonry construction. PhD dissertation, University of Miami, Coral Gables, Florida, USA. (1989) 245p.

22.     AFNOR. Lixiviation – Essai de conformite pour Lixiviation des dechets fragmentes et des boues. NF EN 12457-3; 2002 [in French].

23.     Deboucha S, Hashim R, Aziz AA. Engineering properties of cemented peat bricks Scientific Research and Essays Vol. 6/8, (2011), pp. 1732-1739.

24.     ASTM international: C62-08, Standard specification for building brick: Solid Masonry Units Made from Clay (2008) 4p




V. V.Govind Kumar, K. Venkata Reddy, Deva Pratap

Paper Title:

Updation of Cadastral Maps Using High Resolution Remotely Sensed Data

Abstract:    A cadastral map shows the boundaries of all land parcels on large scale maps together with the village registers which contains the ownership,land use andarea details.Updating the cadastral information is very essential so that transformations/changes of ownership of parcels etc. can be recorded in an orderly manner for documentation and further use. Presently, the cadastral maps are being updated with high resolution remotely sensed imageries using Geographical Information Systems (GIS) and Global Positioning System (GPS).Present paper discusses the updation of the geospatial information and quantification of the accuracy of the geo-referenced cadastral map of Venkatapuram village of Thorrour mandal, Warangal District, Andhra Pradesh, India. After mosaicing the Google Earth downloaded imageries of the study area, rectification of has been carried out using SOI toposheets. Vectorised cadastral map is prepared in the GIS environment using the scanned cadastral map of the study area and registered using Ground Control Points (GCPs) collected from GPS instrument.The features of cadastral map are updated by superimposing the vectorised cadastral map on the rectified imagery of the study area.  The accuracy assessment of the vectorised cadastral map has been carried out. From the observation of mean percentage deviation, standard percentage deviation and parcel area deviation, it is seen that large area parcels have more accurate and less distortion than small area parcels. The methodology presented in this paper is useful to update the cadastral maps with low to medium accuracy.

   GIS, GPS, Google Earth High Resolution Imageries, Cadastral Map Updation.


1.       Masahiro, Y., Murai, S. 2000 Accuracy Assessment an improvement for level survey using Real Time Kinematic(RTK) GPS. Indian Society of Geomatics.
2.       Murthy, K.Y.V.N., Rao, S.S., Srinivasan, D.S. and Adiga, S. 2000a. Land information System (LIS) for rural development. Technical proceedings, Geomatics.

3.       Murthy, K.Y.V.N., Rao, S.S., and Adiga, S. 2003. Digital Basemap generation using High Resolution Satellite Data and GPS. Indian Society of Geomatics News Letter, March 2003.

4.       Rao, D.P., Navalgund, R.R. and Murthy, K.Y.V.N.1996. Cadastral Applications using IRS 1C data.Indian society of geomatics, 70, pp. 624-628.

5.       Rao, S.S., Murthy, K.Y.V.N., Pandit, D.S. and Rajender, C.K. 2003“Precision product generation using satellite data and GPS based ground control points, Indian society of Geomatics.

6.       Raju, K.N.P., Kumar, S., and Mohan, K 2008 Urban cadastral mapping using very high resolution remote sensing data.journal of the Indian Society of Remote Sensing, vol36, pp.283-288.

7.       Raghavendran, S.2002. Cadastral mapping and land information system, Geospatial application paper

8.       Singh, R. B. 1998. Land Records Application of Modern Techniques in Preparation of Land Records. Shiva Publishers, Udaipur, pp. 42-57.




S.Govindaradjane, T.Sundararajan

Paper Title:

Performance and Kinetics of a Huasb Reactor for Treating Tapioca-Based Starch Industrial Waste Stream

Abstract:   In this paper, performance of a HUASB reactor for treating a tapioca-based starch industrial waste stream has been studied under six influent COD concentrations (ranging from about 1700-5800 mg/l) and five hydraulic retention times (HRTs) (ranging from 8 to 24 hours). The performance of HUASB reactor was evaluated based on COD removal (%) and bio-gas yield. Salient kinetic co-efficient of the HUASB reactor was determined by a modified-Monod based model and the dominant species in the sludge granules of the reactor was also identified. From an overall assessment, the better performance of HUASB reactor over the UASB reactor, for treating the above waste stream has been highlighted.

   HUASB and UASB reactors; Tapioca-based starch industrial waste stream; COD removal (%); Bio-gas yield; kinetic co-efficients and Performance evaluation.


1.       Annachhatre,A.P., Amatya,P.L., UASB treatment of tapioca starch wastewater, Jl. of Environmental Engg., ASCE, 126(12) : 1149 – 1152, Dec.2000
2.       APHA.2005. Standard Methods for the examination of water and wastewater, 21th Edition, APHA, USA.

3.       Aspasia.A, Chatzipaschali and Anastassios G. Stamatis, Biotechnological Utilization with a Focus on Anaerobic Treatment of Cheese Whey: Current Status and Prospects, 5: 3492-3525, 2012.

4.       Balasubramanian and Muthukumar, Performance of HUASB reactor for treating paper & Pulp wastewater using Effective Microorganism(EM), International Journal of Engineering Science and Technology, 4(6): June 2012.

5.       Cook, E.E., Kinecannon, D.F., Organic concentration and hydraulic loading versus total organic loading in evaluation of tricking filter performance, Water Sewage Works, 118(4)

6.       Coskun.T, H.A. Kabuk, K.B. Varinca, E. Debik, I. Durak, C. Kavurt, Antibiotic Fermentation Broth Treatment by a pilot upflow anaerobic sludge bed reactor and kinetic modeling, Bioresource Technology 121, 31–35, 2012.

7.       Fang,H.H.P., Kwong,T.S., Degradation of starch particulates in a hybrid reactor, Wat. Sci. Tech., 30(4) : 97-104, 1994

8.       Fang,H.H.P., Li,Y.Y., Chui,H.K., UASB treatment of wastewater with concentrated mixed VFA, Jl. of Environmental Engg., ASCE, 121(2) : 153 – 160, Feb,1995.

9.       Govindarajane, S.2006. Studies on Performance and Kinetics of UASB and HUASB Reactors for Treating Tapioca – based Starch Industrial Wastes Stream, Ph.D. Thesis submitted to Pondicherry University, Puducherry, India, pp, 164.

10.     Govindarajane. S, Sundrarajan.T, Sivasankaran.M.A and Nehru kumar.V .2010. Performance study of a HUASB Reactor for Treating Tapioca-Based Starch Industrial Waste Stream, Jl. pollution research 29 (1)

11.     Grady,C.P.L., Jr. and Willaims,D.R., Effect of influent substrate concentration on the kinetics of natural microbial populations in continuous culture, Water Research, 9 : 171 – 180, 1975.

12.     Ghangrekar,M.M., Asolekar,S.R., Ranganathan,K.R., and Joshi,S.G., Experience with UASB reactor start-up under different operating conditions, Water Science and Technology, 34(5-6) : 421 - 428, 1996.

13.     Guiot,S.R., and Van den Berg,L., Performance of an upflow anaerobic reactor combining a sludge blanket and a filter treating sugar waste, Biotechnol.Bioengg., 27 : 800-806,1984.

14.     Hampannavar, U.S, Shivayogimath C.B, Anaerobic treatment of sugar industry wastewater by upflow anaerobic sludge blanket reactor at ambient temperature, 1(4): 631-639, 2010.

15.     Hung, Y.T., Batch reactor activated sludge treatment of milk processing wastewaters, Process Biochem., 19 : 25 – 28, 1984.

16.     Hwang,S.H., Hansen,C.L., and Stevens,D.K., Biokinetics of an upflow anaerobic sludge blanket reactor treating whey permeate, Bioresource Technology, 41 : 223-230, 1992.

17.     Hwang,J.S., Jih,C.G., Lui,S.D., Ting,W.H., Process kinetics of UASB reactors, Jl. Of Chemical Technology & Biotechnology, 78(7): 762 – 772, July, 2003.

18.     Jayantha, K.S. and Ramnujam, T.K 1995. Applicability of upflow anaerobic sludge blanket (UASED) reactor for treatment of distillery spent wash, Indian J. Environ. Prot, 15(2):106-11.

19.     John Leju Celestino LADU, Xiwu LU, Martin K. LOBOKA, Experimental  Assessment on the Effect of OLR and HRT on the efficiency of  Anaerobic Filter Treating Abattoir, 2(11): 415-420, 2012.

20.     Karthikeyan,C., Sabarathinam,P.L., Biodegradation of cassava starch wastewater using UASB reactor, Journal of Industrial Pollution Control, 18(1) : 33-40, 2002.

21.     Kincannon,D.F., Stover, E.L., Biological treatability data analysis of industrial wastewaters, Proc. of the 39th Industrial Waste Conference, Purdue University, 637 – 643, 1984.

22.     Lettinga,G. and Hulshoff Pol.,L.W., UASB process design for various types of wastewaters, Water Science Technology, 24 : 87-107, 1991.

23.     Liu Chunshuang, Zhao Dongfeng; Guo Yadong; Zhao Chaocheng,  Performance and Modeling of an Up-flow Anaerobic Sludge Blanket (UASB) Reactor for Treating High Salinity Wastewater from Heavy Oil Production,14(3): pp 90-95, 2012.

24.     Rajesh,G., Bandyopadhyay,M., and Das,D., Some studies on UASB bioreactor for the stabilisation of low strength industrial effluents, Bioproc.Engg., 21 : 113-116, 1999.

25.     Routh,T., Anaerobic treatment of vegetable tannery wastewater by UASB process, Indian Jl. of Environmental Protection, 20(2) : 115 – 123, Feb. 2000

26.     Selvamurugan, M. Doraisamy, P. , Maheswari, M. and Nandakumar, N. B, Comparative Study on Startup Performance of UAHR and UASB Reactors in Anaerobic Treatment of Distillery Spentwash, International Journal of Environmental Research, 6(1): 235-244, 2012

27.     Shivayogimath.C.B, Ramanujam, T.K., Treatment of distillery spent-wash by hybrid UASB reactor, Bioprocess and Biosystems Engineering, 21(3) : 255 – 259, 1999.

28.     Suschka, J., Bio-oxidation in a continuous activated sludge process, Water Research, 14 : 197 – 205, 1980.

29.     Suneeth Kumar,S.M., Studies on the operation and performance of UASB reactor for the treatment of distillery spentwash, Ph.D. thesis, University of Roorkee, Roorkee, 1998.




B. Nagu,  M. Sydulu,   P.V. Ramana Rao

Paper Title:

Improvement of A C System Stability using Fuzzy Logic based HVDC Controls

Abstract:    In this paper, investigation is carried out for the improvement of power system stability by utilizing auxiliary controls for controlling HVDC power flow. The current controller model and the line dynamics are considered in the stability analysis. Transient stability analysis is done on a multi-machine system, where, a fuzzy logic controller is developed to improve the stability of the power system. The results show the application of the fuzzy controller in AC-DC power systems and case studied at different fault locations.

   HVDC, Power System Stability, Multi – Machine Stability, Fuzzy Logic controller


1.  P. Kundur, “Power System Stability and Control”, McGraw- Hill, Inc., 1994
2.  Garng M. Huang, Vikram Krishnaswamy, “HVDC Controls for Power System Stability”, IEEE Power Engineering Society, pp 597- 602, 2002.
3.  T. Smed, G. Anderson, “A New Approach to AC/DC Power Flow”, IEEE Trans. on Power Systems., Vol. 6, No. 3, pp 1238- 1244, Aug. 1991.
4.   K. R. Padiyar, “HVDC Power Transmission Systems”, New Age International (P) Ltd., 2004.
5.   Stagg and El- Abiad, “Computer Methods in Power System Analysis”, International Student Edition, McGraw- Hill, Book Company, 1968.
6.    P.M.Anderson and A.A.Fouad, Power System Control and Stability, 1st ed.,Iowa State University Press, 1977.
7.    V.S. Reddy, P.V.R Rao, “ Supplementary HVDC Controls for Multi-machine System Stability Improvement? IEEE (India) June 2008 vol.89
8.    Y.-Y. Hsu, C.-H. Cheng, “Design of fuzzy power system stabilizers for multi-machine power systems”, IEE Proceedings, Vol. 137, Pt. C, No. 3, May 1990




Omprakash Gawali, Ketan Pandurang Kale, Mahesh Sanjay Gund, Ganesh Balasaheb Gaware

Paper Title:

Communication In USB’S For Data Transfer

Abstract:    The system enables data sharing between mobile and pen drive directly without using computer or laptop. An arm processor is interfaced USB and USB host controller. Latest mobile phones have got memory capacities GB’s and can be connected computers. These mobile phones have capability to get connected to the internet. The mobile phones have the additional features like camera, mp3, multimedia A/V, etc. A large amount of data is handled through mobiles. The system will enable data sharing between mobile, pen drive, digital camera and the device having USB interface. This will eliminate need of an intermediate computer and thus save time and power.

   USB, GB’s, MP3, A/V.


1. [site], “USB Flash Drives, USB Memory and Portable Computer Hard DriveInformation,” [online] Available:, July 1, 2009.
2.       J. Axelson, “USB COMPLETE Second Edition,” Madison, WI: Lakeview Research LLC.

3.       D. Anderson, D. Dzatko, “Universal Serial Bus System Architecture,” MindShare, Inc.

4.       Mazidi Muhammad “8051 Microcontroller and Embedded Systems Third Edition”.









C. Rajakannan, S. Govindaradjane, T. Sundararajan

Paper Title:

Bio – Medical Waste Management in Pondicherry Region: A Case Study

Abstract:    Health Care Establishments (HCEs) generate biomedical waste (BMW), 15 – 35% of which are ‘hazardous and toxic’. In spite of existence of regulatory mechanisms for handling etc., the ground reality is far from satisfactory, in India. There is a need to assess the actual practices that are followed in HCEs in all major cities and towns. In this study BMW handling and management in HCEs located in Pondicherry, India has been investigated. It was found that the importance of ‘segregation’ of waste has been realized by hospital staff. Further, HCEs in the region has been practicing one of the three methods (i.e. autoclaving, incineration and microwave irradiation) of treatment of BMW. A novel and low cost treatment of BMW has been proposed and implemented in private hospitals, Pondicherry as a case study. The results are very encouraging and cost effective.

   BMW, low cost treatment method, assessment of quantity, neem and tobacco extract, management of BMW


1.       Gautam V, Thapar R, Sharma M (2010) Biomedical waste management: Incineration Vs environmental safety, Indian Jl of Medical Microbiology, 28: 191-192.
2.       Goddu V K, Duvvuri K and Bakki V K (2007) A critical analysis of healthcare waste management in developing countries: Case studies from India and England. Proc. of the Intl. Conference on Sustainable Solid Waste Management, Chennai, India, Sep. 5-7, pp. 134-141.

3.       Government of India (GoI), Ministry of Environment and Forests (MoEF), Bio-Medical Waste (Management and Handling) Rules, 1998 and Bio-Medical waste (Management and Handling) (Amendment) Rules, 2003.

4.       Government of India (GoI), National Guidelines on Hospital Waste Management Based upon the Bio-Medical Waste (Management & Handling) Rules.

5.       Jayanthi S and Sarojini E (2010) Destruction of pathogens in infectious BMW using lime and neem (Azadirchta indica).

6.       Katoch S S (2007) Biomedical waste classification and prevailing management strategies, Intl Conference on Sustainable Solid Waste Management, Chennai, India, Sep. 5-7, pp 169-175.

7.       Mohanasundram V (2003) The environmental implications and economic issues in biomedical waste management in urban Coimbatore Tamil Nadu, India, Proc. of the Third Intl. Conference on Environment and Health, Chennai, India, Dec.15-17, pp 270-275.

8.       Pandey A and Gundevia H S (2008) Role of the fungus-Periconiella sp. in destruction of biomedical waste. Journal of Environ,Science & Engg., 50(3): 239-240.

9.       Patil G V and Pokhrel K (2005) Biomedical solid waste management in Indian hospital: A case study, Waste Management (25): 592-599.

10.     Pandit N A, Tabish S A, Qadri G J and Ajaz Mustafa (2007) Biomedical waste management in local teaching hospital, JK- Practitioner, 14(1): 57-59 (Jan-Mar.).

11.     Pondicherry Pollution Control Committee (PPCC) 2006, ENVINS, Project Report, 2(3): 1-13 (July - Sep).

12.     Rao S K M, Ranyal, R K Bhatia S S and Sharma V R (2004) Biomedical waste management: An infrastructural survey of hospitals, Medical Journal of Armed Forces of India (MJAFI), 60(4): 379-382.

13.     Radha K V, Kalaivani K, Lavanaya R (2009) A case study of biomedical waste management in hospitals, Global Journal of Health Science, 1(1): 82-88 (April)

14.     Rasmussen C D and Charowsky (2009) Treatment of biomedical waste with Ozone.

15.     Sarojini E, Jayanthi S, Jothi Venkatraman S and Prashanthini K (2007) Performance study on common biomedical waste treatment facility, Chettipalayam, Coimbatore. Proceedings of the International Conference on Sustainable Solid Waste Management, Chennai, India. pp 182-188.

16.     Shah H K and Ganguli S K (2010) Hospital waste management – A Review, Indian Jl of Community Medicine, 25(3): 136-137 (July – Sep.).

17.     Sharma S and Chauhan SVS (2008) Assessment of bio-medical waste management in three apex Government hospital of Agra, Jl. of Environmental Biology, 29(2): 159-162 (Mar.).

18.     Sheth K N and Desai P H (2006) Characterization and management of bio – medical waste in SAE hospital, Anand – A Case study, Electronic Jl. of Environmental Agricultural and Food Chemistry (ISSN: 1579-4377). 5(6): 1583-1589.

19.     Sreegiri S and Kirshnababu G (2009) Biomedical waste management in a tertiary level hospital in Visakhapatnam. Jl. of Community Medicine, 5(2): 1-6 (Jul-Dec.)

20.     Yadavannavar M C, Berad A S and Jagirdar P B (2010) Biomedical waste management: A study of knowledge, attitude and practices in a Tertiary Health care institution in Bijapur, Indian Jl. of Community Medicine, 35(1): 170-171 (Jan.).




Amritpal Kaur, Sandeep Singh

Paper Title:

Classification and Selection of Best Saving Service for Potential Investors using Decision Tree – Data Mining Algorithms

Abstract:    This research delineates a comprehensive and successful application of decision tree induction to large banking data set of different banking services obtained by numbers of customers. Complex interaction effects among banking services that lead to increased policy variability have been detected. The extracted information has been confirmed by the database managers, and used to improve the decision process. The research suggests that decision tree induction may be particularly useful when data is multidimensional, and the various process parameters and highly complex interactions. In order to classify and identify effective and beneficial saving service and design the appropriate criteria for selecting the right scheme for different persons having different taste, this study developed a data mining framework for analyzing banks and post office data, in which suitable[1] technique is employed to extract rules between present saving schemes. In other words, the objectives of this thesis are
•      To classify the available saving services of banks and post office to good, medium and bad level.

•      To select the best saving service according the investor’s choice and its preference.

•      To guide the potential investor to invest his money in the particular scheme so as to get more benefits.

•      To help to take the right decision for investment.

•      To reduce the time to take particular decision as there will be no need to analyze each and every available investment scheme thoroughly.

   CHAID, C4.5, cluster, data mining, decision tree induction, ID3.


1.       Alex Berson, Data Warehousing, Data Mining & OLAP, pp. 351.
2.       Gu Xiang, A Synthesized Data Mining Algorithm Based on Clustering and Decision Tree. New York: Springer-Verlag, 1985, ch. 4.

3.       B. Smith, “An approach to graphs of linear forms (Unpublished work style),” unpublished.

4.       E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

5.       J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical style—Submitted for publication),” IEEE J. Quantum Electron., submitted for publication.

6.       C. J. Kaufman, Rocky Mountain Research Lab., Boulder, CO, private communication, May 1995.

7.       Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces(Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

8.       M. Young, The Techincal Writers Handbook.  Mill Valley, CA: University Science, 1989.

9.       (Basic Book/Monograph Online Sources) J. K. Author. (year, month, day). Title (edition) [Type of medium]. Volume(issue).    Available: http://www.(URL)

10.     J. Jones. (1991, May 10). Networks (2nd ed.) [Online]. Available:

11.     (Journal Online Sources style) K. Author. (year, month). Title. Journal [Type of medium]. Volume(issue), paging if given.           Available: http://www.(URL)

12.     R. J. Vidmar. (1992, August). On the use of atmospheric plasmas as electromagnetic reflectors. IEEE Trans. Plasma Sci. [Online]. 21(3).




Santosh Kumar Bharti, Shashi Kant Dargar, Abha Nyati

Paper Title:

Energy-Aware Performance Evaluation of WSNs using Fuzzy Logic

Abstract:    Wireless Sensor Networks (WSNs) are being used to form large, dense networks for the purpose of long term environmental sensing and data collection. Unfortunately, these networks are typically deployed in remote environment where energy source are limited.  WSN’s, present a new generation of real-time embedded systems with limited computation, energy and memory resources that are being used in a wide variety of applications where traditional networking infrastructure is practically infeasible. Appropriate cluster-head node election can drastically reduce the energy consumption and enhance the lifetime of the network. In this paper, a fuzzy based energy-aware sensor network communication protocol is developed based on three descriptors - energy, concentration and centrality. Further we have to compared fuzzy based approach with other popular protocol LEACH and improved hierarchy scheme DBS. Simulation shows that depending upon network configuration, a substantial increase in network lifetime can be accomplished as compared to probabilistically selecting the nodes as cluster-heads using only local information.

   Wireless Microsensor networks, LEACH, cluster head election, distance based Segmentation, Fuzzy C-Mean Algorithms.


1.       W. Heinzelman, A. Chandrakasan and H.Balakrishnan, “Energy-efficient comm. protocol for wireless micro sensor networks,” in Proc. of the 33rd Annual Hawaii International Conference on System Sciences (HICSS), Maui, HI, Jan. 2000, pp. 3005 – 3014.
2.       W. Heinzelman, A. Chandrakasan and H. Balakrishnan, “An application-specific protocol architecture for wireless micro sensor networks,” in IEEE Transactions on Wireless Communications, Oct. 2002, pp. 660 -670.

3.       N. Amini, M. Fazeli, S.G. Miremadi, M.T. Manzuri, “Distance Based Segmentation: An Energy-efficient clustering Hierarchy for wireless sensor networks” IEEE fifth Annual conference on Communication Networks and Service Research (CNSR’07),2007

4.       Q. Liang, “Cluster head election for mobile ad hoc wireless network,” in Proc. 14th IEEE International Symposium on Personal, Indoor and Mobile Radio Comm. (PIMRC), Sept. 2003, pp. 1623 -1628.

5.       S. Hammadi and C. Tahon, “Special issue on intelligent techniques in flexible manufacturing systems,” in IEEE Transactions on Systems, Man and Cybernetics, May 2003, pp. 157 - 158.

6.       B. Warneke, M. Last, B. Liebowitz and K.S.J. Pister, “Smart Dust: communicating with a cubic-millimeter computer,” IEEE Computer, Jan. 2001, pp. 44 - 51.

7.       E. Cayirci, “Data aggregation and dilution by modulus addressing in wireless sensor networks,” IEEE Comm. Letters, Aug. 2003, pp. 355 – 357.

8.       C. Chee-Yee and S.P. Kumar, “Sensor networks: evolution, opportunities, and challenges,” in Proc of the IEEE, Aug. 2003, pp.1247 - 1256.

9.       M. Negnevitsky, Artificial intelligence: A guide to intelligent systems, Addison-Wesley, Reading, MA, 2001.

10.     M.J. Handy, M. Haase and D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in Proc. 4th International Workshop on Mobile and Wireless Communications Network, Sept. 2002, pp. 368 - 372.




Chinar Regundwar, Navnath Rahinj, Priti Rayrikar, Shashikant Bhosale, Navnath D. Kale

Paper Title:

Call Log, Message and Camera Monitoring System over Android

Abstract:    There are limitations on storage of call and message logs as well as images in mobile phone memory. Android usually keeps a history of the 500 latest calls and any calls older than that are automatically deleted from the phone. We cannot see the records of deleted messages and cannot restore them same in case of images. If your data is corrupted then all of your messages may get lost so there is need of an application that could keep records of all call logs, messages and camera images at storage other than phone here we propose to develop a mobile application for android phones. This application Server will store information for further use. So user can save unlimited call logs, messages telephony activities in phone (E.g. Calls, Messaging & Camera). On occurrence of such activity it will collect information about activity (e.g. caller, call date, time, message content or image) and send it to server. And camera images and can see anytime, from anywhere by login remotely from his mobile.

   Android, data is corrupted, call logs, Messages, Camera Images, Application Server, telephony activity.


2.        A.Chervenak, V. Vellanki, and Z.kurmas, Protecting File Systems: A Survey of Backup Techniques. Proceeding Joint NASA and IEEE Mass Storage 1998.

3.        BELL, T. C., CLEARY, J. G., AND WITTEN, I. H. Text Compression. Prentice Hall, Upper Sadle River, NJ, 1990.

4.        SAYOOD, K. Introduction to Data Compression. Academic Press, San Diego, CA, 1996, 2000.


6. providers.html


8.        Professional Android 4 Application Development –Reto Meier

9.        PROF. R. C. Dharmik, Sangharsha B. Lanjewar, New Approach For Time Efficent Backup and Restore on on-line Server using Android Platform-IOSR Journal of Engineering Mar. 2012, Vol. 2(3) pp: 433-436




Kuldeep B. Shukla, Hetal N. Rao, Arjun H. Joshi

Paper Title:

Implementation of ATM Algorithm through VHDL

Abstract:    ATM (automatic teller machine) is a very essential tool required for the society in order to facilitate the need of safe transaction of money. Using this facility one can easily perform the various functions such as balance inquiry, withdrawn, money transfer etc. As this machine operation rely on bank cards, proper password, enough amount of money in one’s account, certain verification and identification methods etc. It needs to be secure and having integrity of fine level right to its coding stage for optimum utilization of the service. In order to meet such requirements the coding languages used for it are modified here. The conventional coding styles using ‘C’ and/or ‘C++’ are replaced by the VHDL code language so that the attacker cannot easily crack the security levels. In this article, the code composed of VHDL language is suggested for this purpose of security.

