International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02
Home
Articles
Conferences
Editors
Scope
AUTHOR GUIDELINES
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-2 Issue-5 Published on June 30, 2013
25
Volume-2 Issue-5 Published on June 30, 2013

  Download Abstract Book

S. No

Volume-2 Issue-5, June 2013, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Thanneru Raghu Krishna Prasad, Goutham Solasa, Nariganani SD Satyadeep, G.Suresh Babu

Paper Title:

Static Analysis and Optimisation of Chassis and Suspension of an All-Terrain Vehicle

Abstract:    The project was aimed to design the frame & suspension of the Society of Automotive Engineers (SAE) Baja car which is a single-seated all-terrain vehicle and is used for off road usage and endurance on a rough terrain. In many aspects it is similar to an All-Terrain Vehicle (ATV) except that it is much smaller in size and has safer rollover capabilities. The modeling of the frame and suspension is done by using pro-e software. This design is checked by Finite Element Analysis after estimating the load and the weight of the frame optimized. 

Keywords:
 (SAE), (ATV)


References:

1.        SAE, 2011, “Mini Baja 2011 Rules”,  (http://sae.org/students/minibaja.htm).
2.         http://www.matweb.com
3.        Fundamentals of vehicle-dynamics, Thomas.D.Gillespie
4.        Bill and Doug Milliken; Race Car Vehicle Dynamics
5.        (RCVD) (http://www.millikenresearch.com/rcvd.html)
6.        Butterworth-Heinemann Ltd; 2Rev Ed edition (May 23, 2001); The Automotive Chassis
7.        Reza N. Jazar; March 2008; Vehicle Dynamics, Theory and application

1-6

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.


Authors:

B.K.Kolhapure

Paper Title:

Study on Shear Behaviour of High Strength Concrete (HSC) Slender Beams

Abstract:    In this paper an experimental investigation is carried out on Twelve HSC beams with constant width (125 mm) and effective depth (100 mm) by varying (i) shear span to depth ratio, (ii) the longitudinal reinforcement ratio and (iii) the minimum web reinforcement ratio were casted and tested to understand the shear behavior of the beams with minimum web reinforcement as per IS CODE and ACI CODE and maximum web reinforcement as per IS CODE. The load-deflection behavior and the failure pattern of the beams, ultimate shear strength and reserve shear strength are studied with varying a/d ratio and longitudinal reinforcement. The results obtained are compared with the different codal equations. Based on these observations, it can be concluded that, there are many parameters influencing the shear behavior of RC beams such as shear span to depth ratio (a/d ratio>2), concrete grade, depth of the beam and the percentage of the longitudinal reinforcement The results obtained were compared with the different codal equations. The British code model is proposed for the present work.

Keywords:
   High strength concrete, shear span to depth ratio. Reserve strength, failure pattern, ultimate shear capacity, codal provisions.


References:

1.       Raghu S.Pendyala and Priyan Mendis, “Experiment Studies on Shear Strength of High Strength Concrete Beams,” ACI Structural Journal/july-august 2000, pp 564 – 571.
2.       Mark k. Johnson and Julio A. Ramirez, “Minimum Shear Reinforcement in Beams with Higher Strength Concrete,” ACI Structural Journal/July-Aug 1989 pp 376-382.

3.       Theodor Krauthammer, “Minimum Shear Reinforcement Based on Interface Shear Transfer,” ACI Structural Journal/Jan-Feb 1992 pp 99-105

4.       Michael P. Collins and Daniel Kuchma, “How Safe Are Our Large, Lightly Reinforced Concrete Beams, Slabs, and Footings”. ACI Structural Journal/July-August 1999 pp 482-490

5.       Young-soo Yoon, William D. Cook and Denis Nitchell, “Minimum Shear Reinforcement in Normal, Medium, and High-Strength Concrete Beams,” ACI Structural
Journal/Sept-Oct 1996 pp 576-584.

6.       Guney Ozcebe, Ugur Ersoy, and Tugrul Tankut et al, “Evaluation of Minimum Shear Reinforcement Requirements for Higher Strength Concrete,” ACI Structural Journal/May-June 1999 pp 361-368.

7.       Robert J. Frosch, “Behaviour of Large-Scale Reinforced Concrete Beams with Minimum Shear Reinforcement,” ACI Structural Journal/Nov-Dec 2000 pp 814-820.

8.       Dino Angelakos, Evan C. Bentz and Michael P. Collins, “Effect of Concrete Strength and Minimum Stirrups on Shear Strength of Large Members,” ACI Structural Journal/May-June 2001 pp 290-300

9.       Prodromos D. Zararis, “ Shear Strength and Minimum Shear Reinforcement of Reinforced Concrete Slender Beams,” ACI Structural Journal/March-April 2003 pp 203-214

10.     Khaldoun N.Rahal and Khaled s. Al-Shaleh, “Minimum Transverse Reinforcement in 65 MPa Concrete Beams,” ACI Structural Journal/Nov-Dec 2004 pp 872-878

11.     A.Cladera and A.R.Mari, “Experimental study on high- strength concrete beams failing in shear,” Engineering Structures/May-2005 pp 1519-1527.

12.     Patrick Paultre and Denis Mitchell, “Code Provisions for High-Strength Concrete an International Perspective,” Concrete International MAY 2003, pp 76-90

13.     Jin-Keun Kim andYyon-Dong Park, “Prediction of Shear Strength of Reinforced Concrete Beams without Web Reinforcement”, ACI Structural Journal, V 93,
No.3, May-Jun 1996, pp.213-222.

14.     Michael .P.Collins and Daniel Kuchama, “How safe are our large, lightly reinforced concrete beams, slabs and footings?,” ACI Structural Journal, V 96, No 4, Jul-Aug 1999, pp 482-490.

15.     S.Sarkar, O.Adwan, B.Bose, “Shear stress distribution and failure mechanics of high-strength reinforced concrete beams,” Materials and Structures, V32, No.216, March 1999, pp 112-116.

16.     Satish.B.DesaI, “Influence of constituents of concrete on its tensile strength and shear strength,” ACI Structural Journal, January-February 2004, Pg 29-38.

17.     M. Khuntia and B. Stojadinovic (2001). “Shear Strength of Reinforced Concrete Beams without Transverse Reinforcement,” ACI Structural Journal, V 98, No.5, Sep-Oct 2001, pp.648-656.

18.     A.Koray Tureyen and Robert J. Frosch, “Concrete shear strength: Another Perspective,” ACI Structural Journal, September-October 2003, pp 609-615.

19.     N.Subramanian, “Shear strength of high strength concrete beams: Review of codal provisions,” The Indian Concrete Journal, May 2003, pp 1090-1094.

20.     Indian Standard, “PLAIN AND REINFORCED CONCRETE CODE OF PRACTICE (Fourth Revision)”, IS456:2000, Clause 26.5.1.6, pp 48.

21.     Songkram Piyamahant and H1roshi Shima, “Shear Behaviour Of Reinforced Concrete Beams With A Small Amount Of Web Reinforcement,” ME Thesis, Kochi University of Technology Kochi, Japan, Jan 2002.

22.     Y.A.Daou and H.A.GhaneM, “Experimental Study of the Minimum Shear Reinforcement in High Strength Concrete Beams,” IACT-Journal-V1-N2-(10)-(pp103-118).

23.     American Concrete Institute. ACI Building Code Requirements for Reinforced Concrete, ACI 318-02; 2002.


7-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Suvra Sarkar, Sandeepa Sarkar, Bishnu Charan Sarkar

Paper Title:

Nonlinear Dynamics of a BJT Based Colpitts Oscillator with Tunable Bias Current

Abstract:    The effect of bias current variation in the dynamics of a conventional BJT based Colpitts Oscillator (CO) has been thoroughly examined in this paper. After formulating a suitable ac equivalent model of the CO taking care of the dc bias current, the dynamics of the system has been numerically studied. It is observed that in a CO circuit with given design parameter, a periodic oscillation starts for a critical bias current and with the variation of the bias current to a higher value chaotic oscillations are observed through a period doubling root. A prototype hardware experiment in the low RF band CO supports the observations obtained by the numerical simulations. The change in chaoticity with the variation of the operating bias current is observed by finding Maximum Lyapunov exponent (MLE) from numerically and experimentally obtained time series of the CO output data. The technique of bias current variation could be applicable in any frequency range including Microwave band, in principle and it has important application potential in chaos based communication systems for encoding information bits into chaotic signals.

Keywords:
   Bias current tuning, Chaotic Colpitts oscillator, Maximum Lyapunov exponent Nonlinear trans-conductance model of BJT, period doubling route to chaos.


References:

1.        M P Kennedy, R Rovatti, G Setti, Chaotic Electronics in Telecommunications, Taylor and Francis, 2000.
2.        L Elarson, L S Tsimring, J M Litt, Digital Communications using Chaos and nonlinear dynamics, Springer, 2006.

3.        T Jiang, S Qiao, Z Shi, L Peng, J Huangtu, W Z Cui, W Ma and L Ran,  "Simulation and Experimental evaluation of the Radar Signal performance of chaotic signals generated from a Microwave Colpitts oscillators”, Progress in Electromagnetic Research, PIER,2009, vol.  90, pp. 15-30.

4.        Sarkar, B. C., C. Koley, A. K. Guin, and S. Sarkar, “Some numerical and experimental observations on the growth of oscillations in an X-band Gunn oscillator”, Progress In Electromagnetics Research B, 2012 vol.  40, pp. 325–341.

5.        M P Kennedy, “Chaos in the Colpitts oscillator”, IEEE Trans on Circuits and Systems I: Fundamental Theory and Applications, vol. 41, no. 11, 1994  pp.  771-774.

6.        G. M. Maggio, O. D. Feo, M.P. Kennedy, “Nonlinear Analysis of the Colpitts Oscillator and Applications to Design”, IEEE Trans on Circuits   and Systems-I: Fundamental Theory and Applications,September, 1999 vol. 46,no.  9.

7.        T Jiang, S Qiao, Z G Shi, L Ran, “Ambiguity Function of Chaotic Radar with Colpitts Oscillator”, PIERS Proceedings, Hangzhou, China, March 24-28, 2008.

8.        Z. G. Shi and L X Ran, “Microwave Chaotic Colpitts Oscillator: Design, implementation and Applications” , Journal of Electromagnetic Waves and Applications,
vol. 20, no. 10, 2006 pp. 1335-1349.

9.        G Z Shi, S Qiao, K S Chen et al, “Ambiguity functions of direct chaotic radar employing microwave chaotic Colpitts oscillator”, Progress In Electromagnetics Research, PIER   vol. 77, 2007 pp. 1-14.

10.     A Tamasevicus, G Mykolaitis, S Bumeliene, A Ceenys, A N Anagnostopoulos, E Lindberg, “Two stage chaotic Colpitts oscillator”, Electronics Letters,vol. 37, no. 9, 2001 pp. 549-551.

11.     A Tamasevicus, S Bumelieneand E Lindberg, “Improved chaotic Colpitts oscillator for ultra high frequencies”,Electronics Letter,  vol.  40, 2004 pp. 25-26,2004.

12.     S Bumeliene, A tamasevicious, G Mykolaitis, A Bazaliauskas,E lindberg, “Numerical investigation and experimental demonstration of chaos from two stage Colpitts oscillator in the ultrahigh frequency range”, Nonlinear Dynamics, vol.44, 2006  pp.  167-172.

13.     J Y Effa, B Z Essimbi, J M Ngudam,  “Synchronization of improved chaotic Colpitts oscillators using nonlinear feedback control”, Nonlinear Dynamics, vol. 58, 2009 pp. 39-47.

14.     Sprott, J. C., Chaos Data Analyzer Package, Web address:  http://sport.physics.wise.edu/cda.htm

15.     Jacob Millman, Microelectronics: Digital and Analog Circuits and  Systems,  Mc Grawhill International  Student Edition, 1981.pp. 537-539

16.     A S Sedra and K C Smith, Microelectronic Circuits, Oxford University Press, 2004. p470

17.     M E Valkenberg, Network Analysis, 3rd edition, Prentice Hall of India, 2007.pp. 307-310.


12-18

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

M. Mohan Babu, G.K. Viswanadh

Paper Title:

Hydrochemical Studies along Coastal Areas of Nellore District, Andhra Pradesh

Abstract:    The groundwater quality in coastal parts of Nellore district, Andhra Pradesh is discussed with emphasis on their utility to drinking and agricultural purposes. Soils in the study area are sandy and clayey soils.  The quality of groundwater is in general potable with pH showing a trend towards alkalinity.  The hydro geochemical facies found in the area is Na-Cl. 

Keywords:
   Agricultural Purpose, Coastal Aquifers, Drinking, Groundwater Quality, Nellore district


References:

1.       Brown E, Shougated M.W and Fishman M. J.1974. Methods for collection and analysis of water samples for Dissolved Minerals and Gases. U. S. Dept. of Interior Book 5, 160 p. 
2.       Hem J.D., 1991. Study and interpretation of the Chemical characteristics of Natural Waters.  U. S. Geol. Surv. Water Supply paper – 2254, Scientific Publ. Jodhpur, India, 264 p.

3.       Robinove G.J., R. H. Longford and J.W. Broohart. 1958.  Saline Water Resources of North Dakota, U.S. Geol. Surv. Water Supply Paper 1428, p. 72.

4.       Twort A.C., R.C. Hoather and F.M. Law., 1974.  Water Supply, Edward Arnold Pub. Ltd. London.

5.       World Health Organization (WHO). 1971. International Standards for Drinking Water (3rd) edn.

6.       ICMR. 1975. Manual of Standards of Quality for Drinking Water Supplies, Indian Council of Medical Research Spc. Rep. Ser. No. 44, p.27

7.       ISI. 1983. Indian Standard Specifications for Drinking Water, ISI, 10500.

8.       Crawford M.D., 1972.  Hardness of drinking and cardiovascular disease, Proc. Natr. Sco., Vol. 31, pp. 347-353.

9.       Davis S.N. and R. J. M. Dewiest., 1966.  Hydrogeology, John Wiley and Sons Inc., New York., p. 463.

10.     Todd D.K., 1980.  Groundwater Hydrology, 2nd edn., John Wiley and Sons, New York,  p. 535.
 

19-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Ghazala Y.Hermiz, Mahdi H. Suhail,Suzan M.Shakouli

Paper Title:

Comparison of High Pressure DC-sputtering and Pulsed Laser Deposition of Superconducting Bi1.6Pb0.4Sr2Ca2Cu3O10+δ  

Abstract:    Superconducting Bi1.6Pb0.4Sr2Ca2Cu3O10+δ thin films were deposited on Si(111) substrates using two different techniques: dc-sputtering at high oxygen pressure and pulsed laser deposition. The structure and electrical properties of the obtained films were compared. The transition temperature Tc for bulk and films deposited by PLD is 102 K and 97 K respectively, while Tc of films prepared by dc sputtering is 90 K. The structural analysis was carried out by XRD on pellet sample and its annealed and as deposited films .The surface morphology of the films have been studied by using AFM.

Keywords:
   DC-sputtering; PLD; Thin film superconductors


References:

1.       K. Ishii” High-rate low kinetic energy gas-flow-sputtering system “.J. vac. Sci. Technol.A ,vol.7,pp.256-258, 1989.
2.       T. Jung and A. West phal “Zirconia thin film deposition on silicon by reactive gas flow sputtering: the influence of low energy particle bombardment “-mat-Sc.Eng.A vol.140,pp.528-533,1991.
3.       Kula, Witold, Roman Sobolewski, Joanna Gorecka and Stanislaw J. Lewandoski.Formation of the 110-K superconducting phase in Pb-doped Bi-Sr-Ca-Cu-O thin films. J. Appl.Phys., vol.70,no.6, pp.3171-3179, 1991.

4.       Hiroki Wakamatsu, Takafumi Ogata, Naohiro Yamaguchi, Satoshi Mikusu, Kazuyasu Tokiwa, Tsuneo Watanabe, Kotaro Ohki, Kazuya Kikunaga, Norio Terada, Naoto Kikuchi, Yasumoto Tanaka and Akira Iyo.,Fabrication of (Cu, C)Ba2CuOy superconducting thin film by RF magnetron sputtering, J. Phys.: Conf. Ser. 43 289, 2006.

5.       A.Guldeste, Effect of Deposition Conditions on Composition of rf-sputtered Bi-Sr-Ca-  Cu-O thin films, Tr. J. of Physics, vol.22,pp.901-910,1998.

6.       B. F.Kim, , J. Bohandy, T. E. Phillips, W. J. Green, E. Agostinelli, F. J. Adrian and K.Moorjani. Superconducting thin films of Bi-Sr-Ca-Cu-O obtained by laser ablation processing. Appl. Phys. Lett., vol.53,no.4, pp.321-323, 1988

7.       A.N. Jannah, S.A. Halim, H. Abdullah, Superconducting Properties of BSCCO Thin Films by Pulsed Laser Deposition, European Journal of Scientific Research ,ISSN 1450-216X.29, no.4 , pp.438-446,2009.

8.       R.M.Bowman,A.I.Ferguson and C.M.Pegrum,In situ fabrication of Y-Ba-Cu-O thin films by pulsed laser deposition .IEEE Trans.magnet,vol.27,pp.1459-1462,1991.

9.       A.Ishii and T. Hatano: Preparation of high quality Bi2Sr2CaCu2O8+δ thin films on a MgO substrate by pulsed laser ablation and post-annealing  recrystallization of films accompanying in-plane rotation of a and b axes  Physica C,vol.340 ,p.173,2000.

10.     P. B. Mozhaev, P. V. Komissinski, N. P. Kukhta, A. Kuhle, G. A. Ovsyannikov, J. L. Skov, “Comparison of high-pressure dc-sputtering and pulsed laser deposition of superconducting YBa2Cu3Ox thin films”, J. of Supercond. vol. 10, no. 3, p. 221-6, 1997.

11.     A.Mead, M. Hase, I. Tsukada, K. Noda, S. Takebayashi and K. Uchinokura,. Physical properties of Bi2Sr2Can-1CunOy (n=1,2,3). Phys. Rev. B, vol.41,pp.6418-6430, 1990.

12.     R. Latz, K. Michael and M. Scherer "high conducting large area indium tin oxide electrodes for displays prepared by DC magnetron sputtering", Jap .J. Appl.physics,vol.30,p.L149, 1991.


22-25

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Ginu Thomas, Rahul Vivek Purohit

Paper Title:

Hand Gesture Recognition via Covariance Method

Abstract:    Gesture is a powerful form of communication among humans. This paper presents simple as well as effective method of realizing hand gesture recognition using Covariance Method. First an image database is created which constitutes various static hand gesture images. These images are a subset of American Sign Language (ASL). Preprocessing of the image is done so as to reduce the amount of noise present in the image. Eigen values of the Eigen vectors are calculated. A pattern recognition system is used to transform an image into feature vector i.e. Eigen image, which will then be compared with the trained set of gestures. The method used was successful to retrieve the correct match.

Keywords:
   Covariance, Pattern Recognition


References:

1.        Henrik Birk and Thomas Baltzer Moeslund, “Recognizing Gestures From the Hand Alphabet Using Principal Component Analysis”, Master’s Thesis, Laboratory of Image Analysis, Aalborg University, Denmark, 1996.
2.        Simon Haykin, “Neural Networks: A Comprehensive Foundation”, 2nd edition Prentice Hall PTR ,1998

3.        O. L. Mangasarian, David R. Musicant, “Lagrangian Support Vector Machines”, Journal of Machine Learning Research, 161-177 (2001)

4.        Vikramaditya Jakkula,, “Tutorial on Support Vector Machine (SVM)” ,Vikramaditya Jakkula, School of EECS, Washington State University, Pullman, www.ccs.neu.edu/course/cs5100/resources/SVMTutorial.doc

5.        D. P. Wiens, “Designs for approximately linear regression: Two optimality properties of uniform designs,” Stat. Probability Lett., vol. 12, pp. 217–221, 1991

6.        A. Argyros, M. Lourakis, “Vision-Based Interpretation of Hand Gestures for Remote Control of a Computer Mouse”, Proc. of the workshop on Computer Human Interaction, 2006, pp. 40-51.

7.        Y. Wu and T. S. Huang, “Hand modeling analysis and recognition for vision- based human computer interaction,” IEEE Signal Processing Magazine, Special
Issue on Immersive Interactive Technology, vol. 18, no. 3, pp. 51–60, 2001.

8.        H. Xu, X. Hou, R. Su, and Q. Ni, “Real-time Hand Gesture Recognition System based on Associative Processors,” The 2nd IEEE International Conference on Computer Science and Information Technology, page 14-18, August 2009

9.        H. Zhou, D. Lin, and T. Huang. Static hand gesture recognition based on local orientation histogram feature distribution model. In CVPRW '04: Proceedings of the 2004 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'04) Volume 10, page 161, Washington, DC, USA, 2004 ,IEEE Computer Society.

10.     J. Triesch and C. von der Malsburg. A System for Person-Independent Hand Posture Recognition against Complex Backgrounds. IEEE, Transactions on Pattern Analysis and Machine Intelligence, Vol.232001, Nº. 12, December 2001.

11.     K G Derpains, “A review of Vision-based Hand Gestures”, Internal Report, Department of Computer Science. York University, February 2004.

12.     N. Yasukochi, A. Mitome and R. Ishii, “A Recognition Method of Restricted Hand Shapes in Still Image and Moving Image as a Man-Machine Interface,” IEEE Conference on Human System Interactions, page 306-310, 2008.

13.     P. Premaratne and Q. Nguyen, “Consumer Electronics Control System based on Hand Gesture Moment Invariants,” Computer Vision IET, Vol. 1, page 35-41, March 2007.

14.     Qing Chen , N.D. Georganas, E.M Petriu, “Real-time Vision based Hand Gesture Recognition Using Haar-like features”, IEEE Transactions on Instrumentation and Measurement -2007.

15.     Q. Zhang, F. Chen and X. Liu, “Hand Gesture Detection and Segmentation Based on Difference Background Image with Complex Background, “The 2008 International Conference on Embedded Software and Systems (ICESS2008), Page 338-343, July 2008.

16.     Yikai Fang, Jian Cheng, Kongqiao Wang and Hanqing Lu, “Hand Gesture Recognition Using Fast Multi-scale Analysis”, Proc. of the Fourth International Conference on Image and Graphics, pp 694-698, 2007.


26-29

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Sivakami.P, Karthigaivel.R, Selvakumaran.S

Paper Title:

Voltage Control of Variable Speed Induction Generator Using PWM Converter

Abstract:    The paper describes a simple control structure for a stand-alone Induction Generator (IG) used to operate under variable speeds. Fuzzy Logic Control (FLC) has been developed to automatically vary the duty-cycle of the PWM converter such that to maintain the DC-link voltage constant. The required reactive power for the variable-speed IG is supplied by means of the PWM converter and a capacitor bank to build up the voltage of the IG without the need for a battery and to reduce the rating of the PWM converter with the need for only three sensors. This proposed scheme has been used efficiently for variable speed wind or hydro energy conversion systems. The measurements of the IG system at various speeds and loads are given and show that this proposed system is capable of good DC voltages regulation. The proposed system has been simulated using MATLAB-SIMULINK software and verified the theoretical analysis.

Keywords:
   DC power applications, Induction Generator (IG), Pulse Width-Modulation (PWM) converter, voltage regulation.


References:

1.       Ahmed, T., Noro, O., Hiraki, E., and Nakaoka, M.: “Terminal voltage regulation characteristics by static VAR compensator for a three-phase self-excited induction generator”, IEEE Transa. Ind. Appli., 2004, 40, (4), pp. 978–988.
2.       Suarez, E., and Bortolotto, G.: “Voltage-Frequency Control of A Self-Excited Induction generator”, IEEE Trans. Energy Convers., 1999, 14, (3), pp. 394–401.

3.       Muljadi, E., and Lipo, T.A.: “Series compensated PWM inverter with battery supply applied to an isolated induction generator”, IEEE Trans. Ind. Appl., 1994, 30, pp. 1073–1082.

4.       Marra, E.G., and Pomilio, J.A.: “Self-excited induction generator controlled by a VS-PWM bidirectional converter for rural applications”, IEEE Trans. Ind. Appl., 1999, 35, pp. 877–883.

5.       Ojo, O., and Davidson, I.: “PWM-VSI inverter assisted stand-alone dual stator winding induction generator”. Conf. Rec. IEEE-IAS Annu.  Meeting, October 1999, pp. 1573–1580.

6.       Seyoum, D., Rahman, F., and Grantham, C.: “Terminal voltage control of a wind turbine driven isolated induction generator using stator orientated field contro”. IEEE APEC Conf. Rec., Miami Beach, 2003, vol. 2, pp. 846–852.

7.       Naidu, M., and Walters, J.: “A 4-kW 42-V induction-machine-based automotive power generation system with a diode bridge rectifier and a PWM inverter”, IEEE Trans. Ind. Appl., 2003, 39, (5), pp. 1287–1293.

8.       Leidhold, R., Garcia, G., and Valla, M.I.: “Induction generator controller based on the instantaneous reactive power theory”, IEEE Trans. Energy Convers.,
2002, 17, (3), pp. 368–373.

9.       Ahmed, T., Nishida, K., and Nakaoka, M.: “A novel induction generator system for small-scale AC and DC power applications”. Proc. 36th Annual  Power Electron. Specialists Conf., IEEE- PESC 05, 12–16 June 2005, vol. 1, pp. 250–256.

10.     Tarek Ahmed, Katsumi Nishida, and Mutsuo Nakaoka,: “Advanced Control of PWM Converter With Variable-Speed Induction Generator”, IEEE transactions on industry applications, 2006, 42, (5), PP.631-701.

11.     Timothy, and Ross, J,: “Fuzzy logic with engineering applications”. McGraw hill international  editions, Electrical engineering series, New York,1989.


30-35

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Arti R.Bhore, N.D.Kale

Paper Title:

Reading Users’ Minds from Their Eyes: A Method for Implicit Image Annotation

Abstract:    This paper explores the possible solutions for image annotation and retrieval by implicitly monitoring user attention via eye-tracking. Features are extracted from the gaze trajectory of users examining sets of images to provide implicit information on the target template that guides visual attention. Here Gaze Inference System (GIS) is a fuzzy logic based framework that analyzes the gaze-movement features to assign a user interest level (UIL) from 0 to 1 to every image that appeared on the screen. Because some properties of the gaze features are unique for every user, our user adaptive framework builds a new processing system for every new user to achieve higher accuracy. The generated UILs can be used for image annotation purposes; however, the output of this system is not limited as it can be used also for retrieval or other scenarios. The developed framework produces promising and reliable UILs where approximately 53% of target images in the users’ minds can be identified by the machine with an error of less than 20% and the top 10% of them with no error.  As show in this paper that the existing information in gaze patterns can be employed to improve the machine’s judgment of image content by assessment of human interest and attention to the objects inside virtual environments.

Keywords:
   Eye tracking framework, image annotation, image retrieval, Gaze Interface System.


References:

1.       L. Kozma, A. Klami, and S. Kaski, “Gazir: Gaze-based zooming interface for image retrieval” in Proc. 2009 Int. Conf. Multimodal Interfaces, New York, 2009, pp. 305–312, ser. ICMI-MLMI’09, ACM.
2.       SHYNI.G1,SHANMUGAPRIYA.K2 “An Adaptive Fuzzy Logic Based Technique To Read User’s Mind for Image Annotation” (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 3, March 2013)

3.       M. Ames and M. Naaman,” Why we tag: motivations for annotation in mobile and online media“ In Proc. of CHI ’07, pages 971–980, SanJose, California, USA, 2007.

4.       R. Shi, H. Feng, T.-S. Chua and C.-H Lee, “An adaptive image content representation and segmentation approach to automatic image annotation in Image and Video Retrieval” ser. Lecture Notes in Computer Science. Berlin, Germany: Springer, 2004, vol. 3115, pp. 1951–1951.

5.       H.Ma, J. Zhu, M.-T. Lyu, and I. King, “Bridging the semantic gap between image contents and tags” IEEE Trans. Multimedia, vol.12,no.5, pp.462–473,2010.

6.       J. Fan, Y. Gao, H. Luo, and R. Jain, “Mining multilevel image semantics via hierarchical classification” IEEE Transactions on Multimedia, 10 (2):167–187, 2008.

7.       A. L. Yarbus, “Eye Movements and Vision” New York: Plenum,1967, translated from Russian by Basil Haig,, Original Russian edition published in Moscow in 1965..

8.       “Gazir: Gaze-based Zooming Interface for Image Retrieval” by laszlokozma, Artokl, Samuelkaski, Department of Information and Computer science, Helsinki University of Technology Finland.J. Jones. (1991, May 10). Networks (2nd ed.)


36-38

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Bilal Abdullah Nasir

Paper Title:

Design of Micro - Hydro - Electric Power Station

Abstract:    Micro-hydro-electric power is both an efficient and reliable formof clean source of renewable energy. It can be an excellent method of harnessing renewable energy from small rivers and streams. The micro-hydro project designed to be a run -of-river type, because it requires very little or no reservoir in order to power the turbine. The water will run straight through the turbine and back into the river or stream to use it for the other purposes. This has a minimal environmental impact on the local ecosystem.
The design procedure of micro-hydro power plant was implemented by a Matlab Simulink computer program to calculate all the design parameters. The choice of the turbine type depending mainly on the site head and flow rate. The turbine power and speed were directly proportional with the site head, but there were specific points for maximum turbine power and speed with the variation of the site water flow rate. The head losses in the penstock could range from 5 to 10 percent of the gross head, depending on the length of the penstock, quantity of water flow rate and its velocity. The turbine efficiency  could range from 80 to 95 percent depending on the turbine type, and the generator efficiency about 90 percent. 
The design study showed that construction of micro-hydro-electric project was feasible in the project site and there were no major problems apparent at the design and implementation stages of the micro-hydro-electric power plant.

Keywords:
   micro-hydro-electric power plant, design and implementation, hydro-turbines.


References:

1.       Mohibullah, M. A. R. and MohdIqbal Abdul Hakim: "Basic design aspects of micro-hydro-power plant and its potential development in Malaysia", National Power and Energy Conference (PECon) Proceedings, Kuala Lumpur, Malaysia, 2004.
2.       http:// www.microhydropower.net/

3.       http:// www.alternative-energy.info/micro-hydro-power-pros-and-cons/

4.       CelsoPenche: "Layman's guidebook on how to develop a small hydro site", Published by the European Small Hydropower Association (ESHA), Second edition, Belgium, June, 1998. 

5.       Dilip Singh: "Micro-hydro-power", Resource Assessment Handbook, An Initiative of the Asian and Pacific Center for Transfer of Technology, September, 2009.

6.       European Small Hydropower Association (ESHA): "Energy recovery in existing infrastructures with small hydropower plants", Sixth Framework Programme, Publication by Mhylab, Switzerland, June, 2010.

7.       Khurana, S. and Anoop Kumar: "Small hydro power – A review", International Journal of Thermal Technologies, Vol. 1, NO. 1, pp. 107-110, December, 2011.

8.       Wazed, M. A. and Shamsuddin Ahmed: "Feasibility study of micro-hydro-electric power generation at Sapchari Waterfall, Khagrachari, Bangladesh", Journal of Applied Science, Vol. 9, No. 2, pp. 372-376, 2009.

9.       Bard Jackson: "State-of-the-art in mini-hydro electrical design", Renewable Energy Review Journal, Vol. 4, No. 2, pp. 47-55, December, 1982.

10.     Sadrul Islam, A. K. M. and et al.: "Appropriate low head micro-hydro systems for Bangladesh", Second International Conference on Electrical and Computer
Engineering (ICECE), Dhaka, Bangladesh, pp. 216-219, 26-28December, 2002.

11.     Razak, J. A. and et al.: "Application of cross-flow turbine in off-grid Pico-hydro renewable energy systems", Proceeding of the American-Math 10 Conference on Applied Mathematics, pp. 519-526, 2010.

12.     Khurana, S. and Hardeep Singh: "Effect of cavitation on hydraulic turbines-A review", International Journal of Current Engineering and Technology, Vol. 2, No. 1, pp. 172-177, March, 2012.

13.     Okonkwo, G. N. and Ezeonu, S. O.: "Design and installation of a mini hydro- electric power plant", Scholarly Journal of Engineering Research, Vol. 1, No. 1, pp. 19-24, April, 2012.

