International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02| UGC Approved Journal
Home
Aims and Scope
Instructions for Authors
Call for Papers
Editorial Board
Archive
Conferences
Publication Fee
Download
FAQ
Contact Us
Volume-3 Issue-2 Published on December 30, 2013
22
Volume-3 Issue-2 Published on December 30, 2013
 Download Abstract Book

S. No

Volume-3 Issue-2, December 2013, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Parveen Sharma

Paper Title:

Wheel Modification of a Wheel Type Stair Climber

Abstract:    This article deals with the designing and manufacturing of a Stair Climber, considering the aspect of wheel modification .Stair climber is the vehicle which can climb stair or move along very rough surface. The technical issues in modification of wheels of this vehicle are the stability and speed of the vehicle while climbing stairs. However, the steepness of the stairs is also the important concern of this study. The uses of this special vehicle are in the frequent lift of goods such as books for library, medicines for hospital, regular mails for any institutes, or transportation of any toxic material for industries and give freedom to the retarded person or paralyzed patients to move anywhere over flat surface as well as stairs. Wheel of Stair Climber is modified on the basis of Different criteria like strength, cost, and mobility etc. using complete product design approach. Different types of Stair Climbers are analysed like Legged Stair climber, Wheeled Stair Climber and tracked Stair Climber .On the basis of different criteria it was find out that wheeled Stair climber is better than other Stair climbers. Pugh chart is used for selection of best concept for different wheel climbers. Using of this vehicle, the labour cost can be reduced as well less power is consumed for lifting of heavy loads. Moreover, considering some drawbacks due to lack of implementation of all techniques during manufacturing phase the test and trial run showed considerably significant and encouraging results that might help the future researchers to incorporate a gear box and steering mechanism to make the vehicle more versatile..

Keywords:
  Stair climbing vehicle, Tri Lobe Wheel, Pugh Chart.


References:

1.       Loper: A Quadruped-Hybrid Stair Climbing Robot:- Sam D. Herbert, Andrew Drenner, and NikolaosPapanikolopoulos ,Department of Computer Science and Engineering University of Minnesota Minneapolis, MN 55455 2008 IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 2008.
2.       Wheeled robot with hooping mechanism Koki Kikuchi, Naoki Bushida, Keisuke Sakaguchi, Yasuhiro Chiba,Hiroshi Otsuka, Yusuke Saito, Masamitsu Hirano and Shunya Kobayashi, Chiba institute of technology japan

3.       Octopus : an autonomous wheeled climbing robot M. Lauria , Y. Piguet and R. Siegwart Autonomous Systems Laboratory Swiss Federal Institute of Technology (EPFL) 1015  Lausanne, Switzerland.

4.       Murray John LAWN Dissertation submitted to the faculty of Mechanical Systems Engineering For the Degree of Doctor of Philosophy Graduate School of Marine Science and Engineering Nagasaki University, Nagasaki City, Japan December 2002

5.       International Journal of Computer and Electrical Engineering, Vol. 3, No. 3, June 2011 design and implementation of stair climbing robot for rescue application Basil Hamed.

6.       Trajectory planning for stair climbing in the leg wheel hybrid mobile robot quattroped Shen-Chiang Chen, Ke Jung Huang, Cheng-Hsin Li, and Pei-Chun Lin 2011 IEEE international conference on robotics and automation shanghai international conference center may 9-13, 2011, shanghai, china

7.       UNIVERSITY OF OKLAHOMA GRADUATE COLLEGE   AUTONOMOUS STAIRCLIMBING WITH A MOBILE ROBOT A THESIS SUBMITTED TO THE GRADUATE FACULTY :-In partial fulfillment of the requirements for the Degree of MASTER OF SCIENCE By MICHAEL FAIR Norman, Oklahoma 2000.

8.       A Fuzzy control based stair climbing service robot :-Ming-Shyan Wang department of electrical engineering , southern Taiwan university, Taiwan, R.O.C.

9.       Stable Stair Climbing in a Simple Hexapod Robot:- E. Z. Moore and M. Buehler  Ambulatory Robotic Lab, Centre for Intelligent Machines, McGill University Montreal, QC, H3A 2A7, CANADA

10.     Design Modification and Manufacturing of Rover Type Stair Climbing Vehicle DEPARTMENT OF MECHANICAL ENGINEERING MILITARY INSTITUTE OF SCIENCE AND TECHNOLOGY DHAKA, BANGLADESH May, 2012.


1-4

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

A.M.Balaji Venkatesh, Karthik Kalkura, Shriraam A.C

Paper Title:

Student Locker Protection Using RFID Tag & Reader

Abstract:   Student lockers are something very common and essential in an educational institution. A student keeps all his valuables inside the locker, and the protection of it is an essential aspect in the design of student lockers. A student not only stores his material valuables, but can also keep his intellectual ideas like research prototypes and important project papers. Some the student’s wouldn’t have obtained patent to his work when lost will be a huge loss in his career. These kind of theft can’t be neglected and we have planned a project on the prevention of these thefts. This Project is designed to enable security to student locker in educational institutions using RFID tags and Zigbee protocol to create electronic locks and password protected. The locker can be opened by the authorized individuals. To ensure this, the system uses RFID reader which is placed in the locker and the corresponding tags are given to the authorized individuals. Then using wireless Zigbee protocol the values are compared with the database and the lock is opened using a random password. When someone unauthorised tries to access the locker a message is intimated to the owne

Keywords:   PIC Controller, Random Number Generation algorithm RFID, Zigbee


References:

1.        Ali Mousavi, Mohammad A. Rajabi and Mohammad Akbari. Design and Implementation of a GSM Based Automatic Vehicle Location System[J].Computational Science and Its Applications – ICCSA 2009,Pages 533-542
2.        Dexter H. Hu and Cho-Li Wang.GPS-Based Location Extraction and Presence Management for Mobile Instant Messenger[M].Lecture Notes in Computer Science, 2007, Volume 4808, Embedded and Ubiquitous Computing, Pages 309-320

3.        Wang Mingji and Zhu Ailing Design of the Electronic locks controlled cash box on the logistics vehicle based on GPS


5-7

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Parveen Kumar, Harsh Raghuvanshi

Paper Title:

Design & Analysis of a Spur Gear in different Geometric Conditions

Abstract:    This paper present the designing of the spur gear on different geometric conditions and finding the effect of these on tooth load like by changing the concentration of SIC in SIC based aluminium gear.Addition of SIC increases the strength of Spur Gear.Effect is also analyzed by changing the modules of the gear and by changing the tooth width. Tooth load is calculated with help of Lewis equation & dynamic tooth load is calculated with help of Buckingham equation. Static analysis of the gear is done to find the Von-mises stress on the tooth of the gear in while meshing.

Keywords:
   Buckingham equation, Lewis equation, Module, PTC Creo


References:

1.       B.Venkatesh, V.Kamala2, A.M.K. Prasad3Parametric Approach to Analysis of Aluminum alloy Helical gear for High Speed Marine ApplicationsVol.1, Issue1, pp-173-178
2.       J.A. Wright, et al, Design, development and application of new, high-performance gear steels,  Gear technology(2010),pp 46 –53[2]Rao, C.M., and Muthuveerappan G., Finite Element

3.       Modeling and Stress Analysis of Helical Gear, Teeth, Computers & structures, 49,pp.1095-1106, 1993.

4.       Marappan, S. and Venkataramana, 2004,ANSYS Reference Guide., CAD CENTRE, India

5.       PSG, 2008.Design data, KalaikathirAchchagampublishers, Coimbatore, India

6.       Shigley, J.E. and Uicker,J.J,Theory of machines and mechanisms,McGraw Hill, 1986.

7.       R.S. KHURMI and J.K. GUPTA,Theory of machine , S. Chand publications, Edition 16 reprint (2008), pp.382-397.

8.       “Machine Design” by S.Md.Jalaludeen,AnuradhaPublications(2009).

9.       “Design Data Hand Book for Mechanical Engineers”By K.Mahadevan&K.Balaveera Reddy


8-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Sheeba O., Nikki Vinayan

Paper Title:

Image Segmentation and Analysis in the Case Study of Macular Degeneration Using Labview

Abstract:    Computer assisted analysis of retinal images to diagnose Age Related MacularDegeneration (AMD) requires the quantification of drusen deposits in human retina. Age-related macular degeneration is a disease associated with aging that gradually destroys sharp, central vision. An increase in the size or number of drusen raises a person's risk of developing advanced AMD. These changes can cause serious vision loss. Incorporation of image processing technologies in the field of ophthalmology presents a wide range of possibilities when there is a demand for improving the quality of medical care. An automated and reliable method for finding the drusen exudates has been developed using retinal image analysis. The retinal images are enhanced and morphological operations done so as to segment drusen areas that differ slightly from the background. The software Vision Assistant of Lab VIEW is used for the automatic detection and mapping of drusen deposits in the retinal images. The result is the display window which helps the doctor to make the accurate diagnosis or get information regarding the efficacy of the treatment very faster during the course of the disease.

Keywords:
  Macular Degeneration, Drusen, Image segmentation, Histogram equalization, Mathematical morphology.


References:

1.        Green R.W, Histopathology of age related macular degeneration. (Molec.Vis.27-36, 1999).
2.        Sheeba.O,Dr.Sukeshkumar.A Image Analysis for the detection of Drusen Deposits on Human Retina. National Conference on Industrial Automation - Emerging Trends 21 & 22 Jan 2005. Easwari Engg.College , Chennai.

3.        Sheeba.O, Dr.Sukeshkumar.A, Dr.Mahesh.G Processing of Retinal images in Age Related Macular Degeneration. National conference on Bioinformatics Computing (NCBC ?05) field 18-19 March 2005. Deemed university, Patiala.

4.        Dr.Mahesh.G.,Dr A.Giridhar, Sheeba.O, Dr.Sukeshkumar Drusen Segmentation - Validation and Analysis of Fellow Eyes of End stage Wet Age Related Macular Degeneration. First Conference of Opthalmic Association of South India and Srilanka and l 32 nd Annual Conference of Kerala Society of ophthalmic surgeons. NOV
25,26,27 2005.

5.        Otsu Nobuyuki "A threshold Detection Method from gray level histograms",vol.SMC-9,no.1, January 1979.

6.        Kirkpatrick JNP, Spencer T, Manivannan A., et al., Quantitative image analysis of macular drusen from fundus photographs and scanning laser ophtalmoscope images Eye,9,48-55,1995.

7.        Morgan WH., Cooper RL. Constable IJ, Eikelboom RH., Automated extraction and quantification of macular drusen from fundal photographs. Aust NZJ Opthalmology,22,7-12 (1994).

8.        Peli E., Lahav M., Drusen measurements from fundus photographsusing computer image analysis, Opthalmology 1986,93,1575-80 (1986).

9.        Evans J.R. (2001) Risk factors for age related macular degeneration. Prog. Retin.Eye.Res.20, 227-253.

10.     Gonzalez R.C.,Woods R.E . "Digital Image Processing", 1993.

11.     George C Panayi, Alan C Bovik and Umesh Rajasheka "Image Processing for Everyone" www.cns.nyu.edu/~umesh/publications/2000/ SP_edu_2000_labview.pdf?


14-17

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Pankaj Chejara, Urvashi Garg, Gurpreet Singh

Paper Title:

Vulnerability Analysis in Attack Graphs Using Conditional Probability

Abstract:    Computer networks have become an essential part of almost every organization. These organizations spend a lot of time and money to secure their networks from intruders and attackers. As the need of computers increased, need for network security increased correspondingly. Attackers are always trying to find weakness in network which can be used to break into the network known as vulnerability. So network administrator needs to patch vulnerabilities to thwart attacker from achieving their goal. As new vulnerability are discovered daily, it is very hard to patch every vulnerability in network but if riskier vulnerabilities get patched, risk level can be reduced significantly. Vulnerability score gives insight into the behavior of vulnerability. These scores make security analyst's work easier to some extent. But these scores do not include collective effect of vulnerabilities. A number of vulnerability scanners are available, which provide complete vulnerability details about host. These vulnerability details give analyst a good idea about to which extent the network security can be compromised, but does not give complete view of network vulnerability. Attack graph provides solution to this problem. Attack graph is set of nodes and edges where node represents attacker's state and edge represent possible transition among attacker's state. This technique gives path that can be followed by attacker to gain network's resources. In the network attack graph depict how vulnerability affect network in conjunction with other vulnerabilities. Some vulnerability may not be riskier alone but when chained with some other, it can compromise the security of network. These attack graphs are important security tools to find out such vulnerabilities also. In this paper, we have developed an technique to provide scores to each path in attack graph so as to analyze, which path is to be patched first to remove the risk of attack. These scores are based on conditional probability method.

Keywords:
   Attack Graphs, Attack Model, Vulnerability Score, Attack Sequence


References:

1.       Sushil Jajodia and Steven Noel, “Topological Vulnerability Analysis. A Powerful New Approach For Network Attack Prevention, Detection and Response”, World Scientific Press, 2007.
2.       Nirnay and S K ghosh., “ An approach for Security Assessment of Network Configurations Using Attack Graph”,  IEEE Conference on network and communication , 2009, pp. 283-288.

3.       Cynthia Phillips and Laura Painton Swiler. Nspw '98, “ Proceedings of the 1998, Workshop on New Security Paradigms”,  ACM Transaction Program on Language System, 1999.

4.       Richard Lippmann, Oleg Sheyner and Somesh Jha, “ Automated Generation and Analysis of Attack graph”,  IEEE Symposium on Security and Privacy , 2002, pp.  273-284.

5.       Pavan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, and Fernando Nino, “Evolving Gaming Strategies for Attacker-Defender in a Simulated Network Environment”,  IEEE International Conference on Privacy, Security, Risk and Trust , 2010, pp. 889-896.

6.       Wyss, Schriner and T Gaylor, ” Probabilistic Logic Modeling of Hybrid Network Architectures” , IEEE Conference on Local Computer Networks, 1996, pp. 404-413.

7.       Urvashi Garg, “Attack Graphs for Cyber Warfare”,  Unpublished master’s thesis, Malaviya National Institute of Technology, Jaipur, India.

8.       Cve Details, Available:  http://www.cve.mitre.org/.

9.       CVSS, Available: http://www.first.org/cvss/.

10.     Nessus,  Available: http://www.nessus.org/.

11.     NuSMV,  Available:  http://nusmv.fbk.eu/.

12.     NetSPA, Available: http://dspace.mit.edu/handle/1721.1/29899.


18-21

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Medhat Awadall, Afaq Ahmad, Samir Al-Busaidi 

Paper Title:

Min–min GA Based Task Scheduling In Multiprocessor Systems

Abstract:    An efficient assignment and scheduling of tasks of a multiprocessor system is one of the key elements in the effective utilization of multiprocessor systems. This problem is extremely hard to solve, consequently several methods have been developed to optimally tackle it which is called NP-hard problem. This paper presents two new approaches, Modified List Scheduling Heuristic (MLSH) and enhanced genetic algorithm by constructing promising chromosomes.  Furthermore, this paper proposes three different representations for the chromosomes of the genetic algorithm: Min-min task list, processor list and combination of both. Extensive simulation experiments have been conducted on different random and real-world application graphs such as Gauss-Jordan, LU decomposition, Gaussian elimination and Laplace equation solver problems. Comparisons have been performed with the most related algorithms, LSHs, Bipartite GA (BGA) and Priority based Multi-Chromosome (PMC). The achieved results show that the proposed approaches significantly surpass the other approaches in terms of task makespan and processor efficiency.

Keywords:
   Multiprocessors, Task scheduling, Genetic algorithm, Makespan, Parallel and distributed system, List Scheduling Heuristic


References:

1.        Garshasbi, M. S. and Mehdi, E., "Tasks Scheduling on Parallel Heterogeneous Multi-processor Systems using Genetic Algorithm", International Journal of Computer Applications, Volume 61 - Number 9, 2013, pp. 23-27
2.        Hwang, R., Gen, M., Katayama, H., "A comparison of  multiprocessor task scheduling algorithms with communication costs", Computers and Operations Research, Vol. 35, No. 3, pp. 976-993, 2008.

3.        Ye Xu, Ling Wang, Shengyao Wang and Min Liu. "An effective immune algorithm based on novel dispatching rules for the flexible flow-shop scheduling problem with multiprocessor tasks". Int J Adv. Manufacturing , 2012

4.        Bonyadi M. and Moghaddam, M.,"A bipartite genetic algorithm for multi-processor task scheduling", International Journal of Parallel Programming, Vol. 37, No. 5, 2009, pp. 462-487.

5.        Orhan Engin, Gül?ad Ceran, Mustafa K. Yilmaz. "An efficient genetic algorithm for hybrid flow shop scheduling with multiprocessor task problems". Applied Soft Computing Volume 11, Issue 3, 2011, PP. 3056-3065.

6.        Jasbir, Gurvinder, "Improved Task Scheduling on Parallel System using Genetic Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 39- No. 17, February 2012

7.        Oncan T., " A Genetic Algorithm for the Order Batching Problem in Low-Level Picker-to-Part Warehouse Systems", Proceedings of The International MultiConference of Engineers and Computer Scientists 2013, pp. 19-24.

8.        Katanosaka, T., Sato H., Oyama S. and Kurihara M., "A Preference Search System Using an Interactive Genetic Algorithm", Proceedings of The International MultiConference of Engineers and Computer Scientists 2013 , pp. 66-69.

9.        Dai, M., Tang C., and Chuang C. (2013). "An Energy-Aware Workload Dispatching Simulator for Heterogeneous Clusters", Proceedings of the International MultiConference of Engineers and Computer Scientists 2013 Vol I, IMECS 2013, March 13 - 15, 2013, Hong Kong.

10.     Nissanke, N., Leulseged, A., Chillara, S., "Probabilistic performance analysis in multiprocessor scheduling", Journal of Computing and Control Engineering, Vol. 13, No. 4, 2002, pp. 171-179.             

11.     R., Rahimi Azghadi,M., Hashemi, S., Ebrahimi Moghadam, M., "A hybrid multiprocessor task scheduling method based on immune genetic algorithm" Qshine 2008 Workshop on Artificial Intelligence in Grid Computing 2008.

12.     Corbalan, J., Martorell, X., Labarta, J., "Performance-driven processor allocation", IEEE Transactions on Parallel and Distributed Systems, Vol. 16, No. 7, 2005, pp. 599-611.

13.     ReaKook H., Mitsuo G. and Hiroshi K., "A Performance Evaluation of Multiprocessor Scheduling with Genetic Algorithm". ReaKook Hwang et al./Asia Pacific Management Review (2006) 11(67-72).

14.     Hwang RK, Gen M., "Multiprocessor scheduling using genetic algorithm with priority-based coding", Proceedings of IEEJ conference on electronics, information and systems, 2004

15.     Montazeri, F., Salmani-Jelodar, M., Fakhraie, S.N., Fakhraie, S.M., "Evolutionary multiprocessor task scheduling", Proceedings of the International Symposium on Parallel Computing in Electrical Engineering (PARELEC'06) 2006.

16.     Kamaljit Kaur, Amit Chhabra and Gurvinder Singh, "Modified Genetic Algorithm for Task Scheduling in Homogeneous Parallel System Using Heuristics", International Journal of Soft Computing, Vol. 5, No. 2, 2010, pp. 42-51.

17.     Wu, A.S., Yu, H., Jin, S., Lin, K.-C., Schiavone, G., "An incremental genetic algorithm approach to multiprocessor scheduling", IEEE Transactions on Parallel and Distributed Systems, Vol. 15, No. 9, 2004, pp. 824-834.

18.     G.Padmavathi and S.R.Vijayalakshmi, "Multiprocessor scheduling for tasks with priority using GA", International Journal of Computer Science Issues, IJCSI, Vol. 7,
No. 1, 2010, pp. 37-42.

19.     Moore M., "An accurate parallel genetic algorithm to schedule tasks on a cluster", Parallel and Distributed Systems, Vol. 30, No. 5-6, 2004, pp. 567-583.

20.     Yao W, You J, Li B., "Main sequences genetic scheduling for multiprocessor systems using task duplication", Microprocessors and Microsystems, Vol. 28, No 2, 2004, pp. 85-94.

21.     Ceyda O, Ercan M "A genetic algorithm for multiprocessor task scheduling. In: TENCON 2004. IEEE region 10 conference, Vol. 2, 2004, pp. 68-170

22.     Cheng S, Huang Y "Scheduling multi-processor tasks with resource and timing constraints using genetic algorithm", IEEE international symposium on computational intelligence in robotics and automation, Vol. 2, 2003, pp 624-629.

23.     Zhong, Y.W., Yang, J.G., "A genetic algorithm for tasks scheduling in parallel multiprocessor systems". In: Proceedings of the Second International Conference on Machine Learning and Cybernetics, 2003, pp. 1785-1790

24.     Kamaljit Kaur, Amit Chhabra, Gurvinder Singh, "Heuristics Based Genetic Algorithm for Scheduling Static Tasks in Homogeneous Parallel System", International Journal of Computer Science and Security, Vol. 4, No.2, 2010, pp. 149-264

25.     Fatma A. Omara, Mona M. Arafa, "Genetic algorithms for task scheduling problem", Journal of Parallel and Distributed Computing, Vol. 70, No.1, 2010, pp. 13-22.

26.     Probir Roy, Md. Mejbah Ul Alam and Nishita Das, "Heuristic based task scheduling in multiprocessor systems with genetic algorithm by choosing the eligible processor",  International Journal of Distributed and Parallel Systems (IJDPS) Vol. 3, No. 4, July 2012.

27.     Amit Bansal and Ravreet Kaur, "Task Graph Scheduling on Multiprocessor System using Genetic Algorithm", International Journal of Engineering Research & Technology (IJERT), ISSN: 2278-0181, Vol. 1 Issue 5, July - 2012.

28.     Afaq Ahmad, Sayyid Samir Al-Busaidi, Mufeed Juma Al-Musharafi "On Properties of PN Sequences generated by LFSR - a Generalized Study and Simulation Modeling", Indian Journal of Science and Technology (IJST), vol. 6, no. 10, pp. 5351-5358, 2013.

29.     Ahmad, A.  Al-Busaidi, S. S., Al Maashri, A., Awadalla, M., Rizvi, M. A. K., Mohanan, N., (2013) "Computing and Listing of Number of Possible m-Sequence Generators of Order n", Indian Journal of Science and Technology (IJST), vol. 6, no. 10, pp. 5359-5369, 2013

30.     Ahmad, A., and Bait-Shiginah, F., "A Nonconventional Approach to Generating Efficient Binary Gray Code Sequences", IEEE Potentials, vol. 31, no. 3, pp. 16-19, 2012

31.     Ahmad, A., Dawood Al-Abri, "Design of an Optimal Test Simulator for Built-In Self Test Environment", Journal of Engineering Research, vol. 7, no. 2, pp. 69 - 79, 2010 

32.     Ahmad, A., and Mohammed M. Bait Suwailam, "A Less Complex Algorithmic Procedure for Computing Gray Codes", The Journal of Engineering Research, vol. 6, no.
2, , pp. 12 -19, 2009

33.     Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., "A new algorithmic procedure to test m-sequences generating feedback connections of stream cipher's LFSRs", Proceedings IEEE conference on electrical and electronic technology (TENCON'01), Singapore, August 19 - 22, 2001, vol. 1, pp. 366 - 369

34.     Ahmad A., "Achievement of higher testability goals through the modification of shift register in LFSR based testing," International Journal of Electronics (UK), vol.  82, no. 3, pp. 249-260, 1997

35.     Ahmad A. and Elabdalla A. M., "An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences", Computer & Electrical Engineering - An Int'l Journal (USA), vol. 23, no. 1, pp. 33-39, 1997

22-31

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Marek Ondruška

Paper Title:

Architecture Exception Governance Reference Model - Togaf Framework Extension

Abstract:    The paper proposes an extension for architecture framework Togaf. In particular, it addresses on architecture exceptions and their governance. The article covers a reference model for architecture exception governance (AEG RM) and the way how to integrate it with Togaf Framework. As part of AEG RM there is defined an entity called architecture exception with its main attributes. AEG RM defines all the processes necessary for architecture exception governance, roles and responsibilities, principles a procedures and supporting tools. There is one chapter dedicated only for integration of Togaf and AEG RM. As summary, the paper has two main focuses. The first one is to present architecture exception governance reference model. The second is to integrate the reference model with Togaf architecture Framework. The article requires at least basic knowledge in architecture governance and architecture framework Togaf.

Keywords:
   Architecture, Exception, Governance, Reference Model, Togaf.


References:

1.       ISO. IEEE Recommended Practice for Architectural Description of Software-Intensive Systems. 2000. Retrieved from http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=875998
2.       Marks, E.A. Service-Oriented Architecture Governance for the Services Driven Enterprises, John Wiley & Sons. 2008.

3.       Oracle. SOA Governance: Framework and Best Practices. Retrieved fromhttp://www.oracle.com/us/technologies/soa/oracl e-soa-governance-best-practice-066427.pdf

4.       The Open Group. SOA Governance Framework. 2009. Retrieved from http://www.opengroup.org/projects/soa-governance/uploads/40/19263/SOA_Governance_Architecture_v2.4.pdf

5.       The Open Group. TOGAF Version 9.1. The Open Group. Retrieved from  http://pubs.opengroup.org/architecture/togaf9-doc/arch/

6.       Weill P., Ross J.W. IT Governance: How Top Performers Manage IT Decision Rights for Superior Results. Harvard Business School Press. 2004.


32-36

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Abdolvahab Agharkakli, Digvijay Pradip Wagh

Paper Title:

Linear Characterization of Engine Mount and Body Mount for Crash Analysis

Abstract:    This study summarizes the methodology to find the linear mount characteristics with the help of mathematical models and comparison of these results with results from MATLAB simulations. The mounts are treated at the component level, and mathematical models for the same are evaluated to get the required characteristics. The mounts are modelled as spring and damper system subjected to impact loading that occurs during crash events. The approximation of input pulse has been described mathematically, which then serves to find the characteristics of the mounts. The change in the characteristics of mounts with the change in the velocity of impact has also been studied.

Keywords:
   Engine Mount, Body Mount, Vibration and Harshness (NVH), Crash Pulse Approximation


References:

1.       R. C. Puydak and R. S. Auda, A design approach for    achieving optimum dynamic properties in elastomeric cab and body mounts. Polymer Labs,Enjay Labs. Div.,Esso Res. and Engrg. Co. SAE transactions, paper no. 660439, 1966.
2.       Matthew Huang, G. P. Lawson, B. K. Powell, J. H. Walker, Characterization of vehicle deceleration time histories in the analysis of impact dynamics. Ford Motor Company. SAE transactions, paper no. 770013, 1977.

3.       James C.Cheng, Body mount crash characteristics identification test and analysis. Ford motor company. SAE transactions journal of commercial vehicles, paper no. 942255, 1994.

4.       P. Michel Miller and J. C. Lee, R. Krishna Murthy and James Chen, Role of the body mount on the passenger compartment response of a frame/body structured vehicle in frontal crash. MGA research co. Ford Motor co. SAE transactions, paper no. 980861, 1998.

5.       Matthew Huang, on body mount crash characteristics. Ford motor company. SAE transactions, paper no. 1999-01-3186, 1999.

6.       Stephen Kang, Matthew Huang, James Peng, Herbert Yang, Use of body mount stiffness anddamping in CAE crash modeling. Ford Motor Company. SAEtransactions, paper no. 2000-01-0120, 2000.

7.       Yijung Chen, Xiaodong Zhang, Tau Tyan and, Omar Faruque, Methodology on the testing of the automobile mount dynamic response. Ford motor company. SAEtransactions, paper no.2001-01-0474, 2001.

8.       Yijung Chen, Tau Tyan and, Omar Faruque, Dynamic testing and CAE modeling of body mountan application in the frontal impact analysis of a body-on-frame vehicle. Ford Motor Company. SAE transactions, paper no. 2003-01-0256, 2003.

9.       Yijung Chen, Tau Tyan and, Omar Faruque, Dynamic testing and CAE modeling of engine mounts andtheir application in vehicle crash analysis. Vehicle Crash Safety, Ford Motor Company. SAE transactions, paper no. 2003-01-0257, 2003.

10.     Vehicle Crash Mechanics, Matthew Huang, SAE International, CRC Press.

11.     Numerical Methods for Engineers, S. C. Chapra, R. P. Canable. McGraw Hill, 1985.

12.     Dynamics of Vehicle Collisions, R. H. Macmillan. SAE International, 1983.

13.     Spring Design and Application, M. F. Spotts. McGraw Hill Co., 1961.


37-43

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

FarzadVazinram, MajidGandomkar, Javad Nikoukar

Paper Title:

Optimal Active Power Rescheduling of Generators for Congestion Management Based On Big Bang-Big Crunch Optimization Using New Definition of Sensitivity

Abstract:    Restructuring of power systems and appearance and development of many electricity markets in all levels of power systems, introduce the congestion challenge of power transmission lines as a critical threat for power systems. Many studies have been attempted to present techniques for congestion management (CM). One of them is active power rescheduling of generators which has two steps. First step is optimum selection of generators on the basis of sensitivities of generator to power flow on congested line/lines. In this paper, the new definition of sensitivity is introduced based on the old definition of sensitivity that consists of cost factor. Next step of CM process is optimum rescheduling of generators power. In this paper, the optimization of rescheduling of generators power is performed based on Big Bang-Big Crunch (BB-BC) algorithm which is improved by Particle Swarm Optimization (PSO) method as Hybrid BB-BC (HBB-BC) optimization for the first time. Effectiveness of the results of proposed method has been tested on the 39-bus New England system and IEEE 30-bus and IEEE 118-bus systems.

Keywords:
   Big bang-big crunch algorithm, constraint, generator sensitivity, heuristic optimization, optimal rescheduling, transmission congestion management.


References:

1.       R.D. Christie, B.F. Wollenberg, I. Wangensteen, “Transmission management in the deregulated environment,” Proceedings of the IEEE, vol. 88, no. 2, pp. 170–194, 2000.
2.       M. B. Mokhtari, F. Vazinram, M. Gandomkar, “Dynamic and Stability Analysis of Microgrids with Synchronous Machines in Grid-Connected and Islanded Modes,” in: The 16th IEEE MELECON 2012, 25-28 March; 2012, pp. 788-791.

3.       Ch. Venkaiah, D.M. Vinod Kumar, “Fuzzy adaptive bacterial foraging congestion management using sensitivity based optimal active power re-scheduling of generators,” Applied Soft Computing, vol. 11, pp. 4921–4930, 2011.

4.       Ashwani Kumar, S.C. Srivastava, S.N. Singh, “Congestion management in competitive power market: a bibliographical survey”, Electric Power Systems Research, vol. 76, pp. 153–164, 2005.