   Automatic Teller Machine (ATM), VHDL, Krypton Board, Integrity, Security Level.


1.       Yingxu Wang and Yanan Zhang, “The Formal Design Model of an Automatic Teller Machine (ATM)” University of Calgary, Canada, International Journal of Software Science and Computational Intelligence, 2(1), 102-131, January-March 2010.
2.       Mike Bond, Omar Choudary, Steven J. Murdoch, Sergei Skorobogatov, and Ross Anderson, “Chip and Skim: cloning EMV cards with the pre-play attack”. Computer Laboratory, University of Cambridge, UK.

3.       Beginner’s Guide to Xilinx Spartan-3E FPGA Starter Kit Board (Revision 2), By Nick Desaulniers and Cody Cziesler, RIT Department of Computer Engineering, 5/5/11.

4.       Pong P. Chu "RTL Hardware Design Using VHDL, Coding For Efficiency, portability and Scalability", Willy Interscience a john wilay & sons, inc., Publication, pp no:23-160.

5.       Avenet Avenue, user’s guide, Xilinx® Spartan™-3 Development Kit.

6.       Stanley MAZOR and Patricia LINGSTRAAT, "A guide to VHDL (2nd Edition)", copyright 1993, Kluwer Achedamic Publishers, pp no: 1-1 to 7-16.

7.       Peter J. Ashenden and Jim Lewis, "The Designer's Guide to VHDL (3rd Edition)" copyright 2008, Morgan KJaufmann Publication, pp no: 207-225.






Priyanka Korde, Vijay Panwar, Sneha Kalse

Paper Title:

Securing Personal Health Records in Cloud using Attribute Based Encryption

Abstract:    This paper presents the design and implementation of Personal Health Records and providing security to them while they are stored at third party such as cloud. Personal Health Record is web based application that allows people to access and co-ordinate their lifelong health information. The patient have control over access to their own PHR. To achieve security of personal health records we use the attribute based encryption to encrypt the data before outsourcing it. Here we focus on multiple types of PHR owner scenario and division of personal health records users into multiple security domains which reduce key management complexity for owners and users. A high degree of patient’s privacy is guaranteed. Our scheme gives personal health record owner full control of his/her data. Extensive security and performance analysis shows that the proposed scheme is highly efficient.

Keywords:   personal health records, attribute based encryption, cloud computing, secure sharing


1.        M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept.2010, pp. 89–106.
2.        H. L¨ohr, A.-R. Sadeghi, and M. Winandy, “Securing the e-health cloud,” in Proceedings of the 1st ACM International Health Informatics Symposium, ser. IHI ’10, 2010, pp. 220–229.

3.        M. Chase and S. S. Chow, “Improving privacy and security in multi-authority attribute-based encryption,” in CCS ’09, 2009, pp.121–130.

4.        S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in ASSIACCS’10, 2010.

5.        S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in IEEE INFOCOM’10, 2010.

6.        A. Boldyreva, V. Goyal, and V. Kumar, “Identity-based encryption with efficient revocation,” in ACM CCS, ser. CCS ’08, 2008, pp.417–426.

7.        J. Hur and D. K. Noh, “Attribute-based access control with efficient revocation in data outsourcing systems,” IEEE Transactions on Parallel and Distributed Systems, vol. 99, no. PrePrints, 2010.

8.        S. Ruj, A. Nayak, and I. Stojmenovic, “Dacc: Distributed access control in clouds,” in 10th IEEE TrustCom, 2011.

9.        J. Bethencourt, A. Sahai, and B. Waters,“Ciphertext-policy attribute-based encryption,” in IEEE S& P ’07, 2007, pp. 321–334.

10.     Melissa Chase “Multi-authority Attribute based Encryption,” Computer Science Department Brown University Providence, RI 02912




Ali Trabelsi, Mohamed-Ali Rezgui And Smain Bezzina

Paper Title:

Assessment of the Tensile Elongation (E %) And Hardening Capacity (Hc) Of Joints Produced In Friction Stir Welded 2017 Aa (Enaw-Alcu 4mgsi) Plates

Abstract:    The study has aimed at investigating the leverage of three Friction Steer Welding (FSW) factors, namely, the tool rotation speed N(rpm), the tool traverse rate F( and the tool pin/shoulder diameters ratio r (%) on two FSW process responses: the joint tensile elongation (E%) and hardening capacity (Hc). For the experiment appraisal, 18 tested coupons have been cut in 6mm thick rolled plates of 2017 A alloys. Variation in the responses estimates has been assessed by conducting a Face-Centered Central Composite Design (FCCD) strategy and Anova Technique. Then, a second-order RSM model has been considered to describe the predictive formulation of the responses (E%) and (Hc), appropriately. Thereby, the multi-regression models pertaining to (E%) and (Hc) were built and analyzed for factors leverage and sensitivity. Lastly, a simultaneous optimization procedure based on the desirability function was employed to find out the levels setting of factors N, F and r% which guarantees maximum (E%) and (Hc), concurrently. At 95% of C.I., the research findings have pointed out the leverage of the tool geometry factor (r %) as well as the rotation speed (N) on the FSW process responses (E%) and (Hc). However, the process was found robust with respect to the tool traverse rate parameter (F).

   F.S.W., R.S.M., Taguchi, ANN, Genetic Algorithms, Ductility, Tensile elongation, Hardening capacity, 2017 AA.


1.        W. M. Thomas, E. D. Nicholas, J. C. Needham, M. G. Murch, S. P. Temple, C. J. Dawes, "Improvements relating to friction welding," G. B. Patent No. 9125978. 8, 1991.
2.        M. P. Milles, B. J. Decker, T. W. Nelson, "Formability and strength of friction-stir-welded aluminum sheets," Metallurgical And Materials Transactions, Vol. 35A, pp. 3461-3468, 2004.

3.        D. M. Rodrigues, A. Loureiro, C. Leitao, R. M. Leal, B. M. Chaparro, P. Vilaça "Influence of friction stir welding parameters on the microstructural and mechanical properties of AA6016-T4 thin welds", Materials and Design, Vol. 30, pp. 1913-1921, 2009.

4.        R. S. Mishra, Z. Y. Ma, "Friction stir welding and processing", Mater. Sci. Engr., R 50, pp. 1-78, 2005.

5.        R. Rai, A. De, H. K. D. H. Bhadeshia, T. DebRoy, "Review: friction stir welding tools", Science and Technology of Welding and Joining,Vol 16, pp. 325-342, 2011

6.        R. Nandan, T. DebRoy, H. K. D. H. Bhadeshia, "Recent advances in friction-stir welding–Process, weldment structure and properties," Progress in Materials Science, Vol.53,pp. 1913-1921, 2008.

7.        T. P. Chen, W.-B. Lin, "Optimal FSW process parameters for interface and welded zone toughness of dissimilar aluminum–steel joint", Science and Technology of Welding and Joining, Vol. 15, pp. 279-285, 2010.

8.        G. H. Payganeh, N. B. Mostafa Arab, Y. Dadgar Asl, F. A. Ghasemi, M. S. Boroujeni, "Effects of friction stir welding process parameters on appearance and strength of polypropylene composite welds", International Journal of the Physical Sciences, Vol. 6, pp. 4595-4601, 2011.

9.        J. Q. Li, H. J. Liu, "Effects of tool rotation speed on microstructures and mechanical properties of AA2219-T6 welded by the external non-rotational shoulder assisted friction stir welding", Materials and Design, Vol. 43, pp. 299-306, 2013.

10.     A. Razal, K. Manisekar, V. Balasubramanian, "Influences of welding speed on tensile properties of friction stir welded AZ61A magnesium alloy", Journal of Materials Engineering and Performance, Vol. 21, pp. 257-265, 2012.

11.     S. Lim, S. Kim, C. Lee, S. Kim, "Tensile behavior of friction-stir-welded Al6061-T651", Metallurgical and Materials Transactions, Vol. 35A, pp. 2829-2835, 2004.

12.     K. Elangovan, V. Balasubramanian, "Influences of pin profile and rotational speed of the tool on the formation of friction stir processing zone in AA2219 aluminum alloy, "Materials Science and Engineering A, Vol. 459, pp. 7-18, 2007.

13.     S. Rajakumar, C. Muralidharan, V. Balasubramanian, "Influence of friction stir welding process and tool parameters on strength properties of AA7075-T6 aluminum alloy joints, "Materials and Design, Vol. 32, pp. 535-549, 2011.

14.     B. Parida, M. Mohapatra, P. Biswas, N. R. Mandal, "Study of mechanical and micro-structural properties of friction stir welded Al-alloy", International Journal of Emerging Technology and Advanced Engineering, Vol. 2, pp. 307-312,  2012.

15.     C. Bitondo, U. Prisco, A. Squilace, P. Buonadonna, G. Dionoro, "Friction-stir welding of AA 2198 butt joints: mechanical characterization of the process and of the welds through DOE analysis", Int. J. Adv. Manuf. Technol., Vol. 53, pp. 505-516, 2011

16.     H. K. Mohanty, D. Venkateswarlu, M. Mahapatra, N. R. Kumar, "Modeling the effects of tool probe geometries and process parameters on friction stirred aluminium welds", Journal of Mechanical Engineering and Automation, Vol. 2, pp. 74-79, 2012.

17.     S. Rajakumar, C. Muralidharan, V. Balasubramanian, "Establishing empirical relationships to predict grain size and tensile strength of friction stir welded AA 6061-T6 aluminum alloy joints", Trans. Nonferrous Met. Soc. China, Vol.20, pp. 1863-1872, 2010.

18.     S. Rajakumar, V. Balasubramanian, "Multi-response optimization of friction-stir-welded AA1100 aluminum alloy joints", Journal of Materials Engineering and Performance, Vol. 21, pp. 809-822, 2012.

19.     R. Palanivel, P. K. Mathews, N. Murugan, "Development of mathematical model to predict the mechanical properties of friction stir welded AA6351 aluminum alloy", Journal of Engineering Science and Technology Review, Vol. 4, pp. 25-31, 2011.

20.     A. K. Lakshminarayanan, V. Balasubranian, "Process parameters optimization for friction stir welding of RDE-40 aluminum alloy using Taguchi technique", Transaction of non-ferrous alloys of china, Vol. 18, pp. 548-554, 2008.

21.     S. Vagh, S. N. Pandya, " Influence of process parameters on the mechanical properties of friction stir welded AA2014-T6 Alloy using Taguchi orthogonal array", International Journal of Engineering Sciences & Emerging Technologies, Vol. 2, pp. 51-58, 2012.

22.     K. Brahma Raju, N. Harsha, V. K. Viswanadha Raju, "Prediction of tensile strength of friction steer welded joints using artificial neural networks", International Journal of Engineering Research & Technology, Vol. 1 pp. 1-5, 2012.

23.     N. Tansel, M. Demetgul, H. Okuyucu, A. Yapici, "Optimizations of friction stir welding of aluminum alloy by using genetically optimized neural network", Int. J. Adv. Manuf. Technol., Vol. 48, pp. 95-101, 2010.

24.     H. J. Liu, H. Fujii, M. Maedaa, K. Nogi, "Tensile properties and fracture locations of friction-stir-welded joints of 2017-T351 aluminum alloy", Journal of Materials Processing Technology, Vol. 142, pp. 692-6996, 2003.

25.     A. Mirjalil, H. J. Aval, S. Serajzadeh, A.H. Kokabi, "Microstructural evolution and mechanical properties of FSWed 2017 AA with different initial microstructures", Proceedings of Institution of Mechanical Engineers, Part L: Journal of Material Design and Applications, February 2013.

26.     M. Rezgui, A. Trabelsi, M. Ayadi, and H. Bouzaiene, "RSM Modeling for Predicting Ultimate Tensile Stress and Yield Stress in Friction Steer Welded Aluminum 2017 A", submitted to Trans. Nonferrous Mat. Soc. China, 2013.

27.     Douglas, C. Montgomery, "Design and Analysis of Experiments", Sixth Edition, John Wiley and Sons, Inc. 2005.

28.     G. Derringer, R. Suich, "Simultaneous optimization of several response variables", J. of Quality Technology, Vol. 5, pp. 469-479, 1980.




Abhinav Bhargava, Samrat Ghosh, Savan Kumar Oad

Paper Title:

A  Multi (U) Slotted Rectangular Micro-strip Multiband Patch Antenna

Abstract:    In this paper we present a proposed design for Rectangular micro-strip patch antenna by cutting U shaped slots in the Rectangular patch which operates at two central frequencies 1.8, 2.7GHz. Which is a new dual frequency microstrip antenna? By micro strip feeding technique proposed antenna design we find the resultant return loss, VSWR and bandwidth. For the design of the microstrip antenna we have used FR-4 substrates which have permittivity of 4.4 and thickness 3.2, loss tangent is 0.02. We are using FEKO simulation software for designing and analysis. We have observed that using slotted patch antenna and using micro strip at proper location we can get better return loss, VSWR bandwidth and multiband.

   Slotted Rectangular micro-strip patch antenna, return loss, VSWR, radiation pattern.


1.       G.Papitha, V. Thyagarajan and Ayshathul Fouzia,”Design and Simulation of Stacked Fractal Patch Antenna using IE3D” . International Conference on Computing and Control Engineering (ICCCE), 12 and 13 April 2012.
2.       John D Kraus, Ronald J Marhefka, Ahmed S Khan,” Antennas and Wave Propagation”. Tata McGraw Hill Education Private Limited New Delhi 2010.

3.       R. Garg and P. Bhartia, “Micro-strip Antenna handbook”. Boston Artech House 2001

4.       R.Q. Lee, K.F. Lee and J.Bobinchak,”Characterstics of a two layer electromagnetically coupled rectangular patch antenna”, Electron Lett. Vol. 23 no 20, pp 1070-1072, 1987

5.       Binu Paul, S. Mridula, C.K. Aanandan and P. Mohan. Microwave and optical technology letters/ vol33, no4, 4 may2002. 

6.       Constantine A. Balanis”Antenna Theory: Analysis Design” Third edition John Wiley & Sons, Inc 2005




E. Mohan, K.B. Jayarraman, U. Maheswaran, D. Sathiyaraj. G.Dhakshanamoorthi

Paper Title:

A Novel Approach for Satellite Image Resolution Enhancement

Abstract:    Image resolution is an important issue in satellite imaging. Wavelets play a significant role in multi resolution analysis. In this paper, a new resolution enhancement technique is proposed. This method is based on interpolation of the high frequency sub-bands which are obtained by performing Discrete Wavelet Transform (DWT) on input image. DWT separates the image in to different sub-band images namely, low-low (LL), low-high (LH), high-low (HL) and high-high (HH). Interpolation can be applied to these four sub-band images. In the wavelet domain, the low-resolution image is obtained by low-pass filtering of the high-resolution image. The low-resolution image (LL sub-band) is used as input for the proposed resolution enhancement process. The high frequency sub-bands contain the high frequency components of image .Interpolation is carried out using Adjacent pixel algorithm and Inverse Discrete Wavelet Transform(IDWT) has been applied to combine all these images to generate the final super-resolved image. This approach generates sharper and clearer image. The proposed technique has shown superiority over the conventional image resolution enhancement techniques.

   Adjacent Pixel algorithm, DWT (discrete wavelet transform), Image Enhancement, Interpolation, Adjacent Pixel algorithm.


1.        H. Demireland G. Anbarjafari, “Satellite image resolution enhancement using complex wavelet transform,” IEEE Geosci. Remote Sens. Lett, vol. 7, no. 1, pp. 123–126, Jan. 2010.
2.        Y. Piao, L. Shin, and H. W. Park, “Image resolution enhancement using Inter-sub-band correlation in wavelet domain,” in Proc. IEEE ICIP, 2007, vol. 1, pp. I-445–I-448.

3.        X. Li and M. T. Orchard, “New edge-directed interpolation,” IEEE Trans.Image Process., vol. 10, no. 10, pp. 1521–1527, Oct. 2001.

4.        C. B. Atkins, C. A. Bouman, and J. P. Allebach, “Optimal image scaling using pixel classification,” in Proc. ICIP, Oct. 7–10, 2001, vol. 3, pp. 864–867.

5.        G. Anbarjafari and H. Demirel, “Image super resolution based on interpolation of wavelet domain high frequency sub-bands and the spatial domain input image,” ETRI J., vol. 32, no. 3, pp. 390–394, Jun. 2010.

6.        H. Demirel, G. Anbarjafari, and S. Izadpanahi, “Improved motion-based localized super resolution technique using discrete wavelet transform for resolution video enhancement,” in Proc. 17th EUSIPCO, Edinburgh, U.K., Aug. 2009, pp. 1097–1101.

7.        A. Temizel and T. Vlachos, “Wavelet domain image resolution enhancement using cycle-spinning,” Electron. Lett, vol. 41, no. 3, pp. 119–121, Feb. 3, 2005.

8.        A. Temizel, “Image resolution enhancement using wavelet domain hidden Markov tree and coefficient sign estimation,” in Proc. ICIP, 2007, vol. 5, pp. V-381–V-384.




Afsana Nadia, S. K. Aditya

Paper Title:

Performance Analysis of GSM Coverage considering Spectral Efficiency, Interference and Cell Sectoring

Abstract:    In this work, the capacity and coverage area of GSM system have been studied. This paper presents the importance of using link budget calculations, determining the path loss and cell range for RF coverage planning and improving capacity using cell-sectoring. The major contribution is to estimate the coverage of GSM system which depends on BS antenna height, transmitting antenna gain, output power of BS for propagation environment such as rural, sub-urban and urban case. MATLAB has been used for simulation and performance evaluation of capacity and coverage in GSM system. Path loss for uplink and downlink has been calculated using Link Calculator software considering 3-sector antenna. Analysis reveals that coverage area improves significantly considering spectral efficiency, interference and cell sectoring. As an example, Google Earth and Radio Works software have been used to estimate the coverage area for a particular area. A 3D coverage map has been formulated using this result.

   Cell Sectoring, GSM Coverage, Interference, Spectral Efficiency.


1.       T. S.Rappaport, “Wireless Communications”, 2nd Edition, Prentice Hall, 2002, Ch. 1, pp. 1-9.
2.       T. S.Rappaport, “Wireless Communications”, 2nd Edition, Prentice Hall, 2002, Ch. 3, pp. 67-74.

3.       Haykin, S., “Communication Systems”, 4th Edition, Willey, Inc., Newyork, 2001.

4.       Steele, R., Lee, C.C., Gould, P., “GSM, cdma One and 3G Systems”, John Wiley & Sons Ltd, Baffins Lane, Chichester, 2001.

5.       Dr. Wajih A. Abu-Al-Saud, “Improving Coverage and Capacity in Cellular Systems”, Lecture 10, EE 499: Wireless & Mobile Communications(082).Available:,%20Lecture%2010.pdf

6.       Garg, V. K., and J. E. Wilkes, “Wireless and Personal Communications Systems”, Prentice Hall, 1996, ISBN 0-13-234626-5.

7.       Stutzman, W. L. and G. A. Thiele, “Antenna Theory and Design”, Wiley, 1998, ISBN 0-471-02590-9.

8.       A.R. Mishra, “Fundamentals of Cellular Network Planning & Optimisation”, John Wiley & Sons, 2004, Ch. 2, pp. 29-33.

9.       J. Lempiäinen-M. Manninen, "Radio Interface System Planning for GSM/GPRS/UMTS", Kluwer Academic Publishers, 2002.

10.     Ali Hakan IŞIK, İnan Gular, “Novel Approach for Optimization of Cell Planning and Capacity”, International Journal Of Communications, Issue 1, Volume 3, 2009.

11.     Dr. S. A. Mawjoud, “Evaluation of Power Budget and Cell Coverage Range in Cellular GSM System”, Al-Rafidain Engineering, Vol.16 No.1 2008.

12.     B. H. Walke, Mobile Radio Networks, John Wiley and Sons, 2002, pp. 44-46.

13.     K. Pahlavan and A. H. Levesque, Wireless Information Networks, John Wiley and Sons, 1995, pp.74-82.




Nirvesh S. Mehta, Nilesh J. Parekh, Ravi K. Dayatar

Paper Title:

Improve the Thermal Efficiency of Gearbox Using Different Type of Gear Oils

Abstract:    Gear box performance is dependent on viscosity of lubricant oil and due to the thermal effect of heat generated in side of an oil span of gear box. Thus if we change properties of an oil, the performance of gear box does change. The effect on gear box performance will be studied by CFD Analysis. CFD analysis of gear box is carried out for different viscosity oils. For the analysis purpose design of Maruti Omni’s gear box is used. Compression of thermal analysis is done for different viscosity oils are SAE 85W 140 (High Grade), SAE 85W 140 (Commercial), SAE 80W 90 (High Grade),SAE 80W 90 (Commercial), SAE 75W 90 (High Grade),SAE 75W 90 (Commercial),SAE EDIB (Suggested Oil). So it is proved that suggested oil SAE EDIB is better than available market oils.

   About four key words or phrases in alphabetical order, separated by commas.


1.       Seetharaman, S., Kahraman, A., Bednarek, G. and Rosander, P., 2008, “A Model to Predict Mechanical Power Losses of Manual Transmissions,” Automobiltechnische Zeitschrift, April 2008, Issue4, pp. 346-357.
2.       Seetharaman, S., Kahraman, A., 2008, “Load Independent Spin Power Losses of a Spur Gear Pair: Model Formulation,” (in review) Journal of Tribology.

3.       Seetharaman, S., Kahraman, A., Moorhead, M. D., and Petri-Johnson, T. T., 2008, “Load Independent Spin Power Losses of a Spur Gear Pair: Experiments and Model Validation,” (in review) Journal of Tribology.

4.       Martin, K. F., 1978, “A Review of Friction Predictions in Gear Teeth,” Wear, 49, pp. 201-238.

5.       Yada, T., 1997, “Review of Gear Efficiency Equation and Force Treatment,” JSME Int. J., Ser. C, 40, pp. 1-8.

6.       Li, Y., and Seireg, A. A., “Predicting the Coefficient of Friction in Sliding-Rolling Contacts,” Tribology Conference, K18

7.       Heingartner, P, and Mba, D., 2003, “Determining Power Losses in the Helical Gear Mesh,” Gear Technology, September/October 2005, pp. 32-37.

8.       Changenet, C., Oviedo-Marlot, X., and Velex, P., 2006, “Power Loss Predictions in Geared Transmissions Using Thermal Networks-Applications to a Six-Speed Manual Gearbox,” Transactions of the ASME, Vol. 128, pp. 61

9.       Prakash D. Patel, “An Experimental investigation of power losses in manual transmission gear box”.

10.     Carlo Gorla, Franco Concli, Karsten Stahl, Bernd-Robert   Hohnet, Michaelis Klaus, Hansjorg Schultheiß, and Johann-Paul Stemplinger, “CFD Simulations of Splash Losses of a Gearbox”.

11.     B. R. Hohnet F. Concli & C. Gorla, “Oil squeezing power losses in gears: a CFD analysis”,

12.     V. Chernoray & M. Jahanmiri, “Experimental study of multiphase flow in a model gearbox”.

13.     Solidworks software.

14.     ANSYS V 12.1

15.     Pro-E Wild Fire


17.     Wikipedia “Gearbox”.




B. Veeramallu, M.Aparna

Paper Title:

Navigate In India

Abstract:    Indian Railways is one of the world's largest railway networks comprising 115,000 km (71,000 mi) of track over a route of 65,000 km (40,000 mi) and 7,500 stations. IR carries about 7,500 million passengers annually or more than 20 million passengers daily (more than a half of which are suburban passengers) and 2.8 million tons of freight daily. Railways are divided into Zones Indian railways has 17 zones (SC, WCR, WR, NFR...). Zones are divided into divisions [Vijayawada division, Bhopal division Varanasi division, Moradabad division, Lucknow division etc.] Divisions are headed by a DRM [Divisional Railway Manager]. Under DRM each department has one officer as in-charge for maintenance of their equipment. Indian Railways has 68 divisions 17 zones. IR NAVIGATION is a web based application which is developed for the purpose of easy identification of trains in different aspects. It is going to provide more useful information to the user regarding the journey (between a source station and a destination station) like connecting trains, type of the trains, fare and time of the journey reducing time complexity. This is the project gathering information of Indian railways i.e., tracks routes, trains, stations, facilities in the station and trains to provide the information to the user effectively.

   DRM-Divisional Railway Manager, SC-Secunderabad, NFR-Northeast Frontier Railway, WCR-West Central Railway, WR-Western Railway


1.        Different division books available
2.        Indian railway atlas

3.        ‘Trains at a glance’ book by Indian railways

4.        Different Zone division books.

5. ( is a government web site.

6. (private  website).

7. (private web site).

8. (private web site).