14.     Chennani, M., Salhi, I. and Doubabi, S.: "Study of the regulation of a micro-hydro-electric power plant prototype", International Scientific Journal for Alternative Energy and Ecology, Vol. 5, No. 61, pp. 79-84, 2008.

15.     Pandey, V.: "Feasibility study of micro-hydro-power in Nepal", Research report, Nepal Engineering College, Bhaktapur, 2011.

39-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Ojasvi Bhatia, Yogesh Kumar Gupta

Paper Title:

Mitigating Phase Noise Effects in Orthogonal Frequency Division Multiplexing System Using   Phase Locked Loop

Abstract:    Orthogonal Frequency Division Multiplexing System are better suited to the today’s generation 3G networks and upcoming 4G networks in terms of bandwidth efficiency due to overlapping of frequency bands, high speed data transfer due to parallel data transfer, maintaining high quality of wireless link even under multipath conditions due to low symbol rate it minimizes ISI effects. The application of channel codes like convolution codes further reduces the Bit Error Rate and improves the link reliability. Although OFDM systems shows superior performance over single carrier and FDM system but there is one disadvantage that is the over sensitivity to Phase noise of the local oscillator which hinders the orthogonality  of the sub carriers and increases inter carrier interference. OFDM system performance is degraded due to phase noise. Accordingly going deep into the various parameters of the OFDM system it was observed that Phase Locked Loop (PLL) could better control the phase noise problem in comparison to free running oscillator. It is deployed at the downlink side of incoming signal received from Antenna generating its own local frequency slightly higher than the incoming frequency to generate IF signal (after mixing the incoming and the local frequency) for further processing. Accordingly to examine closely the other aspects of PLL in relation to Free Running Local Oscillator various parameters of PLL in relation to OFDM system were studied in detail.

Keywords:
   Bit Error Rate; Signal to Noise Ratio; Phase Locked Loop;  Power spectral densitys.


References:

1.        Denis Petrovic, Wolfgang Rave, Gerhard Fettweis,”Effects of Phase Noise on OFDM Systems With and Without PLL: Characterization and Compensation” IEEE Trans. On Communication, vol. 55, no. 8, August 2007.
2.        Denis Petrovic, Wolfgang Rave, Gerhard Fettweis,” Performance Degradation of Coded-OFDM due to Phase Noise” Technische University¨at Dresden, Vodafone Chair Mobile Communications Systems, D-01062 Dresden, Germany-2011

3.        Ville Syrjälä, Mikko Valkama, Nikolay N. Tchamov, and Jukka Rinne, “Phase Noise Modeling and Mitigation Techniques in OFDM Communications Systems”, 2009 IEEE.

4.        Pramod Jacob Mathecken , “Performance Analysis of OFDM With Wiener Phase Noise and Frequency Selective Fading Channel “AALTO UNIVERSITY, School of Science and Technology, Faculty of Electronics, Communications and Automation Department of Signal Processing and  Acoustics  -2011

5.        Yun-Soo ko, Seong-Min Kim, Kwang-Chun Lee,” PLL Apparatus for OFDM System having variable Channel Bands and Operating Method Thereof” , United States Patent No: US 7,612,618 B2, Nov,3, 2009

6.        Tiejun (Ronald) Wang, John G. Proakis, and James R. Zeidler, “Techniques for Suppression of Intercarrier Interference in OFDM Systems” Center for Wireless Communications University of California, San Diego, IEEE Communications Society / WCNC 2008

7.        Wu, and Y. Bar-Ness, “OFDM systems in the presence of phase noise:consequences and solutions,” IEEE Transactions on Communications, Vol. 52, No. 11, pp. 1988-1997, November 2004.

8.        Q. Zou, A. Tarighat, and A. H. Sayed, “Compensation of phase noise in OFDM wireless systems,” IEEE Translations on Signal Processing, Vol. 55, No. 11, November 2007.

9.        G. Armada and M. Calvo, “Phase noise and sub-carrier spacing effects on the performance of an OFDM communication system,” IEEE Commun. Lett., vol. 2, no. 1, pp. 11–13, Jan. 1998.

10.     Keng Yang, “Phase Noise Profile aid system     testing”,      Microwave/Millimeter Technologies, www.rfdesign.com, Nov-2005   

11.     T. Pollet, M. van Bladel, and M. Moeneclaey, “BER sensitivity of OFDM systems to carrier frequency offset and Wiener phase noise” IEEE Trans. on
Communications, vol. 43, pp. 191-193, Feb. 1995.

12.     S. M. Kay, “Fundamentals of statistical signal processing”, Volume 1, Estimation theory. Prentice Hall, 1993

48-51

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Srikanth Mandarapu, Sreedhar Lolla, Madhu Chandra Popuri

Paper Title:

Dynamic Simulation of Robust Sensorless Speed Measurement in IM Using MRAC against Variations in Stator Resistance and Rotor-Time Constant

Abstract:   This paper proposes a Model Reference Adaptive Control (MRAC) which makes use of both back EMF and Reactive Power methods for sensorless rotor speed measurement against variations in rotor time constant in addition to the variations in stator resistance. The adjustable model makes use of these two methodologies eliminates the need to calculate rotor flux, thus avoiding the requirement of synchronously rotating reference angle and the stable speed can also be estimated even at low speeds. The effectiveness of the proposed model is proved with extensive computer simulation.

Keywords:
   back emf method, reactive power method, Rotor Speed, Sensorless Control, Stator Resistance.


References:

1.       Hassan K. Khalil, Elias G. Strangas, and Sinisa Jurkovic, “Speed Observer and Reduced Nonlinear Model for Sensorless Control of Induction Motors”  IEEE Transactions on Control Systems Technology, vol. 17, No. 2, March 2009, pp. 327–339.
2.       Peter Vas, “Sensorless Vector and Direct Torque Control”, New York: Oxford University Press, 1998.

3.       Bimal K. B o s e, “Modern Power Electronics and AC Drives”, Prentice-Hall India, 2008.

4.       Joachim Holtz, “Sensorless control of induction motor drives”, Proceedings of Vol. 90, No. 8, Aug. 2002 pp 1359 – 1394.

5.       M. Srikanth, Madhu Chandra P., G. Manofer Ali, Arun Kumar Rath, “Robust MRAC Based Sensorless Rotor Speed Measurement against Variations in Stator Resistance Using Combination of Back EMF and Reactive Power Method” International Journal of Multidisciplinary Educational Research, Volume 1, Issue 3, August 2012, pp 38-46.

6.       A. M. El-Sawy, Yehia S. Mohamed and A. A. Zaki, “Stator Resistance and Speed Estimation for Induction Motor Drives as Influenced by Saturation”, The Online Journal on Electronics and Electrical Engineering (OJEEE), Vol. 3 – No. 2, pp 416 - 424.

7.       A.Venkadesan, S.Himavathi and A.Muthuramalingam, “Novel SNC-NN-MRAS Based Speed Estimator for Sensor-Less Vector Controlled IM Drives,” International Journal on Electrical and Electronics Engineering5:2 2011, pp 73 – 78.

8.       Shady M. Gadoue, Damian Giaouris, and John W. Finch, “MRAS Sensorless Vector Control of an Induction Motor Using New Sliding-Mode and Fuzzy-LogicAdaptation Mechanisms,” IEEE J. Quantum Electron., submitted for publication.


52-55

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Aruna.D.Mane, Sirkazi Mohd Arif, Shaikh Sehzad, Shaikh Sohail

Paper Title:

Solar Panel Tracking System for GSM Based Agriculture System

Abstract:   Solar modules are devices that cleanly convert sunlight into electricity and offer a practical solution to the problem of power generation in remote areas. This project involves the development of an Automatic Solar radiation tracker that could be further used for agriculture purpose, making use of a GSM Module as the control system. Fossil fuels are a relatively short-term energy source consequently; the uses of alternative sources such as solar energy are becoming more wide spread. To make solar energy more viable, the efficiency of solar array systems must be maximized. A feasible approach to maximizing the efficiency of solar array systems is sun tracking. Proposed in this paper is a system that controls the movement of a solar array so that it is constantly aligned towards the direction of the sun. The solar tracker designed and constructed in this paper offers a reliable and affordable method of aligning a solar module with the sun in order to maximize its energy output. Automatic Sun Tracking System is a hybrid hardware/software prototype, which automatically provides best alignment of solar panel with the sun, to get maximum output (electricity). The system will be implemented for irrigation purpose wherein the irrigation system will be controlled using a GSM technology

Keywords:
   GSM, Solar Panel, Microcontroller.


References:

1.        Islam, N.S.  Wasi-ur-Rahman, M.  “An intelligent SMS- based remote Water Metering System”. 12th International Conference on Computers and Information Technology, 2009, 21-23 Dec. 2009, Dhaka, Bangladesh. International Conference on Robotics, Vision, Information and Signal Processing 2007 (ROVISP2007), Penang, 28 – 30 November 2007.
2.        Malik Sikandar Hayat Khiyal, Aihab Khan, and Erum Shehzadi. “ SMS Based Wireless Home Appliance Control System (HACS) for Automating Appliances and Security”, Issues in Informing Science and Information Technology. Vol. 9. pp. 887 – 894. 2009.

56-59

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

Vaibhav Sharma, Ankit Verma

Paper Title:

Fault Diagnosis of Analog Circuits Using dc Approach

Abstract:    Fault diagnosis of circuit is a key problem of theory of circuit networks and especially with the development of electronic technique at high speed, the increasing complexity of electronic equipment and altitudinal integration of electronic circuit, it is of importance in particular. Testing and diagnosis of electronic devices are fundamental topics in the development and maintenance of safe and reliable complex systems. In both cases, the attention is focused on the detection of faults affecting a subsystem whose appearance generally impairs the global system safety and performance. In a complete fault diagnosis procedure, fault detection and isolation must be carried out together; the effectiveness of the procedure depends on fault detection and isolation performance as well as the complexity of the test phase. While there are established techniques to obtain an automatic diagnosis for a digital circuit, the development of an effective automated diagnosis tool for analog or mixed circuits is still an open research field. For more than two decades, the subject of fault location in analog circuits has been of interest to researchers in circuits and systems. In recent years this interest has intensified and a number of promising results has emerged.

Keywords:
   In a complete fault diagnosis procedure, fault detection and isolation must be carried out together;


References:

1.        J. W. Bandler and A. E. Salama, “Fault diagnosis of analog circuits,” Proc. ieee, vol. 73, pp. 1279–1325, Aug. 1985.
2.        Walter Hochwald and Jhon D. Bastian “A dc approach for analog fault dictionary determination”,ieee transactions on circuit & system, vol.26,pp.523-529, July 1979.

3.        Ying Deng', Yigang He' and Yichuang Sun “Fault diagnosis of analog circuits with tolerances using artificial neural networks”, ieee, pp.292-295, 2000.

4.        Cesare Alippi, Marcantoonio Catelani, Ada Fort and Marco Mugnaini“SBT soft fault diagnosis in analog electronic circuits: a sensitivity-based approach by randomized algorithms”, ieee transactions on instrumentation and measurement, vol. 51, pp.1116-1125, Oct 2002.

5.        Li Tingjun1, Jiang Zhongshan1, Zhao Xiuli1, Huangqilai1 Zhang Ying 2, “Fault diagnosis of analog circuit based on multi-layer neural networks”, icemi, pp.331-334, 2007.

6.        Qu Haini, Xu Weisheng, Yu Youling “Design of neural network output layer in fault diagnosis of analog circuit”, icemi, pp.639-642, 2007.

7.        Alice. McKeon Antony Wakeling,” Fault diagnosis in analogue circuits using ai techniques”, International test conference, pp.118-123, 1989

8.        K. L. Butler, J. A. Momoh, “ A neural net based approach for fault diagnosis in distribution networks”, ieee , pp.1275-1278, 2000.

9.        V. C. Prasad and N. Sarat Chandra Babu “Selection of Test Nodes for Analog Fault Diagnosis in Dictionary Approach” ieee transactions on instrumentation and
measurement,  vol. 49, pp. 1289-1297, Dec 2000.

10.     Francesco Grasso, Antonio Luchetta, Stefano Manetti, and Maria Cristina Piccirilli “A method for the automatic selection oft test frequencies in analog fault diagnosis” ieee vol. 56, pp. 2322-2329, Dec 2007.


60-64

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Bhavana Sharma, Shaila Chugh, Vishmay Jain

Paper Title:

Investigation of Adaptive Multipath Routing For Load Balancing In MANET

Abstract:    In mobile ad hoc network (MANET), congestion is one of the most important limitations that affect the performance of the whole network. Multi-path routing protocol can balance and share the load better than the single path routing protocol in ad hoc networks, thereby reducing the congestion possibility by dividing the traffic in alternative paths.  The performance of the network can be improved by using a load balancing mechanism. Such a mechanism transfers load from overloaded nodes to under loaded nodes. The objective of multipath routing is to improve the reliability and throughput and favors load balancing. Multipath routing allows the establishment of multiple paths between a pair of source and destination node. It is typically proposed in order to increase the reliability of data transmission or to provide load balancing and has received more and more attentions. In this paper, some of the congestion removing and load balancing routing schemes have been surveyed. The relative strengths and weaknesses of the protocols have also been studied which allow us to identify the areas for future research.

Keywords:
   MANET, multipath routing, load balance and sharing.


References:

1.       Z. Haas, M. Pearlman, 1997 “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, Work in Progress, Internet Draft, MANET Working Group.
2.       I. F. Akyildiz et al, "Wireless sensor networks: a survey," Computer Networks, vol. 38, pp. 393-422, March 2002.

3.       D.B. Johnson, D.A.Maltz and Y.Hu,“The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Internet Draft: draft-ietf-manet-dsr-06.txt, November 2001.

4.       C.E.Perkins, E.M.Royer and S.R. Das, “Ad hoc On-Demand Distance Vector Routing,” Internet Draft: draft-ietf-manet-aodv-09.txt, November 2001.

5.       D. Johnson and D. Maltz, “Dynamic source routing in ad hoc wireless networks”, Mobile computing, chapter 5, Kluwer Academic, August 1996

6.       M. R. Pearlman, Z. J. Haas, “Improving the performance of query-based routing

7.       L. Wang, et al., “Multipath source routing in wireless ad hoc network” in Canadian Conf. Elec. Comp. Eng., vol. 1, 2000, pp. 479-83.

8.       A. Nasipuri and S.R. Das, “On-Demand Multipath Routing for Mobile Ad Hoc Networks,” Proceedings of IEEE ICCCN’99, Boston, MA, Oct. 1999, pp. 64-70.

9.       K. M. Mahesh, and S.R. Das “On-demand Multipath Distance Vector Routing in Ad Hoc Networks”.Proceedings of IEEE ICNP, November 2001.

10.     K. M. Mahesh, and S.R. Das “On-demand Multipath Distance Vector Routing in Ad Hoc Networks”.Proceedings of IEEE ICNP, November 2001.

11.     P.Periyasamy and Dr.E.Karthikeyan,“Performance Evaluation Of AOMDV Protocol Based On Various Scenario And Traffic Patterns”, International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.1, No.6, pp. 33-48, December 2011.

12.     Shameem Ansar. A, Prabaharan. P, Maneesha V Ramesh Rekha. P, "DVM based Multipath Routing in MANET for Different Scalable and Adaptive Environment" 2012 International Conference on Data Science & Engineering (ICDSE), 2012 IEEE, pp.-187-193.

13.     Mohannad Ayash, Mohammad Mikki, Kangbin Yim "Improved AODV Routing Protocol to Cope With High Overhead in High Mobility MANETs", 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IEEE 2012,pp.-244-251.

14.     L. Reddeppa Reddy, S.V. Raghavan "SMORT: Scalable multipath on-demand routing for mobile ad hoc networks" in proceedings of Ad Hoc Networks, 2007, pp. 162–188.

15.     Georgios Parissidis, Vincent Lenders, Martin May, and Bernhard Plattner,"Multi-path Routing Protocols in Wireless Mobile Ad Hoc Networks: A Quantitative
Comparison" NEW2AN 2006, LNCS 4003, Springer-Verlag Berlin Heidelberg 2006, pp. 313–326.

16.     R. Raja Kishore, B. Kalyani, K. Rajkumar,"Multipath Dynamic Source Routing Protocol for Mobile Ad hoc Networks", International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 9, November- 2012 ISSN: 2278-0181.  

17.     Xiaoyan Hong, Mario Gerla and Hanbiao Wang,"Load Balanced, Energy-Aware Communications for Mars Sensor Networks", NASA JPL under IPN-ISD Technology Task Project: “Ad-hoc Network Protocols”.2002 IEEE.

18.     S. Vidhya Reddy, K.Srimathi, "Route Resurgence By Congestion Endurance (RRCE): A Strategic Routing Topology For Mobile Ad Hoc Networks" International Journal Of Scientific & Technology Research Volume 1, Issue 11, December 2012

19.     Marc R. Pearlman,Zygmunt J. Hass, Peter Sholander, Siamak S.Tabriji," On the impact of alternate path routing for load balancing in mobile ad hoc networks", Mobihoc 00 Proceedings of the first ACM international symposium om mobile Ad hoc Network & computing, pp.3-10.

20.     Amjad Ali, Wang Huiqiang “Node Centric Load Balancing Routing Protocol for Mobile Ad Hoc Networks “,  Proceeding of Internationl MultiConference of Enginners Computer Scientists 2012 Vol I, March 2012 ,Hong Kong.

21.     Sivakumar, P. and K. Duraiswamy, “A QoS routing protocol for mobile ad hoc networks based on the load distribution”, Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp: 1- 6, 2011. Raj bhupinder Kaur, Ranjit Singh Dhillon, Harwinder Singh Sohal, Amarpreet Singh Gill “Load Balancing of Ant Based Algorithm in MANET”, IJCST, Vol. 1, Issue 2, ISSN : 0976 - 8491, December 2010.

22.     Tuan Anh Le, Choong Seon Hong, Member, IEEE, Md. Abdur Razzaque et. al. “An Energy-Aware Congestion Control Algorithm for Multipath TCP” IEEE Communications Letters, Vol. 16, No. 2, February 2012.

23.     Jingyuan Wang, Jiangtao Wen et. al. in his work titled “An Improved TCP Congestion Control Algorithm and its Performance” 2011 IEEE.

24.     M. Ali, B. G Stewart et. al. In his work titled “Multipath Routing Backbones for Load Balancing in Mobile Ad Hoc Networks” 978-1-4673-0784-0/12, 2012 IEEE.

25.     S. Karunakaran, P. Thangaraj, “A cluster based congestion control protocol for mobile ad hoc networks”, International Journal of Information Technology and
Knowledge Management, Volume 2, No 2, pp. 471-474, 2010.

26.     S.Venkatasubramanian, N.P.Gopalan, “A quality of service architecture for resource provisioning and rate control in mobile ad hoc network”, International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC), Vol 1, No 3, September 2010.

27.     K. Chen, K. Nahrstedt, N. Vaidya, "The Utility of Explicit Rate-Based Flow Control in Mobile Ad Hoc Networks", Proc. IEEE Wireless Communications and Networking Conference (WCNC 04), pp 1921-1926, 2004.

28.     K. C. Rahman, S. F. Hasan, “ Explicit Rate-based Congestion Control for Multimedia Streaming over Mobile Ad hoc Networks”, International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol 10, No 04, 2010.

29.     H. Zhai, X. Chen, Y. Fang, “Rate-Based Transport Control for Mobile Ad Hoc Networks”, IEEE Wireless Communications and Networking Conference, pp 2264 – 2269, Vol 4, 2005.

30.     E. Lochin, G. Jourjon, S. Ardon P. Senac, “Promoting the Use of Reliable Rate Based Transport Protocols: The Chameleon Protocol”, International Journal of
Internet Protocol Technology, Vol 5, Issue 4, pp 175-189, March 2010.

31.     Y. Xu, Y. Wang, C.S. Lui, D-M. Chiu, “Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks”, 5th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks and Workshops (WiOpt), pp 1 – 10, 2007.

32.     Y. Xu, Y. Wang, C.S. Lui, D-M. Chiu, “Balancing Throughput and Fairness for TCP Flows in Multihop Ad-Hoc Networks”, 5th International Symposium on Modeling and Optimization in Mobile Ad Hoc and Wireless Networks and Workshops (WiOpt), pp 1 – 10, 2007.

33.     Yuanyuan ZOU,Yang TAO “A Method of Selecting Path Based on Neighbor Stability in Ad Hoc Network” This work is supported by chongqing science and technology key research projects (No.2009AB2245) , 2012 IEEE.

34.     Ashish Bagwari, Raman Jee et al. “Performance of AODV Routing Protocol with increasing the MANET Nodes and it’s effects on QoS of Mobile Ad hoc Networks” 2012 International Conference on Communication Systems and Network Technologies, DOI 10.1109/CSNT.2012.76, 2012 IEEE.

35.     Vishnu Kumar Sharma  and Dr. Sarita Singh Bhadauria “Mobile Agent Based Congestion Control Using Aodv Routing Protocol Technique For Mobile Ad-Hoc Network” International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 2, April 2012, DOI : 10.5121/ijwmn.2012.4220


65-71

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Shweta Malhotra, Chander Kant Verma

Paper Title:

A Hybrid Approach for Securing Biometric Template

Abstract:    Biometrics authentication provides highest level of security. It allows the user to get authenticated using his or her own physical or behavioral characteristics. Unimodal biometrics have several problems such as noisy data, spoof attacks etc. which cause data insecure. To overcome these problems multimodal biometrics is used. Multimodal biometrics allows fusing two or more characteristics into single identification. It leads to more secure and accurate data. In this paper, we have combined two characteristics –one physical and one behavioral and further a key is added to the template to make it more secure. The template is finally stored in database.

Keywords:
   Biometric template protection, multimodal biometrics, biometric cryptosystem, hybrid approach for biometric template protection.


References:

1.        M. Deriche, “Trends and Challenges in Mono and Multi Biometrics,” in Proc. of Image Processing Theory, Tools and Application (IPTA), Sousse, pp.1-9, 23-26 Nov 2008.
2.        M. S. Ahuja and S. Chabbra, “A Survey of Multimodal Biometrics”, International Journal of Computer Science and its Applications, pp. 157-160.

3.        A. Ross and A. Jain, “Information Fusion in Biometrics,” Journal of Pattern Recognition Letters, vol. 24, pp. 2115-2125, 2003.

4.        Signal & Image Processing: An International Journal (SIPIJ) Vol.4, No.1, February 2013 DOI: 10.5121/sipij.2013.4105 57 AN OVERVIEW OF MULTIMODAL BIOMETRICS P. S. Sanjekar and J. B. Patil.

5.        A.ross, K.nandakumar, and A.K. jain. Handbook of multibiometrics, springer, newyork, USA,ist edition, 2006.

6.        S. Hariprasath and T. Prabakar, “Multimodal Biometric Recognition using Iris Feature Extraction and Palmprint Features,” in Proc. of International Conference on Advances in Engineering, Science and Management (ICAESM), Nagapattinam, pp. 174-179, 30-31 March 2012.

7.        A. Kumar, M. Hanmandlu and S. Vasikarla, “Rank Level Integration of Face Based Biometrics,” in Proc. of Ninth International Conference on Information Technology: New Generations (ITNG), Las Vegas, pp. 36-41, 16-18 April 2012.

8.        S. Jahanbin, Hyohoon Choi and A. Bovik, “Passive Multimodal 2D+3D Face Recognition using Gabor Features and Landmark Distances,” IEEE Trans. on Information Forensics and Security, vol. 6, no. 4, pp. 1287-1304, Dec. 2011.

9.        T. Murakami and K. Takahashi, “Fast and Accurate Biometric Identification Using Score Level Indexing and Fusion,” in Proc. Of International Joint Conference on Biometrics (IJCB), USA, ,pp. 978-985, 2011.

10.     Y. Zheng and A. Elmaghraby, “A Brief Survey on Multispectral Face Recognition and Multimodal Score Fusion,” in Proc. of IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Bilbao, pp. 543-550, 14-17 Dec 2011.

11.     N. Gargouri Ben Ayed, A. D. Masmoudi and D. S. Masmoudi, “A New Human Identification based on Fusion Fingerprints and Faces Biometrics using LBP and GWN Descriptors,” in Proc. Of 8th International Multi-Conference on Systems, Signals and Devices (SSD), Sousse, pp. 1-7, 22-25 March 2011.

12.     P. K. Mahesh and M. N. S. Swamy, “A Biometric Identification System based on the Fusion of Palmprint and Speech Signal,” in Proc. of International Conference on Signal and Image Processing (ICSIP), Chennai, pp. 186-190, 15-17 Dec. 2010.

13.     A.Yazdanpanah, K. Faez and R. Amirfattahi, “Multimodal Biometric System using Face, Ear and Gait Biometrics,” in Proc. of 10th International Conference on Information Sciences Signal Processing and their Applications (ISSPA), Kuala Lumpur, pp. 251-254, 10-13 May 2010.

14.     F. A. Fernandez, J. Fierrez and D. Ramos, “Quality-Based Conditional Processing in Multi- Biometrics: Application to Sensor Interoperability,” IEEE Trans. On Systems, Man, And Cybernetics—Part A: Systems and Humans, vol. 40, no. 6, pp.1168-1179, Nov. 2010.

15.     A.Cheraghian, K. Faez, H. Dastmalchi and F. Oskuie, “An Efficient Multimodal Face Recognition Method Robust to Pose Variation,” in Proc. of IEEE Symposium on Computers & Informatics (ISCI), Kuala Lumpur, pp. 431-435, 20-23 March 2010.

16.     Bhattacharjee, M. Saggi, R. Balasubramaniam, A. Tayal and Dr. A. Kumar, “A Decision Theory Based Multimodal Biometric Authentication System Using Wavelet Transform,” in Proc. of the 8th International Conference on Machine Learning and Cybernetics , Baoding, pp. 2336-2342, 12-15 July 2009.

17.     M. Monwar and M. Gavrilova, “Multimodal Biometric System using Rank-Level Fusion Approach,” IEEE Trans. On Systems, Man, and Cybernetics-Part B: Cybernetics, vol. 39, no. 4, pp. 867-878, August 2009.

18.     P. Kartik, R. V. S. S. Vara Prasad and S. R. Mahadeva Prasanna, “Noise Robust Multimodal Biometric Person Authentication System using Face, Speech and Signature Features,” in Proc. Of Annual IEEE India Conference (INDICON), Kanpur, vol. 1, pp. 23-27, 11-13 Dec. 2008.

19.     F. Yang and Baofeng M. A, “Two Models Multimodal Biometric Fusion Based on Fingerprint, Palm-Print and Hand-Geometry,” in Proc. of 1st International Conference on Bioinformatics and Biomedical Engineering (ICBBE), Wuhan, pp. 498-501, 6-8 July 2007.

20.     Xiao-Na Xu, Zhi-Chun Mu and Li Yuan, “Feature-Level Fusion Method based on KFDA for Multimodal Recognition Fusing Ear and Profile Face,” in Proc. of International Conference on  Wavelet Analysis and Pattern Recognition, Beijing, vol. 3, pp. 1306-1310, 2007.

21.     S. Ribaric and I. Fratric, “Experimental Evaluation of Matching-Score Normalization Techniques on Different Multimodal Biometric Systems,” in Proc. of IEEE Mediterranean Electrotechnical Conference, Malaga, pp. 498-501, 16-19 May, 2006.

22.     A.Jain, N. Karthik and A. Ross, “Score Normalization in Multimodal Biometric Systems,”Journal of Pattern Recognition, vol. 38, no.12, pp. 2270-2285, 2005.

23.     Ross, A. K. Jain & J.A. Riesman, Hybrid fingerprint matcher, Pattern Recognition, 36, pp. 1661–1673, 2003

24.     M. Ammar, T. Fukumura, & Y. Yoshida, A new effective approach for off-line verification of signature by using pressure features. 8th International Conference
on Pattern Recognition, pp. 566-569, 1986

25.     M. A. Ismail, S. Gad, Off-line Arabic signature recognition and verification, Pattern Recognition, 33 pp. 1727-1740, 2000

26.     U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proc. of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.

27.     A Survey on Biometric Cryptosystems and Cancelable Biometrics by Christian Rathgeb and Andreas Uhl.


72-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Y.Ch Sekhar, P.S.Srinivas Babu

Paper Title:

Hardware Modeling of VTD- Cache for fine Grain Voltage Scaling

Abstract:   This proposed title of this work allows us to design Variation Trained Drowsy Cache for significant saving of power consumption. When addressing reliability issues. The novel and modular architecture of the VTD – Cache and its associated controller makes it easy to implemented in memory compilers with a small area and power overhead. With proper selection of scaled voltage levels and hort training period the proposed architecture allows micro tuning of the cache and also this architecture variation of supply voltage settings. We model this scheme on FPGA core.

Keywords:
   Cache, drowsy cache, static random access memory (SRAM), AXI protocol.


References:

1.       A. Sasan, H. Homayoun, A. Eltawil, and F. J. Kurdahi, “Process variation aware SRAM/cache for aggressive voltage-frequency scaling,” in Proc. DATE, pp. 911–916.
2.       A. Sasan (Mohammad AMakhzan), A. Khajeh, A. Eltawil, and F. Kurdahi, “Limits of voltage scaling for caches utilizing fault tolerant techniques,” in Proc. ICCD, pp. 488–495.

3.       M. A. Lucente, C. H. Harris, and R. M. Muir, “Memory system reliability improvement through associative cache redundancy,” in Proc. IEEE Custom Integr. Circuits Conf., May 1990, pp. 19.6/1–19.6/4.

4.       Z. Bo, D. Blaauw, D. Sylvester, and K. Flautner, “The     limit of dynamic voltage scaling and insomniac dynamic voltage scaling,” IEEE Trans.Very Large Scale Integr. (VLSI) Syst., vol. 13, no. 11, pp. 1239–1252,Nov. 2005.

5.       K. Flautner, K. Nam Sung, S. Martin, D. Blaauw, and T. Mudge, “Drowsy caches: Simple techniques for reducing leakage power,” in Proc. 29th Annu. Int. Symp. Comput. Arch. , 2002, pp. 148–157.

6.       H. Zhou, M. C. Toburen, E. Rotenberg, and T. M. Conte, “Adaptive mode-control: A static-power-efficient cache design,” in Proc. Int. Conf. Parallel Arch. Compilation Techn., 2001, pp. 61–70.

7.       A. Agarwal, B. C. Paul, S. Mukho padhyay, and K. Roy, “Process variation in embedded memories: Failure analysis and variation aware architecture,” IEEE Trans. Solid-State Circuits, vol. 40, no. 9, pp. 1804–1814, Sep. 2005.

8.       S. Borkar, “Design challenges of technology scaling,” IEEE Micro, vol., no. 4, pp. 23–29, Jul.–Aug. 1999. 10. Y.-F. Tsai, D. Duarte, N. Vijaykrishnan, and M. J.
Irwin, “Implications of technology scaling on leakage reduction techniques,” in Proc. Des.Autom. Conf., Jun. 2003, pp. 187–190 .

9.       K.Kuhn, “32nm SOC process, getting many things right at once, ” Mar. 26,2010. [online]. Available:

10.     http://blogs.intel.com/technology/2010/03/32nm_soc_process_an_analogy_wi.php


77-80

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

H. B. Kekre, Dhirendra Mishra, Prasad Rangnekar, Raja Ketkar

Paper Title:

Detection of Remnant Material and Its Quantification

Abstract:   Loading-unloading of goods is an essential task that is undertaken at every industrial site. Mines witness a large scale transportation activity. As the volume of such goods is large in size, the mode of transport used for delivery is usually dumpers. Huge cranes load the dumpers at one location with some material and then the dumper moves to the desired destination for unloading. After the unloading process, the dumper may still hold some residual matter in its dumping bed which may be misused stealthily; theft of which may amount to huge loss for the concerned industry. This paper mainly discusses attempts in the direction to devise an automatic system that will detect and quantify the remnant material which is left behind in the dump-trucks after the unloading process is formally completed. In this piece of research we have applied grey level co-occurrence matrix (GLCM) and Material specific techniques to detect the carry back for materials like aluminium, coal, copper, iron ore, manganese and lime stone. Results of both these approaches have been compared.