5.       Y. H. Song and I.-F. Wang, “Operation of Market Oriented Power Systems,” New York: Springer, 2003, ch. 6.

6.       D.M. Vinod Kumar, Ch. Venkaiah, Swarm, “intelligence based security constrained congestion management using SSSC’, in: Proceedings of APPEEC 2009, 2009.

7.       S. Dutta, S.P. Singh, “Optimal rescheduling of generators for congestion management based on particle swarm optimization,” IEEE Transactions on Power Systems, vol. 23, no. 4, pp. 1560–1569, 2008.

8.       RS. Fang, A.K. David, “Transmission congestion management in an electricity market,” IEEE Trans Power Syst, vol. 14, no. 3, pp. 877–883, 1999.

9.       H. Yang, R. Zhou, Y. Zhang, “A study of the curtailment model for bilateral transaction in power market environment,” In: IEEE PES on PSCE, 29th October–1st November; 2006. pp. 1663–1667.

10.     B.K. Panigrahi, V. Ravikumar Pandi, “Congestion management using adaptive bacterial foraging algorithm,” Energy Conversion and Management, vol. 50, pp. 1202–1209, 2009.

11.     M.I. Alomoush, S.M. Shahidehpour. “Contingency-constrained congestion management with a minimum number of adjustments in preferred schedules,” Electr
Power Energy Syst., vol.22, 2000, pp. 277–290.

12.     A.B. Rodrigues, M.G. Da Silva, “Impact of multilateral congestion management on the reliability of power transactions,” Electr Power Energy Syst., vol. 25, pp. 113–122, 2003.

13.     A. J. Conejo, F. Milano, and R. G. Bertrand, “Congestion management ensuring voltage stability,” IEEE Trans. Power Syst., vol. 21, no. 1, pp. 357–364,Feb. 2006.

14.     K. Purchala, Meeus L Belmans R, “Implementation aspects of coordinated auctioning for congestion management,” In: IEEE Bologna power tech conference,
June 23rd–26th, Bologna, Italy, 2003.

15.     Ivan. Skokljev, Viktor. Maksimovic, “Congestion management utilizing concentric relaxation”. Serbian J Electr Eng., vol. 4, no. 2, pp. 189–206, 2007.

16.     K.L. Lo, Y.S. Yuen, L.A. Snider, “Congestion management in deregulated electricity markets,” in: IEEE International Conference on Electric Utility Deregulation and Restructuring and Power Technologies 2000, 2000, pp. 47–52.

17.     Y.R. Sood, “Evolutionary programming based optimal power flow and its validation for deregulated power system analysis,” Electr Power Energy Syst., vol. 29, no. 1, pp. 65–75, 2007.

18.     R. Gnanadas, N.P. Padhy, T.G. Palanivelu, “A new method for the transaction congestion management in the restructured power market,” J Electr Eng, Electrika, vol. 9, no. 1, pp. 52–58, 2007.

19.     T. Niimura, T. Nakashima, “Multiobjective tradeoff analysis of deregulated electricity transactions,” Electr Power Energy Syst., vol. 25,  pp. 179–185, 2003.

20.     G. Granelli, M. Montagna, F. Zanellini, P. Bresesti, R. Vailati, and M. Innorta, “Optimal network reconfiguration for congestion management by deterministic and genetic algorithms,” Elect. Power Syst. Res., vol. 76, pp. 549–556, 2006.

21.     F. Jian and J. W. Lamont, “A combined framework for service identification and congestion management,” IEEE Trans. Power Syst., vol. 16, no. 1, pp. 56–61,Feb. 2001.

22.     A. Kumar, S. C. Srivastava, and S. N. Singh, “A zonal congestion management approach using ac transmission congestion distribution factors,” Elect. Power Syst. Res., vol. 72, pp. 85–93, 2004.

23.     Ashwani Kumar, S.C. Srivastava, S.N. Singh, “A zonal congestion management approach using real and reactive power rescheduling,” IEEE Transactions on Power Systems, vol. 19, no. 1, pp. 554–562, 2004.

24.     G. Yesuratnam and D. Thukaram, “Congestion management in open access based on relative electrical distances using voltage stability criteria,” Elect. Power Syst. Res., vol. 77,  pp. 1608–1618, 2007.

25.     H.Y. Yamina, S.M. Shahidehpour, “Congestion management coordination in the deregulated power market,” Electric Power Systems Research, vol. 65, pp. 119–127, 2003.

26.     F. Capitanescu, T. Van Cutsem, “A unified management of congestions due to voltage instability and thermal overload,” Electric Power Systems Research, vol. 77, pp. 1274–1283, 2007.

27.     J. Kennedy, R. Eberhart, “Particle swarm optimization,” in: IEEE Proceedings, pp. 1942–1948, 1995.

28.     Y. Shi, “Particle swarm optimization,” in: IEEE Neural Networks Society, pp. 8–13, 2004.

29.     Y. del Valle, G.K. Venayagamoorthy, S. Mohagheghi, J.-C. Hernandez, R.G. Harley, “Particle swarm optimization: basic concepts, variants and applications in power systems,” IEEE Transactions on Evolutionary Computation, vol. 12, no. 2, pp. 171–195, 2008.

30.     Z.X. Chen, L.Z. Zhang, J. Shu, “Congestion management based on particle swarm optimization,” in: Proceedings of IEEE The 7th International Power Engineering Conference, 2005, vol. 2, 2005, pp. 1019–1023.

31.     J. Hazra, A.K. Sinha, “Congestion management using multiobjective particle swarm optimization,” IEEE Transactions on Power Systems, vol. 22, no. 4, pp. 1726–1734, 2007.

32.     K.M. Passino, “Biomimicry of bacterial foraging for distributed optimization and control,” IEEE Control Systems Magazine, pp.  52–67, 2002.

33.     M. A. Rahim, I. Musirin, I. Z. Abidin, M. M. Othman, D.Joshi, “Congestion Management Based Optimization Technique Using Bee Colony,” in: The 4th International Power Engineering and Optimization Conf. (PEOCO2010), June 2010.

34.     B. Alatas, “Uniform Big Bang–Chaotic Big Crunch optimization,” Commun Nonlinear Sci Numer Simulat, vol. 16, pp. 3696–3703, 2011.

35.     O.K. Erol and I. Eksin, “A new optimization method: big bang-big crunch,” Adv Eng Softw, vol. 37, pp. 106–111, 2006.

36.     O. Alsac and B. Stott, “Optimal load flow with steady-state security,” IEEE Trans. Power App. Syst., vol. PAS-93, pp. 745–751, 1974.

37.     L. L. Freris and A. M. Sasson, “Investigation of the load flow problem,” Proc. Inst. Elect. Eng. , vol. 115, no. 10, pp. 1459–1466, 1968.

38.     B. K. Talukdar, A. K. Sinha, S. Mukhopadhyay, and A. Bose, “A computationally simple method for cost-efficient generation rescheduling and load shedding for congestion management,” Int. J. Elect. Power Energy Syst., vol. 27, no. 5, pp. 379–388, Jun.–Jul. 2005.


44-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

S.M Subramanian, G.Kavya, M.Sujatha U.Santhana Bharathy

Paper Title:

Moving Object Tracking in Video Scenes Embedded Linux Platform

Abstract:    Video tracking in real time is one of the most important topic in the field of medical. Detection and tracking of moving objects in the video scenes is the first relevant step in the information extraction in many computer vision applications.This idea can be used for the surveillance purpose, video annotation, traffic monitoring. In this paper, we are discussing about the different methods for the video trackingusing Python Opencv software and the implementation of the tracking system on the Beagleboard XM. Background Subtraction method, and color based contour tracking are the different methods using for the tracking.Andfinally, we concluded that the background subtraction method is most efficient method for tracking all the moving objects in the frames.

Keywords:
   Surveillance, python opencv, background Subtraction method, Contour tracking.


References:

1.       Alexander Kolarow And Michael Brauckmann , “Vision –Based Hyper-Real- Time Object Tracker For Robotic Applications”Ieee Conference On Intelligent Robots And Systems Ieee-2012,
2.       Afef Salhi And Ameni Yengui Jammoussi , “Objecttracking System Using Camshift, Meanshift And Kalman Filter”, World Academy Of Science, Engineering And
Technology, 2012

3.       Alok K. Watve ,Indianinstitue Of Technology, Kharagpur , Seminar On “Object Tracking In Video Scenes”, 2005.

4.       Amir  Salarpour  And  Arezoosalarpour  And  Mahmoud  Fathi  And Mirhosseindezfulian , “Vehicle Tracking Using Kalman Filter Andfeatures”, Signal & Image Processing : An International Journal(Sipij) Vol.2, No.2, June 2011.

5.       C. Lakshmi Devasena, R. Revathi, “ Video Surveillance System-Asurvey”, Ijcsi International Journal Of Computer Science Issues, Vol8, Issue 4, No.1, Jult 2011

6.       Flavio B. Vidal And Victor H. Casanova Alcalde (2010). “Object Visual  Tracking  Using  Window-Matching  Techniques  And Kalman Filtering”, Kalman Filter, Vedrankordic (Ed.), Isbn: 978-953-307-094-0.

7.       Greice Martins De Freitas, Clésio Luis Tozzi, “Object Tracking Bymultiple State Management And Eigenbackground Segmentation”, International Journal Of Natural Computingresearch, 1(4), 29-36, October-December 2010.

8.       Hamidrezarashidykanan And Parastokarimi,“Visual Objecttracking Using Fuzzy-Based Thresholding And Kalman Filter”,International Journal Of Modeling And Optimization, Vol. 2, No. 3, June 2012.

9.       Jiyan  Pan,  Bo  Hu,  And  Jianqiu  Zhang,  “An  Efficient  Object Tracking  Algorithm  With  Adaptive  Prediction  Of  Initial Searching Point”, 2006 Ieee Pacific-Rim Symposium On Imageand Video Technology (Psivt'06),December 2006.

10.     Mr. D. W. Chinchkhede& Mr. N. J. Uke, “Image Segmentation Invideo Sequences Using Modified Background Subtraction” International Journal Of Computer Science & Information Technology (Ijcsit) Vol 4, No 1, Feb 2012.

11.     Priti P. Kuralkar, Prof. V.T.Gaikwad, “ Human Object Trackingusing Background Subtraction And Shadow Removal Techniques”, International Journal Of Advanced Research Incomputer Science And Software Engineering, Volume 2, Issue 3, March 2012.

12.     R.  Revathi  ,M.  Hemalatha,  “Certain  Approach  Of  Object

13.     Tracking Using Optical Flow Techniques”, International Journalof Computer Applications (0975 – 8887) Volume 53– No.8, September 2012.

14.     Sa. Vigus, D.R.Bul1, C.N.Canagarajah,“Video Object Trackingusing Region Split And Merge And A Kalman Filter Tracking Algorithm”,Ieeeconference On Image Processing, P 650-653,August 2001.


53-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Farshad Samaei, Maryam Daneshfar, Samane Safari Beydokhti

Paper Title:

Quantification of the Human Postural Control Using the Nonlinear Analysis of Cop Variations during the Quiet Standing

Abstract:    The aging is an effective factor on the quality of standing in healthy subjects. Some neural disorders, degrades the quality of standing, so that the quality of standing in young patient may be as well as the quality of standing in elderly healthy subject. So in this study, the subjects were divided to five age groups, and the age group the subject belonging to it is the measure to quantify the quality of postural control. The subjects were aged between 25-75 years old. The Center of Pressure (CoP) position variations and Center of Pressure (CoP) position velocity during the quiet standing were analyzed through the RQA (Recurrence Quantification Analysis) method. The extracted nonlinear features were fed to the nonlinear classifiers, and the output of classifiers specified the age group which each subject belongs to it. The SVM, MLP neural network, and RBF neural network were the used classifiers. In this manner, the quality of subject postural control could be quantified between1 to 5. Results show the SVM classifier with polynomial kernel reached the best performance of 97.44% accuracy.

Keywords:
   Quiet Standing, Quantification, Aging, RQA, Nonlinear classification.


References:

1.       Popovic, D,Feedback Controller for Regulating the Active Albert H. Vette, K.M. Ankle Torque During Quiet Stance. Ieee transactions on neural systems and rehabilitation engineering, vol. 15, No. 2, june 2007, 2007.
2.       Vettea, K.M., Posturographic measures in Albert H. healthy young adultsdurin quiet sitting in comparison with quiet standing. Elsevier,Medical Engineering & Physics 32 (2010) 32–38, 2010

3.       BenoıˆtSeigle, S.R., Dynamica structure of center of pressure fluctuations in elderly people. Elsevier,Gait& Posture 30 (2009) 223–226, 2009.

4.       Kei Masani , A.H.V., Larger center of pressure minus center of gravity in the elderly induces larger body acceleration during quiet standing. Elsevier,Neuroscience Letters 422 (2007) 202–206, 2007

5.       Patrick D. Neuls, Usefulness of the Berg Balance Scale to Predict Falls in the Elderly, Journal of GERIATRIC Physical Therapy,2011.

6.       Elizabeth T. Hsiao-Weckslera, K.K., Predicting the dynamic postural control response from quiet-stance behavior in elderly adults. Elsevier,Journal of Biomechanics 36 (2003) 1327–1333, 2003

7.       F.M.Birleanua,C.Gervasie,On The Recurrence Plot Analysis Method Behavior Under Scaling Transform,2011 IEEE Workshop on Statistical signal Processing,2011.

8.       Feuerbach and T.M.L.a.J.W. Mark D Grabiner, Converting Chattecx Balance System Vertical Reaction. jornal of the american physical therapy association, 1993.

9.       D A Winter, human balance and posture control, Gait&Posture: 1995; Vol. 3: 193-214, December

10.     Helene Corriveau, R.H., Michel Raˆıche, Postural stability in the elderly: empirical confirmation of a theoretical model. Elsevier,Archives of Gerontology and Geriatrics 39 (2004) 163–177, 2004.

11.     Katerina Stambolieva, Fractal properties of postural sway during quiet stance with changed visual and proprioceptive inputs, J PhysiolSci (2011) 61:123–130.

12.     ItshakMelzer a, I.K.a., Lars I.E. Oddsson, A retrospective analysis of balance control parameters in elderly fallers and non-fallers. Elsevier,Clinical Biomechanics 25 (2010) 984–988, 2010.

13.     J.Griskevicius,E.J,Evaluation of human postural balance in quiet standing by direct measurement of human body center of mass acceleration. Jornal Of Vibro
enginnering,2009.

14.     Jacques Vaillant, N.V., Effect of manipulation of the feet and ankles on postural control in elderly adults. elsevier,Brain Research Bulletin 75 (2008) 18–22, 2008.

15.     Jeong-Jung Kim, T.-Y.C.a.J.-J.L., Falling Avoidance of Biped Robot using State Classification. Proceedings of 2008 IEEE International Conference on Mechatronics and Automation, 2008.

16.     Joseph,p.Zbilut,C.L, Recurrence Quantification Analysis. Wiley Encyclopedia of Biomedical Engineering,2006.

17.     K.M. Newell, S.M.S., Stochastic processes in postural center-of-pressure profiles. Springer, 1997.

18.     B.E. Maki,W.E. McIlroy, Postural control in the older adult, Clin. Geriatr. Med. 12 (1996) 635–658.


57-60

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Rajeshkumar Gangaram Bhandare, Parshuram M. Sonawane

Paper Title:

Preparation of Aluminium Matrix Composite by Using Stir Casting Method

Abstract:    The “composite material” is composed of a discrete reinforcement & distributed in a continuous phase of matrix, In Aluminium matrix composite (AMC) one constitutes is aluminium which forms network i.e. matrix phase and another constitute serve as reinforcement which is generally ceramic or non metallic hard material. The basic reason of metals reinforced with hard ceramic particles or fibers are improved properties than its original material like strength, stiffness etc. Stir casting process is mainly used for manufacturing of particulate reinforced metal matrix composite (PMMC). Manufacturing of aluminum alloy based casting composite by stir casting is one of the most economical method of processing MMC. Properties of these materials depend upon many processing parameters and selection of matrix and reinforcements. This paper presents an overview of stir casting process, process parameter, & preparation of AMC material by using aluminium as matrix form and SiC, Al2O3, graphite as reinforcement by varying proportion.

Keywords:
   Stir casting process, Aluminum Matrix composite, Reinforcement, Mixing and Agitation.


References:

1.        M K SURAPPA, “ALUMINIUM MATRIX COMPOSITES: CHALLENGES AND OPPORTUNITIES,”
2.        B.C. PAI, R.M.PILLAI AND K.G.SATYANARAYANA “LIGHT  METAL MATRIX COMPOSITES - PRESENT STATUS AND FUTURE  STRATEGIES”

3.        Muhammad Hayat Jokhio, Muhammad Ibrahim Panhwar, And Mukhtiar Ali Unar “MANUFACTURING OF ALUMINUM COMPOSITE MATERIAL USING STIR CASTING PROCESS” Mehran University Research Journal Of Engineering & Technology, Volume 30, No. 1,  January, 2011 [Issn 0254-7821]

4.        M. N. Wahab, A. R. Daud and M. J. Ghazali ” PREPARATION AND CHARACTERIZATION OF STIR CAST-ALUMINUM NITRIDE REINFORCED ALUMINUM METAL MATRIX COMPOSITES” International Journal of Mechanical and Materials Engineering (IJMME), Vol. 4 (2009), No. 2, 115-117

5.        J Hashim, L Looney, M.S.J. Hashim “THE ENCHANCEMENT OF WETABILITY SIC PARTICLE IN CAST ALUMINIUM MATRIX COMPOSITE” Journal of material processing technology 119(2001) 329- 335

6.        Dunia Abdul Saheb “ALUMINUM SILICON CARBIDE AND ALUMINUM GRAPHITE PARICULATE COMPOSITES” ARPN Journal of Engineering and Applied Sciences VOL. 6, NO. 10, OCTOBER 2011 ISSN 1819-6608

7.        PradeepSharma, Gulshan Chauhan, Neeraj Sharma ”PRODUCTION OF AMC BY STIR CASTING- AN OVERVIEW” International Journal of Contemporary Practises Vol.2 Issue1

8.        S. Naher, D. Brabazon, L. Looney “SIMULATION OF THE STIR CASTING PROCESS” Journal of Materials Processing Technology 143–144 (2003) 567–571

9.        G. G. Sozhamannan1*, S. Balasivanandha Prabu2, V. S. K Venkatagalapathy1 “ EFFECT OF PROCESSING PARAMTERS ON METAL MATRIX COMPOSITES: STIR CASTING PROCESS” Journal of Surface Engineered Materials and Advanced Technology, 2012, 2, 11-15


61-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

K. Pramod Kumar, P. Anitha, M. C. P Jagdissh

Paper Title:

Built In Self Repair for Embedded Sram Using Selectable Redundancy

Abstract:    Built-in self-test (BIST) refers to those testing techniques where additional hardware is added to a design so that testing is accomplished without the aid of external hardware. Usually, a pseudo-random generator is used to apply test vectors to the circuit under test and a data compactor is used to produce a signature. To increase the reliability and yield of embedded memories, many redundancy mechanisms have been proposed. All the redundancy mechanisms bring penalty of area and complexity to embedded memories design. Considered that compiler is used to configure SRAM for different needs, the BISR had better bring no change to other modules in SRAM. To solve the problem, a new redundancy scheme is proposed in this paper. Some normal words in embedded memories can be selected as redundancy instead of adding spare words, spare rows, spare columns or spare blocks. Built-In Self-Repair (BISR) with Redundancy is an effective yield-enhancement strategy for embedded memories. This paper proposes an efficient BISR strategy which consists of a Built-In Self-Test (BIST) module, a Built-In Address-Analysis (BIAA) module and a Multiplexer (MUX) module. The BISR is designed flexible that it can provide four operation modes to SRAM users. Each fault address can be saved only once is the feature of the proposed BISR strategy. In BIAA module, fault addresses and redundant ones form a one-to-one mapping to achieve a high repair speed. Besides, instead of adding spare words, rows, columns or blocks in the SRAMs, users can select normal words as redundancy.

Keywords:
   SRAM, (SISR), (BIAA), (MUX), SRAMs.


References:

1.        Semiconductor Industry Association, “International technology roadmap for semiconductors (ITRS), 2003 edition,” Hsinchu, Taiwan, Dec.2003.
2.        C. Stapper, A. Mclaren, and M. Dreckman,“Yield model for Productivity Optimization of VLSI Memory Chips with redundancy and Partially good Product,” IBM Journal of Research and Development,Vol. 24, No. 3, pp. 398-409, May 1980.

3.        W. K. Huang, Y. H. shen, and F. lombrardi, “New approaches for repairs of memories with redundancy by row/column deletion for yield enhancement,” IEEE Transactions on Computer-Aided Design, vol. 9, No. 3, pp. 323-328, Mar. 1990.

4.        P. Mazumder and Y. S. Jih, “A new built-in selfrepair approach to VLSI memory yield enhancement by using neuraltype circuits,” IEEE transactions on Computer Aided Design, vol. 12, No. 1, Jan, 1993.

5.        H. C. Kim, D. S. Yi, J. Y. Park, and C. H. Cho, “A BISR (built-in self- repair) circuit for embedded memory with multiple redundancies,” VLSI and CAD 6th International Conference, pp. 602-605, Oct. 1999.

6.        Shyue-Kung Lu, Chun-Lin Yang, and Han-Wen Lin, “Efficient BISR Techniques for Word-Oriented Embedded Memories with Hierarchical Redundancy,” IEEE ICIS-COMSAR, pp. 355-360, 2006.

7.        C. Stroud, A Designer‟s Guide to Built-In Self-Test, Kluwer Academic Publishers, 2002.

8.        Karunaratne. M and Oomann. B, “Yield gain with memory BISR-acase study,” IEEE MWSCAS, pp. 699-702, 2009.

9.        i. Kang, W. Jeong, and S. Kang, “ High-efficiency memory BISR with two serial RA stages using spare memories,” IET Electron. Lett., vol. 44, no. 8, pp. 515-517, Apr. 2008.

10.     Heon-cheol Kim, Dong-soon Yi, Jin-young Park, and Chang-hyun Cho, “A BISR (Built-In Self-Repair) circuit for embedded memory with multiple redundancies,” in
Proc. Int. Conf. VLSI CAD, Oct. 1999, pp. 602-605.

11.     M. Sachdev, V. Zieren, and P. Janssen, “ Defect detection with transient current testing and its potential for deep submicron CMOS ICs,” IEEE International Test Conference, pp. 204-213, Oct. 1998.

12.     Mentor Graohics, MBISTArchitect Process Guide, Software Version 8.2009_3, Aug 2009, pp. 113-116.f

13.     Pavlov. Andrei and Sachdev. Manoj, CMOS SRAM Circuit Design and Parametric Test in Nano-Scaled


66-69

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Lois Onyejere Nwobodo, H.C Inyiama

Paper Title:

Modelling a Knowledge Management System for an Electricity Company

Abstract:    Knowledge Management system is a system that will allow employees or users to get the  required  information they  need  and  at  the  required  time, anytime   and  anywhere as far as there is a network  coverage in that area, this  will  make them  perform  their  duties  well. This system is made up of  a program runner which is  the  PC, this  is  called  the  Server, the  GSM  modem  that  aids  the  user's  phone to  communicate  with  the  Server even when connected,   MongoDB  is a database System that stores data as  JSON-like documents with dynamic schemas, Chrome browser,  a  software  application  used  to  locate, retrieve  and  also  display  content  on  the  World  Wide  Web.  AT  Command  that  establishes  communication  between  the  Modem  and  the  Server. JavaScript  and  HTML, Protocol  Distribution  Unit that also helped in the processes  of   this  Project.   The  project  is  suitable  for  broad   range  of  applications  as  it  can  be  applied  in  various  areas  of  human  life.  It  can  be  customized  to  fit  in  any  organization.  Corporate  bodies  like  Communication Companies, Oil  firms, Banks  can  use  a  Knowledge   Management  System  to   get  useful  information  from   experts  to  keep  their  jobs  moving  effectively  and   also  to  attend  to,  and   satisfy  their  customers  by  providing prompt answers   to their queries.  Generally,  it  is  a means  the  organisational  intellectual  resources  and  information  are  within  the  business  environment.

Keywords:
   Company, Electricity, Knowledge, Management,  Modelling.


References:

1.        F. Blackler, Knowledge Work and Organizations: An Overview and Interpretation,     Organization Studies, 1995.
2.        Kogut and Zander, Knowledge and the Flow of Information, Cambridge, Cambridge    University Press, 1988.

3.        M. H. Zack, J. H. Grant and D. R. Guyawali, Developing a Knowledge Strategy, California Management Review, Strategic Process Improvement through Organizational Learning, 1996.

4.        R. E. Bohn, An Informal Note on Knowledge and How to Manage It, Harvard Business School, Publishing Division, Boston, Massachusetts, 1986,1991.

5.        J. S. Brown, P. Duguid, T. Davenport, S. Jarvenpaa, and M. Beers, Improving Knowledge Work Processes, Sloan Management Review, 1996.

6.        Cathy Nutbrown, A student's Guide to Methodology, Super Saver Delivery, 2002, page  9.

7.        james F. Kurose, Keith W. Ross, Computer Networking: A Top-Down Approach, Addison Wesley Higher Education, 2010.


70-75

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Asmita Jadhav, Mayank Kachroo, Mahesh Hegde Ruchita Mantri, Harshada Ratnaparkhi

Paper Title:

Optimization in Design of Rotating Hydraulic Crane

Abstract:   This is the  paper summarizing and reviewing research in Optimization in Design Of  Rotating  Hydraulic Workshop Crane  Included 1) Brief Introduction to Hydraulics 2)Application & Advantages of Hydraulic Floor Crane 3) Concept generation Detailed Design & Force distribution analysis 4) computer-based models of design processes using CATIA & ANSYS & Manufacring Process5)A final section is Concluson by using SWOT Analysis

Keywords:
   About four key words or phrases in alphabetical order, separated by commas.


References:

1.       Industrial Fluid Power By S.R. Mujumdar, Tata Mc Graw Hill.
2.       Textbook Of Manufacturing Processes, Se Mech

3.       Fluid Power With Application, Anthony Espicto, Pearson Publication, Sixth Edition.

4.       Machine Design By Khurmi Gupta

5.       Strength Of Materials, Se Mech.


76-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Surya J. Khivsara, Minakshi S.

Paper Title:

Seminar and Project Manager and Resourceful Trainer

Abstract:    This paper presents an approach to eradicate all of the confusion which surrounds anyone while preparing for the project and seminar. Also it aims in helping the institution to manage the previous batch’s seminars and project. Seminar and project activity mainly deals with effective data searching and keeping pace with emerging technologies. This paper focuses the concepts like keeping data at one place, providing guidance related to Projects and seminars. This paper can represent an application that can be used by anyone for solving queries related to project and seminar.

Keywords:
   This paper focuses the concepts like keeping data at one place, providing guidance related to Projects and seminars.


References:

1.        A K Munns and B F Bjeirmi, “The role of project management in achieving project success”, International Journal of Project Management Vol. 14, No. 2, pp. 81-87, 1996 © 1996 Elsevier Science Ltd and IPMA Printed in Great Britain 0263-7863/96
2.        M.R. Martínez-Torres, S.L. Toral, F. Barrero, F. Cortés, (2010) "The role of Internet in the development of future software projects", Internet Research, Vol. 20 Iss: 1, pp.72 – 86

3.        Petter Gottschalk, Jan Terje Karlsen, (2005) "A comparison of leadership roles in internal IT projects versus outsourcing projects", Industrial Management & Data Systems, Vol. 105 Iss: 9, pp.1137 – 1149

4.        Sharon Markless and David Streatfield “Information Management Associates “The Library and Information Commission 2000 Grant Number: LIC/RE/001 ISBN 0-9538432-2-X ISSN 1466-2949E

5.        Christina M.Finneran,”Flow in computer mediated environments: Promises and challenges”, Communication of the association for the Information system(volume 15,2005),82-101

6.        Neil Selwn,” Faceworking: exploring studentds education related use of facebook” DOI 101080/17439880902923622

7.        Kathleen M. Eisenhardt, ”Building theories from case study research” , Standford California-94305


83-85

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Zakaulla, A.R.Anwar Khan, P.G.Mukunda

Paper Title:

Effect of Reinforcement Coatings on the Dry Sliding Wear Behavior of Al6061/SiC Particles/Gr Powder Hybrid Composites

Abstract:    Aluminum matrix composites with Silicon carbide (SiC) and Graphite (Gr) particles are finding increased applications because of improved mechanical and tribological properties. SiC particles are used to increase the hardness of composite while Graphite acts like a solid lubricant. The present investigation deals with Dry sliding wear of an Al6061 reinforced with both Cu coated SiC particles and Cu coated Graphite powder. Copper coating improved the wetting of SiC and Gr by molten aluminum alloy during processing and then dissolved in aluminum matrix to increase the hardness and improve antifriction properties. The wear resistance of hybrid composites having reinforcements coated with Copper is better than that of composites with same content of uncoated reinforcements. Worn surfaces of the pins are analyzed using Scanning Electron Microscope to study the wear mechanisms and to correlate them with the wear test results.

Keywords:
   Electroless technique, Hybrid composites, Cu coated SiC, Specific wear rate.


References:

1.        Hybrid composite manufactured with Cu coated reinforcements shows increased wear resistance as compared to the uncoated reinforcements because of
improved wettability and possibly formation of Al2Cu which hardens the composites.

2.        Cu coated reinforcements in hybrid composites showed reduced coefficient of friction when compared with that having uncoated reinforcements

3.        Due to the wetting of SiC particles and graphite powders by copper coating , high interfacial bonding strength was achieved which is a key factor in improving wear behavior .

4.        SEM observation of wear surfaces of specimens containing Cu coated reinforcements revealed that worn surfaces were smooth and uniform and was incorporated with mechanically mixed layers. REFERENCES

5.        D.B.Miracle, Metal matrix composites –From science to technological significance, composite science and technology, 65, (2005), 2526-2540.

6.        T. Zeuner, P. Stojanov, P.R. Saham, H. Ruppert, A. Engels, Developing trends in disc brake technology for rail application, Mater. Sci. Technol. 14 (1998) 857–863.

7.        R. Dwivedi, Development of Advanced Reinforced Aluminum Brake Rotors, SAETechnical Paper Series, 950264, Warrendale, USA, 1995, 8 p.

8.        T. Miyajima, Y. Iwai; Effects of reinforcements on sliding wear behavior of aluminum matrix composites, Wear 255 (2003) 606–616.

9.        J.P.Pathak, J.k.singh & S.Mohan, Synthesis and characterization of aluminium-silicon-silicon carbide composites, Indian journal of Engineering and Material science, 13,(2006), 238-246.

10.     G.B.Veeresh Kumar, C.S.P Rao, N.Selvaraj, Mechanical and Tribological Behavior of particulate reinforced Aluminium metal matrix composites, Journal of minerals and materials characterization and Engineering, 10,2011,59-91.