Supiah Shamsudin, Azmi Ab Rahman, Zaiton Binti Haron, Lat Da A/P Ai Nam

Paper Title:

Water Level Evaluation at Southern Malaysia Reservoir using Fuzzy Composite Programming

Abstract:    Ranking and evaluation of properreservoir water level outflowing into downstream river system under multi-criterion environment was presented using multi-criteria decision approach specifically Fuzzy Composite Programming (FCP). The optimum water level evaluation is vital to take into consideration the various environmental, water quantity and economical aspects of the overall systems. This multicriteria analysis will optimize water release, ensuring water quality, providing economical benefits and maintaining high quality of the natural landscape. The study mainly focuses on optimizing outflowing water level by identifying and grouping the basic indicators into its particular composite structure. The basic indicators include various water quality parameters, flowrates, rainfall, scenery etc. The composite structure of the overall reservoir water use system was presented. Five(5) alternatives based on reservoir water level was adopted which include 20.6m (Alternative 1), 22.2m(Alternative 2), 23.8m(Alternative 3), 25.4m (Alternative 4) and 27.0m(Alternative 5) respectively. Sensitivity analysis using three (3) set of different weights was performed for analyzing the robustness of the optimum water level obtained. The FCP structure consists of 15 first level indicators, 5 second level indicators, 2 third level indicators and the final indicators. The optimum value was determined based on the shortest distance between the fuzzy box and an ideal point. The optimum answer was also obtained from the highest ordered sequence value. The highest ranking order indicated by highest ordered sequence value obtained was Alternative 3 (0.660), followed by Alternative 4 (0.596), Alternative 2 (0.555), Alternative 5 (0.515) and lastly Alternative 1(0.500). The highest ranking order indicated the most optimum, advisable and appropriate water level for Layang reservoir.

   Fuzzy Composite Programming, MCDM, Optimum water level, Reservoir


1.        Christofides al., (2005). Resolving Conflicting Objectives in the management of the Plastiras Lake: can we quantify beauty? ,Hydrology and Earth System Science9,507-515.
2.        Markel D., U.Shamir, (2002) Monitoring Lake Kinneret and Its Watershed: Forming the Basis for Management of a Water Supply Lake: H.Rubin, et. al .Water Resources Quality .Springer-Verlag Berlin Heidelberg New York, 2002. 177-214

3.        Supiah S., (2003) Non-point Phosphorus Loadings and Reduction in Layang Reservoir Systems. Universiti Teknologi Malaysia: PhD. Thesis.

4.        Supiah S., Dan’azumi, S. Aris A.(2010). “Effect of Storm Separation Time on Rainfall Characteristics-ACase Study of Johor”.  European Journal of Scientific Research.  45(2), 62-167.

5.        Dan’azumi, S., Supiah S. and Aris A. (2010) “ Modeling the Distribution of Rainfall Intensity using Hourly Data” American Jour. of Env. Sciences, 6 (3), 238-243.

6.        Zadeh L. (1965). Fuzzy sets, Inf. Control 8, 338-353,Bogardi I. (1992)  Environmental risk analysis, water, development and the environment. J. Williams et. al. eds. Boca Raton Publishing, Boca Raton, Fla. 147-175

7.        Chameau, J.L. and Santamaria, J.C.. (1987). Membership function I: Comparing methods and measurement.  International Journal of Approximate Reasoning, 1: 287-301.

8.        Chen, S.H. (1985) Ranking fuzzy numbers with maximizing set and minimizing set, Fuzzy Sets and Systems, 17: 113–129.

9.        Raj, P.A. (2002) Ranking Multicriteria River Basin Planning and Development Alternatives Using Electre and Ranfuw. Krishna River Basin Planning Report. Department of Civil Engineering, Indian Institute of Technology.

10.     Stanbury, J.S., Bogardi, I., Lee,Y.W.,Wayna E.W. (1991) Multiobjective decision under uncertainty. IX-th International Conference on Multiple Criteria Decision Making, Fairfax. Virginia.

11.     Zeleny, M. (1982), Compromise programming, In: J.L. Cochrane, M. Zeleny (Eds.), Multiple Criteria Decision Making, University of South Carolina Press, Columbia, SC, pp. 263–301.




Neethu T. Sunil, V. Tharmalingam

Paper Title:

Distributing Confidentiality to a Visual Secret Sharing Scheme

Abstract:    A Visual Secret Sharing (VSS) scheme is one realization of secret sharing schemes without using computation which distinguishes VSS from ordinary cryptography. In a typical VSS scheme (normally called a (k, n) –threshold VSS scheme), a dealer encodes a secret image in to ‘n’ shares each of which reveals no information regarding the secret image. In this system, the secret image can be reproduced only by stacking n number of shares in the correct order. The reproduced images will be clearer (larger contrast) and with small pixel expansion compared to Unconditional security VSS scheme. This security notion is effective when attackers cannot use computers since it may take much time to analyze combinations of sub pixels exhaustively.

   Visual secret sharing, Weaker security sharing, halftone technique, visual cryptography.


1.        Shamir, “How to share a secret”              
2.        Mitsugu Iwamoto, “General Construction Methods of Secret Sharing   Schemes and Visual Secret Sharing Schemes”

3.        M. Naor and A. Shamir, “Visual cryptography”


5.        G. Ateniese, C. Blundo , A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures”

6.        Blundo, P. D’Arco, A. D. Santis, and D. R. Stinson, “On the contrast in visual cryptography schemes”.

7.        Pei-Fang Tsai and Ming-Shi Wang, “An (3, 3)-Visual Secret Sharing Scheme for Hiding Three Secret Data”.

8.        Integer programming.

9.        Velmurugan and Vijayaraj, “Visual Pixel Expansion of Secret Image”.




Rajas Hegiste, Aditya Sawant, Mangesh Kshirsagar, Devendra Kahane

Paper Title:

Secured Administrative Information Management System Using Radio Frequency Identification

Abstract:    Secured Administrative Information Management System using RFID is a system through which we aspire to make a computerized campus of our college. The system will help the students solve all possible problems they face. Also it will help the teaching faculty as well as the administrative staff  to understand the student’s problems and queries. Student’s work of going to office and searching every notice board for the particular notices will be reduced. The system uses Radio Frequency Identification for handling all information. Applications based on RFID are rising as there can be many new technologies that can be bound to it and can be used to develop further complex systems. This paper proposes a system that will handle information of students for an institute using the RFID and contains another feature of One Time Password as well as making all the possible work online and effortless.

   RFID, Tags, Information Management System.


1.       Mobile Platform for Networked RFID Applications , Lee, Donggeon ; Kim, Seongyun ; Kim, Ho-Won Won ; Park, Namje Information Technology: New Generations (ITNG), 2010 Seventh International Conference  Publication Year: 2010.
2.       A Survey Paper on Radio Frequency IDentification (RFID) Trends, Christoph Jechlitschek.Publication year :2006

3.       Authentication and lightweight cryptography in low cost RFID  ,Mobahat, Hoopad Software Technology and Engineering (ICSTE), 2010 2nd International Conference  Volume: 2 Publication Year: 2010

4.       Personal Navigator for a Public Transport System using RFID Ticketing, Ana Aguiar and Francisco Nunes and Manuel Silva and Dirk Elias, Fraunhofer Portugal Research Centre AICOS,Porto, Portugal.Email: {ana.aguiar, francisco.nunes, manuel.silva, dirk.elias}

5.       Impact of RFID technology on economic order quantity models Bhadrachalam, Lakshmi ; Chalasani, Suresh ; Boppana, Rajendra V. Systems Conference, 2009 3rd Annual IEEE Publication Year:2009

6.       The Use of RFID for Human Identification A DRAFT REPORT from DHS Emerging Applications and Technology Subcommittee to the Full Data Privacy and Integrity Advisory Committee Version 1.0

7.       Design of an Intelligent Web-Based Help Desk System David A. Thurman, Jeffrey S. Tracy, and Christine M. Mitchell Center for Human-Machine Systems Research School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205[dave, jtracy, cm]

8.       RFID infrastructure management based on event correlation analysis Lee, Ho Sung ; Oh, Sewon Won  Advanced Communication Technology (ICACT), 2012 14th International Conference on Publication Year: 2012 ,





Paper Title:

Navigation Tool for Visually Challenged using Microcontroller

Abstract:    This paper describes the development of a navigation aid in order to assist blind and visually impaired people to navigate easily, safely and to detect any obstacles. The system is based on a microcontroller with synthetic speech output. In addition, it consists of two vibrators, two ultrasonic sensors mounted on the user’s shoulders and another one integrated into the cane. This aid is able to give information to the blind about urban walking routes and to provide real-time information on the distance of over-hanging obstacles within six meters along the travel path ahead of the user. The suggested system consists then in sensing the surrounding environment via sonar sensors and sending vibro-tactile feedback to the user of the position of the closest obstacles in range. For the ultrasonic cane, it is used to detect any obstacle on the ground.

   Sensors, Microcontroller, Vibrator, Navigation


1.        Yuan, D.; Manduchi, R.; “Dynamic environment exploration using a virtual white cane”, in Computer Vision and Pattern Recognition, 2005. CVPR 2005. IEEE Computer Society Conference.
2.        Tahat, A.A., “A wireless ranging system for the blind long-cane utilizing a smart-phone”, in Telecommunications, 2009. ConTEL 2009.

3.        Bolgiano, D. Meeks; “A Laser Cane for the Blind”, in Quantum Electronics, IEEE Journal (2003).

4.        Zhang, J.; Lip, C.W.; Ong,

5.        M, Bousbia Salah A.larbi and M.Bedda “An approach for the measurement of impaired people” in proc 10th IEEE International Conference on Electronic Circuits and Systems




E.Mohan, R.Kangayen, R.Lavanya, N.Deepa

Paper Title:

Evolution of Open Spectrum Sharing Technology- A Survey

Abstract:    The increasing demand for wireless communication introduces efficient spectrum utilization challenge. To address this challenge, cognitive radio has emerged as the key technology, which enables opportunistic access to the spectrum. The main potential advantages introduced by cognitive radio are improving spectrum utilization and increasing communication quality. These appealing features match the unique requirements and challenges of resource-constrained multi-hop wireless sensor networks (WSN). Furthermore, dynamic spectrum access stands as very promising and spectrum-efficient communication paradigm for WSN due to its event-driven communication nature, which generally yields bursty traffic depending on the event characteristics. In addition, opportunistic spectrum access may also help eliminate collision and excessive contention delay incurred by dense deployment of sensor nodes. Clearly, it is conceivable to adopt cognitive radio capability in sensor networks, which, in turn yields a new sensor networking paradigm, i.e.,cognitive radio sensor networks (CRSN). In this paper, the main design principles, potential advantages and application areas and network architectures of CRSN are introduced. The existing sensing methods adopted in WSN are discussed along with the open research avenues for the realization of CRSN.

   Cognitive radio, sensor networks, opportunistic spectrum access, efficient spectrum sensing.


1.        Linda Doyle, “Essentials of cognitive radios”,Cambridge wireless essentials series, Cambridge university press, pp. 96-105, 2009.
2.        Yucek and Arsalan, “A survey of spectrum sensing algorithms for cognitive radio applications”, IEEE Communication Surveys & Tutorials, vol. 11, no. 1, pp. 117-122, first quarter, 2009.

3.        Simon Haykin, “Cognitive radio: Brain-empowered wireless communications”, IEEE J. Selected Areas Communications, vol. 23, no. 2, pp. 201-220, Feb. 2005.

4.        Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey”, IEEE J. of Selected Topics In Signal Processing, Vol. 5, NO. 1, February 2011.

5.        L. Stabellini, J. Zander, “Interference Aware Self-Organization for Wireless Sensor Networks: a Reinforcement Learning Approach“, in Proceedings of the 4th annual IEEE Conference on Automation Science and Engineering (CASE 2008), 2008.

6.        S. Geirhofer, L. Tong, B. M. Sadler, “Dynamic  Spectrum Access in the Time Domain: Modeling and Exploiting White Space“, in IEEE Communication Magazine, Vol. 45, No. 5, May 2007.

7.        A. Ghasemi, E. S. Sousa, “Spectrum Sensing in Cognitive Radio Networks: Requirements, Challenges and Design Trade-offs“, in IEEE Communications Magazine, Vol. 46, No. 4, April 2008.

8.        G. Ganesan, Y. G. Li, “Cooperative Spectrum Sensing in Cognitive Radio Networks”, in Proceedings of IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks (DySPAN), 2005.

9.        R. Chen, J.-M. Park, K. Bian, “Robust Distributed Spectrum Sensing in Cognitive Radio Networks“, in Proceedings of 27th IEEE Conference on Computer Communications (INFOCOM), 2008.

10.     S. Byun, I. Balasingham, X. Liang, “Dynamic Spectrum Allocation in Wireless Cognitive Sensor Networks: Improving Fairness and Energy Efficiency”, in Proc. IEEE VTC 2008, pp. 1-5, Sep. 2008.

11.     Mahmood A. Abdulsattar and Zahir A. Hussein “Energy detect technique for spectrum sensing in cognitive radio:  a survey”   . International Journal of Computer Networks & Communications (IJCNC)  Vol.4, No.5, September 2012.

12.     Luca Stabellini and Jens Zander   “Energy-Aware Spectrum Sensing     in     Cognitive  Wireless Sensor Networks: a Cross Layer Approach”. IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.   

13.     Farrukh Javel,Imran Shafi and Asad Mahmood   “ Novel  Radio Mode Identification Approach for Spectrum Sensing  in  Cognitive Radios”. International Journal of Communication Networks and Information Security (IJCNIS) Vol. 4, No. 2, August 2012.




Vikas P. Jadhao, Prakash S. Pajgade

Paper Title:

Influence of Masonry Infill Walls on Seismic Performance of RC Framed Structures a Comparision of AAC and Conventional Brick Infill

Abstract:    The construction of reinforced concrete buildings with unreinforced infill is common practice in India. Infill panels have traditionally been made of heavy rigid materials, such as clay bricks or concrete blocks. However, more lightweight and flexible infill options Such as AAC (aerated light weight concrete) blocks are now available in India to be used as masonry infill (MI) material in reinforced concrete (RC) framed buildings. The behavior of in-filled reinforced concrete (R/C) frames has been studied experimentally and analytically by a number of researchers. It has been recognized that infill materials give significant effect to the performance of the resulting in-filled frame structures. Most of the researches carried out in this area are focused on parameters such as the distribution of MI, variation of geometry, the strength of infill materials and the relative stiffness of infill to frame elements. The study of the effect of types of infill materials used (lightweight versus conventional brick masonry) on the behavior of in-filled R/C frames is however still limited. Previous experimental study has concluded that the R/C frame in-filled with AAC blocks exhibited better performance under lateral loads than that in-filled with conventional clay bricks. In the present paper an investigation has been made to study the behaviour of RC frames with both AAC block and conventional clay bricks infill when subjected to seismic loads.

   AAC (autoclaved aerated light weight concrete blocks), FEMA 273, FEMA 356, in-filled frames.


1.       Momin Mohmedaki et. Al.˝ Seismic Assessment of Rc Frame MasonrInfill With ALC Block ״ International Journal of Advanced Engineering Research and Studies”, Vol. I Issue III April-June, 2012, pages 148-149;
2.       Hemant B. Kaushik et. Al.,˝Code Approaches to Seismic Design of Masonry-Infilled Reinforced Concrete Frames: A State-of-the-Art Review”, Earthquake Engineering Research Institute, Earthquake Spectra, Volume 22, November 2006,pages 961–983;

3.       Diptesh Das et. Al.,˝ Brick Masonry Infills in Seismic Design of RC Framed Buildings; part 1- Cost Implication”, The Indian Concrete Journal, July 2004, pages 39-44

4.       Mulgund G. V et. al.,˝Seismic Assesement of  RC Frame Buildings With Brick Masonry Infills”, IJAEST, VOL2, ISSUE NO 2, PAGES 140-147;

5.       Kasım Armağan KORKMAZ, et. Al.,˝ Assessment of RC Structures with Masonry ”, International Journal of Science & Technology Volume 2, No 2, 2007,PAGES 155-164;

6.       Sharany Haque et. Al.,˝Seismic Vulnerability of Columns of RC;

7.       P. G. Asteris,˝ Lateral Stiffness of Brick Masonry Infilled Plane Frames, Journal Of Structural Engineering © ASCE / AUGUST 2003 ;




P. R. Badadapure

Paper Title:

Content-Based Image Retrieval by Combining Structural and Content Based Features

Abstract:    Many different approaches for content-based image retrieval have been proposed in the literature. Successful approaches consider not only simple fea-tures like color, but also take the structural relationship between objects into account. In this paper we describe two models for image representation which integrate structural features and content features in a tree or a graph structure. The effectiveness of this two approaches is evaluated with real world data, using clustering as means for evaluation. Furthermore, we show that combining those two models can further enhance the retrieval accuracy.

 Successful approaches consider not only simple fea-tures like color, but also take the structural relationship between objects into account.


1.        Flickner, M., Swahney, H., Niblack, W., Ashley, J., Huang, Q., Dom, B., Gorkani, M., Hafner, J., Lee, D., Petkovic, D., Steele, D., Yanker, P.: Query by image and video content: The QBIC system. IEEE Computer (1995)
2.        Mehtre, B., Kankanhalli, M., Lee, W.: Shape measures for content based image retrieval: A comparison. Information Processing Management 33 (1997) 319-337

3.        Cullen, J., Hull, J., Hart, P.: Document image database retrieval and browsing using texture analysis. In: Proc. 4th Int. Conf. Document Analysis and Recognition. (1997) 718-721

4.        Fuh, C.S., Cho, S.W., Essig, K.:  Hierarchical color image region segmentation and shape extraction. IEEE Transactions on Image Processing 9 (200) 156-163

5.        Tagare, H., Vos, F., Jaffe, C., Duncan, J.: Arrangement - a spatial realtion between parts for evaluating similarity of tomographic section. IEEE Trans. PAMI 17 (1995) 880-893

6.        Smeulders, A.W.M., Worring, M., Santini, Simone Gupta, A., Jain, R.: Content-based image retrieval at the end of the early years. IEEE Trans. PAMI 22 (2000) 1349-1380

7.        Levenshtein, V.: Binary codes capable of correcting deletions, insertions and reversals. So-viet Physics-Doklady 10 (1966) 707-710

8.        Wagner, R.A., Fisher, M.J.: The string-to-string correction problem. Journal of the ACM 21(1974)168-173

9.        Zhang, K., Statman, R., Shasha, D.: On the editing distance between unordered labeled trees. Information Processing Letters 42 (1992) 133-139

10.     Zhang, K., Wang, J., Shasha, D.: On the editing distance between undirected acyclic graphs. International Journal of Foundations of Computer Science 7 (1996) 43-57

11.     Wang, J.T.L., Zhang, K., Chang, G., Shasha, D.: Finding approximate patterns in undirected acyclic graphs. Pattern Recognition 35 (2002) 473-483

12.     Nierman, A., Jagadish, H.V.: Evaluating structural similarity in XML documents. In: Proc. 5th Int. Workshop on the Web and Databases (WebDB 2002), Madison, Wisconsin, USA. (2002)61-66

13.     Sebastian, T.B., Klein, P.N., Kimia, B.B.:  Recognition of shapes by editing shock graphs. In: Proc. 8th Int. Conf. on Computer Vision (ICCV’01), Vancouver, BC, Canada. Volume 1. (2001)755-762

14.     Kailing, K., Kriegel, H.P., Schönauer, S., Seidl, T.: Efficient similarity search for hierachical data in large databases. In: Proc. 9th Int. Conf. on Extending Database Technology (EDBT 2004). (2004) 676-693

15.     Huet, B., Cross, A., Hancock, E.: Shape retrieval by inexact graph matching. In: Proc. IEEE Int. Conf. on Multimedia Computing Systems. Volume 2. (1999) 40-44

16.     Kubicka, E., Kubicki, G., Vakalis, I.: Using graph distance in object recognition. In: Proc. ACM Computer Science Conference. (1990) 43-48.

17.     Wiskott, L., Fellous, J.M., Krüger, N., von der Malsburg, C.:  Face recognition by elastic bunch graph matching. IEEE Trans. PAMI 19 (1997) 775-779

18.     Kriegel, H.P., Schönauer, S.:  Similarity search in structured data.  In: Proc. 5th Int. Conf. DaWaK 2003. Volume 2737 of LNCS. (2003) 309-319

19.     Kriegel, H.P., Kröger, P., Mashael, Z., Pfeifle, M., Pötke, M., Seidl, T.: ”Effective Similar-ity Search on Voxelized CAD Objects”.  In: Proc. 8th Int. Conf. on Database Systems for Advanced Applications (DASFAA’03), Kyoto, Japan. (2003)

20.     Kailing, K., Kriegel, H.P., Pryakhin, A., Schubert, M.: Clustering multi-represented objects with noise. In: to appear in: Proc. 8th Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD’04), Sydney, Australia. (2004)

21.     Ester, M., Kriegel, H.P., Sander, J., Xu, X.: A density-based algorithm for discovering clus-ters in large spatial databases with noise. In: 2nd Int. Conf. KDD. (1996) 226-231




Neelesh Kumar, Sanjeev Gupta, S.P.Phulambrikar

Paper Title:

A Novel Three-Phase Multilevel Inverter Using Less Number of Switches

Abstract:    A novel three phase multilevel inverter with a small number of switching devices is proposed. Large electrical drives and utility application require advanced power electronics converter to meet the high power demands. As a result, multilevel power converter structure has been introduced as an alternative in high power and medium voltage situations. A multilevel converter not only achieves high power rating but also improves the performance of the whole system in terms of harmonics. In this paper the proposed inverter can output more numbers of voltage levels with reduced number of switches as compared to cascade H-bridge inverter, which results in reduction of installation cost and have simplicity of control system. Finally, the simulation and experimental results validate the concept of this new topology.

   PWM, SPWM, Cascade H-bridge(CHB), matlab simulation, multilevel inverter.


1.       Murugesan.G, Jagabar Sathik.M and Praveen.M, “A new multilevel inverter topology using less number of switches”, IJEST, Vol. 3 No.2 feb 2012.
2.       Ebrahim Babaei, 2008, “A Cascade Multilevel Converter Topology With Reduced Number of Switches” IEEE Transactions on power electronics, Vol 23, No. 6.

3.       J. Rodríguez, J. S. Lai, and F. Z. Peng, “Multilevel inverters: A survey of topologies, controls, and applications,” IEEE Transaction on Industrial electronics, vol. 49, no. 4, pp. 724–738, Aug. 2002

4.       D.Mohan, Sreejith B.Kurub, “A Comparative Analysis of Multi Carrier SPWM Control Strategies using Fifteen Level Cascaded H–bridge Multilevel Inverter”,  International Journal of Computer Applications (0975 – 8887), Vol 41– No.21, March 2012

5.       B.P.Mcgrath  and  D.G  Holmes  “reduced  n  PWM harmonic  distortion  for  multi  level  inverters operating  over  a  wide  modulation  range”  IEEE Transactions  on  power  electronics  vol  21  no  4 pp941-949, july 2006

6.       Rashid, M.H, 2004. “Power Electronics:Circuits, devices and applications. Third Edition, Prentice Hall

7.       Leon  M.Tolbert  and  Thomas  G.  Habetler  “Novel multilevel  inverter  carrier  based  PWM  method” IEEE Transaction  On  Industry  Application  Vol  35 No 5 Sep 1999 pp 1098-1107

8.       L. M. Tolbert, F. Z. Peng, T. G. Habetler, “Multilevel PWM methods at low modulation indices,” IEEE Transactions on power electronics, vol. 15, no. 4, July 2000, pp. 719-725

9.       Martha Calais, Lawrence J.Borlel Vassilios,  G. Agelidis “Analysis of Multi carrier PWM Methods for  a  single  phase  five  level  inverter”  IEEE

10.     D.G. Holmes,  T.A.Lipo, “Modern  Pulse  Width Modulation Techniques for Power Converter”, IEEE Press, 2003

11.     E. Babaei, M.T. haque and S.H. Hosseini, “A novel structure for multilevel converter” in Proc. ICEMS, 2005, Vol. 2, pp. 1278-1283

12.     B. Axelrod, Y. Berkovich, and A. Ioinovici, “A cascade boost-switched capacitor-converter–two level inverter with an optimized multilevel output waveform,” IEEE Trans. Circuits Syst., vol. 52, no. 12, pp. 2763–2770, Dec. 2005.

13.     P. Lezana, J. Rodriguez, and D. A. Oyarzun, “Cascaded multilevel inverter with regeneration capability and reduced number of switches,” IEEE Trans. Ind. Electron., vol. 55, no. 3, pp. 1059–1066, Mar. 2008.

14.     T. Teratani, M. Amano, and M. Fujiwara, “Roadmap of next generation automotive electric power systems,” IEEJ Abstract Contents of Tech. Rep.,no. 1049, Mar. 2006, (in Japanese)

15.     F.  S.  Kang,  S.  J.  Park,  S.  E.  Cho,  C.  U.  Kim,  and  T.  Ise,“Multilevel PWM inverters suitable for the use of stand-alone photovoltaic power systems,” IEEE Trans. Energy Converts., vol. 20, no. 4, pp. 906–915, Dec. 2005.




Tourkia Lajnef, Slim Abid, Anis Ammous

Paper Title:

Design and Simulation of Photovoltaic Water Pumping System

Abstract:    The power source for pumping water is one of the most promising areas in photovoltaic applications. This paper presents the performance of the photovoltaic plant especially in the case of climatic and load fluctuations. The studied system consists of the PV array, the ACmotor, the centrifugal pump and using an MPPT algorithm to improve the efficiency of the PV system. This methodology allows an optimal control and monitoring of inverters by calculating the duty cycle of the DC-DC converter and the voltage/frequency control. Each subsystem is modeled in order to simulate the whole system in MATLAB/SIMULINK.  The non linear averaged modeling technique of the converters is used in order to picture accurately the PV system behavior during a low simulations time.

   Photovoltaic pumping system, MPPT, inverters, simulation model, control.