Keywords:
   Carry-back detection, GLCM, Material specific techniques, monochrome, r-plane, Intensity adjustment.


References:

1.       Hargrave, Chad; Thompson, Jeremy and Hainsworth, David. Remnant Coal Detection System for Coal Train Wagons [online]. In: CORE 2010: Rail, Rejuvenation and Renaissance. Wellington, N.Z.
2.       Fei Cai, Honghui Chen and Jianwei Ma. “Man-made Object Detection Based on Texture Clustering and Geometric Structure Feature Extracting”. International Journal of Information Technology and Computer Science(IJITCS) ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

3.       Raman Maini, Himanshu Aggarwal. “A Comprehensive Review of Image Enhancement Techniques”, Journal of Computing, Volume 2, Issue 3, March 2010.

4.       A. Buades, B.Coll and J.m.Morel , “A Review of Image denoising algorithms with new one”,SIAM, multiscale modeling and simulation,Vol 4, No.2 , 2005, pp.490-530.

5.       Rafael Gonzalez and Richard Woods , “Digital Image Processing”, third edition.2010

6.       Muthukrishnan.R and M.Radha , “Edge detection technique for image segmentation”, International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011

7.       Rajan Parekh, “Improving texture recognition using combined GLCM and wavelet features”,International journal of computer Application (IJCA),Vol. 29, No. 10, Sep 2011.

8.       Dipti Patra, Mridula J., “Featured based segmentation of colour textured images using GLCM and Markov Random field model”, World academy of sciences, engineering and technology 2011,pp108-113.

9.       Beliakov G.,James S.,Troiano L., “Texture recognition by using GLCM and various aggregation functions”,Fuzzy systems,2008,IEEE World conference on computational intelligence, June 2008,Hongkong.

10.     S.Anitha, V. Radha, “comparison of image preprocessing techniques for textile texture images”,International journal of engineering, scinec and technology,Vol.2,No.12, 2010.

11.     Dipti Deodhare,NNR Ranga Suri,R. Amit, “Preprocessing and image enhancement algorithms for form based intelligent character recognition system”,International journal of computer science and applications,Vol II, No. II, pp131-144,2005.

12.     H.B.Kekre and Dhirendra Mishra, “Feature extraction of color images using discrete sine transform”, International Journal of Computer Application (IJCA),USA, Special Issue for ICWET 2011 Proceedings ISBN is : 978-93-80747-67-2

13.     H.B.Kekre, Tanua Sarode & Dhirendra Mishra, “Coloring Gray Scale Digital Images using Kekre’s Fast Code Book Generation Algorithm” Published in the proceedings of International conference and workshop on emerging technologies (ICWET10); 26th& 27th Feb 2010 held at thakur college of engineering and technology, Mumbai,

14.     H.B.Kekre and Dhirendra Mishra, “Coloring of Gray Scale Digital Image with consecutive pixel wise color palette using Kekre’s Fast Search Algorithm”, National/Asia pacific conference on Information communication and technology(NCICT 09) 6th& 7th March 2009; MPSTME , DJSCOE, BP, SVKM’s NMIMS

15.     H.B.Kekre,Dhirendra Mishra , Stuti Narula and Vidhi Shah, “ Color feature extraction for CBIR”, International journal of science and technology (IJEST), Vol.3,No.12,December 2011.


81-85

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Mounir M. Kamal, Mohamed A. Safan, Zeinab A. Etman and Mahmoud A. Abd-elbaki

Paper Title:

Effect of Polypropylene Fibers on Development of Fresh and Hardened Properties of Recycled Self-compacting Concrete

Abstract:    The current research intends to study the possibility of producing fiber recycled self-compacting concrete (FRSCC) using demolitions as a coarse aggregate (crushed red brick and crushed ceramic). Polypropylene fibers were used in recycled self-compacting concrete (RSCC) to improve fresh and hardened properties of this type of concrete. Thirty one concrete mixes were prepared to achieve the aim proposed in this paper. Polypropylene fiber volume fraction varied from 0 to 1.5% of the volume of concrete with aspect ratio 12.5. The fresh properties of FRSCC were evaluated using slump flow, J-ring and V-funnel tests. Compressive strength, tensile strength, flexural strength tests were performed in order to investigate mechanical properties. Density was performed to investigate the physical properties The results cleared that; the optimum volume fraction of polypropylene fibers was 0.19% and 0.75% for the mixes contained crushed red break and ceramic as a coarse aggregate, respectively. At optimum volume fraction of polypropylene fibers; the mixes with 25, 50, 75 and 100% of crushed ceramic yields to improve in the compressive strength by 18.4, 26.3, 21.2 and 14.8%, respectively compared to the mixes with crushed red brick as a recycled aggregate was observed.

Keywords:
   self-compacted concrete, red brick, ceramic, recycled materials, polypropylene fibers.


References:

1.        B. Felekoglu, S. Turkel and B. Baradan "Effect of water/cement ratio on the fresh and hardened properties of self-compacting concrete". Building and Environment, 2007; 42.
2.        P. Domone, "Self-compacting Concrete: An Analysis of 11 Years of Case Studies". Cement & Concrete Composites, 2006; 28 (2), pp. 197-208.

3.        W. Zhu and P. J. M. Bartos, "Permeation properties of self compacting concrete". Cement and Concrete Research, June 2003; 33 (6), pp. 921-926.

4.        M. Uysal, and K. Yilmaz, "effect of mineral admixtures on properties of self-compacting concrete". Cement & Concrete Composties, 2011; 33.

5.        O. R. Khaleel, S. A. Al-Mishhadani, and H. Abdual Razak, "The effect of coarse aggregate on fresh and hardened properties of self-compacting concrete (SCC)". Procedia Engineering, 2011; 14.

6.        M. Uysal, K. Yilmaz and M. Ipek, "The effect of mineral admixtures on mechanical properties, chloride ion permeability and impermeability of SCC". Construction and Building Materials, February 2012; 27 (1), pp. 263-270.

7.        A.Rao, K. N.  Jha and S. Misra, "Use of Aggregates from Recycled Construction and Demolition Waste in Concrete". Resources Conservation and Recycling, March 2007; 50 (1), pp. 71-81.

8.        K. Khayat and Y. Roussel, "Testing and Performance of Fiber-Reinforced, Self Consolidating Concrete".  Material & Structure, 2000, 33 (6), pp. 391-397.

9.        Z. J. Grdic, G. A. Toplicic-Curcic, I. M. Despotovic and N. S. Ristic, "Properties of Self Compacting Concrete Prepared with Coarse Recycled Concrete Aggregate". Construction and Building Materials, July 2010; 24 (7), pp. 1129-1133.

10.     V. Corinaldesi and G. Morconi, "Characterization of Self-Compacting Concretes Prepared with Different Fibers and Mineral Additions". Cement & Concrete Composites, 2011; 33 (5), pp. 596-601.

11.     T. Greenough and M. Nehdi, "Shear Behavior of Fiber-Reinforced Self-Consolidating Concrete Slender Beams".  ACI Materials Journal, 2008; 105 (5), pp. 468-477.

12.     H. B. Dhonde, Y. Mo, T. T. Hsu and J. Vogel, "Fresh and Hardened Properties of Self-Consolidating Fiber Reinforced Concrete".  ACI Materials Journal, 2007; 104 (5), pp. 491-500.

13.     E. Ozbay, F. Cassagnebere and M. Lachemi, "Effect of Fiber Types on the Fresh and Rhelogical Properties of Self-Compacting Concrete". In K. H. Khayat, & D. Feys (Ed.), 6th International RILEM Symposium of Self-Compacting Concrete and 4th North American Conference on the Design and use of SCC, Montreal, Sep.2010;
26-29 (2), pp. 435-443

14.     H. Yildirim, O. Tezel, O. Sengul and P. Guner, "Design, Production and Placement of Self-Consolidating Concrete". In K. H. Khayat, & F. Dimitri (Ed.), 6th International RIlEM Symposium on Self-Compacting Concrete, Montreal: RILEM Publication s.a.r.l, 2010; 26-29 (2), pp. 1333-1340.

15.     European SCC Guidelines (2005) The European Guidelines for Self-compacting Concrete, Specification, Production and Use. Retrieved May 1, 2011, www.efca.info

16.     C.X. Qian and P. Stroeven, "Development of Hybrid Polypropylene-Steel Fibers-Reinforced Concrete". Cement and Concrete Research, January 2000, 30 (1), pp. 63-69.

17.     N.S. Apebo1, M.B. Iorwuab, J.C. Agunwamb, "Comparative Analysis of the Compressive Strength of Concrete with Gravel and Crushed over Burnt Bricks as Coarse Aggregates". Nigerian Journal of Technology (NIJOTECH), March 2013, 32 (1), pp. 7-12.

18.     ASTM C618: Specification for Fly Ash and Raw Calcined Natural Pozzolan for Use as a Mineral Admixture in Portland Cement Concrete, Annual Book for ASTM Stand, 4, 2002, 4 p.

19.     ASTMC 494/C 494M: Standard Specification for Chemical Admixtures for Concrete, Annual Book of ASTM Standards, 04.02, 2001, 9 p.

20.     M. M. Kamal, M. A. Safan, Z. A. Etman and E. A. El-daboly "Behavior of Recycled Self-Compacting Concrete". Engineering Research Journal, Egypt, July 2013, 36 (3).

21.     Techical Specifications for self-compacted concrete, National Buliding Reserch Center Cairo, Egypt, 2007

22.     P.B. Cachim, "Mechanical Properties of brick aggregate concrete". Construction and Building Materials, March 2009, 23 (3), pp. 1292-1297.


86-93

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Annu, Chander Kant

Paper Title:

A Novel Approach for Facial Expression Recognition Using Euclidean Distances

Abstract:    There has been a growing interest in automatic face and facial expression recognition from facial images due to a variety of potential applications in law enforcement, security control, and human computer interaction. However, despite of all the advances in automatic facial expression recognition, it still remains a challenging problem. This paper describes an idea of recognizing the human face even in the presence of strong facial expressions using the Eigen face method. The features extracted from the face image sequences can be efficiently used for face and facial expression recognition. Firstly, we compute the Eigen value and Eigen vectors of the input image and then finally the input facial image was recognized when similarity was obtained by calculating the minimum Euclidean distance between the input image and the different expressions.

Keywords:
   Eigen face, Eigen value, Euclidean distance, facial expression recognition, facial features, face recognition.


References:

1.       W. Zhao, R. Chellapa, A. Rosenfeld and P.J. Philips, “Face Recognition: A Literature Survey”, UMD CFAR Technical Report CAR-TR-948, 2000.
2.       William A. Barrett, “A Survey of Face Recognition Algorithms and Testing Results”, Proceeding of IEEE, 1998.

3.       L. Sirovich and M. Kirby, “Low-dimensional procedure for the characterization of human faces”, J. Opt. Soc. Am. A, Vol. 4, No. 3, March 1987, pp 519-524.

4.       Turk M.A., Pentland A.P., “Face Recognition using Eigenfaces”, IEEE Conference on Computer Vision and Pattern Recognition, 1991, pp 586-591.

5.       Turk M.A., Pentland A.P., “Eigenfaces for Recognition”, Journal of Cognitive Neuroscience 3 (1): 1991, pp 71-86.

6.       G. R. S. Murthy and R. S. Jadon, “Effectiveness of Eigenspaces for Facial Expressions Recognition” International Journal of Computer Theory and Engineering, vol. 1, no. 5, pp. 638-642, December 2009.

7.       R. Zhi, M. Flierl, Q. Ruan, and W. B. Kleijn, “Graph-Preserving Sparse Nonnegative Matrix Factorization with Application to Facial Expression Recognition”, IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetics, vol.41, no. 1 pp. 38-52, February 2011.

8.       L. Ma and K. Khorasani, “Facial Expression Recognition Using Constructive Feedforward Neural Networks”, IEEE Transactions on Systems, Man and Cybernetics—Part B: Cybernetics, vol. 34, no. 3, pp. 1588-1595, June 2004.

9.       P. S. Aleksic and A. K. Katsaggelos, “Automatic Facial Expression Recognition Using Facial Animation Parameters and Multistream HMMs”, IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 3-11, March 2006.

10.     H. Huang and H. He, “Super-Resolution Method for Face Recognition Using Nonlinear Mappings on Coherent Features”, IEEE Transactions on Neural Networks, vol. 22, no. 1, pp. 121-130, January 2011.

11.     Y. Gao, M. K. H. Leung, S. C. Hui, and M. W. Tananda, “ Facial Expression Recognition From Line-Based Caricatures” IEEE Transactions on Systems, Man and Cybernetics-Part A:Systems and Humans, vol. 33, no. 3, pp. 407-411, May 2003.

12.     S. M. Lajevardi and H. R. Wu, “Facial Expression Recognition in Perceptual Color Space” IEEE Transactions on Image Processing, vol. 21, no. 8, pp. 3721-3732, August 2012.


94-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

S.C.Shekokar, M. B. Mali

Paper Title:

Speech Enhancement Using DCT

Abstract:    The speech enhancement problem comprises of various problems characterized by the type of noise source, the nature of interaction between speech and noise, the number of sensor signals (microphone outputs) available for enhancement and the nature of the speech application. Noise reduction remains a demanding problem due to wide variety of background noise types (car noise, babble noise, cockpit noise, train noise, subway noise, etc.) and the difficulty in estimating their statistics. The connection of noise and clean signal is usually classified as additive/multiplicative/convolution. The additive model very often dominates in real-world applications.

Keywords:
   Speech enhancement, Speech processing


References:

1.        Y. Soon, S. N. Koh, and C. K. Yeo, “Noisy speech enhancement using discrete cosine transform,” Speech Communication, vol. 24, pp. 249–257, 1998.
2.        S. Ou, X. Zhao, and J. Dong, “Combining DCT and Adaptive KLT for Noisy Speech Enhancement,” in Wireless Communications, Networking and Mobile Computing, 2007. WiCom 2007. International Conference on, 2007, pp. 2857– 2860.

3.        L. Rabiner, M. Cheng, A. Rosenberg, and C. McGonegal, “A comparative performance study of several pitch detection algorithms,” IEEE Transactions on Acoustics Speech and Signal Processing, vol. 24, no. 5, pp. 399–418, 1976.

4.        H. Ding and I. Y. Soon, “An adaptive time-shift analysis for DCT based speech enhancement,” in Proceedings ICICS, 2009, pp. 1–4

5.        Huijun Ding, Ing Yann Soon and Chai Kiat Yeo, “A DCT-based speech enhancement system with pitch synchronous analysis”, IEEE Transactions on Audio, Speech and Language Processing 2011.

6.        Barry Commin, "Signal Subspace Speech Enhancement with Adaptive Noise Estimation” Department of Electronic and Computer Engineering, National University of Ireland, Galway, Sept. 2005.


98-100

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Ankit Gupta, Mridul Gupta, Neelakshi Bajpai, Pooja Gupta, Prashant Singh

Paper Title:

Efficient Design and Implementation of 4-Degree of Freedom Robotic Arm

Abstract:   A robotic arm is a mechanical arm which is designed to perform a function similarly as a human arm does. It is usually programmable and arm may be a sum total of the mechanism or can be part of a complex robot. To design a robot, various links are being connected by joints allowing either a translational (linear) motion or a rotational motion in various planes. In many cases sensors are used in the arm that usually indicates the controller about the hardness by which the gripping is done by arm or directs the arm in directions in which it should move to perform the task or it tells the system about presence of object in front of it. Various aspects that are kept in mind while designing a robotic arm are torque calculation for each motor used, concept of inverse kinematics, interfacing to remote controller, ways for noise reduction in ADC   (analog-to-digital converter).We have designed this robotic arm using servos, ATmega32 microcontroller with interfacing analog joysticks controller. We have made some improvements in design by reducing the noises that were generated due to mechanical construction of the joystick which continuously varies and gives some noises. And also we have used the fact the mechanical system has larger response time as compared to associated electronics.  To overcome this we went for some software filters and algorithms following the ADC. Before this, we have introduced inverse kinematics with its difference from forward kinematics and various calculations related to it.

Keywords:
   Averaging Filter, DOF (Degree of Freedom), End effectors, Inverse kinematics, IIR Filter.


References:

1.      White Paper “Controlling Lynx6 Robotic Arm Micro mega”
2.      http://electronicdesign.com/analog/use-software-filters-reduce-adc-nois

3.      Barnett, Cox and O’Cull “Embedded C Programming and the Atmel AVR ” 2nd Edition 2007.

4.      http://www.lynxmotion.com/images/html/proj057.htm

5.      www.engineersgarage.com/articles/servo-motor?page=1


101-104

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Samadhan P. Deshmukh, Vivek K. Sunnapwar

Paper Title:

Development and Validation of Performance Measures for Green Supplier Selection in Indian Industries

Abstract:    An environmentally conscious supply chain, also called a green supply chain, is a new concept appearing in recent literature. The purpose of this study is to identify the critical green manufacturing factors considered during supplier selection in the Indian manufacturing sector. The approach of the research includes a literature review, in-depth interviews and questionnaire surveys. The major activities of the green supply chain; namely green design, green logistic design, green manufacturing, green costs, quality, environment performance assessment, customer co-operation are covered throughout the research. Factor analysis is done using Statistical Package for the Social Sciences (SPSS) software to help managers understand the important environmental dimensions. Factor analysis is used to evaluate the relative importance of various environmental factors. The data are analysed using “mean score”.

Keywords:
   Green Manufacturing, green supplier selection, environmental performance measures, factor analysis


References:

1.       G. Kannan, J. Sarkis, R. Sivakumar, M. Palaniappan, “Multi criteria decision making approaches for green supplier evaluation and selection: A literature review”, Conference on the Greening of Industry Network, GIN 2012, Linkoping – Sweden, October 22-24, 2012.
2.       A. H. I. Lee., H-Y Kang, C-F Hsu, H-C Hung, “A green supplier selection model for high-tech industry”, Expert Systems with Applications, vol. 36, 2009, pp. 7917–7927.

3.       J. Sarkis, “Evaluating environmentally conscious business practices”. European Journal of Operational Research, vol. 107, 1998, pp. 159–174.

4.       V. Baskaran, S. Nachiappan, S. Rahman, “Indian textile suppliers’ sustainability evaluation using the grey approach”, Int. J. Production Economics, vol. 135, 2012, pp. 647–658.

5.       A. K. Bhateja, R. Babbar, S. Singh, A. Sachdeva, “Study of green supply chain management in the Indian manufacturing Industries: A literature review cum an analytical approach for the measurement of performance”, International Journal of Computational Engineering & Management, vol. 13, 2011, pp. 84–99.

6.       A. M. Deif, “A system model for green manufacturing”, Journal of Cleaner Production, vol. 19, 2011, pp. 1553–1559.

7.       K-J Wu, M-L Tseng, T. Vy, “Evaluation the drivers of green supply chain management practices in uncertainty”, Procedia - Social and Behavioral Sciences, vol. 25, 2011, pp. 384 – 397.

8.       A. Awasthi, S. S. Chauhan, S. K. Goyal, “A fuzzy multicriteria approach for evaluating environmental performance of suppliers’’, Int. J. Production Economics, vol. 126, 2010, pp. 370–378.

9.       L. Hua, C. Weiping, K. Zhixin, N. Tungwa, L. Yuanyuan, “Fuzzy multiple attribute decision making for evaluating aggregate risk in green manufacturing”, Tsinghua Science and Technology, ISSN 1007-0214, vol. 19/20, 2005, pp. 627–632.

10.     P. K. Humphreys, Y. K. Wong, F. T. S. Chan, “Integrating environmental criteria into the supplier selection process”, Journal of Materials Processing Technology, vol. 138, 2003, pp. 349–356

11.     C-C Chen, H-J Shyur, H-S Shih, K-S Wu, “A business strategy selection of green supply chain management via an analytic network process”, Computers and Mathematics with Applications, vol. 64, 2012, pp. 2544–2557.

12.     W-C Yeh, M-C Chuang, “Using multi-objective genetic algorithm for partner selection in green supply chain problems”, Expert Systems with Applications, vol. 38, 2011, pp. 4244–4253.

13.     C-T Lin, C-B Chen, Y-C Ting, “A green purchasing model by using ANP and LP methods”, Journal of Testing and Evaluation, vol. 40, No. 2, 2012, Paper ID JTE104259

14.     D. Nimawat, V. Namdev, “An overview of green supply chain management in India”, Research Journal of Recent Sciences, vol. 16, 2012, pp. 77–82.

15.     J. Sarkis, “A strategic decision framework for green supply chain management”, Journal of Cleaner Production, Vol. 11, 2003, pp. 397–409.

16.     S. Kumar, S. Chattopadhyaya, V. Sharma, “Green supply chain management: A case study from Indian electrical and electronics industry”. International Journal of Soft Computing and Engineering, vol. 1, Issue-6, 2012, pp. 275–281

17.     J. Pallant, SPSS Survival manual, Open University press, 2001.

18.     A. K. Digalwar, K. S. Sangwan, “Development and validation of performance measures for world class manufacturing practices in India”, Journal of Advanced Manufacturing Systems, vol. 6, 2007, pp. 21–38.


105-109

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Alan Shaji Idicula, Kalpana Balani, Preetesh Shetty, Sayali Thalve, T. Rajani Mangala

Paper Title:

Scale Identification of an Audio Input

Abstract:   Generally a music piece plays on one single scale. Each scale is uniquely characterized by a set of specific notes. In this paper, a methodology is presented for the recognition of musical scales that are associated with any piece of music. The procedure of recognition is essentially based on the comparison between the combinations of notes occurring in any music piece, with a predefined set of notes denoting a scale. To determine scale from a musical recording, frequency of the note is the characteristic which is used to identify a note and differentiate it from other notes. The proposed methodology led to the development of a system which can be exploited by a beginner learning music. The system performed successful recognition for the 92% of the tested recordings. It should be noted that the proposed system can operate in real time.

Keywords:
   audio input, frequency, matrix, music, note, scale


References:

1.        www.music.vt.edu/musicdictionary/appendix/scales/scales/ majorscales. html
2.        Cooper, Paul (1973). Perspectives in Music Theory: An Historical-Analytical Approach, p.16. ISBN 0-396-06752-2.

3.        http://www.mathworks.in/help/matlab/ref/wavread.html

4.        A.Sheh and D. P. Ellis, “Chord segmentation and recognition using EM-trained hidden Markov models,” in Proceedings of the International Symposium on Music Information Retrieval, Baltimore, MD, 2003.

5.        E. Jacobsen and R. Lyons, The sliding DFT, Signal Processing Magazine vol. 20, issue 2, pp. 74–80 (March 2003).


110-113

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

As’ad Munawir, Murni Dewi, Yulvi Zaika, Agoes Soehardjono MD

Paper Title:

Bearing Capacity on Slope Modeling with Composite Bamboo Pile Reinforcement

Abstract:    the footing that placed on slope surface will decrease bearing capacity of soil. The function of using composite bamboo pile is to increase bearing capacity of footing on slope and that is one of the innovative slope reinforcement methods which necessary for last few years. Slope modeling with composite bamboo reinforcement was using an experiment box with 1,50 m as length; 1,0 m as width and 1,0 m as height. It used sand soil with fine gradation and composite bamboo pile with various pile length and pile location. The load was modeled as a strip footing with continuous increasing load by load cell until the limit load has been reach. The problem occurred in laboratory has been analyzed with Finite Element Method. It changed 3D slope modeling to be 2D modeling. Composite bamboo pile has been chosen as a new utilization innovation of bamboo as reinforced pile and that’s a positive value to optimize bamboo local material as steel reinforced replacement material. The result of experiment using composite bamboo as pile reinforcement on slope has increased slope bearing capacity. It shown with significant increasing of bearing capacity and maximum limit load can be reached on slope.

Keywords:
   bearing capacity improvement, bearing capacity on slope, composite bamboo pile, finite element method.


References:

1.       Azzam, W. R., Farouk, A. ” Experimental and Numerical Studies of Sand Slopes Loaded with Skirted Strip Footing”, EJGE, Vol.15, 2010
2.       Bahloul, K. M. M. Behavior of Strip Footing Resting on Randomly Fiber Reinforced Sand Cushion Underlaid by a Layer   of Soft Clay and Adjacent to a Slope. Bucharest, Rumania.

3.       Haripal, P.K., Behera, R.N., and Patra, C.R. 2008.  Behavior of Surface Strip Footing on Geogrid Reinforced Sand Bed. International  Association for Computer Method and Advance in Geomechanics, India

4.       Huang, C. H., Wen, W.W. 1994. Failure Mechanisms of Reinforced Sand Slopes Loaded with A Footing. Japanese Society of Soil Mechanics and Foundation Engineering.

5.       Ip, K. W. 2005. Bearing Capacity for Foundation near Slope. Concordia University, Canada.

6.       Kenny, M. J., Andrawes, K. Z. 1997. The Bearing Capacity of Footings on a Sand Layer Overlying Soft Clay. University of Strathclyde.

7.       Kumar, S., Anil, V., and Ilamparuthi, K. 2009. Response of Footing on Sand Slopes. Indian Geotechnical Society Chennai Chapter.

8.       Kusakabe, O., Kimura, T., Yamaguchi, H. 1981. Bearing Capacity of Slopes under Strip Loads on the Top Surfaces. Japanese Society of Soil Mechanics and
Foundation Engineering.

9.       Marandi, S.M., Bagheripour, M.H., Rahgozar, R., and Ghirian A.R. 2008. Numerical Investigation Into the Behavior of Circular Pad Shallow Foundations Supported by Geogrid Reinforced Sand. Bahonar University, Kerman, Iran.

10.     Meyerhof, G.G. 1957. The Ultimate Bearing Capacity of Foundations on Slopes. London: The Proceedings of the Fourth International Conference on Soil Mechanics and Foundation Engineering.

11.     Mostafa, A. E. S. 2004. Strip Footing Behaviour on Pile and Sheet Pile-Stabilized Sand Slope. Alexandria Engineering Journal Vol. 43 (2004) No 1, 41-54.

12.     Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2011. Pile Stability and Lateral Force on Slope Using Mini Composite Bamboo Pile Reinforcement. National Seminar – 1 BMPTTSSI – Konteks 5. Faculty of Engineering USU, Medan.

13.     Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2011. Utilizing of Mini Composite Bamboo Pile as Soil Reinforcement Alternative for Landslide Prevention on Slope. Civil Engineering National Seminar VII. ITS, Surabaya.

14.     Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2012. Influence of Various Dimension and Mini Composite Bamboo Pile Reinforcement Location on Slope Stability Modeling. National Symposium: Rekayasa Engineering and Bamboo Cultivation I. Gajah Mada University, Yogyakarta.

15.     Munawir, A., Dewi, S.M., Zaika, Y., Soehardjono, A. 2012. Influence of Various Length and Mini Composite Bamboo Pile Reinforcement Location on Slope Stability Modeling. Civil Engineering National Seminar VIII. ITS, Surabaya.

16.     Narita, K., Hakuju, Y. 1990. Bearing Capacity Analysis of Foundation on Slope by use of Log-Spiral Sliding Surface, Soil and Foundations, Vol. 30. Technical Note, Japanese society of soil mechanics and foundation engineering
17.     Shin, E.C., Das B.M. 2000. Experiment Study of Bearing Capacity of a strip Foundation on Geogrid-Reinforced Sand Vol 7. Technical Note, Geosynthetics
International

18.     Thanapalasingam, J., Granendran, C.T. 2008. Predicting the Performance of Foundation Near Reinforced Slope Fills. International  Association for Computer Method and Advance in Geomechanics, India

19.     Zahmatkesh, A., Choobbasti, A. J. 2010. Investigation of Bearing Capacity and Settlement of Strip Footing on Clay Reinforced with Stone Columns. Department of Civil Engineering, Babol University of Technology, Babol, Iran.


114-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Vikas Kumar

Paper Title:

Temperature- Aware Virtual Machine Scheduling in Green Clouds

Abstract:    This paper present the temperature- aware virtual machine scheduling in green clouds which is design to maintain the temperature of virtualized cloud system below critical temperature threshold by scheduling VMs according to temperature of node and insures reliable quality of service. High temperature gradients degrade reliability and performance therefore it requires vigorous cooling in order to keep the equipment and the software stable. Moreover, high energy  consumption  not  only  increases operational  cost, which  reduces  the profit  margin  of  Cloud  providers,  but  also  leads  to  high  carbon  emissions  which  is  not friendly for environment.  Thus apart from saving energy and money by avoiding huge investment on cooling, it also reduces carbon footprints.

Keywords:
   cloud computing, virtual machine


References:

1.        Phaphoom.N, Wang. X, Abrahamson.P.” Foundations and Technological Landscape of Cloud Computing” (ISRN Software Engineering Volume 2013 (2013), Article ID 782174, 31 pages)
2.        Dhiman.G, Marchetti.G, Rosing.T “v: Green: a system for energy efficient computing in virtualized environments” (Proceedings of the 14th ACM/IEEE international symposium on Low power electronics and design, page 243-248, published in ACM, 2009)

3.        D. Ramesh, A. Krishnan “An Analysis on Energy Efficient System Design in Grid Computing”( Second International Conference, CCSIT 2012, Bangalore, India, January 2-4, 2012. Proceedings, pp 421-428)

4.        Barroso, L.A. Holzle, U. “The Case for Energy-Proportional Computing” (IEEE computer society, Volume: 40, Issue: 12, Dec. 2007 Page:33 – 37, ISSN :0018-9162)

5.        Kansa.A, Zhao.F. “Fine-Grained Energy Profiling for Power-Aware Application Design” (http://research.microsoft.com/en-us/um/people/zhao/pubs/hotmetrics08joulemeter.pdf)

6.        Arjamaa.H, “Energy Consumption Estimates of Information and Communication Technology: synthesis and analysis” (http://www.cse.tkk.fi/en/publications/B/5/papers/Arjamaa_final.pdf)

7.        Christopher K. Lennard A. Richard Newton,” An Estimation Technique to Guide Low Power Resynthesis” (http://pdf.aminer.org/000/436/871/an_estimation_technique_to_guide_low_power_resynthesis_algorithms.pdf)

8.        E. Pinheiro, R. Bianchini, E. V. Carrera, and T. Heath, “Load Balancing and Unbalancing for Power and Performance in Cluster-Based Systems” (Workshop on Compilers and Operating Systems for Low Power, pp: 182–195, 2009. ) 

9.        S. Srikantaiah, A. Kansal, and F. Zhao, “Energy Aware Consolidation for Cloud Computing”, (Cluster Computing, Vol. 12, pp: 1–15, 2009.)

10.     E. Elnozahy, M. Kistler, R. Rajamony, “Energy-Efficient Server Clusters” (Power-Aware Computer Systems, pp: 179-197, 2003)

11.     R. Nathuji and K. Schwan, “Virtualpower: Coordinated Power Management in Virtualized Enterprise Systems” (ACM SIGOPS Operating Systems Review, Vol. 41, pp: 256-278, 2007.)

12.     E. Dodonov, R. de Mell, “A Novel Approach for Distributed Application Scheduling Based on Prediction of Communication Events” (Future Generation Computer
Systems, Vol. 5, pp: 740-752, 2010.)

13.     C. Guo, G. Lu, H. Wang, S. Yang, C. Kong, P. Sun, W. Wu,Y. Zhang, “Secondnet: A Data  Center Network Virtualization Architecture with Bandwidth Guarantees”, (6th International Conference on emerging Networking Experiments and Technologies, USA, 2010.)

14.     J. L. Berral, R. Nou, F. Julia, “Towards Energy-Aware Scheduling in Data Centers using Machine Learning” (1st International Conference on Energy-Efficient Computing and Networking, Passau, Germany, 2010.)

15.     Y. Song, H. Wang, Y. Li, B. Feng,  Y. Sun, “Multi-Tiered On-Demand Resource Scheduling for VM-Based Data Center”( 9th  IEEE/ACM International Symposium on Cluster Computing and the Grid, China, pp: 148–155, 2009.)