11.     Soheli Mahdavi, Farshad Akhlaghi,Effect of SiC content on processing, compaction behavior, and properties of Al6061/SiC/Gr hybrid composites, journal of material science, 46, (2011), 1502-1511.

12.     S. Suresha, B.K.Sridhara, Effect of silicon carbide particulates on wear resistance of graphitic aluminium matrix composites, Materials and Design, 31, (2010), 4470-4477.

13.     S.F.Moustafa  ,S.A.El-Badry, A.M.Sanad, B.kieback,friction and wear of copper –graphite composites made with Cu-coated and uncoated graphite powders, wear, 253, (2002), 699-710.

14.     HU Zhong-liang, CHEN Zhen-hua, XIA Jin-tong, JING Guo-yun, Properties of electric brushes made with Cu-coated graphite composites and with copper powders, Transaction of Non Ferrous Metals of China, 17, (2007), 1060-1064.

15.     Rohatgi PK, Guo R Kim JK, Rao S, Stephenson T,wanner T. Wear and friction of cast Al-SiC-Gr Indianapolis, Indiana: 15-18, 1997, p.205 -211.

16.     Basavarajappa S, Chandramohan G, mahadevan Arjun, Tangavelu mukundan, influence of sliding speed on dry sliding wear behavior and subsurface deformation on hybrid metal matrix composite. Wear  262 (2007),1007- 1012.

17.     Wang, R.M., Surappa, M.K., Tao, C.H., Li,C.Z., Yan, M.G. Microstructure and interface structure studies of SiCp-reinforced Al6061 metal-matrix composites. material science and Engineering, vol. 254,(1998) p. 219-226.

18.     Shi, Z., Yang, J.M., Fan, T., Zhang, D., Wu,R. . The melt structural characteristics Concerning the interfacial reaction in SiC(p)/Al composites. Appl Phys A, vol. 71,(2000) p. 203-209.

19.     Lee, J.C., Ahn, J.P., Shim, J.H., Shi, Z., Lee,H.I.  Control of the interface in SiC/Al composites. Scripta Mater, vol. 41, (1999) p.895-900.

20.     Hashim, J., Looney, L., Hashmi, M.S.J. The wettability of SiC particles by molten aluminium alloy, Jof Mater proc Tech, vol. 119, (2001) p. 324-328.

21.     Hashim, J., Looney, L., Hashmi, M.S.J... The enhancement of wettability of SiC particles in cast aluminium matrix composites. Jof Mater proc Tech, vol. 119, (2001) 329-335.

22.     Deonath, P.k.Rohatgi, cast aluminium alloy composites containing Copper-coated ground mica particles, Journal of Material science, 16,(1981), 1599-1606.

23.     A.M.Davidson, D.Regener, A comparison of Aluminium based metal matrix composites reinforced with coated and uncoated particulate silicon carbide, composite science and Technology, 60, (2000), 865-869.

24.     A. Urena, J. Rams, M. Campo, M. Sánchez, Effect of reinforcement coatings on the dry sliding wear behavior of aluminium/SiC particles/carbon fibres hybrid composites, wear, 266,(2009), 1128-1136.


86-90

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

K. Selvam, B. Vishnupriya, M. Maanvizhi

Paper Title:

Enzymatic Synthesis of Fragrance Ester by Lipase from Marine Actinomycetes for Textile Industry

Abstract:    The present study was carried out to investigate the enzymatic synthesis of fragrance ester from brewery industry effluent by lipase of S. acrimycini NGP 1, S. albogriseolus NGP 2 and S. variabilis NGP 3 which was isolated from the marine sediments of South Indian coastal region. The maximum conversion percentage of ester by lipase producing S. variabilis NGP 3 was 48.72 % and also a strong peak at 1745.21 cm-1 was observed by fourier transform infrared (FTIR) spectroscopy which indicated the presence of ester (C = O). The synthesized esters were imparted on the knitted fabric by exhaustion and microencapsulation method.  In the qualitative evaluation of fragrance test for exhausted and microencapsulated knitted fabric, the judges were rated ‘2’ (indicates poor) and ‘4’ (indicates fair) respectively for the sensorial fragrance emitted from the fabric coated by the ester of S. variabilis NGP 3. In the quantitative evaluation, fragrance releasing percentage from exhausted and microencapsulated knitted fabric was found as 31.14 and 39.78 respectively on 48 hrs of treatment. Both qualitative and quantitative evaluation of fragrance test indicated that, the microencapsulated ester of S. variabilis NGP 3 on the knitted fabric emitted better fragrance than by exhausted fabric.

Keywords:
   Ester, exhaustion, microencapsulation, knitted fabric.


References:

1.       Maldonado, L.A., W. Fenical, P.R. Jensen, C.A. Kauffman, T.J. Mincer, A. C. Ward, A.T. Bull and M. Goodfellow, “Salinospora arenicola gen sp. nov. and Salinosporatropica sp. nov., obligate marine actinomycetes belonging to the family Micromonosporaceae,” Int J Syst. Evol. Microbiol., vol 55, 2005, pp 1759 - 1766.
2.       Hill, R.T, “Microbes from marine sponges; a trove of biodiversity of natural products discovery. In Microbial diversity and Bioprospecting,” Edited by Bull AT. ASM press., 2004, pp177 - 190.

3.       Madrid, V.M., J.Y. Aller, R.C Aller, A.Y. Christoserdov, “High prokaryote diversity and analysis of community structure in mobile mud off French Guiana, identification of two new bacterial candidate divisions,” FEMS Microbial Ecol., vol 37, 2001, pp 197 - 209.

4.       Bull, A.T., J.E.M. Stach, A.C. Ward and M. Goodfellow, “Marine actinobacteria: perspectives, challenges, future directions,” Antonie Van Leeuwenhoek., vol 87, 2005, pp 65 - 79.

5.       El-Sersy, N. A., H. Abd - Elnaby, G. M. Abou - Elela, A. H. Ibrahim and M. K. El-Toukhy,  “Optimization, economization and characterization of cellulase produced by marine Streptomyces ruber,” Afr. J. Biotechnol., vol 9, 2010, pp 6355 - 6364.

6.       Haritha, R., K. Sivakumar, J. V. Mohan and T. Raman, “Amylolytic and proteolytic actinobacteria isolated from the marine sediments of Bay of Bengal,” Int. J. of Micr. Res., vol 1, 2010, pp 37 - 42.

7.       Posorske, L.H, “Industrial scale applications of enzymes to be fats and oil industry,” J. Am. Oil. Chem. Soc., vol 61, 1984, pp 1758 - 1760.

8.       Vakhlu, J and A. Kour, “Yeast lipases: enzyme purification, biochemical properties and gene cloning,” Electric J. Biotechnol., vol 9, 2006, pp 15 - 22.

9.       Wang, D., X. U. Yan and T. Shan, “Effects of oils and oil related Rhizopus chinensis and optimization of the lipase fermentation media,” Biochemical Eng. J., vol 41, 2008, pp 30 - 37.

10.     Immanuel, G., P. Esakkiraj, A. Jeladhas, P. Iyapparaj and P. Arunachalam, “Investigation of lipase production by milk isolate Serratia rubidara,” Food technol. Biotechnol., vol 46, 2008, pp 60 - 65.

11.     Rajesh, E. M., R. Arthe, R. Rajendran, C. Balakumar, N. Pradeepa and S. Anitha, “Investigation of lipase production by Trichoderma reesei and optimization of production parameters,” J. Environ. Agric. Food Chem., vol 9, 2010, pp 1177 - 1189.

12.     Nadia, N., Z. A. Nehad, A. E. Elsayed, M. A. Essam and M. A. Hanan, “Optimization of lipase synthesis by Mucor racemosus production in a triple impeller bioreactor,” Malays. J. Microbiol., vol 6, 2010, pp 7 - 15.

13.     Padmapriya, B., T. Rajeswari, E. Noushida, D. G. Sethupalan and C. K. Venil, “Production of lipase enzyme from Lactobacillus spp., and its application in the degradation of meat,” World Appl. Sci. J., vol 12, 2011, pp 1798 - 7802.

14.     Sebdani, R. M., M. R. Ardakani, G. R. Ghezelbash and M. Sadrinasab, “Phylogenetic characterization of lipase producing Bacillus strains isolated from Persian Gulf sediments,” Aust. J. Basic Appl. Sci., vol 5, 2011, pp 121 - 126.

15.     Elibol, M and D. Ozer, “Influence of oxygen transfer on lipase production by Rhizopus arrhizus,” Proc. Biochem., vol 36, 2010, pp 325 - 329.

16.     Saxena, R. K., P. K. Ghosh, R. Gupta, W. S. Davidson, S.Bradoo and R. Gulati, Curr. Sci., vol 77, 1999, 101.

17.     Guvenc, A., N. Kapucu and U. Mehmetoglu, “The production of isoamyl acetate using immobilized lipase in a solvent-free system,” Precess Biochem., vol 38, 2002, pp 379 - 386.

18.     Krishna, S. H., S. Divakar, S. G. Prapulla and N. G. Karanth, “Enzymatic synthesis of isoamyl acetate using immobilizedlipase from Rhizomucor miehei,” J. Biotechnol., vol 87, 2001b, pp 193 - 201.

19.     Majumder, A.B., B. Singh, D. Dutta, S. Sudhukhan and M. N. Gupta, “Lipase catalyzed synthesis of benzyl acetate in solvent free medium using vinyl acetate as asyl donar,” Bioorg. Med. Chem, Lett., vol 16, 2006, pp 4041 - 4044.

20.     Radzi, S. M., W. A. F. Mustafa, S. S. Othman and H. M. Noor, “Green synthesis of Butyl acetate, A pineapple flavour via lipase-catalyzed reaction,” World Academy of Science, Eng and Tech., vol 59, 2011, pp 677 - 680.

21.     Sasi, P., R. Rohit, R. Mehrotra and Mira Debnath, “Esterification reactions catalyzed by surfactant coated Rhizopus lipase,” Indian j. Biotechnol., vol 5, 2006, 364 - 367.

22.     Vasanthakumar, D., N. Boopathi, N. Karthick and P. Ramesh, “Aesthetic finishes for textile materials,” Int. J. textile sci., vol 1, 2012, pp 5 - 9.

23.     Vijyalakshmi, D and T. Ramachandran, “Isolates application of multi-functional finishes in denim garments,” Daffodil Int. University J. Sci and Technol., vol 7, 2012, pp 59 - 66.

24.     Karolia, A and S. Mendapara, “Imparting antimicrobial and fragrance finish on cotton using chitosan with silicon softner,” Indian J. Fibre Text. Research., vol 32, 2007, pp 99 - 104.

25.     Garlapati, V. K and R. Banerjee, “Solvent-Free Synthesis of Flavour Esters through Immobilized Lipase Mediated Transesterification,” Enzyme Res., vol 6, 2013.

26.     Macedo, “Enzymatic synthesis of short chain citronellyl esters by a new lipase from Rhizopus sp.,” Electron. J. Biotechn., vol 6, 2003, pp 72-75.

27.     Jiugao Yu, Jianshe Zhang, Ang Zhao and Xiaofei Ma, “Study of glucose ester synthesis by immobilized lipase from Candida sp.,” Catalysis comm., vol 9, 2007, pp 1369 - 1374.


91-96

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Wissam Ali Hussain, W. Jeberson, Sanjay T. Singh

Paper Title:

Design & Implementation of Student Information Management System for Karbala University

Abstract:    We can design web pages site for the companies, foundations and the government offices to spreading the information & details for the offices & foundations to facilitation connecting with it by using the internet in any time, and any place. As  well as when we design this pages the customer needs to circulate some information which his needed, such that this information will store at a data base form, for example data base contains at the tools submitted to sales, or  a data base contains at the information related of the employs for the specific foundation…ect. This research talk about How to design the web pages site and How to test this site, as well as How to implementation this site.

Keywords:
  (SIMS , SIS , Karbala , Wissam , SHIATS)


References:

1.        Pankaj Sharma," Introduction to Web Technology ", Fifth Edition, Published by S.K. KATARIA & SONS for publisher of Engineering and Computer books 4760-61/23, Ansari Road, Darya Ganj, New Delhi-110002, 2012.
2.        Herbert Schildt, "The Complete Reference of Java", Eighth Edition, Published by the Tata McGaw-Hill Private Limited , 7 West Patel Nagar, New Delhi-110 008,2012.

3.        Herbert Schildt, "The Complete Reference of Java", Seventh Edition, Published by the Tata McGaw-Hill Private Limited , 7 West Patel Nagar, New Delhi-110
008,2011.

4.        Thomas A. Powell, "The Complete Reference of HTML & CSS", Fifth Edition, Published by the Tata McGaw-Hill Private Limited , 7 West Patel Nagar, New Delhi-110 008, 2012.

5.        Ivan Bayross, "Web Enabled Commercial Application Development by using HTML, Java Script, DHTML and PHP", Fourth Edition, Published by BPB Publications B-14, Connaught Place, New Delhi – 110001.


97-100

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Kritika Bawa, Jyoti, Kavita Choudhary

Paper Title:

Digital and Virtual Era: Digital Citizenship

Abstract:    Digital Citizenship is fruitful for our nation. As we are moving into Digital and virtual ERA,  now it is the alarming time for us in this direction. In this paper, we have covered necessity of digital Citizenship and its framework.

Keywords:
   Digital Citizenship, Internet, E-Commerce. 


References:

1.        http://www.digitalcitizenship.net/
2.        http://www.iste.org/docs/excerpts/DIGCI2-excerpt.pdf

3.        http://www.teachthought.com/learning/adapting-social-learning- strategy-framework-education/

4.        https://sites.google.com/site/bhsdigicitizenship/student-blog-posts


101-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

K.Vidhyalakshmi, S. Md. Zubair, S.Ramprasath

Paper Title:

Power Quality Improvement at the Distribution Side by the Use of Grid Interfaced Inverter

Abstract:    Renewable energy resources (RES) are being increasingly connected in distribution systems utilizing power electronic converters. This paper presents a novel control strategy for achieving maximum benefits from these grid-interfacing inverters when installed in 3-phase 4-wire distribution systems. The inverter is controlled to perform as a multi-function device by incorporating active power filter functionality. The inverter can thus be utilized as: 1) power converter to inject power generated from RES to the grid, and 2) shunt APF to compensate current unbalance, load current harmonics, load reactive power demand and load neutral current. All of these functions may be accomplished either individually or simultaneously. With such a control, the combination of grid-interfacing inverter and the 3-phase 4-wire linear/non-linear unbalanced load at point of common coupling appears as balanced linear load to the grid. This new control concept is demonstrated with extensive MATLAB/Simulink simulation studies and validated through digital signal processor-based laboratory experimental results.

Keywords:
   Active power filter (APF), distributed generation (DG), distribution system, grid interconnection, power quality (PQ).


References:

1.        J. M. Guerrero, L. G. de Vicuna, J. Matas, M. Castilla, and J.  Miret, "A wireless controller to enhance dynamic performance of parallel in- verters in distributed generation systems," IEEE Trans. Power Elec- tron., vol. 19, no. 5, pp. 1205-1213, Sep. 2004.
2.        J. H. R. Enslin and P. J. M. Heskes, "Harmonic interaction between a large number of distributed power inverters and the distribution net- work," IEEE Trans. Power Electron., vol. 19, no. 6, pp. 1586-1593.

3.        U. Borup, F. Blaabjerg, and P. N. Enjeti, "Sharing of nonlinear load in parallel-connected three-phase converters," IEEE Trans. Ind. Appl., vol. 37, no. 6, pp. 1817-1823, Nov./Dec. 2001.

4.        P. Jintakosonwit, H. Fujita, H. Akagi, and S. Ogasawara, "Implemen- tation and performance of cooperative control of shunt active filters for harmonic damping throughout a power distribution system," IEEE Trans. Ind. Appl., vol. 39, no. 2, pp. 556-564, Mar./Apr. 2003.

5.        J. P. Pinto, R. Pregitzer, L. F. C. Monteiro, and J. L. Afonso, "3-phase 4-wire shunt active power filter with renewable energy interface," pre- sented at the Conf. IEEE Renewable Energy & Power Quality, Seville,Spain, 2007.

6.        F. Blaabjerg, R. Teodorescu, M. Liserre, and A. V. Timbus, "Overview of control and grid synchronization for distributed power generation systems," IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1398-1409,Oct. 2006.

7.        J. M. Carrasco, L. G. Franquelo, J. T. Bialasiewicz, E. Galván, R. C.P. Guisado, M. Á. M. Prats, J. I. León, and N. M. Alfonso, "Power- electronic systems for the grid integration of renewable energy sources:A survey," IEEE Trans. Ind. Electron., vol. 53, no. 4, pp. 1002-1016, Aug. 2006.

8.        B. Renders, K. De Gusseme, W. R. Ryckaert, K. Stockman, L. Vandevelde, and M. H. J. Bollen, "Distributed generation for mitigating voltage dips in low-voltage distribution  grids," IEEE Trans. Power.Del., vol. 23, no. 3, pp. 1581-1588, Jul. 2008.

9.        V. Khadkikar, A. Chandra, A. O. Barry, and T. D. Nguyen, "Appli- cation of UPQC to protect a sensitiveload on a polluted distribution network," in Proc. Annu. Conf. IEEE Power Eng. Soc. Gen. Meeting,2006, pp. 867-872.

10.     M. Singh and A. Chandra, "Power maximization and voltage sag/swell ride-through capability of PMSG  based variable speed wind energyconversion system," in Proc. IEEE 34th Annu. Conf. Indus. Electron. Soc., 2008, pp. 2206-2211.

11.     P. Rodríguez, J. Pou, J. Bergas, J. I. Candela, R. P. Burgos, and D.Boroyevich, "Decoupled double synchronous reference frame PLL for power converters control," IEEE Trans. Power Electron, vol. 22, no. 2, pp. 584-592, Mar. 2007.


103-109

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Surendra Kumar Shukla, Vishal Trivedi, Ayush Choukse

Paper Title:

Challenges on Performance Analysis and Enhancement of Multi - Core Architecture, a Solution Parallel Programming Languages

Abstract:    Performance of computer is major concern in computer architecture. Mores law has gone now, we can not increase the speed of single processor as it has problem of power requirement. So we need to move on multi core processors. Comiler is a main parameter who can give the deatil of parallelism on source code. In this paper we have proposed a scheme where we are utilizing the comiler for detecting and increasing the execution speed of souce code.

Keywords:
   complier, performance , multi-core architecture 


References:

1.        http://software.intel.com/en-us/blogs/2008/12/31/top-10-challenges-in-parallel-computing
2.        Advanced Computer Architecture, parallelism, scalability, programmability, Kai hwang 2nd ed. McGraw-Hill, 01-Feb-2003

3.        Bryan Schauer “Multi core Processors – A Necessity”  Pro Quest Discovery Guides, September 2008

4.        Raghavan Raman, “Compiler Support for Work-Stealing Parallel Runtime Systems”, Ph.D. dissertation, Dept. Computer Science, Rice University, Houston, Texas , May 2009

5.        Damian A. Mallon, et. al, “Performance Evaluation of MPI, UPC and OpenMP on Multicore Architectures” in under Project TIN2007-67537-C03-02, spain.

6.        Dmitri Perelman, “Exploiting Parallelism of Multi-Core Architectures”, Ph.D dissertation, Department of Electrical Engineering,  Israel Institute of technology , Haifa Israel September 2012.

7.        Kakoullie, E. et. al, “Intelligent Hotspot Prediction for Network-on-Chip-Based Multicore Systems”  in computer aided Design of Integrated Circuits and Systems, IEEE Transactions on, vol.61 no.3 , pp. 418 – 431, 2012.

8.        Tudor, B.M. And Young Meng Teo,  “Understanding Off-Chip Memory Contention of Parallel Programs in Multicore Systems”, IEEE Conference in Parallel Processing (ICCP), Taipei , Singapore, 2011, pp. 602 - 611

9.        Shahrivari, S & Sharifi, M, “Task-Oriented Programming: A Suitable Programming Model for Multicore and Distributed Systems”, IEEE Conference in Parallel and Distributed Computing (ISPDC), Cluj Napoca, Iran, 2011, pp. 139 - 144 .

10.     Bini, E et. Al,  Resource Management on Multicore Systems: The ACTORS Approach, published in IEEE Conference in Micro, 2011, pp. 72-81.

11.     Khan, Samira M,et. Al “Improving Multi-Core Performance Using Mixed-Cell Cache Architecture”, in High Performance Computer Architecture (HPCA2013),  IEEE 19th International Symposium, Shenzhen, China, 2013, pp. 119 - 130

12.     Ubal, R et.al “Multi2Sim: A Simulation Framework to Evaluate Multicore-Multithreaded Processors”, in Computer Architecture and High Performance Computing,19th International Symposium, Rio Grande do Sul, 2007 pp. 62-68

13.     Durate, F and Wong, S “Cache-Based Memory Copy Hardware Accelerator for Multicore Systems”, Published in Computers, IEEE Transactions, (Volume:59 ,  issue:11), 2010, pp. 1494-1507.

14.     Magnus Broberg, “Performance prediction and improvement techniques for parallel programs in multi processors”, Ph.D dissertation, Department of software Engg. & computer sc., Blekinge institute of technology Sweden, 2002


110-114

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Somayeh Jashni Arani, Gholamreza Sharifi, Farzaneh Taghian

Paper Title:

The Effect of Independent and Combined Exercises on Body Composition of Elite Squash Players

Abstract:    Paper Physical capabilities and ideal body composition are considered as prerequisite for successful performance in sports. Measuring the individual body composition is one of the important, determining and effective factors in athletes' performance in every field of sports matches. Every exercise has its own specific effect on factors of body composition. This quasi-experimental research is aimed to consider the effect of eight weeks of squash exercises on athletes' body composition and compare it with that of combined exercises. Thirty 13 to 17 years old male athletes with at least three years experiences in playing squash were selected and then randomly divided in two 15-member groups. First, the body composition of every group was measured by the INBODY370, the model of JMW140. Then, they started doing exercises for eight weeks. The first group did squash exercises for five sessions a week (each one ninety minutes). The second group's exercise program was five sessions a week (each one ninety minutes) including three squash sessions and two sessions of the combined exercises. The combined exercises included one session of resistance-endurance exercise and one session of anaerobic power-agility exercise. The athletes' body composition was reassessed after eight weeks. The correlated t-test was used to compare intragroup characteristics and the independent t-test to compare intergroup characteristics. The data were analyzed by the SPSS software. The findings showed that while eight weeks of squash exercises had no effect on weight, Body Mass Index (BMI) and body fat percentage in squash players, eight weeks of the combined exercises significantly impacted on factors of body composition.

Keywords:
   Squash, body composition, Body Mass Index (BMI), body fat percentage, combined exercises. 


References:

1.       T. W. Rowland.  Developmental exercise physiology (A. A. Gaiyini, Trans.). Tehran: Danesh Afrouz (Original Work Published in 1996). 
2.       Gh. Sharifi. Azmounhaye Azmayeshgahi va Meidani [Laboratory and field researches]. Khourasegan Azad University Publication. (2007). 

3.       N. Behpour,; B. Yousefi, M. Faramarzi. Ertebate noue peykare bandi va tarkibbandi ba amalkard dar olgouhaye harekati paye va ejraye maharathaye payeye football [the relationship of body composition and performance in basic skill of football]. The Journal of Harekat, 2001.  7, 113-135.

4.       M. A. Sardar, et al. Taisre faliathaye havazi 8 hafteyi bar ghande khoun, darsade charbi badan, hadeaksare oxigene masrafi va avamele khatarzaye bimarihaye ghalbi orooughi dar bimarane marde diabeti noe 1 [The effect of 8 weeks of aerobic exercises on blood glucose, body fat percentage, the maximum of oxygen uptake and detrimental factors of cardiovascular disease in male patients of type 1diabetes, Iranian Journal of endocrinology and Metabolism, 2008, 10 (2), 91-97.   

5.       M. Shafizadeh. Karborde sanjesh va arzeshyabi dar tarbiyat badani va olume varzeshi, 2005. [The application of assessment in physical education and sports sciences]. Tehran: Bamdade Ketrab Publication Center. 

6.       E. Alijani, R. Hayatgheybi. Barasiye tasire 8 hafte tamrine havazi va bi havazi bar mizane taghirate hormoune estrogen, LH va darsade charbi daneshjouyane dokhtare gheyre varezshkar daneshgahe Shahid Chmarane Ahvaz [The effect of 8 weeks of aerobic and anaerobic on change rates of Estrogen, LH and fat percentage in female students of Shahid Chamran University in Ahvaz], The Journal of Harekat,2002, 13, 21-30.  

7.       F. Rahmani Nia, T. Saidi. Asare yek barnameye montakhab ba vazne bar tarkibe badani va charbi zir pousti zanan gheyre varezshkar [The effect of a selected program on female non-athlete body composition and underderm fat]. Olympics,2004, 12 (1), 61-8.

8.       A. Jafari, M. R., Moradi,  A. Salime, E. Mohammedi. Moghayeseye tasire tedad jalasate peyade ravi dar hafte bar taghirate badani zanane kam taharrok [The study of the number of hiking sessions in a week on body composition of non-active women], Olympics, 2007, 15 (1), 27-36.

9.       M. Namjou. Ertebat beyne tipe badani va vigegihaye peykar shenasi ba montakhabi az amdegi jesmani va harekati daneshjouyane dokhtare moaseseye amouzeshe ali va olume ensani va tarbiyat badani Tehran [The relationship between physical characteristics and body composition with a selected exercises of physical fitness in female students in Tehran Institute for Humanities and Physical Education (Unpublished Master’s Thesis), Tehran, Tarbiat Moallem University. (1996).

10.     S. M. Tayebi, et al. Asare tamrinate volleyball bar tarkibe badan, avamele montakhabe amadegi jesmani va hambastegi miyane anha dar noujavanan [The effect and relationship of volleyball exercises on body composition, factors of physical fitness in inexperienced teenagers]. The Journal of Sport Sciences in Mazandaran University,2009, 5 (9), 41-5.

11.     A. Gayini, et al. Tasire 8 hafte faliyate varzeshi montakhab va regime control shode bar avamele khatarzaye ghalbi oroughi va tarkibe badaniye zanane zayeman karde [The effect of 8 weeks of selected exercises and controlled diet on detrimental cardiovascular factors and body composition in women with childbirth], Studies in Sports Sciences,2007, 14, 85-98.

12.     R. Malina, C.  Bouchard. Growth, maturation and physical activity (Abas Bahram et al., Trans.), Tehran: Omid Danesh (Original work published in 2005).

13.     M. Kashef, F. Shalchi. Assessment in physical education. Tehran: Faratahlil Publication. (2006). 

14.     J. H., Wilmore, D. L. Costill. Physiology of sport and exercise (Z, Moini et al., Trans.). Tehran: Mobtakeran (Original Work Published in 1999).

15.     M. Kashefi. Squash. Tehran: Ketab Sara Publication Co. (2003).

16.     E. L. Fox, D. K. Mathews. The physiological basics of physical education and athletics (A, Khaledan, Trans.). Tehran: Tehran University Press (Original Work Published in 1993). 

17.     R. A. Rabegs, S. O. Roberts. Exercise physiology: Exercise, and clinical application (A, Gayini & V. Dehbidi Rowshan, Trans.). Tehran: SAMT (Original Work Published in 2009). 

18.     L. Potvin, S. Desrosiers, M. Trifonopoulos, N. Leduc, M. Rivard, C. Macaulay, G. Paradis. “Anthropometric Characteristics of Mohawk Children Aged 6 to 11 Years”. Journal of the American Dietetic Association, 1999, 99 (8), 955-961.

19.     A.L. Toriola, S.A. Adeniran, P.T. Ogunremi. Body composition and anthropometric characteristics of elite male basketball and volleyball players. Journal of Sports Medicine,1987, 27, 235-238.

20.     A. Schlemmer, C. Hassayer, J. Haarbo. Direct Measurment of abdominal fat body dual photon absorptiometry, International of obesity,1996, 14, 603 – 611.

21.     A. L. Classene. The role of Anthropometric characteristics in modern pentathlon performance in female athletes. Journal of sports science,1994, 12 (13), 382-395.

22.     M. Wilkinson, d. Leedale-Brown, E. Winter. Validity of a squash-specific fitness test. International Journal of Sports Physiology and Performance,2009, 29-40.

23.     D. Smith. Physiological and performance differences between Canadian national team and university volleyball players. Journal of sports sciences. 1996, 10, 131-138. 

24.     S. S. Bassuk,  J. E Manson. Physical activity and cardiovascular disease prevention in women: How much is good enough. Exercise & Sport Science Review.2003,31 (4), 176 – 181. 

25.     L. K.Cox, V. Burke, A. R. Morton, et al. The independent and combined effects of 16 weeks of vigorous exercise and energy restriction on body mass and composition in free – living overweight: A randomized controlled trail, Metabolism,2003, 52 (1), 107 – 115.

26.     H. O. Chambliss.  Exercise duration and intensity in a weight loss program. JAMA.2003, 10; 290 (10), 1323 – 30.

27.     R. Silvestre, W. J. Kreemer, D. A.Chris West, B. A. Judelson, J. L. Spierinig, D. L. Vingren,  et al. Body composition and physical performance during a National collegiate athletic association division in men’s soccer season. J Strength Cond Res, 2006, 20 (4), 962-970.

28.     T. Metaxas, T. Sendelides, N. Koutlianos, K. Mandroukas. Seasonal variation of aerobicperformance in soccer players according to positional role. J Sports Med Phys Fitness,2006, 46, 520-5.

29.     M. Chin, k. Steninger. Physiological profiles and sport specific fitness of Asian elite squash players. Br J Sport Med, 1995, 29, 158-164.  

30.     k. Marrin. Anthropometric and physiological changes in elite female water polo players during a training year, Serbian Journal of Sport Science, 2008, 2, 75-83.


115-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

K. I. Hwu, Y. T. Yau

Paper Title:

Gate Driver with Output Having Positive Triple Input Voltage and Negative Double Input Voltage

Abstract:    This paper presents a gate driver, whose output possesses the positive triple input voltage and the negative double input voltage under only one positive-voltage source required. Such a gate driver can reduce the transient period of the gate driver and hence can reduce the corresponding switching loss. In addition, since double the negative input voltage is imposed on the input of the power switch during the turn-off period, not only the error in triggering the switch due to the Miller effect can be reduced, but also the leakage current can be reduced. The detailed operating principles are illustrated and some simulated and experimental results are provided to verify the effectiveness of the proposed scheme.

Keywords:
   Gate driver, leakage current, switching loss.