1.     Appelbaum J, Bany J. “ Analysis of a direct coupled DC motor and a photovoltaic converter,” In: 1st commission of European Community conference on photovoltaic    solar energy, Luxembourg, September 27–30, Reidel, Dordrecht, The Netherlands, 1979.
2.     Appelbaum J, Bany J. Performance analysis of DC motor photovoltaic converter system—I. Solar Energy 1979; 122:439–45. .

3.     Singer S, Appelbaum J. Starting characteristics of direct current motors powered by solar cells. IEEE Trans Energy Convers 1993;8(1):47–53.

4.     M. JRAIDI, Contribution à la caractérisation et à la modélisation des systèmes photovoltaïques, DEA, ENIT, Tunis, 1993.

5.     G. SEGUIER, Les convertisseurs de l’électronique de puissance, la conversion continu-alternatif,  T4, Technique et Documentation (Lavoisier), France, 1987.

6.     Caro, J.M., Bonal, J., 1997. Entra ^ inements Electriques  a Vitesse Variable, vol. 1. Lavoisier.

7.     S. R. Sanders et al., “Generalized averaging method for power conversion circuits,” IEEETrans. Power Electron. vol.6, pp. 251-258, Apr.1991.
8.     A.AMMOUS and al,”An advanced PWM-Switch Model including semiconductor device. IEEE Trans. Power Electron. vol.18, No5.September 2003 pp. 1230-1237.
9.     S.Abid and al,” Advanced Averaged Model of PWM-Switch operating in CCM and DCM conduction modes”, International Review of Electrical Engineering (I.R.E.E.), Vol. 2, n. 4July-August 2007.

10.   Sun J. et al, “Averaged Modeling of PWM converters operating in Discontinuous conduction Mode”, IEEE Transactions on Power Electronics. vol. 16, N°.4, July 2001, p.482-492.




Sule, Samuel

Paper Title:

Structural Models for the Prediction of Compressive Strength of Coconut Fibre-reinforced Concrete

Abstract:    The quality of concrete used in any construction work is a function of its compressive strength. In this paper, structural models are formulated to predict the compressive strength of coconut fibre-reinforced concrete mix 1:2:4 at water-cement ratios of 0.55 and 0.60 using three-dimensional elasticity equations. The results obtained using the formulated models were compared with the measured values and were found to be very close (correlation coefficient = 0.9011). For both the measured and predicted values, the compressive strength of concrete mix (1:2:4) were found to decrease as the coconut fibre contents increased.

   structural models, compressive strength, coconut fibre, three-dimensional elasticity equations, fibre contents.


1.        Slate, F.O. (1978). “Coconut fibres in concrete”. Eng. J. Singapore,(1).
2.        Balaguru P.N. and Shah, S.P., (1992). “Fibre-Reinforced composites, McGraw-Hill, New York.

3.        Hannant, D.J., (2001). “Fibre cement and fibre concrete, John Wiley and Sons Inc, Chistester.

4.        Fadhadli, Z., (1989). Properties of cement sheets reinforced with coconut fibres. University of Technology, Malaysia: Master of Civil Engineering Thesis.

5.        Okafor, F.O. and Sule, S. (2008). “Models for prediction of structural properties of palmnut fibre-reinforced cement mortar composites. Nig. Journal of Technology, Vol. 27, No.2, pp. 13-20.

6.        Pakotiprapha et al (1974). Mechanical properties of cement mortar with randomly oriented short steel wires.” Mag. Conor. Res. Vol. 26, No. 86, pp. 3-15.

7.        Okafor F.O. and Sule S. (2010. “Improved Analytical models for prediction of structural properties of palmnut fibre - reinforced cement based composites. Journal of Engineering Science and Applications (JESA), Vol.7, No.1, pp. 1-7.

8.        Okafor, F.O. (1992). “Span Optimization of palm-nut fibre-reinforced Mortar Roofing Sheets,” Ph.D Thesis, Department of Civil Engineering, University of Nigeria, Nsukka.

9.        Neville, A.M. (1996). “Properties of Concrete, Longman Ltd., England.

10.     Egbuluese, E.O. (2010). “The effect of coconut fibre addition on the compressive strength of concrete”. Unpublished undergraduate thesis subjected to the Department of Civil and Environmental Engineering.

11.     Sule, S. and Nwofor, T.C. (2011). “Analytical models for prediction of mechanical properties of Rice HUSK Ash Concrete”. International Journal of Current Research, vol.3, Issue 11, pp. 368 – 370.




Zuhair Hasnain, Naila Rozi

Paper Title:

To Analyze Sequence against the Rice Repeat Database VIA Known Repeats & Transposes DNA

Abstract:    Rice ESTs and FL-cDNAs and transcript assemblies (PUTs) from the Plant GDB were aligned to the pseudomolecules using gmap. Only the FL-cDNA and PUTs alignments are shown in the browser. Only the EST and FL-cDNA alignments were used for gene model improvement by PASA. We search sequence against a rice repeat database to identify known repeats and transpose’s (DNA transposes’, retroelements, MITEs, etc). To analyze the growth and yield response of rice under different sowing dates and split nitrogen application, a field study was conducted at farmer’s field Punjab Pakistan during Kharif season 2011. The study revealed that N in split form had no significant effect on yield the yield components of rice while early-sowing is considered suitable for farmers under agro-ecological conditions of Punjab Pakistan.                            

   Rice repeat DNA sequences, transplanting time, Nitrogen, Yield and yield components


1.       Andrade, W.D.B., G.M.B. Fernandes and N.S. Amorim. 1995. Effect of sowing date on quality of rice grains. Comunicadotechnicoempresa de pesquisaagropecuaria do estado do Rio de Janeiro, No. 231. 5pp.
2.       Anonymous. 2001. Rice in Pakistan. Website: http: // www .riceweb. org/countries/pakis.htm.

3.       Budhar, M.N. and S.P. Palaniappan. 1993. Nitrogen management in aged rice seedlings. Madras Agric. J. 80(2): 24-25 (Rice Absts., 18(1): 230; 1995).
4.       Economic Survey of Pakistan. 2011. Ministry of Finance, Government of Pakistan.
5.       Gallagher, N.J. and P.V. Biscoe. 1978. Radiation absorption, growth and yield of cereals. J. Agric., Sci. Camb., 19: 47-60.

6.       Hiria.A.T.Ishibashi.A.Morikami.N.Iwatsuki.Shinozakiand M.Sugiura 1985, Rice chloroplast DNA Appl Genet.70:117-122.

7.       IRRI. 1976. Root zone placement of nitrogen. Int.Rice Res. Inst., Manila Reporter.

8.       Jha, K.P., C.Gangadharan and G.B.Manna. 1991. On-farm evaluation of promising lowland rice varieties & their response to date of sowing & nitrogen level under flood prone rainfedlowland.Ind. J. Agri. Sci., 61:4,237-242.

9.       Khan, M.R. and B.S. Vargara. 1981. Response of traditional deep water to nitrogen application. IRRI. Newsletter 6(3): 10-11 (Field Crop Absts., 35(8): 6554; 1983).

10.     Murali, B. and T.M.M. Reddy. 1995. Response of rice cultivars to levels and times of nitrogen application. J. Res. APAU, 23(2): 43-44 (Rice Absts., 20(4): 2488; 1997).

11.     Nossa, I.E. and Z.J.P. Vergas. 1980. Response of rice (Oryza sativa L.) cv. Cica-8 to split application of nitrogen under field conditions. ActaAgronomica Colombia, 30(1/4): 49-60 (Field Crop Absts., 36(4): 2938; 1983).

12.     Oh, Y.B., J.K. Ahn, R.K. Park, and S.H. Park. 1990. Effect of nitrogen fertilizer application method on the growth and grain yield of rice plant. Research reports of the Rural Development. Ad., Rice, 32(1): 16-20 (CAB Absts., 1990-1991).

13.     Rao, N.K. and M.T. Jackson. 1997. Effect of sowing dates and harvest time on longevity of rice seeds. Seed Sci. Res., 70: 1, 13-20.

14.     Singh V.P. and V.K. Singh. 2000. Effect of sowing date and nitrogen level on the productivity of spring sown rice. Ind. J. Agron., 45: 3, 560-563.

15.     Steel, R.G.D. and J.H. Torrie. 1984. Principles and Procedures of Statistics. 2nd ed. McGraw Hill, Int. Book Co. Inc. Singapore.

16.     Tisdale, S.L., W.L.Nelson and J.D. Beaton.1990.Soil fertility and fertilizers.Mc-Milan Pub.Co., NY, USA: 60-62.

17.     Voss, M.A. and E. Zini. 1993. Forms and dates of application of urea to irrigated rice, 1992-93. Pelotas, Brazil; Centro de PesquisaAgropecuaria de ClimaTemperado, EMBRAPA 163-164 (Field Crop Absts., 48(1): 181; 1995).

18.     Williams, R.L., S. Fukai, M. Cooper and J. Salisbury. 1997. Effect of growth, nitrogen and sowing date on grain yield of Australian Rice, a modeling approach. Breeding Strategies for rainfed low land rice in drought prone environments: Proc. Int. Workshop, UbonRatchathani, Thailand, 5-8 Nov. 1996, 239-244, ACIAR Proc. No. 77.

19.     Xie, G.H., B.L. Su, L. Shi and A.Y. Tian. 1996. Study on growth and dry matter production of rice. J. China Agric. Univ., 1:1, 89-94.




Anisaara Nadaph, Vikas Maral

Paper Title:

Query-Log Aware Data Replicated Declustering

Abstract:    Query-Log is general record of what mysqld is doing, the server writes information to this log when client connect or disconnect. Declustering parallelizes the query retrieval process by distributing the data items requested by queries among several disks. Replication enables alternative disk choices for individual disk items and thus provides better query parallelism options. existing replicated declustering schemes do not consider query log information and try to optimize all possible queries for a specificquery type, such as range or spatial queries. In such schemes, it is assumed that two or more copies of all data items are to be generated and these data items are copied to disks by different algorithm. However, It  is not feasible in some applications for  generation of even two copies of all of the data items, since data items tend to have very large sizes. In this work we assume that there is a given limit on disk capacities and thus on replication amounts. We utilize existing query-log information to propose a selective replicated declustering scheme, in which we select the data items to be replicated and decide on their scheduling onto disks. We suggest an iterative algorithm to get a two-way replicated decluster and by making use of this algorithm recursively to generate a multiway replicated declustering. Later by makiing use of efficient heuristics we improve the multi-way replicated declustering. The survey show that the suggested  work gives bettter performance result over the existing replicated declustering schemes.

   Declustering, replication, parallel disk architectures, iterative improvement heuristics.


1.       Query-Log Aware Replicated Declustering Ata Turk, K. Yasin Oktay and Cevdet Aykanat.
2.       D. R. Liu and S. Shekhar, “Partitioning similarity graphs: a frame- work for declustering problems,” Information Systems, vol. 21, pp. 475–496, 1996.

3.       D. R. Liu and M. Y. Wu, “A hypergraph based approach to declus- ering problems,” Distributed and Parallel Databases, vol. 10(3),pp. 269–288, 2001..

4.       A. S. Tosun, “Threshold-based declustering,” Information Sciences, vol. 177(5), pp. 1309–1331, 2007

5.       M. Koyuturk and C. Aykanat, “Iterative-improvement-based declustering heuristics for multi-disk databases,” Information Systems, vol. 30, pp. 47–70, 2005.

6.       J. Gray, P. Helland, P. O’Neil, and D. Shasha, “The dangers of replication and a solution,” in Proc. ACM SIGMOD International Conference on Management of Data, pp. 173–182, 1996J.

7.       S. Ghemawat, H. Gobio, and S. T. Leung, “The google file system,” ACM SIGOPS Operating Systems Review, vol. 37(5), pp. 29–43, 2003.

8.       A. S. Tosun, “Multi-site retrieval of declustered data,” in Proc. 28th Int’l Conf. Distributed Computing Systems, pp. 486–493, 2008.

9.       “National transportation atlas databases.” CD-ROM, 1999. Bureau of Transportation Statistics.




Kushal J Masarkar, Lilesh P Wankhade, Rita Dhage

Paper Title:

A Memetically Optimized Weighted x^2 Based Approach for Matching Sketches with the Digital Face Images

Abstract:    One of the important cues in solving crimes and apprehending criminals is matching sketches with digital face images. This paper presents an algorithm that extracts discriminating information from local regions of both sketches and digital face images. All details information present in local facial regions are encoded using multi-scale circular Weber’s local descriptor. We propose a novel discriminative descriptor modified WLD i.e. multi-scale circular Weber Local Descriptor.. It is inspired by Weber’s Law, We organize MWLD features to compute a histogram by encoding both differential excitations and orientations at certain locations of an sketch and digital face image. Further, an evolutionary memetic optimization approach is proposed to assign optimal weights to every local facial region for identification purpose. Foreign sketches drawn by sketch artist is of poor quality,  a pre-processing technique is used to enhance the quality of images and improve the identification performance. Comprehensive experimental evaluation on different sketch databases show that MCWLD proposed algorithm yields better identification performance compared with the existing face recognition algorithms.



1.        X. Tang and X. Wang, “Face photo recognition using sketch”, in Proceedings of International Conference on Image Processing, 2002, vol. 1, pp. 257–260.
2.        X. Tang and X. Wang, “Face sketch synthesis and recognition”, in Proceedings of International Conference on Computer Vision, 2003, vol. 1, pp. 687–694.

3.        Q. Liu, X. Tang, H. Jin, H. Lu, and Songde Ma, “A nonlinear approach for face sketch synthesis and recognition”, in Proceedings of International Conference on Computer Vision and Pattern Recognition, 2005, vol. 1, pp. 1005–1010.

4.        L. Yung-hui, M. Savvides, and V. Bhagavatula, “Illumination tolerant face recognition using a novel face from sketch synthesis approach and advanced correlation filters”, in Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2006, vol. 2.

5.        X. Gao, J. Zhong, J. Li, and C. Tian, “Face sketch synthesis algorithm based on E-HMM and selective ensemble”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 18, no. 4, pp. 487–496, 2008.

6.        X. Wang and X. Tang, “Face photo-sketch synthesis and recognition”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 11, pp. 1955–1967, 2009.

7.        W. Zhang, X. Wang, and X. Tang, “Lighting and pose robust face sketch synthesis”, in Proceedings of European Conference on Computer Vision, 2010, pp. 420–433.

8.        R. Uhl and N. Lobo, “A framework for recognizing a facial image from a police sketch”, in Proceedings of International Conference on Computer Vision and Pattern Recognition, 1996, pp. 586–593.

9.        P. Yuen and C. Man, “Human face image searching system using sketches”, IEEE Transactions on Systems, Man and Cybernetics - A, vol. 37, no. 4, pp. 493–504, 2007.

10.     Y. Zhang, C. McCullough, J. Sullins, and C. Ross, “Hand-drawn face sketch recognition by humans and a PCA-based algorithm for forensic applications”, IEEE Transactions on Systems, Man and Cybernetics - A, vol. 40, no. 3, pp. 475–485, 2010.

11.     H. Nizami, Adkins-Hill, P. Jeremy, Y. Zhang, J. Sullins, C. McCullough, S. Canavan, and L. Yin, “A biometric database with rotating head videos and hand-drawn face sketches”, in Proceedings of International Conference on Biometrics: Theory, applications and systems, 2009, pp. 38–43.

12.     B. Klare and A. Jain, “Sketch-to-photo matching: A feature-based approach”, in Proceedings of Society of Photo-Optical Instrumentation Engineers Conference Series, 2010, vol. 7667.

13.     H. Bhatt, S. Bharadwaj, R. Singh, and M. Vatsa, “On matching sketches with digital face images”, in Proceedings of International Conference on Biometrics: Theory Applications and Systems, 2010.

14.     B. Klare, L. Zhifeng, and A. Jain, “Matching forensic sketches to mug shot photos”, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 33, pp. 639–646, 2011.

15.     B. Klare and A. Jain, “Heterogeneous face recognition using kernel prototype similarities”, Tech. Rep., Michigan State.s.




R. T. Saudagar, U. S. Wankhede

Paper Title:

Experimental Analysis of Vapour Compression Refrigeration System with Diffuser at Condenser Inlet

Abstract:    This paper discusses design and testing of diffuser at condenser inlet in vapour compression refrigeration system. Four diffusers with divergence angle 10, 15, 20 and 30 were designed for same inlet and outlet diameters. The diffusers used were with inlet diameter equal to discharge tube diameter of compressor and outlet diameter equal to condenser inlet diameter. The system was analysed using the first and second laws of thermodynamics to determine the refrigerating effect, the compressor work input, coefficient of performance (COP) and the rate of heat rejected from the system. During the test, the COPs of the system without diffuser and with optimized diffuser at condenser inlet were found out. With diffuser at condenser inlet, amount of heat rejected from condenser is also increased. To remove the same amount of heat, less heat transfer area required. This concept reduces size of condenser to achieve the same system efficiency.

  Condenser, Diffuser, Experimental analysis, Vapour compression refrigeration system.


1.         M Yari and M Sirousazar, Performance analysis of the ejector-vapour compression refrigeration cycle, Part A: Journal of Power and Energy, Vol. 221, No. 8, December 2007, pp. 1089-1098.
2.         A. Selvaraju, A. Mani, Analysis of an ejector with environment friendly refrigerants, Applied Thermal Engineering, 2004, pp. 1-12.

3.         Mark J. Bergander, New Regenerative Cycle for Vapour Compression Refrigeration, Final Scientific Report, DOE Award Number: DE-FG36-04GO14327, 30th Sept. 2004 to 30th Sept.  2005.

4.         M. A. Akintunde, Validation of vapour compression refrigeration system design model, American Journal of Scientific and Industrial Research, Vol. 2, No. 4, 2011, pp. 504-510.

5.         M. A. Akintunde, Theoretical design model for vapour compression refrigeration systems, A.S.M.E., Vol. 73, No. 5, 2004, pp. 1-14.

6.         P N Ananthanarayanan. Basic Refrigeration and Air Conditioning. Tata McGraw-Hill, 2005.

7.         R. J. Dossat and T. J. Horan. Principles of Refrigeration, Prentice-Hall International Inc., New Jersey, USA, 2002.

8.         Yunus A. Cengel and Michael A. Boles. Thermodynamics An Engineering Approach. Tata McGraw-Hill, 2003.

9.         C. O. Adegoke and M. A. Akintunde, An Experimental Study of Hunting in Evapourators, A.U. J.T., Vol. 10,  No. 1, Jul.-2006,  pp. 45-51.

10.       Bukola Olalekan Bolaji, Effects of Sub-Cooling on the Performance of R12 Alternatives in a Domestic Refrigeration System, Thammasat International Journal Science and Technology, Vol. 15, No. 1, January-March 2010, pp. 12-19.




J.T Liberty, A.U Dzivama

Paper Title:

Design, Construction and Performance Evaluation of Cassava Chips Dryer Using Fuel Wood

Abstract:    The design, construction and performance evaluation of a cassava chips dryer using fuel wood as source of heat was undertaken with a view to help small scale farmers’ process cassava chips. The dryer consists of a frame, drying chamber, a tray, fuel wood housing, perforated air space and a chimney. The dryer was evaluated in terms of final moisture content, drying capacity, time taken to dry the chips and the quality of the chips. Results showed that the moisture content of 65.03% (wb) was reduced to 13.11%, the drying capacity was 6kg per loading and the drying time which was supposed to be 3 hrs was increased to 4hrs due to difficulty in regulating the heat produced by the fuel wood. Compared to other types of dryers (solar dryer, platform dryer, flat – bed dryer, continuous dryer e.t.c), the batch type dryer is preferred due to its ability to be used during rainy season and in the absence of electricity. The quality of the chips was found to be good. The dryer has an efficiency of 80%. The evaluation of the dryer shows that it can be used for small scale drying of cassava. chips.

   batch type dryer, cassava chips, fuel wood, performance evaluation.


1.       Adeluyi .T, Abowel M.F., Achinehu S.C., Fabra T.E (2006). Effect of variety on drying and Engineering Properties of Cassava. Vol(1): 80-96
2.       Anikwe M.A., Onyia V.N.(2005). Ecophysiology and cultivation Practices of Arable crops. New Generation Publications, Enugu, Nigeria. 184-195

3.       Berry S.S.(1993). Socio-economic Aspect of cassava cultivation and use in Africa. Implication for the development of appropriate Technology. COSCA working Paper No.8. Collaboratory study of cassava in Africa. 11TA Ibadan. 17

4.       Dahniya m.t., Akoroda M.O., Alvarez M.N., Kandera P.M, Okeke J.E., Jalloh A. (1994). Development and Dissemination of appropriate Root crops Packages to farmers in Africa. 2-9

5.       Enwere N.J.(1998). Foods of Plant Origin. Afro-orbis Publishers. 1st edition. 137-249

6.       FAO, (1999). Production Year Book. FAOSTAT Database. (consulted August, 2009).

7.       FAO, (2003). Better farming Series for Processing of cassava and sweet Potatoes for animal feeding.

8.       FAO, (2006). Production Year Book. FAOSTATDatabase. (consulted August, 2009).

9.       Grace M. (1997). Cassava Processing Agricultural Services Division, FAO,Rome.10

10.     Hahn N.D. (1999). The Africa Farmer and her Husband. Roots, Tubers and Legumes. Report of the Expert meeting. 71-93.

11.     Njie D.N., Rumesy T.R., Singh R.P.(1998). Thermal properties of Cassava, Yam and Plantain. J. Food Eng. 57,63-76

12.     Osuntokun B.O.(1981). Cassava diet, chronic Cyanide Intoxication and Neuropathy in Nigeria. World Review of Nutrition and Dietics. 36,141-173.

13.     Ugwu B.O., Agobo O., Orkwor G.C. (1998). Cassava Research, Production and Utilization in Nigeria.

14.     Ugwu B.O., Ukpai U.J.(2002). Potential of Cassava Flour Processing to Sustain Increasing Cassava Production in Nigeria. Outlook on Nigeria Agriculture, 31 (2): 129-133

15.     Ukpabi U.J., Ejiofor M.A.N.(1997). Utilization of leaves and Peels of Cassava as Livestock feed supplement S. 120-128




Mohsen Darabian, Bahram Khorram, Mehdi Azari

Paper Title:

Improvement of Power System Transient Stability Using an Intelligent Control Method

Abstract:    Shunt Flexible AC Transmission System (FACTS) devices, when placed at the mid-point of a long transmission line, play an important role in controlling the reactive power flow to the power network and hence both the system voltage fluctuations and transient stability. In this paper, a new intelligent controller used to control the output of an SVC to damp power system oscillations is developed. This controller is an online trained wavelet neural network controller (OTWNNC) with adaptive learning rates derived by the Lyapunov stability. Effectiveness of the proposed technique is robustness to different operating conditions and disturbances. The effectiveness of the proposed controllers is demonstrated on an 2-machine system. Results obtained show improvement in the overall system damping characteristics using the proposed method (OTWNNC).

   Wavelet neural network (WNN), Particle Swarm Optimization (PSO), SVC Design, Transient stability.


1.       P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, N. Hatziargyiou, D. Hill, A. Stankovic, C. Taylor, T. Cutsem, and V. Vittal, “Definition and classification of power system stability,” IEEE Trans. Power Syst., vol. 19, no. 2, pp. 1387–1401, May 2004.
2.       J. J. Sanchez-Gasca, “Coordinated control of two FACTS devices for damping interarea oscillations,” IEEE Trans. Power Syst., vol. 13, no. 2, pp. 428–434, May 1997.

3.       R. Mohan. Mathur and R. K. Varma, Thyristor-Based FACTS Controller For Electrical Transmission System. Piscataway, NJ: IEEE Press/Wiley Interscience, 2002.

4.       K. Clark, B. Fradanesh, and R. Adapa, “Thyristor-controlled series compensation application study—Control interaction considerations,” IEEE Trans. Power Del., vol. 10, no. 2, pp. 1031–1037, Apr. 1995.

5.       D. P. He, C. Y. Chung, and Y. Xue, “An eigenstructure-based performance index and its application to control design for damping interarea oscillations in power systems,” IEEE Trans. Power Syst., vol. 26, no. 4, pp. 2371–2380, Nov. 2011.

6.       Y. C. Chang, R. F. Chang, T. Y. Hsiao, and C. N. Lu, “Transmission system locability enhancement study by ordinal optimization method,” IEEE Trans. Power Syst., vol. 26, no. 1, pp. 451–459, Feb. 2011.

7.       X. Tan, N. Zhang, L. Tong, and Z. Wang, “Fuzzy control of thyristorcontrollered series compensator in power system transients,” Fuzzy Sets Syst., vol. 110, pp. 429–436, 2000.

8.       X. Lei, E. N. Lerch, and D. Povh, “Optimization and coordination of damping controls for improving system dynamic performance,” IEEE Trans. Power Syst., vol. 16, no. 3, pp. 473–480, Aug. 2001.

9.       N. Mithulananthan, C. A. Canizares, J. Reeve, and G. J. Rogers, “Comparison of PSS, SVC, and STATCOM controllers for damping power system oscillations,” IEEE Trans. Power Syst., vol. 18, no. 2, pp. 786–792, May 2003.

10.     M. E. Aboul-Ela, A. A. Sallam, J. D. McCalley, and A. A. Fouad, “Damping controller design for power system oscillations using global signals,” IEEE Trans. Power Syst., vol. 11, no. 2, pp. 767–773, May1996.

11.     U. P. Mhaskar and A. M. Kulkarni, “Power oscillation damping using FACTS devices: Model controllabiliby, observability in local signals, and location of transfer function zeros,” IEEE Trans. Power Syst., vol.21, no. 1, pp. 285–294, Feb. 2006.