119-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Sahana S Bhandari

Paper Title:

Embedded Based Automated Student Attendance Governing System

Abstract:    In all aspects of our life, we encounter event recording applications very often. Recording of any entity be it sound, pictures, events etc. is very useful as it enables us to manipulate data to our requirements. One can exploit the full potential of the recorded information for specific user defined purposes. Keeping in mind the significance of event recorders in today’s world, we arrived at a common decision of making embedded based instrument. The major problem faced by organizations is time consumption in taking attendance. This project totally eliminates the paper work in maintaining the attendance of each student in schools, colleges or universities. This instrument is easily scalable up to 150 students in 8 different subjects. Our goal is to have electronic files containing details about each student and their attendance status. This paper will try to organize the current attendance record system that will be much quicker and save time of instructors.

Keywords:
   Baud rate, Counters, Integrated Chip, Interrupts, Microcontroller, Quartz crystal.


References:

1.       8051 microcontroller tutorial by Donal Heffernan University of Limerick May-2002
2.       Simple Microcontroller projects in c for 8051 by Dogan Ibrahim.

3.       Programming and Interfacing the 8051 Microcontroller in C and Assembly by Sencer Yeralan, P.E., Ph.D.Helen Emery Rigel Press, a Division of Rigel Corporation.

4.       Basic Tutorial for Keil Software Written by www.MicroDigitalEd.com

5.       A Simple RS232 Guide Posted on 12/12/2005 By Jon Ledbetter Updated 05/22/2007

6.       http://www.circuitstoday.com/8051-programming-tutorial-chapter-1

7.       http://ece.jagansindia.in/2011/08/how-to-write-program-for-8051-microcontro/

8.       http://www.botskool.com/user-pages/tutorials/electronics/2x16-lcd-and-4x4-keypad-interfacing-8051-assembly-language

9.       http://www.w3schools.com/default.asp

10.     http://www.mlees-robotronics.in


123-128

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Mangala K. Pai, Jayalakshmi D.S.

Paper Title:

Survey on Privacy and Data Security Issues in Cloud Computing

Abstract:    Cloud computing is a better way to run the business. Instead of running the apps by yourself, they are run on a shared data center. Cloud computing provides customers the illusion of infinite computing resources which are available from anywhere, anytime, on demand. Apart from these cloud computing is subject to privacy issues and security concerns. In this paper, we see the various types of issues in cloud computing and how to overcome that.

Keywords:
   Cloud, threats, SaaS, Paas, IaaS, DoS, XSS, BGP, SQL injection


References:

1.        Jansen, Wayne & Grance, Timothy. Guidelines on Security and Privacy    in Public Cloud Computing. National Institute of Standards and Technology, 2011.
2.        Aderemi A. Atayero, Oluwaseyi Feyisetan G., “Security Issues in Cloud Computing: The Potentials of Homomorphic Encryption”, Journal of Emerging Trends in Computing and Information Sciences, VOL. 2, NO. 10, October 2011, ISSN 2079-8407

3.        Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal, “A NewTrusted and Collaborative Agent Based Approach for Ensuring Cloud Security,” Annals of Faculty Engineering, Hunedoara International Journal of Engineering, Year 2012, ISSN 1584-2665

4.        John Harauz, Lori M. Kaufman, Bruce Potter, “Data Security in the world of cloud computing”, IEEE Compute r and Relia bility Societies.

5.        Grobauer, B.; Walloschek, T.; Stocker, E., "Understanding Cloud Computing Vulnerabilities," Security & Privacy, IEEE , vol.9, no.2, March-April 2012

6.        Jian Wang; Yan Zhao; Shuo Jiang; Jiajin Le, "Providing privacy preserving in Cloud computing," Human System Interactions (HSI), 2011, 3rd conference.

7.        Zhidong Shen; Li Li; Fei Yan; Xiaoping Wu, "Cloud Computing System Based on Trusted Computing Platform," Intelligent Computation Technology and Automation (ICICTA), International Conference on , vol.1., 2012.

8.        Zhidong Shen; Qiang Tong, "The security of cloud computing system enabled by trusted computing technology," Signal Processing Systems (ICSPS), 2011 2nd International Conference, vol.2.

9.        The NIST Definition of Cloud Computing, version 15, by Peter Mell and Tim Grance, October 7, 2009, National Institute of Standards and Technology (NIST), Information Technology Laboratory.

10.     Alexa Huth, James Cebula “The basics of cloud computing”, http://csrc.nist.gov/publications/drafts/800-145/Draft-SP-800-145_cloud-definition.pdf 

11.     Sugata Sanyal, Ajit Shelat, Amit Gupta, “new frontiers of network security: The threat within”

12.     Cong Wang, Qian Wang, Kui Ren, and Wenjing Lou, “Ensuring Data Storage Security in Cloud Computing,” 17th International workshop on Quality of Service, USA, pp.1-9, July 13-15, 2009, ISBN: 978-1-4244-3875-4.

13.     Wayne Jansen, Timothy Grance, “NIST Guidelines on Security and Privacy in Public Cloud Computing,” Draft special Publication 800-144, 2011.http://csrc.nist.gov/publications/drafts/800-144/Draft-SP-800 144_cloud-computing.pdf.

14.     Josh Karlin, Stephanie Forrest, Jennifer Rexford, “Autonomous Security for Autonomous Systems,” Proc. Of Complex Computer and Communication Networks; vol. 52, issue. 15, pp. 2908- 2923, Elsevier,NY,USA,2008


129-134

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Vishwanath V.H., S. J. Sanjay and V. B. Math

Paper Title:

Thermal Analysis of A6061-Boron/Silicon Carbide Composite for In-plane Transverse Loading

Abstract:    A structural composite is a material system consisting of two or more phases on a macroscopic scale, whose mechanical performance and properties are designed to be superior to those of constituent materials acting independently. FRP composites are slowly emerging from the realm of advanced materials and are replacing conventional materials in a variety of applications. However, the mechanics of fiber-reinforced composites is complex owing to their anisotropic and heterogeneous characteristics. In this  paper,  the micromechanical  behavior of the  square  unit cell  of  a  fiber reinforced  composite  lamina consisting of   boron and Silicon Carbide fibers embedded  in Alumina matrix, has  been studied. A  three-dimensional finite  element model  with governing boundary conditions has  been developed from the unit cells  of square pattern  of the  composite to predict the  Thermal Gradient  and  Thermal Flux of A6061-Boron /  Silicon Carbide fiber reinforced  lamina  for various volume  Fraction . A finite element model incorporating the necessary boundary conditions is developed and is solved using commercially available FEA package to evaluate the Thermal properties. The variations of the Temperature at the fiber- matrix interface with respect to the Thermal Gradient & Thermal Flux are studied. This may result in the separation of fiber and matrix leading to deboning. This analysis is useful to realize the advantages of A6061-Boron / Silicon Carbide composites in structural applications, and to identify the locations with reasons where the Temperature is critical to damage the interface.  The present analysis is useful to identify the composite effect in selecting the materials for reasonable properties.

Keywords:
   Finite element method, FRP, Micro-mechanics, Model, Temperature.


References:

1.        Issac M. Daniel and Ori Ishai, “Engineering Mechanics of Composite Materials”. Oxford university press. 1994.
2.        C.T. Sun and R.S. Vaidya, “Prediction of Composite Properties from a Representative Volume Element”. Composites Science and Technology Vol.56, 1996, pp.171-179.

3.        S.T. Pericles, G.E. Stavroulakis and P.D. Pnagiotopoulos, “Calculation of Effective Transverse Elastic Moduli of Fiber-reinforced Composites by Numerical Homogenization”. Composites Science and Technology Vol.57, 1997, pp. 573-586.

4.        K. Sivaji Babua, K. Mohana Raob, V. Rama Chandra Rajuc, V. Bala Krishna Murthyd and M.S.R Niranjan Kumarea,“Micromechanical analysis of FRP hybrid composite lamina for in-plane transverse loading”. Indian Journal of Engineering & Materials Sciences Vol. 15, October 2008, pp. 382-390.

5.        ANSYS Reference Manuals, 2010.


135-137

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

N.Muthuvairavan Pillai, J.George Chellin Chandran

Paper Title:

EESRBM: Energy Efficient Stateless Receiver Based Multicast Protocol for Ad Hoc Networks

Abstract:    Multicast routing is used to send the information or message to a group of destination nodes simultaneously in a single transmission from the source. Multicast routing protocols typically rely on the priori creation of a multicast tree (or mesh), which requires the individual nodes to maintain state information. This multicast state maintenance adds a large amount of communication, processing and memory overhead for no benefit to the application. Hence a stateless receiver-based multicast (RBMuticast) protocol was developed that simply uses a list of the multicast member’s addresses, embedded in packet headers to enable receivers to decide the best way to forward the multicast traffic. Nodes in Mobile Ad-hoc Networks (MANETs) are battery powered and hence have limited life time. This RBMuticast does not consider the energy of the nodes and hence a node may die due to its excessive utilization which can result in energy depletion problem and thereby affect overall network performance. This also makes the communication living time to decrease and communication cost to increase. Thus I have developed a stateless multicast protocol called “Energy Efficient Stateless RBMuticast protocol for Ad Hoc Networks”. This protocol called EESRBM considers a hop with energy saving such that it holds low transmitting receiving costs and thereby selecting a long-lived path from source to destination. This protocol is more efficient than any of the existing multicast protocols.

Keywords:
   Mobile ad hoc networks, multicast routing, stateless, receiver-based communication, energy-efficiency.


References:

1.       S.-J. Lee, M. Gerla, and C.-C. Chiang, “On-Demand Multicast Routing Protocol,” Proc IEEE Wireless Comm. And Networking Conf. (WCNC ’99), vol. 3, pp. 1298-1302, 1999.
2.       Okura, T. Ihara, and A. Miura, “BAM: Branch Aggregation Multicast for Wireless Sensor Networks,” Proc. IEEE Int’l Conf. Mobile Adhoc and Sensor Systems Conf., p. 363, Nov. 2005.

3.       C.-C. Chiang, M. Gerla, and L. Zhang, “Shared Tree Wireless Network Multicast,” Proc. Sixth Int’l Conf. Computer Comm. And Networks, pp. 28-33, Sept. 1997.

4.       J. Garcia-Luna-Aceves and E. Madruga, “A Multicast Routing Protocol for Ad-Hoc Networks,” Proc. IEEE INFOCOM, vol. 2, pp. 784-792, Mar. 1999.

5.       Deying Li, Qin Liu , Xiaodong Hu , Xiaohua Jia,” Energy efficient multicast routing in ad hoc wireless networks”, Computer Communications 30 (2007) 3746–3756.

6.       C.-H.Feng,Y.Zhang,.Demirko and W.B.Heinzeman, ”Stateess Multicast Protocol for Ad Hoc Networks”, IEEE Mobile Computing , Vo.11, no.2, Feb 2012.


138-142

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Ting Yee Lim, Ahamad Tajudin Khader

Paper Title:

Monogamous Pairs Genetic Algorithm (MopGA)

Abstract:    As the race in producing better Genetic Algorithms (GAs) to alleviate the notorious premature convergence problems heats on, the danger of overly complex solutions, ignoring the practicality and feasibility of basic algorithms continues in some researches. In this paper, we propose a new variant of GA with decent complexity without loosing the search power. Our approach is inspired by the monogamous behavior observed in nature. The efficacy of MopGA is verified on nine benchmark numerical test functions. The results are mostly comparable to standard GA and even achieve better overall average reliability and speed.

Keywords:
   Genetic algorithm, monogamy, numerical function optimization


References:

1.        B. Hatchwell, A. Russell, D. Ross, and M. Fowlie, "Divorce in cooperatively breeding long–tailed tits: a consequence of inbreeding avoidance?," Proceedings of the Royal Society of London. Series B: Biological Sciences, vol. 267, pp. 813-819, 2000.
2.        R. G. Oldfield and H. A. Hofmann, "Neuropeptide regulation of social behavior in a monogamous cichlid fish," Physiology & Behavior, vol. 102, pp. 296-303, 2011.

3.        K. A. Young, K. L. Gobrogge, Y. Liu, and Z. Wang, "The neurobiology of pair bonding: insights from a socially monogamous rodent," Frontiers in neuroendocrinology, vol. 32, pp. 53-69, 2011.

4.        S. T. Leu, P. M. Kappeler, and C. M. Bull, "The influence of refuge sharing on social behaviour in the lizard Tiliqua rugosa," Behavioral ecology and sociobiology, vol. 65, pp. 837-847, 2011.

5.        Y. Sakurai, K. Takada, N. Tsukamoto, T. Onoyama, R. Knauf, and S. Tsuruta, "Inner Random Restart Genetic Algorithm to optimize delivery schedule," in Systems Man and Cybernetics (SMC), 2010 IEEE International Conference on, 2010, pp. 263-270.

6.        Y. Sakurai, K. Takada, N. Tsukamoto, T. Onoyama, R. Knauf, and S. Tsuruta, "Backtrack and Restart Genetic Algorithm to Optimize Delivery Schedule," in Signal-Image Technology and Internet-Based Systems (SITIS), 2010 Sixth International Conference on, 2010, pp. 85-92.

7.        R. Chandrasekharam, V. Vinod, and S. Subramanian, "Genetic algorithm for test scheduling with different objectives," Integration, the VLSI Journal, vol. 17, pp. 153-161, 1994.

8.        C. Giri, D. K. R. Tipparthi, and S. Chattopadhyay, "Genetic algorithm based approach for hierarchical SOC test scheduling," 2007, pp. 141-145.

9.        C. Sai Ho and C. Hing Kai, "A Two-Level Genetic Algorithm to Determine Production Frequencies for Economic Lot Scheduling Problem," Industrial Electronics, IEEE Transactions on, vol. 59, pp. 611-619, 2012.

10.     N. Das, R. Sarkar, S. Basu, M. Kundu, M. Nasipuri, and D. K. Basu, "A genetic algorithm based region sampling for selection of local features in handwritten digit recognition application," Applied Soft Computing, vol. 12, pp. 1592-1606, 2012.

11.     B. Artyushenko, "Analysis of global exploration of island model genetic algorithm," 2009, pp. 280-281.

12.     Alba, Enrique, Hugo Alfonso, and Bernabé Dorronsoro, "Advanced models of cellular genetic algorithms evaluated on SAT," presented at the Proceedings of the 2005 conference on Genetic and evolutionary computation, Washington DC, USA, 2005.

13.     A.C. M. Oliveira, S. L. Ma, L. A. N. Lorena, S. Stephany, and A. J. Preto, "An Hierarchical Fair Competition Genetic Algorithm for Numerical Optimization," 2004.

14.     J. J. Hu and E. D. Goodman, "The hierarchical fair competition (HFC) model for parallel evolutionary algorithms," 2002, pp. 49-54.

15.     S. Wagner and M. Affenzeller, "SexualGA: Gender-specific selection for genetic algorithms," 2005, pp. 76-81.

16.     J. Sсnchez-Velazco and J. A. Bullinaria, "Sexual selection with competitive/co-operative operators for genetic algorithms," 2003.

17.     R. Lahoz-Beltra, G. Ochoa, and U. Aickelin, "Cheating for problem solving: a genetic algorithm with social interactions," 2009, pp. 811-818.

18.     M. Zhang, S. Zhao, and X. Wang, "A hybrid self-adaptive genetic algorithm based on sexual reproduction and Baldwin effect for global optimization," 2009, pp. 3087-3094.

19.     J. C. Culberson and U. o. A. D. o. C. Science, Genetic invariance: A new paradigm for genetic algorithm design: Citeseer, 1992.

20.     J. C. Culberson, "Mutation-crossover isomorphisms and the construction of discriminating functions," Evolutionary Computation, vol. 2, pp. 279-311, 1994.

21.     J. C. Culberson and U. o. A. D. o. C. Science, GIGA program description and operation: Citeseer, 1992.

22.     Q. Chen, Y. Zhong, and X. Zhang, "A pseudo genetic algorithm," Neural computing & applications, vol. 19, pp. 77-83, 2010.

23.     G. Schuiling, "The benefit and the doubt: why monogamy?," Journal of Psychosomatic Obstetrics & Gynecology, vol. 24, pp. 55-61, 2003.

24.     A.M. J. Anacker, T. H. Ahern, L. J. Young, and A. E. Ryabinin, "The Role of Early Life Experience and Species Differences in Alcohol Intake in Microtine Rodents," PloS one, vol. 7, p. e39753, 2012.

25.     M. U. Grüebler and B. NaefDaenzer, "Survival benefits of postfledging care: experimental approach to a critical part of avian reproductive strategies," Journal of Animal Ecology, vol. 79, pp. 334-341, 2010.

26.     S. Gandhi, D. Khan, and V. S. Solanki, "A Comparative Analysis of Selection Scheme," International Journal of Soft Computing, vol. 2, 2012.

27.     T. Jinn-Tsong, L. Tung-Kuan, and C. Jyh-Horng, "Hybrid Taguchi-genetic algorithm for global numerical optimization," Evolutionary Computation, IEEE Transactions on, vol. 8, pp. 365-377, 2004.

28.     S. T. Hsieh, T. Y. Sun, and C. C. Liu, "Potential offspring production strategies: An improved genetic algorithm for global numerical optimization," Expert Systems with Applications, vol. 36, pp. 11088-11098, 2009.

29.     X. Pan, L. Jiao, and F. Liu, "An improved multi-agent genetic algorithm for numerical optimization," Natural Computing, vol. 10, pp. 487-506, 2011.

30.     Y.-W. Shang and Y.-H. Qiu, "A Note on the Extended Rosenbrock Function," Evolutionary Computation, vol. 14, pp. 119-126, 2006/03/01 2006.

31.     Z. H. Zhan, J. Zhang, Y. Li, and H. S. H. Chung, "Adaptive particle swarm optimization," Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, vol. 39, pp. 1362-1381, 2009.

32.     D. H. Wolpert and W. G. Macready, "No free lunch theorems for optimization," Evolutionary Computation, IEEE Transactions on, vol. 1, pp. 67-82, 1997.


143-149

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Nehul J. Thakkar, Viral B. Prajapati, Shailesh M. Patel

Paper Title:

Automatic Loading & Unloading CNC turning Centre DX 200

Abstract:    Manual work on CNC is normally done. Manual loading & unloading is time consumable & require manpower. Normally workers pick the component than load into the chuck & after the completion of operation unloads the component & place at require place. So it will take time to complete the cycle. In order to reduce the cycle time automation comes into play. By using robotics we can load & unload the components, which in turn reduces the cycle time & also require less labor work. So, we compare the cycle time which takes place in manually & in automation & make the model on SOLIDWORKS. Hence we can achieve the goal to reduce the cycle time & increase the productivity.

Keywords:
   Automation, Pick & Place Unit, Loading unloading the component, Robotics.


References:

1.        Design and hybrid control of the pneumatic force-feedback system for Arm-Exoskeleton by using on/off valve Chen Ying, Zhang Jia-fan , Yang Can-jun, Niu Bin.The State Key Laboratory of Fluid Power Transmission and Control, Zhejiang University, Hangzhou 310027, PR China.
2.        Development of pick & place Robot, Mohd Hishamudin B Shaharom, University Kuala Lumpur (NOVEMBER 2011).

3.        Flexible kinematics for modular robots, K N Tarchanidis, A S Mackay and J Lucas.

4.        The structure design & kinematics of robot manipulator, Kesheng Wang & Terje K.Lien, Production Engineering Laboratory, NTH-SINTEF, N-7034 Trondheim, Norway.

5.        Mathematical modelling, simulation and experimental verification of a scara robot M. Taylan Das, L. Canan Dulger Department of Mechanical Engineering, University of Gaziantep, 27310 Gaziantep, Turkey (2005).

6.        Solidworks software

7.        ANSYS V 12.1


150-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Athman Gunda, Kiptanui Too

Paper Title:

Development of a Short Message Service (SMS) Based Online Earth Moving Equipment Catalogue

Abstract:    Earthmoving includes site preparation, excavation, embankment construction, backfilling, dredging, preparing base course, sub base, and sub grade, compaction, and road surfacing. The types of equipment used and the environmental conditions will affect the man- and machine-hours required to complete a given amount of work. Earth moving tools and equipment catalogue is essential for estimating onsite productivity and measuring project performance in earthmoving operations. This paper presents an online catalogue for earth moving operations Short Message Service (SMS), based system, developed for estimating performance of earth moving operations which will greatly assist contractors in selecting tools and equipment for earth works using SMS, making the system economical and efficient. The proposed system is programmed in c# programming language. The database is hosted on a MySQL and it uses Global system for mobile communication (GSM) to connect to a modem which in turn sends and receive short messages to and from the user. The developed system has been coded and the code request   must contain only alphanumeric characters. Real case example of SMS request is analyzed to demonstrate the features of the developed online catalogue. When applied in the earthmoving industry the system can an enviable asset to contractors and increase the overall efficiency in earthmoving operations like embankment construction, backfilling, compaction and road surfacing, just to mention but a few

Keywords:
   Earth Moving Operations (EMO), Global System for Mobile (GSM), Online Machine Catalogue (OMC), Short Message Service (SMS).


References:

1.       Communication Commission of Kenya “Report released on 9th October 2012”. Viewed on 16th January, 2012, http:www.cck.go.ke.>publication and research.
2.       Sylvia Nasambu Wasike. Analysis of ICT Policies and Regulations in the Mobile Sector in Kenya Interpretive Study of Mobile banking Service. June 2011.

3.       Putnam, C.Rose, E.Walton, R. Kolko, B., "Mobile phone users in Kyrgyzstan: A case study of identifying user requirements for diverse users," Professional Communication Conference, July 2009.
4.       A.Kukulska-Hulme and J.Traxler (Eds) (2005) Case studies, introduction and over view. In, Mobile learning: A hand book for educators and trainers.
5.       Haraldur Arnorsson. Optimizing information flow in construction site. 2012.

6.       Sonja Leskinen. “Mobile Solutions and the Construction Industry”. Is it a working combination? 2006.

7.       C# definition. “Viewed on 1st February 2013”, http:/searchwindevelopment.techtarget.com/definition/c

8.       MYSQL definition, “viewed on 2nd February 2013”, http://www.tecterms.com/definition/mysql.

9.       Christopher Chepkuto Chebon, Development of road maintenance management system for unpaved roads in Kenya, 2009.

10.     CASE “Earth moving equipments catalogue”, viewed on 26th December 2012. www.casece.com

11.     “Bulk-sms-sending-using-c-gsmcomm”, viewed on 27th December 2012, http://bytes.com/topic/c-sharp/answers/943


154-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Subin Sunny, P.Balaji

Paper Title:

The Better Optimization Technique for the Placement of DG In Order To Reduce Overall Cost of Power System

Abstract:    In a radial distribution system, the voltages at buses decrease and losses increase with increasing distance from the substation. DG can be utilized to overcome these problems. DG can deliver a portion of real and/or reactive power for reducing feeder current and thus improving both voltage profile and transmission efficiency. However, studies also shows incorrect placement of DG would lead to higher losses than the losses without DGs. This paper focuses on maximizing the net saving by minimizing the energy loss cost while considering installation and running cost of the Distributed generators. Both GA and PSO algorithms are used to find the optimal locations and sizes of DG. The obtained results are discussed and compared to each other. The proposed method is programmed and tested in a 33 bus distribution system using MATLAB software. For load flow analysis of the distribution network, forward backward sweep algorithm is used.

Keywords:
   Voltage Profile Improvement, Genetic Algorithm, Particle Swarm Optimization, Distribution Generators, Forward/Backward Sweep Algorithm.


References:

1.       G. Pepermans, J. Driesen, D. Haeseldonckx, R. Belmans and W.D.haeseleer, 2005. “Distributed Generation: Definition, Benefits and Issues”, Energy Policy, 33: 787-798.
2.       W. El-Khattam, and M.M.A. Salama, “Distributed Generation Technologies, Definitions and Benefits”, Electric Power Systems Research. 71, pp.119–128, 2004.

3.       S. Ghosh , S.P. Ghoshal and S. Ghosh, “Optimal sizing and placement of DG in network system”, International Journal of Electrical Power and Energy Systems. 2010, 32 (8): 849-856.

4.       C´UrcˇIc´ S., Strbac G. and Zhang X.-P.: “Effect of losses in design of distribution circuits, IEE Proc., Gener. Transm. Distrib, 2001, 148, pp. 343–349.

5.       Singh RK and Goswami SK. “Optimum allocation of distributed generations based on nodal pricing for profit, loss reduction, and voltage improvement including voltage rise issue,” Electrical Power Energy System 2010; 32:637–44.

6.       K. Varesi, “Optimal Allocation of DG Units for Power Loss Reduction and Voltage Profile Improvement of Distribution Networks using PSO Algorithm,” World Academy of Science, Engineering and Technology 60 2011.

7.       Sun jian, Jiang Daozhuo and Liu Zhihua, “Modified power flow algorithm of distribution network based on forward/backward sweep method,” Electric Power Automation Equipment.2004243:81-84

8.       A. A. Bagheri, A. Habibzadeh and S. M. Alizadeh, “Comparison of the Effect of Combination of Different DG Types on Loss Reduction Using APSO Algorithm,” Canadian Journal on Electrical and Electronics Engineering Vol. 2, No. 10, October 2011.

9.       Naresh A, “An analytical approach for DG allocation in primary distribution network," Electric Power and Energy Systems, pp. 669-678 (2006).

10.     Caisheng Wang and M. Hashem Nehrir, “Analytical Approaches for Optimal Placement of Distributed Generation Sources in Power Systems,” IEEE Transactions on Power Systems, Vol. 19, No. 4, pp. 2068 – 2076, November 2004.

11.     Víctor H. Méndez Quezada, Juan Rivier Abbad and Tomás Gómez San Román, “Assessment of Energy Distribution Losses for Increasing Penetration of Distributed Generation,” IEEE Transactions on Power Systems, Vol. 21, No. 2, pp. 533- 540, May 2006.

12.     W. Prommee and W. Ongsakul, “Optimal Multi- Distributed Generation Placement by Adaptive Weight Particle Swarm Optimization,” Proc. Of the IEEE International Conference on Control, Automation and Systems, pp 1663-1668, Oct. 2008.


159-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Onur Yemenici, Habib Umur

Paper Title:

Velocity, Turbulent Intensity and Pressure Measurements in Turbulent Separated and Curved Flows

Abstract:   Velocity, turbulent intensity and pressure measurements over various flow surfaces were carried out by a constant-temperature hot wire anemometer and a micro-manometer. The experiments performed over a flat plate, curved walls with a radius of 2.54 m either in concave or convex curvatures and a ribbed wall has a sequence of 7 ribs at the free stream velocity of 20 m/s encompassing turbulent flows. The results showed that the concave curvature destabilized the flow and increased turbulent intensity, contrary to the convex curvature. The presence of the ribs also caused bigger turbulent intensities and the flow separations and reattachments were determined before the first rib, between the ribs, on the first rib and behind the last rib.

Keywords:
   Flow separation, turbulent intensity, curved flow, ribbed surface


References:

1.        V.I. Terekhov and N.I. Yarygina, “Heat transfer in separated flows at high levels of free-stream turbulence”, IHTC-14 Washington DC USA, vol. 14, 2010, pp. 1-8.
2.        Y.M. Chen and K.C. Wang, “Experimental study on the forced convective flow in a channel with heated blocks in tandem”, Exp. Therm. Fluid Sci., vol. 16, 1998, pp. 286-298.

3.        D.N. Ryu, D.H. Choi and V.C. Patel, “Analysis of turbulent flow in channels roughened by two-dimensional ribs and three-dimensional blocks, Part I: Resistance”, Int. J. Heat Fluid Fl., vol.  28, 2007, pp. 1098-1111.

4.        T.J. Young and K. Vafai, “Convective flow and heat transfer in a channel containing multiple heated obstacles”, Int. J. Heat Mass Transfer, vol.  41, 1998, pp. 3279–3298.

5.        R.Wahidi, W. Chakrouni and S. Al-Fahed, “The behavior of the skin-friction coefficient of a turbulent boundary layer flow over a flat plate with differently configured transverse square grooves”, Exp. Therm. Fluid Sci., vol. 30, 2005, pp. 141-152.

6.        M. Agelinchaab and M.F. Tachie, “PIV study of separated and reattached open channel flow over surface mounted blocks”, ASME J. Fluid. Eng., vol.  130, (2008) 1-9.

7.        J. Cui, V.C. Patel and C.-L. Lin, “Large-eddy simulation of turbulent flow in a channel with rib roughness”, Int. J. Heat Fluid Fl., vol. 24, 2003, pp. 372–388.

8.        V.I. Terekhov, N.I. Yarygina and R.F. Zhdanov, “Heat transfer in turbulent separated flows in the presence of high free-stream turbulence”, Int. J. Heat Mass Tran., vol. 46, 2003, pp. 4535–4551.

9.        Y. Miyake, K. Tsujimoto and M. Nakaji, “Direct numerical simulation of rough-wall heat transfer in a turbulent channel flow”, Int. J. Heat Fluid Flow, vol.22, (2001) 237–244.

10.     R.J. Volino and T.W. Simon, “Boundary layer transition under high free-stream turbulence and strong acceleration conditions: Part 2-Turbulent transport
results”, J. Heat Transfer-Transactions ASME, vol. 119, 1997, pp. 427–432.

11.     D. Zhou and T. Wang, “Combined effects of elevated free-stream turbulence and streamwise acceleration on flow and thermal structures in transitional boundary layers”, Exp. Thermal Fluid Sci., vol. 12, 1996, pp. 338–351.

12.     M.D. Kestoras and T.W. Simon, “Turbulent transport measurements in a heated boundary layer: combined effects of freestream turbulence and removal of concave curvature”, J. Heat Transfer-Transactions ASME, vol. 119, 1997, pp. 413–419.

13.     R.E. Mayle, M.I. Blair and F.G. Kopper, “Turbulent boundary layer heat transfer on curved surfaces”, J. Heat Transfer-Transactions ASME, vol. 101, 1979,  pp. 521–525.

14.     H. Umur, “Concave wall heat transfer characteristics with longitudinal pressure gradients and discrete wall jets”, JSME Int. J., vol. 37, 1994, pp. 403–412.

15.     D.H. Zhang, S.H. Winoto and Y.T. Chew, “Measurement in laminar and transitional boundary-layer flows on concave surface”, Int. J. Heat Fluid Flow, vol. 16, 1995, pp. 88–98.

16.     K.C. Muck, P.H. Hoffman, and P. Bradshaw, “The effect of convex surface curvature on turbulent boundary layers”, J. Fluid Mech., vol. 161, 1985, pp. 347–369.

17.     S.J. Kline and F.A. McClintock, “Describing uncertainties in single sample experiments”, Mech. Eng., vol. 75, 1953, pp. 3–8.

18.     Z. Zhaoshun, H. Weidong and S. Hua, “Particle tracking method for measurements of turbulence properties in a curved channel”, Applied Scientific Research, vol. 51, 1993, pp. 249-254.

19.     K. Nozawa and T. Tamura, “Large eddy simulation of the flow around a low-rise building immersed in a rough-wall turbulent boundary layer”, J. Wind Eng. Ind. Aerodyn. , vol. 90, 2002, pp. 1151–1162.


163-166

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Garima Vyas, Barkha Kumari

Paper Title:

Speaker Recognition System Based On MFCC and DCT

Abstract:    This paper examines and presents an approach to the recognition of speech signal using frequency spectral information with Mel frequency. It is a dominant feature for speech recognition.  Mel-frequency cepstral coefficients (MFCCs) are the coefficients that collectively represent the short-term power spectrum of a sound, based on a linear cosine transform of a log power spectrum on a non linear mel scale of frequency. The performance of MFCC is affected by the number of filters, the shape of filters, the way that filters are spaced, and the way that the power spectrum is warped. In this paper the optimum values of above parameters are chosen to get an efficiency of  99.5 % over a very small length of audio file.

Keywords:
   Speech recognition, Feature extraction, Feature Matching, DCT, MFCCs


References:

1.     Md Sahidullah, and Goutam Saha, “A Novel Windowing Technique for Efficient Computation of MFCC for Speaker Recognition” IEEE signal processing letters, vol. 20, no. 2, 2013, pp 149-153.
2.     A.S.Bhalerao and V.B.Malode, “Implementation of Automatic Speaker Recognition on TMS320C6713 Using MFCC”, 2013 International Conference on Computer Communication and Informatics (ICCCI -2013), Coimbatore, India, 2013, pp 1-4.

3.     Genevieve I. Sapijaszko and Wasfy B. Mikhael, “An Overview of Recent Window Based Feature Extraction Algorithms for Speaker Recognition” IEEE signal processing letters, vol. 12, 2012, pp 880-884.