References:

1.        Kaiwei Yao and F. C. Lee, “A novel resonant gate driver for high frequency synchronous buck converter”, IEEE Trans. Power Electron., vol. 17, no. 2, 2002, pp. 180-186.
2.        Yuhui Chen, F. C. Lee, L. Amoroso and Ho-Pu Wu, “A resonant MOSFET gate driver with complete energy recovery”, IEEE IPEMC’00, vol. 1, 2000, pp. 402-406.

3.        Yuhui Chen, F. C. Lee, L. Amoroso and Ho-Pu Wu, “A resonant MOSFET gate driver with efficient energy recovery”, IEEE Trans. Power Electron., vol. 19, no. 2, 2004, pp. 470-477.

4.        I. D. de Vries, “A resonant power MOSFET/IGBT gate driver”, IEEE APEC’02, , 2002 pp. 179-185.

5.        D. M. Van de Sype, A. P. M. Van den Bossche, J. Mases and J. A. Melkebeek, “Gate drive circuit for zero-voltage-switching half- and full-bridge converters”, IEEE Trans. Ind. Appl., vol. 38, no. 5, 2002, pp. 1380-1388.

6.        W. Eberle, Yan-Fei Liu and P. C. Sen, “A new resonant gate-drive circuit with efficient energy recovery and low conduction loss”, IEEE Trans. Ind. Electron., vol. 55, no. 5, 2008, pp. 2213-2221.

7.        Xin Zhou, Zhigang Liang and A. Huang, “A new resonant gate driver for switching loss reduction of high side switch in buck converter”, IEEE APEC’10, 2010, pp. 1477-1481.

8.        LM5110, released by National Semiconductor, 2003.


119-122

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Neha Kohli, Esha Dobhal, Neha Sharma

Paper Title:

Proposed Framework for the Reduction of Web Congestion using Classification

Abstract:    Prefetching is the process of bringing data from the web server into the web cache before it is needed. When the client needs data, then instead of waiting for the responses from the memory, it can directly access the data from the cache. The prefetched data is stored in web cache in the form of web objects for later use. Caching is the technique of storing a copy of the data that has been requested by the client. Web caching is mainly used to reduce access latency, that is, it speeds up the process of data retrieval. It also reduces heavy load on the web server. The paper proposes a framework for reducing web traffic. The data is first extracted from the proxy server and then preprocessing is performed. The preprocessed data is then classified and the patterns to be prefetched are obtained.

Keywords:
   Prefetching, classification, proxy server, cache.


References:
1.       Hongjun Lu Rudy Setiono Huan Liu “Effective Data Mining Using Neural Networks” December 1996  Vol. 8, No. 6, pp. 957-961 
2.       Pallis G., A. Vakali and J. Pokorny, (2008) “A clustering-based prefetching scheme on a Web cache environment”, Computers and Electrical Engineering 34, Elsevier, pg 309–323

3.       Podlipnig S. and L. Boszormenyi, “A Survey of Web Cache Replacement Strategies”, ACM Computing Surveys, Vol. 35, No. 4, December 2003, pp. 374–398

4.       Steven W. Norton “Generating Better Decision Trees” Siemens Corporate Research, Inc. 755 College Road East, Princeton, NJ 08540 swn@demon.siemens.com.

5.       Deborah R. Carvalho “hybrid decision tree/genetic algorithm method for data mining” Universidad Tuiti do Parana (UTP Computer Science Dept, Av. Comendador Franco, 1860. Curitiba-PR 80215-090 Brazil, Alex A. Freitas2 Computing Laborator University of Kent at Canterbury Canterbury, Kent, CT2 7NF ,U.K.

6.       Sharma N. and S. K. Dubey, (2012) “A Hand to Hand Taxonomical Survey on Web Mining”, International Journal of Computer Applications (0975 – 8887), Vol. 60, No.3.

7.       Neha Sharma and Sanjay Kumar Dubey “Fuzzy c-means clustering based prefetching  to reduce web traffic”, Amity University, Noida (U.P.), 201303, India  International Journal of Advances in Engineering & Technology, Mar. 2013. ©IJAET ISSN: 2231-1963

8.       Lou W., G. Liu, H. Lu, and Q. Yang, (2002) “Cut-and-Pick Transactions for Proxy Log Mining”, C.S. Jensen et al. (Eds.): EDBT 2002, LNCS 2287, pp. 88–105, Springer-Verlag Berlin Heidelberg.

9.       Sathiyamoorthi V. and Dr. M. Bhaskaran, (2011) “ Data Preprocessing Techniques for Pre-Fetching and Caching of Web Data through Proxy Server”, IJCSNS International Journal of Computer Science and Network Security, Vol.11, No.11.

10.     Greeshma G. Vijayan and J. S. Jayasudha, (2012) “A survey on web pre-fetching and web caching techniques in a mobile environment” Natarajan Meghanathan, et al. (Eds): ITCS, SIP, JSE-2012, CS & IT 04, pp. 119–136.

11.     S.V.N. Vishwanathan, M. Narasimha Murty “ SSVM : A Simple SVM Algorithm” , Dept. of Comp. Sci. and Automation ,Indian Institute of Science, Bangalore 560 012,INDIA

12.     Svm-http://en.wikipedia.org/wiki/Support_vector_machine.

13.     Han J. and Kamber M., (2006) “Data Mining: Concepts and Techniques”, Second Edition, Morgan Kaufmann Publishers, Elsevier.

14.     Neha Kohli is currently pursuing Bachelor of Technology in Information Technology from Northern India Engineering College, Guru Gobind Singh Indraprastha
University, New Delhi, India.


123-128

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Vinay Divakar

Paper Title:

Design and Implementation of Microcontroller Based Temperature Data Logging System

Abstract:    The term data logger (also sometimes referred to as a data recorder) is commonly used to describe a self-contained, standalone data acquisition system or device. These products are comprised of a number of analog and digital inputs that are monitored, and the results or conditions of these inputs is then stored on some type of local memory. In this paper, a Temperature Data Logging System is designed to record and display temperatures continuously. It uses a temperature sensor to sense the surrounding temperature and displays the temperature on the PC with the help of LPC 2148 ARM7 TDMI processor and the UART (Universal Asynchronous Receiver/Transmitter). The methodology for designing the temperature data logging system is discussed in detail. The code to implement the functionality of the logging system is modeled and simulated using the Software Tool Keilμ4. The characteristics of LM 35 temperature sensor and the hardware required to interface the output of LM 35 to the LPC 2148 is discussed in detail.

Keywords:   Temperature data logger, data logger, temperature recorder, temperature display, lm35 sensor, UART, ARM TDMI.

References:

1.        Deepika, Mr. Nirbhowjap Singh (2006), ‘Designing a Microcontroller Based Temperature Data Logger’ Thapar Institute of Engineering & Technology, July 2006.
2.        Ž. Nakutis (2009) ‘Embedded Systems Power Consumption Measurement Methods Overview’ MATAVIMAI, December 18.

3.        Hla Hla Htay (2011), “Design and Construction of Microcontroller Based Data Logger” Department of Physics, Yadanabon University

4.        M. Moghavvemi, “Remote Sensing of Relative Humidity”,University of Malaya Kuala Lumpur, Malaysia.

5.        Radek Kuchta, Radimir Vrba, “Wireless and Wired Temperature Data System”, Second International Conference on Systems Brno University of Technology, Brno.

6.        M. Moghavvemi, “A Simple Low Cost Data Acquisition System for Remote Sensing of Relative Humidity and Temperature”, Dept. of Electrical Engineering University of Malaya, Kuala Lumpur, Malaysia.

7.        B. Niharika, Sayara Sultana, B.Prasanna, L.Harika “Data Logging To Collect And Display Temperature With Time And Day”,Gokaraju Rangaraju Institute of Engineering &  Technology.

8.        Theophilus Wellem (2012) “A Microcontroller- based Room Temperature Monitoring System”,International Journal of Computer Applications (0975 – 8887) Volume 53– No.1, September.

9.        Cytron Technologies (2008) “Temperature Control System using LM35”,Cytron Technologies Sdn Bhd, January.

10.     BiPOM Electronics (2006) “Microcontroller to Sensor Interfacing Techniques”,Document Revision: 1.01, February.

129-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

S.Premalatha, R. Vinodha

Paper Title:

Performance Analysis of Variable Weight multiple length QC-CHPC for On-Off keying optical CDMA

Abstract:    The concept of a multiwavelength Quadratic Congruence Carrier Hopping prime code (QCCHPC) was recently introduced in order to support a large number of simultaneous users in optical code division multiple access (OCDMA). To support multimedia services with different bit rate requirements multiple length and variable weight QCCHPC is constructed and the performance is analyzed. In QCCHPC with zero autocorrelation side lobes, cross correlation values of at most two. Our analysis shows that code weight is important factor than code length in determining the code performance.

Keywords:
   Optical code division multiple access (OCDMA), Variable weight, Variable length, Wavelength-time code.


References:

1.        P.R.Pruncnal, Ed., optical Code Division Multiple Accesses: Fundamentals and Applications. New York: Taylor & Francis Books, 2005.
2.        V.J.Hernandez, W.Cong, J.Hu, C.Yang, N.K.Fontaine, R.P. Scott, D.Zhi, B.H.Kolner, J.P.Heritabe, and S.J.B Yoo, “A 320-Gb/s capacity (32-user x 10Gb/s) SPECTS O-CDMA Network testbed with enhanced spectral efficiency through forward error correction,” J.Lightwave Technol., vol.25, no.1, pp. 79-86, Jan.2007.

3.        J.Cao, R.G.Broeke, N.K.Fontaine, C.Ji, Y.Du, N.Chubun, K.Aihara, A-V.Pham, F.Olsson, S.Lourdudoss, and S.J.B.Yoo, “Demonstration of spectral phase O-CDMA encoding and decoding in monolithically integrated arrayed-waveguide-grating-based encoder,” IEEE Photon. Technol.Lett., Vol.18, no.24, pp. 2602-2604, Dec.2006.

4.        G.C.Yang, Variable –weight optical orthogonal codes for CDMA network with multiple performance requirements,IEEE Trans,commun,vol 44, no 1,pp 476-55,Jan.1996

5.        M.Azizoglu, J.A.Salehi, and Y.Li, “Optical CDMA via temporal codes,’ IEEE Trans. Commun., vol.40, no.7, pp.1162-1170, July 1992.

6.        C.Y.Chang, G.C.Yang, and W.C.K.Wong, “Wavelength –time codes with maximum cross- correlation function of two for multicode – keying optical CDMA,” J.Ligthwave Technol., vol.24. no.3, pp.1093-1100, Mar.2006.

7.        G.C.Yang and  W.C.Kwong ,“ Prime codes with application to CDMA Optical and Wireless Networks”, Artece Hoad,Norwood, May.2002.

8.        Cheng-Yuan Chang, Hung-Tachen, Guu-Chang Yang Wing, C.K.Kwong “Spectral Effciency Study of QC-CHPC in multirate optical CDMA system “IEEE Journal,vol 25, no 9 ,Dec.2007 .

9.        Nasaruddin and Tetsuo Tsujioka Design of Reconfigurable Multiweight Wavelength-Time Optical codes for secure multimedia optical CDMA Networks ICC2008 proceeedings

10.     Wing c.Kwong,Cheng-Yuan Chang Quadratic Congruence Carrier Hopping Prime code for Multicode Keying optical CDMA ICC2007 proceeedings

136-138

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Mehdi Shekarzadeh

Paper Title:

Effect of Ratio Mandrel Radius to Sheet Thickness on the Spring-Back in Bending Steel and Aluminum Sheets

Abstract:  Forming and forging processes are among the oldest and most important of materials-related technologies. Today, industry must continuously evaluate the costs of competitive materials and the operations necessary for converting each material into finished products. Manufacturing economy with no sacrifice in quality is paramount. Therefore, "precision" forming methods, net and near-net shape processing, and modern statistical and computer-based process design and control techniques are more important than ever. Bending is one of the important methods for manufacturing sheet metal components that is extensively applied in automotive industry and electronic devices. Spring-Back is an unavoidable phenomenon in sheet metal forming that occurs in the end of stamping process because of releasing elastic stress that results changing the final dimensions of sheet. So, Prediction of spring-back is essential for dimensional control of parts in the end of stamping process. In this project  a finite element model is presented for simulation of U-bending process and also calculating the amount of spring-back. Comparison between finite element , numeral and experimental results is done for validating the finite element method.

Keywords:
   Aluminum, Bending, Forging, Spring-back, Steel.


References:

1.       Thanki, S.J., Raval, H.K., and Dave, A.K., Prediction of the Punch Reversal Position under V-plate Bending using Real Material (power-law) Behavior, Processing Technology, 114, 2001, pp. 227-232.
2.       Hill, R., A Theory of the Yielding and Plastic Flow of Anisotropic Metals, Proc. Roy. Soc. London, 193, 1948, pp. 281-297.

3.       Leu, D.K., A Simplified Approach for Evaluating Bendability and Springback in Plasic Bending of Anisotropic Sheet Metal, Journal of Materials Processing Technology, 66, 1997, pp. 9-17.

4.       Narasimhan, N., and Lovell, M.R., Predicting Springback in Sheet Metal Forming: an Explicit to Implicit Sequential Solution Procedure, Numeric. Meth. Des. Anal, 33, 1999, pp. 29-42.

5.       Samuel, M., Raval, Exprimental and Numeriacal Prediction of Springback and Side Wall Curl in U-Bending of Anisotropic Sheet Metals, Journal of  Materials Processing Technology, 105, 2000, pp. 382-393.


139-141

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Mehdi Hamdam, Ardeshir Arash, Alireza  Pilpayeh

Paper Title:

Optimizing Hydro and Thermal Power Plants Using Genetic Algorithm

Abstract:   In recent years, various studies have been conducted on optimization of hydro and thermal power plants; however, due to the complexity of this problem, optimal operation of power systems consisting of hydro-thermal power plants with multi-purpose reservoirs, which is mostly resulting from their uncertain, non-convex, non-linear and dynamic nature, numerous simplifications and approximations have been applied in modeling these systems in order to provide the possibility of their analysis using mathematical methods. But, the result of these simplifications and approximations is distancing of the obtained models from practical operational realities of the system which limits application of their results. With progress of computational technology and advent of effective algorithms, more practical aspects of the system's real productivity can be used in optimization models. Considering the importance of this issue in the present work, a new method was presented for simultaneous long-term operational optimization of the system consisting of hydro-thermal power plants, in which main system parameters including water inflow to reservoirs of hydro power plants and energy demand of the system were uncertainly considered. In this paper, optimization of hydroelectric and thermal power plants was done using the algorithm and instructions of optimal operation were extracted. 

Keywords:
   Hydrothermal power plant, Indefinite scheduling, Genetic algorithm, Optimization.


References:

1.       Chao, L. Ruiyan, Z. Jingyan, Z. 1990, Stochastic optimization of interconnected multi-reservoir power systems, IEEE Trans. On Power systems, Vol. 5, No. 4.
2.       Escudero, LF. 1996, Hydropower Generation Management Under Uncertainty Via Scenario Analysis and Parallel Computation, IEEE Trans. On power systems, Vol. 11, No.

3.       Ruey-Hsun, L. 2000, A Noise Annealing Neural Network for Hydroelectric Generation  Scheduling with Pumped-Storage Units, IEEE Trans. On power systems
Vol.15, No. 3.

4.       Teegavarpu, R. Simonovic, S.P. 2000, Short-Term Operation Model for Coupled Hydropower Reservoirs, ASCE J. of Water Resources Planning and Management, Vol. 126, No. 2.

5.       Mousavi, H. Ramamurthy, A.S. 2002, Multi-Reservoir design using Pontryagin Principle,Elsevier, Advances in Water Resources 25.

6.       González, J.A. Nabona, N. 1994, Long-Term Hydrothermal Coordination with Natural Inflows Modeled through a PDF and Simulation Results, Sociedad de Estad´‎stica e        Investigaci´on Operativa Top ,Vol. 2, No. 1, pp 59–84.

7.       Mohammad, Z. Meybodi, A. 2001, A Simulation Approach to Probabilistic Production Planning,Indiana, Kokomo, School of Business.


142-145

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Md Aboud Kadhim, Hazim Salah, Abdulsatar, Tahseen Flaih Hasan

Paper Title:

Design of Fixed WiMAX Transceiver on SUI Channels Based Wavelet Signals

Abstract:    As the application for wireless communications increases, even in wideband and fast fading channels, there is always a need to develop systems that are more efficient and robust. The work done in this paper is our effort in this direction. Based on the wavelet transform, we develop an OFDM WiMAX system with good performance for Stanford University Interim (SUI) channels rich in multipath. As of fundamental wavelet transform characteristics and expressing the temporal and frequency information in two independent dimensions, delay and scale, we develop a theoretical system model for SUI channels. Considering the computational complexity, the models are designed using the Haar wavelet transform. Using the wavelet transform to calculate the channel delay information is the core component of the system .It is found that proposed wavelet design to attain much lower bit error rates, increases signal to noise power ratio (SNR), and can be used as an alternative to the conventional OFDM WiMAX. The proposed OFDM system was modelled tested, and its performance was found under different SUI channel models. This paper performs a new approach to the adaptation of the Fixed WiMAX IEEE802.16d base band, OFDM based on wavelet (DWT-OFDM) in SUI channel.

Keywords:
   WiMAX, SUI, OFDM, DWT, IDWT, FFT,    IFFT.


References:

1.       B. Farhang- Boroujeny, “Multicarrier modulation with blind detection capability using cosine modulated filter banks,” IEEE Transactions on Communications, vol. 51, Dec 2003.
2.       J. A. C. Bingham, “Multicarrier modulation for data transmission: An idea whose time has come,” IEEE Communications Magezine, vol. 28, May 1990.

3.       A. Goldsmith, Wireless Communications. Cambridge University Press, 2005.

4.       M. Vetterli, “Perfect transmultiplexers,” Proc. ICASSP86, vol. 4, 1986.

5.       M. A. T. S. D. Sandberg, “Overlapped discrete multitone modulation for high speed copper wire communications,” IEEE Journal on Selected Areas in Communications, pp. 1571–1585, December 1995.

6.       R. K. Young, Wavelet Theory and Its Applications. Kluwer Academic Publishers, 1993.

7.       F. J. N. Albert Boggess, a First Course in Wavelets with Fouier Analysis. Prentice Hall, NJ:Upper Saddle River, 2001

8.       C. K. Chui, Wavelets: A tutorial in Theory abd Application. Ax academic Press, INC, 1992.

9.       G. G.Walter, Wavelets and Other Orthogonal Systems With Applications. CRC Press, 1994.

10.     V. S.Gracias, “Correspondence, an equalization algorithm for wavelet packet based modulation schemes,” IEEE Transactions on Signal Processing, pp. 3082–3087, November 1998.

11.     M. C. T. M. A. Tzannes, “Bit-by-bit channel coding using wavelets,” Global Telecommunications Conference, vol. 2, December 1992.

12.     D. X. Xiaofei Zhang, “Wavelet analysis of signal through space-time channel,” Wireless Communications, Networking and Mobile Computing Proceedings, pp. 517–520, September 2005.

13.     R. C. Dong Guo, Xiaodong Wang, “Wavelet-based sequential montecarlo blind receivers in fading channels with unknown channel statistics,” IEEE TRANSACTIONS ON SIGNAL PROCESSING, vol. 52, JANUARY 2004.

14.     M. Martone, “Wavelet-based separating kernels for array processing of cellular ds/cdma signals in fast fading,” IEEE Transaction on Communications, pp. 979–995, June 2000.

15.     Mohammed Aboud Kadhim and Widad Ismail (2010) Analysis of MISO WiMAX    IEEE802.16d in SUI Multipath Fading Channels, JOURNAL OF TELECOMMUNICATIONS, VOLUME 3, ISSUE 2, JULY 2010

16.     Mohammed Aboud Kadhim and Widad Ismail (2010) Implementation of WiMAX  IEEE802.16d Baseband Transceiver Based Wavelet OFDM on a Multi- Core Software-Defined Radio Platform, European Journal of Scientific Research, 42, 303-3

17.     IEEE STD 802.16E & 802.16D, I. S. 2006. IEEE Standard for Local and Metropolitan  Area Networks Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems Amendment 2: Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands and Corrigendum 1.

18.     Jeffrey G. Andrews, Ph.D., Arunabha Ghosh, Ph.D,Rias Muhamed., ed, Fundamentals of WiMAX Understanding Broadband Wireless Networking. Theodore S. Rappaport, Series Editor, ed. P.H.C.E.a.E.T. Series. 2007.


146-150

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Harsh Raghuvanshi, N.S. Ramnaveen, Puneet Malhotra, Rakshit, Anurag Khatri

Paper Title:

Innovative Design of an All-Terrain Vehicle (ATV)

Abstract:    This study aims to design of an All-Terrain Vehicle (ATV) in accordance with the SAE BAJA 2014 rule book. A detailed designing of components is carried out like Roll cage, Suspensions & Braking mechanism. The main focus of our was on Safety of driver & Stability of vehicle. Roll cage of our vehicle is designed in such a way that in case of rolling of vehicle (mostly occurs in high speed turns & off roading) that it will provide double the strength to the roll cage with also considering the Aesthetic of the cage. International standards are followed by us where ever possible and an extensive market survey is also done. Finite Element Analysis is carried out on roll cage & braking mechanism for optimum safety & reliability of the vehicle. Engine the heart of an automobile is installed in such a way that it can perform well for an extensive time on any terrain.

Keywords:
   Cooling duct, Ergonomics, Finite element Analysis & Von misses stress.


References:

1.        Fundamentals Of Vehicle Dynamics – Thomas D. Gillespie
2.        Race Car Vehicle Dynamics – Millikan

3.        Dr.N.K.Giri “Automobile Mechanics” By Printed On 2004.

4.        Heinz Heisler “Advanced Vehicle Technology 2nd Edition”

5.        Srinivasan, “Automotive Mechanics” “Tata Mcgraw-Hill Publications-New Delhi” Year 2006

6.        Richard Stone And Jeffrey.K.Ball “Automotive Engineering Fundamentals” Sae International.

7.        Ellis.J.R, Vehicle Dynamics, Business Books Ltd., London, 1991

8.        Www.Carbible.Com


151-157

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Shahin Shaikh, Manjusha Deshmukh

Paper Title:

Modulation of Watermark Using JND Parameter in DCT Domain

Abstract:    Digital Image watermarking is the process that embeds data called watermark in to multimedia object such that the watermark can be extracted or detected to make an assertion about the object. Watermarking is either  “visible” or “invisible”. The growth of high speed computer networks and internets, in particular, explore the means of new business, scientific, entertainment and social opportunities. Ironically the cause for the growth is also of the apprehension use of digital formatted data. The ease with which the digital information can be duplicated and distributed has led to need for effective copyright tools. Various software products have been recently introduced in attempt to address these concerns. It is done by hiding data within digital audio, image and video files. Digital image watermarking is one of the way of data hiding techniques. Watermarking can be done in spatial and transform domain. The basic problem in watermarking in spatial domain is that the watermark is more fragile i.e., more susceptible to attacks than transform domain. The reason for choosing the transform domain (DCT and DFT is that the characteristics of human vision system(HVS) are better captured by  spectral coefficients. For eg. Low frequency coefficients are perceptually significant, which means alterations to those components might cause significant distortion to original image On the other hand, high frequency coefficients are considered  insignificant: thus ,processing techniques such as compression tend to remove high frequency coefficients aggressively. 

Keywords:
   Copyright protection, digital image watermarking, spatial domain, transform domain, Discrete Cosine Transform(DCT), Discrete Fourier Transform(DFT ,  Peak Signal to Noise ratio(PSNR),  Correlation, Just Noticeable Distortion (JND), SSIM (Structural Similarity)


References:

1.       Saraju P. Mohanty, “Digital Image Watermarking: A Tutorial Review”.
2.       Aravind Kumar Parthsarathy et al., “An Improved Method Of Content based Image Watermarking”, IEEE June 2007.

3.       Emir Ganic,Scott D.Dexter,  “Embedding multiple    Watemarks in the DFT Domen using low and high frequency bands”

4.       Pooya Monshizadeh Naini, “Digital Watermarking on MATLAB”.

5.       Mahmoud El-Gayyar, “Watermarking techniques in spatial domain”.May 2006.

6.       Amit Joshi,Vivekanand Mishra, “Real time implementation of digital watermarking algorithm For image and video application”.

7.       Rafael C. Gonzalez, Richard E. Woods,”Digital Image  Processing using MATLAB”

8.       Zhou Wang,Alan Conrad Bovik , “Image Quality Assessment : From Error Visibility to Structural Similarity.”IEEE transactions APRIL2004

158-161

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Hazim Salah Abdulsatar, Kareem Jabbar Tijil, Ali Hashim Jryian  

Paper Title:

Low power Transceiver Structure for Wireless and Mobile Systems Based SDR Technology Using MATLAB and System Generator

Abstract:    This paper presents the design and implementation of Software Defined Radio (SDR) transceiver based 16-QAM as  one of the key techniques in structure of wireless and mobile communication system. The widely used of QAM in adaptive modulation due to efficient power and bandwidth force the researchers to found better and easy design by use the available software like MATLAB in order to advance the idea of software defined radio. The setting of parameter for random generator, QAM modulation and demodulation, AWGN wireless channel are provided. The Error rates of QAM system against the signal-to-noise ratio are used to evaluate the QAM system. The implementation results shows the system capability to transmitand receive intermediate frequency of 40 MHZ keeping the power under limited FPGA Slices and look up table (LUT). 

Keywords:
   SDR, QAM, MATLAB SIMULINK, Wireless and Mobile System, FPGA.


References:

1.        Pedro and Nuno, “Multi-Mode Receiver for Software Defined Radio”, Institute of Telecommunication – University of Aveiro – Portugal, online available: http://www.anacom.pt/render.jsp?contentId=761239, 2008.
2.        Pallavi, “Frame Work for the Design and Implementation of Software Defined Radio based Wireless Communication System”, M.Sc. thesis, University ofAAkron: http://etd.ohiolink.edu/view.cgi/Mannar%20Manna, 2005. 

3.        Sun, “A Generalized Quadrature Bandpass Sampling in Radio Receivers”, 0-7803-8736, IEEE Explore: pp.1288-1291, 2006

4.        Shi and Ismail, “Data Converters for Wireless Standards”, Springer, Kluwer Academic Publishers, ISBN-10: 0792376234, 2002  

5.        Tony, “RF and Digital Signal Processing for Software-Defi ned Radio”, Elsevier, ISBN 978-0-7506-8210-7, UK, pp. 319, 2009

6.        Avnet Memec, Inc..“Virtex-4 MB Development Board User’s Guide”,Ver. 3.0, Phoenix, Arizona, USA, pp1-42, Citing Internet sources URL:

7.        http://www.files.em.avnet.com/files/177/v4mb_user_guide_3_0.pdf, 2005  

8.        Altera, “Understanding CIC compensation filters”, application note 455,    pp.1-17, Availabel: http://www.altera.com/literature/an/an455.pdf , 2007 

9.        Avnet, Inc.“P240 Analog Module User Guide”, Rev. 1.0, Phoenix, Arizona, USA, pp. 1-25. Citing Internet sources URL: Error! Hyperlink reference not valid, 2006

10.     Amico,  Matteis and Baschirotto, “A 6.4mW, 4.9nV/√Hz, 24dBm IIP3 VGA for a multi-standard (WLAN, UMTS, GSM and Bluetooth) receiver”, 1-4244-0303, IEEE, pp. 82-85, 2006

11.     Changrui, Kong, Xie Shige and Huizhi1, “Design and FPGA Implementation of Flexible and Efficiency Digital Down Converter”, 978-1-4244-5900- IEEE, PP.438-441, 2010

12.     Chan, Tsui, Yeung, and Yuk,“ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366, 2007

13.     Texas Instrument, Inc., “ADS5500: 14-bit, 125 Msps,    A    Analog-to-Digital Converter Data Sheet”. Rev. G, Dallas,  T  Texas, USA, pp. 1-29. Citing Internet sources URL:  http://focus.ti.com/lit/ds/symlink/ads5500.pdf, 2007

14.     Texas Instrument, Inc.,“DAC5687: 16-bit, 500 Msps, 2x-8x Interpolation Dual-Channel Digital-to-Analog   Converter Data Sheet”. Rev. B, Dallas, Texas, USA, pp. 1-70. Citing Internet sources URL:

15.     Xilinx, Inc., “System Generator for DSP User Guide”, Release 9.2.01, San Jose, California, USA, pp. 1-346, 2007

16.     Xilinx, Inc.,“DSP Design Flows in FPGA Tutorial Slides”. San Jose, California, USA, pp. 1-82, 2003

17.     Xilinx Inc.. “System Generator for DSP”: User Guide, Release 10.1,Snn Jose, Clifornia, USA, PP.1-40: www.xilinx.com, 2008

18.     Xilinx, Inc., “Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide”. San Jose, California, USA, pp. 1-844, 2007

19.     Xilinx, Inc., “Virtex-II Pro and Virtex-II Pro X FPGA User Guide”, Ver. 4.2, San Jose, California, USA, pp. 1-559. Citing Internet sources URL:http://www.xilinx.com/support/documentation/user_guides/ug012.pdf, 2003

20.     Xilinx, Inc., “Spartan-3 FPGA Family Data Sheet”, Ver. 2.5, San Jose, California, USA, pp. 1-217. Citing Internet sources URL: http://www.xilinx.com/support/documentation/data_sheets/ds099.pdf, 2006

21.     Xilinx, Inc., “Timing constraints User Guide”,  Ver. 11.1.1, san Jose California, USA, pp. 1-137, Citing Internet sources URL: 2009. http://www.xilinx.com/support ort/documentation /sw_manuals/xilinx11/ug612.pdf A


162-167

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Fereridoon Owfi, Hodeis Abbasi Ghadikolaei, Mahnaz Rabbaniha, Maryam Abbasi Ghadikolaei

Paper Title:

The first Record and Reports of Nettastomatidae Identification in Iranian Museums of the Persian Gulf and Oman Sea's Waters

Abstract:    Nettastomatidae from Anguiliformes order was a part of fish fauna in the Persian Gulf and Oman Sea. It has commercial and nourishing value. This research revising the samples classification and systematic specimens of Nettastomatidae in south coast of Iran such as: Bushehr, Chabahar, Bandar Abbas, Bandar lengeh and the rest from museums, Universities and Research centers in Iran form2007-2008.The whole Ichthyology valid published references in this area (Fishing area51) were considered. The result showed that: Among 27 eel's samples one sample is in Nettastomatidae family’s .Hoplunis diomedianus (Good & Bean, 1896) was record and reported for the first time in the Persian Gulf and Oman Sea's of Iranian waters.

Keywords:
   Nettastomatidae, systematic review, Persian Gulf, Oman Sea


References:

1.        AL-Abdesalaam, T.Z, 1995. Marine species of the sultanate of Oman Marine science and fisheries center, oman.p234-236,246-247.
2.        Belgvad and Loppenthin , 1937.Volum on the fishes of the Iranian Gulf(1944).part III of Danish Scientific Investigation in Iranian Gulf,12col,pls.copenhagen.