12.     A. M. Simões, D. C. Savelli, P. C. Pellanda, N. Martins, and P. Apkarian, “Robust design of a TCSC oscillation damping controller in a week 200-kv interconnection considering multiple power flow scenarios and external disturbances,” IEEE Trans. Power Syst., vol. 24, no. 1, pp. 226–236, Feb. 2009.

13.     B. Chaudhuri, S. Ray, and R. Majumder, “Robust low-order controller design for multi-modal power oscillation damping using flexible AC transmission system devices,” IET Gener. Transm. Distrib., vol. 3, no. 5, pp. 448–459, 2009.

14.     J. M. González, C. A. Cañizares, and J. M. Ramoírez, “Stability modelingand comparative study of series vectorial compensators,” IEEETrans. Power Del., vol. 25, no. 2, pp. 1093–1103, Apr. 2010.

15.     P. K. Dash, S. Morris, and S. Mishra, “Design of a nonlinear variablegain fuzzy controller for FACTS devices,” IEEE Trans. Control Syst. Technol., vol. 12, no. 3, pp. 428–438, May 2004.

16.     C. F. Lu and C. F. Juang, “Evolutionary fuzzy control of flexible AC transmission system,” Proc. Inst. Elect. Eng., Gener., Transm., Distrib, vol. 152, no. 4, pp. 441–448, Jul. 2005.

17.     Y.L. Abdel-Magid, M.A. Abido, “Optimal Multi objective Design of Robust Power System Stabilizers using Genetic Algorithms”, IEEE Trans. On Power Systems, Vol. 18, pp. 1125-1132, 2003.

18.     K. Sebaa, M. Boudour, “Optimal Locations andTuning of Robust Power System Stabilizer Using Genetic Algorithms”, Electric Power Systems Research, Vol. 79, pp. 406-416, 2006.

19.     S. Mishra, M. Tripathy, J. Nanda, “Multi-Machine Power System Stabilizer by Rule Based Bacteria Foraging”, Electric Power Systems Research, Vol. 77, pp. 1595-1607, 2007.

20.     H. Shayeghi, H.A. Shayanfar and A. Ghasemi, “A Robust ABC Based PSS Design for a SMIB Power System”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 8, Vol. 3, No. 3, pp. 86-92, September 2011.

21.     M.A. Abido, “A Novel Approach to Conventional Power System Stabilizer Design Using Tabu Search”, Electrical Power and Energy Systems, Vol. 21, pp443- 454, 1999.

22.     A.M. El-Zonkoly, A.A. Khalil, N.M. Ahmied, “Optimal Tuning of Lead-Lag and Fuzzy Logic Power System Stabilizers using Particle Swarm Optimization”, Expert Systems with Applications, Vol. 36, pp. 2097- 2106, 2009.

23.     H.M. Soliman, E.H.E. Bayoumi, M.F. Hassan, “PSO-Based Power System Stabilizer for Minimal Overshoot and Control Constraints”, Journal ofElectrical Engineering, Vol. 59, No. 3, pp. 153-159, 2008.

24.     A. Safari, H. Shayeghi, H.A. Shayanfar, “Optimization Based Control Coordination of STATCOM and PSS Output Feedback Damping Controller Using PSO Technique”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 5, Vol. 2, No. 4, pp. 6-12, December 2010.

25.     H. Shayeghi, A. Ghasemi, “Application of PSO TVto Improve Low Frequency Oscillations” , International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue 9, Vol. 3, No. 4, pp. 36-44, December 2011.

26.     A. Alfi, M. Khosravi, “Optimal power system stabilizer design TO reduce low frequency oscillation via an improved swarm optimization algorithm ”, International Journal on Technical and Physical Problems of Engineering (IJTPE), Issue11, Vol. 4, No. 2, pp. 24-33, June 2012.

27.     M. J. Lautenberg,  M. A. Pai, and K. R. Padiyar, “Hopf  Bifurcation Control in Power System with Static Var Compensators,” Int. J. Electric Power and Energy Systems, Vol. 19, No. 5, pp. 339–347, 1997.

28.     N. Mithulananthan, C. A. Ca˜nizares, and John Reeve, “Hopf Bifurcation Control in Power System Using Power System Stabilizers and Static Var Compensators,” Proc. of NAPS’99, pp. 155–163, San Luis Obispo, California, Oct. 1999.

29.     S. Haykin, Neural Networks: A Comprehensive Foundation. New York: Macmillan, 1994.

30.     G.D. Magoulas, M.N. Vrahatis, G.S. Androulakis, Improving the convergence of the backpropagation algorithm using learning rate adaptation methods, Neural Computation 11 (1999) 1769–1796.

31.     C.C. Ku, K.Y. Lee, Diagonal recurrent neural networks for dynamics systems control, IEEE Trans. Neural Networks 6 (1) (1995) 144–156.

32.     C.H. Lee, C.C. Teng, Identification and control of dynamic systems using recurrent fuzzy neural network, IEEE Trans. Fuzzy Systems 8 (4) (2000) 349–366.

33.     J. Yoo, J.B. Park, Y.H. Choi, Direct adaptive control using self recurrent wavelet neural network via adaptive learning rates for stable path tracking of mobile robots, in: Proc. American Control Conference, 2005, pp. 288–293.

34.     Panda, Sidhartha, 2009. Multi-objective evolutionary algorithm for SSSC-based controller design. Electr. Power Syst. Res. 79 (6), 937–944.

35.     Kundur P. Power system stability and control. McGraw-Hill; 1994.

36.     Y. Shi and R. Eberhart, “A modified particle swarm optimizer, ” Proc. Int. Conf. on Evolutionary Computation, Anchorage, pp. 69-73, 1998, AK, USA.




K. M. Sivakumar, R. Gandhinathan

Paper Title:

Establishing Optimum Process Parameters for Machining Titanium Alloys (Ti6Al4V) In Spark Electric Discharge Machining

Abstract:   In this study, the spark electric discharge machining(SEDM) of titanium alloys with different electrode materials namely electrolytic copper, beryllium copper, tungsten copper, graphite, aluminium, steel(EN24) and copper impregnated graphite, were conducted to find the suitable electrode material. Therefore the design of experiments were conducted using Taguchi method to find the optimum machining parameters with process parameters such as current, spark on time, spark off time to explore the influence of various SEDM parameters on various requirements such as material removal rate, electrode wear and over cut. The experimental results reveal that the suitable electrode material for machining titanium alloys is copper impregnated graphite. It is found that material removal rate is mainly influenced by discharge on time (Ton) and discharge current (I), whereas discharge off time (Toff) has least effect on material removal rate. Electrode wear is mainly influenced by discharge on time (Ton) and discharge off time (Toff), whereas discharges current (I) has least effect on electrode wear. Over cut is mainly influenced by discharge current (I) and discharge on time (Ton), whereas discharge off time have a very least effect on over cut.  

   EDM, Titanium alloys, electrode material, nontraditional machining.


1.       Ahmet hascalik, Ulas Caydas,”Electric discharge machining of titanium alloys (Ti6Al4V)”, Int Journal of applied surface science, 253(2007) 9007-9016.
2.       ASM handbook, properties and selection: Non ferrous alloys and special purpose materials, Vol 2, 1993

3.       Roger kern, “Sinker electrode material selection”, EDMToday magazine July/August 2008 issue.

4.       “EDM electrode materials information on Global spec”,

5.       BalaMurugan gopalsamy, Biswanath mondal and Sukamal ghosh, “Taguchi method and ANOVA: An approach for the process parameters optimization of hard machining while machining hardened steel”, Journal of scientific and industrial research, Vol 68, August 2009, pp 686-695.

6.       Philip J Ross, “Taguchi techniques for quality engineering”, McGraw Hill, Newyork 1995.

7.       Pravin R Kubade, V. S. Jadhav,”An experimental investigation of electrode wear rate, material removal rate and  radial over cut in EDM of high carbon-high chromium steel(AISI D3)”, Int Journal of engineering and advanced technology, ISSN: 2249-8958, Vol 1, Issue 5, June 2012.

8.       Bhola Jha, K. Ram and  Mohan Rao,“An overview of technology and  research in electrode design and manufacturing in sinking electric discharge machining ”, Journal of engineering science and  review, review 4(2) (2011) 118-130.

9.       M. A. Norliana, D. G. Solomon and F. Bahari, ”A review on current research trends in electrical discharge machining(EDM)”, Int Journal of machine tools manufacturing, 47 (2007)  1214-1228.

10.     K. R. Thangadurai,  A. Asha,”Mathematical modeling of electrical discharge machining process of AA 6061-10% B4Cp MMC through Response surface methodology”, European Journal of scientific research ISSN 1450-216X, Vol 81, No 4 (2012), pp 476-492.

11.     Mohd Amri Lajis, H. C. D. Mohd Rdzi and A. K. M. Nurul Amin”The implementation of taguchi method on EDM process of tungsten carbide”, European Journal of scientific research, ISSN 1450-216X Vol 26 No 4 (2009), pp 609-617.

12.     T. C. Bhagat and H. S. Payal,”Optimization of EDM process parameters for minimum surface roughness of die steel with copper and copper tungsten electrodes”, Int Journal of advanced scientific and technical research, Issue 2, Vol 5, ISSN 2249-9954, October 2012.




Ajay K. Singh, A. Rehman

Paper Title:

The Influence of Engine Speed on Exhaust Emission of Four Stroke Spark Ignition Multi Cylinder Engine

Abstract:    An experimental study is carried out to investigate engine performance parameters and methods of reducing emissions from spark ignition engine. Fuel efficiency is one of the major concerns for the users, the designers and the manufacturers of internal combustion (IC) engines, The effect of increasing the temperature of cylinder liner has the advantage of reducing the specific fuel consumption but it increases thermal stresses on piston head, challenges material properties such as high temperature yield strength, creep and high temperature fatigue, increases chances of knocking and pre ignition and decreases the volumetric efficiency. Coolants with specified fluid properties are circulated through inner channels in the cylinder blocks to maintain an optimum temperature. The present investigation reports the experimental study carried out by using three cylinders, four stroke petrol carburetor of Maruti 800 engine. The engine is connected to eddy current type dynamometer to provide suitable loading with provisions for measuring and control of fuel flow to maintain fuel –air mixture ratio. It is found that exhaust emission is a dependent parameter on decrease even at higher loads which confirming that engine perform better upon optimal load condition rather than part load condition.

   Exhaust emission, spark ignition engine, optimization, and engine speed.


1.       Robinson K, N., Campbell, J., Hawley. (1999) and D. Tilley (1999),"A Review of  Precision Engine Cooling". SAE paper 1999-01-0578.
2.       Borman, G. and K. Nishiwaki (1987), "International Combustion Engine Heat Transfer," Proceedings of Energy Combustion Sci., 13, p. 1 - 46.

3.       LI, (1982),"Piston Thermal Deformation and Friction Considerations," SAE paper no 820086.

4.       Bruckner, M. Gruenbacher, E. Aberer, D. RE, L.D., Tschreiter, F, (Oct 2006), "Predictive Thermal Management of Combustion Engine," page 2778-2783,

5.       Kirlosker, C.S., Chanderasekher, S.B and Narayan Rao, N.N., The av-1 series 3 differentially cooled semi-adiabatic diesel engine below 10kw.SAE paper no.790644. 1979.

6.       Kobayashi, H., Yoshimura, K. and Hirayama, T.:- A study on dual circuit cooling or higher compression ratio, I MechE, 427.84 ,SAE paper, no. 841294,1984.

7.       Willumeit, H.P, Steinberg, P., Scheibner, B and Lee, W. New:- “Temperature control criteria for more efficient  gasoline engine”, SAE paper no. 841292,1984.

8.       Finlay, I.C. Tugwell, W., Biddulp, T.W. and Marshell, R.A.:- “The influence of Coolant Temperature on the Performance of a Four Cylinder 1100cc engine.

9.       Kubozuka, T., Ogava, N., Hirano, Y .and Yayashi, Y: - The development of engine evaporative cooling system .SAE paper no. 870033, (1987).

10.     Employing dual circuit cooling, SAE paper, no. 8802631

11.     Clough ,M.J.: Precision cooling of a four valve per cylinder engine .SAE paper, no. 931123.(1993)

12.     Guillemot, P., Gatellier, B. and Rouveirolles, P. :-The influence of coolant temperature on unburnt hydrocarbon emission from spark ignition engine SAE paper no 941962, (1994).

13.     Pang ,H.H., Brace ,C.J. and Akehurst, S. “Potential of controllable engine cooling system to  reduce nox emission in diesel engine” SAE paper no.(2004)

14.     Nishano, T., Seneba, H. and Murakami, N. “Study of engine cooling technology for knock suppression in spark ignition engines”. Mitsuhibishi Motor Technology Review 2004, no.16.

15.     Finlay, I.C., Gallacher, G.R., Biddulph, T.W. and Marshell, R.A.:- The application of precision cooling to the cylinder head of a small automotive petrol engine, SAE paper no. 880263.(1988)

16.     Fattic, G. T. and Walters, J.E: Cold starting performance of a 42 volt integrated starter generator system, SAE paper no. 2002-01-0523, 2002.

17.     Taylor, C.F. (1985), "The Internal Combustion Engine in Theory and Practice," MIT Press, Cambridge, Massachusetts.

18.     Caton, J.A. and J.B.Heywood (1981),"An Experimental and Analytical Study of Heat Transfer in An Engine Exhaust Port", hit. J. Heat Mass Transfer, 24(4), p. 581-595.

19.     Whitehouse, N.D. (1970-1971), "Heat Transfer in a Quiescent Chamber Diesel Engine," Proc. instn. Mech. Engrs., 185, p. 963-975.

20.     LI WEI, Wang Ying, Zhou Longbao, Su ling, (10 April 2007), "Study On Improvement of Fuel Economy.

21.     LI Jafari, Siamak Kazemzadeh Hannani, (January 2006),"Effect of Fuel and Engine Operational Characteristics on The Heat Loss From Combustion Chamber Surfaces of SI Engines", International Communications in Heat and Mass Transfer, Volume 33, Issue 1, Pages 122-134.During Engine Warm-up," American Journal of Applied Sciences 4 (3), 106-111, ISSN 1546-9239.

22.     Willard W. Pulkrabek (2003) “Engineering fundamental of internal combustion engine” page no. 229-230

23.     A. Rehman, R.M. Sarviya, Savita Dixit, Rajesh Kumar Pandey (2010) “The influence of coolant temperature on the performance of a four stroke S.I. engine employing dual circuit cooling system” CIGR Journal, Vol. XII, Januray, 2010.




N.Pandeeswari, P.Ganesh Kumar, P.C.Rubini

Paper Title:

A Serial Based Encryption for Enhanced Access Control in Cloud Computing

Abstract:    Cloud storage allows us to enjoy the on demand cloud application without any hardware implementation. Cloud provides the service a required by the cloud user in a rental basis. Even though the cloud issues the cloud application without any physical implementation results in a security risk since the cloud data can be accessed by everyone. To avoid security issue in the outsourced data a prevention measure is needed to secure the data from unauthenticated users or intruders. A flexible distributed storage integrity mechanism utilising homomorphic tokens and  is proposed in this paper to provide security in the outsourced cloud data. This mechanism include the techniques such In order to address security for outsourced data and secure cloud storage, we propose in this paper a flexible distributed storage integrity checking mechanism, utilizing the homomorphism token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very low computation cost and lightweight communication. The auditing result not only guarantees strong cloud storage correctness, but also simultaneously identifies fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data modification attack.

 The auditing result not only guarantees strong cloud storage correctness, but also simultaneously identifies fast data error localization, i.e.,


1.        Zhiguo Wan, Jun’e Liu, and Robert H. Deng, Senior Member, IEEE, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing” ieee transactions on information forensics and security, vol. 7, no. 2, april 2012.
2.        Amazon Elastic Compute Cloud (Amazon EC2) [Online]. Available:

3.        Amazon Web Services (AWS) [Online]. Available: https://s3.amazonaws. com/

4.        Google App Engine [Online]. Available:

5.        K. Barlow and J. Lane, “Like technology from an advanced alien culture: Google apps for education at ASU,” in Proc. ACM SIGUCCS User Services Conf., Orlando, FL, 2007.

6.        B. Barbara, “ Raising the level of networking,” Inf. Today, vol. 27, pp. 45–45, 2010.

7.        T. Yu and M. Winslett, “A unified scheme for resource protection in automated trust negotiation,” in Proc. IEEE Symp. Security and Privacy, Berkeley, CA, 2003.

8.        V. Goyal, O. Pandey, A. Sahai, and B.Waters, “Attibute-based encryption for fine-grained access control of encrypted data,” in Proc. ACM Conf. Computer and Communications Security (ACM CCS), Alexandria, VA, 2006.

9.        J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attributebased encryption,” in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2007.

10.     R. Bobba, H. Khurana, and M. Prabhakaran, “Attribute-sets: A practically motivated enhancement to attribute-based encryption,” in Proc. ESORICS, Saint Malo, France, 2009.

11.     G.Wang, Q. Liu, and J.Wu, “Hierachical attibute-based encryption forfine-grained access control in cloud storage services,” in Proc. ACMConf. Computer and Communications Security (ACM CCS), Chicago, IL, 2010.




Himanshu Agarwal, Kaushalendra Kr. Dubey, Subhash Kamal

Paper Title:

Development of Mechanical Fuel Injector Cleaning Machine in Cost Effective Manner

Abstract:    When fuel injectors get polluted, it create obstruction in fuel flow and unable to allow spray pattern for proper combustion. In the present market Fuel Injector cleaning machine is used to clean the injectors with the help of controlled gasoline spray system. We have designed and developed for the most cost effective Rs 20,500 this is 10 times less than the existing fuel injector cleaning machine. The development of this work explaining conversion of electrical fuel injection system into mechanical type fuel injection system is cost effective, manually operated, multiple flow, single man powered and equally efficient with electrical system.

   Injector, Air cylinder, Fuel cylinder.


1.        Automobile fuel system History.htm
2.        Circle Track, 9/84, pp.82-3

3.        Heywood, John B.1988 Internal Combustion Engine Fundamenta  ls. New York City: McGraw-Hill Book Co. Inc


5. co m pressor-250x250.gif

6. store/imag es/ Br ass%20Gcat e%20Valves%20Non%20Tested.jpg

7.        http://ne wimg.globa /PicLib /789 /2026 789/prod/ 0_ 1314172839656_l.jpg

8. oup/ WIK_ 9694255.jpg

9. I K_9 296255.jpg

10. I K_ 9894455.jpg

11. 72255 8619279 51169 /Fuel In j ectorCleaner?gsessionid =audog WxUOz x ScK9FO wQGCA #5 195700749907998018

12. /4f0 j00SeEQlOGF bhoz/Fuel-Filter-16400-03J00-.jpg

13.     Sowell, Edward F,1976, Fuel Injector Testing.

14.     Stinson, Karl W. 1981, Diesel Engineering Handbook, 12th Editi on, Norwalk, Connecticut: Business Journals.

15.     Walton, Harry,March 1957. "How Good is Fuel Inject ion?" . Pop ular Science 170 (3): 88–93. Retrieved 2012-03-24.

16.     Wynn’s Spitfire, April 2008, Injector Cleaner, , P.P 1-3.





Vikash Sharma, Jayant Kumar

Paper Title:

Energy Efficient Partitioning Of Last Level Cache Memory with Cooling Management for Memory and CPU Subsystems

Abstract:    This paper presents a technique to improve the over- all performance of the multiprocessor chip.  Efficient partitioning of last- level cache memory in a multi-processor chip can increase the performance significantly. The concept is to first allocate the fixed number of ways for a core and then forced the cache data to be way aligned so that a particular way is owned by a core at a particular time. At the time of access, cores cooperate with each other to migrate the ways between them so that a core has to consult only those ways which it has owns to find its data from which dynamic energy can be saved and unused ways can be power-gated for saving the static energy. This paper also presents a cooling management strategy for memory and CPU subsystems. It manages the temperature of memory and CPU subsystems by activating the memory and CPU actuators which does the required action in the subsystems of memory and CPU. It considers the thermal and power states of CPU and memory, thermal coupling between them and fan speed to arrive at energy efficient decisions.

   last level cache memory (LLC), CPU actuator, Memory actuator, RAP, WAP


1.        D. H. Albonesi. Selective cache ways: On-demand cache resource allocation. In MICRO, 1999R. Bitirgen, E. Ipek, and J. F. Martinez. Coordinated management of multiple interacting resources in chip multiprocessors:A machine learning approach. In MICRO, 2008
2.        Karthik T. Sundararajan, Vasileios Porpodas, Timothy M. Jones. Cooperative Partitioning: Energy-Efficient Cache Partitioning for High-Performance CMPs HPCA 2011

3.        Ajami, K. Banerjee, and M. Pedram. Modeling and analysis of nonuniform substrate temperature effects on global interconnects. IEEE Trans. on CAD, pages 849–861, 2005

4.        R. Ayoub, K. R. Indukuri, and T. S. Rosing. Temperature aware dynamic workload scheduling in multisocket cpu servers. TCAD, 30(9):1359–1372, 2011.

5.        Raid Ayoub Rajib Nath Tajana Rosing. JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers HPCA 2011

6.        K. Flautner,  N. S. Kim,  S. M. Martin,  D. Blaauw,  and T. Mudge. Drowsy caches: Simple techniques for reducing leakage power. In ISCA, 2002.

7.        M. Ghosh, E. Ozer, S. Ford, S. Biles, and H.-H. S. Lee. Way guard: a segmented counting bloom filter approach to reduc- ing energy for set-associative caches. In ISLPED, 2009.

8.        F. Guo, Y. Solihin, L. Zhao, and R. Iyer.  A framework for providing quality of service in chip multi-processors. In MI- CRO, 2007.

9.        L. R. Hsu, S. K. Reinhardt, R. Iyer, and S. Makineni. Com- munist, utilitarian, and capitalist cache policies on CMPs: Caches as a shared resource. In PACT, 2006.

10.     R. Iyer.  CQoS: A framework for enabling QoS in shared caches of CMP platforms. In ICS, 2004.




U.Jyostna Sai Prasanna, M.V.D.Prasad

Paper Title:

Automatic Fire Sensing and Extinguishig Robot Embedded With GSM Modem

Abstract:    Our goal is to develop an intelligent multi sensor based fire fighting robot in our daily life. We design the fire detection system using four flame sensors in the fire fighting robot, and program the fire detection and fighting procedure using sensor based method. The fire fighting robot is equipped with four thermistors/flame sensors that continuously monitor the temperature. If the temperature increases beyond the predetermined threshold value, buzzer sounds to intimate the occurrence of fire accident and a warning message will be sent to the respective personnel in the industry and to nearby fire station with the GSM module provided to it. Fire Fighting Robot continuously monitors the temperature at four sensors and if fire accident is true, the robot moves to the direction to which the temperature is recorded to be the relatively maximum among the four sensors and extinguishes the fire with water pump provided to it. After extinguishing the fire it comes back to its initial position. It is more advantageous than a smoke detector as it can extinguish the fire at the inception than waiting for an object to burn and produce smoke. When a smoke detector detects fire it, sprays water all over the place, instead of that particular point of source. It voluntarily detects and extinguishes fire without human aid.

   Extinguisher, Fire Sensors, GSM, Microcontroller


1.       Muhammad Ali Mazidi, the 8051 Microcontroller and Embedded Systems.
2.       Verner, I.; and Betzer, N. 2001. Machine Control - A Design and Technology Discipline in Israel's Senior High Schools. International Journal of Technology, In press.

3.       Jones, J.; Seiger, B.; and Flynn, A. 1999. Mobile Robots, Inspiration to Implementation, 2nd ed. Natick, Mass: A. K. Peters.

4.       Wireless communication technologies: new multimedia Systems By Norihiko Morinaga

5.       Encyclopedia of Fire fighter surveillance robot




Shivam Pandey, Mohan Rao Mamdikar, Bhudev Kumar Mahato

Paper Title:

An Energy-Efficient Slotted MAC (SL-MAC) Protocol for Wireless Sensor Networks

Abstract:    The efficient use of energy is an important performance target to magnify the lifetime of wireless sensor networks (WSNs). The idle listening of sensor nodes is one of the primary causes of energy waste; so many typical MAC protocols are designed to rescue power by placing the radio in the low-power sleep mode.  In this paper, a new energy-efficient Slotted MAC (SL-MAC) protocol is proposed for wireless sensor networks. It is designed with three main features: 1) reducing energy consumption 2) minimizing the number of collisions 3) reducing average packet delay. Sensor nodes in SL-MAC have a very short listen time period which would reduce the energy required to communicate with other nodes. Also, the number of collisions is minimized by using Back-off algorithm in SL-MAC. This saves the energy required to re-send the corrupted packets. Simulation results show much better performance of the energy consumption compared with the existing MAC Protocols.

   Energy management, medium access control (MAC), wireless sensor networks (WSN).


1.       W. Ye, J. Heidemann, and D. Estrin, "An energy-efficient MAC protocol  for wireless sensor networks," Proceedings of the 21st Intemational Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2002), vol. 3, New York, NY, USA, June 2002, pp. 1567-1576.
2.       W. Ye, J. Heidemann, D. Estrin “Medium Access Control with Coordinated, Dynamic Sleeping for Wireless Sensor Networks”, IEEE/ACM Transactions on Networking, Vol. 12, No.3, 2004, pp. 493-506.

3.       P. Koutsakis, “On Increasing Energy Conservation for Wireless Sensor Networks,” International Conference on Wireless and Mobile Communications, 2006, ICWMC’06, 29-31 July 2006, Bucharest, pp 4-4. T. van Dam and K. Langendoen, "Energy-efficient MAC: An Dynamic energy-efficient MAC protocol for wireless sensor networks," in Proceedings of the jrst internationalconference on embedded networked sensor systems (SenSys), Los Angeles, California,USA, Nov. 2003.