4.     R. Rajalakshmi and A. Revathy, “Comparison of MFCC and PLP in Speaker Identification using GMM” International Conference on Computing and Control
Engineering (ICCCE 2012), Coimbatore , 2012, pp 110-114.

5.     Xinhui Zhou, Daniel Garcia-Romero, Ramani Duraiswami, Carol Espy-Wilson, Shihab Shamma, “Linear versus Mel Frequency Cepstral Coefficients for Speaker Recognition” IEEE signal processing letters, Maryland ,vol.12, 2011, pp 80-84.

6.     Ibrahim Patel,  Dr. Y. Srinivas Rao, “Speech Recognition Using HMM with MFCC- an Analysis Using Frequency Spectral Decomposition Technique” Signal & Image Processing : An International Journal,  Vol.1, No.2, 2010, pp 101-110.


167-169

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Sarthak Singh, Sakshi Singh, Jitesh Kumar, Ankit Bajpai

Paper Title:

Declined Rectangular Slotted Microstrip Patch Antenna for Wi-Max and S-Band Application

Abstract:    Low cost high performance antenna is required   in communication services in areas such  as wi-fi, wimax, microwave application , Ethernet etc. The electromagnetic simulation of the proposed  antenna has been carried out using IE3D  software which work on principle of Method of Moment. Return loss, VSWR, antenna efficiency and radiation pattern etc can be evaluated for given design.

Keywords:
   Declined rectangularslot  microstrip patch antenna for 3.5 GHz, return loss  VSWR, antenna efficiency.


References:

1.        M. K. Verma, Sapna Verma, and D. C. Dhubkarya, "Analysis and Designing of E-Shape Microstrip Patch Antenna for the Wireless Communication Systems", International Conference on Emerging Trends in Electronic and Photonic Devices & Systems (ELECTRO-2009), 2009.
2.        Arny Adila Salwa Ali and Sharlene Thiagarajah, "A Review on MIMO Antennas Employing Diversity Techniques".Proceedings of the International Conference on Electrical Engineering and Informatics Institut Teknologi Bandung, Indonesia June 17-19, 2007.

3.        Ramesh Gerg, Prakash Bhartia, Indar Bhal & Apisak Ittipiboon, "Microstrip Antenna Design Handbook", Artech House, London, 2001.

4.        Sonali Jain, Prof. Rajesh Nema, " Review Paperfor Circular Microstrip Patch Antenna" International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.

5.        Nasimuddin and Z. N. Chen, "Wideband multilayered microstrip antennas fed by coplanar waveguide-loop with and without via combinations," IET Microw. Antennas Propag., vol. 3, pp. 85-91, 2009.

6.        J. S. Colburn and Y. Rahmat-Samii, "Patch antennas on externally perforated high dielectric constant Substrates IEEE Trans. Antennas Propag.,, vol. 47, no. 12, pp 1785-1794, 1999.

7.        Kuo, Y. L. and K. L. Wong, Printed double- T monopole antenna for 2.4/5.2 GHz dual-band WLAN operations," IEEE Trans. Antennas Propag., Vol. 51, No. 9, 2187-2192.

8.        Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

9.        Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/

10.     C. A. Balanis, "Antenna Theory, Analysis and Design," John Wiley & Sons, New York, 1997.


170-172

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Parul Saxena, Lokendra Kumar

Paper Title:

A Study of the Effect of Magnetic Field on the Transport of Cargos through Nuclear Pore Complex

Abstract:    Nuclear pore complex is the largest type of macromolecular complex in the cell. In spite of their large size and complex structure NPC undergo complete breakdown and reformation at cell division. NPCs allow the transport of water soluble molecules across the nuclear envelope and can actively conduct 1000 translocations per complex per second. Small particles are able to pass through the nuclear pore complex by passive diffusion but larger particles are also able to pass through the large diameter of the pore but atmost negligible rates. Over the past few years there has been an increasing interest in the pore complex. The current challenge is to understand the effect of magnetic field and permeability on the transport of cargos from NPC using Mathematical model. For this purpose we have used bvp4c tool in Matlab. It is observed that magnetic field enhances the transport of cargos through NPC, which can be used in the cell based diseases.

Keywords:
   Nuclear Pore Complex, Magnetic field. Mathematics Subject Classification: 76Zxx


References:

1.        T. D. Allen, J. M. Cronshaw, S. Bagley, E. Kiseleya, M. W. Goldberg, 2000, The nuclear pore complex: mediator of translocation between nucleus and cytoplasm, Jour. of cell Sci., 113, pp. 1651- 1659.
2.        A.Becskei, L. W. Mattaj, 2003, The strategy for coupling the Ran GTP gradient to nuclear protein export, PNAS, 100(4), pp. 1717-1722.

3.        C.M. Feldherr, D. Akin, 1995, Nuclear transport as a function of cellular activity, Membr. Prot. Trans. 2, pp. 237-259.

4.        C.M. Feldherr, D.Akin, 1999, Signal mediated transport in the amoeba, J.Cell Sci. 112, pp. 2043-2048.

5.        B. Fontoura, G. Blobel, M. J. Matunis, 1999, A conserved biogenesis pathway for nucleoporins:  proteolytic processing of a 186kDa precursor generates Nup98 and the novel nucleoporin, Nup96. J. Cell Biol. 144, pp. 1097-1112.

6.        M. W.Goldberg, J. M. Cronshaw, E. Kiseleya, T. D. Allen, 1999, Nuclear pore complex dynamics and transport in higher eukaryotes, Protoplasma, 209, pp. 144-156.

7.        D. Gorlich, U. Kutay, 1999, Transport between the cell nucleus and cytoplasm, Annu. Rev. Cell Dev. Biol. 15, pp. 607-660.

8.        J. E. Hinshaw, B. O. Carragher, R. A. Milligan, 1992, Architecture and design of the nuclear pore complex, Cell 69, pp.1133-1141.

9.        E. Izaurraide, I. W. Mattaj, 1992, Tansport of RNA between nucleus and cytoplasm, Semincell Biol, 3(4), pp. 279-288.

10.     J. W. Mattaj, I. Englmeier, 1998, Nucleocytoplasmic transport: the soluble phase, Annu. Rev. Biochem., 67, pp. 265-306.

11.     P. R. Michael, D. A. John, 2001, The nuclear pore complex as a Transport Machine, Jour.  Biol. Chem., 276, pp. 16593-16596.

12.     S. Nakielny, G. Deryfuss, 1999, Transport of proteins and RNAs in and out of the nucleus, Cell, 99, pp. 677-690.

13.     E. M. O' Brien, D. A. Gomes, S. Sehgal, M. S. Nathanson, 2007, Hormonal regulation of Nuclear permeability, Jour. of Biol. Chem., 282(6), pp.  4210-4217.

14.     R. Reichelt, A. Holzenburg, E. L. Jr. Buble, M. Jarnik, A. Engel , U. Aebi,1990, Correlation between structure and mass distribution of the nuclear pore complex and of distinct pore complex components, J. Cell Biol, 110, pp.883-894.

15.     L. F. Shampine, J. Kierzenka, 2000, Solving boundary value problems for ordinary differential equations in MATLAB with bvp4c (Tutorial Notes).

16.     A. C. Srivastava , P. Saxena, 2011, Torsional oscillations of a disk in a conducting fluid bounded by a porous medium under the effect of transverse magnetic field, Jour. Porous Media, 14 (7), pp. 607-614.


173-178

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Minal N. Chavhan, S.O.Rajankar

Paper Title:

Study the Effects of Encryption on Compressive Sensed Data

Abstract:    Today’s technological era is highly dominated by data transfer. Since confidential data is transmitted over risky media like internet, faithful data transfer is now accompanied with secure data transfer. Security is the need of the hour. Here, a new and relatively simple encryption algorithm is proposed which shuffles the elements. It randomizes the data. But this algorithm is applied on compressed sensed data which inherently has encryption properties. A study of the security of this additional encryption algorithm over the compressed sensed data is done and observed the objective quality of the recovered data in presence of noise.

Keywords:
   compressive sensing, faithful data transfer, objective quality, security


References:

1.       Mohammad Ali Bani Younes and Aman Jantan, “Image Encryption Using Block-Based Transformation Algorithm”,IAENG International Journal of Computer Science, 35:1, IJCS_35_1_03.
2.       Krikor L., Baba S., Arif T., and Shaaban Z., “Image Encryption Using DCT and Stream Cipher”, European Journal of Scientific Research, vol. 32, no. 1, pp. 47-57, 2009.

3.       Yahya A. and Abdalla A., “A Shuffle Image-Encryption Algorithm”, Journal of ComputerScience, vol. 4, no.12, pp. 999-1002, 2008.

4.       Jayant Kushwaha, Bhola Nath Roy, “Secure Image Data by Double encryption”, International Journal of Computer Applications (0975 – 8887),Volume 5– No.10, August 2010.

5.       Sanil Fulani, Dr. K.R. Rao.,“Compressive Sensing of Image and Application to Communication Channel Coding.”

6.       Adem Orsdemir, H. OktayAltun, Gaurav Sharma, Mark F. Bocko, “On the Security and Robustness of Encryption via Compressed Sensing”, 978-1-4244-2677-5/08/$25.00 © 2008 IEEE.

7.       Emmanuel J. Candès, Justin Romberg, Terrance Tao, “Stable Signal Recovery from Incomplete and Inaccurate Measurements,” Communications on Pure and Applied Mathematics, Vol. LIX, 1207–1223 (2006) ©2006 Wiley Periodicals, Inc.

8.       Donoho D., “Compressed sensing”, IEEE Transactions on Information Theory, 52, 4 (Apr.2006), 1289—1306.

9.       Emmanuel J. Candès, Michael B. Wakin, “Compressive sampling ppt”.

10.     Emmanuel J. Candès, Justin Romberg, “Robust Uncertainty Principles: Exact Signal Reconstruction From Highly Incomplete Frequency Information”, IEEE transactions on information theory, vol. 52, no. 2, february 2006

11.     Justin Romberg, “Variational Methods for Compressive Sampling”, Electrical and Computer Engineering, Georgia Tech, Atlanta, GA.

12.     Emmanuel Candes and Terence Tao, “Near Optimal Signal Recovery From Random Projections: Universal Encoding Strategies”, IEEE Trans. Inform. Theory, submitted. Ar Xiv: math.CA/0410542,October 2004.

13.     Heung-No Lee, “Introduction to Compressed Sensing”, GIST, Korea, 2011, pp 20-26, 86-95.

14.     Stephen Boyd, Lieven Vandenberghe, Convex Optimization, Cambraidge University Press, pp. 7-10, 21, 561-570, 609- 612.

15.     Chuong B. Do, Convex Optimization Overview (cnt’d), November 29, 2009


179-182

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Jitesh Kumar,Sakshi Singh, Sarthak Singh, Arvind Gaur

Paper Title:

A Multiple Nonagon Void Slotted Rectangular Micro-Strip Patch Antenna

Abstract:    In this paper we present a proposed design for Rectangular micro-strip patch antenna by cutting multiple nonagon void shaped slots in the Rectangular patch. Using proposed antenna design and probe feeding at proper position we find the resultant return loss, VSWR and bandwidth. We are using IE3D simulation software for designing and analysis. We have observed that using slotted patch antenna and using probe feed at proper location we can get better VSWR and bandwidth.

Keywords:
   Slotted Nonagon void shaped rectangular micro-strip patch antenna, VSWR, radiation pattern.


References:

1.        Beno, D. S. Emmanuel “Diamond Shaped Symmetrical Slotted Miniaturized Microstrip Patch Antenna For Wireless Applications “Journal of Theoretical And Applied Information Technology (Jatit) , 31st January 2013. Vol. 47 No.3 , Issn: 1992-8645 E-Issn: 1817-3195.
2.        Alka Verma “Analysis And Design of E Shaped Patch Antenna In X Band” International Journal of Advanced Engineering Technology (Ijaet) E-Issn 0976-3945.

3.        Adil Hameed Ahmad and Basim Khalaf Jaralla,„Design and Simulation of Broadband Rectangular Microstrip Antenna, Eng. Tech. V0l.26,No1. 2008.

4.        Fan Yang, Xui-Xia Zhang, Xioning Ye, and Yahya Rahmat-Sami, “Wideband E-shaped Patch Antenna for Wireless Communications,” IEEE Transactions on Antennas and Propagation, vol. 49, no.7, July 2001.

5.        Sonali Jain, Prof. Rajesh Nema, “ Review Paperfor Circular Microstrip Patch Antenna” International Journal of Computer Technology and Electronics Engineering (IJCTEE) Volume 1, Issue 3, ISSN 2249-6343.

6.        Nasimuddin and Z. N. Chen, “Wideband multilayered microstrip antennas fed by coplanar waveguide-loop with and without via combinations,” IET Microw. Antennas Propag., vol. 3, pp. 85–91, 2009.

7.        S. K. Oh, H. S. Yoon, and S. O. Park, “A PIFA-type varactor-tunable slim antenna with a PIL patch feed for multiband applications,” IEEE Antennas Wireless
Propag. Lett., vol. 6, pp. 103–105, 2007.

8.        Garima, D.Bhatnagar, J.S.Saini, V. K. Saxena and L. M. Joshi, “Design of Broadband Circular Patch Microstrip Patch Antenna with Diamond Shape Slot”, Indian
Journal of Radio and Space Physics, Vol 40, pp. 275-281, October 2011.

9.        Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

10.     Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/

11.     C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.


183-185

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

Sakshi Singh, Jitesh Kumar, Sarthak Singh, Shalabh Gaur

Paper Title:

Design of Arrow Head Slotted Microstrip Patch Antenna for Wlan Applications

Abstract:    In recent years, great interest was focused on microstrip antennas for their small volumes, low profiles, excellent integration, low costs and good performance. With the continuous growth of wireless communication service and the constant miniaturization of communication equipment, there are higher and higher demands for the volume of antennas, integration and working band. This paper presents a single layer arrow head slotted microstrip patch antenna is thoroughly simulated for wireless communications system application which are suitable for the 3.5GHz operations. A constant circular radiation pattern, for an operating frequency of 3.5GHz can be easily achieved. Configuration of an antenna is easy to design. Different parameters like VSWR which is 1.5 at 3.5GHz, gain, radiation pattern in 2D & 3D are simulated using IE3D. This type of proposed patch can be used for various applications in S band.

Keywords:
   Micro-strip patch antenna, Radiation pattern,Gain,  Circular polarization, VSWR, Return Loss.


References:

1.        Ram Singh Kushwaha , D.K.Srivastava , J.P.Saini ” A Design of H-shape Slot loaded Wideband Microstrip Patch Antenna” International Journal of Electronics and Computer Science Engineering (IJECSE), ISSN-2277-1956/V1N2-533-537.
2.        Ramadan, A., K. Y. Kabalan, A. El-Hajj, S. Khoury, and M. Al- usseini, “A reconfigurable U-Koch microstrip antenna for wireless applications," Progress In
Electromagnetics Research, PIER 93, 355-367, 2009.

3.        Md. Mahabub Alam, Rifat Ahmmed Aoni, Md. Toufikul Islam ” Gain Improvement of Micro Strip Antenna Using Dual Patch Array Micro Strip Antenna” Journal of Emerging Trends in Computing and Information Sciences , VOL. 3, NO.12 Dec, 2012 ISSN 2079-8407

4.        Mayank Dwivedi1, Vinod Kumar Singh2, Mandeep singh Saini “Compact Dual Band Slotted Microstrip Antenna for IEEE802.11b Applications” International Journalof Advanced Research in  Computer Science and Software Engineering(IJARCSSE)” Volume 2, Issue 10, October 2012 ISSN: 2277 128X

5.        Mohammad A. A. Subhi H. Ahmad A. K. and Juma S. M. “Cavity model analysis of rectangular microstrip antenna operating in TM03 mode”, IEEE proc. pp. 0-2218-2223, 2006..

6.        K. L. Wong and W. H. Hsu, “A broadband rectangular patch antenna with a pair of wide slits,” IEEE Transactions on Antennas and Propagation, vol. 49, pp. 1345-1347,September 2001.

7.        Balanis, C.A., Advanced Engineering Electromagnetics, John Wiley & Sons, New York, 1989.

8.        C. J. Prior and P. S. Hall, “Micro strip disk antenna with short-circuited annular ring”,Electronics Letters, Vol.21, pp. 719-721, 1985.

9.        Vinod K. Singh, Zakir Ali, “Dual Band U- shaped microstrip antenna for wireless Communication” International Journal of Engineering Science Technology, India, VOL 2 (6), pp 1623-1628, June,2010.

10.     Zeland Software Inc. IE3D: MoM-Based EM Simulator. Web: http://www.zeland.com/


186-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Bhupendra Panchal, R.K.Kapoor

Paper Title:

Performance Enhancement of Cloud Computing with Clustering

Abstract:    Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it provides distribution of computing resources. This distribution results in cost and energy reduction, thus making efficient utilization of physical resources. Thus resource sharing and use of virtualization allows improved performance for demanding scientific computing workloads. Number of data centers and physical servers are underutilized so they are used inefficiently. So performance evaluation and its enhancement in virtualized environment like public and private cloud are the challenging issues. Performance of cloud environment is dependent on CPU & memory utilization, Network and I/O disk operations. In order to improve the performance of the virtualization with cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus replicas are available at each data centers and are highly available. In the proposed work, the I/O parameters are chosen for increasing the performance in this domain. This enhancement can be achieved through the clustering and caching technologies. The use of technology for data centers clustering is proposed in this paper. Thus performance and scalability can be improved by reducing the number of hits to the cloud database.

Keywords:
   Virtualization, cloud computing, clustering, performance enhancement, caching.


References:

1.        G. Malathy, Rm. Somasundaram, “Performance Enhancement in Cloud Computing using Reservation Cluster”, European Journal of Scientific Research, ISSN 1450-216X Vol. 86 No 3 September, 2012, pp.394-401
2.        Donglai Zhang, Paul Coddington and Andrew Wendelborn,” Improving Data Transfer Performance of Web Service Workflows in the Cloud Environment”, Int. J. Computational Science and Engineering, Vol. 1, No. 1/1, 2012

3.        Wei Huang , Jiuxing Liu, Bulent Abali and  Dhabaleswar K. Panda, “A Case for High Performance Computing with Virtual Machines”, ICS ’06 Proceedings of the 20th annual international conference on supercomputing, pages 125-134

4.        C. Pelletingeas, “Performance Evaluation of Virtualization with Cloud Computing”, MSc Advanced Networking, 2010

5.        Alexandru Iosup, Simon Ostermann, M. Nezih Yigitbasi, “Performance Analysis of Cloud Computing Services for Many-Tasks Scientific Computing”, IEEE Transaction on parallel and distributed system, VOL. 22, NO. 6, JUNE 2011

6.        Mattias Sunding, Maximizing Virtual Machine Performance, vkernel corporation, A Quest Software Company, http://www.vkernel.com

7.        Devarshi Ghosal, R.Shane Canon and Lavanya Ramakrishnan,”I/O Performance of Virtualized Cloud Enviornment”

8.        Joyent White paper, Performance and scale in cloud computing

9.        Nikolaus Huber, Marcel von Quast, Micahal Hauck and Samuel Konev, “Evaluating and Modeling Virtualization Performance Overhead for Cloud Enviornments”

10.     A. Mahendiran, N. Saravanan, N. Venkata Subramanian and N. Sairam, “Implementation of K-Means Clustering in Cloud Computing Environment” , Research Journal of Applied Sciences, Engineering and Technology 4(10): 1391-1394, 2012 ISSN: 2040-7467

11.     Michael Shindler,  Alex Wong and , and Adam Meyerson “Fast and Accurate k-means For Large Datasets”

12.     P. Ashok, Dr. G.M Kadhar Nawaz, E.Elayaraja and V. Vadivel, “Improved Performance of Unsupervised Method by Renovated K-Means”

13.     Karedla, R., Love, J.S. and Wherry,B.G.,”Caching strategies to improve disk system performance”,IEEE computer Society, VOL. 27, March 1994

14.     Q. Luo, J.F.Naughton, R.Krishnamurthy, Pei Cao and Yunrui Li,”Active Query Caching for Database Web Servers”, WebDB 2000, LNCS 1997, pp. 92-104, 2001


189-191

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Er. Jagdish Patil, Er. Pratik Gite, Sanjay Thakur

Paper Title:

Optimal Anycast Technique for Delay-Sensitive Energy-Constrained Asynchronous Sensor Networks

Abstract:    In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. This observation was previously exploited by opportunistic routing protocols, by using single-path routing metrics to assign to each node a group of candidate relays for a particular destination. This paper addresses the least-cost anypath routing (LCAR) problem: how to assign a set of candidate relays at each node for a given destination such that the expected cost of forwarding a packet to the destination is minimized. The key is the following tradeoff: on one hand, increasing the number of candidate relays decreases the forwarding cost, but on the other, it increases the likelihood of “veering” away from the shortest-path route. Prior proposals based on single-path routing metrics or geographic coordinates do not explicitly consider this tradeoff, and a s aresult do not always make optimal choices. The LCAR algorithm and its framework are general and an be applied to a variety of networks and cost models. We show how LCAR can incorporate different aspects of underlying coordination protocols, for example a link-layer protocol that randomly selects which receiving node will forward a packet, or the possibility that multiple nodes mistakenly forward a packet. In either case, the LCAR algorithm finds the optimal choice of candidate relays that takes into account these properties of the link layer. Finally, we apply LCAR to low-power, low-rate wireless communication and introduce a new wireless link-layer technique to decrease energy transmission costs in conjunction with anypath routing. Simulations show significant reductions in transmission cost to opportunistic routing using single-path metrics. Furthermore LCAR routes are more robust and stable than those based on single-path distances, due to the integrative nature of the LCAR’s route cost metric.

Keywords:
   Ad-hoc, MANET, Cooperative Caching


References:

1.        Thomas   Clausen   and   Philippe  Jacquet,   Optimized   Link  State   Routing   Protocol (OLSR),  IETF  RFC 3626, Oct.  2003,Available:http://www.ietf.org/rfc/rfc3626.txt [Accessed Sept. 17, 2009].
2.        UniK OLSR daemon software, http://www.olsr.org/[Accessed Sept. 16,2009].

3.        Implementing  a fully distributedcertificate authority in an OLSR MANET Dhillon, D. (RSA Security Inc., Vancouver,  BC, Canada);  Randhawa,  T.S. Wang,  M. Lamont,  L. Source: 2004 IEEE  Wireless Communications  and Networking Conference (IEEE  Cat. No.04TH8733), p 682-8 Vol.2, 2004

4.        Thomas  Aure,  Metric-based  routing  framework and  radio-aware shortest  path  selec- tion  for OLSR,  May 2008, Available:  http://www.velocitynetworks.org/olsr/master-thomasau.pdf  [Accessed Sept. 16, 2009].

5.        MF-OLSR implementation, Available: http://www.velocitynetworks.org/olsr/eolsrd-0.5.zip [Accessed Sept. 16, 2009].

6.        Multimetric  OLSR and ETT,  A. Lav´en, P. Hj¨artquist, 5th OLSR Interop & Workshop, October 2-4, 2009 in Vienna, Austria

7.        Net-X webpage, http://www.crhc.illinois.edu/wireless/netx.html  [Accessed Sept.  16,2009].

8.        Pradeep Kyasanur, Capabilities,     August  2006.   

9.        P. Kyasanur  and  N.  Vaidya,  ”Routing  and  Link-layer  Protocols  for Multi-Channel  Multi-Interface Ad Hoc Wireless Networks” Source: ACM SIGMOBILE  Mobile Computing and Communications Review , Issue 1 (January 2006), p 31 - 43 Vol.10, 2006

10.     Implementing the expected transmission time metric for OLSR wireless mesh networks Esposito, P.M. (Grupo de Teleinformatica Automacao PEE/COPPE - DEL/POLI, Univ.  Fed.do Rio de Janeiro, Rio de Janeiro,Brazil);  Campista,   M. Moraes, I.M. Costa,  L. Duarte,  O. Rubinstein, M.G. Source:  2008 1st IFIP  Wireless
Days, p 5 pp.,2008

11.     A high-throughput path metric for multi-hop wireless routing De Couto, D.S.J. (Com- put. Sci. & Artificial Intelligence Lab., MIT, Cambridge, MA, USA); Aguayo, D. Bicket, J. Morris, R. Source:  Wireless Networks, v 11, n 4, p 419-34, 2005

12.     A channel  and  rate  assignment  algorithm  and  a layer-2.5 forwarding  paradigm  for multi-radio  wireless mesh networks Avallone, Stefano (Department  of Computer  En- gineering, University  of Naples, 80125 Naples, Italy);  Akyildiz, Ian F. Ventre,  Giorgio Source: IEEE/ACM Transactions on Networking, v 17, n 1, p 267-280, 2009

13.     Highly-resilient,  energy-efficient multipath routing  in wireless sensor networks Gane- san, D. (California Univ., Los Angeles, CA, USA); Govindan, R. Shenker, S. Estrin,  D. Source:  MOBIHOC 2001. Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing,  p 251-4, 2001

192-196

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

Er. Mittu Mittal, Er. Gagandeep Kaur

Paper Title:

Mixed Pixel Resolution by Evolutionary Algorithm: A Survey

Abstract:    Now a day’s Remote Sensing is a mature research area. Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed pixel which always degrades the image quality.  Mixed pixels are usually the biggest reason for degrading the success in image classification and object recognition. Another major problem is the decomposition of mixed pixels precisely and effectively. Remote sensing data is widely used for the classification of types of features such as vegetation, water body etc but the problem occurs in tagging appropriate class to mixed pixels. In this paper we attempted to present an approach for resolving the mixed pixels by using optimization algorithm i.e. Biogeography based optimization. The main idea is to tag the mixed pixel to a particular class by finding the best suitable class for it using the BBO parameters i.e. Migration and Mutation.

Keywords:
   Biogeography based optimization, Evolutionary algorithms, mixed pixel, Migration, Mutation, Remote Sensing


References:

1.        Suruchi Sinha, Abhishek Bhola, V.K.Panchal, Siddhant Singhal and Ajith Abraham,” Resolving Mixed Pixels by Hybridization of Biogeography Based Optimization and Ant Colony Optimization”, WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia .
2.        V.K.Panchal and Nitish Gupta. “Swarm Intelligence For Mixed Pixel Resolution”, IEEE Geo Sciences and Remote Sensing Symposium (IGRASS), pp- 2801-2804, 2011.

3.        P. Bosdogianni ; Maria Petrou ; Josef Kittler ,” Mixed pixel classification in remote sensing” , Image and Signal Processing  for Remote Sensing Jacky Desachy Rome, Italy | September 26, 2012.

4.        A. L. Choodarathnakara, Dr. T. Ashok Kumar, Dr. Shivaprakash Koliwad, Dr. C. G. Patil ,” Mixed Pixels: A Challenge in Remote Sensing Data Classification for Improving Performance” , International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 1, Issue 9, November 2012.

5.        Lavika Goel, Daya Gupta, Vinod Panchal ,” Extended Species Abundance Models of Biogeography Based Optimization” , 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation. 2166-8531/12 $26.00 © 2012 IEEE DOI 10.1109/CIMSim.2012.30.

6.        Haiping Ma, Minrui Fei, Zhiguo Ding, Jing Jin,” Biogeography-Based Optimization with Ensemble of Migration Models for Global Numerical Optimization” , WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia.

7.        Alaa Sheta, Malik S. Braik, Sultan Aljahdali ,” Genetic Algorithms: A Tool for Image Segmentation” ,The World Islamic Science and Education (WISE) University, Amman, Jordan 978-1-4673-1520-3/12/$31.00 ©2012 IEEE.

8.        Dan Simon, Senior Member, IEEE, Mehmet Ergezer, Member, IEEE, Dawei Du, and Rick Rarick , “Markov Models for Biogeography-Based Optimization” , IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 41, and NO. 1, FEBRUARY 2011.

9.        D. Simon, “Biogeography-based optimization,IEEE Trans. Evol. Comput.,vol. 12, no. 6, pp. 702–713, Dec. 2008.

10.     Haiping Ma, Suhong Ni, and Man Sun ,” Equilibrium Species Counts and Migration Model Tradeoffs for Biogeography-Based Optimization” , Joint 48th IEEE
Conference on Decision and Control and 28th Chinese Control Conference Shanghai, P.R. China, December 16-18, 2009.

11.     Binitha S, S Siva Sathya ,” A Survey of Bio inspired Optimization Algorithms”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-2, May 2012.

12.     Anita Thengade , Rucha Dondal, “Genetic Algorithm - Survey Paper”, IJCA Journal 2012.

13.     Purshottam J. Assudani,  Latesh G. Malik ,” Genetic Algorithm Based Dot Pattern Image Processing” , IJCA Journal 2012.

197-199

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Abhishek Mathur, Trapti Agrawal

Paper Title:

A Survey: Access Patterns Mining Techniques and ACO

Abstract:    In this paper we define Web Mining as Data Mining on the web. Further we define Web Usage Mining along with its applications and tools. Overall the focus of the paper will be to present a survey of the recent developments of the past and current work in Web Usage Mining and looks at Ant Colony optimization algorithm as a clustering technique for web usage patterns. In addition, there is an attempt to provide an overview of the state of the art on ACO in WUM.

Keywords:
   Data Mining, Web Mining, Web Usage Mining, Site Customization, Ant Colony Optimization, Server Logs Data, Clustering


References:

1.        Kavita sharma, gulshan shrivastava, and vikas kumar, “Web     mining: today and tomorrow”, IEEE International conference on Electronics Computer technology 2011
2.        M. eirinaki and m. vazirgiannis , web mining for web personalization, ACM transactions on internet technology, 3(1), 2000, 1-27.

3.        hussain, t., s. asghar, et al. (2010). Web usage mining: a survey on preprocessing of web log file. IEEE, international conference on (iciet) 2010,  karachi
pakistan

4.        chhavi rana “a study of web usage mining research tools” int. j. advanced networking and applications  volume:03 issue:06 pages:1422-1429 (2012)

5.        xiangji huang, nick cercone, and aijun an. comparison of interestingness functions for learning web usage patterns, proceedings of the eleventh international
conference on information and knowledge management, pages 617–620. ACM press, 2002.
6.        s. shiu c. wong and s. pal. mining fuzzy association rules for web access case adaptation. in case-based reasoning research and development: proceedings of the fourth international conference on case-based reasoning, 2001.
7.        eleni stroulia nan niu and mohammad el-ramly. understanding web usage for dynamic web-site adaptation: a case study. in proceedings of the fourth international workshop on web site evolution (WSE’02), pages 53–64. ieee, 2002.

8.        behzad mortazavi-asl. discovering and mining user web-page traversal patterns. master’s thesis, simon fraser university, 2001.

9.        t. b. pedersen s. jespersen and j. thorhauge. a hybrid approach to web usage mining. technical report r02-5002, department of computer science aalborg university, 2002.

10.     y. xie, v.v. phoha, web user clustering from access log using belief function, in: proceedings of the first international conference on knowledge capture (k-cap 2001), ACM press, 2001, pp. 202–208.

11.     A. banerjee, j. ghosh, clickstream clustering using weighted longest common subsequences, in: proceedings of the web mining workshop at the 1st siam conference on data mining, 2001.

12.     A. hay, g. wets, k. vanhoof, clustering navigation patterns on a website using a sequence alignment method in: intelligent techniques for web personalization: ijcai 2001, 17th int. joint conf. on artificial intelligence,august 4, 2001, seattle, wa, usa, pp. 1–6.

13.     j.h. holland, adaptation in natural and artificial systems, university of michigan press, ann arbor, 1975,republished by the MIT press, 1992.

14.     o. nasraoui, f. gonzalez, d. dasgupta, the fuzzy artificial immune system: motivations, basic concepts, and application to clustering and web profiling, in: proceedings of the world congress on computational intelligence (wcci) and ieee international conference on fuzzy systems, 2002, pp. 711–716.

15.     A. ypma, t. heskes, clustering web surfers with mixtures of hidden markov models, in: proceedings of the 14th belgian–dutch conference on ai (bnaic_02),
2002.

16.     s. oyanagi, k. kubota, a. nakase, application of matrix clustering to web log analysis and access prediction,.