3.        Biswas, s.p., 1993.Manual of methods in fish biology. South Asia. Publishers’ .pvt. Ltd.  Newdelhi,  195p.

4.        Bianchi, G.1995.Field guide to the commercial marine and brackish water of Pakistan.FAO.Rome.p15-18

5.        Coad, W. B, 1992, Check list & Bibliography in Persian Gulf fish,

6.        Carpenter, K.E., F.kurp p, O.A.Jones and Zajonz, 1997.Living marine resource of Kuwait, Stern Saudi Arabia, Bahrain, Qatar and United Arab
Emirates.Rome.P106-109.

7.        Dehghani ,N., and  Asadi, 1996. Persian Gulf and Oman Sea fishes publishedfrom Iranian Scientific &Research organization, Tehran.pp:350.

8.        FAO, 1986.Review of the fish stated of the world fishery resources; Marine fisheries.Western Indian Ocean (FAO Statistical Area 51), Rome. Italy

9.        FAO, 1997.FAO fisheries circular No.920 FIRM/C920. ISSN0429-9329.(FAO Statistical Area 51) Rome.

10.     Fischer, W. and Bianchi, G., 1984.FAO species Identification sheets for fishery purposes western Indian ocean (fishing area51), volum1.Rome.p 6- 7.

11.     Fish Base, 2013.Available from:  www.fishbase.com/July2013.

12.     Froese Rainer and Pauly Daniel, 2013. Available from; Seaarounds.org/ Researcher/Dpauly.pdf

13.     Hoseinzadeh,H. and  Kamali,E. 2003; Ornamental fishes of the Persian gulf published from Iranian fisheries science &Research organization, Tehran.65p.

14.     Javid Mohammad Pour,Owfi,F.2001. The reviews and defect of systematic, Taxonomy of Persian Gulf & Oman sea’s bony fish classification in International Natural History Museum of Iran, Tehran .MSC. Thesis, Tarbiat Modares University, Noor.

15.     Kuronuma, K. and Abe, Y.1986. Fishes of the Bahrain Gulf, Kuwait institute for scientific research .p 45-46.

16.     Kuronuma, K. and Abe, Y.1972.fishes of Kuwait,Kuwait.xIV,123pp.20plts.Boards,d/j.

17.     Owfi, F.2005a. Check list and species diversity of the Persian Gulf & Oman Sea, Anguilliformes  IFRO/ /UNCC Geneva, Suisse.p185.

18.     Owfi, F.2005b.Anguilliformes Fishes Diversity IFRO/ /UNCC Geneva, Suisse. p185.

19.     Owfi, F and Rabbaniha. M, 2007. Environmental management of Iranian coastal zone (marine fish fauna research) Volume 5; Iranian port and navigate organization, Tehran. P 1-12.

20.     Reef Base.com. Available from: www.reefbase.com/july2013.

21.     Smith, J.L.B. and Smith, M.M.1963.The fishes of Seychelles. Rhodes University, Grahmstown. 215p.

22.     Smith, M. & Heemstra, P.C.1986.  Smith’s Sea Fishes.  Springer – Verlag.

23.     Vander laan,R.,Fricke,R. and Eschmeyer,W.N,2013. Fish catalogue of life electronic version accessed dd mmm.


168-171

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Shadeeda Nalakath, Sreeja Rajesh

Paper Title:

Ranking Spatial Data by Quality Preferences

Abstract:    The objects in real world can be ranked based on the features in their spatial neighborhood using a preference based top-k special query. In this paper, a two purpose query structure for satisfying the user requirements is implemented. For example, a user who wishes to find a hotel with 3 star categories that serves sea food which provides the nearest airport facility. This concept can be obtained by developing a system that takes a particular query as the input and displays a ranked set of top k best objects that satisfy user requirements. For that, an indexing technique R-tree and a search method BB algorithm for efficiently processing top-k spatial preference query is used. R-tree (Real-tree), a data structure is the first index specifically designed to handle multidimensional extended objects and branch and bound (BB) algorithm that makes searching easier, faster and accurate. The key idea is to compute upper bound scores for non-leaf entries in the object tree, and prunes those that cannot lead to better results.  The advantage of using this algorithm is that it can reduce the number of steps to be examined.

Keywords:
   Query processing, spatial databases, R-tree.


References:

1.       M.L.Yiu, X.Dai, N.Mamoulis, and M.Vaitis, “Top-k Spatial Preference Queries,” in ICDE, 2007.
2.       K.S.Beyer, J.Goldstein, R.Ramakrishnan, and U.Shaft, “When is “nearest neighbor” meaningful?” in ICDT, 1999.

3.       Y.Chen and J.M.Patel, “Efficient Evaluation of All-Nearest- Neighbor Queries,” in ICDE, 2007.

4.       Jinzeng Zhang, Dongqi Liu,  Xiaofeng Meng,  “Preference Based Top-k Spatial Keyword Queries,” in ACM, 2011.

5.       Y-Y.Chen, T.Suel, and A.Markowetz, “Efficient Query Processing in Geographic Web Search Engines,” in SIGMOD, 2006.

6.       E.Dellis, B.Seeger, and A.Vlachou, “Nearest Neighbour Search on Vertically Partitioned High-Dimensional Data,” in DaWaK, 2005.

7.       A.Guttman, “R-Trees: A Dynamic Index Structure for Spatial Searching,” in SIGMOD, 1984.

8.       S.Hong, B.Moon, and S.Lee, “Efficient Execution of Range Top-k Queries in Aggregate R-Trees,” IEICE Transactions, 2005.

9.       I.F.Ilyas, W.G.Aref, and A. Elmagarmid, “Supporting Top-k Join Queries in Relational Databases,” in VLDB, 2003.


172-176

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

S. D. More, C. M. Kale, A.B.Shinde, K. M. Jadhav

Paper Title:

Role of Cr3+ Substitution on Electrical and Dielectric Behavior of Cu-ferrite Nanoparticles

Abstract:    Chromium substituted copper ferrite nano particles with generic formula CuCrxFe2-xO4 (x = 0.0, 0.2, 0.4, 0.6, 0.8, 1.0) have been synthesized successfully in nano-crystalline form by wet chemical co-precipitation method. The as prepared powder of CuFe2-xCrxO4 was sintered at 800 0C for 12 h. X-ray diffraction (XRD) technique was employed to investigate the structural properties and to check the phase purity of the prepared samples. The analysis of XRD patterns revealed the formation of single phase cubic spinel structure for all samples. The average crystallite size of all samples was estimated using   Scherrer’s formula and it is in the order of 30-40 nm. The lattice parameter obtained by using XRD data decreases with chromium substitution. The temperature dependence of d. c. electrical resistivity of all samples was studied by using two probe methods. The resistivity increases with increase in chromium substitution and as temperature increases resistivity decreases. The dielectric properties were investigated as a function of frequency at room temperature using LCR-Q meter. The dielectric constant ('), dielectric loss ('') and dielectric loss tangent (tanδ) decreases with increase in frequency.

Keywords:
   Resistivity, Spinel ferrite, Nano-crystalline, X-ray diffraction.


References:

1.        Devan R.S., Kolekar Y.D., Chougul B.K. J. Phys. Cond. Mat.18(2006)9809
2.        Elshora A.I., Elhiti M.A., E.l Nimr MK, Ahmed M.A., El Hasab A.M., J. Magn. Magn. Mater. 204(1999)20

3.        El- Sayed AM. Mater. Chem. Phys. 82(2003)583

4.        Bhosale A.G., Chougle B. K., J. Mater. Chem. Phys., 97(2006)273

5.        Souad Ammar, Arnaud Helfel, J. Mater. Chem.11 (2001)186

6.        Hamada IM. J Magn Magn Mater271 (2004)318

7.        Ladgoankar B.P., Kolekar C.B., Vasamberkar P.N., and Vaingankar A.S., Ind. J.  Eng. Matt. Sci.7 (2000)419

8.        Mazen S.A., Al-Falaky A., Hashem H.A. App Phys A 25(1995)559

9.        Patil S.A., Mahajan V.C., Ghatge A.K., Lotke S.D.Phase Trans. 63(1996)21

10.     Lipare A.Y., Vasambekar P.N., Vaingankar A. S. Mater. Chem. Phys. 81(2003)108

11.     Ch. Venkateshwarlu, Ravinder D., J. Alloys. Compd. 426(2006)4

12.     Y. Qj, Y. Yangg, X. Zhro, X. Liu., P. Wu, F. Zhang, S.Xu, Particulogy 8 (2010)207.

13.     M. Drofenik, M. Kristi, D. Makovec, Z. Jaglicic, D. Hanzel,Mater. Manuf. Process, 23 (2008) 603

14.     V. Vasilenko, K.S. Gavrilenko, J. E. Kotenko, O. Kador, L. Quahab, and V. U. Pavlishchuk. Theoretical and experimental chemistry, vol., 43 (2007) 5.

15.     U. Jeong, X. Teng, Y. Wang, et al., Adv. Mater, 19 (2007) 33.

16.     E. Veena Gopalan, K.A. Malini, S. Saravanan, D. Sakthi Kumar, Yasuhiko Yoshida and M. R. Anantharaman. J. Phys. D: Appl. Phys. 41 (2008) 185005

17.     Klug H.P., Alexander L.E., J. Appl, Crystallogra. 8(1975) 575

18.     Amitkumar, Yadav K.L., Mater. Sci. and Engg. B. 176 (2011) 2272

19.     Ahmed M,A., Ateia. E., Salem F.M., J. Mater. Sci. 42 (2007) 3651

20.     Rao K.H., Raju S.B., Aggarwal K., Mendiratta R.G., J. Appl.  Phys 52(1981)1376

21.     Shikh A.D., Mathe V.L. J. Mater. Sci .43 (2008)2018

22.     Ravinder D and Latha K. Mater. Lett. 41(1999)247

23.     J. C. Maxwell,

24.     Wagner K.W. Am. Phys.40 (1973)817

25.     Koop C.G.  Phys. Rev.83 (1951)121

26.     Iwauchi K. Jpn. J. Appl. Phys.10 (1971)1520


177-180

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Negin Keshavarznia, Rahim Sarvar, Masud Mahdavi

Paper Title:

Environmental Impacts of Second Home Development on Damash Village in Gilan Province, Iran

Abstract:    One of the most important issues which have received particular attention from geographers is examining the effects of spending times on taking vacation and tourism. This issue has led to development of second homes in rural and urban areas. Emphasizing the environmental effects of second home expansion, this research is aimed at studying the impact of such holiday homes on rural areas of Damash Village in Gilan Province, Iran. Present applied study was conducted based on descriptive- analytical methodology; also, the required data were gathered through two questionnaires, one designed for rural people (170 families) and the other for nonnative owners of second homes (60 families). The findings showed that second home development had by far much more negative impacts on rural communities were than the positive ones.

Keywords:
   Environmental Impact, Second home, Damash, Gilan,


References:

1.       M. R. Rezavani . The analysis of formation and development of second homes in Tehran rural areas, Researches in Geography, 2003 45, 56-69.
2.       P. Fesharaki. Rural geography. Tehran: Azad University Publication Center.1994.

3.       F. N. Aligholizadeh. Tourism impacts on rural areas (Unpublished Doctoral Dissertation). Tehran University, Tehran, Iran. 2008.

4.       G. H. Rostami, & L. Ramazanzadeh. Tourism and development. Noor Elm Publication Ind. 2011.
5.       May V Tourism, environment and development: Values, sustainability and stewardship, Tourism Management, Volume 12, Issue 2, June 1991, Pages 112-118.

6.       D. Fennel. Ecotourism an introduction, Rutledge, London. 1999.

7.       R. J. Johnston. Dictionary of Human Geography. Second Edition. Oxford: Blackwell.1988.

8.       Z. Ghaderi. Principles of sustainable development planning in rural areas. Tehran: The Organization for Iranian Municipalities. 2004.

9.       Z. Salehinasab. Tourism of second homes and their impacts on rural areas (Unpublished Master’s Thesis). Tehran University, Tehran, Iran. 2005.

10.     S. Benjamin & Weagraff. The Contribution of Second Homes to Rural Economies. A thesis in Agricultural, Environmental, and Regional Economics Master of Science the Pennsylvania State University. 2004.

11.     Economic Research. Spotlight CREDIT SUISSE. Second Homes and Vacation Homes in Switzerland. www.credit-suisse.com/ research. Available: http://www.halcyon.com/pub/journals/21ps03-vidmar.2005.


181-184

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Anjana Bhardwaj, Swati Gupta

Paper Title:

Design and Comparative Analysis of Conventional Adder and Pipelined Adder

Abstract:    Adding two binary numbers is a basic operation in binany electronic processing system. Pipelining digital systems has been shown to provide significant performance gains over non-pipelined systems and remains a standard in microprocessor design. The desire for increased performance has seen a push for pipelines. Pipelining is considered to be a good technique for increasing the circuit speed. In this paper, 4-bit conventional adder and 4-bit pipelined adder has been  implemented using Cadence virtuoso tool and simulation was performed using the generic 0.18 µm CMOS Technology at 5V. For comparison purposes, various parameters such as delay time, rise time and fall time has been compared which shows that pipelined adders are more efficient in terms of speed, power and throughput.

Keywords:
   Pipelining, Full Adder, Binary Adder.


References:

1.        Vishal D. Jaiswal, Saroj V. Bakale ,Sonal S. Bhopale, ”Implementation And Comparatively Analysis Of Low Power Adder Circuit”, International Journal of Advanced Technology & Engineering Research (IJATER) , Vol. 2, NO. 2, M ay 2013, pp. 2250-3536 .
2.        N. M. Chore, and R. N. Mandavgane, “A Survey of Low Power High Speed 1 Bit Full Adder”, Proceeding of the 12th International Conference on Networking, VLSI and Signal Processing, pp. 302-307, 2010.

3.        James Levy, JabulaniNyathi, and Jos´e Delgado ,”High-Performance Parallel Addition Using Hybrid Wave-Pipelining”,2005 IEEE Journal of electronic circuit designs,vol. 40, NO. 2, May 2005, pp. 7803-9197.

4.        V. Sukumar, D. Pan, K. Buck, H. Hess, H. Li, D. Cox and M. M. Mojarradi, “Design of a pipelined Adder Using Skew Tolerant Domino Logic in a 0.35 _m TSMC Process,” 2004 IEEE Workshop on Microelectronics and Electron Devices, September 2004, pp. 55-59.

5.        C-H. Huang, J-S.Wang, C. Yeh and C-J.Fang, “The CMOS Carry- Forward Adders,” IEEE Journal of Solid-State Circuits, Vol. 39, NO. 2, February 2004, pp. 327-336.

6.        Y. Kim and L-S Kim, “64-bit carry-select adder with reduced area,” Electronics Letters,Vol. 37, Issue 10, May 10, 2001, pp. 614-615.

7.        N. West and K. Eshraghian, “Principles of CMOS VLSI Design: A System Perspective”, 2nd ed., Addison Wesley, NY. 1992, pp. 513-536.

8.        P. K. Chan, M. D. F. Schlag, C. D. Thomborson, and V. G. Oklobdzija,“Delay Optimization of Carry-Skip Adders and Block Carry-Lookahead Adders,” 10th IEEE Proceedings on Computer Arithmetic, June 26-28, 1991, pp.154-164.


185-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

K. Vijay Kumar, R.Rajeshwara Rao

Paper Title:

Online Handwritten Character Recognition for Telugu Language Using Support Vector Machines

Abstract:    A system for recognition of online handwritten telugu characters has been presented for Indian writing systems. A handwritten character is represented as a sequence of strokes whose features are extracted and classified. Support vector machines have been used for constructing the stroke recognition engine. The results have been presented after testing the system on Telugu scripts.

Keywords:
   Online Handwritten Character, Recognition, Stroke, feature extraction, Support Vector Machine.


References:
1.        G.E.M.D.C. Bandara, S.D. Pathirana, R.M. Ranawana,“Use of fuzzy feature descriptions to recognize handwritten alphanumeric characters,” in 1st Conference on Fuzzy Systems and Knowledge Discovery, Singapore, 2002.
2.        Paul D. Gader, James M. Keller, Raghu Krishnapuram,Jung-Hsien Chiang, Magdi A. Mohamed, "Neural and fuzzy methods in handwriting recognition," Computer, vol.30, no. 2, pp. 79-86, Feb., 1997.

3.        Batuwita, K.B.M.R.; Bandara, G.E.M.D.C.; Fuzzy Recognition of Off-line Handwritten Numeric Characters Cybernetics and Intelligent Systems, 2006 IEEEConference on 7-9 June 2006 Page(s): 1 – 5.

4.        Arica, Nafiz; Yarman-Vural Fatos T; An Overview of Character Recognition Focused on Off-Line Handwriting;IEEE Transactions on Systems, Man, and Cybernetics- PartC: Applications and Reviews, Vol. 31, No. 2, may 2001.
5.        Ba-karait, N.O.S. Particle Swarm Optimization (PSO)-Based Clustering Algorithm for Handwritten Digits Recognition. MSc Thesis. Universiti Teknologi Malaysia,
2007.

6.        N. Otsu, A threshold selection method from gray-level histograms, IEEE Trans. Systems Man Cybernet. 9 (1) (1979) 62–66.

7.        B. Sankur and M. Sezgin, “A survey over image thresholding techniques and quantitative performance evaluation,” Journal of Electronic Imaging, 2004.

8.        O.D. Trier, A.K. Jain, Goal-directed evaluation of binarization methods, IEEE Trans. Pattern Anal. Mach.Intell. 17 (12) (1995) 1191–1201.

9.        N. R. Pal and S. A Pal, “Review on image segmentation techniques,” Pattern Recognition, Vol. 26, pp. 1277–1294,1993.

10.     P.K. Sahoo, S. Soltani, A.K.C. Wong, and Y.C. Chen, “A survey of thresholding techniques,” Comput. Vis. Graph. Image Process., Vol. 41, pp. 233–260, 1988.

11.     Liju Dong; Ge Yu; An optimization-based approach to image binarization. Computer and Information Technology, 2004. CIT '04. The Fourth International Conference on 14- 16 Sept. 2004 Page(s):165 – 170.

12.     A. Rosenfeld, A.C. Kak, Digital Picture Processing, second ed.,Academic Press, New York, 1982.

13.     J. Kittler, J. Illingworth, On threshold selection using clustering criteria, IEEE Trans. Systems Man Cybernet. 15 (1985) 652–655.

14.     A.D. Brink, Thresholding of digital images using twodimensional entropies, Pattern Recognition 25 (8) (1992) 803–808.

15.     H. Yan, Unified formulation of a class of image thresholding techniques, Pattern Recognition 29 (12) (1996) 2025–2032.

16.     Gatos, B., Pratikakis, I. and Perantonis, S.J. (2005).Adaptive Degraded Document Image Binarization. Pattern Recognition. 39: 317 – 327.

17.     Gupta, M. R., Jacobson, N. P. and Garcia, E. K.(2006).OCR Binarization and Image Preprocessing for Searching Historical Documents. Pattern Recognition.40:389 – 397.

18.     J.R. Parker, C. Jennings, A.G. Salkauskas, Thresholding using an illumination model, ICDAR’93, 1993, pp. 270–273.

19.     Cheriet, M., Kharma, N., Liu, C-L., Suen. CY. (2007) Character Recognition Systems : a Guide for Student and Practitioners. John Wiley & Sons, Inc. United States
of America.

20.     H.Yamada, K.Yamamoto, T.Saito: “A Non-linear Normalization Method for Handprinted Kanji Character Recognition – Line Density Equalization,” PatternRecognition, vol.23, no.9, pp.1023-1029, (1990).

21.     Davies, E.R., and Plummer, A.P.N. Thinning algorithm, a critique and a new methodology. Pattern Recognition 14, 1 (1981), 53-63.

22.     Pfaltz, J.L., and Rosenfeld, A. Computer representation of planar regions by their skeletons. Commun. ACM 10, 2 (February 1967). 119-125.

23.     Paul Kwok. A thinning algorithm by contour generation.Source Communications of the ACM archive Volume 31,Issue 11 (November 1988). Pages: 1314 – 1324.

24.     N. Arica; Yarman-Vural, F.T.; Optical character recognition for cursive handwriting Pattern Analysis and Machine Intelligence, IEEE Transactions on Volume 24,Issue 6, June 2002 Page(s):801 – 813.

25.     Changming Sun; Deyi Si; Skew and slant correction for document images using gradient direction. Document Analysis and Recognition, 1997., Proceedings of the Fourth International Conference on Volume 1, 18-20 Aug. 1997 Page(s):142 - 146 vol.1.

26.     Yimei Ding; Ohyama, W.; Kimura, F.; Shridhar, M.; Local slant estimation for handwritten English words Frontiers in Handwriting Recognition, 2004. IWFHR-9 2004. Ninth International Workshop on 26-29 Oct. 2004 Page(s):328 -333.


189-192

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

Omer Khalil Ahmed, Ahmed Hassan Ahmed, Khalil Ibrahim Mohammad

Paper Title:

Experimental Investigation for the Performance of Simple Solar Still in Iraqi North

Abstract:   The aims of this research to present the possibility of using simple solar still to  distillation of saline water in the northern areas of Iraq as well as to verify the reliability of research results published in the past to reach the standard adopted in determining the operational variables which affecting  on the performance of solar still. A series of tests to demonstrate the effect of the thickness of water in the basin on the productivity of solar still, the study showed productivity distilled rely mainly on the thick layer of water and it was also noted that the presence of local wind reduces the performance of solar still, but slightly. The presence of dye in the water was reduced the productivity of still and therefore, this option is not desirable to reach an improvement in the still productivity, except in the case of the use of  special pigments to absorb large quantities of solar  radiation, which imported materials and increase the cost of distillation. It also increased the salinity of the water in the basin of still leading to reduction in productivity and this reduction increased with the increased concentration of salt.

Keywords:
   Effect of operational variables, Solar still, Performance of,


References:

1.        Malik et. al, (1982)" Solar distillation'', Pergamon press, United Kingdom. 
2.        Rajvanshi, A.K.(1981)"Effect of various dyes on solar distillation", Solar energy, Vol.27,pp. 51-65.

3.        Akash,B.A and Mohsen, M.S (2000), "Experimental study of the basin type solar still under local climate conditions", Energy management & conversion, Vol 41, pp. 883-889.

4.        Tripathi. and Tiwari. (2005).”Thermal Modeling of Passive and Active Solar Stills for Different Depths of Water by Using the Concept of Solar Fraction,” Solar Energy, 80, Delhi, pp. 1-3.

5.        H. Tanaka and Y. Nakatake, Theoretical analysis of a basin type solar still with internal and external reflectors, Desalination, 186 (2006) 280–299.

6.        Dinesh Kumar et. al, (2013), ''  Performance Analysis of Single Slope Solar Still'', International Journal of Emerging Technology and Advanced Engineering, Volume 3, Issue 3, pp 66-72.

7.        Ehssan M.R. Nassef et .al, ''Study of the performance of solar still'', 2nd International Conference on Energy Systems and Technologies, 18 – 21 Feb, 2013, Cairo, Egypt.

8.        S. Nijmeh, S. Odeh, B. Akash, ''Experimental and theoretical study of a single-basin solar still in Jordan'', International Communications in Heat and Mass Transfer 32 (2005), pp. 565–572.

9.        Duffie, J. and Beckman, W., 1980. Solar energy thermal processes, John Wiley and Sons, New York.


193-198

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

G.N.Lokesh, M.Ramachandra, K.V.Mahendra

Paper Title:

Production of Al-4.5% Cu Alloy Reinforced Fly Ash and SiC Hybrid Composite by Direct Squeeze Casting

Abstract:    Today the use of composites will be a clear choice in many instances especially in automobile and aerospace sector. Material selection in others will depend on factors such as working life span necessities, number of items to be produced, convolution of product shape, possible savings in assembly costs and on the experience & skills of the designer in drumming the optimum potential of composites. Composites produced using waste as reinforcements helps not only clearing environmental issues but also helps in increasing mechanical properties of the composites. One of the inexpensively available and also coming as waste form thermal power plant is fly ash. In the present investigation  fly ash and SiC reinforced Al-4.5% Cu composites containing 2%fly ash with 2,4,6% SiC and 4%fly ash with 2,4,6% SiC fabricated by direct squeeze casting technique. The composites was analysed by measuring the hardness, tensile, compression, impact and wear behaviour. Microstructure of the composites was observed by scanning electron microscope (SEM). The results indicate that the hardness, tensile, compression, impact and wear resistance increases with increase in percentage of fly ash and SiC. Microstructure shows better bonding between matrix particle interface and no fracture observed.

Keywords:
   Squeeze Casting, Fly Ash. Tensile Strength, Compression Strength, Wear.


References:

1.       I.A. Ibrahim, F.A. Mohamed and E.J. Lavernia, Particulate reinforced metal matrix composites a review, Journal of Materials Science 26 (1991), pp.1137 -1156.
2.       S.C. Tjong, K.C. Lau, Properties and abrasive wear of TiB2/Al-4%Cu composites produced by hot isostatic pressing, Composites Science and Technology 59 (1999), pp. 2005–2013.

3.       Young-Ho Seo, Chung-Gil Kang, The effect of applied pressure on particle-dispersion characteristics and mechanical properties in melt-stirring squeeze-cast SiCp/A1 composites, Journal of Materials Processing Technology 55 (1995), pp. 370-379.

4.       I. C. Stone and P. Tsakiropoulos, The effect of the spatial distribution of reinforcement on the fabrication and heat treatment of (A1-4wt.%Cu)-SiC particle metal
matrix composites, Materials & Science and Engineering, A 189 (1994), pp. 285-290.

5.       T.R. Vijayaram, S. Sulaiman, A.M.S. Hamouda, M.H.M. Ahmad, Fabrication of fiber reinforced metal matrix composites by squeeze casting technology, Journal of Materials Processing Technology 178 (2006), pp. 34–38.

6.       T.P.D. Rajan, R.M. Pillai, B.C. Pai,  K.G. Satyanarayana, P.K. Rohatgi, Fabrication and characterisation of Al–7Si–0.35Mg/fly ash metal matrix composites processed by different stir casting routes, Composites Science and Technology 67 (2007), pp. 3369–3377.

7.       M.R. Ghomashchi, A. Vikhrov, Squeeze casting: an overview, Journal of Materials Processing Technology 101 (2000), pp.1-9.

8.       P. K. Rohatgi, N. Gupta, Simon Alaraj, Thermal Expansion of Aluminum–Fly Ash Cenosphere Composites Synthesized by Pressure Infiltration Technique, Journal of composite materials, Vol. 40, No. 13 (2006), pp.1163-1174.

9.       Young-Ho Seo, Chung-Gil Kang, The effect of applied pressure on particle-dispersion characteristics and mechanical properties in melt-stirring squeeze-cast SiCp/A1 composites, Journal of Materials Processing Technology, 55 (1995), pp. 370-379.

10.     Adem Onat, Mechanical and dry sliding wear properties of silicon carbide particulate reinforced aluminium–copper alloy matrix composites produced by direct squeeze casting method, Journal of Alloys and Compounds,  489 (2010), pp. 119–124.

11.     Cevdet Kaynak, Suha Boylu, Effects of SiC particulates on the fatigue behaviour of an Al-alloy matrix composite, Materials and Design, 27 (2006), pp. 776–782.

12.     Olivier Beffort, Siyuan Long, Cyril Cayron, Jakob Kuebler, Philippe-Andre Buffat, Alloying effects on microstructure and mechanical properties of high volume
fraction SiC-particle reinforced Al-MMCs made by squeeze casting infiltration, Composites Science and Technology 67 (2007), pp. 737–745.

13.     Garios Itskos, P.K.Rohatgi, A. Moutsatsou, C.Vasilatos, John.D. Defow, Nikolas Koukouzas, Pressure Infiltration Technique for the Synthesis of A356 Al/fly Ash Composites: Microstructure and Tribological Performance, World of Coal Ash (WOCA) Conference - May 9-12, 2011, in Denver, CO, USA.

14.     J. Bienia, M. Walczak, B. Surowska,  J. Sobczaka, Microstructure And Corrosion Behaviour Of Aluminum Fly Ash Composites, Journal of Optoelectronics and Advanced Materials, Vol. 5, No. 2, June 2003, pp. 493-502.

15.     P. Shanmughasundaram, R. Subramanian and G. Prabhu, Some Studies on Aluminium – Fly Ash Composites Fabricated by Two Step Stir Casting Method, European Journal of Scientific Research, ISSN 1450-216X Vol.63 No.2 (2011), pp.204-218.

16.     Sudarshan, M.K. Surappa, Synthesis of fly ash particle reinforced A356 Al composites and their characterization, Materials Science and Engineering, A 480 (2008), pp. 117–124.

17.     K.V. Mahendra,  K. Radhakrishna, Fabrication of Al–4.5% Cu alloy with fly ash metal matrix composites and its characterization, Materials Science-Poland, Vol. 25, No. 1(2007), pp.57-68.

18.     M. Ramachandra, K. Radhakrishna, Effect of reinforcement of fly ash on sliding wear, slurry erosive wear and corrosive behavior of aluminium matrix composite,Wear 262 (2007), pp. 1450–1462.

19.     Adem Onat, Hatem Akbulut, Fevzi Yilmaz, Production and characterization of silicon carbide particulate reinforced aluminium–copper alloy matrix composites by direct squeeze casting method, Journal of Alloys and Compounds, 436 (2007), pp. 375–382.

20.     N.E. Bekheeta, R.M. Gadelrabb, M.F. Salahc, A.N. Abd El-Azim, The effects of aging on the hardness and fatigue behavior of 2024 Al alloy/SiC composites, Materials and Design, 23 (2002), pp. 153-159.

21.     S. Long, O. Beffort , C. Cayron  and C. Bonjour, Microstructure and mechanical properties of a high volume fraction SiC particle reinforced AlCu4MgAg squeeze casting, Materials Science and Engineering, A269 (1999), pp.175–185.

22.     Jung-Moo Lee, Sang-Kwan Lee, Sung-Jin Hong, Yong-Nam Kwon, Microstructures and thermal properties of A356/SiCp composites fabricated by liquid pressing method, Materials & Design, Volume 37, May 2012, pp. 313-316.

23.     Y.Q. Wang, A.M. Afsar, J.H. Jang, K.S. Han, J.I. Songa, Room temperature dry and lubricant wear behaviors of Al2O3f/SiCp/Al hybrid metal matrix composites, Wear 268 (2010), pp. 863–870.

24.     Cevdet Kaynak, Suha Boylu, Effects of SiC particulates on the fatigue behaviour of an Al-alloy matrix composite, Materials and Design 27 (2006),pp.776–782.