4.       Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification,IEEE Std. 802.11, 1997.

5.       C. Raghavendra and S. Singh, "PAMAS: Power aware multi-access protocol with signaling for ad hoc networks," ACM SIGCOMM Computer Communication Review, vol. 28, Issue 3, pp. 5-26, July 1998.

6.       T. van Dam and K. Langendoen, "Energy-efficient MAC: An Dynamic energy-efficient MAC protocol for wireless sensor networks," in Proceedings of the first international conference on embedded networked sensor systems (SenSys), Los Angeles, California,USA, Nov. 2003.

7.       K. Sohrabi and G. J. Pottie, "Performance of a novel self-organization protocol for wireless ad hoc sensor networks,” Proc. of the IEEE 50th Vehicular Technology Conference,  vol 2, pp. 1222-1226, 1999.

8.       L. Bao and J. J. Garcia-Luna-Aceves, "A new approach to channel access scheduling for ad hoc networks," Proceedings of the 7th  annual international conference on mobile computing and networking, pp. 210-221. July 2001.

9.       V. Rajendran, K. Obraczka , and J.J. Garcia-Luna-Aceves, “Energy-Efficient, Collision-Free Medium Access Control for Wireless Sensor Networks,” Journal: Wireless Networks, Publisher: Springer Netherlands, vol. 12, No 1, pp. 63-78, 17th February 2006.

10.     Raja Jurdak, Cristina Videira Lopes, and Pierre Baldi, A Survey, Classification and Comparative Analysis of Medium Access Control Protocols for Ad Hoc Networks,” IEEE Communications Surveys & Tutorials, First Quarter 2004. pp. 2-16,





Gaurang A. Parmar, Yogesh D. Rathod, Sunil H. Kukadiya, Sarthi B. Bhavsar, Jigar K. Sevalia

Paper Title:

Study on Remedial Measures to Control Machine Induced Vibration of Factory Building

Abstract:    A comprehensive understanding of structural dynamics is essential to the design and development of new structures, and to solving the vibration problems on existing structures. A broad range of complex vibration problems can occur in the Looms Industry. A successful analysis and resolution of machine vibration problem requires a thorough understanding of the equipment, and the ability to apply various diagnostic techniques. Due to heavy machine operations the building is subjected to vibration effect. This paper aims at understanding the behaviour of Looms factory building, subjected to dynamic loading and provision of certain remedies to such buildings which can overcome resonance condition.

   Cross Bracing, Cross Tie-Beam, Haunch, Jacketing, Looms Industry, Time History.


1.       Barkan D. D., “Dynamics of Bases and Foundations”, Mcgraw-Hill Book Company, Inc.
2.       Bhatia K. G., “Foundations For Industrial Machines And Earthquake Effects”, 28th ISET Annual Lecture.

3.       Gopal L. Rai “Different Strengthening Techniques for RC Columns” R&M International Pvt. Ltd.

4.       Hjelmstad Keith D. and Foutch Douglas A. “Forced Vibration Studies of an RC Building Retrofit with steel bracing”, Proceedings of ninth world conference on earthquake engineering August 2-9, 1988, Tokyo-Kyoto, Japan (vol.VII).

5.       Lachal A. and Aribert J. M. " Static Design and Cyclic Behaviour of end- plate steel and composite joints strengthed by haunches”, Advances in Steel structures, Vol. – II.

6.       Rathish Kumar P. and Oshima T., “Studies On R.C and Ferro-cement Jacketed Columns Subjected To Simulated Seismic Loading”, ASIAN JOURNAL OF CIVIL ENGINEERING (BUILDING AND HOUSING) VOL. 8, NO. 2 (2007).

7.       Srinivasulu P. and Vaidyanathan C.V, 2003, “Handbook of Machine Foundations”, Tata Mcgraw –Hill Publishing Company, New Delhi.

8.       Uang Chia-Ming And Noel Shane “Cyclic Testing Of Steel Moment Connections Rehabilitated With Reduced Beam Section (RBS) Or Welded Haunch”, Journal Of Structural Engineering January 2000.

9.       Ungermann D and Strohmann I. “Stability of I-shaped members with haunches under bending – Design aids for individual member checks”, NSCC2009.

10.     Waghmare Pravin B. “Materials And Jacketing Technique For Retrofitting Of Structures”, International Journal Of Advanced Engineering Research And Studies E-Issn2249 – 8974.




Deepanshu Sharma, Banwari, Deepak Upadhyay

Paper Title:

Software Project Health Analysis: Prediction of Outcome at Initial Stage

Abstract:    The paper proposes an approach for analyzing the health of a software project. The approach aims at the prediction of software project outcome as Success or Failure at the Initial stage. The approach involves the collection of historical projects data in a defined format. The collected data is in the form of Risk Factors and their corresponding values of Impact and Probability. The collected data is then performed with some pre-processing so as to generate information (rule set) from them. The generated rule set or information can then be applied to future projects so as to predict their outcome based on the values of the Impact and Probability for existing Risk Factors. Here we have used Decision Tree Rule Induction for the generation of the rule set from the pre-processed data.              

   Decision Tree, Project Health Analysis, Risk Factors and Dimensions, Rule Set 


1.       Gray, C. F. and Larsen, E.W., “Project Management: The Managerial Process”, 4th edition, McGraw-Hill Educations, Singapore, 2008.
2.       Abdullah Al Murad Chowdhury and Shamsul Arefeen, “Software Risk Management: Importance and Practices”, IJCIT vol. 02, issue 01, 2011.

3.       B. Hughes and M. Cotterell, Software Project Management 4th edition, pp.147, 1996, McGraw Hill (UK).

4.       Tharwon Arnuphaptrairong, “Top Ten Lists of Software Project Risks: Evidence from Literature Survey”, IMECS vol. 1, Hong Kong, 2011.

5.       W.M. Han and S.J. Huang, “An Empirical analysis of Risk Components and Performance of Software Projects”, The Journal of Systems and Software vol. 80 number 1, pp.42-50, 2007.

6.       L. Wallace and M. Keil, “Software Project Risk and their Effect on Outcomes”, Communication of the ACM, vol. 47 number 4, pp. 68-73, 2004.

7.       Clancy, T. The Standish Group Report, Retrieved Feb 20, 2008 from, Chaos report, 1995.

8.       Wasileski, J.S., “Learning Organization Principles & Project Management”, SIGUCCS’05, November 6-9, 2005, Monterey, California, USA.

9.       Salvatore Alessandro Sarcia, Giovanni Cantone and Victor R. Basili, “A Statistical Neural Network Framework For Risk Management Process”, from the proposal to its Preliminary Validation for Efficiency.

10.     Linyu Yang, Dwi H. Widyantoro, Thomas Ioerger, John Yen, “An Entropy based Adaptive Genetic Algorithm for Learning Classification Rules”.

11.     Xiaohong Shan, GuoRui Jiang and Tiyan Huang, “A Framework of estimating software project success potential based on association rule mining”, IEEE, 2009.

12.     Lior Rokach and Oded Maimon, “Decision Trees”, Chapter 9, pp. 165-192.

13.     Ding-An Chiang, Wei Chen, Yi-Fan Wang and Lain-Jinn Hwang, “Rules Generation from the Decision Tree”, Short paper, Journal of Information Science and Engineering, pp. 325-339, 2001.




Er.Qasim kamil Mohsin, Jyoti  Shrivastava

Paper Title:

Ac Power Flow Control of Grid by Series D-Fact

Abstract:    The power interconnection is getting increasingly congested so to control power flow of transmission grid, to limit loop flows, and also the capacity of transmission line can be increased by use of flexible ac transmission systems (FACT) devices. But high cost and reliability concerns have limited the FACT solutions.  This paper introduces the concept of Distributed SERIES FACTS (D-FACTS) as an alternative approach to realizing cost-effective power flow control by way of distributed series impedance (DSI) and a distributed static series compensator (DSSC). D-FACTS can be clipped on power line and it can dynamically and statically change the impedance of the line so as to control and increase capacity of power flow. D-FACTS provides  higher performance and lower cost method for enhancing T&D system reliability and controllability, improving asset utilization and end-user power quality, while minimizing system cost and environmental impact.              

   Power flow control, FACTS device system, Distributed flexible AC transmission systems


1.        Deepak Divan and Harjeet Johal "Distributed FACTS-A New Concept for Realizing Grid Power Flow Control", IEEE transactions on power electronics, vol. 22, no. 6, November 2007.
2.        N. Hingorani, "Flexible ac transmission" , IEEE Spectrum, vol. 30, no. 4, pp. 40–45, Apr. 1993.

3.        L. Gyugyi, C. D. Schauder, and K. K. Sen, "Static series compensator A solid-state approach to the series compensation of transmission lines". IEEE Trans. Power Del., vol. 12, no. 1, pp. 406–407, Jan. 1997.

4.        S. Bhattacharya, B. Fardanesh, B. Shperling, and S.Zelingher, "Convertible static compensator: Voltage source converter based facts application in the new york 345 KV transmission system", Int. Power  Electron Conf. Records, pp. 2286–2294, Apr. 2005.

5.        constants  for 132KV&400KV overhead line for Iraq network .

6.        D. Divan, W. Brumsickle, R. Schneider, B. Kranz, R. Gascoigne, D. Bradshaw, M. Ingram, and I. Grant, "A distributed static series compensator system for realizing active power flow control on existing power lines" , in IEEE PSCE Conf. Records, Oct. 2004.

7.        H. Johal and D. M. Divan, "Current limiting conductors: A distributed approach for increasing system capacity and reliability", in Proc. Transmission Distribution Conf. Exposition 2005 IEEE PES, New Orleans, LA.

8.        P.-T. Cheng, S. Bhattacharya, and D. Divan, "Operations of the dominant harmonic active filter (DHAF) under realistic utility conditions" , IEEE Trans. Ind. Appl., vol. 37, no. 4, pp. 1037–1044, Jul. 2001.

9.        Prof Deepak Divan Georgia Institute of Technology Atlanta, "Distributed Intelligent Power Networks – A New Concept for Improving T&D System Utilization and Performance " . GA 30332




S. Saravanan, A. Sureshkumar, S. Thangavel

Paper Title:

A New Topology of Multiple-Input Converter with Embedded Controller Based Power Management

Abstract:    This paper presents a new power conditioner topology that integrates multiple renewable energy sources to make best use of their operating characteristics and obtain better reliability than that could be obtained by single renewable energy based power supply. The proposed power conditioner uses three sources, one storage device and isolated load outputs. The proposed multiple-input converter uses intelligent closed loop control for efficient power control. The proposed power conditioner uses very limited number of switches and promises significant savings in component count and reduced losses in renewable energy power-harvesting system by reducing the on-state conduction loss and switching loss in comparison to topology like H-Bridge converters. The power conditioner houses a battery bank which is suitably connected by the controller to sink or source the input power based on the load requirement..

   Fuel cell, Multiple - Input Converter, PV panel, Power Conditioner, Renewable Energy Integration, Wind Turbine Generator.


1.        Z.Qian, O.Abdel-rahman and I.Batarse “An Integrated Four-Port DC/DC Converter for Renewable Energy Applications,”IEEE Trans. Power Electron., vol. 25, no.7, pp 1877 - 1887, july 2010,
2.        Yaow-Ming Chen, Yuan-Chuan Liu, and Feng-Yu Wu, “Multi-Input DC/DC Converter Based on the Multi winding Transformer for Renewable Energy Applications” IEEE Trans on Industry Applns, Vol. 38, No. 4,pp 1096 - 1104, 2002.

3.        Al-Atrash.H and Batarseh.I, “Boost-Integrated Phase-Shift Full-Bridge Converters for Three-Port Interface”, in Proc. IEEE Power Electron. Spec. Conf., pp. 2313–2321, 2007

4.        Jorge L. Duarte, Marcel Hendrix, and Marcelo Godoy Simões ,“Three-Port Bidirectional Converter for Hybrid Fuel Cell Systems”, IEEE Trans.  Power Electron, Vol. 22, no. 2, pp 480-487, 2007

5.        Chen.Y.M, Liu.Y.C, and Wu.F.Y , “Multi-Input DC/DC Converter Based on the Multi Winding Transformer for Renewable Energy applications”, IEEE Trans. Ind. Appl., vol. 38, no. 4, pp. 1096–1104, 2002.

6.        Chuanhong Zhao, Simon D. Round, and Johann W. Kolar, “An Isolated Three-Port Bidirectional DC-DC Converter With Decoupled Power Flow Management ” IEEE Trans.  Power Electron., Vol. 23, No. 5,pp 2443 – 2453, 2008.

7.        Khaligh. A, Cao. J, and Lee. Y , “A Multiple-Input DC–DC Converter  Topology”, IEEE Trans. Power Electron., vol. 24, no. 3, pp. 862–868, 2009.

8.        Tao. H, Duarte. J. L, and Hendrix. M. A. M , “Three-Port Triple Half-Bridge Bidirectional Converter with Zero-Voltage Switching”, IEEE Trans. Power Electron., vol. 23, no. 2, pp. 782–792,2008.

9.        Duarte. J. L, Hendrix. M, and Simoes. M. G, “Three-Port Bidirectional Converter for Hybrid Fuel cell Systems”, IEEE Trans. Power Electron., vol. 22, no. 2, pp. 480–487, 2007.

10.     H.Tao, A. Kotsopoulos, J.L Duarte and M.A.M Hendrix, “ Family of multiport bidirectional DC –DC  Converters”, IEEE Proc. Electr. Power Appl. Vol. 153,  no. 3, pp 451 – 458, May 2006

11.     Ramos Hernanz, J.A., Campayo Martín, J.J.,  Zamora Belver, I., LarrañagaLesaka, J., Zulueta Guerrero .E.,Puelles Pérez, E., “Modelling of Photovoltaic Module”, International Conference on Renewable Energies and Power Quality (ICREPQ’10), 23th to 25th March, 2010, Granada (Spain).




Nadia Adnan Shiltagh, Lana Dalawr Jalal

Paper Title:

Optimal Path Planning For Intelligent Mobile Robot Navigation Using Modified Particle Swarm Optimization

Abstract:    This study investigates the application of Modified Particle Swarm Optimization (MPSO) to the problem of mobile robot navigation to determine the shortest feasible path with the minimum time required to move from a starting position to a target position in working environment with obstacles. In this study, MPSO is developed to increase the capability of the optimized algorithms for a global path planning. The proposed algorithms read the map of the environment which expressed by grid model and then creates an optimal or near optimal collision free path. The effectiveness of the proposed optimized algorithm for mobile robot path planning is demonstrated by simulation studies. The programs are written in MATLAB R2012a and run on a computer with 2.5 GHz Intel Core i5 and 6 GB RAM. Improvements presented in MPSO are mainly trying to address the problem of premature convergence associated with the original PSO. In the MPSO an error factor is modelled to ensure the PSO converges.  MPSO try to address another problem which is the population may contain many infeasible paths; a modified procedure is carrying out in the MPSO to solve the infeasible path problem. The results demonstrate that this algorithm have a great potential to solve the path planning with satisfactory results in terms of minimizing distance and execution time.

   Modified Particle Swarm Optimization, Global Path Planning, Robot Navigation, Intelligent Mobile Robot.


1.       Yun, S.C., Ganapathy, V., Chong, L.O. (2010), “Improved genetic algorithms based optimum path planning for mobile robot”, International Conference on Control, Automation, Robotics and Vision, ICARCV, pp. 1565-1570. 
2.       Han, K. M., (2007), “Collision free path planning algorithms for robot navigation problem”, Master Thesis, University of Missouri-Columbia.

3.       Mohanty, P. K., and Parhi D. R. (2013), “Controlling the Motion of an Autonomous Mobile Robot Using Various Techniques: a Review”, Journal of Advance Mechanical Engineering, 1: 24-39.

4.       Raja, P., Pugazhenthi, S. (2012), “Optimal path planning of mobile robots: A review”, International Journal of Physical Sciences, 7(9): pp. 1314 - 1320

5.       Zhao, Y.,Zu, W. (2009),” Real-Time Obstacle Avoidance Method for Mobile Robots Based on a Modified Particle Swarm Optimization”, International Joint Conference on Computational Sciences and Optimization, pp.269-272.

6.       Ahmadzadeh,S., Ghanavati, M. (2012),” Navigation of Mobile Robot Using the PSO Particle Swarm Optimization”, Journal of Academic and Applied Studies (JAAS), 2(1): pp. 32-38.

7.       Yu-qin, W., Xiao-peng, Y. (2012), “Research for the Robot Path Planning Control Strategy Based on the Immune Particle Swarm Optimization Algorithm”, 2nd International Conference on Intelligent System Design and Engineering Application, pp. 724-727.

8.       Konar, A. (2000), “Artificial Intelligence and Soft Computing Behavioral and Cognitive Modeling of the Human Brain”, CRC Press LLC.

9.       Atyabi, A., Phon-Amnuaisuk, S., C.K. Ho, (2010), “Navigating a robotic swarm in an uncharted 2D landscape”, Applied Soft Computing, 10(1):149-169.

10.     Dutta, S., (2010), “Obstacle Avoidance of Mobile Robot using PSO-based Neuro Fuzzy Technique”, International Journal of Computer Science and Engineering, 2(2): 301-304.

11.     Saska, M., Macas, M., Preucil, L., and Lhotska, L. (2006), “Robot Path Planning using Particle Swarm Optimization of Ferguson Splines”, In Proceedings 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2006), Prague, Czech Republic, pp. 833-839.

12.     Raja, P.,  Pugazhenthi, S. (2009), “Path Planning for Mobile Robots in Dynamic Environments using Particle Swarm Optimization”, International Conference on Advances in Recent Technologies in Communication and Computing, pp. 401-405.

13.     Sariff, N., and Buniyamin, N., (2006), “An overview of autonomous mobile robot path planning algorithms”, 4th Student Conference on Research and Development, Scored 2006, pp. 183-188

14.     Al-Taharwa, I., Sheta, A., Al-Weshah, and M. (2008), “A Mobile Robot Path Planning Using Genetic Algorithm in Static Environment”, Journal of Computer Science, 4 (4): 341-344.

15.     Li, P., Huang, X., Wang, M., (2010), “A New Hybrid Method for Mobile Robot Dynamic Local Path Planning in Unknown Environment”, Journal of Computers, North America, 5(5): 773-781.

16.     Velagic, J., Lacevic, B., ans Osmic, N., (2006), “Efficient path planning algorithm for mobile robot navigation with a local minima problem solving”, In Proceedings of IEEE International Conference on Industrial Technology, IEEE, Mumbai, pp. 2325–2330.

17.     Jatmiko, W., Sekiyama K., and Fukuda, T. (2006), “Modified Particle Swarm Robotic for Odor Source Localization in Dynamic Environment, the International Journal of Intelligent Control and Systems: Special Issue on Swarm Robotic, 11(3): 176-184.

18.     Eberhart, R., and Shi, Y. (1998), “Comparison between Genetic Algorithms and Particle Swarm Optimization”. In Proceedings of the Seventh Annual Conference on Evolutionary Programming, Springer-Verlag, pp. 611-619.




Y. T. Prabhu, K. Venkateswara Rao, V. Sesha Sai Kumar, B. Siva Kumari

Paper Title:

X-ray Analysis of Fe doped ZnO Nanoparticles by Williamson-Hall and Size-Strain Plot Methods

Abstract:    In the preparation of Fe doped ZnO a novel process is used with different doping concentrations from 2% to 10% by surfactant assisted combustion synthesis. The synthesized samples were characterized with X-ray diffraction particle analyzer and TEM. From X-ray diffraction, it was observed Fe-doped ZnO nanoparticles (NPs) have hexagonal wurtzite structure and further crystallite sizes were decreased with increasing doping concentrations. Transmission electron microscopy (TEM) showed that powder was polycrystalline in nature with random distribution of nano grained Fe doped ZnO. Using X-ray broadening crystalline development in the Fe doped ZnO-NPs was investigated. The crystallite sizes and lattice strain on the peak broadening of Fe doped ZnO-NPs were studied using Williamson- Hall (W-H) analysis and size- strain plot. Strain, stress and energy density parameters were calculated for the XRD peaks of all the samples using (UDM), uniform stress deformation model (USDM), uniform deformation energy density model (UDEDM) and by the size-strain plot method (SSP). The results of mean particle size of Fe doped ZnO-NPs showed an inter correlation with W-H analysis, SSP, and TEM results.

   Fe Doped ZnO, Surfactant Assisted Combustion Synthesis, XRD, TEM.


1.       V. R. Shinde, T. P. Gujar, C. D. Lokhande, R. S. Mane, and S. H. Han, “Mn doped and undoped ZnO films: A comparative structural, optical and electrical properties study” Mater. Chem. Phys. Vol 96, 2006, pp 326-330.
2.       S. Y. Yang, A. B. Pakhomov, S. T. Hund, and C. Y. Wong, “Room temperature magnetism in sputtered (Zn,Co)O films” IEEE Trans. Magn. Vol 38, 2002, pp 2877 – 2879.

3.       C. J. Cong, J. H. Hong, Q. Y. Liu, L. Liao, and K. L. Zhang, “Synthesis, structure and ferromagnetic properties of Ni-doped ZnO nanoparticles” Solid State commun. Vol.138, 2006, pp 511-515.

4.       T. Dietl, H. Ohno, F. Matsukura, J. Cibert, and D. Ferrand, Science Vol 287, 2000, pp 1019.

5.       K. Ramakanth, Basic of Diffraction and Its Application. I.K. International Publishing House Pvt. Ltd, New Dehli, 2007.

6.       Jian-Min Zhang, Yan Zhang, Ke-Wei Xu, Vincent Ji,” General compliance transformation relation and applications for anisotropic hexagonal metals” Solid State Commun. Vol 139, 2006 pp 87- 91.

7.       C. Suranarayana, M.G. Norton, X-ray Diffraction: A Practical Approach New York 1998.

8.       A. Khorsand Zak, M. Ebrahimizadeh Abrishami, W.H. Abd. Majid, Ramin Yousefi, S.M. Hosseini”, Ceram. Inter. Vol. 37, pp 393-398, 2011.

9.       N. Padmavathy and R. Vijayaraghavan, “Enhanced bioactivity of ZnO nanoparticles—an antimicrobial study” Sci. Technol. Adv. Mater. 9, 2008. doi:10.1088/1468-6996/9/3/035004

10.     Linhua Xu, Xiangyin Li, “Influence of Fe-doping on the structural and optical properties of ZnO thin films prepared by sol–gel method” J. Cryst. Growth, Vol. 312, 2010, pp 851-855.

11.     R. Yogamalar, R. Srinivasan, A. Vinu, K. Ariga, A.C. Bose, “X-ray peak broadening analysis in ZnO nanoparticles” Solid State Commun. Vol. 149 2009, pp. 1919-1923.

12.     K.D. Rogers, P. Daniels, “An X-ray diffraction study of the effects of heat treatment on bone mineral microstructure” Biomaterials, Vol.23, 2002, pp 2577-2585

13.     Jian-Min Zhang, Yan Zhang, Ke-Wei Xu, Vincent Ji, “General compliance transformation relation and applications for anisotropic hexagonal metals” Solid State Commun. Vol.139, 2006, pp 87-.

14.     J.F. Nye, Physical Properties of Crystals: Their Representation by Tensors and Matrices. Oxford, New York, 1985.

15.     M.A. Tagliente, M.Massaro, “Strain-driven (0 0 2) preferred orientation of ZnO nanoparticles in ion-implanted silica” Nucl. Instrum Methods Phys. Res. B. Vol. 266, 2008, pp.1055 -1061.




Mamta Juneja, Parvinder Singh Sandhu

Paper Title:

Information Hiding using Improved LSB Steganography and Feature Detection Technique

Abstract:    This paper proposes an improved Least Significant bit(LSB) based Steganography technique for images imparting better information hiding .It presents an embedding algorithm for hiding encrypted messages in nonadjacent and random pixel locations in edges and smooth areas of images. It first encrypts the secret message, and detects edges as well as smooth areas  in the cover-image using improved feature  detection filter. Message bits are then, embedded in the least significant byte of randomly selected edge area pixels and 1-3-4 LSBs of red, green, blue components respectively across randomly selected pixels across smooth area of image. It ensures that the eavesdroppers will not have any suspicion that message bits are hidden in the image and standard steganography detection methods can not estimate the length of the secret message correctly. The Proposed approach is better in PSNR value and Capacity as shown experimentally than existing techniques.

   Canny filter, Feature detection, Hough transform, Image Steganography, Information hiding, LSB based Insertion.


1.       Neil F. Johnson, Sushil Jajodia, “Exploring Steganography, Seeing the Unseen,” IEEEComputer Magazine, pp. 26-34, February1998.
2.       Kevin Curran, Karen Bailey, “An Evaluation of Image Based Steganography Methods,” International Journal of Digital Evidence, Vol.2 no. 2, pp. 1-40,Fall 2003.

3.       Niel F. Johnson, Zoran Duric, Sushil Jajodia, “Information Hiding, and Watermarking - Attacks & Countermeasures,” Kluwer Academic Publisher, 2000.

4.       Chun Shien Lu, "Steganography and Digital Watermarking Techniques for Protection of Intellectual Property" in Multimedia Security, Idea Group Publishing, Singapore, 2005, pp. 75-157.

5.       R.H.Alwan, F.J.Kadhim, A.T.Al-Taani. “Data Embedding Based on Better Use of Bits in Image Pixels”. International Journal of Signal Processing. Vol. 2, no.1,pp:104-107,2005.

6.       N. Wu, M. Hwang,"Data hiding: Current status and key issues", International Journal of Network Security,vol.4,no.1,pp.1-9, 2007.