17.     p. berkhin, “survey clustering data mining techniques”, technical report, accrue software, san jose, california, 2002.

18.     w. bin and s. zhongzhi, “ a clustering algorithm based on swarm intelligence”, proc. of the int. conf. on info-tech. and info-net, beijing,china, 2001, pp. 58-66. sigkdd explorations newsletter, 1(2), 2000, 12-23.

19.     natheer khasawneh, chien-chung chan web usage mining using rough sets.

20.     ms. jyoti dr. a. k. sharma dr. amit goel ms. payal gulati “a novel approach for clustering web user sessions using rst”

21.     tasawar hussain, dr. sohail asghar, simon fong “a hierarchical cluster based preprocessing methodology for web usage mining”

22.     zahid ansari_, a. vinaya babuy, waseem ahmed_ and mohammad fazle azeem “a fuzzy set theoretic approach to discover user sessions from web navigational data”

23.     k.suresh, r.madanamohana, a.ramamohanreddy, a.subrmanyam “improved fcm algorithm for clustering on web usage mining”

24.     ms k.santhisree, dr. a damodaram“clique: clustering based on density on web usage data: experiments and test.

25.     ajith abraham, vitorino ramos “web usage mining using artificial ant colony clustering and linear genetic programming”@IEEE 2010

26.     h. hannah inbarani, k. thangavel “clickstream  intelligent clustering using accelerated ant colony algorith” ©2006 IEEE.

27.     kobra etminani 1 mohammad-r. akbarzadeh-t. 2 noorali raeeji anehsarikobra etminani 1 mohammad-r. akbarzadeh-t. 2 noorali raeeji yanehsari “web usage mining: users' navigational patterns extraction from web logs using ant-based clustering method” ifsa-eusflat 2009

28.     mrs. v. sujatha, dr. punithaval li  “ an approach to user navigation pattern based on ant based clustering and classification using decision trees”  @ 2010

29.     anna alphy 1, s. prabakaran “cluster optimization for improved web usage mining using ant nestmate approach”@IEEE 2011.

30.     pablo loyola, pablo e. rom´an and juan d. vel´asquez “clustering-based learning approach for ant colony optimization model to simulate web user behavior” 2011 IEEE.


200-206

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Surender Kumar Yellagoud, Munjuluri Sree Harsha, Bhamidipati Sridhar

Paper Title:

More Accurate and Fast Fault Identification on Power Networks Using Artificial Neural Networks

Abstract:    This paper is mainly on illustrating the inherent potential of artificial intelligence(AI) tools and techniques to accurately predict and detect faults at an early stage in power systems. An AI mainly monitors and predicts locus ‘n’ nature of faults at an early stage on particular sections of power systems which increase the reliability and quality of the power system. The detector for this early warning fault detection device only requires external measurements taken from the input and output nodes of the power system. The AI detection system is capable of rapidly predicting a malfunction within the system. Artificial neural networks (ANNs) are being used at the core of the fault detection. Furthermore, comments on an evolutionary technique as the optimization strategy for ANNs are included in this work.

Keywords:
   Fault detection, fault identification, fault classification, artificial neural networks, power system networks, power quality, power reliability.


References:

1.        Europe Gets into Fuzzy Logic (Electronics Engineering Times, Nov. 11, 1991).
2.        Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh, ed. R.R. Yager et al. (John Wiley, New York, 1987).

3.        "U.S. Loses Focus on Fuzzy Logic" (Machine Design, June 21, 1990).

4.        Why the Japanese are Going in for this 'Fuzzy Logic' by Emily T. Smith (Business Week, Feb. 20, 1993, pp. 39).

5.        R. R. Yager, "On Ordered Weighted Averaging Aggregation Operators in Multicriteria Decision-making," IEEE Trans. on Systems, Man and Cybernetics, vol. 18, pp. 183-190, 1988.

6.        Europe Gets into Fuzzy Logic (Electronics Engineering Times, Nov. 11, 1991).

7.        Fuzzy Sets and Applications: Selected Papers by L.A. Zadeh, ed. R.R. Yager et al. (John Wiley, New York, 1987).

8.        U.S. Loses Focus on Fuzzy Logic (Machine Design, June 21, 1990).

9.        Why the Japanese are Going in for this 'Fuzzy Logic' by Emily T. Smith (Business Week, Feb. 20, 1993, pp. 39).

10.     L. Xu, M.-Y. Chow and L. S. Taylor, "Power Distribution Fault Cause Identification with Imbalanced Data Using the Data Mining Based Fuzzy Classification E-Algorithm," IEEE Transaction on Power Systems, Feb 2007,vol.22,no.1, pp.164-171.

11.     L. Xu and M.-Y. Chow,"A classification approach for power distribution systems fault cause identification," IEEE Transactions on Power Systems, 2006, vol. 21, no. 1, pp. 53-60.

12.     Yu Yuehai, Bai Yichuan, Xi Guofi~X, u Shiming, Luo Jianbo, “Fault Analysis Expert System for Power System”, IEEE-International Conference on Power System Technology–Powercon,2004,pp. 1822-1826.

13.     Hong-Chan Chin, “Fault Section Diagnosis of Power System Using Fuzzy Logic”, IEEE Trans Power System, 2003, vol. 18, No. 1, pp. 245-250.


207-214

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

M. M. Manyuchi, A. Phiri, P. Muredzi

Paper Title:

Effect of Vermicompost, Vermiwash and Application Time on Soil Micronutrients Composition

Abstract:    Vermicomposting is increasingly becoming popular as an organic solid waste management strategy. The technology results in two bio-fertilizers, vermicompost and vermiwash. The bio-fertilizers were applied to the soil and their impact on the soil micronutrients time was quantified. A maximum of 1000g of vermicompost and vermiwash was applied over 40 days. 23 factorial designs were used to determine the effects of the bio-fertilizers and application time on the soil micronutrients. Increasing the vermicompost quantity resulted in increased soil zinc, manganese and iron content. Increased vermiwash quantities resulted in increased soil iron content but resulted in decreased copper content. Furthermore, increased application time of the two bio-fertilizers resulted in enhanced soil copper and iron content but decreased the zinc and manganese content. The loam-clay soil, organic material from the bio-fertilizers and microbial activity played a significant role in altering the soil micronutrients.

Keywords:
   Vermicompost, vermiwash, application time, soil micronutrients, bio-fertilizer


References:

1.        D. C. Jadia and M. H. Fulekar, “Vermicomposting of vegetable waste: A bio-physicochemical process based on hydro- operating bioreactor”, African Journal of Biotechnology, Vol 7 (20), pp. 3723-3730, 2008.
2.        T. Abbasi, S. Gajalakshmi and S. A. Abbasi, “Towards modelling and design of vermicomposting systems: Mechanisms of composting /vermicomposting and their implications”, Indian Journal of Biotechnology, Vol 8, pp. 177-182, 2009.
3.        A. A. Ansari and K. Sukhraj, “Effect of vermiwash and vermicompost on soil parameters and productivity of okra (abelmoschus esculentus) in Guyana”, Pakistan J. Agric Resources, Vol 23, pp. 137-142, 2010.

4.        W. Zularisam, Z. Siti Zahirah, I. Zakaria, M. M Syukri, A. Anwar and M. Sakinah, “Production of fertilizer from Vermicomposting Process of Municipal Waste”, Journal of Applied Sciences 10 (7), pp. 580-584, 2010.

5.        V. Palanichamy, B. Mitra, N. Reddy, M. Katiyar, R. B. Rajkumari, C. Ramalingam and Arangantham, “Utilizing Food Waste by Vermicomposting, Extracting Vermiwash, Castings and Increasing Relative Growth of Plants”, International Journal of Chemical and Analytical Science 2 (11), pp. 1241-1246, 2011.

6.        M. M. Manyuchi, A. Phiri, N. Chirinda, P. Muredzi, J. Govha and T. Sengudzwa, “Vermicomposting of Waste Corn Pulp Blended with Cow Dung Manure using Eisenia Fetida”, World Academy of Science, Engineering and Technology, 68, pp. 1306-1309, 2012.

7.        M. M. Manyuchi, A. Phiri, P. Muredzi and S. Boka, “Comparison of vermicompost and vermiwash bio-fertilizers from vermicomposting waste corn pulp”, World Academy of Science, Engineering and Technology (submitted for publication), 2013a

8.        M. M. Manyuchi., T. Chitambwe., P, Muredzi and Kanhukamwe, Q, “Continuous flow-through vermireactor for medium scale vermicomposting”, Asian Journal of Engineering and Technology, 1 (1), pp. 44-48, 2013b.

9.        G. Nath, K. Singh and D. K. Singh, “Chemical Analysis of Vermicomposts/Vermiwash of Different Combinations of Animal, Agro and Kitchen Wastes”, Australian Journal of Basic Applied Sciences 3 (4), pp. 3671-3676, 2009.

10.     M. Gopal, A. Gupta, C. Palaniswami, R. Dhanapal and G. V Thomas, “Coconut leaf vermiwash: a bio-liquid from coconut leaf vermicompost for improving the crop production capacities”, Current Science, Vol 98, pp. 1202-1210, 2010.

11.     Sundaravadivelan, L. Isaiarasu, M. Manimuthu, P. Kumar, T. Kuberan and J. Anburaj, “Impact analysis and confirmative study of physico-chemical, nutritional and biochemical parameters of vermiwash produced from different leaf litters by using two earthworm species”, Journal of  Agricultural Technology, Vol 7 (5) , pp. 1443-1457, 2011.

12.     K. Tharmaraj, P. Ganesh, K. Kolanjinathan, R. Suresh Kumar and A. Anandan, “Influence of vermicompost and vermiwash on physico chemical properties of rice cultivated soil”, Current Botany, Vol 2, pp. 18-21, 2011.

13.     G. Nath and K. Singh, “Effect of vermiwash of different vermicomposts on the kharif crops”, Journal of Central European Agriculture, Vol 13 (2), pp. 379-402, 2012.

14.     S. Quaik, A. Embrandiri, P. F. Rupani, R. P. Singh and M. H. Ibrahim, “Effect of vermiwash and vermicompost leachate in hydroponics culture of Indian borage (Plectranthus ambionicus) plantlets”, 11th International Annual Symposium on Sustainability Science and Management, pp. 210-214, 2012.

15.     J. Mortvedt, Mironutrients, Efficient fertilizer use manual, Mosaic, pp. 1-10.


215-218

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Surender Kumar Yellagoud, Naman Bhadula, Siddharth Sobti

Paper Title:

A Study of Power Formers and Their Impact on Power System Reliability and Environment

Abstract:    Conventional high-voltage generators are designed with voltage levels rated to maximum of 30 kV. The power grids with voltages as high as 1,100 kV cannot be directly supplied from these generators, power step-up transformers are used  to transform the generated voltage to high transmission voltage level suitable for the interface with the transmission grid. These transformers  impose significant drawbacks on the power plant as a whole - reduction in efficiency, high maintenance costs, more space, less availability, and an increased environmental impact. During the last century, a number of attempts were made at developing a high-voltage generator, the Powerformer, that could be connected directly to the power grid, without step-up transformer. When XLPE-insulated cables were introduced in the 1960s there were some initial problems with their reliability, caused by poor control of the manufacturing processes. These problems have since been overcome, and today’s high-voltage XLPE-insulated cables have an impressive track record. Therefore, the development of the Powerformer is inherently linked to the reliability and the development of the XLPE insulated cables. The powerformer has opened a new technological chapter in the generation and transmission of electrical energy. The technological advantage offered by the powerformer was studied in good detail and their impact on reliability in particular and environment in general was highlighted.

Keywords:
   Powerformers, high-voltage generators, power system reliability, power step-up transformers, conventional generator.


References:

1.       Powerformer a radically new rotating machine. ABB review 2/1998.
2.       Powerformer in thermal power plants.From ABB.Porgies-article.

3.       The Tension Rises at Porsi. From ABB

4.       http://www.ee.lut.fi/fi/opi/kurssit

5.       Environmental Management – from Regulatory Demands to Strategic Business Opportunities. The Royal Swedish Academy of Sciences.

6.       M Leijon, L Getmer, H Frank, J Martinsson, T Karlsson, B Johansson,

7.       K  Isaksson, U Wollstrom, “Breaking Conventions in Electrical Power Plants”, Report 11/37-3, Proc CIGRE Session, Paris 1998, 8pp.

8.       H.hooshiar, M. savabeghi, A. Vahedi, “Synchronous Generator: Past, Present and Future ’’, IEEE, 2008.

9.       M.taherzadeh, A. Akbari, M. Ardebili,"An Investigation on Slot Configuration in New Generation of Synchronous Generators Based on XLPE Cables,” Turkey International Conference(ELECO), 2009. pp.197-201.

10.     Ibrahim A. Metwally, R.M.Radwan, A.M. Abou-Elyazzied, “Powerformers: A breakthrough of high-voltage power generators” IEEE potentials, pp. 37-44, May 2008.

11.     Environmental Management – Life Cycle Assessment – Principles and Framework. ISO 14040.

12.     M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM," in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

13.     M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM," in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

14.     P. Wang and R. Billinton, "Reliability assessment of a restructured power system using reliability network equivalent techniques," in Proc. 2003 IEE Generation, Transmission and Distribution Conf., vol. 150, pp. 555-560.

15.     R. Allan and R. Billinton, "Power system reliability and its assessment Part-I. Background and generating capacity," Power Engineering Journal, vol. 6, pp. 191-196, July 1992.

16.     C. G. Melo and M. V. F. Pereira, "Sensitivity analysis of reliability indices with respect to equipment failure and repair rates," IEEE Trans. On Power Systems, vol. 10, pp. 1014-1021, May 1995.

17.     M. Darveniza, T. K. Saha, B. Berggren, M. A. Leijon, and P. O. Wright, "A research project to investigate the impact of electricity system requirements on the design and optimal application of the PowerformerTM,"in Proc. 2001 IEEE Power Engineering Society Transmission and Distribution Conf., vol. 1, pp. 504-509.

18.     "PowerformerTM four years on," Modern Power System, vol. 22, pp. 40- 42, 2002.

19.     A. Aumuller and T. K. Saha, "Investigating the impact of PowerformerTM on voltage stability by dynamic simulation," IEEE Trans. on Power Systems, vol. 18, pp. 1142-1148, Aug. 2003.

20.     J. McDonald and T. K. Saha, "Development of a technique for calculation of the influence of generator design on power system balanced fault behavior," in
Proc. 2002 IEEE Power Engineering Society SummerMeeting, vol. 2, pp. 731-736.

21.     S. Lindhal, M. Leijon: Estimation of the Reliability of PowerformerTM, SECRC/ABB Corporate Research, Vasteras, SEGEN/DN HOG 9801, 1998, pp. 1 – 6.


219-226

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Rahmat Zolfaghari

Paper Title:

Converting UML Description of Software Architecture to Stochastic Process Algebra and Performance Evaluation

Abstract:    Important qualitative parameters of the large software systems are determined by indicators of effectiveness of the software's,such as response time, operating power and error rate. Procedure modeling is an approach for evaluating the effectiveness andvalidationof the systems and, as well as it predicts the requirements of qualitative and quantitative performance and provides a comparison between all kinds of designs with respect to performance indicators.Present study suggested a method for converting the UML description designing software to Stochastic Process Algebra (SPA)model, which provides the application of using the UML in designing software with high performance; in other words it putting the performance in designing software and a high quality software is designed.In order tomodeling the parts of system we use state chart and for the interactions between the parts we use the Collaboration chart with the performance profile (using the performance profile is the distinction between the suggested approach and the former ones.). An algorithm is provided for automatic production of the SPA performance model from the XML(Extensible Markup Language) documents and state and collaboration charts with performance profiles(stereotype, label and limitation), using the ExportXMIsoftware, ArgoUML is provided, and then they gained SPA performance/operation model in thePEPAworkbenchtool is loaded for performance analysis, so as the designer can test thefulfill of performance goals of his design according to type of different performance parameters and changing in value and chooses the best option in designing.  

Keywords:
   Performance evaluation,UML(Unified Modeling Language),SPA(Stochastic Process Algebra) and performance profile


References:

1.        L.G williums, G.U. smith "performance Evaluation of Software Architectures" proc. Of wosp'98, santa Fe, New Mexico , USA, PP, 164-177 (1998)
2.        R.Class, Software Runaway, "Lessons learned form Massive Software project Failures, prentice Hall" 1998

3.        smith C.U., Performance Engineering Of Software System, Adison—Wesley(1990)

4.        Cortllessa, V.,Mirandola, R. PRIMA-UML:A Performanc Validation Incremental Methodology on Early UML Diagram 101-129(2002)

5.        Gu, G., Petriu, D.C, XSLT tranformation from UML  models to LQN performance models, In [WOSP02], PP. 227-23

6.        Arief, L.B., Speirs, N.A., A UML Tool for an Automatic Generation of Simulation Program, In [WOSP00] PP. 71-76

7.        Mirco Tribastone and Stephen Gilmore. Automatic extraction of PEPA performance models from UML activity diagrams annotated with the MARTE profile. In Proceedings of the 7th International Workshop on Software and Performance (WOSP2008), pages 67-78, Princeton NJ, USA, 2008.

8.        Mirco Tribastone and Stephen Gilmore. Automatic translation of UML sequence diagrams into PEPA models. In 5th International Conference on the Quantitative Evaluation of SysTems (QEST 2008), pages 205-214, St Malo, France, 2008.

9.        Analysis of a Multimedia Stream Using  SPA, H. Bowman, J.W.Brayans  and a J. Derrick, University of  Kent, 2001

10.     Performance Modelling with UML and  Stochastic Process Algebras, Catherine Canvent, Stephen Glimore, Jane Hiliston, Matthew Prowes and Perdita Stevens,2002

11.     http://argouml.tigris.org

12.     http://www.dcs.ed.ac.uk/pepa

13.     http://www.sax.sourceforge.net


227-232

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Saurabh Agrawal, J. S. Yadav, Ravindranath C. Cherukuri

Paper Title:

A Novel Data Hiding Framework Using Switching Threshold Mechanism

Abstract:    In the current digital era, the rapid escalations in digital multimedia and network have paved ways for people around to acquire, utilize and share multimedia information. In this paper, we introduce a novel algorithm for hiding significant amount of data while preserving the image artifacts. The algorithm uses image details and identifies the good locations for hiding using a discriminative filter. This principle enhances the immunity of the proposed system against stego detection algorithms and preserves the first order statistics of the image.  In addition, the proposed algorithm could retrieve the embedded information without the prior information of the original cover. The simulation analysis would show that the proposed method offers higher immunity to stego detection algorithms and preserve the first order statistics of the image.

Keywords:
   Information security and assurance, discriminative filter, switching mechanism, and steganography, secured communication


References:

1.       N. F. Johnson, Z. Duric, S. Jajodia, Information Hiding Techniques Steganography and Watermarking Attacks and Countermeasures (Advances in Information Security), Springer Publishers, ISBN 1461369673, 2012
2.       Ching-Nung Yang, Chia-chen Lin, Chin-Chen Chang, Steganography and Watermarking, Nova Science Publishers Inc., 2013

3.       Ravindranath C. Cherukuri and Sos S. Agaian, "New normalized expansions for redundant number systems: adaptive data hiding techniques", Proceedings of SPIE on Multimedia on Mobile Devices 2010, Vol.  7542, San Jose, California, USA 2010

4.       Mamta Juneja, Parvinder Singh Sandhu, “Information Hiding Using Improved LSB Steganography and Feature Detection Technique”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 2, Issue-4, April 2013, pp.275-279

5.       Shailender Gupta, Ankur Goyal and Bharat Bhusan, “Information Hiding Using Least Significant Bit Steganography and Cryptography,” I. J. Modern Education and Computer Science, 2012, Vol.6, pp-27-34

6.       W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for Data Hiding,” Journal of IBM Systems, Vol. 35, 1996.

7.       W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM Systems. J., vol. 35, 1996.

8.       WbStego, http://wbstego.wbailer.com/

9.       S_Tools, http://bit599.netai.net/s_tools.htm

10.     Niimi, M.; Noda, H.; Kawaguchi, E.; Eason, R.O., "Luminance quasi-preserving color quantization for digital steganography to palette-based images," Pattern Recognition, 2002. Proceedings. 16th International Conference on , vol.1, no., pp.251,254 vol.1, 2002

11.     Elke Franz.  “Steganography Preserving Statistical Properties”, Information Hiding: 5th International Workshop, IH.   pp. 287-294. July 2003.

12.     Wu, D.C.; Tsai, W.H., "Spatial-domain image hiding using image differencing," IEE Proceedings in Vision, Image and Signal Processing, vol.147, no.1, pp.29-37, Feb 2000.

13.     Agaian, S., Rodriguez, B., Perez, J., “Stego sensitivity measure and multibit plane based steganography using different color models”, IS&T/SPIE 18th Annual Symposium of Security, Steganography, and Watermarking of Multimedia Contents VIII, February 2006, vol. 6072, pp. 279–290 (2006)

14.     S.S.Agaian, R.C.Cherukuri, S.Ronnie, “A New Secure Adaptive Steganographic Algorithm using Fibonacci Numbers”, 2006 IEEE Region 5 Technology and Science conference, San Antonio, USA, April 7-8 2006.

15.     S. S. Agaian, R. R. Sifuentes, R. C. Cherukuri, “T-Order Statistics and Secure Adaptive Steganography”, SPIE Optics & Photonics advance technical program, San Diego, USA, 31July-4August 2005.

16.     Chin-Chen Chang, Jun-Chou Chang, Yu-Chen Hu,“ Spatial Domain Image Hiding Scheme Using Pixel-Values Differencing”, Fundamenta Informaticae,Vol. 70, Issue-3, pp 171-184, 2006

17.     Jessica. F; M. Goljan and R. Du, “Reliable Detection of LSB Steganography in Grayscale and Color Images” Proceedings  of the ACM Workshop on Multimedia and Security, Ottawa, Canada, October 5, 2001, pp. 27-30


233-237

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

P.Sreenu,  Appa Rao G, SSSV Gopala Raju

Paper Title:

A Case Study on Curve Design for Improvements to Existing Master Plan Roads

Abstract:    The present case study deals with development of existing roads to master plan roads. The roads from NH-5 junction to kommadi village, NH-5 to Navodhaya School, are located in Visakhapatnam city in India. Particularly these areas are densely populated and occupied with housing units, schools and commercial buildings. As these roads could not meet the present & and future demand, new road proposals was put forward by Visakhapatnam development authority (VUDA) to widen the existing road to master plan road. The present condition of the road is in deteriorated state which is sacrificed and new pavement design is proposed according to IRC-37:2001 recommendations. The studies involves collection of details such as road width, gradient, deflection angle, length of curve and radius of curve and design them to the prescribed standards of IRC code. The curve parameters have been measured using theodolite by traversing along center line of the curve.

Keywords:
   About four key words or phrases in alphabetical order, separated by commas.


References:

1.       Annette R. Hill, Andrew R. Dawson and Michael Mundy (2001) Utilisation of aggregate materials in road construction and bulk fill. Res. Cons. Recycling. 32(3), 305-320.
2.       Gopala Raju SSSV, Murali M and Rengaraju VR (2007) Reuse of polythyelene waste in road c    onstruction. J. Environ. Sci. Engg. 49(1), 67-70.

3.       Ministry of Road Transport and Highways (MoRTH) (2002) Specification for roads and bridges. Indian roads congress publication.

4.       Pasetto M (2000) The re-utilisation of discarded building materials in cement-stabilised layers of road and airfield pavements. Waste Management Series. 1(1), 548-566.

5.       Gopala Raju SSSV., (2011), Vehicular Growth and Its Management in Visakhapatnam City  Case Study, Indian Journal of Science and Technology, Vol. 4,No.8, pp 903-906.

6.       Bhuyan, P.K, 2002, Accidents Analysis on Two-Lane Roads, Unpublished Seminar Report, Department of Civil Engineering, Indian Institute of Technology Roorkee

7.       Jain, S.S., Parida, M., Chauhan, M.P.S. and Landge, V.S., 2004, Identification of Hazardous Locations on National Highways, International Conference on Transportation Systems Planning and Operation (TRANSPO 2004), Chennai.

8.       Gopala Raju SSSV., (2012), Identification of black spots and junction improvements in Visakhapatnam City, Indian Journal of Innovations and Development, Vol.1, No.6, pp.469-471.

238-241

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

Aruna.D.Mane, Sirkazi Mohd Arif, Waleed Abdu Rahiman

Paper Title:

An Advanced Robot -Robin Heart (A Surgeon without Hand Tremor)

Abstract:    The paper presents the current state of works conducted by the Zabrze team under the Robin Heart surgical robot and the Robin Heart Uni System mechatronic surgical tools project as a example of introducing technology and materials advances for progress in surgical robots. The project called “Polish Cardiosurgical Robot” has been developed by Foundation for Cardiac Surgery Development since year 2000. Within the project the telemanipulator to perform the endoscopic cardiosurgical operations has been designed, manufactured and examined. In the following paper the development of construction of arms for Robin Heart versions of the robot as well as the fixing system has been presented. In the preliminary phase of the project the requirements for mechanical construction were analyzed. Additional requirements enhancing functionality of the construction were also defined. A system to verify the forward kinematic and the trajectories for the Robin Heart master device was implemented. The system consists of hardware based on incremental encoders connected to a data acquisition card and software programmed in Matlab and LabView to create an interface between the system and the user. The system verifies the position of the tool tip when different values for the joints are configured. The visualization of trajectories is also possible after saving a routine of movements made by the user. Analyses of the planned development of the construction and ways of its possible applications were performed. The special intention is to show the review of the current and futuristic medical robots needs in the area of material science.

Keywords:
   Medical robots, Examination of robots, Construction of robots.


References:

1.        http://www.intusurg.com
2.        D. Loulmet, A. Carpentier, N. d’Attellis, A. Berrebi, C.Cardon, O. Ponzio, B. Aupecle and J.Y.M. Relland, “Endoscopic coronary artery bypass grafting with the aid of robotic assisted instruments”, J. Thorac Cardiovasc Surg., July 1999.

3.        V. Falk, T. Walther, R. Autschbach, A Diegeler, R Battellini and F.W. Mohr, “Robot-assisted minimally invasive solo mitral valve operation”, J. Thorac. Cardiovasc. Surg. 115 (2), 470–471 (1998).

4.        http://www.computermotion.com

5.        Z. Nawrat, K. Mianowski, L. Podsedkowski, P. Kostka, Z. Małota, P. Wróblewski and Z. Religa, “RobIn Heart – mature examination”, Materials of Conference AUTOMATION 2004, Warszawa, 2004, (in Polish).

6.        P. Kostka, Z. Nawrat, R. Pruski and Z. Małota, “Control systems of cardio-surgical telemanipulators RobInHeart 0,1 and 2 – technical solutions”, Materials of Conference AUTOMATION 2004 -Automatization,  News and Prospects, pp. 467–475, Warszawa, 2004, (in Polish).

7.        L. Podsedkowski, “Forward and inverse kinematics of the cardio-surgical robot with non-coincident axis of the wrist”, SIROCCO, pp. 525–530 (2003).

8.        Z. Nawrat, L. Podsedkowski, K. Mianowski, P. Kostka, P. Wróblewski, Z. Małota and Z. Religa, “RobIn Heart and Zeus and Da Vinci – the comparison of cardio-surgical robots”, XIII State Scientific Conference: Biocybernetics and biomedical engineering, Gdansk, pp. 464–469 (2003).

9.        K. Mianowski, Z. Nawrat, M. Poreda “Project study of manipulator for the cardio-surgical robot RobIn Heart”, Materials of Conference AUTOMATION 2004, Warszawa, 2004, (in Polish).

10.     L. Podsedkowski, Z. Nawrat, “Manipulator, especially medical manipulator,”Patent Application No P-363247 dated 3.11.2003.

11.     Z. Nawrat “Robin heart progress – advances materials & technology in surgical robots ”bulletin of th polis academy of sciences ,2010.

12.     L. Podsedkowski ”Robin heart 0,1,a – mechanical construction development”Poland ,2005

13.     instruments N using quadrature encoders with E series DAQ boards .2006.from http://zone .ni.com/devzone/cda/tut/p/id/4623.

14.     Datasheet USB 6009 [cited 2007 feb 2007];available from http://www.ni.com/pdf/products/us/20043762301101dlr.pdf


242-251

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

Sonal Miglani, KanwalGarg

Paper Title:

Experimental Study of an Improvedk-Means Algorithm and Its Comparison with Standardk-Means

Abstract:    K-means algorithm is a popular, unsupervised and iterative clustering algorithmwell known for its efficiency in clustering large datasets.It is used in a variety of scientific applications such as knowledge discovery, Data Mining, data compression, medical imaging and vector quantization. This paper aims at studying the standard k-means clustering algorithm, analyzing its shortcomings and its comparison with an improved k-means algorithm. Experimental results show that the improved method can effectively increase the speed of clustering and accuracy, reducing the computational complexity of the k-means.

Keywords:
   Clustering, Data Mining, K-Means Clustering


References:

1.        Jiawei Han, Michelinekamber& Morgan Kauffman,“Data Mining:  Concepts and Techniques”, 2nd edition 2006.
2.        Koheriet. al, “Hierarchical K-means: an algorithm for centroids initialization for K-means”, Reports of the Faculty of Science and Engineering, Saga University, Vol. 36, No.1, 2007.

3.        Sumathi&Kirubakaran, “Enhanced Weighted K-means Clustering based risk level prediction for Coronary heart disease”, European Journal of Scientific research, ISSN 1450-216X, No. 4, pp. 490-500, 2012.

4.        MadhuYedla, SrinivasaRaoPathakota& T M Srinivasa, “Enhancing K-means ClusteringAlgorithm with Improved Initial Center”.International Journal of Computer
Science and Information Technologies, Vol. 1 (2), 121-125, 2010.

5.        Khammar&Marhaban, “Obtaining the initial centroids based on the most dense colonies in the k-means Algorithm”, Reasearch Journal of Computer Systems & Engineering, ISSN: 2230-8563, vol. 03, issue. 01, July 2012.

6.        Charles Elkan. “Using the triangle inequality to accelerate k-means”, In Tom Fawcett and Nina Mishra, editors, ICML, pages 147–153. AAAI Press, 2003.

7.        Sujatha&ShanthiSona, “Novel Initialization Technique for K-means Clustering using spectural Constraint Prototype”, published in Journal of Global Research in Computer Science, Vol. 3 No. 6, ISSN-2229-371X, June 2012.

8.        Bradley & Fayyad, “Refining Initial Points for K-means Clustering”, International Conference of Machine Learning”, pp. 91-99, May 1998.

9.        Zhexue, “Extensions to the k-Means Algorithm for Clustering Large Data Sets with Categorical Values”, Data Mining and Knowledge Discovery, Vol. 2, Issue. 3,pp. 283-304, 1998.

10.     Hamerly, “Making K-means Even Faster”, Department Of computer Science, Baylor University.

11.     Dheeb, Malik &Sulieman, “Detection and Classification of Leaf Diseases using K-means-based Segmentation and Neural-networks-based Classification”, Information Technology Journal, Vol. 10, Issue. 2, pp. 267-275, 2011.

12.     Neha&Kirti, “A mid-point based k-Means Clustering Algorithm”, International Journal of Computer Science and Engineering, ISSN 0975-3397, Vol. 4, No. 6, June 2012.

13.     Azharet. al., “Enhanced K-means Clustering Algorithm To reduce number of iterations and time complexity”, Middle east Journal of Scientific Research 12 (7): 959-963, 2012.

14.     Shi Na, Liu & Guan, “Research on K-Means Clustering Algorithm”, Third International Symposium on Intelligent Information Technology and Security Informatics, ISBN- 978-0-7695-4020, 2010.


252-254

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

A. M. Khan

Paper Title:

Circuit Edit Technology for Submicron Structures in Semiconductor Devices

Abstract:    Aluminum and copper metal structures with sub micron dimension are widely used in semiconductor devices. Precise cutting of these metal lines is one of the fundamental requirements in VLSI Circuit Edit technology. Cutting of these sub micron metal lines should ensure good electrical isolation while maintaining nil / minimal damage to closely spaced adjacent metal structures. In this experimental work, both focused ion beam (FIB) technology and focused Laser beam technology have been explored. Relative merits and demerits of these technologies have been discussed. Laser beam assisted technology is found to be viable for cutting metal lines if spacing between metal lines is greater than two microns. Focused ion beam assisted technology is found to be quite effective in cutting metal structures when spacing between metal lines is less than a micron.