25.     Jae-Ho Jang, Dae-Geun Nam, Yong-Ho Park, Ik-Min Park, Effect of solution treatment and artificial aging on microstructure and mechanical properties of Al-Cu alloy, Transactions of Nonferrous Metals Society of China, Volume 23, Issue 3, March 2013, Pages 631-635.

26.     K.V.Mahendra, K.Radhakrishna, Characterization of Stir Cast Al-Cu-(fly ash + SiC) Hybrid Metal Matrix Composites, Journal of Composite Materials, Vol 44, April(2010), pp.989-1005.

27.     A.K. Banerjee, P.K. Rohatgi, W. Reif, in: Proceedings of the Eighth Symposium in Advanced Material Research and Development for Transport-Composites, 1985, Strausbourg, France, November 1985.

28.     Suresh N, Venkateswaran S, Seetharamu S, Influence of Cenospheres of fly ash on the mechanical properties and wear of permanent moulded eutectic Al–Si alloys, Materials Science-Poland, Vol.28, No.1,(2010), pp.55-65.

29.     LI Run-Xia, LI Rong-de, Bai Yan-hua, QU Ying-dong, Yuan Xiao-guang, Transaction of nonferrous metals society of china,20 (2010), pp.59-63.


199-203

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

S.Tamilselvan, S. Savitha, D. Prabakar

Paper Title:

An Efficient Spectrum Sharing and Interference Reduction for Cellular Network

Abstract:    To utilize spectrum resource more efficiently in a cellular network is very difficult.  So to improve the resources, adhoc device to device communication was introduced.  Interference management is a major component in designing these spectrum sharing schemes and it is critical that the licensed users maintain their QoS.  A distributed dynamic spectrum protocol is proposed in which device to device users can communicate directly with each other and access the spectrum more efficiently.  Network information is distributed by route discovery packet in a random access manner to establish the single hop or multihop link between D2D users. The discovery packet which contains network information will decrease the failure rate of the route discovery and also reduces the number of transmissions to find the route. The Performance metrics such as the route discovery failure probability and the number of transmission necessary to discover a route to the destination are to be analyzed.  Finally using the found route, the simulation result shows that two D2D users can communicate with a low probability of outage and also reduces harmful interference to the macro users. The proposed protocol can be significantly achieved power saving using D2D route rather than connecting to the cellular base station.  So spectrum resources are shared more efficiently between the macro user and device to device user.

Keywords:
   Device-to-device, spectrum sharing, power control, interference management, route discovery.


References:

1.        Brett Kaufman, T. Jorma Lilleberg, S. Behnaam Aazhang, “Spectrum Sharing Scheme between Cellular Users and Ad-hoc Device-to-Device Users” IEEE Transactions on Wireless Communications, Vol. 12, No.3, March 2013.
2.        G. B. Middleton, K. Hooli, A. Tolli, and J. Lilleberg, “Inter-operator spectrum sharing in a broadband cellular network,” in IEEE International Symposium. Spread Spectrum Techniques Application, 2006.

3.        S.Jha, M.Rashid, and V.Bhargava, “Medium access control in distributed cognitive radio networks,”IEEE Wireless Communication., vol. 18, no. 4, pp. 41–51, August 2011.

4.        S.Y. Lien, Y.-Y. Lin, and K.-C. Chen,“Cognitive and game-theoretical radio resource management for autonomous femtocells with QoS guarantees,” IEEE transaction on Wireless Communication., July 2011.

5.        G. B. Middleton and J. Lilleberg, “An algorithm for efficient resource allocation in realistic wide area cellular networks,” in International Symposium. Wireless Personal Multimedia Communication, 2007.

6.        D. P. Satapathy and J. M. Peha, “Spectrum sharing without licensing: opportunities and dangers,” in Interconnection Internet: Sel. Papers Telecommunication.
Policy Research Conference, 1996.

7.        B. Kaufman, B. Aazhang, and J. Lilleberg, “Interference aware link discovery for device to device communication,” in Asilomar Conference Signals, System, Computing, 2009.

8.        K. Doppler, C.-H. Yu, C. Ribeiro, and P. Jänis, “Mode selection for device-to-device communication underlaying an LTE-advanced network,” in IEEE Wireless Communications and Networking Conference 2010.

9.        K.Doppler, Rinne, P. Jänis, C. Ribeiro,and K. Hugl, “Deviceto- device communications; functional prospects for LTE-advanced networks,” in International Workshop LTE Evolution IEEE International Conference on Communications,2009.

10.     P. Jänis, C.-H. Yu, K. Doppler, C. Ribeiro, C. Wijting, K. Hugl, O.Tirkkonen, and V.Koivunen,“Device-to-device communication underlaying cellular communication systems,” Int. J. Communications  and Networking  System . Science. vol. 2, no. 3, pp. 169–178, June 2009.

11.     N.Jindal, J. Andrews, and S. Weber, “Optimizing the SINR operating point of spatial networks,” in Information and Theory Application Workshop, 2007.

12.     T.Wysocki and A.Jamalipour, “Spectrum management in cognitive radio:applications of ortfolio theory in wireless communications,” IEEE Wireless Communication., vol. 18, no. 4, August  2011.

13.     T.Kamakaris, D. Kivanc-Tureli, and U. Tureli, “Interference model for cognitive coexistence in cellular systems,” in Proceeding IEEE Global Communication, pp.
4175–4179. 2007.

14.     B.Kaufman, “Spectrum sharing techniques for next generation cellular networks,” Master’s thesis, Rice University, Houston, Texas, May 2009.

15.     B.Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device network,” in Asilomar Conference Signals, and System. Computing.2008.

16.     K.Doppler, M.Rinne, C.Wijting, C. Ribeiro, and K. Hugl, “Device to- device communication as an underlay to LTE-advanced networks,” IEEE Communication. Magazine., vol. 47, no. 12, pp. 42–49, December  2009.

17.     H. Luo, X. Meng, R. Ramjee, P. Sinha, and L. Li, “The design and evaluation of unified cellular and ad-hoc networks,” IEEE transaction on Mobile Computing., vol. 6, no. 9, pp. 1060–1074, September  2007.


204-210

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

S. Tamilselvan, R. Gajalakshmi, D. Prabakar

Paper Title:

Cooperative Relay Based Resource Allocation for OFDMA Network

Abstract:    Cooperative relaying is a promising technique for Long Term Evolution Advanced (LTE-A) networks to satisfy high throughput demand and support heterogeneous communication services with diverse quality-of-service (QoS) requirements. Optimal relay selection, power allocation and sub carrier assignment scheme under a total power constrain is proposed for a Qos aware resource allocation for multi user cooperative OFDMA network. The relay selection, power allocation and subcarrier assignment problem are formulated as a joint optimization problem with the objective of maximizing system throughput. User at the cell edge and shadowing degrade the signal quality, hence cooperative relaying is very promising solution to provide better throughput and coverage extension. Combining OFDMA and cooperative relaying assures high throughput enhancement for user at cell edge .Throughput enhancement problem is solved by two level dual composition and sub gradient method. To further reduce the computational cost, low complexity suboptimal schemes   are also proposed in this work. Simulation result indicates that the proposed scheme will guarantee the users Qos requirement and maximize the system throughput.

Keywords:
   OFDMA network, cooperative relaying, relay selection, resource allocation, joint optimization, QoS, LTE-A.


References:

1.       MdShamsulAlam , Jon W. Mark  and Xuemin(Sherman) Shen, “Relay Selection and Resource     Allocation for Multi-User Cooperative OFDMA  Networks”, IEEE  transactions on wireless communications, vol. 12, no. 5, May 2013.
2.       3GPP, TS-25.101 v6.4.0, “Technical specification group radio accessnetwork; User Equipment (UE) radio transmission and reception,” pp.1–272, Mar. 2004.

3.       3GPP, TR-36.913 v8.0.1, “Requirements for further advancements for E-UTRA,” pp. 1–17, Mar. 2009.

4.       IEEE Std 802.16m-2011, “IEEE standard for local and metropolitan area networks part 16: air interface for broadband wireless access systems amendment 3: advanced air interface,” pp. 1–1112, June 2011.

5.       Stephan Scheduler* and Volker Kühn “Resource allocation for the multiple-access relay channels and OFDMA”, IEEE Journal on Advances in Signal Processing, vol 9 Jan 2013.

6.       Yuwen Pan, Andrew Nix and Mark Beach, “Efficient Power and Subcarrier Allocation for OFDMA-Based Relay Networks,” IEEE Communication Magazine, vol.72, no. 7, pp. 54–71, Feb 2011.

7.       Ian C. Wong, Nuking Shen, Brian L. Evans, and Jeffrey G. Andrews “A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems “IEEE Communication Magazine, vol.88, no. 7, pp. 54–71, F 2012

8.       W. Zhuang and M. Ismail, “Cooperation in wireless communication networks,” IEEE Wireless Commun., vol. 19, no. 2, pp. 10–20, Apr.2012

9.       S. Kadloor and R. Adve, “Relay selection and power allocation in cooperative cellular networks, ”IEEE Transactions  Wireless Communication, vol. 9,no. 5, pp. 1676–1685, May 2010.

10.     K. Sung, Y. P. Hong, and C. Chao, “Resource allocation and partner selection for cooperative multicarrier systems,” IEEE Trans. Veh. Technol., vol. 60, no. 7, pp. 3228–3240, Sept. 2011.

11.     Ian C. Wong, Zukang Shen, Brian L. Evans, and Jeffrey G. Andrews “A Low Complexity Algorithm for Proportional Resource Allocation in OFDMA Systems” ,IEEE journal on wireless network and communication   vol.46 Jan 2013.

12.     P. Thulasiraman and X. Shen, “Interference aware resource allocation for hybrid hierarchical wireless networks,” Computer Netw., vol. 54, pp.2271–2280, Sept. 2010.

13.     M. Awad, V. Mahinthan, M. Mehrjoo, X. Shen, and J. Mark, “A dual-decomposition-based resource allocation for OFDMA networks with imperfect CSI,” IEEE Transactions Vehicular Technology, vol. 59, no. 5, pp. 2394–2403, June 2010

14.     C.-N. Hsu, H.-J. Su, and P.-H. Lin, “Joint subcarrier pairing and power allocation for OFDM transmission with decode-and-forward relay, “I EEE Trans. Signal Process., vol. 59, no. 1, pp399–414, Jan. 2011.

15.     W. Dang, M. Tao, H. Mu, and J. Huang, “Subcarrier-pair based resource allocation for cooperative multi-relay OFDM systems,” IEEE Trans.Wireless Commun., vol. 9, no. 5, pp. 1640–1649, May 2010.

16.     X. Zhang, S. Chen, and W. Wang, “Multiuser radio resource allocation for multiservice transmission in OFDMA-based cooperative relay networks, EURASIP J. Wireless Commun. Newt. vol. 2009, pp. 1–13, 2009.

17.     M. Hajiaghayi, M. Dong, and B. Liang, “Optimal channel assignment and power allocation for dual-hop multi-channel multi-user relaying, “in Proc. 2011 IEEE International Conf. Compute. Commun., pp. 76–80.

18.     Y. Li, W. Wang, J. Kong, W. Hong, X. Zhang, and M. Peng, “Power allocation and subcarrier pairing in OFDM-based relaying networks,” inProc. 2008 IEEE
International Conf. Commun., pp. 2602–L. Vandendorpe, R. Duran, J. Louveaux, and A. Zaidi, “Power allocation
19.     For OFDM transmission with DF relaying,” in Proc. 2008 IEEE International Conf. Commun., pp. 3795–3800.2606.
20.     Anxin Li, Satoshi Nagata, Atsushi Harada  and Hirohito Suda “A novel type II relay-assisted retransmission scheme for uplink of LTE-advanced system ”IEEE Journal on Advances in Signal Processing  vol. 66, no.9 Jan  2013.

21.     AbdallahBou Saleh, Simone Redana, Bernhard Raaf “ Performance of Amplify-and-Forward and Decode and-Forward Relays in LTE-Advanced ” IEEE Journal on Advances in   vol. 66, no.9 Jan  2013.

22.     mikiolwamura , hideakitakaharshi , satoshinagata “relay technology in LTE –Advanced” NTT DOCOMO technical journal vol. 12, no 2 sep 2013.

23.     K. Sung, Y. P. Hong, and C. Chao, “Resource allocation and partner selection for cooperative multicarrier systems,” IEEE Transactions Vehicular Technology, vol. 60, no. 7, pp. 3228–3240, Sept. 2011.


211-218

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Jinang M.Patel, Krunal J.Patel,Vatsal V.Patel, Kalpesh V.Vaghela

Paper Title:

Performance studies of Tire Pyrolysis Oil blends with Diesel Fuel

Abstract:    The present rate of consumption of gasoline would lead to severe shortage of it within next few decades. An urgency of finding an alternative fuel in its place has led to several researches around the world. In this study oil obtained from pyrolysis of waste tire was studied upon for its suitability to be used with diesel fuel. A study was carried out to evaluate the use of various tire pyrolysis oil (TPO) blends with diesel fuel. Performance and emission characteristics of TPO blends with diesel on a 4 cylinder direct injection engine are presented in this study. In the initial stage the test were conducted on four stroke single cylinder diesel engine by using diesel and base line data was generated .A constant speed off 1500rpm was maintained throughout the experiment. Then commercially available TPO was blended with diesel fuel at the volumetric ratios of 5 %( D5), 10% (D10) and15 %( D15).The results showed that brake thermal efficiency of the engine was maximum for D10 blend than diesel at same loading conditions. The BSFC was also found to be less for D10 blend compared to diesel. There was no significant increase in exhaust gas temperature for the blends as compared to diesel.

Keywords:
   Compression ignition engine, Tire pyrolysis oil, Performance Characteristics, Brake thermal efficiency, Brake specific fuel consumption


References:

1.        C. Roy, B. Labrecque, B. De Caumia, Recycling of scrap tires to oil and carbon black by vacuum pyrolysis. Resource, Conservation and Recycling 4(1990) 203–213.
2.        S.Murugan, M.C.Ramaswamy, G.Nagarajan, “The Use of Tire Pyrolysis Oil in Diesel Engines”. Waste Management, Volume 28, Issue 12, December 2008, Pages
2743-2749

3.        M.Mani ,C,subash,G.Nagarajan "performance Emission and Combustion Characteristics of a DI Diesel Engine Using Waste Plastic Oil” Applied Thermal Engineering, volume 29, Issue 13, September 2009, Pages 2738-2744

4.        International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 4, June – 2012 Mr.Tushar Patel 1Student, L.D.R.P engineering college, Gandhinagar


219-221

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Talebzadegan Mohsen, Abodi Ali, Riazi Iman

Paper Title:

Feasibility of Using Impressed Current Cathodic Protection Systems by Solar Energy for Buried Oil and Gas Pips

Abstract:    Cathodic protection mostly used to protect buried structures of oil and gas pipes in oil and gas industries from corrosion. Cathodic protection by impressed current method includes the formation of an electrolyzed system in which anode and cathode  is obtained by direct current  generator. installing one or more anodes of cast iron adjacent to a structure and the structure and the anode(s) are connected respectively to negative and positive poles of the supply. In the present study, by collecting actual soil data of the region, mechanical specifications of oil transfer pipes and their coating in Ahwaz region and also using available calculations and manuals regarding types of anodes and solar panels and batteries in the market a region-specified solar Cathodic protection method was designed. By calculations, the best type of solar panel (AT-50), number of panels and their voltage and produced current were obtained 42, , 52.2V and 40.04 A, respectively. The proposed battery is sealed lead acid type with number, voltage and current of 4, 48V and 250 A, respectively.

Keywords:
   Cathodic protection-impressed Current-buried pipe


References:

1.        B.Laoun, K.Niboucha , L.Serir ," Cathodic Protection of a buried pipeline by solar energy" Scientific and Technical Research Center on Control and Welding ,Cheraga,Algeria,2009
2.        R.Benathmane," study and Simulation of Cathodic Protection by Impressed current Protection of Buried Work" ,Memoire de fin d Etudes,Department de Chimie Industrielle,Universite Saad Dahleb,Blida,2003

3.        B.Laovn, K.Nibooucha, L.Serir" Cathodic Protection of a buried pipeline by solar energy" Scientific and Technical Research Center on Control and Welding,Cheraga ,Algeria ,28 Mars 2009

4.        Hashemi Majd,sayed  ali," Buried Pipe Cathodic Protection" mashad,iran,2007

5.        W.Von Baeckmann,W.Schwenk and Wprinz,"Hand book of Cathodic Corrosion Protection" Third Edition ,Elsevier Science,1997

6.        B.Khalilzadeh,I.Esari,"Buried pipe cathodic Protection by Solar Energy" Pars Oil and Gas Co.,Azad University,Iran,2010


222-225

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

Hazim Salah Abdulsatar

Paper Title:

Simulation and Implementation of Orthogonal Frequency Division Multiplexing (OFDM) Model Based SDR

Abstract:    An OFDM transceiver based on software defined radio (SDR) techniques is modeled by MATLAB in this paper. The modulated input data using orthogonal subsidiary companies , with carrier frequency 70MHz. After contaminating the signal with noise , and re- sampling - the received signal and convert it to a digital system to extract the original information . Results obtained tend to increase in the signal to noise ratio , and improve the planned constellation of the received signal and bit error rate (BER) of the system decreases to zero when the S / N ratio greater than 12dB. FPGA to implement a complete SIMULINK model first and then generate HDL code and DSP design tool from XILINX, and the results will be obtained from MATLAB and FPGA be approximately equal .

Keywords:
   OFDM, Software Defined Radio, MATLAB- SIMULINK.


References:

1.        R. Prasad, OFDM for wireless communications systems. Artech House, Inc.,2004.
2.        J.A.C. Bingham, ADSL,VDSL, and multicarrier modulation , New York, USA: John  and Sons Inc.,2000.

3.        Institute of Electronics and Electrical Engineers, “Wireless LAN medium access control(MAC) and physical layer(PHY) specifications: high speed physical layer in 5 GHz band,” IEEE Standard 802.11a, nov.1999.

4.        “Wireless LAN medium access control(MAC) and physical layer (PHY) specifications: further higher speed physical layer extension in 2.4 GHz . IEEE standard
802.11g, June 2003.

5.        “Air interface fixed broadband wireless access systems, medium access control modifications and additional physical layer specifications for 2.11 GHz” IEEE 802.16a, June 2004.

6.        L.J Cimini Jr., “Analysis and simulation of a digital mobile channel using orthogonal frequency division multiplexing,.”  IEEE Trans.commun.,vol.33,pp. 665-675, June 2004.

7.        T. Pollet, M. Van Bladel and M.Moeneclaey, BER Sensitivity of OFDM systems to carrier frequency offset And wiener phase noise.

8.        Richard van Nee and Ramjee Prasad, 2000, OFDM  for Wireless Multimedia Communications.

9.        Xilinx ISE 9.2i Software Manuals: Constraints Guide, and Development System Reference Guide, Xilinx, Inc., 2007.

10.     Virtex-4 MB Development Board User’s Guide, Ver. 3.0,   Avent Memec,.  [Online]. Available: http://www   Files.em.avent.com /files/177/v4mb_use
r_guide_3_0.Pdf.2008. 

11.     Synplicity FPGA Synthesis Reference Manual,Synplicity, Inc., 2007.

12.     Nasreen Mev ---Prof. Brig.R.M. Khaire , “ Implementati-on of OFDM Transmitter and Receiver Using FPGA, ”International Journal of Soft Computing & Engineering,Volume: 3  Issue:  3 Pages:  199-202, Year: 2013.

13.     Mohamed, M. A. “ FPGA Synthesis of VHDL OFDM System , “ Wireless Personal Communications , Volume: 70 Issue: 4 Pages: 1885-1909 Provider: Springer DOI: 10.1007/s11277-012-0786-0, Year: 2013.

226-229

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Basim Khalaf Jarullah, Izz Kadhum Abboud, Kareem Jabbar Tijil

Paper Title:

Simulation of Speech Denoising based on Voiced/ Unvoiced Decision by Using DWP

Abstract:    In this paper, a speech denoising system using wavelet packet thresholding algorithm is investigated. This method is based on thresholding the wavelet coefficients that depend on voiced/unvoiced detection. Wavelet threshold can be done by a standard deviation method for each frame by level dependent thresholding using semisoft threshold in the additive Gaussian noise channel. The results of simulation indicate that using Discrete Wavelet Packet (DWP) in speech denoising application provides a quality better than Discrete Wavelet Thresholding (DWT) and voiced/unvoiced detection enhanced the performance of the system.   

Keywords:
   DWP, DWT, Matlab.


References:

1.        Yasser Ghanbari and Mohammed Reza Karami,"A Modified Speech Enhancement System Based on the Thresholding of the wavelet Packets", 13th ICEE2005, Vol. 4, Zanjan, Iran, May 10-12, 2005.
2.        Y. Ghanbari, M. Karami, B. Amelifard, "Improved Multi-band Spectral Subtraction Method for Speech Enhancement", Proc. Of the 6th IASTED Int. Conf. on Signal and Image Processing, USA, pp. 225-230, August 2004.

3.        H. Sameti, H. Sheikhzadeh, Li Deng, R. L. Bernnan, "HMM-Based Strategies for Enhancement of Speech Signals Embedded in Nonstationary Noise", IEEE Transactions on Speech and Audio Processing, Vol. 6, No.5, September 1998.

4.        M. Klein and P. Kabal, "Signal Subspace Speech Enhancement with Perceptual Post-filtering", Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Orlando,
FL, May 2002, pp. I-537-I-540.

5.        Ahmed K. Hassan, “Speech Denoising Based Wavelet Transform”, M. Sc. Thesis , Mustansiria University, 2005.

6.        Jong Kwan Lee and Chang D. Yoo, "Wavelet Speech Enhancement based on Voiced/ Unvoiced Decision", The 32nd International Congress and Exposition on Noise
Control Engineering Jeju International Convention Center, Seogwipo, Korea, August 25-28, 2003.

7.        Yousef M. Hawwar, Ali M. Reza and  Robert D. Turney , “Filtering (Denoising) in the Wavelet Transform Domain”, University of  Wisconsin-Milwaukee, Department of Electrical Engineering and Computer Science ,2000.

8.        David L. Donoho and Iain M. Johnstone, “Adapting to Unknown Smoothness via Wavelet Shrinkage”, Stanford Univesity, Division of Biostatistics, Technical Report No. 161, June 1993.

9.        James F. Scholl, Jonathan R. Agre, Loren P. Clare, and Martin C. Gill, “A low Power Impulse Signal Classifier Using The Haar Wavelet Transform”, Proc. SPIE, Sensors,C31, V.3577,pp. 136-145, 1999.

10.     Xiaolong Yuan, B.S.E.E., “Auditory Model Based Bionic Wavelet Transform for Speech Enhancement”, MSc. Thesis, Marquette University, May 2003.

11.     Fadhil S. Hasan, "Performance of Discrete Wavelet Transform (DWT) based Speech denoising in Impulsive and Gaussian Noise", Engineering Journal in Mustansiriyah University ,2005.


230-233

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Hutashani B. Rayate, Vidya V. Deshmukh

Paper Title:

Prediction of Acute Hypotension Episode

Abstract:    Acute hypotensive episodes (AHE) are serious clinical events in intensive care unit. It causes damage of irreversible organ and may lead to death. When occurrence of an Acute Hypotension Episode (AHE) is predicted in advance, an appropriate intervention can reduces the risk for patient. The prediction is to be made using two groups of ICU patient records from the MIMIC II Database from the Physionet. The physionet challenge is divided into two parts. The first part is to distinguish between patients who have experienced acute hypotension episodes and patients who do not. The second part of this challenge is to predict acute hypotension episodes. We here present an algorithm for prediction of AHE using mean arterial blood pressure (MAP). We then used information divergence (or Kullback-Liebler divergence) between two distributions to identify the most discriminative features. The objective of this work is to describe an automated statistical method that produces an automated method to predict AHE using the least data possible.

Keywords:
   Hypotension Prediction, Information Diversion, K-L Diversion theorem, Mean Arterial Blood Pressure.


References:

1.        Moody GB, Lehman LH. “Predicting acute hypotensive episodes” the 10th annual PhysioNet/Computers in Cardiology Challenge. Computers in Cardiology 2009; 36.
2.        The MIMIC II Project database via the Physionet website. http://www.physionet.org/physiobank/database/mimic2db/

3.        Fayyaz A. Afsar Prediction of Acute Hypotension   Episodes in Patients Taking Pressor Medication UsingModeling of Arterial Blood Pressure Waveforms. IEEEconference 2010.

4.        P Langley, ST King, D Zheng, EJ Bowers,K Wang, JAllen, “Predicting Acute Hypotensive Episodes fromMean Arterial Pressure” Computers in Cardiology 2009; 36:553−556.

5.        PA Fournier, JF Roy. “Acute Hypotension Episode Prediction Using Information Divergence for Feature Selection and Non-Parametric Methods for Classification” Computers in Cardiology 2009; 36:625−628.

6.        Kullback S, Leibler R. On information and sufficiency. Ann Math Statics 1951;22:79-86

7.        Hastie, Tibshirani R,Friedman J. The elements of Stastical learning . New York,NY: Springer,2001

8.        Vapnik V. The nature of statistical learning Theory New York,NY: Sringer-Verlag,1996.

9.        Bellman R. Adaptive Control Processes. Princeton UniHolland P.W., R. E.Welsch. Robust Regression Uing Iteratively Reweighted Least-Squares. Communications. in Statistics: Theory and Methods, A6, 1977, pp. 813-8270


234-236

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Akhmad Azis, Hamzah Yusuf, Sugiarto Badaruddin

Paper Title:

The Effectiveness of Sand Column Utilization in Recharge Reservoir as Seawater Intrusion Barrier

Abstract:    Excessive groundwater exploitation may cause groundwater decline and induce the landward movement of seawater in coastal aquifer and generate sea water intrusion. One of the efforts to overcome sea water intrusion is groundwater recharge using recharge reservoir. In this research, a recharge reservoir is built on an area with permeability coefficient less than 10-5 cm/sec, analyzed using sand column model and put on the recharge reservoir base which is directly connected to the aquifer layer. The objective of this research is to explore the utilization of sand column subject to the amount of groundwater recharge obtained. This research is an experimental laboratory study that includes the main recharge reservoir model with and without sand column. The data resulted from the research consists of recharge rate entering the aquifer within various parameters: head level differences, sand column or soil layer thickness, and sand column density. Each parameter consists of three variables. Results of the research showed that the maximum debit obtained was 62.41 cm3/sec with 0.00157 of sand column density,  37.4 cm of head difference and sand column height is 30 cm. It is expected that results of this study are applicable and can be implemented in the field scale to cope with the problem of sea water intrusion.

Keywords:
   Recharge reservoir, sand column, sea water intrusion.


References:

1.        Azis, A. 2013. Study On the Use of  Sand  Columns  at  Recharge Reservoir to Over come the Problems of Ground Water Recharge.  Dissertation, Post Graduate of Civil Engineering, Hasanuddin University, Makassar
2.        Ashriyanti, H. 2011. Vulnerability Assessment in sea water intruded area in Jakarta. Unpublished thesis. Geography Faculty PPS UI,  Depok.

3.        Bloetscher, F., Muniz, A., Witt, G. M. 2005.  Groundwater Injection Modelling, Risk and  Regulation.The Mac Graw-Hill Companies, USA.

4.        Broto, S., Susanto, H. 2008. Designing effective Estimation Recharge Reservoir at Bogor City on Groundwater Optimation. Journal Engineering  29 : 220 – 227.

5.        Das, B.M.1995. Soil Mechanics,  Parts 1 and 2.  Erlangga Publisher, Jakarta

6.        Kodoatie,R.J., Sjarief,R. 2008. Water resourches management. Andi, Yogyakarta

7.        Kusnaedi. 2011. Infiltration well for urban settlements.  Swadaya. Jakarta.

8.        Nyer, E. K. 2009. Groundwater Treatment Technology. John    Wiley & Sons, Inc., Hoboken, New Jersey, Canada

9.        Sunjoto. 2012. Subsurface Hydrology. Post Graduate Program  Department of Civil Engineering Faculty of Engineering Gadjah Mada  University, Yogyakarta

10.     Pramono, R. 1999. Groundwater problems in urban area and People’s behavior. Studies Devolopment Community and Environment  Journal 3 : 39-45

11.     Putranto, T., Kusuma. 2009. Groundwater problems in urban area. Journal of Engineering, 30 : 48 – 56

12.     Sen, Z., Al-Suba'i, K. 2009. Hydrological Considerations For Dam Siting In Arid Regions : A Saudi Arabian Study. Hydrological Sciences  Journal, 47:2 , 173-186

13.     Setiawan, B. I., Fukuda, T., Nakano, Y. 2003. Developing Procedures for Optimation of Tank Models Parameters. Journal of Scientific Research and Development, Manuscript L W 01 006

14.     Teague, N. F.  2010. Near Surface Infiltration Measurements And The Implications For Artificial Recharge, A Thesis, No Publish, USA,  Faculty Of Geological Sciences San Diego State University

15.     Tresnadi, H. 2007. Impact Damages Due To Excessive Groundwater Decision. Natural Journal,  12  : 76 – 81

16.     Zekai. 2002. Drawdown Distribution around Large Diameter Well in Double Porosity Medium. Journal Of Hydrologic Engineering, 1084 :  90 – 96


237-240

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

Ishwarya M.V, K.Ramesh Kumar

Paper Title:

Secure Anonymization for Privacy Measure

Abstract:   In this paper we are going to discuss about the privacy preservation of Patients details  in a medical centre. The medical centre may have various login for various people like Administrator,Doctor,Analyst and Receptionist .We  design a model such that the patients entire details are not known to everyone who logins with their id.It is available in a suppressed form to each and everyone who logs in .All the patients data are being split using Slicing algorithm and shuffled and stored in different databases in encryption side.The data are realigned and deshuffled and the original data are retrieved in the decryption side.

Keywords:
   Privacy preservation, Authentication, Security, Slicing, Shuffling


References:

1.        C. Aggarwal, “On k-Anonymity and the Curse of Dimensionality,” Proc. Int’l Conf. Very Large Data Bases (VLDB), pp. 901-909, 2005.
2.        G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D.Thomas, and A. Zhu, “Achieving Anonymity via Clustering,” Proc. ACM Symp. Principles of Database Systems (PODS), pp. 153- 162, 2006.

3.        R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc., 1993.

4.        R.J. Bayardo and R. Agrawal, “Data Privacy through Optimal k- Anonymization,” Proc. Int’l Conf. Data Eng. (ICDE), pp. 217-228, 2005.

5.        F. Bacchus, A. Grove, J.Y. Halpern, and D. Koller, “From Statistics to Beliefs,” Proc. Nat’l Conf. Artificial Intelligence (AAAI), pp. 602- 608, 1992.