7.       Lisa M. Marvel, Charles T. Retter, "The Use of Side Information in Image Steganography", Proceedings of IEEE International Symposium on Information Theory
and Its Applications, Honolulu, Hawaii, USA, November 5-8, 2000.

8.       W. Luo, “Object-Related Illustration Watermarks in Cartoon Images”,Masters Thesis, Department of Simulation and Graphics, Otto-vonGuericke University Magdeburg, Germany, February 2004.

9.       Jessica Fridrich , Miroslav Goljan , Rui Du, "Detecting LSB Steganography in Color and Gray-Scale Images", IEEE MultiMedia, vol.8 no.4, pp.22-28, October 2001.

10.     Mamta Juneja, Parvinder Singh Sandhu, "Performance Evaluation of Edge Detection Techniques for Images in Spatial Domain", International Journal of Computer Theory and Engineering, Vol. 1, No. 5,pp 614-621,December,2009.

11.     V.F. F. Leavers, Shape Detection in Computer Vision Using the Hough Transform, Springer-Verlag New York, Inc., Secaucus, NJ, 1992.

12.     D.Ioannou,W.Huda,F.Laine,"Circle recognition though a 2-D Hough transform and radius histogramming", Image Vision Computing ,Vol 17,no. 1,pp. 15-26,1999.

13.     Chi-Kwong Chan, l. M. Cheng,” Hiding data in images by simple LSB substitution”,Pattern Recognition,vol. 37, pp.469-474, 2004.

14.     Mamta Juneja , Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based on LSB Insertion and Encryption”, Proceedings of the International Conference on Advances in Recent Technologies in Communication and Computing(ARTCOM-2009), Kerala,India,October 27-28, 2009.

15.     Data Encryption Standard (DES), National Bureau of Standards (US).Federal Information Processing Standards Publication National Technical information Service. Springfield VA. April 1997.




Yazdan Khan, Ashish Kumar, Aakash Dhiman

Paper Title:

Bandwidth Improvement of the Rectangular Microstrip Antenna by Using Single Dipole Stub

Abstract:   In the most recent days microstrip antennas are mostly used in the wireless communication due to the salient features like low cost, less weight, small size. But these antennas are having some drawbacks like narrow bandwidth, low gain etc. In this paper a microstrip antenna with wide bandwidth is presented. For this purpose we took two dierent radiating elements which are connected together through a matched section and these elements are embedded on a single layer structure. This new introduced structure offers a dual-band microstrip antenna. By controlling the resonant frequency of these two elements, means by keeping constant value of resonant frequency of one element and varying the resonant frequency of other element, then a much more improved bandwidth approximately 21 % has been obtained. Representation, calculation and measurement for this new antenna has been done with the help of software MATLAB and also from EM-TALK online antenna calculator.

   Bandwidth Improvement; Microstrip Antenna; Radiating elements; Resonant Frequency.


1.       Bahl, J. and P. Bhartia, Microstrip Antennas, Artech House, Inc., London, 1980.
2.       J Constantine A. Balanis; Antenna Theory, Analysis and Design, John Wiley & Sons Inc. 2nd edition. 1997.

3.       Garg, R and Ittipiboon, A; “Micro strip Antenna Design Handbook”, Artech House, 2001.

4.       Lechtreck, L. W., “Effects of coupling accumulation in antenna arrays,” IEEE Trans. Ant. Prop., Vol. AP-16, No. 1, 1968.

5.       Pozar, D. M. and D. H. Schaubert, “Scan blindness in infinite phased arrays of printed dipoles,” IEEE Trans. Ant. Prop., Vol. AP-32, No. 6, 1984.

6.       Long, S. A. and M. D. Walton, “Mutual coupling between stacked square microstrip antennas fed on their diagonal,” IEEE Trans. Ant. Prop., Vol. 39, No. 7, 1049–1051, 1991.

7.       Neeraj Rao,‖Gain and Bandwidth Enhancement of a Microstrip Antenna using Partial substrate removal in multiple layer dielectric substrate‖, PIER proceedings, Suzhou, China, Sept.12-16, 2011






Mangesh Powar, Tejas Vichare, Rashmi Udeg,Yojana Namdas, Swati Joshi

Paper Title:

Swammis: Sinhgads’wide Area Multiuser and Multitasking Intranet System (Educational ERP)

Abstract:    Ineducational system at different departments, all the administrative jobs are being carried out manually. It not only consumes a lot of time but also reduces output efficiency. For every single job, faculties need to manually approach colleagues, carry out sumptuous hand written documentation, attendances, leave applications etc. If such jobs are automated by an Intranet application and a common communication platform, by making use of different technologies such as remote installation, VOIP with video conferencing, PDF data extraction in LAN etc. This paper begins by explaining the background to education ERP systems and goes on to discuss specific systems and their capabilities. Enterprise Resource Planning (ERP) Systems are powerful software packages that enable educational system to integrate a variety of disparate functions.

   ERP, video conferencing, RTMFP, VOIP, PDFand data extraction.


1.        “Understanding RTMFP Handshake” byKundan Singh, [Online] Available at URL
2.        “RTCF – Real Time Component Framework” by Brian Lesser, [Online] Available at URL framework.html

3.        “Understanding Voice over Internet Protocol (VoIP)”, Matthew Desantis, US-CERT

4.        “Voice Over Internet Protocol (VoIP)” , Invited Paper, Bur Goode, SENIOR MEMBER, IEEE

5.        “Application Middleware for convergence of IP Multimedia system and Web Services”, Ivan Budiselic, Ivan Zuzak, Ivan Benc, MIPRO, 2010 Proceedings of the 33rd International Convention.

6.        “Dynamic code selection Algorithm for Voip” by Maja Sulovic, Mesud Hadzialic, Darijo Raca, Nasuf Hadziahmetovic, The Sixth International Conference on Digital Telecommunications, ICDT 2011

7.        “Application Middleware for convergence of IP Multimedia system and Web Services”, Ivan Budiselic, Ivan Zuzak, Ivan Benc.

8.        Real Time Media Flow Protocol by Adobe Systems, [WWW] Available online at URL

9.        “XPDF and Open Source” by Glyph and Cog, [WWW] Available online at URL




M. Velan

Paper Title:

Environmental Sustainability and Cleaner Perspectives - A Challenging Experience from Lignite Mining Industry in India

Abstract:    Mining of lignite causes pollution of Environment and ecological damage if unattended. Being conscious that environmental regeneration is the foundation on which Productivity has to be built, N.L.C. started investing on Eco Care long back and it continues.  Early investment in Environment protection has resulted in steady growth. N.L.C.’s futuristic vision is to be in the vanguard among the contributors to the community, environment and the Nation by developing and utilizing industrial and human resources to the optimum. Untiring efforts are being put in Mines (NLC as a whole) to maintain and sustain the ecological balance arising due to the continuous mining activity. The Neyveli’s Environmental Management System is becoming a symbolic role model for any of the opencast mines in the South-East Asia.

   Lignite, mining, Sustainability, Environmental, protection.




Amit Kumar, Harish Chandra Maurya, Rahul Misra

Paper Title:

A Research Paper on Hybrid Intrusion Detection System

Abstract:    An intrusion detection system (IDS) is a device or software application that monitors network or system activities for malicious activities or policy violations and produces reports to a Management Station. Some systems may attempt to stop an intrusion attempt but this is neither required nor expected of a monitoring system. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, and reporting attempts. In addition, organizations use IDPSes for other purposes, such as identifying problems with security policies, documenting existing threats and deterring individuals from violating security policies. IDPSes have become a necessary addition to the security infrastructure of nearly every organization. Different methods can be used to detect intrusions which make a number of assumptions that are specific only to the particular method. Hence, in addition to the definition of the security policy and the access patterns which are used in the learning phase of the detector, the attack detection capability of an intrusion detection system also depends upon the assumptions made by individual methods for intrusion detection. The purpose of an intrusion detection system is to detect attacks. However, it is equally important to detect attacks at an early stage in order to minimize their impact. I have used Dataset and Classifier to refine Intruders in Networks.

  (IDS), (IDPS), IDPSes.


1.       Stefan Axelsson. Research in Intrusion-Detection Systems: A Survey. Technical Report 98-17, Department of Computer Engineering, Chalmers University of Technology, 1998.
2.       SANS Institute - Intrusion Detection FAQ. Last accessed: August 30, 2012.

3.       Kotagiri Ramamohanarao, Kapil Kumar Gupta, Tao Peng, and Christopher Leckie. The Curse of Ease of Access to the Internet. In Proceedings of the 3 rd International Conference on Information Systems Security (ICISS), pages 234–249. Lecture Notes in Computer Science, Springer Verlag, Vol (4812), 2008.

4.       Overview of Attack Trends, 2002. Last accessed: November 30, 2008. http://www.

5.       Kapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao, and Ashraf Kazi. Attacking Confidentiality: An Agent Based Approach. In Proceedings of IEEE International Conference on Intelligence and Security Informatics, pages 285–296. Lecture Notes in Computer Science, Springer Verlag, Vol (3975), 2006.

6.       The ISC Domain Survey. Last accessed: Novmeber 30, 2008. https://www.isc. org/solutions/survey/.

7.       Peter Lyman, Hal R. Varian, Peter Charles, Nathan Good, Laheem Lamar Jordan, Joyojeet Pal, and Kirsten Swearingen. How much Information. Last accessed: Novmeber 30, 2008.

8.       Animesh Patcha and Jung-Min Park. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 51(12):3448–3470, 2007.

9.       CERT/CC Statistics. Last accessed: Novmeber 30, 2008.

10.     Thomas A. Longstaff, James T. Ellis, Shawn V. Hernan, Howard F. Lipson, Robert D. Mcmillan,  Linda Hutz Pesante, and Derek Simmel. Security of the Internet. Technical Report The Froehlich/Kent Encyclopedia of Telecommunications Vol (15), CERT Coordination Center 1997. Last accessed: Novmeber 30, 2008.

11.     KDD Cup 1999 Intrusion Detection Data. Last accessed: Novmeber 30, 2008. http:   //

12.     Kapil Kumar Gupta, Baikunth Nath, and Kotagiri Ramamohanarao. Applicatio base Intrusion Detection Dataset. Last accessed: Novmeber 30, 2008.˜kgupta.

13.     Stefan Axelsson. Intrusion Detection Systems: A Taxomomy and Survey. Technical Report 99-15, Department of Computer Engineering, Chalmers University of Technology, 2000.

14.     Anita K. Jones and Robert S. Sielken. Computer System Intrusion Detection: A Survey. Technical report, Department of Computer Science, University of Virginia, 1999. Last accessed:Novmeber 30, 2008.˜jones/IDS-research/Documents/jones-sielken-survey-v11.pdf.

15.     Peyman Kabiri and Ali A. Ghorbani. Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 1(2):84–102, 2005.

16.     Joseph S. Sherif and Tommy G. Dearmond. Intrusion Detection: Systems and Models. In Proceedings of the Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE, pages 115–133. IEEE, 2002.

17.     Mikko T. Siponen and Harri Oinas-Kukkonen. A Review of Information Security Issues  and Respective Research Contributions. SIGMIS Database, 38(1):60–80, 2007. ACM.

18.     Teresa F. Lunt. A survey of intrusion detection techniques. Computers and Security, 12(4):405–418, 1993. Elsevier Advanced Technology Publications.

19.     Emilie Lundin and Erland Jonsson. Survey of Intrusion Detection Research. Technical Report 02-04, Department of Computer Engineering, Chalmers University of Technology, 2002.

20.     James P. Anderson. Computer Security Threat Monitoring and Surveillance, 1980. Last accessed: Novmeber 30, 2011. history/ande80.pdf.

21.     Dorothy E. Denning. An Intrusion-Detection Model. IEEE Transactions on Software Engineering, 13(2):222–232, 1987. IEEE.

22.     H. S. Javitz and A. Valdes. The SRI IDES Statistical Anomaly Detector. In Proceedings of

23.     the IEEE Symposium on Security and Privacy, pages 316–326. IEEE, 1991.

24.     S.E.Smaha. Haystack: An Intrusion Detection System. In Proceedings of the 4th Aerospace Computer Security Applications Conference, pages 37–44. IEEE, 1988.

25.     Paul Innella. The Evolution of Intrusion Detection Systems, 2001. Last accessed: Novmeber 30, 2008.




Ashish Bodanwar, Rahul Mudpalliwar, Vikrant Pawar, Kaustubh Gaikwad

Paper Title:

Drowsy Driving Detection System

Abstract:    In this paper, we propose a drowsy driving detection system in which sensors like alcohol sensor, accelerometer, IR sensors are used for detection of drowsiness and alcohol consumption by driver. In addition to that we have used GPS receiver and GSM modem, for communication with the remote control station. The system used in the vehicle will continuously sends the readings obtained from various sensors and current position of the vehicle which will obtain from GPS receiver to the control station. As a result we get immediate information related to the driver’s condition. Detail design criteria with respect to various sensor and system are given. The proposed system will accurately derive the various parameters and inform control room.

   Alcohol consumption, control room, drowsiness, position.


1.        Ueno H., Kanda, M. and Tsukino, M. “Development of Drowsiness Detection System”, IEEE Vehicle Navigation and Information Systems Conference Proceedings,(1994), ppA1-3,15-20.
2.        Sean Enright, Electronics Engineering Student, 506-650-3611, May 26-2011, Alcohol Gas Detector “Breathalyzer”.

3.        Weirwille, W.W. (1994). “Overview of Research on Driver Drowsiness Definition and Driver Drowsiness Detection,” 14th International Technical Conference on Enhanced Safety of Vehicles, pp 23-26.

4.        Arpit Agarwal, “Driver Drowsiness Detection System”, portfolio of projects on human computer interaction, December,2010.

5.        Paul Stephen Rau, National Highway Traffic Safety Administration, United States, Paper Number 05-0192 Drowsy Driver Detection and Warning System for Commercial Vehicle Drivers: Field Operational Test Design, Data Analyses and progress.

6.        Mallis, M.M., et al., Bio Behavioral Responses to Drowsy Driving Alarms and Alerting Stimuli, DOT HS 809 202,February 2000.

7.        Embedded system design book- Raj Kamal


9.        www.embedded

10.     Mikro Elektronika Easy ARM v7 user manual

11.     C Programming for Embedded Systems by Kirk Zurell





S.Saravanan, R.Vidhya, S.Thangavel

Paper Title:

Online SOC estimation and Intelligent Battery Charger for Solar PV System

Abstract:    In this paper, the state of charge of the battery is determined and the battery is allowed to charge or discharge by standard reference current, since the overcharging and undercharging would affect the battery performance. So a battery should not be fully charged or discharged, because overcharging of a battery will affect the life time of the battery and undercharging of a battery will increase the initial charging time. Online estimation to determine SOC of battery is attempted in the proposed work with the electrical parameters which is developed using an intelligent controller.

   So a battery should not be fully charged or discharged


1.        Indu Rani, G.Saravana Ilango, C.Nagamani, "Control Strategy for power flow management in a PV system supplying DC loads", IEEE,2011
2.        Yazdani, and Prajna Paramita Dash, "A control methodology and characterization of dynamics for a photovoltaic system interfaced with a distribution network," IEEE., vol.24(3), 2009, pp.1538-1551.

3.        Mukhtiar Singh, Vinod Khadkikar, Ambrish Chandra, and Rajiv K. Varma, "Grid interconnection of renewable energy sources at the distribution level with power-quality improvement features", IEEE.,vol.26(1),  2011, pp.307-315.

4.        Benjamin Kroposki, Christopher Pink, Richard DeBlasio, Holly Thomas, Marcelo Sim˜oes, and Pankaj K. Sen, "Benefits of power electronic interfaces for distributed energy sources", IEEE.,vol.25(3), 2010, pp.901-908.

5.        Enrique Romero-Cadaval, María Isabel Milanés-Montero, Eva González-Romera, and Fermín Barrero-González, "Power injection system for grid-connected photovoltaic generation systems based on two collaborative voltage source inverters", IEEE,vol.56(11), 2009,pp. 4389-4398

6.        Y.K. Lo, H.J.Chiu, T.P.Lee, I. Purnama, and J.M. Wang, "Analysis and design of a photovoltaic system connected to the utility with a power factor corrector", IEEE.,vol.56(11), 2009, pp.4354-4362.

7.        Jung-Min Kwon, Bong-Hwan Kwon, and Kwang-Hee Nam,  "Grid-connected photovoltaic multistring pcs with pv current variation reduction control", IEEE., Vol.56(11), 2009, pp.4381-4388.




Kalaiselvan C, Arun Prakash R

Paper Title:

Accelerated Life Testing of Ceramic Capacitors and Integration of its Reliability Test Data with PLM Solutions

Abstract:    As the market for an electronic device continues to grow and expand, it has become evident that product reliability must remain a top priority for electronic device manufacturers. The Electronic Device manufacturing industry is now under increasing pressure to maintain their places in the market. To improve their ability to innovate, get products to market faster, and reduce errors, the manufacturers have been continuing to improve their product reliability and product development. time. Product reliability is considered as a prime contributor to quality and competitiveness. The reliability of the product is usually determined by testing the product to failure and collection of time to failure (TTF) data. For some products the test time to evaluate reliability is usually very longer, if it is tested under actual working condition of the products. Hence the accelerated and highly accelerated life testing (HALT) testing method is employed to accelerate to stress condition on the product to quicken the degradation of products performance. The obtained performance data when analyzed,  yields its reasonable estimates of products life under actual conditions. In this study, the ceramic capacitor are evaluated for it reliability using HALT. The capacitors are considered to be failed when its insulation resistance dropped. The product lifecycle management (PLM) integration methodology adopted in this study is based on 3-tier client server architecture. The software tool like Java, HTML (HyperText Markup Language) and SQL (Structured query language) are used to create the front and back end 3-tier architecture. 

   Highly Accelerated life Testing, Time to Failure (TTF), Product Lifecycle Management (PLM), Server Architecture.


1.       Ireson WG, Coombs CF, Moss RY. Handbook of reliability engineering and management. 2nd ed. New York: McGraw-Hill; 1996.
2.       Pecht M. Product reliability. Maintainability and supportability handbook. Boca Raton: CRC Press; 1995.

3.       Nelson W. Accelerated testing statistical models test plans and data analysis. New Jersey (USA): John Wiley & Sons. Inc.; 2004. 601p.

4.       H. Kishi, Y. Mizuno, and H. Chazono, Jpn.J.Appl.Phys. 42, 1 (2003).

5.       A. S. Gurav, X. Xu, P. Pinceloup, M. Sato, A. Tajuddin, C. Randall and G. Yang, 13th US-Japan Seminar on Dielectric and Piezoelectric       Ceramics, Nov. 2-5, 2007, Awaji Island, Japan.

6.       A. S. Gurav, X. Xu, P. Pinceloup, M. Sato, A. Tajuddin, C. Randall and G. Yang, 13th US-Japan Seminar on   Dielectric and Piezoelectric Ceramics, Nov. 2-5, 2007, Awaji Island, Japan.

7.       T. Prokopowicz and A. Vaskas, “Research and Development, Intrinsic Reliability, Subminiature Ceramic Capacitors,” Final Report, ECOM-9705-F, 1969 NTIS AD-864068.

8.       G. Maher, “Highly Accelerated Life Testing of K-4500 Low Fired X7R Dielectric,” Proceedings of the Passive Components for Power Electronics Workshop. April 26-27, 2000, Penn State University.

9.       Yongjae Shin, Soon-Hung Han, Doo-Hwan Bae Integration of heterogeneous CAD databases using STEP and the Internet.

10.     Soumil D. Deshmukh Manoj D. Patil “PDM Requirements for Large Scale Engineering”, presented at Product Data Technology Europe 2002 At Centro Ricerche Fiat, Turin, Italy 7th - 9th May 2002.




Aayush Agarwal, Rekha Saraswat

Paper Title:

Modified Group Signature in Online Auction System

Abstract:    Group Signature scheme allows members of a group to sign messages on behalf of the group, such that the resulting signature does not reveal the identity of the signer. Signatures can be verified with respect to a single group public key. In case of dispute, only a designated group manager, because of their special property, is able to open signatures, and thus reveal the signer’s identity. Its applications are widespread used, especially in e-commerce such as e-cash, e-voting and e-auction. On the other hand, Internet is an open environment, and the unsecured environment can obstruct the development of e-commerce. Therefore, Internet must have some protocol to prevent the important message from impersonating and modifying. Recently, online auction has been receiving more and more attention in the world of electronic commerce, hence, the security and efficiency of online auction is more and more important. This paper proposes a new scheme for conducting secure and anonymous online auctions using a modified type of group signature. Our scheme solves the problems of the existing auction schemes and has following characteristics: unforgeability, anonymity, unlinkability, exculpability, coalition-resistance, verifiability, robustness, traceability, revocation, one-off registration, unskewability and unblockability. Our scheme has comparable efficiency to the existing schemes for the enhanced security and privacy it provides.

   anonymity, authenticated encryption, E-auction, group signature.


1.        D. Boneh and H. Shacham. Group signatures with verifier-local revocation. In V. Atluri, B. Pfitz-mann, and P. D. McDaniel, editors, ACM Conference on Computer and Communications Security,  ACM, 2004.
2.        G.Ateniese, J.Camenisch, M.Joye, and G.Tsudik, “A Pracical and provably secure coalition-resistant group signature”, in Advances in Cryptology 2000. 

3.        Q.L.Xu . A Modified Threshold RSA Digital Signature Scheme. Chinese Journal of Computer, 2000.

4.        J. Camenisch, “Efficient and generalized group signatures”, in Advances in Cryptology, EuroCrypto 1997.

5.        Sun Huihui, Chen Shaozhen. An Efficient Forward Secure Group Signature Scheme With Revocation. JOURNAL OF ELECTRONICS, 2008

6.        J. Camenisch and M.Stadler, “Efficient group signature scheme for large groups”, in Advances in Cryptology, Crypto 1997.

7.        J. Camenisch and M. Michels, “Separability and efficiency for generic group signature schemes”. In M. Wiener, editor, Advances in Cryptology, CRYPTO 1999.

8.        D. Chaum and E. Heyst, “Group Signatures”, in Advances in Cryptology, Eurocrypt, 1991.

9.        L. Chen and T.P. Pedersen, “New Group Signatures”, in Advances in Cryptology, Eurocrypt 1994.

10.     R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin. Robust and efficient sharing of rsa functions. In Advances in Cryptology, 1996.

11.     Yuh-Min Tseng and Jinn-Ke Jan, “Improved Group Signature scheme based on discrete logarithm problem,” IEE Electronics Letters, vol. 35, no. 1, pp. 37-38, 1999.

12.     M.K. Franklin and M.K. Reiter, “The design and implementation of a secure auction service”, IEEE Transactions on Software Engineering, 1996.

13.     G. Tsudik, G. Ateniese, “Some open issues and new directions in group signatures”, in Advances in Cryptology Crypto 1999.

14.     G. Tsudik and G. Ateniese, “Quasi-efficient revocation of group  signatures”, in To Appear in Financial Cryptography, 2002.



17.     Jarrod Trevathan and Wayne Read, “SECURE ONLINE ENGLISH AUCTIONS”, School of Mathematical and Physical Sciences James Cook University.

18.     M. Harkavy, H. Kikuch and J.D. Tygar, “Electronic auction with private commerce”, in Proceedings of the 3rd USENLX Workshop on Electronic Commerce, August 1998.

19.     Fangguo Zhang and Kwangjo Kim, “Security of A New Group Signature Scheme”, IEEE TENCON'02

20.     E. Petrank J. Kilian, “Identity Escrow”, in Advances in Cryptology Crypto 1998.

21.     Zulfikar Amin Ramzan, “Group Blind Digital Signatures:   Theory and Applications” in Advances in Cryptology 1999.

22.     Trevathan, J., Ghodosi, H. and Read, W.  “Design Issues for Electronic Auctions”, in 2nd International Conference on E-Business and Telecommunication Networks, 2005.




Amruta Deshpande, Apurva Bhoite, Ashish Kalbhor, Sandeep Mane, Prema Desai

Paper Title:

KinoSense: Framework for Tasking Applications on Smartphones using Sensing and Co-ordination

Abstract:    A growing class of smartphones use tasking applications  that run continuously, process data from sensors to  determine the user’s context (such as location),  and fire certain actions when the right conditions occur. We propose a framework which enables smartphones to use device sensors to perform some actions by defining a rule. The idea is to develop primitives that would simplify the use of device sensors and services for both developers as well as users.We hereby overcome the issues in current approaches by creating broader and more meaningful definitions to be used on smartphones.  KinoSense provides a task execution framework to automatically distribute and coordinate tasks, energy-efficient modules to infer user activities and compose them.These applications combine sensing from the device and the coordination between all sensors.

   Framework, Triggers, Actions, Sensors, Events


1.       Blackberry location-based reminder
2.       OnX.

3.       Lenin R., Arvind T., Hari B., Samuel M.;”Code In the Air”, MIT CSAIL, USA Jan 2012.

4.       Won-Jae Yi, Weidi J., Saniie J; “Mobile Sensor Data Collector using Android Smartphones”, IEEE August 2012

5.       Yong-Hua Cheng, Wen-Kuang Kuo, Szu-Lin Su; “An Android system design and implementation for telematics services”, IEEE ICIS 2010

6.       Sean J., Miguel A., Philip L, Nevine L.; “A General Architecture in Support of Interactive, Multimedia, Location-Based Mobile Applications”, IEEE Communications Magazine Nov 2006




N.Nandhini, SU.Suganthi

Paper Title:

Wireless Control of a Robotic Arm Using Inertial Sensor

Abstract:    The development of wireless sensing control unit operation is base on wearable inertial sensors. Inertial sensors are of tri axial accelerometer and MEMS. It extends to the control of an anthropomorphic robotic arm. Accelerometers used to measure the orientation and angular velocity of the lower arm. The data processing has been carried out on low cost micro controllers. The movement of the user arm was mimicked by the anthropomorphic robotic arm. The orientation of the control unit is tracked and displayed using MATLAB. Applications include industrial operation, remote operation in hazardous area, medicine and undersea recovery.

   accelerometer, inertial sensors, MEMS, motion sensing, robotic arm.