Keywords:
   VLSI, FIB, Circuit Edit, Laser, IC.


References:

1.       Dr. Chad Rue, “Circuit Edit Basics”, FEI Application Notes.
2.       S. Smith, et al. “Test structures for the electrical characterization of platinum deposited by Focus Ion Beam”, Proceedings of IEEE 2002 International Conference on Micro Electronic test structures”, Volume : 15, April 2002, pp:157 – 162.

3.       M.G. Mclaren et al., “Ion Beam Induced Deposition of Tungsten on Silicon”, IEEE Journal, 1997, pp 717 – 720.

4.       S.K. Loh et al., “Application of Focus Ion Beam Circuit Edit in Failure   Analysis”,     Proceedings of ICSE 2006, Kuala Lumpur, Malaysia.

5.       Valery Ray, “Recipe Development considerations for Focused Ion Beam Gas Assisted Etching” 8th European FIB User Group Meeting, 2004, Switzerland

6.       David P Adams et al., “Micro milling of metal alloys with focused ion beam – fabricated tools”, Journal of the International Societies for precision Engineering and Nano Technology, Vol:25, 2001, pp:107-113.

7.       Deubel. M et al., “Direct laser writing of three dimensional photonic –crystal templates for telecommunications”, Nature Materials; Volume : 3; 2004; pp:444 – 447

8.       Mizoshiri.M. et al., “SiO2 based hybrid diffractive – refractive lenses fabricated by femto second laser assisted micro machining”, Applied Physics Express; Volume:1, No:12; 2008; pp 1270011 – 1270013.

9.       G.Brown, et al., “Ultrafast laser inscription of Brag – grating wave guides using the multi scan techniques”, OPT LETTERS, Vol: 37; Nu:4, 2012; pp:491 – 493.

10.     J.Gottmann, et al., “High speed and high precision fs – laser writing using a scanner with large numerical aperture”, JLMN, Vol:4, No:3, 2009; pp:192-196.


255-257

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Shobha.K, Mamatha Jadhav.V

Paper Title:

Simulation of a Secure Efficient Dynamic Routing In Wireless Sensor Network

Abstract:    Wireless Sensor networks have features like low cost, flexibility, fault tolerance, high sensing fidelity, creating many new and exciting application areas for remote sensing. So, wireless sensor network has emerged as a promising tool for monitoring the physical world with wireless sensor that can sense, process and communicate. There are many issues of wireless sensor network which need to be addressed .So took up one of the idea to use OSPF for secure efficient dynamic routing in wireless sensor network. The protocols that are being used till date are not efficient enough in matter of the time taken for the transferring the message from one node to another. So this project provides secure efficient dynamic routing in wireless sensor network. The protocols that are being used just provide a data packet transfer without any proper time. With the implementation of open shortest path first protocol we can get a better routing path for with least cost path. Thus the implementation of this can give a better view in the data packet transferring.The Simulation of Secure Efficient Dynamic Routing in Wireless sensor network has been implemented using dijkstra’s algorithm for finding shortest path between the nodes. For providing security to the messages DES algorithm is used. The messages are encrypted and decrypted using this algorithm in order to provide security. User can be able to create number of nodes in the network. User can be able to send the packets using shortest path so that it reaches fast. User can also able to view the Routing Table at each node. User can also be able to view different nodes placed with their Node location and Node id. So from the   Implementation it can be conclude that the proposed technique is very cost effective, secure and simpler to configure. From the performance Analysis it is clear that OSPF Routing in Wireless Sensor Networks is Very cost effective and more number of packets can be sent.

Keywords:
   Open Shortest Path First (OSPF), Link-State Packets, Backbone Area of OSPF, Area Border Routers (ABRs).


References:

1.        Shobha.K P.G Student, Mamtha Jadhav.V  Assistant Professor, Develop and Simulate a Secure Efficient Dynamic Routing Using Protocol in Wireless Sensor Network ISSN: 2277-3754   ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6,  December 2012.
2.        Namarta Kapoor, Nitin Bhatia, Sangeet Kumar, Simranjeet Kaur Wireless Sensor Networks: A Profound Technology International Journal of Computer Science and technology - IJCST Vol. 2, Issue 2, June 2011.

3.        Kurt Stammberger, Mocana, Security in Wireless Sensor Networks An RTC Group Publication WIRELESS NETWORKS The magazine of record for the embedded computing industry July 2009.
4.        P. S. Pandian, K. P. Safeer, Wireless Sensor Network for Wearable Physiological Monitoring JOURNAL OF NETWORKS, VOL .3, No.5, May 2008.
5.        ZHAO Lei1, ZHANG Wei-Hong, XU Chao-Nong, XU Yong-Jun, LI Xiao-Wei1. Energy-aware System Design for Wireless Sensor Network Vol. 32, No. 6 ACTA AUTOMATICA SINICA November, 2006.

6.        Chris Karlof, David Wagner, Secure routing in Wireless Sensor Networks: Attacks and Countermeasures University of California at Berkeley.

7.        Chinese Journal of Electronics Vol.21, No.2, Apr. 2012 DRMA: A Dynamically Reconfigurable Management Architecture for Wireless Sensor Networks.

8.        Computer Networks by Patterson.

9.        Kurt Stammberger and Monique Semp, Introduction to Security for Smart Object Networks Internet Protocol for Smart Objects (IPSO) Alliance February 2010.

10.     Industry Insight -Security for Wireless Networks Security in Wireless Sensor Networks. July 2009.

11.     Sen,Jaydip ,Routing Security Issues in Wireless :Attacks and Defenses Author Networks 2011.

12.     Ospf Design Guide document id: 7039.

13.     Ronghui Hou, Member, IEEE, King-Shan Lui, Senior Member, IEEE, Fred Baker, and Jiandong Li, Senior Member, IEEE Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth .IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 2, FEBRUARY 2012.

14.     Jie Yang, Student Member, IEEE, Yingying Chen, Senior Member, IEEE,Wade Trappe, Member, IEEE, and Jerry Cheng, Detection and Localization of Multiple Spoofing Attackers in wireless sensor network.

15.     Yogendra Kumar Jain, Vismay Jain An Efficient Key Management Scheme for Wireless Network, International Journal of Scientific & Engineering Research, Volume 2,Issue 2, February-2011.


258-263

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Prashanti.G, Deepthi.S, Sandhya Rani.K

Paper Title:

A Novel Approach for Data Encryption Standard Algorithm

Abstract:    Now a day’s providing Security for data is complicated task we have so many security methods that are implemented and deployed but out of them few are using and serving the needs of society. And we can’t say that any algorithm is perfect and avoids threats. The main goal of any design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, data in both the private and public sectors are increased which requires Availability, Authentication, Confidentiality, Integrity. In this paper we are considering The DES algorithm that defines the mathematical steps that transform original text (plain text) into a cipher text (secret code) and also transform the cipher text back to the original text. Here introduces a new method to enhance the performance of the Data Encryption Standard (DES) algorithm. This is done by replacing the 8/32 S-Box instead of 6/4 S-Box. The output of each S-Box undergoes AND and XOR operation before going to the permutation P. In this paper we also proposed a new operation Addition modulo instead predefined XOR operation applied during the 16 round of the standard algorithm.

Keywords:
   DES, Encryption, Decryption, asymmetric cryptography, symmetric cryptography.


References:

1.       New Approach of Data Encryption Standard Algorithm Shah Kruti R., Bhavika Gambhava.
2.       J.Orlin Grabbe ―The DES Algorithm Illustrated‖

3.       W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed., Prentice Hall, 1999.

4.       The CAST-128 Encryption Algorithm. C. Adams, Entrust Technologies, May 1997. http://tools.ietf.org/pdf/rfc2144.pdf

5.       Cryptography And Network Security  By Atul Kahate

6.       a simplified idea algorithm nick Hoffman http://www.nku.edu/~christensen/simplified%20IDEA%20algorithm.pdf

7.       Network security and cryptography by bernard menezes
8.       National Bureau of Standards – Data Encryption Standard, Fips Publication 46,1977.

9.       O.P. Verma, Ritu Agarwal, Dhiraj Dafouti,Shobha Tyagi ― Performance Analysis Of Data Encryption Algorithms ― , 2011.

10.     Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha ― Performance Evaluation of Symmetric Cryptography Algorithms, IJECT, 2011.

11.     Diaa Salama, Abdul Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhound ― Performance Evaluation of Symmetric Encryption Algorithm ―,
IJCSNS, 2008.

12.     Dr. Mohammed M. Alani ― Improved DES Security‖, International Multi-Conference On System, Signals and Devices, 2010.

13.     Dhanraj, C.Nandini, and Mohd Tajuddin ― An Enhanced Approch for Secret Key Algorithm based on Data Encryption Standard‖, International Journal of Research And Review in Computer Science, August 2011

14.     B.Scheier, Applied Cryptography: Protocols, Algorithms and Source Code in C,2nd ed.., John Wiley & Sons,1995.

15.     The DES 15 years of public scrutiny. dorothy e denning.

16.     http://faculty.nps.edu/dedennin/publications/DES-15Years.pdf


264-267

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Pravin P Kalyankar, S S Apte

Paper Title:

3D Volume Rendering Algorithm

Abstract:    This paper presents an analysis of the algorithms used for generating 3D structures from 2D CT-Scan Datasets. This is achieved by developing an implementation of Marching Cubes, a surface construction algorithm that’s currently the standard used for 3D surface construction in the medical visualization industry. Two techniques have been chosen to produce the 3D models. The first technique is known as Volume Rendering and the second technique is known as the Marching Cubes Algorithm. Both techniques use voxels (3D square pixels) to determine the 3D area to be constructed.  The Marching Cubes (MC) algorithm by Lorensen and Cline is most popular algorithm for extraction of isosurface out of volume data. Several drawbacks of MC algorithm are solved by using new improved version of MC algorithm.

Keywords:
   Marching Cube, 3D surface reconstruction, isosurafce, Volume rendering, Medical imaging


References:

1.        Bourke, P. "Polygonizing a Scalar Field", May 1994, http://astronomy.swin.edu.au/~pbourke/modelling/polygonise/
2.        Cline, H., Lorensen, W., System and Method for the Display of Surface Structures Contained Within the Interior Region of a Solid Body, US Patent 4,710,876, to General Electric Corp., Patent and Trademark Office, 1985

3.        Dedual, N., Kaeli, D., Johnson, B., Chen, G., Wolfgang, J., "Visualization of 4D Computed Tomography Datasets", Proc. 2006 IEEE Southwest Symposium of Image Analysis and Interpretation, March 2006

4.        Lorensen, W., Cline, H. "Marching Cubes: A High Resolution 3D Surface Construction Algorithm", ACM Computer Graphics Volume 21, Number 4, July 1987

5.        Johnson, C., Parker, S., Hansen, C., Kindlmann, G., and Livnat, Y. "Interactive Simulation and Visualization" Center for Scientific Computing and Imaging, University of Utah. http://www.cs.utah.edu/sci

6.        Keppel, E. "Approximating Complex Surfaces by Triangulation of Contour Lines" IBM J. Res. Develop 19, 1 (January 1975), p. 2-1

7.        Robb, R. A., Hoffman, E. A., Sinak, L. J., Harris, L. D., and Ritman, E. L. "High Speed Three-Dimensional X-Ray Computed Tomography: The Dynamic Spiral
Reconstructor", Proc. Of IEEE 71, 3 (March 1983), 308-319.

8.        Sabella, P. " A Rendering Algorithm for Visualizing 3D Scalar Fields" ACM Computer Graphics Volume 22, Number 4, August 1988

9.        Webb, A. Introduction to Biomedical Imaging, Wiley-Interscience, 2003, p. 34 - 47

10.     Computed Tomography, Wikipedia, 17 April 2006, http://en.wikipedia.org/wiki/Computed_Tomography

11.     Tomographic Reconstruction, Wikipedia, 24 March 2006, http://en.wikipedia.org/wiki/Tomographic-reconstruction


268-270

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

Achal Badgujar, Swati Nikam

Paper Title:

A Study of Channel Assignment Strategies used for Uncoordinated WLANs

Abstract:    Due to tremendous increase in use of WIFI, the efficient use of available frequency spectrum has been a challenging issue. Such WIFI which are managed by non-network specialists are called Uncoordinated WLANS. The performance of Uncoordinated WLANs can be greatly improved by efficient channel assignment. In this paper, we describe the various channel assignment schemes used in Uncoordinated WLANs. After describing each scheme we also provide a qualitative comparison of the schemes based on complexity, scalability and execution behaviors. The survey is concluded with various research issues open for further study.

Keywords:
   Channel assignment. Co-Channel interference, Uncoordinated WLANS


References:

1.        M. Achanta, “Method and Apparatus for Least congested      Channel Scan for Wireless Access Points,” US Patent No. 20060072602, Apr. 2006.
2.        A. Mishra, S. Banerjee, and W. Arbaugh, “Weighted Coloring BasedChannel Assignment for WLANs,” SIGMOBILE Mob.Comput.Commun.Rev. vol. 9, no. 3, pp. 19–31, 2005.

3.        K. K. Leung and B.-J. Kim, “Frequency Assignment for IEEE 802.11Wireless Networks,” in Proc. IEEE Vehicular Technology Conference,vol. 3, pp. 1422–1426, Oct. 2003.

4.        M. Yu, H. Luo, and K. K. Leung, “A Dynamic Radio ResourceManagement Technique for Multiple APs in WLANs,” IEEE Trans.WirelessCommun., vol. 5, pp. 1910-1919, July 2006.

5.        R. Akl and A. Arepally, “Dynamic Channel Assignment in IEEE802.11 Networks,” in Proc. IEEE International Conference on Portable Information Devices (PORTABLE’07), 2007.

6.        M. Haidar, R. Akl, and H. Al-Rizzo, “Channel Assignment and Load Distribution in a Power-managed WLAN,” in Proc. IEEE PIMRC: 18thAnnual IEEE International Symposium on Personal, Indoor and MobileRadio Communications, September 2007.

7.        A.Mishra and V. Shrivastava, D. Agrawal, S. Banerjee, and S. Ganguly,“Distributed Channel Management inUncoordinated Wireless Environments,”inProc. International Conference on Mobile Computing andNetworking, pp. 170–181, 2006.


271-273

58.

Authors:

Sandeep Kumar Singh, Nishant Chaurasia, Pragya Sharma

Paper Title:

Concept & Proposed Architecture of Hybrid Intrusion Detection System using Data Mining

Abstract:    now day’s security is the primary concerned in the field of computer science. Intrusion detection system provides stronger security services with the help of rules. This paper has developed a security model based on hybrid intrusion detection system using data mining approach. Proposed security model is the combing network based and host based with efficient data mining approach to detect any type of intrusion which coming from public network or occurring in computer system. Basically this model work on misuse and anomaly detection mode, it will use an approach to extract features from arriving data packets and will apply data mining algorithm to get the rule for match normal and abnormal behavior.

Keywords:
   Intrusion Detection System, Security, Network System, Host System, Data mining, association


References:

1.       Duanyang Zhao, Qingxiang Xu, Zhilin Feng “Analysis and Design for Intrusion Detection System Based on Data Mining” 2010 Second IEEE International Workshop on Education Technology and Computer Science.
2.       Asmaa Shaker Ashoor and Prof. Sharad Gore “ Importance of Intrusion Detection System (IDS)” International Journal of Scientific & Engineering Research,
Volume 2, Issue 1, January-2011

3.       Firkhan Ali Bin Hamid Ali and Yee Yong Len “Development of Host Based Intrusion Detection System for Log Files” IEEE symposium on business, engineering and industrial application(ISBEIA) langkawi, malaysia 2011

4.       Anthony Chung “On Testing of Implementation Correctness of Protocol Based Intrusion Detection Systems ”  Ninth IEEE International Conference on Software Engineering Research, Management and Applications 2011.

5.       Chunyu Miao and  Wei Chen  “A Study of Intrusion Detection System Based on Data Mining”  published in IEEE conferences 2010

6.       Lin Ying, ZHANG Yan and OU Yang-Jia “The Design and Implementation of Host-based Intrusion Detection System” Third IEEE International Symposium on Intelligent Information Technology and Security Informatics 2010.


274-276

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Manasa H.B, Anirban Basu

Paper Title:

Energy Aware Resource Allocation in Cloud Datacenter

Abstract:    The greatest environmental challenge today is global warming, which is caused by carbon emissions. Energy crisis brings green computing, and green computing needs algorithms and mechanisms to be redesigned for energy efficiency. Green IT refers to the study and practice of using computing resources in an efficient, effective and economic way. Currently, a large number of cloud computing systems waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. The proposed energy aware resource allocation provision data center resources to client applications in a way that improves energy efficiency of the data center, while delivering the negotiated Quality of Service (QoS). In particular, in this paper we conduct a survey of research in energy-efficient computing and propose: architectural principles for energy-efficient management of Clouds; energy-efficient resource allocation policies and scheduling algorithms considering QoS expectations and power usage characteristics of the devices. It is validated by conducting a performance evaluation study using CloudSim toolkit. Green Cloud Computing aims at a processing infrastructure that combines flexibility, quality of services, and reduced energy utilization. In order to achieve this objective, the management solution must regulate the internal settings to address the pressing issue of data center over-provisioning related to the need to match the peak demand. In this context, propose an integrated solution for resource management based on VMs placement and VMs allocation policies. This work introduces the system management model, analyzes the system’s behavior, describes the operation principles, and presents a use case scenario. To simulate the approach of organization, theory and implementation of migration policies and reallocation changes were made as improvements in the code of CloudSim framework.

Keywords:
   Energy efficiency, Green IT, Cloud computing, migration, resource management, virtualization.


References:

1.        Berl, E. Gelenbe, M. di Girolamo, G.  Giuliani, H.de Meer, M.-Q. Dang, and K. Pentikousis. EnergyEfficient Cloud Computing. The Computer Journal,53(7), September20 1 O,doi: 10.10931 comjnl! bxp08
2.        The green grid consortium (2011).

3.        Ministry of Economy, Trade and Industry, Establishment of the japan data center council, Press Release.

4.        EMC 2008 Annual overview Releasing the power of infonnation, http://www.emc.comJ digital_universe.

5.        S.Albers, "Energy -Efficient Algorithms," Communications of the ACM, vo1.53, no.5, pp.86-96,May 2010.

6.        Anton Beloglazov, Jemal Abawajy, Rajkumar   Buyya for “Energy-Aware Resource Allocation Heuristics for Effcient Management of Data Centers for Cloud Computing” preprint submitted to Future Generation Computer Science.

7.        R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, I. Brandic, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the
5th utility, Future Generation Computer Systems 25 (6) (2009) 599-616.

8.        E. Pinheiro, R. Bianchini, E. V. Carrera, T. Heath, Load balancing and unbalancing for power and performance in cluster-based systems, in: Proceedings of the Workshop on Compilers and Operating Systems for Low Power, 2001, pp. 182-195.

9.        J. S. Chase, D. C. Anderson, P. N. Thakar, A. M. Vahdat, R. P.Doyle, Managing energy and server resources in hosting centers, in: Proceedings of the 18th ACM Symposium on Operating Systems Principles, ACM New York, NY, USA, 2001, pp. 103-116.

10.     E. Elnozahy, M. Kistler, R. Rajamony, Energy-efficient server clusters, Power-Aware Computer Systems (2003) 179-197.

11.     L. Chiaraviglio, I. Matta, GreenCoop: cooperative green routing with energy-efficient servers, in: Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking (e-Energy 2010), Passau, Germany, 2010, pp. 191-194.

12.     M. Koseoglu, E. Karasan, Joint resource and network scheduling with adaptive offset determination for optical burst switched grids, Future Generation Computer Systems 26 (4) (2010) 576-589.

13.     L. Tomas, A. Caminero, C. Carrion, B. Caminero, Network-aware meta-scheduling in advance with autonomous self-tuning system, Future Generation Computer
Systems 27 (5) (2010) 486-497.

14.     E. Dodonov, R. de Mell, A novel approach for distributed application scheduling based on prediction of communication events,Future Generation Computer Systems 26 (5) (2010) 740-752.

15.     L. Gyarmati, T. Trinh, How can architecture help to reduce energy consumption in data center networking?, in: Proceedings of the 1st ACM International Conference on Energy-Efficient Computing and Networking (e-Energy 2010), Passau, Germany,2010, pp. 183-186.


277-281

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

S.H.Patil, S.M.Shinde

Paper Title:

Reliable Data Collection Using Mobile Data Collector in Wireless Sensor Network

Abstract:   in cluster based wireless sensor network common sensor nodes within the cluster sense the event periodically or continuous and transmit the data packets to the respective cluster head. Cluster heads will process the packets and transmit to the sink. As the cluster head act as intermediate node between common sensor nodes and sink so these nodes consumes more energy as compare to other nodes in network. So in this case these nodes are having more chances to dead early and due to that bottleneck problem occur in the network and this leads to affect the reliability of the network. With the help of proposed mobile data collector node (MDCN) model we can reduce the energy consumption of the nodes which are close to sink and also improve the reliability of the network

Keywords:
  MDCN Architecture, reliability, Wireless sensor network (WSN), mobile data collector node (MDCN).  


References:

1.        Liang He1, Jun Tao, Jianping Pan1, Jingdong Xu2 “Adaptive Mobility-Assisted Data Collectionin Wireless Sensor Networks”
2.        O. Chipara, Z. He, G. Xing, et al., “Real-time power-aware routing in wireless sensor network”.

3.        Arun A Somasundara, Aditya Ramamoorthy Mobile Element Scheduling for Efficient Data Collection inWireless Sensor Networks with Dynamic Deadlines

4.        R. Sugihara, “Controlled mobility in sensor networks,” Ph.D.  Thesis,University of California, San Diego, US, 2009.

5.        Shuai Gao, Hongke Zhang 2010 Energy Efficient Path-constrained SinkNavigation in Delay-guaranteed Wireless Sensor Networks

6.        Deepak Puthal, Bibhudatta Sahoo, Suraj Sharma 2012 Dynamic model for efficient data collection in wireless sensor network with mobile sink.

7.        W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy- Efficient Communication Protocols for Wireless Microsensor Networks,”in Proc. HICSS’00, 2000.

8.        Y. Zhuang, J. Pan, and L. Cai, “Minimizing Energy Consumption with Probabilistic Distance Models in Wireless Sensor Networks,” in ProcIEEE INFOCOM’10, 2010.

9.        L. He, J. Pan, and J. Xu, ”Reducing data collection latency in wireless sensor networks with multiple mobile elements,” submitted to AHSWN.

10.     D. Jea, A. Somasundara, and M. Srivastava, “Multiple controlled mobile elements (data mules) for data collection in sensor network,” in Proc IEEE
DCOSS’05, 2005.


282-285

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

M. Rama Bai

Paper Title:

An Approach for Classification of Preprocessed Textures Based On Boundary Moments

Abstract:    Texture classification is one of the problems which have been paid much attention on by image processing scientists. Consequently, many different methods have been proposed to solve this problem. In most of these methods the researchers attempted to describe and discriminate textures based on linear and non-linear patterns. The present paper describes a novel and effective method of shape classification by combining innovative preprocessing techniques, morphological boundary method and Hu moments. To offer better classification rate, first innovative preprocessing methods are applied on various texture images. Preprocessing mechanisms describe various methods of converting a grey level image into binary image with minimal consideration of the noise model. Then shape features are evaluated using HM by suitable numerical characterization derived from moment invariant measures on the  proposed Morphological Boundary(MB) method for a precise classification. This proposed MB derives a new shape descriptor to address the image classification problem by combining boundary extraction and Hu moment(HM) invariants information. A good comparison is made between these methods by combining preprocessing techniques, boundary extraction and Hu moments. This texture classification study using MB and HM has given a good performance. The experimental results clearly show the efficacy of the present method.

Keywords:
   Image classification, shape representation, morphological operation, Hu moment invariants, boundary extraction, preprocessing techniques, structuring element.


References:

1.       Kresch R. and  Malah D, “Skeleton-based morphological coding of binary images,” IEEE Trans. Image Processing, Vol. 7, pp. 1387–1399, Oct. 1998.
2.       Belongie S.,  Malik J. and  Puzicha J, “Shape matching and object recognition using shape contexts,” IEEE Trans. Pattern Anal. Mach. Intell., Vol. 24, no. 4, pp.
509–522, Apr. 2002
3.       Ei-Kwae E. A. and Kabuka M. R, “Binary object representation and recognition using the Hilbert morphological skeleton transform,” Pattern Recognition, Vol. 33, pp. 1621–1636, 2000.

4.       A. Laine and J. Fan, “Texture classification by wavelet packet signatures”, IEEE Trans. on PAMI, 15(11), 1993, pp. 1186-1190.

5.       A. Bovik , M. Clark , et.at, “ Multichannel Texture  Analysis Using Localized Spatial Filters”, IEEE Transactions on Pattern Analysis and Machine Intelligence, 12 (1), 1990, pp. 55-73.

6.       Ming-Kuei Hu, ”Visual pattern recognition by moment invariants,” Information Theory, IRE Transactions, Vol. 8, pp. 179-187, Feb1962.

7.       Boyce J. F. and Hossack W. J, "Moment Invariants for Pattern recognition," Pattern Recognition Letters, Vol. 1, pp. 451-456.

8.       Chen C.C., Tung-I T Sai, “Improved moment invariants for shape discrimination”, Pattern Recognition, 26(5), pp. 683-686, 1993.

9.       Sluzek A, “Identification and inspection of 2-D objects using new moment-based shape descriptors”, Pattern Recog., Vol. 16, pp.687-697, 1995.

10.     Teaque M. R, "Image Analysis via the General Theory of Moments", Journal of the Optical Society of America, Vol. 70, pp. 920-930, 1980.

11.     Hu M. K, “Visual pattern recognition by moment invariants”, IRE 2lan.s. Inform. Theory, IT-8, 1962, pp. 179-187.

12.     Jia-Guu Leu, “Computing a shape's moments from its boundary”, Pattern recognition, Vol 24, no. 10, pp. 949-957, 1991.

13.     B. Eswara Reddy, A. Nagaraja Rao, et al,” Texture Classification by Simple Patterns on Edge Direction Movements”, IJCSNS, Vol.7 No.11, November 2007.

14.     A. Laine and J. Fan, “Texture classification by wavelet packet signatures”, IEEE Trans. on PAMI, 15(11), pp. 1186-1190, 1993.

15.     Jia-Guu Leu, “Computing a shape's moments from its boundary”, Pattern recognition, Vol 24, no. 10, pp. 949-957, 1991.

16.     Chaur-Chin Chen,” Improved Moment Invariants for Shape Discrimanation”, Pattern Recognition, Vol. 26, No.5, pp.683-686, 1993.

17.     H. Sunder, D. Silver, et al, “Skeleton Based Shape Matching and Retrieval”, Proceedings of the shape modeling International, pp. 130-290, 2003.

18.     Gang Xu and Yuqing Lei, “A New Image Recognition Algorithm Based On Skeleton”, IEEE International Joint Conference on Neural Network, pp. 777-782, 2008.

19.     Zhihu Huang and Jinsong Leng, “Analysis of Hu’s Moments Invariants on Image Scaling and Rotation”, IEEE 2nd International Conference on Computer Engineering and Technology, Vol.7, pp.476-480, 2010.

20.     V. Vijaya Kumar, et al ,”A measure of patterns trends on various types of preprocessed images”, IJCSNS, Vol.7 No.8, p.p. 253-257, 2007.

21.     B.V. Ramana Reddy, A. Suresh, et al, “Classification of Textures based on Features Extracted from Preprocessing Images on Random Windows”, International Journal of Advanced Science and Technology, Vol. 9, pp: 9-18, August, 2009.

22.     Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing (Third Edition): Prentice Hall,2008.

23.     J. Serra, Image Analysis and Mathematical Morphology, Academic Press, London, 1982.


286-291

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

Jasjeet Singh Pannu

Paper Title:

Performance Analysis of Tikhonov Distributed Phase Error over Wireless Fading Channels

Abstract:    There is  need to formulate an accurate and thoroughly reproducible error model  for wireless mobile  channels in  order to  enhance   the  quality of  communication  by using better  modulation and coding schemes. However the various physical properties of propagation mode, distortion due to error in physical wireless medium and  the synchronization mismatch  between  transmitter  and   receiver,  leads  to  difficulty  in  modelling of  the  error performance of wireless channels. Phase shift keying (PSK) is one of the best modulation schemes  for  wireless  applications mainly   due  to  its  bandwidth  efficiency  and  constant  envelope. Inspite of these advantages, PSK systems  are prone to  phase synchronization error which becomes even more vital issue in wireless systems as  calculating correct phase over a random propagation medium is almost impossible. As a result, in  addition with AWGN and fading, the synchronization mismatch of the phase between the transmitter and receiver evaluates the error performance of a wireless system. This paper examines the problem of wrong  phase evaluation for  the  BPSK  as  well  as  for  the  case  of  general MPSK signals  over  Rayleigh, Nakagami-n  (Rician),  Nakagami-m  and  Nakagami-q  (Hoyt)  fading  channels. The  phase distortions are assumed to be random, unbiased, i.e. having zero-mean and may be represented by  a  Tikhonov distribution. The major contributions of related works were surveyed and the method that requires minimum mathematical operations (and thus proves to be less complex, more stable and accurate than others) is also explained. Apart from this, simple alternative approaches for obtaining analytical bit error rate (BER) for BPSK and symbol error rate (SER) through moment generating function (MGF) for Tikhonov distributed phase error have been proposed. The MGF methodology has wider applicability, is able  to obtain reproducible results, and shows significant improvement  in  accuracy regarding theoretical  BER  calculation  as  seen  from  the  graphical comparisons. Extensive Monte Carlo simulations that builds models of possible results by substituting a range of values were also performed to validate the theoretical results presented in the research paper

Keywords:
   bit error rate, montecarlo simulation, synchronization, and  Tikhonov distribution


References:

1.        W. C. Lindsey and M. K. Simon, Telecommunication Systems Engineering, Dover, New York, USA, 1991.2.        V. I. Tikhonov, Phase-lock automatic frequency control      operation in the presence of noise, Automation and Remote Control (Avtomatika i Telemekhanika), Vol. 21, No. 3, pp. 209–214, March 1960.
3.        C. M. Lo and W. H. Lam, Error probability of binary phase shift keying in Nakagami-m fading channel with phase noise, Electronics Leters, Vol. 36, No. 21, pp. 1773-1774, October 2000.

4.        M. K. Simon and M. -S. Alouini, Simplified noisy reference loss evaluation for digital  communication in the presence of slow fading and carrier phase error, IEEE Transactions on Vehicular Technology, Vol. 50, No. 2, pp. 480-486, March 2001.     

5.        J. G. Proakis and M. Salehi, Digital Communications, 5th edition, McGraw-Hill, Singapore, Asia, 2007.

6.        M. Abramowitz and I. A. Stegun, Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables, Dover, Washington DC, USA, November 1970.

7.        A. J. Viterbi, Principles of Coherent Communication, McGraw-Hill, New York, USA, 1966.

8.        A. Falujah and V. K. Prabhu, Performance analysis of PSK systems in the presence of slow fading, imperfect carrier phase recovery, and AWGN, IEE Proceedings on Communications, Vol. 152, No. 6, pp. 903-911, December 2005.

9.        I. S. Gradshteyn, I. M. Ryzhik, and A. Jeffrey ed., Table of Integrals, Series and Products, 7th edition, Academic Press, 2007.


292-295

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Chhaya Dalela

Paper Title:

Comparative Study of Radio Channel Propagation and Modeling for 4G Wireless Systems

Abstract:    This paper concerns about the radio propagation models used for the upcoming 4th Generation (4G) of cellular networks. A comprehensive review of the propagation prediction models for 4G wireless communication systems is presented and computation of path loss due to specific terrain and clutter environment has been carried using MATLAB based simulations for various prediction techniques such as COST-231 Hata model, COST-231 Walfish-Ikegami method, SUI model and ITU-R(1411.1) model for broadband and mobile services. The results showed that COST-231Hata’s method gave better agreement in terms of path loss values in urban, suburban and rural areas as compared to COST-231 Walfisch–Ikegami model.  COST-231 Hata model shows the lowest path loss in all the terrains whereas ITU-R(NLOS) model has highest path loss values. The prediction errors of the SUI and ITU-R NLOS models are considerably higher than those of the COST-231Hata and COST-231 Walfisch– Ikegami models.