6.        J.-W. Byun, Y. Sohn, E. Bertino, and N. Li, “Secure Anonymization for Incremental Datasets,” Proc. VLDB Workshop Secure Data Management (SDM), pp. 48-63, 2006.

7.        B.-C. Chen, K. LeFevre, and R. Ramakrishnan, “Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge,” Proc. Int’l Conf. Very Large Data Bases (VLDB), pp. 770- 781, 2007.

8.        G.T. Duncan and D. Lambert, “Disclosure-Limited Data Dissemination,” J. Am. Statistical Assoc., vol. 81, pp. 10-28, 1986. LI ET AL.: CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING 955

9.        B.C.M. Fung, K. Wang, and P.S. Yu, “Top-Down Specialization for Information and Privacy Preservation,” Proc. Int’l Conf. Data Eng. (ICDE), pp. 205-216, 2005.

10.     C.R. Givens and R.M. Shortt, “A Class of Wasserstein Metrics for Probability Distributions,” Michigan Math J., vol. 31, pp. 231-240, 1984.

11.     V.S. Iyengar, “Transforming Data to Satisfy Privacy Constraints,” Proc. ACM SIGKDD, pp. 279-288, 2002.

12.     D. Kifer and J. Gehrke, “Injecting Utility into Anonymized Datasets,” Proc. ACM SIGMOD, pp. 217-228, 2006.

13.     N. Koudas, D. Srivastava, T. Yu, and Q. Zhang, “Aggregate Query Answering on Anonymized Tables,” Proc. Int’l Conf. Data Eng. (ICDE), pp. 116-125, 2007.

14.     S.L. Kullback and R.A. Leibler, “On Information and Sufficiency,” Annals of Math. Statistics, vol. 22, pp. 79-86, 1951.

15.     D. Lambert, “Measures of Disclosure Risk and Harm,” J. Official Statistics, vol. 9, pp. 313-331, 1993.

241-242

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

Ishwarya M.V, K.Ramesh Kumar

Paper Title:

Literature Survey for Secure Anonymization

Abstract:    In this paper we are going to discuss about the privacy preservation of Patients details  in a medical centre . The medical centre may have various login for various people like Administrator,Doctor,Analyst and Receptionist .We  design a model such that the patients entire details are not known to everyone who logins with their id.It is available in a suppressed form to each and everyone who logs in . All the patients data are being split using Slicing algorithm and shuffled and stored in different databases in encryption side.The data are realigned and deshuffled and the original data are retrieved in the decryption side.

Keywords:
   Privacy preservation, Authentication, Security, Slicing, Shuffling.


References:

1.        C. Aggarwal, "On k-Anonymity and the Curse of Dimensionality," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 901-909, 2005.
2.        G. Aggarwal, T. Feder, K. Kenthapadi, S. Khuller, R. Panigrahy, D.Thomas, and A. Zhu, "Achieving Anonymity via Clustering," Proc. ACM Symp. Principles of Database Systems (PODS), pp. 153- 162, 2006.

3.        R.K. Ahuja, T.L. Magnanti, and J.B. Orlin, Network Flows: Theory, Algorithms, and Applications. Prentice-Hall, Inc., 1993.

4.        R.J. Bayardo and R. Agrawal, "Data Privacy through Optimal k- Anonymization," Proc. Int'l Conf. Data Eng. (ICDE), pp. 217-228, 2005.

5.        F. Bacchus, A. Grove, J.Y. Halpern, and D. Koller, "From Statistics to Beliefs," Proc. Nat'l Conf. Artificial Intelligence (AAAI), pp. 602- 608, 1992.

6.        J.-W. Byun, Y. Sohn, E. Bertino, and N. Li, "Secure Anonymization for Incremental Datasets," Proc. VLDB Workshop Secure Data Management (SDM), pp. 48-63, 2006.

7.        B.-C. Chen, K. LeFevre, and R. Ramakrishnan, "Privacy Skyline: Privacy with Multidimensional Adversarial Knowledge," Proc. Int'l Conf. Very Large Data Bases (VLDB), pp. 770- 781, 2007.

8.        G.T. Duncan and D. Lambert,  "Disclosure-Limited Data Dissemination," J. Am. Statistical Assoc., vol. 81, pp. 10-28, 1986. LI ET AL.: CLOSENESS: A NEW PRIVACY MEASURE FOR DATA PUBLISHING 955

9.        B.C.M. Fung, K. Wang, and P.S. Yu, "Top-Down Specialization for Information and Privacy Preservation," Proc. Int'l Conf. Data Eng. (ICDE), pp. 205-216, 2005.

10.     C.R. Givens and R.M. Shortt, "A Class of Wasserstein Metrics for Probability Distributions," Michigan Math J., vol. 31, pp. 231-240, 1984.

11.     V.S. Iyengar, "Transforming Data to Satisfy Privacy Constraints," Proc. ACM SIGKDD, pp. 279-288, 2002.

12.     D. Kifer and J. Gehrke, "Injecting Utility into Anonymized Datasets," Proc. ACM SIGMOD, pp. 217-228, 2006.

13.     N. Koudas, D. Srivastava, T. Yu, and Q. Zhang, "Aggregate Query Answering on Anonymized Tables," Proc. Int'l Conf. Data Eng. (ICDE), pp. 116-125, 2007.

14.     S.L. Kullback and R.A. Leibler, "On Information and Sufficiency," Annals of Math. Statistics, vol. 22, pp. 79-86, 1951.

15.     D. Lambert, "Measures of Disclosure Risk and Harm," J. Official Statistics, vol. 9, pp. 313-331, 1993.


243-244

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

Arushi Jain, Aakansha Bansal, Palak Jain, Neha Sharma

Paper Title:

Importance and Quality Evaluation of Metadata

Abstract:    Metadata usually called data about data represents information about data to be stored in a data warehouse. Importance of metadata arises from the fact that it is needed to map data from source systems to data warehouse with the help of Extraction Transformation Loading (ETL) tools. Metadata helps in developing consistency in data collection and usage and moreover provides the foundation for Data Change Management. It facilitates user to have faster and more accurate access to the data that is needed. Metadata also plays an important role in real world environment as seen in case of legal system nowadays that focuses on preservation of data about its records i.e. metadata so that the validity and admissibility of evidences can be ensured. This paper intends to find a better and more efficient way to determine the importance of metadata in the data warehouse and thus performs its quality evaluation.

Keywords:
   Consistency, Data Change Management, ETL, Metadata.


References:

1.       Cory Doctorow, “Metacrap: Putting the torch to seven straw-men of the meta-utopia”, version 1.3: 26 August, 2001.
2.       Richard J Kachur,”Data warehouse Management Handbook”, prentice Hall, 2000, pp-348.

3.       Kai M. Hüner, Borris Otto and Hubert Österle, “Collaborative management of business metadata”, International Journal of Information Management, volume 31 issue 4, August, 2011, pp.366-373.

4.       Eric Klovning, “Metadata management in the support of data warehouse development”, University of Wisconsin-Stout, July, 2008.

5.       Martin Staudt, Anca Vaduva and Thomas Vetterli, “The role of metadata for data warehousing”, Technical Report, University of Zurich, 1999.

6.       Arun Sen, “Metadata management: past, present and future”, Decision Support Systems, volume 37 issue 1, April 2004, pp. 151-173.

7.       Thanh N. Huynh, Oscar MangiSengi and A Min Tjoa, “Metadata for object-relational data warehouse”, Data Mining and Data Warehousing 2000:3.

8.       Pete Johnston, “Metadata sharing and XML”, NOF-digitise Technical Advisory Service Information Paper, January, 2001,  

9.       Jane Hunter, “Working towards MetaUtopia- a survey of current metadata research”, Library Trends, Organizing the internet, 52(2), fall 2003.

10.     Markus H¨anse, Min-Yen Kan and Achem P. Karduck, “Kairos: proactive harvesting of research paper metadata from scientific conference web sites”, ICADL'10 Proceedings of the role of digital libraries in a time of global change, and 12th international conference on Asia-Pacific digital libraries, pp.226-235.

11.     Gad Kother, “Metadata for End-Users-A crucial part of your Data Warehouse quality policy”, SAS Institute, January 2008.

12.     Hao Fan and Alexandra Poulovassilis, “Using AutoMed Metadata in data Warehousing environment”, DOLAP '03 Proceedings of the 6th ACM international workshop on Data warehousing and OLAP, New York, NY, USA, 2003,  pp. 86-93.

13.     Nayem Rahman, Jessica Marz and Shameen Akhter, “An ETL Metadata Model for data warehousing”, Journal of Computing and Information Technology, volume 20, Number 2, 2012, pp. 95-111.


245-249

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

Falah Hasan

Paper Title:

Programmable Decimation Filter Design For Multi-Standards Software Defined Radio (SDR) Reciever

Abstract:    This Paper Investigates The Design Of Programmable Decimation Filters To Be Used In The Channelizer Of Multi-Standard Software Defined Radios Receivers. The Technique Of New Algorithms For Reducing The Passband Ripple Of Linear Phase Fir Digital Filters Which Minimizes The Passband Deviation  In The Decimation Block Is Introduced And Is Used To Implement A Multistage, Multi-Standard Decimating Filter. The Design Will Enhanced Different Communications Standards And Is Thus Ideal For Use In Systems Which Support Dynamic Reconfiguration. Results Obtained Shows An Important Reduction In The Passband Ripple In The Decimation Part  From 0.03 Db To 0.012 Db And High Reconfigurability In The Filtration Requirements.               

Keywords:
   FIR, SDR, Digital down-converter, GSM, Equiripple FIR, passband ripple, adjacent band rejection, blocker requirements.


References:

1.       Tjerk Bijlsma, “An Optimal Architecture for a DDC” University of Twente, Department of EEMCS, Netherlands, 1-4244-0054-6/06/$20.00 ©2006 IEEE
2.       Ze Tao and S. Signell, 2006 “Multi-standard delta-sigma decimation filter design”, IEEE Asia Pacific Conference on Circuits and Systems (APCCAS 2006), Singapore, pp. 1212-1215.

3.       Tianqi Wang, Cheng Li, 2006, “Sample Rate Conversion Technology in Software Defined Radio” Student Mumber, IEEE, Memorial University of Newfoundland St. John’s, Newfoundland and Labrador, Canada, 1-4244-0038-4 2006, IEEE CCECE/CCGEI, Ottawa, pp.1355-1358

4.       Ricardo A. Losada, 2009 , “practical FIR filter design  In matlab”, The Math Works inc. Revision 1.1 , USA: PP. 5, 26-27

5.       Shahana T. K, 2009, “Decimation Filter Design Toolbox for Multi- Standard Wireless Transceivers using MATLAB”  University of Science and Technology, Kochi, Kerala, India, International Journal of Signal Processing, 5;2 PP. 154-163

6.       Texas Instruments , 2009 “GC4016 MULTI-STANDARD QUAD DDC CHIP DATA SHEET,” data manual  Revision 1.0: PP. 70-90Mitra, Kaiser (1993). Handbook for Digital Signal Processing, John Wiley & Sons.Table 4.84.

7.       Rabiner LR, McCLellan JH, Parks TW (1975). “FIR digital filter design techniques using weighted Chebyshev approximation”, Proc. IEEE, 63, pp.595-610.

8.       Ricardo A. Losada, 2004 , “practical FIR filter design  In matlab”, The Math Works inc. Revision 1.1 , USA: PP. 5, 26-27

9.       Texas Instruments., 2001, “GC4016 MULTI-STANDARD QUAD DDC CHIP DATA SHEET,” Revision 1.0: PP. 60-90.

10.     Sven Johansson, 2004, “Applied Signal Processing ETB006 FIR Filter Design” Chapter-1 pp.1-5

11.     S. C. Chan, K. M. Tsui, K. S. Yeung, and T. I. Yuk, 2007, “ Design and Complexity Optimization of a New Digital IF for Software Radio Receivers With Prescribed Output Accuracy” IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 54, NO. 2, pp 351-366

12.     Mitra, Kaiser, 1993,  “Handbook for Digital Signal Processing”, John Wiley & Sons, 1993, Table 4.84

13.     Rudi Vuerinckx, 1998, “Design of High-Order Chebyshev FIR Filters in the Complex Domain Under Magnitude Constraints”, IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 46, NO. 6, pp. 1676- 1681.


250-255

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Komal Gandle, Pallavi Kulkarni

Paper Title:

Intrusion Detection System Based On Improved One versus All Data Stream Classification

Abstract:   With the marvelous development of information Technology & Network Security the Intrusion Detection (ID) has rapidly become a crucial component of any network defense strategy. Data Stream Classification is the superlative method for revealing of Intrusion Detection (ID). Improved One Versus All (OVA) is one of the multiclass classification techniques On the basis of this we propose the system on Network Intrusion Detection (NID) for security in network as well as computer. In this paper, improved one versus all decision tree algorithms identifies the behavioral attacks actions and newly arising attacks of intrusions. This paper addresses the excellent advantages of Improved OVA data stream classification such as Low error correlation and concept change. Also propose a new learning algorithm for illuminating of network intrusion Detection.

Keywords:
   Improved OVA decision tree, Intrusion Detection (ID)


References:

1.        Hashemi, S.; Ying Yang; Mirzamomen, Z.; Kangavari, M.; "Adapted One-versus-All Decision Trees for Data Stream Classification," Knowledge and Data Engineering, IEEE Transactions on ,vol.21,no.5,pp.624-637,May 2009 doi: 10.1109/TKDE.2008.181
2.        Wenke Lee and Salvatore J. Stolfo Data Mining Approaches for Intrusion Detection Computer Science Department Columbia University 500 West 120th Street, New York, NY 10027 {wenke,sal}@cs.columbia.edu

3.        Theodoros Lappas and Konstantinos Pelechrinis;” Data Mining Techniques for (Network) Intrusion Detection Systems” Department of Computer Science and Engineering UC Riverside, Riverside CA 92521

4.        Ruoming Jin:” Efficient Decision Tree Construction on Streaming Data”, Ohio State University, Columbus OH 43210jinr@cis.ohiostate.edu

5.        L. Breiman, J. H. Friedman, R. A. Olshen and C.J. Stone, “Classification and Regression Trees,” Statistics probability series, Wadsworth, Belmont, 1984.

6.        J. R. Quinlan, “Induction of Decision Tree,” Machine Learning Vol. 1,pp. 81-106, 1986

7.        Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, Wu,and Ningning, “ADAM: Detecting intrusion by data mining,” IEEEWorkshop on Information Assurance and Security, West Point, New York, June 5-6, 2001.

8.        W. Lee, S.J. Stolfo, “Data mining approaches for intrusion detection,” In

9.        Proc. of the 7th USENIX Security Symposium (SECURITY-98),Berkeley, CA, USAedwdf, 1998, pp. 79-94.

10.     J.E. Dickerson, J.A. Dickerson, “Fuzzy network profiling for intrusion detection,” In Proc. of the 19th International Conference of the NorthAmerican Fuzzy Information Processing Society (NAFIPS), Atlanta,GA, 2000, pp. 301-306

11.     M. Ramadas, S.O.B. Tjaden, “Detecting anomalous network traffic with

12.     self-organizing maps,” In Proc. of the 6th International Symposium onRecent Advances in Intrusion Detection, Pittsburgh, PA, USA, 2003, pp.36-54.

13.     The KDD Archive KDD99 cup dataset, 1999 http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

14.     John Shafer, Rakesh Agarwal, and Manish Mehta, SPRINT: A Scalable Parallel Classifier for Data Maining,” in Proceedings of the VLDB conference, Bombay, India, September 1996.

15.     J. R. Quinlan, “C4.5: Programs for Machine Learning,” MorganKaufmann Publishers, San Mateo, CA, 1993.

16.     Srinivas Mukkamala, Andrew Sung and Ajith Abraham;” Designing Intrusion Detection Systems: Architectures, Challenges and Perspectives”, Department of Computer Science, New Mexico Tech, USA
17.     Mark Last,” Improving Stability of Decision Trees”, Department of Information Systems Engineering, Ben-Gurion University of the Negev, Beer-Sheva 84105, Israel


256-259

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Siddeeq Y. Ameen, Shayma Wail Nourildean

Paper Title:

Wireless Local Area Network VLAN Investigation and Enhancement Using Routing Algorithms

Abstract:    Wireless LANs, WLANs, are vulnerable and witnessed numerous types of threats. These can be avoided via several security technologies such as WEP, 802.11i and WPA. These technologies have draw backs on performance and an alternative approaches that might have less impact on performance is the Virtual Local Area Network (VLAN). The paper introduces the integration of VLAN into WLAN system. The use of VLAN will provide the security to the system by isolating the access and grouped in such away that avoid any group from accessing unauthorized station in other group. OPNET Modeler (14.5) was used as a simulation program for this study. In the investigation, the effect of VLAN technology on decreasing the traffic in the system of the WLAN has been investigated. In the investigation also  the delay, throughput, traffic sent and received with Email and Web browsing applications have been computed and compared with the conventional case of no VLAN. The results show that use of VLAN greatly reduces the throughput. This problem has been resolved via the use of routing algorithms, AODV, OLSR and DSR. The results of employment of routing algorithms with  VLAN over WLAN have been investigated the enhancement in throughput has been achieved.

Keywords:
   WLAN, VLAN, AODV, OLSR, DSR.


References:

1.       Y. B. ChoiG. Eason, J. Muller, C. V. Kopek and J.  M. Makarsky, “Corporate wireless LAN security: threats and an effective security assessment framework for wireless information,” Int. J. Mobile Communications, Vol. 4, No. 3, pp. 266-289, 2006.
2.       W. Huang and F. Kong , “The Research of VPN on WLAN” , International Conference on Computational and Information Sciences  pp. 250 – 253, 2010.

3.       S. K. Sarkar , C Puttamadappa , and T. G Basavaraju “Ad Hoc Mobile Wireless Networks Principles, Protocols and Applications”, Auerbach Publications, pp. 1-36,  2007.

4.       A. M. Al Naamany , A.  Al Shidhani and H. Bourdoucen, “IEEE 802.11 Wireless LAN Security Overview”, IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.5B, pp. 138 – 156, May 2006.

5.       K. Okayama, N. Yamai, N. ; T. Miyashita, T. ; K. Kawano, K. ; T. Okamoto“, A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment”, Proceedings. 6th Asia-Pacific Symposium on Information and Telecommunication Technologies, 2005. APSITT 2005.

6.       S. A. Jaro Alabady, “Design and Implementation of a Network Security Model using Static VLAN and AAA Server”, 3rd International Conference on Information and Communication Technologies: From Theory to Application, pp. 1-6, 2008.

7.       T. Wang and C.  Yeh, “A Secure VLAN Construction Protocol in Wireless AD-HOC Networks”, Information Technology: Research and Education. 3rd International Conference on ISBN: 0780389328, pp. 68-72, 2005.

8.       S. Y. Ameen and I. A. Ibrahimi, “MANET Routing Protocols Performance Evaluation with TCP Taho, Reno and New-Reno”, International Journal of International Journal of uuuu---- and e an e and e---- Service, Science and Technology Service, Science and Technology Service, Science and Technology Vol. 4,  No. 1, March 2011.

9.       G. Jayakumar and G. Gopinath, “Ad Hoc Mobile Wireless Networks Routing Protocols - A Review,”  Journal of Computer Science, Volume 3, Issue 8. 2007.


260-264

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Pamnani Nanak J., Verma A.K., Bhatt Darshana R.

Paper Title:

Comparision between Mechanical Properties of M30 Grade Self Compacting Concrete For Conventional Water Immersion and Few Non-Waterbased Curing Techniques

Abstract:    Self-Compacting Concrete (SCC) is highly workable concrete with high strength and high performance that can flow under its own weight through restricted sections without segregation and bleeding. SCC is achieved by reducing the volume ratio of aggregate to cementitious materials, increasing the paste volume and using various viscosity enhancing admixtures and superplasticizers. It is observed that the behaviour of the design concrete mix is significantly affected by variation in humidity and temperature both in fresh and hardened state. In this paper effect of three non-water-based curing techniques on mechanical properties such as compressive strength, split tensile strength, flexural strength and shear strength of M30 grade self-compacting concrete (SCC) is discussed. For compressive strength it is observed that immersion method for curing gives maximum compressive strength while the lowest compressive strength is for no curing. Polyethylene film curing gives second highest strength at 28 days. Similarly for split tensile strength, flexural strength & shear strength, the maximum strength is also with immersion method of curing. For split tensile strength curing compound gives almost at par with immersion method while no curing has least strength. Polyethylene film curing gives good results for flexural strength. For shear strength Polyethylene film gives about 82% of immersion strength. It is concluded that although pond immersion method is best for curing, Polyethylene film and curing compound can deliver more than 90% compressive and other strengths compared to immersion method.

Keywords:
   Self compacting concrete, immersion curing, Polyethylene film wrap, curing compound, curing period, compressive strength, split tensile strength, flexural strength, shear strength.


References:

1.        Agullo L., et al., "Fluidity of cement pastes with mineral admixtures and superplasticizer - A study based on the Marsh cone test", Materials in Structures 1999, 32 (221) 479- 485.
2.        Al-Feel J.R. & Al-Saffar N.S., "Properties of Self Compacting Concrete at Different Curing Condition and their Comparison with properties of Normal Concrete", Al-Rafidain Engineering, 2009, Vol.17, No.3, pp. 30-38.

3.        Bairagi N. K. and Modhera C.D., "Shear Strength of  Fibre Reinforced Concrete",  2001, ICI Journal, Vol. 1[4].

4.        Cement Concrete & Aggregates Australia (CCAA), "Curing of Concrete - A data sheet", 2006.

5.        EFNARC (2002) (European Federation of Producers and Applicators of Specialist Products for Structures), Specification and Guidelines for Self-Compacting concrete.

6.        Hueste M.B.D, Chompreda P, Trejo D, Cline DBH, Keating PB., "Mechanical properties of high-strength concrete for prestressed members", ACI Structural Journal, 2004, 101(4) pp. 457-65.

7.        IS 456-2000, "Plain & Reinforced concrete-Code of Practice", Bureau of Indian Standards, New-Delhi, India, 4th revision, page 27.

8.        IS: 516-1959, "Methods of tests for strength of concrete", Bureau of Indian Standards, New-Delhi, India.

9.        IS-5816-1999, "Method of test for Splitting tesile strength of concrete", Bureau of Indian Standards, New-Delhi, India.

10.     Jagannadha Kumar M.V., Srikanth M., Dr. Rao K. Jagannadha, "Strength characteristics of self-curing concrete", International Journal Of Research Engineering & Technology (IJRET), 2012, pp. 51-57.

11.     Khayat, K.H., Hu, C. and Monty, H., "Stability of Self-Consolidating Concrete, Advantages, and Potential Applications", Proceedings of First International RILEM, Symposium on Self-Compacting Concrete, 1999, pp. 143-152.

12.     Kumbhar P.D., Rajaramnagar, and Murnal P., "Effect of Humidity and Temperature on Properties of High Performance Concrete", NBM Construction Information, 2011, New Delhi, India.

13.     Md. Safiuddin et al., "Effect of Different Curing Methods on the Properties of Microsilica Concrete", Australian Journal of Basic and Applied Sciences, 2007, ISSN
1991-8178, 1(2): pp. 87-95.

14.     Patel  Priti A., et al., "Improvement of Shear Strength using Triangular Shape Fibre in Concrete", NBM&CW magazine, India, August, 2010.

15.     Qureshi L. A., Bukhari I. A, M.J. Munir, "Effect of Different Curing Techniques on Compressive Strength of High Strength Self Compacting Concrete", Bahaudin Zakriya University, 2010, Multan Pakistan.

16.     Shetty M.S., Text book, "Concrete Technology- Theory & Practice", S. Chand & Company, New Delhi, India, 2005, Chapter 7, Strength of Concrete.

17.     Stegmaier Michael, "Heat curing of self-compacting concrete", Otto-Graf-Journal, 2005, Vol. 16, pp. 167-183.

18.     Vijai K., Kumutha R. and Vishnuram B. G., "Effect of types of curing on strength of geopolymer concrete", International Journal of the Physical Sciences, 2010, Vol. 5(9).

19.     Yun Wang Choi et al., "An experimental research on the fluidity and mechanical properties of high-strength lightweight self-compacting concrete", Cement and Concrete Research, 2004, vol. 36, pp 1595- 1602.


265-272

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

Ajayi Adebowale, Idowu S.A, Otusile Oluwabukola

Paper Title:

An Overview of Database Centred Intrusion Detection Systems

Abstract:    Intrusion detection systems have become a major component of network security infrastructures. Modern day intrusion detection systems are to be reliable, extensible, adaptive to the flow of network traffic and to have a low cost of maintenance. Over the years researchers have looked upon data mining as a means of enhancing the adaptability of an intrusion detection system, as it enables the IDS to discover patterns of intrusions and define valid bounds of network traffic. Despite the effectiveness of data mining based IDS it is riddled with challenges; instrumenting components such as data transformations, model deployment, and cooperative distributed detection remain a labor intensive and complex engineering endeavor. This has lead to research efforts into integrating this technology with traditional database systems. This paper gives an overview of database centered intrusion detection systems.

Keywords:
   Database systems, Data mining, Intrusion detection systems, Network security.


References:

1.        D. Barbara, R. Goel, and S. Jajodia, Mining malicious data corruption with hidden markov models. in Research Directions in Data and Applications Security, 2002.
2.        M. Campos and B. Milenova, Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g. 2005

3.        D. Carter and A. Katz, Computer Crime: An Emerging Challenge for Law Enforcement. FBI Law Enforcement Bulletin, 1997: p. 1-8.

4.        C. Chung, M. Gertz, and K. Levitt, DEMIDS: A Misuse Detection System for Database Systems. In Third Annual IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems, 1999.

5.        C. Chung, M. Gertz, and K. Levitt, Misuse Detection in Database Systems Through User Profiling.

6.        B. Elisa, et al., Intrusion Detection in RBAC-administered Databases, in Proceedings of the 21st Annual Computer Security Applications Conference. 2005, IEEE Computer Society.

7.        J. Fonseca, M. Vieira and H. Madeira, Monitoring Database Application Behavior for Intrusion Detection. 12th Pacific Rim International Symposium on Dependable Computing, 2006.

8.        A. Honig,  A. Howard, E. Eskin and S. Stolfo, Adaptive Model Generation, an Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 154-191.

9.        Y. Hu and B. Panda, A Data Mining Approach for Database Intrusion Detection. ACM Symposium on Applied Computing, 2004.

10.     Y. Hu, and B. Panda, Identification of Malicious Transactions in Database Systems. Proceedings of the Seventh International Database Engineering and Applications Symposium (IDEAS’03), 2003.

11.     X. Jin and S. Osborn, Architecture for Data Collection in Database Intrusion Detection Systems. 2007.

12.     W. Lee and S. Stolfo, A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security, 3(4), 2000, pp. 227-261.

13.     V. Lee, J. Stankovic and S. Son, Intrusion Detection in Real-time Database Systems Via Time Signatures. In Proceedings of the Sixth IEEE Real Time Technology and Applications Symposium, 2000.

14.     W. Low, J. Lee, and P. Teoh: detecting intrusions in databases through fingerprinting transactions.

15.     U. MATTSSON, A Practical Implementation of a Real-time Intrusion Prevention System for Commercial Enterprise Databases.

16.     P. Ramasubramanian, and A. Kannan, Intelligent Multi-agent Based Database Hybrid Intrusion Prevention System. 2004.

17.     F. Rietta, Application Layer Intrusion Detection for SQL Injection. ACM Symposium on Applied Computing, 2006

18.     A. Spalka, And J. Lehnhardt, A Comprehensive Approach to Anomaly Detection in Relational Databases. 2005.

19.     Srivastava, S. Sural, and A. Majumdar, Weighted Intra-transactional Rule Mining for Database Intrusion Detection. 2006.

20.     Srivastava, S. Sural, and A. Majumdar, Database Intrusion Detection using Weighted Sequence Mining. JOURNAL OF COMPUTERS, 2006. 1(4).

21.     Y. Zhong, and X. Qin, Database Intrusion Detection Based on User Query Frequent Itemsets Mining with Item Constraints. Conference InfoSecu04, 2004.

22.     Y. ZHONG, and X. QIN, Research On Algorithm Of User Query Frequent Itemsets Mining. Proceedings of the Third International Conference on Machine Learning and Cybemetics, Shanghai, 2004.

273-275

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

58.

Authors:

Shital S. Chopade, Pradhuman Verma, Prashant Verma

Paper Title:

Simulation of Boiler Control using PLC & SCADA

Abstract:    The purpose of this paper is to present a programmable logic controller (PLC) control system that is applied to the water tube boiler which will increase high quality and greater efficiency. This system monitors boiler`s temperature and pressure and volume via different sensors which provide input to PLC. The output of PLC controls the boiler temperature and pressure and gives out the user required volume of steam. All pressure and temperature variations are shown on SCADA screen and are controlled through SCADA. Different automated check valves are used to release pressure and to inform the concerned authority through alarm in case of an emergency.

Keywords:
  (PLC) SCADA.


References:

1.        Ezell, Barry, “Supervisory Control and Data Acquisition Systems for Water Supply and Its Vulnerability to Cyber Risks” available on the internet at: http://watt.seas.virginia.edu/~bce4k/home.html.
2.        INDUSTRIAL  AUTOMATION  BY  USING  BLUETOOTH

3.        Rockwell Automation SCADA System Selection guide Allen-Bradley, Publication AG-2.1.

4.        Knight. U. “The Power System and its Operational and Control Infrastructure in emergencies” from contingency planning to crisis management.

5.        Analysis of Fault-Tolerant systems, “IEEE transactions on Computers”, vol.38, No.6,

6.        Hillenbrand, Cary, Expert  Three, Technical expert specializing in the planning and design of SCADA based and Distributed control system.


276-279

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Sibarama Panigrahi, H. S. Behera

Paper Title:

Effect of Normalization Techniques on Univariate Time Series Forecasting using Evolutionary Higher Order Neural Network

Abstract:    Over the last few decades, application of higher order neural networks (HONNs) to time series forecasting have shown some promise compared to statistical approaches and traditional neural network (NN) models. However, due to several factors, to date, a consistent HONN performance over different studies has not been achieved. One such factor is preprocessing of time series before it is fed into HONN models. Normalization is one of the important pre-processing strategies which have a significant impact on forecast accuracy. Despite its great importance, there has been no general consensus on how to normalize the time series data for HONN models. This paper investigates how to better normalize the univariate time series for HONN models especially, the Pi-Sigma network (PSN). For this five different normalization technique (Min-Max, Decimal Scaling, Median, Vector and Z-Score) are used to normalize four univariate time series and corresponding forecast accuracy are measured using an evolutionary Pi-Sigma network. Results show that forecast accuracy using HONN models depends on the normalization technique being used. It is also noted that with PSNs, decimal scaling and vector normalization techniques provide statistically meritorious results compared to other normalization techniques.