1.        Huiyu Zhou, Huosheng Hu, Reducing drifts in the inertial measurements of wrist and elbow positions. IEEE Trans vol.59,no.3 (2010)
2.        Tao Liu *, Yoshio Inoue, Kyoko Shibata, "Development of a wearable sensor system for quantitative gait analysis". Journal (2009) 978-988

3.        KunLiu,TaoLiu,KyokoShibata,YoshioInoue,RenchengZheng, "Novel approach to ambulatory assessment of human segmental orientation on a wearable sensor system". Journal (2009) 2747-2752 

4.        Huiyu Zhou, Thomas Stone, Huosheng Huc,, Nigel Harris "Use of multiple wearable inertial sensors in upper limb motion tracking", IPEM (2008) 123-133

5.        Shumei Zhang Æ Huosheng Hu Æ Huiyu Zhou "An interactive Internet-based system for tracking upper limb motion in home-based rehabilitation", Med Biol Eng Comput (2008) 46:241-249

6.        Liu, Kun, Liu, Tao, Shibata, K., Inoue, Y., Zheng, Rencheng, 2008. Novel approach for lower limb segment orientation in gait analysis using triaxial accelerometers. IEEE/ASME International Conference on Advanced Intelligent Mechatronics 2008, 488-492.

7.        Huiyu Zhou and Huosheng Hu, "Inertial sensors for motion detection of human upper limbs," Sensor Review, vol. 27, no. 2, pp. 151-158, 2007.

8.        Zhou H, Hu H, Harris ND (2006a) Applications of wearable inertial sensors in estimation of upper limb movements. J Biomed Signal Process Control 1:22-32

9.        Zhou H, Hu H, Tao Y (2006b) Inertial measurements of upper limb motion. J Med Biol Eng Comput 44(6):479-487

10.     George S. Doukas, Kleanthis C. Thramboulidis,  Yannis C. Koveos"Using the Function Block Model for Robotic Arm Motion Control", IEEE 2006

11.     Dejnabadi, H., Jolles, B.M., Casanova, E. and Fua, P. (2006), "Estimation and visualization of sagittal kinematics of lower limbs orientation using body-fixed sensors", IEEE Transactions of Biomedical Engineering, Vol. 53 No. 7, pp. 1385-93.

12.     Tao, Y., Hu, H. and Zhou, H. (2007), "Integration of vision and inertial sensors for home-based rehabilitation", International Journal of Robotics Research, Accepted subject to revision.

13.     Zhou, H., Hu, H. and Harris, N. (2006a), "Wearable inertial sensors for arm motion tracking in home-based rehabilitation", Proceedings of the 9th International Conference on Intelligent Autonomous Systems, Tokyo, Japan, March, pp. 930-7.

14.     Chai, L., Hoff, W.A. and Vincent, T. (2002), "Threedimensional motion and structure estimation using inertial sensors and computer vision for augments reality", Journal of Presence, Vol. 11 No. 5, pp. 474-92.

15.     Luinge H. Inertial sensing of human movement. PhD thesis. The Netherlands: Twente University; 2002.

16.     Barbour N, Schmidt G. Inertial sensor technology trends. IEEE Sensors J 2001;1:332-9.




Vilas S. Gaikwad, Suyog.V.Patil, Rohan.G.Patil, Vaibhav.D. Darwadkar Sandip.M. Ambulkar, Ranjit.R.More

Paper Title:

GSM Based Server Control System (SCS) For Better Security of Computer Automation

Abstract:    Server Control System (SCS) provides remotely controlling approach that allows computer user to control operation on computer from remote location provided the user is authenticated. User does this by carrying out computer operations through GSM modem and SMS technology. This paper also demonstrates on operations related to network and prevent unauthorized access using attention commands (AT). Hence this application will help user to operate his computer remotely and also get SMS alert to prevent unauthorized access to computer.

   Mobile phone, Short message service (SMS), Global system for mobile phone (GSM).


1.        Awodele Oludele,Adamo David, Kadiri Kamal-Deen,Orekoya Morolake,"SMS Based Microcomputer Control System for Computer Automation and   Security" International Journal of Information Sciences and Computer Engineering, Vol. 1, No. 2, (2010) 15–20.
2.        Amit Chauhan,Reecha Ranjan Singh, Sangeeta Agrawal , Saurabh Kapoor, S. Sharma, “SMS based Remote Control System” International Journal of Information Sciences and Computer Engineering,Vol. 11, Issue 02, Aug 2011.

3.        Chaitali Navasare, Deepa Nagdev  and Jai Shree, “PocketDroid - A PC Remote Control” 2012 InternationalConference onInformation and Network Technology (ICINT 2012,)IPCSIT vol. 37 (2012).

4.        Dr. Khanna SamratVivekanand Omprakash, “Concept of Web based SMS messaging server with mobile”international Journal of Advanced Research in Computer Science and Software Engineering Volume1,Issue-1,Dec-2011

5.        E. R. Adagunodo, O. Awodele, and O. B. Ajayi, “Sms user interface result checking system,” Issues Informing Science and InformingTechnology,vol.6,2009.
6.  Amir Rajabzadeh, Ali Reza Manashty, and Zahra Forootan Jahromi “A Mobile Application for Smart House Remote Control System ”World Academy of Science, Engineering and Technology 62 2010.




Lamyaa Moulad, Hicham Belhadaoui, Mounir Rifi, Reda Filali hilali

Paper Title:

Towards An Improvement of the Security of A WSN Based On Power Management as Part of the QOS

Abstract:    Wireless sensor networks (WSN) is tending towards becoming a complete solution in communication protocols, embedded systems and low-power implementations. However, the resource constraints which includes, limited communication range, limited energy, limited computing power, limited bandwidth and the fear of intruders have limited the WSN applications. Since lightweight computational nodes that are currently being used in WSN pose particular challenge for many security applications, the whole research therefore, is the investigation of new security techniques and appropriate implementation for WSN nodes, including various trade-offs such as implementation complexity, security flexibility, power dissipation, and scalability. The goal of this research is to develop a scheme to control the flow through the components of the WSN. This allows to improving the security of WSN by the good management of energy resources, as well as the local management of communications. In this sense, we proposed an improvement of the reactive AODV Routing Protocol [11] under the NS2 Simulator for the security support always as part of Quality of Service.

   WSN, energy management, security, NS2 Simulator.


1.        Houngbadji, Thérence (2009) Réseaux ad hoc : système d'adressage et méthodes d'accessibilité aux données. Thèse de doctorat.
2.        I. F. Akyildiz et al, “Wireless Sensor Networks: a survey, ” Computer Networks, Vol. 38, pp. 393-422, March 2002.

3.        H. Karl and A. Willig, “A short survey of wireless sensor networks” Technical Report TKN-03-018, Telecommunication Networks (2004).

4.        andrien Van Den Bossche (2007),proposition d’une nouvelle méthode d’accès déterministe por un reseau personnel sans fil a forte contraintes temporelles.

5.        D.mohammadi & H.jadidoleslamy ‘comparison of the attacks on the link layer in wsn ’ 2011

6.        JA Stankovic ‘DOS in WSN ’ .

7.        W. Stallings ‘Cryptography and network security’ 2003.

8.        Wassim Masri ( 2009), Dérivation d'exigences de Qualité de Service dans les Réseaux de Capteurs Sans Fil basés sur TDMA.

9.        Cobo Campo, Luis (2011) Gestion de la qualité de service et planification optimale de réseaux de capteurs multimédia sans fil.

10.     Rahim KACIMI ,(Septembre 2009) Techniques de conservation d'énergie pour les réseaux de capteurs sans fil l'Institut National Polytechnique de Toulouse.

11.     Teresa Albero-Albero,(2007) AODV Performance Evaluation and Proposal of Parameters Modification for Multimedia Traffic on Wireless Ad hoc Networks, Universidad Politécnica de Valencia .

12.     Haodong Wang; Bo Sheng; Tan, C.C.; Qun Li; “Comparing Symmetric-key and Public-key Based Security Schemes in Sensor Networks: A Case Study of User Access Control”; Distributed Computing Systems, 2008. ICDCS '08. The 28th International Conference;Year: 2008 , pp: 11 – 18.

13.     Man Wah Chiang; Zilic, Z.; Radecka, K.; Chenard, J.-S.; ”Architectures of increased availability wireless sensor network nodes”; Test Conference, 2004. Proceedings. ITC 2005. International, year 2005, pp: 1232 – 1241.

14.     Jing Deng, Richard Han, Shivakant Mishra; “Defending against path-based DoS attacks in wireless sensor networks”; 3rd ACM workshop on Security of ad-hoc and sensor network”, Year: 2005.

15.     Meadows, Catherine; “A Cost-Based Framework for Analysis of Denial of Service in Networks”, NAVAL RESEARCH LAB WASHINGTON DC CENTER FOR HIGH ASSURANCE COMPUTING SYSTEMS (CHACS), Year:2005.

16.     Baig, Z.A.; Khan, S.A.; “Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks “; Future Networks, 2010. ICFN '10. Second International Conference;Year: 2010 , Page(s): 185 - 189.

17.     Z.A.Baig, M. Bager, A.I.Khan;, “A Pattern Recognition Scheme for Distributed Denial of Service (DDoS) Attacks in Wireless Sensor Networks”. ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 03, Year: 2006.

18.     Agah, A.; Basu, K.; Das, S.K.; “Preventing DoS attack in Sensor Networks: A Game Theoretic Approach”; Communications, 2005. ICC 2005. 2005 IEEE International Conference; Year: May 2005 page(s): 3218 - 3222 Vol. 5.

19.     Mihui Kim; Inshil Doh; Kijoon Chae; “Denial-of-Service(DoS) Detection through Practical Entropy Estimation on Hierarchical Sensor Networks”; Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference; Volume: 3; Year: 2006 , Page(s): 5 pp. – 1566.

20.     Jun Xu; Xuehai Zhou; Feng Yang; “Edge-based Trace back in Sensor Networks”; Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference;Year: 2010 , Page(s): 1 – 4.

21.     Xi Luo; Yi-Ying Zhang; Wen-Cheng Yang; Myong-Soon Park; “Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks”; Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference; Volume: 1; Year: 2008 , Page(s): 309 - 312 .

22.     P.Suraksha bhushan,A.Pandey,R.C Triphati “A Scheme for prevention of flooding attach in wireless sensor network”, Sience academy publisher,United kingdom, (IJRRWSN) .




Y.Madhuri,  B.Suresh

Paper Title:

Design aspects of Phased Array Antenna at L-Band

Abstract:    The multiple object tracking is done using Phased Array Radar. Phased array antenna, Digital receiver, Data processing system is the major systems of the Phased Array Radars. Phased array antenna consists of an array of radiating elements and each element is connected to a phase shifter. The phase shifters control the phase of the radiated signals at each element to form a beam at the desired direction.This paper deals with design aspects of Phased array antenna and to study its properties. Based on the study, simulations are carried out on 1X4 array and the same is fabricated for testing to analysis the results.

   phased array antenna, phase shifter,1X4 array


1.       Liu, Y., D. Fu, and S. Gong, "A novel model for    analyzing the radar cross section of microstrip antenna," Journal of Electromagnetic Waves and Application, Vol. 17, No. 9, 1301-1310, 2003.
2.       Cui, G., Y. Liu, and S. Gong, "A novel fractal patch antenna with low RCS," Journal of Electromagnetic Waves and Application, Vol. 21, No. 15, 2403-2411, 2007.

3.       Yuan, H.-W., S.-X. Gong, X. Wang, and W.-T. Wang, "Scattering analysis of a printed dipole antenna using PBG structures," Progress In Electromagnetics Research B, Vol. 1, 189-195, 2008.

4.       Wu, T., Y. Li, S. -X. Gong, and Y. Liu, "A novel low RCS microstrip antenna using aperture coupled microstrip dipoles," Journal of Electromagnetic Waves and Application, Vol. 22, 953-963, 2008.

5.       Jazi, M. N., Z. H. Firouzeh, H. Mirmohammad-Sadeghi, and G. Askari, "Design and implementation of aperture coupled microstrip IFF antenna," PIERS Online, Vol. 4, No. 1, 1-5, 2008.

6.       C. A. Balanis, “Antenna Theory, Analysis and Design”, JOHN WILEY & SONS, INC, New York 1997.

7.       I. J. Bahl and P. Bhartia, “Microstrip Antennas,” Artech House, Massachusetts,1980.

8.       Pozar, D. M., ‘’Microstrip Antennas’’, Proc. IEEE, Vol. 80, 1992, pp. 7991. 9)S. Silver, “Microwave Antenna Theory and Design”, McGraw-HILL BOOKCOMPANY, INC, New York 1949.10)IFS Tool for Fractal Microstrip Patch Antenna Analysis azdra, P.;   Capek, M.;   Dept. of Electromagn. Field, Czech Tech. Univ., Prague




J.Prathyusha, B.Suresh

Paper Title:

Radiation Pattern Analysis of a Fractal Micro-Strip Patch Antenna

Abstract:   There are number of methods that can be used to reduce the size of the antenna especially when it is too be used at lower operating frequencies. Fractal is one of the ways which can be used to miniaturize antennas due to their space filling ability. It helps in fitting large electrical lengths into small volume. In this paper the the radiation pattern of 1X4 array of micro-strip patch antenna over fractal geometry can be observed

   Fractal antenna, micro-strip patch antenna, ADS software, returns loss

1.       C. A. Balanis, “Antenna Theory, Analysis and Design”, JOHN WILEY & SONS, INC, New York 1997.
2.       J. Bahl and P. Bhartia, “Microstrip Antennas,” Artech House, Massachusetts, 1980.

3.       Pozar, D. M., ‘’Microstrip Antennas’’, Proc. IEEE, Vol. 80, 1992, pp. 7991.

4.       S. Silver, “Microwave Antenna Theory and Design”, McGraw-HILL BOOKCOMPANY, INC, New York 1949.

5.       IFS Tool for Fractal Microstrip Patch Antenna Analysis azdra, P.;   Capek, M.;   Dept. of Electromagn. Field, Czech Tech. Univ., Prague

6.       A Wideband Aperture-Coupled Microstrip Patch Antenna Employing Spaced Dielectric Cover for Enhanced Gain Performance Meagher, C.J.;   Sharma, S.K.;    Electr. & Comput. Eng. Dept., San Diego State Univ., San Diego, CA, USA




Manish Rai, Sandeep Kumar, Jayanta Ghosh

Paper Title:

Design & Analysis of Microstrip Antenna with Multi-frequency Operations

Abstract:    In this paper the theoretical and simulated results of rectangular microstrip are presented which can be utilized for multi-frequency operation. For this purpose, two rectangular microstrip antennas are designed with center frequencies 9 GHz and 5.67 GHz. Various parameter such as width, dielectric constant & effective length are calculated. Then the antenna impedance is matched to 50 ohm of coaxial fed for maximum power transfer. Now the designed structure is rearranged for multi-frequency operation by connecting two microstrip antennas at corner with corner excitation. The operating frequency, return loss and radiation pattern of the proposed structure are investigated. We observe a drastic reduction in resonant frequency. The radiation pattern for each resonating frequencies is nearly same. The frequency ratio (the ratio of second or higher resonating frequency to the first resonating frequency) of the proposed antenna is observed to be increased. The entire simulation work is done on IE3D software

   Microstrip Antenna, Rectangular, Multi-frequency, Return loss, Frequency Ratio.


1.       R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna Design Handbook. Norwood, MA: Artech House, 2001.
2.       C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.

3.       J. S. Roy, N. Chattoraj, N. Swain, “New Dual-Frequency Microstrip Antennas for Wireless Communication.”Proc. Romanian Journal of Information Science and Tech ,vol. 10, no. 1, 2007, 113-119.

4.       Roy, J. S. Ghosh, J.ROY, J. S., GHOSH, “A MultifrequencyMicrostrip Antenna, Microwave and Optical Technology Letters,Proc. Romanian Journal of Information Science and Tech, vol. 46, no. 1, pp. 63-65, 2005.

5.       X. H. Yang, L. Shafai, “Multifrequency Operation Technique for Aperture Coupled Microstrip Antennas”Proc. Inst. Elect. Eng., 1994.

6.       K.P.Ray, G. Kumar, “Multi-frequency and broadband hybrid-coupled circular microstrip antennas”, Electronics Letters, vol. 33, no. 6, 1997.




K. Mathevan Pillai, G.Selvam, P.K.Kumaresan

Paper Title:

Continuous Time Markov Chains–An Optimization on Used Vehicle Sales

Abstract:    Using the basic properties involving the sojourn time and the transition rate between two states and the first passage time for a Continuous Time Markov Chain (CMTC) the applicability for optimizing the second sales used two wheelers in a showroom. Only the basic properties of the CTMC and the properties of rate matrix we are able to obtain a solution for maximum profit.

   Sojourn time, rate matrix, generator matrix, first passage time.


1.       D. Kennedy, Stochastic Financial models, CRC Press, Boca Rator, FL, 2010.
2.       V.G. Kulkarni, Modeling and Analysis of Stochastic Systems, CRC Press, London 2010.

3.       H.M. Taylor and S. Karlin, An introduction to Stochastic modeling, Academic Press, London, 1984.

4.       E.Parzer, Modern Probability Theory and its Applications, Wiley, New York, 1960.

5.       Afrait, S.N, Efficiency of production functions. International Economic Review, 1972

6.       Waldman, D.M, Properties of technical efficiency estimators in the stochastic      frontier model, Journal of Econometrics, 1984,

7.       Rajiv D. Banker, C.Hsihui and N.Ram, Estimating Data envelopment analysis technical and allocative inefficiency using aggregate cost or revenue data, Journal of Productivity Analysis, 2007,

8.       Kalirajan, K.P. and R.T. Shand, A generalized Measure of Technical Efficiency, Applied economics, 1985

9.       John Doyle and G.Rodney, Efficiency and Cross-efficiency in DEA: Derivations, Meanings and Uses, Journal of Operations Research Society, 1994

10.     Greene, W.H, A Gamma-distributed stochastic Frontier Model, Journal of Econometrics, 1990




Tejal Chauhan, Shraddha Singh, Sameena Zafar

Paper Title:

A New Technique for Artificial Bandwidth Extension of Speech Signal and its Performance Analysis

Abstract:    In current scenario of wireless communication system, quality of voice output is degraded due to its limited bandwidth (300-3400 Hz) and power constraints which in turn offers speech sounding muffled and thin. Recent wireless systems involved in transmission of speech demands evolution of efficient and effective methods for maintaining quality of speech, especially at the receiving end. In order to obtain toll quality of speech and high intelligibility cum naturalness in wireless systems, NB speech coders should be upgraded to its counterpart WB coders (50-7000Hz). For the effective utilization of WB speech communication in wireless media, it is indeed necessary to upgrade both end devices and network to be WB compatible which is costly and time consuming affairs. In the meantime some techniques have been developed to artificially extend bandwidth of NB speech to WB at receiver which leads to improvement in the quality of recovered speech. Amongst all elements of the communication system (channel, transmitter and receiver), quality and intelligibility of voice at receiver side majorly depend upon channel condition. Many techniques are adopted to mitigate the effect of the channel. In order to maintain quality and naturalness of voice at receiver side in various unpredictable channel conditions, AMR (Adaptive Multi Rate) NB is considered to be one of the obvious potential candidates. AMR NB is operated on various modes of bitrate between 4.75 and 12.2 kbps.  Depending upon the channel conditions, specific mode of operation is selected dynamically. For example, Low bit rate mode of operation is selected in bed channel conditions, that allows more error protection bits for channel coding and vice versa. Since inception, many speech coding techniques like CELP, ACELP and RPE-LTP are adopted in different applications in 2G and 3G. In this paper, implementation of ABWE algorithm is developed on CELP based GSM AMR 06.90 NB Coder using MATLAB simulation; further Subjective (MOS) and Objective (PESQ) analysis are carried out to judge the overall performance of developed coder. The evaluated results for both analyses clearly advocate that BWE coder offers significant improvement in recovered speech quality in comparison with legacy GSM AMR NB decoder.

   ABWE, AMR, CELP, GSM, Speech coding, Steganography, Subjective Analysis, Objective Analysis.


1.       P. Jax and P. Vary, ―Bandwidth extension of speech signals: A catalyst for the introduction of wideband speech coding?, IEEE Commun.Mag., vol. 44, no. 5, pp. 106–111, 2006.
2.       P. Jax and P. Vary, ―On artificial bandwidth extension of telephone speech, Signal Process., vol. 83, no. 8, pp. 1707–1719, 2003.

3.       Peter jax and Peter vary, ―An upper bound on the quality of artificial bandwidth extension of narrowband speech signals, in Proc. of ICASSP, vol. 1, Orlando, FL, USA, 2002, pp. 237–240.

4.       Eko Pryadi, Kuniwati Gandi, Herman Kanalebe. “Speech Compression Using CELP Speech Coding Technique In GSM AMR”, IEEE Conference, 2008A.

5.       Xiao Jianming, Li Xun, Wan Lei, “Software Simulation in GSM Environment of Federal Standard 1016 CELP Vocoder”, International Conference on Communication Technology, Oct. 22-24, 1998, Beijing, China

6.       ETSI, Channel coding (GSM 05.03 version 8.9.0 (2005-01), release 1999), pp. 12-19 & 98.

7.       D. Malkovic, ―Speech Coding Methods in Mobile Radio Communication Systems, 17th International Conference on Applied Electromagnetics and Communications, Oct-2003, Croatia.

8.       ITU-T 2000, ―Perceptual evaluation of speech quality (PESQ), and objective method for end-to-end speech quality assessment of narrowband telephone networks and speech codecs, ITU-T Rec. P. 862, 2001.

9.       K.Jarvinen “Standardization Of the Adaptive Multi Rate Codec”, IEEE     Conference 2000.

10.     Bernd Geiser and Peter Vary, ―Backward Compatible Telephony in Mobile Networks: CELP Watermarking & Bandwidth Extension, International Conference on Audio and Speech Signal Processing, 2007.

11.     Hannu Pulakka and Paavo Alku, “Bandwidth Extension of Telephone Speech Using a Neural Network and a Filter Bank Implementation for Highband Mel Spectrum” , IEEE traransactions on audio, speech, and language processing, vol. 19, no. 7, september 2011

12. Audio/Original/16kHz_16bit/




Gaurav Govind Keswani

Paper Title:

Artificial Intelligence- Is Our Future Bright or Bleak

Abstract:    The paper reviews the meaning of artificial intelligence and its various advantages and disadvantages. It also considers the current progress of this technology in the real world and discusses the applications of AI in the fields of heavy industries, gaming, aviation, weather forecasting, expert systems and heuristic classification, with the focus being on expert systems. This is because Expert Systems are primarily being used for cyber defense as information stored in computers and in transit is facing increasing threats. It focuses on the concept, architecture and working of Expert Systems while also considering its work in other fields. The paper concludes by analyzing the future potential of Artificial Intelligence.

   Artificial Intelligence, Expert Systems, Heuristic Classifications.


1.      Song Ning and Ma Yan “Discussion on Research and Development of Artificial Intelligence”, Chongqing Normal University, China.
2.      Harpreet Kaur, “Artificial Intelligence: Bringing expert knowledge to computers”, Discovery Journal

3.      Mark Stamp “Information Security- Principles and Practise” pp 197-198

4.      Heuristic Classifications

5.      http://




Gajula RajyaLakshmi, CH.Phani Krishna,Vemu Samson Deva Kumar

Paper Title:

Commercial Statistics Management System

Abstract:    To maintain the statistical information of earnings, counters and parcel goods of different stations in Vijayawada division. It is also used to know the variance between different types of earnings during the particular time period by auto remainders”,  using J2EE technology.The project is used to maintain the minimum and desired amenity availability status and requirement according to station wise. It is also used to find the status of the work, work in progress through online using indicators.The project is used to enter the complaints from the passengers of different stations and to know the status of the complaints whether it is rectified or not through online according to station wise. It is also used to know the other stations list.The project is also used to know the commercial contracts information like parking publicity, pay and use, ATMs, retiring rooms and catering units according to station wise. It is also used to know the status of the contract. It is used to know the upward and downward trains details and timings in different stations particularly Vijayawada division. used to know the earnings of different categories like earnings , counters and parcel goods according to different stations. It is also used to know the variations between different time periods.This includes knowing the contracts information like parking, publicity, retiring rooms, catering units, etc according to station wise. It is used to know the progress of the work and schedule of the work through online. It is also used to know the catering details and performance in catering technology.

   commercial statistics, Sr. DCM, Amenities, work contracts, Earnings.


1.        Core Java™ 2 Volume I – Fundamentals 7th Edition-Cay S. Hortsman
2.        Pearson Education – Sun Microsystems Gary Cornell

3.        Core Java™ 2 Volume II – Advanced  - Cay S. Hortsman

4.        Pearson Education – Sun Microsystems Gary Cornell

5.        Head First Servlets & JSP               - Eric Freeman

6.        O’Reilly – SPD Elisabeth Freeman

7.        The Book of JavaScript 2nd Edition-Thau

8.        SPD               

9.        Effective Java – Programming Language Guide-Joshua Bloch
10.     Pearson Education – Sun Microsystems       

11.     Java Database Best Practices-George Reese

12.     O’Reilly – SPD              

13.     JBoss – A Developers Notebook-Norman Richards

14.     O’Reilly – SPD-Sam Griffith