Keywords:
   LTE , Path loss, Propagation models


References:

1.        G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.        J. D. Parsons, The Mobile Radio Propagation Channel. NewYork: Wiley, 1998.

3.        V. Abhayawardhana, I.Wassell, D. Crosby,M. Sellars, and M. Brown, “Comparison of empirical propagation pathloss models for fixed    wireless access systems,” in Proc. IEEE Veh. Technol. Conf., Stockholm,Sweden, Jun. 2005, vol. 1, pp. 73–77.

4.        COST Action 231, “Digital mobile radio. Towards future generation  systems—Final report” European Communities, Tech. rep. EUR 18957, Ch. 4, 1999.

5.        Ikegami,  F., Yoshida, S., Tacheuchi, T. and Umehira, M.,“ Propagation Factors controlling Mean Field Strength on Urban   Streets”,  IEEE Trans., AP32(8), 822-9, 1984.

6.        “Propagation data and prediction methods for the planning of short-range outdoor radio communication systems and radio local   area networks in the frequency range 300 MHz to 100 GHz,”  International Telecommunication Union, Geneva, Switzerland,   Recommendation  ITU-R P.1411-1, 2001.

7.        V. Erceg et al., “Channelmodels for fixed wireless applications,” IEEE 802.16 Broadband Wireless Access Working Group, Jan. 2001.

8.        Rappaport , Theodore S., “Wireless Communications Principles  and Practice”, second edition, Prentice Hall, 2005.

9.        Ekpenyong, Josheph Isabone and Etim Elcong, ”On Propagation path  Loss Models For 3-G Based Wireless networks: A Comparative   Analysis” Georgian Electronic Scientific journal: Computer Science  and Telecommunications, vol. 2, no. 25, 2010.

10.     Okumura, Y., Ohmori, E., Kawano, T. and Fukuda, K. (1968).  Field   strength and its variability in the VHF and UHF land mobile service,    Review Electronic Communication Laboratories, 16(9/10), pp. 825– 873.

11.     Mardeni,  R, T. Siva Priya, “Optimize Cost231 Hata models for  Wi-MAX path loss prediction in Suburban and open urban   Environments”, Canadian Center of Science and Education, vol. 4, no 9, pp. 75-89,2010.


296-299

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

Sweety V. Batavia

Paper Title:

Real Time Data Warehousing using Dynamic SQL

Abstract:    Data warehouse synchronization is a complex process in heterogeneous database environment. Maintaining the uniformity of data in real-time is a fundamental problem of data synchronization. In this paper we present a methodology to synchronize data warehouse in heterogeneous database environment in almost real-time using dynamic SQL approach. We capture all DML SQL query from source database and pass this to the processing module. Structure and DBMS systems at the source and target could be different; hence it is not possible to execute the source SQL directly into the target. A processing module runs continuously in the back end to read changes and prepare the dynamic SQL by referring the Reference Data. Reference Data acts as heart of the processing module that prepares the dynamic SQL. It specifies the mapping between source and target with all details. Another process executes the SQL query in the target system. If any error is encountered while executing the query in the target, it will be moved to the error processing module where it will be retried after some delay. Our preliminary experimental results evidence the effectiveness of the proposed method.

Keywords:
We capture all DML SQL query from source database and pass this to the processing module.


300-303

65.

Authors:

Z.Nouman, B.Klima, J.Knobloch

Paper Title:

Design and Implementation A Digital Sine-Cosine Generator Based FPGA

Abstract:    This article proposes a new way to generate a sine and cosine waves based FPGA. These signals can be used to generate a PWM signals that can be used in SDR and DSP. It can be used in control system like control DC and AC motors. The problem is how can generate a sine and cosine waves that are composed of the positive and negative part. Any hardware accepts the values 0, 1 and can’t accept the   negative values, we used the mode two’s components of numbers to represent the positive and negative samples and converted these results to decimal numbers, and we shifted a one half wave 8 bit to obtain the wave without distortion. We used MATLAB to generate the data of sine and cosine wave. We saved the data in ROM memory using VHDL language and we applied the results onto board spartan-3A FPGA.

Keywords:
   comparator, counter, sine and cosine generator, lookup table, PWM, rom memory, VHDL.


References:

1.       B. Shoaib, P.Muralidhar “FPGA Implementation of Sine and Cosine Value Generators using Cordic Algorithm for Satellite Attitude Determination and Calculators,” IEEE,conf.ICPCES,2010 Allahabad, Nov.29 2010-Dec.1 2010,pp.1-5, ISBN978-1-4244-8543-7
2.       R.Mehra, B.Kamboj ”FPGA Based of Digital Wave Generator Using CORIC Algorithm, “  Int. J. Comp.Tech. Appl, Vol 1 (1), 54-58.

3.       H.N.Srinivasa Murthy, M.Roopy “FPGA Implementation of Sine and cosine Generators using CORDIC Algorithm,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol.1, Issue.6, November 2012, pp.16-19.
4.       R.F.Tinder, Engineering Digital Design. School of Electrical Engineering and Computer Science, Washington State University, Pullman, Washington 2000, ch.2.

5.       Spartan-3 Generation FPGA User Guide UG331(V1.8) June 13, 2011 available:

6.       M.Zwolinski, Digital System Design With VHDL, British library, Second edition published 2004,pp.143-153  available:

7.       J.Král, Řešené Příklady Ve VHDL .Czech Republic, 30.9.2010, ISBN:978-80-7300-257-2,pp.81-103.

8.       Spartan-3A/3AN FPGA Starter Kit Board User Guide UG334 (V1.1) June 19, 2008 available :

9.       ChipScope Pro Software and Cores User Guide UG029 (V13.3) October, 2012 available:


304-307

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

Firoz Khan, Rajeev Kumar

Paper Title:

Design & Analysis of Rectangular Microstrip Patch Antenna

Abstract:   In this paper the design consideration for the rectangular microstrip antenna is present. The various parameters of rectangular microstrip antenna, input impedance, VSWR, return loss, radiation pattern have been investigated as a function of frequency for different feed locations with a view to optimize the feed location for proper matching and radiations. The proposed antenna is designed at the height of 1.5mm from the ground plane and this design is operated at 1.9GHz. The entire simulation work is done on IE3D software.

Keywords:
   Rectangular Microstrip Antenna, Return   loss.


References:

1.        C. A. Balanis, “Antenna Theory, Analysis and Design,” John Wiley & Sons, New York, 1997.
2.        R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna Design Handbook. Norwood,  MA: Artech House, 2001.

3.        S. Satthamsakul, N. Anantrasirichai, C. Benjangkapraset, and T. Wakabayashi,   ”Rectangular Patch Antenna with inset feed and modifier ground plane for wide band  antennas”, IEEE, Aug, 2008.

4.        J. S. Roy, N. Chattoraj, N. Swain, “New Dual-Frequency Microstrip Antennas for Wireless  Communication.”Proc. Romanian Journal of
Information Science and Tech, vol. 10, no. 1, 2007, 113-119.
5.        Kumar, G. and Ray, K.P., Broadband Microstrip Antennas, Artech House, Inc, 2003.

308-310

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

S.Sundararaman, R.Saravanane, T.Sundararajan

Paper Title:

Treatment of Industrial Analgesic Wastewater by Submerged Membrane Bioreactor

Abstract:   Extensive laboratory investigations were carried out using a commercially available submerged membrane (ZENON make; pore size – 0.04 µm and made of a polymeric material) for studying the treatment efficiency of an industrial pharmaceutical wastewater (obtained from a company manufacturing ‘analgesic’ drug). The bioaugmentation process adopted in the MBR is very effective for the treatment of the pharmaceutical effluent, as evident from the COD removal (%) obtained (ie., 82.5% @ 24 h HRT and 71.47% @ 8 h HRT, at the maximum OLR.

Keywords:
   bioaugmentation, membrane bioreactor, pharmaceutical (industrial) effluent, submerged membrane


References:

1.        Marrot, B., A. Barrios – Martinez, P. Moulin and N. Roche (2004), “Industrial wastewater treatment in a membrane bioreactor: A review”, Environmental Progress, 23 (1),   59 – 68
2.        Sridang, P.C., J. Kaiman, A. Pottier and C. Wisniewski (2006), “Benefits of MBR in sea food wastewater treatment and water reuse: study case in Southern part of Thailand”, Desalination, 200, 712 – 714.

3.        Matošić, M., I. Prstec, H.K. Jakopović and I. Mijatović (2009), “Treatment of beverage production wastewater by membrane bioreactor”, Desalination, 246, 285–293

4.        Zheng, X. and J. Liu (2006), Dyeing and printing wastewater treatment using a membrane bioreactor with a gravity drain, Desalination, 190, 277 – 286.

5.        Yun, MA., KM. Yeon, JS. Park, CH. Lee and J. Chun (2006), “Characterization of biofilm structure and its effect on membrane permeability in MBR for dye wastewater treatment”, Water Research, 40, 45 – 52.

6.        Chang, JS., CY. Chang, AC. Chena, L.Erdei and S. Vigneswaran (2006), “Long-term operation of submerged membrane bioreactor for the treatment of high strength acrylonitrile-butadiene-styrene (ABS) wastewater: effect of hydraulic retention time”, Desalination, 191, 45–51.

7.        Qin, JJ., M.H. Oo, G.Tao and K.A. Kekre (2007), “Feasibility study on petrochemical wastewater treatment and reuse using submerged MBR”, Journal of Membrane Science, 293, 161 – 166.

8.        Ahn, S., S. Congeevaram, YK. Choung and J. Park (2008), “Enhanced phenol removal by floating fungal populations in a high concentration phenol-fed membrane bioreactor”, Desalination, 221, 494 – 501.

9.        Benitez, J., A. Rodriguez and R. Malaver (1995), “Stabilization and dewatering of wastewater using hollow fiber membranes”, Water Research, 29 (10), 2281 – 2286.

10.     Prado, N., J. Ochoa and A. Amrane (2009), “Zero nuisance piggeries: long term performance of MBR (membrane bioreactor) for dilute swine wastewater treatment using submerged membrane bioreactor in semi – industrial scale”, Water Research, 43, 1549 – 1558.

11.     Chen, Z., N. Ren, A. Wang, ZP. Zhang, and Y. Shi (2008), “A novel application of TPAD–MBR system to the pilot treatment of chemical synthesis-based pharmaceutical wastewater”, Water Research, 42, 3385 – 3392.

12.     Chen, ZB., DX. Hu, NQ. Ren, Y. Tian and ZP. Zhang (2009), “Biological COD reduction and inorganic suspended solids accumulation in a pilot- scale membrane bioreactor for traditional Chinese medicine wastewater treatment”, Chemical Engineering Journal, 155, 115 – 122.

13.     Lesjean, B., V. Ferre, E. Vonghia and H. Moeslang (2009), “Market and design considerations of the 37 larger MBR plants in Europe”, Desalination and Water Treatment, 6, 227 – 233.

14.     Bathe, S., N. Schwarzenbeck and M. Hausner (2005), “Plasmid-mediated bioaugmentation of activated sludge bacteria in a sequencing batch moving bed reactor using pNB2”, letters in Applied Microbiology, 41, 242-247.

15.     Fantroussi,S.E. and S.N. Agathos (2005), “Is bioaugmentation a feasible strategy for pollutant removal and site remediation?” Current Opinion in Microbiology, 8, 267-275.

16.     Chang, CY., JS. Chang, S. Vigneswaran and J. Kandasamy (2008), “Pharmaceutical wastewater treatment by membrane bioreactor process – a case study in southern Taiwan”, Desalination, 234, 393–401


311-313

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

M. Ashiquzzaman, Mohiuddin K. Shourav, K. M. Masud Rana

Paper Title:

Feasibility Study of Using Recycled Coarse Aggregate as a Radiation Shielding Material

Abstract:    Radiation shielding is considered as a highly sensitive issue in the department of medical physics. Proper utilization of material in radiation shielding can be effective in terms of economy, durability and safety measure. Concrete is nowadays extensively used as a material for radiation shielding. The coarse aggregate of concrete plays an important role in concrete density where the density is related to the radiation attenuation. In this research, the feasible study has conducted of using the recycled coarse aggregate in radiation shielding. The focus of this paper is to introduce a possible better alternative of fresh aggregate to make the concrete shielding. Two types of recycled aggregates were taken; recycled stone aggregate (RCA) and recycled brick aggregate (RBA). Aggregate material properties were found out at the beginning of the research. As the Brachytherapy unit used in the research, the Cobalt-60 (Co-60) was selected as a source of photon energy. Then the HVL and TVL were measured based on the attenuation of radiation. The study shows that the use of recycled concrete in the radiation shielding is optimistic.

Keywords:
   Recycled coarse aggregate, attenuation coefficient, radiation shielding, Co-60.


References:

1.       M. Ashiquzzaman, SK. B. Hossen, F M Z. Hossain, “Prospect of Using Recycled Concrete as Coarse Aggregate in Bangladesh”, MIST Journal: Galaxy (Dhaka), Vol. 2, No. 1, pp. 07-15, Feb. 2013.
2.       I. Akkurt, C. Basyigit, S. Kilincarslan, B. Mavi, A. Akkurt, “Radiation shielding of concretes containing different aggregates”, Cement & Concrete Composites , Vol. 28, Issue 2, pp. 153–157, Feb. 2006.

3.       James E. Martin, “Physics for Radiation Protection: A Handbook”, WILEY-VCH Verlag GmbH & Co., 2006, ch. 8.

4.       Berger MJ, Hubbell JH. NBSIR 87-3597: Photon cross-sections on a personal computer. National Institute of Standards, Gaithersburg. MD 20899, USA; 1987. Available from:  <http://physics.nist.gov/PhysRefData/Xcom/Text/XCOM.html>

5.       International Atomic Energy Commission: Radiation Protection in the Design of Radiotherapy Facilities, Safety Report Series No. 47, VIENNA, 2006, pp. 104.

6.       Venselaar, Pérez-Calatayud : A Practical Guide To Quality Control of Brachytherapy, ESTRO Booklet No. 8, Brussels, Belgium, pp. 22, 2004.


314-317

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

Matheel E. Abdulmunim, Rabab F. Abass

Paper Title:

Novel Video Denoising Using 3-D Transformation Techniques

Abstract:   Digital videos are often corrupted by a noise during the acquisition process, storage and transmission. It made the video in ugly appearance and also affect on another digital video processes like compression, feature extraction and pattern recognition so video denoising is highly desirable process in order to improve the video quality. There are many transformation for denoising process, one of them are Fast Discrete Wavelet Transform(FDWT) and framelet transform (Double-Density Wavelet Transform) which is a perfect in denoising process by avoiding the problems in the other transformations. In this paper we propose a method named Translation Invariant with Wiener filter (TIW) this method is proposed to solve the shift variance problem  and use this method to denoise a noisy video with Gaussian white noise type.. It is applied with  Two Dimensional Fast Discrete Wavelet Transform(2-D FDWT), Three Dimensional Fast Discrete Wavelet Transform(3-D FDWT), Two Dimensional Double Density Wavelet Transform(2-D DDWT) and Three Dimensional Double Density Wavelet Transform(3-D DDWT). The results show that our (TIW) gives a better denoising results comparative with the original methods.

Keywords:
   Fast Discrete Wavelet Transform,Three Dimensional Fast Discrete Wavelet Transform, Double-Density Wavelet Transform, hard threshod, soft threshold, semisoft threshold, Translation Invariant Wiener filter (TIW).


References:

1.        Guan L., He, Y., and Kung, S.,Y., " Multimedia Image and Video Processing", Taylor & Francis Group, LLC, 2th printing, 2012.
2.        Raiaman A., Krishnaveni, V., and Ferose H. W.," A new denoising approach for the removal of impulse noise from color image and video sequences", Image Anal Stereol, Vol. 31, PP 185-191,  2012.

3.        Zlokolica V.," Advanced Nonlinear Methods for Video Denoising", Ph.D. thesis, Faculteit IngenieurswetenschappenAcademiejaar,2006

4.        Bahendwar  Y., and G.R.Sinha,"A modified algorithm for denoising MRI images of Lungs using discrete wavelet transform ", International Journal of Computer Applications, National Conference on Innovative Paradigms in Engineering & Technology , PP. 29-32 , 2012 .

5.        J.J. Galiana-Merino, J.L. Rosa-Herranz , S. Rosa-Cintas , and  J.J. Martinez-Espla ," SeismicWaveTool: Continuous and discrete wavelet analysis and filtering for multichannel seismic data", Computer Physics Communications,Vol.184, PP. 162-171 , 2013 .

6.        Li  P., Kong,F., He, Q., and  Liu, Y.," Multiscale slope feature extraction for rotating machinery fault diagnosis using wavelet analysis ", Measurement,Vol.46, PP. 497-505 , 2013 .

7.        Burrus  C. S., Goperath, R. A., and Guo, H., "Introduction to wavelet and wavelets transforms", A primer Upper Saddle, NJ (U.S.A.), Prantice Hall, Inc., 1998.

8.        Al-Saraf T.O.K.," Fingerprint Recognition Using 3D Wavelet and 3D Multiwavelet With Neural Network", M.Sc. Thesis, Univ. of Sulayimani, Computer Science,Dep., Dec.2006.

9.        Eristi H., " Fault diagnosis system for series compensated transmission line based on wavelet transform and adaptive neuro-fuzzy inference system ", Measurement,Vol.46, PP. 393-401 , 2013 .

10.     AbdulWahab M.S., " 3D Wavelet-Based Optical Flow Estimation ", Eng. & Technology, Vol.25, No.2,  PP. 299-311 , 2007 .

11.     Geng P., Xianbin,L. Wanhai, Y., Shiqiang,Y.,and Jianhu,L., " A Video Denoising Method Based on Grouping the Similar Blocks and Surfacelet", Research Journal of Applied Sciences, Engineering and Technology, ISSN: 2040-7467Vol. 3 No.,10  PP. 1182-1187 , 2011 .

12.     Al-Taai H. N., " Computationally efficient wavelet based algorithms for optical flow estimation  ", Ph.D.  Thesis, Univ. of Technology, Electrical and electronic engineering,Dep., Oct.2005.

13.     Naher A. K.," A Framelet Based Approach for Image Denoising", M.Sc. Thesis, Univ.  of Technology,Electrical and Electronic Eng.Dep.,July 2008 .

14.     Kadhim W. Q.," Optical Flow Estimation Using Framelet Transform", M.Sc. Thesis, Univ. of Technology, Computer and Information Iechnology Eng.Dep., January 2010.

15.     Goswami J. C., and Chan A. K., "Fundamentals of Wavelets Theory, Algorithms, and Applications", John Willy and Sons, 1999.

16.     Abdulmunim M. E. A., " Color  Image Denoising  Using Discrete Multiwavelet Transform", Ph.D. Thesis, Univ. of Technology, Computer Science and Information Sys. Dep., 2004.

17.     Jakiwer M.J.,"Quantitative Analysis of Denoising SAR Images ", M.Sc. Thesis, Univ. of Technology, Computer Science,Dep., Dec.2003.

18.     Bradley A.B., " Shift-invariance in the Discrete WaveletTransform" Proc. VIIth Digital Image Computing: Techniques and Applications, Sun C., Talbot H., OurselinS. and Adriaansen,Vol.46, PP. 29-38 , Dec. 2003.

19.     Mahmoud, W. A., and Abdulmunim, M. E., " Color Image Denoising Using Local Blocking With Translation-Invariant Multiwavelet Transform ", Eng. and Tech. Journal, University of Technology, Baghdad, Iraq, accepted paper for publication, 2004.


318-324

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

Veeraprathap.V, M.Nagaraja, M.Z.Kurian

Paper Title:

Network Interface Design and Implementation for NoC on FPGA with advanced Hardware and Networking Functionalities

Abstract:   As we are living in a billion transistor era, the number of components on a given chip increases drastically, System on Chip (SoC) architectures become even more powerful. Key to this architecture is the ability to integrate multiple heterogeneous components into a single architecture, which requires modularity and abstraction. An integral part of this architectural design is the methods by which the various components communicate with one another. Network on Chip (NoC) architectures attempt to address these concerns by providing various component level architectures with specific interconnection network topologies and routing techniques. Networks-On-Chip (NoCs) have been proposed as a promising replacement to eliminate many of the overheads of buses and MPSoCs connected by means of general-purpose communication architectures. This paper presents the design and implementation of FPGA based Network on chip (NoC) which is scalable packet switched architecture with advanced Networking functionalities such as store & forward transmission, error management, power management and security. All these features are built on basic NI core, which includes data packetization/depacketisation, frequency conversion, data size conversion and conversion of protocols with limited circuit complexity and cost

Keywords:
  Intellectual Property (IP), Multi-Processor System-on-Chip (MPSoC), Network-on-Chip (NoC), Network- Interface (NI), VLSI Architecture.


References:

1.        Design of a NoC Interface Macrocell with Hardware Support of Advanced Networking Functionalities Saponara, Tony Bacchillone, Esa Petri, Member, IEEE, Luca Fanucci, Member, IEEE,Riccardo Locatelli, and Marcello Coppola
2.        NoC Advantages for SoC Prototyping on Big FPGA BoardsJonah ProbellArteris, Inc jonah@arteris.com

3.        P. S. Paolucci, F. LoCicero, A. Lonardo, M. Perra, D. Rossetti, C. Sidore, P. Vicini, M. Coppola, L. Raffo, G. Mereu, F. Palumbo, L. Fanucci, S. Saponara, and F. Vitullo, “Introduction to the tiled HW architecture of SHAPES,” in Proc. Design, Automation and Test in Europe, 2007,pp. 77–82.

4.        B. A. A. Zitouni and R. Tourki, “Design and implementation of network interface compatible OCP for packet based NOC,” in Proc. 5th Int Design and Technology of Integrated Systems in Nanoscale Era (DTIS) Conf, 2010, pp. 1–8.

5.        T. Tayachi and P.-Y. Martinez, “Integration of an STBus Type 3 protocol custom component into a HLS tool,” in Proc. 3rd Int. Conf. Design and Technology of Integrated Systems in Nanoscale Era DTIS 2008, 2008, pp. 1–4.

6.        “NoC Interface for fault-tolerant Message- Passing communication on Multiprocessor SoC platform,” in Proc. NORCHIP, 2009, pp. 1–6.

7.        “Synthesis of networks on chips for 3D systems on chips,” in Proc. Asia and South Pacific Design Automation Conf. ASP-DAC 2009, 2009, pp. 242–247.

8.        “Efficient 2DMesh Network on Chip (NoC) considering GALS approach,” in Proc. Fourth Int. Conf. Computer Sciences and Convergence Information Technology ICCIT ’09, 2009, pp. 841–846.


325-330

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

71.

Authors:

Dushyant Pande, Sanjeev Gaba

Paper Title:

Measurement and Transmission of Atmospheric Parameters Using Radio Frequency Communication

Abstract:   The measurement of various atmospheric parameters is of outmost importance, not only for the weather forecasting process but also for future references. A smart, robust and cheap system is implemented which can not only measure the various atmospheric parameters like light, temperature, humidity, wind speed and atmospheric pressure but can also transmit the acquired data to a personal computer using radio frequency based wireless communication. This paper proposes the design and development of such system. The system can be considered to be consisting of two modules. One is the transmitter module and the other is receiver module. The use of microcontroller and various sensors make the system operational in real time. The acquired data is displayed on the transmitting terminal with the help of a LCD and on the personal computer with the help of a customized Visual Basic interface.

Keywords:
   Atmospheric parameters, Radio frequency transmission, Sensors, Visual basic, Weather monitoring.


References:

1.       Muhammad Ali Mazidi and Janice Gillispe Mazidi, “The 8051 microcontroller and embedded systems”, Pearson education ltd., India, 2007.
2.       G.S. Nhivekar, R.R.Mudholker, “Data logger and remote monitoring system for multiple parameter measurement applications”, e -Journal of Science & Technology (e-JST)      

3.       Cholatip Yawut and Sathapath Kilaso,2011, “A Wireless Sensor Network for Weather and Disaster Alarm Systems”, International Conference on Information and Electronics Engineering IPCSIT Volume.6, IACSIT Press, Singapore

4.       Khalid Parveez, “A Smart Zigbee Based Wireless Weather Station Monitoring System” , International Conference on Computing and control Engineering (ICCCE 2012), 12 and 13 April 2012

5.       Izzatdin Abdul Aziz, “Remote Monitoring in Agricultural Greenhouse Using Wireless Sensor and Short Message Service (SMS)”, International Journal of Engineering & Technology IJET Vol: 9 No: 9 

6.       Goswami, T. Bezboruah  and K.C.Sharma, 2009, “Design of An Embedded System For Monitoring and Controlling Temperature and Light”, International Journal of Electronic Engineering Research Volume 1 Number 1

7.       www.microchip.com

8.       http://www.vbtutor.net/


331-335

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

72.

Authors:

Anju

Paper Title:

Performance Comparison of Vedic Multiplier and Booth Multiplier

Abstract:    The performance of the any processor will depend upon its power and delay. The power and delay should be less in order to get a effective processor. In processors the most commonly used architecture is multiplier. If the power and delay of the multiplier is reduced then the effective processor can be generated. In this paper Vedic Multiplier and Booth Multiplier are implemented on FPGA and comparative analysis is done. The Comparison of these Architectures are carried out to know the best architecture for multiplication w. r. t. power and delay characteristics. The designs are implemented using VHDL in Modelsim  10.1 b and  synthesis is done in  Xilinx 8.2i ISE.    

Keywords:
   Urdhva Tiryagbhyam, Vedic multiplier, Booth multiplier, Xilinx.


References:

1.       Ravindra P Rajput, M. N Shanmukha Swamy, ''High Seed Modified Booth Encoder multiplier for signed and unsigned numbers'',  14th Internaitonal Conference on Modeling and simulation, 2012 IEEE, pp. 649-654. 
2.       Rashmi K. Lamte and Prof. Bhasker, "Speedy Convolution using Vedic Mathematics", International Journal of Recent Trends in Engineering and Technology, Vol-05, No-01, March 2011.

3.       Jagadeshwar Rao M, Sanjay Dubey,  "A high speed and Area Efficient Booth Recoded Wallace tree Multiplier for fast Arithmetic Circuits,"  Asia Pacific Conference  on postgraduate Research in Microelectronics & Electronics (PPIM EASIA) 2012.  

4.       Ch. Harish Kumar "Implementation and Analysis of Power, Area and Delay of Array Urdhava, Nikhilam Vedic Multipliers, " Internatinal Journal of Scientific and
Research Publications, Volume 3, Issue 1 January 2013, ISSN 2250 – 3153.

5.       Nidhi Mittal, Abhijeet Kumar, "Hardware Implementation of FFT using vertically and crosswise Algorithm", International Journal of Computer Application (0975-8887), Volume-35- No-1, December 2011.

6.       L. Sriraman, T.N. Prabakar.'' Design and Implementation of two variable Multiplier using KCM and Vedic Mathematics, 1st International Conference on Recent Advances in Information Technology 2012 IEEE. 

7.       H. Thapliyal, M. B. Srinivas and H. R. Arabnia , "Design And Analysis of a VLSI Based High Performance Low Power Parallel square Architecture", in Proc. Int. Conf. Also. Math. Compo. Sc., Las Vegas, June 2005, pp. 72-76.

8.       Vinoth, C. Bhaaskaran, V.S.K. Brindha, B. Sakthikumarna, S. Kavinilavu, V. Bhaskar, B. Kanagaasabapathy, M. and Sharath, B. "A novel low power and high speed Wallace tree multiplier for RISC Processer,'' 3rd International Conference on Electronics Computer Technology (ICECT), 2011, Vol-1,April 2010,pp. 8-10 .

9.       Chen Ping-hua and Zhao Juan, "High-Speed Parallel 32x32-bit Multiplier Using a Radix-16 Booth Encoder", Third International Symposium on intelligent Information Technology Application Wrokshops, 2009. IITAW 09, pp.406-409, 21-22 Nov. 2009.

10.     Swami Bharati Krshna Tirthaji, Vedic Mathematics. Delhi: Motilal Banarsidass Publishers, 1965.

11.     Asmita Haveliya "A Novel Design for High Speed Multiplier .for Digital Signal Processing Applications (Ancient Indian Vedic mathematics approach)" International Journal of Technology And Engineering System(IJTES):Jan - March 2011- Vo12 .No. l.

12.     Harpreet Singh Dhillon and Abhijit Mitra "A Digital Multiplier Architecture using Urdhava Tiryakbhyam Sutra of Vedic Mathematics" IEEE Conference Proceedings,2008.

13.     Parth Mehta, Dhanashri Gawali "Conventional versus Vedic mathematical method for Hardware implementation of a multiplier" 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

14.     Himanshu Thapliyal, S. Kotiyal and M.B. Srinivas, "Design and Analysis of a Novel Parallel Square and Cube Architecture Based on Ancient Indian Vedic Mathematics", Proceedings on 48th IEEE International Midwest Symp-osium on Circuits and Systems (MWSCAS 2005)

15.     Shamim Akhtar, "VHDL Implementation of Fast NxN multiplier Base on Vedic Mathematics," Jaypee Institute of Information Technology University, Noida, 2011307 U.P, India, 2007 IEEE.

16.     Pushpalata Verma, K.K. Mehta, ''Implementation of an efficient multiplier based on Vedic Mathematics using EDA Tool'', International Journal of Engineering and Advance Technology (IJEAT) ISSN : 2249-8958, volume-1, Issue -5, June 2012.


336-339

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

73.

Authors:

Gopi K.R, Mohandas K.N, Reddappa H.N, M.R. Ramesh

Paper Title:

Characterization of As Cast and Heat Treated Aluminium 6061/Zircon sand/Graphite Particulate Hybrid Composites

Abstract:    The present investigation has been focused on the development of hybrid composite involving aluminium matrix reinforced with particulates of Zircon sand and graphite (produced by stir casting technique), the cast composites were tested for hardness, wear characteristics and the obtained properties were correlated with the microstructure. The results of the present investigation indicate that there is a considerable improvement in the hardness valves, microstructure and resistance for wear.

Keywords
:   Aluminium 6061, Zircon sand, Graphite


References:

1.        Sanjeev Das V. Udhayabanu S. Das: “Synthesis and characterization of   zircon sand/Al-4.5 wt% Cu composite produced by stir casting route” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, J Mater Sci (2006) 41:4668–4677.
2.        J.S.S. Babu a, C.G. Kang b, H.H. Kim: “Dry sliding wear behavior of aluminium based hybrid composites with graphite nanofiber–alumina fiber” Engineering Research Center (NSDM), Pusan National University, Busan, South Korea, Materials and Design 32 (2011) 3920–3925.

3.        Sanjeev Das, S. Das, K. Das: “Ageing behavior of Al–4.5 wt% Cu matrix alloy reinforced with Al2O3 and ZrSiO4 particulate varying particle size” J Mater Sci (2006) 41:5402–5406.

4.        Sanjeev das, Karabi das and Siddhartha das: “Abrasive Wear Behavior of Al-4.5 wt% Cu/(Zircon Sand + Silicon Carbide) Hybrid Composite” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, Journal of composite materials, Vol. 43, No. 22/2009.

5.        S. Suresha and B.K. Sridhara: “Wear characteristics of hybrid aluminium matrix composites reinforced with graphite and silicon carbide particulates” Department of Mechanical Engineering, The National Institute of Engineering, Mysore, Composites Science and Technology 70 (2010) 1652–1659.

6.        Sanjeev Das, Siddhartha Das, Karabi Das: “Abrasive wear of zircon sand and alumina reinforced Al–4.5 wt%Cu alloy matrix composites” Department of Metallurgical and Materials Engineering, Indian Institute of Technology, Kharagpur, Composites Science and Technology 67 (2007) 746–751.


340-344

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

74.

Authors:

Simon Muhič, Milan Šturm, Mitja Mazej

Paper Title:

Numerical and Experimental Validation of Low Exergy System for Heating and Cooling Of Residential Buildings