Keywords:
   Normalization, Higher Order Neural Networks, Pi-Sigma Network, Differential Evolution, Time Series Forecasting.


References:

1.       Y. Shin, and J. Ghosh, “The pi–sigma network: An efficient higher-order neural network for pattern classification and function approximation,” In: Neural Networks, IJCNN-91-Seattle International Joint Conference on Neural Networks; pp. 8-14, 1991.
2.       D. S. Huang, H. H. S. Ip, K. C. K. Law, and Z. Chi, “Zeroing polynomials using modified constrained neural network approach,” IEEE Transactions on Neural Networks, vol. 16, no. 3, pp. 721-732, 2005.

3.       S. Perantonis, N. Ampazis, S. Varoufakis, and G. Antoniou, “Constrained learning in neural networks: Application to stable factorization of 2-d polynomials,” Neural Processing Letter, vol.7, no. 1, pp. 5-14, 1998.

4.       C. Voutriaridis,  Y. S. Boutalis, and G. Mertzios, “Ridge polynomial networks in pattern recognition,”  EC-VIP-MC 2003, 4th EURASIP Conference focused on Video / Image Processing and Multimedia Communications, vol. 2, pp. 519-524, 2003.

5.       P. Liatsis, and A. J. Hussain, “Nonlinear one-dimensional DPCM image prediction using polynomial neural networks,” In Proc. SPIE: Applications of Artifcial Neural Networks in Image Processing IV San Jose, California, pp. 58-68, 1999.

6.       A. Hussain, A. Knowles, P. Lisboa, W. El-Deredy, and D. Al-Jumeily, “Polynomial pipelined neural network and its application to financial time series prediction,”
Lecture Notes in Artifcial Intelligence 4304, pp. 597-606, 2006.

7.       Y. Shin, and J. Ghosh, “Ridge Polynomial Networks,” IEEE Transactions on Neural Networks, vol. 6, no. 3, pp. 610-622, 1995.

8.       Y. L. Karnavas, and D.P. Papadopoulos, “Excitation control of a synchronous machine using polynomial neural networks,” Journal of Electrical Engineering, vol. 55, no. 7, pp. 169-179, 2004.

9.       M. G. Epitropakis, V. P. Plagianakos, and M. N. Vrahatis, “Hardware-friendly Higher-Order Neural Network Training using Distributed Evolutionary Algorithms,” Applied Soft Computing, vol. 10, no 2, pp. 398-408, 2010.

10.     K. K. Sahu, S. Panigrahi, and H. S. Behera, “A Novel Chemical Reaction Optimization Algorithm for Higher Order Neural Network Training”, Journal of Theoretical and Applied Information Technology, vol. 53, no. 3, pp. 402-409.

11.     R. Storn, and K. Price, “Differential evolution-A simple and efficient heuristic for global optimization over continuous spaces,” Journal of Global Optimization, vol. 11, no. 4, pp. 341-359, 1997.

12.     D. Goldberg, “Genetic Algorithms in Search,” Optimization and Machine Learning Reading, MA:Addison-Wesley, 1989.

13.     J. Kennedy, R. C. Eberhart, and Y. Shi, “Swarm intelligence,” San Francisco CA:Morgan Kaufmann, 2001.

14.     K. Socha, and M. Doringo, “Ant colony optimization for continuous domains,” Europian Journal of Operation Research, vol. 185, no. 3, pp. 1155-1173, 2008.

15.     D. T. Pham, A. Ghanbarzadeh, E. Koc, S. Otri, S. Rahim, and M. Zaidi, “The bees algorithm-A novel tool for complex optimization problems,” in IPROMS Oxford, U.K.: Elsevier,2006.

16.     H. G. Beyer, and H. P. Schwefel, “Evolutionary Strategies: A Comprehensive introduction”, Natural Computing, vol. 1, no. 1, pp. 3-52, 2002.

17.     K. H. Han, and J. H. Kim, “Quantum-inspired evolutionary algorithm for a class of combinatorial optimization,” IEEE Transactions on Evolutionary Computation, vol. 6, pp. 580-593, 2002.

18.     A. Y. S. Lam, and V. O. K. Li, “Chemical-Reaction-inspired metaheuristic for optimization,” IEEE Transaction on Evolutionary Computation, vol. 14, no.3, pp. 381-399, 2010.

19.     A.Y.S. Lam, “Real-Coded Chemical Reaction Optimization,” IEEE Transaction on Evolutionary Computation, vol. 16, no. 3, pp. 339-353, 2012.

20.     A. Y. S. Lam, and V. O. K. Li, “Chemical Reaction Optimization: a tutorial,” Memetic Computing, vol. 4, no. 1, pp. 3-17, 2012.

21.     J. Ghosh, and Y. Shin, “Efficient higher-order neural networks for classification and function approximation,” in: International Journal on Neural Systems, vol. 3, pp. 323–350, 1992.

22.     Y. Shin, and J. Ghosh, “Realization of Boolean functions using binary pi-sigma networks,” in: Proceedings of Conference on Artificial Neural Networks in Engineering, 1991.

23.     S. Das, A. Abraham, U. K. Chakraborty, and A. Konar, “Differential evolution using a neighbourhood based mutation operator,” IEEE Transaction on Evolutionary Computation, vol. 13, no.3, pp. 526-553, 2009.

24.     S. Rahnamayan, H. R. Tizhoosh, and M. A. Salama, “Opposition based differential evolution”, IEEE Transaction on Evolutionary Computation, vol. 12, no.1, pp. 64-79, 2008.

25.     S. Das, and P. N. Suganthanam, “Differential Evolution: A Survey of the state-of-the-Art,” IEEE Transaction on Evolutionary Computation, vol. 15, no.1, pp. 4-31, 2011.

26.     K. Price, R. Storn, and J. Lampinen, “Differential Evolution-A Practical Approach to Global Optimization,” Berlin, Germany: Springer, 2005.

27.     K. V. Price, “An introduction to differential evolution,” in: New Ideas in Optimization, U.K.: McGraw-Hill,  pp. 79–108, 1999.

28.     S. M. Islam, S. Das, S. Ghosh, S. Roy, and P. N. Suganthan, “An Adaptive Differential Evolution Algorithm with Novel Mutation and Cross Over Strategy for Global Numerical Optimization,” IEEE Transaction on System, Man, and Cybernetics-PART B: Cybernetics, Vol. 42, No.2,  pp.482-500, 2012.

29.     J.J.Q. Yu, A.Y.S. Lam, and V.O.K. Li, “Evolutionary Artificial Neural Network based on chemical reaction optimization”, IEEE  Congress  on  Evolutionary  Computation,  pp. 2083–2090, 2011.


280-285

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

S. H. Rahangdale, A. K. Mittra

Paper Title:

Vibroarthrographic Signals De-Noising Using Wavelet Subband Thresholding

Abstract:    Externally recorded knee-joint vibroarthrographic (VAG) signals bear diagnostic information related to degenerative conditions of cartilage disorders in a knee. The VAG technique is passive and can be used for long term monitoring. In order to improve the diagnostic capabilities of  VAG, robust signal processing techniques are needed for de-noising of the signals.  Traditional de-noising techniques apply a linear filter to remove the noise and interference from the VAG signals. These methods have certain limitations for the non-stationary VAG  signals. In this paper, an improved technique for de-noising of VAG signals is presented. The acquired VAG signals are decomposed, de-noised and reconstructed by utilizing matlab wavelet transform toolbox. The proposed approach improves the signal to noise ratio (SNR) of these signals. The presented technique can be used in pre-processing stage of all VAG based knee joint monitoring and screening of articular cartilage pathology.

Keywords:
   Wavelets, de-noising, vibroarthrographic signal, knee-joint.


References:

1.       G.E. McCoy, J.D. Mccrea, D.E. Beverland, W.G. Kernohen, R.A.B. Mollan, “Vibration arthrography as a diagnostic aid in diseases  of the knee”, The Journal Bone and Joint Surgery, vol. 69-B (2), pp.288-293, 1987.
2.       M.L. Chu, I.A. Gradisar,  R. Mostardi, “A noninvasive electroacoustical evaluation technique of cartilage in pathological knee joints”, Medical and Biological Engineering and Computing, vol. 16, pp. 437-442, 1978.

3.       R.M. Rangayyan, C.B. Frank, G.D. Bell, R. Smith, "Analysis of knee joint sounds signals : Invited paper", IEEE Engineering in medicine & Biology Society 10th Annual International Conference,1988, 712-713.

4.       S. Krishnan, R. M. Rangayyan, "Automatic de-noising of knee-joint vibration signals using adaptive time-frequency representations," Medical and Biological Engineering and Computing, vol. 38, no.1, pp. 2-8, 2000.

5.       S. Krishnan, R.M. Rangayyan, "Denoising knee joint vibration signals using adaptive time-frequency representations", Proc. IEEE Canadian Conference on Electrical and Computer Engineering, Edmonton, Canada, 9-12 May 1999, pp 1495-1500.

6.       V.S. Chourasia, A. K. Tiwari, “Most suitable wavelet for fetal phonocardiographic signal analysis”, Journal of Future Engineering & Technology, vol. 4, no. 3, pp. 23-29, Feb-Apr 2009.

7.       M.S. Hossain, N. Amin, “ECG Compression using subband thresholding of the wavelet coefficients”, Australian Journal of Basic and Applied Sciences, pp 739-749, 2011.

8.       X. Yang, P. Li, Z. Xin, Z. Bian, B. Wang, “De-Noising of the Doppler Fetal Heart Rate Signal with Wavelet Threshold Filtering Based on Spatial Correlation,” The 1st International Conference of the IEEE on Bioinformatics and Biomedical Engineering, ICBBE 2007, pp. 928 – 931, 6-8 July 2007.

9.       M. R. Raghuveer, A. S. Bopardikar, “Wavelet Transforms: Introduction to Theory and Apllications,” Pearson Education (Singapore) Pte. Ltd., Indian Branch, third edition, pp. 25-50, 2002.

10.     I. Daubechies, “Ten Lectures on Wavelets,” Society for Industrial and Applied Mathematics (SIAM), New York, 1992.

11.     S.G. Mallat, “A Wavelet Tour of Signal Processing,” Academic Press, 2nd Edition, 1999.

12.     S.G. Mallat, “A Theory of Multiresolution Signal Decomposition: The Wavelet Representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence”,
vol. 11, no. 7, pp.  674-693, July 1989.

13.     P.S. Kumar, R. Sivakumar, C. Vimal, “Removal of Ocular artifacts in the ECG through Wavelet Transform without using an EOG Reference Channel” Int. J. Open Problems Compt. Math., vol.1, no.3, pp.188-200, 2008

14.     V. S. Chourasia, A. K. Tiwari, R. Gangopadhyay, “Time-frequency characterization of fetal phonocardiographic signals using wavelet scalogram”, Journal of Mechanics in Medicine and Biology, vol. 11, no. 2, pp. 391-406, 2011.

15.     R. Adelino, Ferreira da Silva, “Wavelet denoising with evolutionary algorithms,” Digital Signal Processing, vol. 15, pp382–399, 2005.

16.     Donoho, D.L., “De-noising by soft-thresholding,” IEEE Trans. Inf. Theory vol.41 (3), pp613–627,1995.

17.     Q. Zhang, R.A. Rossel, P. Choi, “Denoising of gamma-ray signals by interval-dependent thresholds of wavelet analysis”, Measurement Science and Technology, pp. 732-735, 2006.

18.     M. C. E. Rosas-Orea, M. Hernandez-Diaz, V. Alarcon-Aquino, L. G. Guerrero-Ojeda, “A Comparative Simulation Study of Wavelet Based Denoising Algorithm,” Proceedings. 15th International Conference of the IEEE on Electronics, Communications and Computers, CONIELECOMP 2005, pp. 125-130, 28-02 Feb. 2005.


286-289

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

Mohamed R. Afify, Noha M. Soliman

Paper Title:

Feasibility of Using Lightweight Artificial Course Aggregates in the Manufacture of R. C. Elements

Abstract:    In recent years lightweight concrete is considered as one of the most important materials in the special concrete groups. It has extensive applications in the architect and insolation work.  Lightweight aggregates and chemical admixtures play an important role in the production of lightweight concrete. New artificial course aggregate has been recently developed and has the attention of the researches to be used in the manufacture of lightweight concrete. This research was conducted to determine the feasibility of lightweight aggregate type commercially available in the Egyptian market in the concrete industry. Plan concrete specimens as well as reinforced concrete beams and slabs cast with concrete containing such lightweight aggregate were cast and tested in the research. The main variable taken into consideration were the aggregate type, cement and water content as well as the chemical and mineralogical admixtures content. The percentage of reinforcement of the beams and slabs tested were also taken in to consideration. The mechanical properties of fifteen concrete mixes were determined. The structure behavior of the tested beams and slabs were investigation with special attention to their deflections, longitudinal strain and cracking under different stages of loading as well as the ultimate loads and modes of failure.

Keywords:
  Lightweight concrete, lightweight aggregate, foam, new artificial course aggregate, compressive strength, R. C. Beams and R. C. Slabs

References:
1.       (ACI 211.2-98-2004)" Standard Practice for Selecting Proportions for Structural Lightweight Concrete" (Reapproved 2004).
2.       Carrasqillo RL and Nilson AH. " Micro cracking and engineering properties of high strength concrete" research report, No. 80-1, Department of Structural
Engineering, Cornell University, Ithaca;1980.p.254-260.

3.       Norlia Mohamad Ibrahim , Shamshinar Salehuddin, Roshazita Che Amat, Nur Liza Rahim and Tengku Nuraiti Tengku Izhar," Performance of Lightweight Foamed Concrete with Waste Clay Brick as Coarse Aggregate" APCBEE Procedia 5 ( 2013 ) 497 – 501.

4.       Tsai CH. "Study on the properties of sintered lightweight aggregate concrete"  B.A. Thesis, National University of Science and Technology, Department of
Construction Engineering, Taipei, Taiwan, 2001.

5.       M.N. Haque, H. Al-Khaiat and O. Kayali "Strength and durability of lightweight concrete" Cement & Concrete Composites 26 (2004) 307–314.

6.       Yuwadee Zaetang, Ampol Wongsa, Vanchai Sata , Prinya Chindaprasirt"  Use of lightweight aggregates in pervious concrete " Construction and Building Materials 48 (2013) 585–591.

7.       H. Z. Cui, Tommy Yiu Lo, Shazim Ali Memon and Weiting Xu" Effect of lightweight aggregates on the mechanical properties and rittleness of lightweight aggregate concrete" Construction and Building Materials 35 (2012) 149–158.

8.       Gao Yingli, Cheng Ling, Gao Zheming and Guo Shiying " Effects of different mineral admixtures on carbonation resistance of lightweight aggregate concrete" Construction and Building Materials 43 (2013) 506–510.

9.       Siong Kang Lim , Cher Siang Tan, Ooi Yuan Lim and Yee Ling Lee" Fresh and hardened properties of lightweight foamed concrete with palm oil fuel ash as filler" Construction and Building Materials 46 (2013) 39–47.

10.     Amor Ben Fraj, Mohamed Kismi and Pierre Mounanga " Valorization of coarse rigid polyurethane foam waste in lightweight aggregate concrete" Construction and Building Materials 24 (2010) 1069–1077.

11.     H.Y. Wang and K.C. Tsai "Engineering properties of lightweight aggregate concrete made from dredged silt" Cement & Concrete Composites 28 (2006) 481–485.

12.     Mahmoud Hassanpour, Payam Shafigh, Hilmi Bin Mahmud "Lightweight aggregate concrete fiber reinforcement – A review" Construction and Building Materials 37 (2012) 452–461

13.     Jones MR and McCarthy A. "Utilizing unprocessed low-lime coal ash in foamed concrete. Fuel 2005; 84:1398–409.

14.     Nambiar EKK and Ramamurthy K. "Fresh state characteristics of foam concrete" ASCE J Mater Civil Eng 2008; 20:111–117.

15.     Ramamurthy K, Nambier EKK and Ranjani GIS. "A classification of studies on properties of foamed concrete" Cement Compos 2009;31(6):388–396.

16.     Awal ASM and Hussin MW. "Some aspects of durability performances of concrete incorporating palm oil fuel ash" Proceeding of 5th International conference on structural failure, durability and retrofitting, Singapore; 1997. p. 210-217.

17.     Tangchirapat W, Saeting T, Jaturapitakkul C, Kiattikomol K and Siripanichgorn A. "Use of waste ash from palm oil industry in concrete. Waste Manage 2007;27:81–88.

18.     L. Gqndqz and I˙. Ug˘ur "The effects of different fine and coarse pumice aggregate/cement ratios on the structural concrete properties without using any admixtures" Cement and Concrete Research 35 (2005) 1859– 1864.

19.     Norlia Mohamad Ibrahim, Shamshinar Salehuddin, Roshazita Che Amat, Nur Liza Rahim and Tengku Nuraiti Tengku Izhar,"Performance of Lightweight Foamed Concrete with Waste Clay Brick as Coarse Aggregate" APCBEE Procedia 5 (2013) 497 – 501.

20.     Nambiar EKK and Ramamurthy K. "Sorption characteristics of foam concrete" Cement Concr Res 2007; 37:1341–7.

21.     Mehta PK. "Properties of blended cements made from rice-husk ash" ACI J 1977; 74:440–442.

22.     Udoeyo FF. and Dashibil PU. "Sawdust ash as concrete material" ASCE J Mater Civil Eng 2002; 14(2):173–176.

23.     E.C.P. 203/2007, 2007, Egyptian Code of Practice: Design and Construction for Reinforced Concrete Structures, Research Centre for Houses Building and Physical Planning, Cairo, Egypt. 

24.     E.S.S. 1109/2008, 2008, Egyptian Standard Specification for Aggregates, Egypt.

25.     ASTM C 33, 2003, American Society for Testing and Materials: Aggregates, Philadelphia, USA.

26.     E.S.S. 4756 1/2009, 2009, Egyptian Standard Specification for Ordinary Portland Cement, Egypt.

27.     ASTM C 494-03, 2003, American Society for Testing and Materials: Chemical Admixtures, Philadelphia, USA.

28.     E.S.S. 262 /2011, 2011, Egyptian Standard Specification for Steel Bars, Egypt.

29.     ACI Committee 363. (2007) “State-of-the-Art Report on high strength concrete (ACI 363R-07)". American Concrete Institute. Detroit.

30.     Sung-woo Shin, Satyendra K. ghosh, and Jaime Moreno,"Flexural Ductility of Ultra-High-Strength Concrete Members [J]". ACI Structural Journal. No.4 (1989) pp. 394-400.


290-306

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

Henny Pratiwi Adi, Moh Faiqun Ni’am

Paper Title:

Identifying Essential Skills Requirement in Indonesian Construction Sector

Abstract:    Labors is one of important element in construction projects implementation. Labors should have a good basic skills to be able to use the skills on the field work effectively, this capability is referred as essential skills. This study aims to identify essential skills needed to work on the construction sector in Indonesia, on the job of carpenters, bricklayers, plumbers and painters building. Data was collected through interviews and distributing questionnaires to users of Indonesian construction labors in Indonesia. Respondents were asked to provide an assessment of the essential skills required by their importance for the construction project. Determination of essential skills ranking were analyzed with the Relative Importance Index (RII). The results showed that the essential skills needed on the job of carpenters, bricklayers, plumbers and painters are numeracy, thinking, working with others and continuous learning.

Keywords:
   essential skills, construction labors.


References:

1.       Barker, M., Hipkins, R. and Bartholomew, R., (2004), Reframing the Essentials Skills: Implications for and from the Science Curriculum, A commissioned research report for the Ministry of Education, Wellington, New Zealand.
2.       Enshassi, A., Mohamed, S. and Ekarriri, A., (2009), Essential Skills and Training Provisions for Building Project Stakeholders in Palestine, Journal of Construction in Developing Countries, 14 (1), pp 31–50.

3.       Farooqui, R., (2008). Assessment of Critical Skills for Project Managers in Pakistani Construction Industry, Proceeding of Conference on Construction in Developing Countries, August 4-5, Karachi, Pakistan.

4.       Gushgari, S. K., Francis, P.A., and Saklou, J.H, (1997), Skills Critical to Long Term Profitability of Engineering Firms, Journal of Management Engineering, 13 (2), pp 46–56.

5.       Keputusan Menteri Pekerjaan Umum No 340, 2007. Penetapan Standar Kompetensi Kerja Tenaga Terampil dan Tenaga Ahli, Departemen Pekerjaan Umum.

6.       Liimatainen, M. R., (2002). Training and Skills Acquisition in the Informal Sector, International Labour Office, Geneva.

7.       Nova Scotia Construction Sector Council, (2005), Essential Skills-Construction Related, Human Resources and Skills Development Canada (HRSDC).

8.       Nursyirwan, Iwan, 2006. Tenaga Kerja Konstruksi Indonesia Perlu Pengakuan, Buletin BPKSDM, Departemen Pekerjaan Umum, Vol 3.

9.       Odusami, K.T., Oyediran, O.S. and Oseni, A.O, (2007). Training Needs of Construction Site Managers, Emirates Journal for Engineering Research, 12 (1), pp 73–81.

10.     Odusami, K.T, (2002). Perception of Professionals Concerning Important Skills of Effective Project Leader, Journal of Management in Engineering, 18 (2), pp 61–67.

11.     Overtoom, C. G., (2000), Project Build : Integrating Technical and Employability Skills in Construction Industry, Information Analysis, Ohio State University.

12.     Pritz, S. G., (1995). Building Essential Skills for The Ohio Building and Construction Industry, Final Report Center on education and Training for Employment The Ohio State University & Ohio State and Construction Trade Council.

13.     Tong, L. F., (2003), Identifying Essential Learning Skills in Student’s Engineering Education, The Higher Education Research and Development Society of Australasia (HERDSA), Conference Proceeding.


307-309

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Komal Sachdeva

Paper Title:

Public Key Cryptography with Knapsack Systems

Abstract:    The Paper Public Key Cryptography with Knapsack   Systems involves the introduction to the Conventional Cryptography describing the concept of Plain Text, Cipher Text,   Encryption,   Decryption, Keys, Substitution, Transposition, Symmetric Key and Asymmetric  Key Systems. The main focus is on Public Key Cryptography and one such technique for the encryption and decryption of the message, Knapsack Systems is discussed in the paper with the mathematical description.

Keywords:
   Knapsack Systems is discussed in the paper with the mathematical description.


References:

1.       L.M.  Adleman.  On breaking the iterated Merkle-Hellman Public Key Cryptosystem, pp. 303-308 in Advances in Cryptology: Proceedings of Crypto 82, D.Chaum, R.L.Rivest and, A.T. Sherman, eds, Plenum Press, 1983
2.       “Network   Security   Essentials”,   Applications   and Standards -Third Edition, -William Stallings.

3.       “Security in Computing” Fourth Edition - Charles P. Pfleeger, Shari Lawrence Pfleeger

4.       http://en.wikipedia.org/wiki/Merkle%E2%80%93Hell man_knapsack_cryptosystem

5.       http://userpages.umbc.edu/~rcampbel/NumbThy/Class/ BasicNumbThy.html

6.       “Advance Cryptography Algorithm For Improving

          Data Security “, Volume 2, Issue 1, January 2012, ISSN: 2277 128 X, International Journal of Advanced Research   in   Computer   Science   and   Software  Engineering. -  Vishwa Gupta, Gajendra Singh, Ravindra Gupta.

7.       “Frame   Based   Symmetric   Key   Cryptography”,Volume          02, Issue: 04,    Pages              762-769(2011), Int. J. Advanced Networking and Applications.- Uttam Kr.  Mondal, Satyendra Nath Mandal, J. PalChoudhart, J.K.Mandal


310-311

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

D.Devasena, P.Lakshana, A.Poovizhiarasi, D.Velvizhi

Paper Title:

Controlling Of Electronic Equipment Using Gesture Recognition

Abstract:    Gesture recognition is a technology which is aimed at interpreting human gestures with the help of mathematical algorithms. In general, consumer electronic equipment use remote control for user interfaces. Replacing the remote control system by means of hand gestures is an innovative user interface that resolves the complications in usage of remote control for domestic appliances. The proposed model deals with using hand gesture to perform the basic controls in electronic equipment like TV and laptop. This type of user interface using gesture has advantages of ease of access and human machine interaction. Gestures are a natural form of communication and are easy to learn. However using gestures to control electronic equipment requires gesture recognition algorithm and adequate hardware relating to it.

Keywords:
   Gestures, Gesture Control, Gesture recognition, Laptop control, LabVIEW.


References:

1.       SoonmookJeong, Jungdong Jin, Taehoun  Song, Keyho Kwon, Jae WookJeon, (2012) ‘Single Camera Dedicated Television Control System using Gesture Drawing’, IEEE Transactions on Consumer Electronics, Vol. 58, no. 4, pp. 1129 -1137.
2.       K. K. Cheong, I. S. Kim, S. K. Park, and Y. J. Park, (2011) ‘User performance measures for evaluating interactive TV pointing devices’, IEEE Trans. Consumer Electronics, Vol. 57, no. 3, pp. 1236-1244.

3.       N. Henze, A. Locken, S. Boll, T. Hesselmann, and M. Pielot, (2010) ‘Free-hand gestures for music playback: deriving gestures with a user-centered process’, Proceedings of the 9th International Conference on Mobile and Ubiquitous Multimedia, no. 16.

4.       Y. M. Han, (2010) ‘A low-cost visual motion data glove as an input device to interpret human hand gestures’, IEEE Trans. Consumer Electronics, Vol.56, no. 2, pp. 501-509.

5.       D. W. Lee, J. M. Lim, S. W. John, I. Y. Cho, and C. H. Lee, (2009) ‘Actual remote control: a universal remote control using hand motions on a virtual menu’, IEEE Trans. Consumer Electronics, Vol. 55, no. 3, pp.1439-1446.

6.       A. Wilson, and N. Oliver, (2003) ‘GWindows: robust stereo vision for gesture based control of windows’, ICMI 03, pp. 211-218.

7.       M. Moyle, and A. Cockburn, (2003) ‘The design and evaluation of a flick gesture for ‘back’ and ‘forward’ in web browsers’, Proceedings of the4th Australasian User Interface Conference on User Interfaces, Vol. 18,pp. 39-46.


312-315

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

65.

Authors:

A.Vjay Kumar, T.V. Rajini Kanth

Paper Title:

Estimation of the Influence of Fertilizer Nutrients Consumption on the Wheat Crop yield in India- a Data mining Approach

Abstract:    The forecasting of agricultural yields is a challenging and desirable task for every nation. In Indian economy agriculture sector has a major role. In the total India rural population above seventy percent of the population depends on the agriculture to lead their lives. In the index of the Indian exports, agriculture exports stood at the fifth place. Today agriculture farmers are not only producing yields but also producing the agriculture data. This data can be collected, stored and analyzed for the useful information. In the present paper an attempt is made to apply the data mining techniques to extract useful information from the agriculture dataset of the annual measurements of the fertilizer nutrients consumed and wheat crop yields in India. The present experiment is based on the data collected from the sources like the Department of Agriculture and Statistics, Government of India and Department of Agriculture and Co operation, Government of India. The results of the present paper proved that the fertilizer nutrients consumed are the most influential factors of the wheat crop yield in India.

Keywords:
   Yield estimation, Data mining, precision agriculture, regression and regression analysis


References:

1.        “Data mining Techniques for Predicting Crop Productivity – A review article” S.Veenadhari, Dr.Bharat Misra, Dr. CD Singh IJCST Vol. 2, Issue 1,March 2011.
2.        Chengquan Huang, Limin Yang, Bruce Wylie, and  Collin Homer. “A strategy for estimating tree Canopy density using landsat 7 etm+ and high resolution images over large areas”. In the proceedings of the Third International Conference on Geospatial Information in Agriculture and Forestry, 2001.

3.        Georg Ruß, Rudolf Kruse, Peter Wagner, and Martin Schneider. “Data mining with neural networks for wheat yield prediction. In Petra Perner, editor, Advances in Data Mining (Proc. ICDM 2008)”, pages 47–56, Berlin, Heidelberg, July 2008, Springer Verlag.

4.        R S Deshpande “An Analysis Of The Results Of Crop Cutting Experiments,Agricultural Development and Rural Transformation Unit” Institute for Social and Economic Change February 2003.

5.        Georg Ruß “Data Mining of Agricultural Yield Data: A Comparison of Regression Models, ICDM'09”,. Leipzig, Germany, July 2009.

6.        V. Ramesh and K. Ramr “Classification of agricultural land soils: A data mining approach”, International Journal on Computer Science and Engineering (IJCSE) ISSN: 0975-3397 Vol. 3 No. 1 Jan 2011, 379.

7.        Anup K. Prasad a, Lim Chai b, Ramesh P. Singh a, b,*, Menas Kafatos b (2006). “Crop yield estimation model for Iowa using remote sensing and surface parameters”. International Journal of Applied Earth Observation and Geoinformation 8 (2006) 26-33.

8.        B. Lalic, L. Pankovic, D. T. Mihailovic, M. Malesevic, I. Arsenic: “Crop models and its use in vegetation dynamic forecasting”. In Proc. Of Institute of Field and Vegetable Crops, Vol. 44, pp. 317-323, 2007.

9.        B . Marinković, J. Crnobarac, D. Marinković, G. Jaćimović, D.V. Mircov, “Weather conditions in the function of optimal corn yield in Serbia and the Vojvodina province”, in Proceeding of the 1st Scientific Agronomic Days, pp. 15-19, 2008.

10.     D. Pokrajac, T. Fiez, D. Obradovic, S. Kwek, Z. Obradovic, “Distribution comparison for site-specific regression modeling in agriculture”, in Proc. 12th International Joint Conference on Neural Networks (IJCNN), pp. 3937-3941, 1999.

11.     Groten, S. M. E. (1993). “NDVI - crop monitoring and early yield assessment of Burkina Faso”. International Journal of Remote Sensing, 14(8), 1495-1515.

12.     Hayes, M.J., Decker, W.L., 1996. “Using NOAA AVHRR data to estimate maize production in the United States” Corn Belt. Int. J.Remote Sense. 17, 3189-3200.

13.     Jorgensen, S.E., 1994. “Models as instruments for combination of ecological theory and environmental practice”. Ecol. Model. 75-76,5-20.

14.     Mass, S. J., 1988. “Use of remotely-sensed information in agricultural crop growth models”. Ecological Modeling. 41,247-268

15.     Moa,*, S. Liua, Z. Lina, Y. Xub, Y. Xianga, T.R. McVicarc (2005). “Prediction of crop yield, water consumption and water use efficiency with a SVAT-crop growth model using remotely sensed data on the North China Plain. Ecological Modelling” 183 301-322

16.     Monteith, J.L., 1972. “Solar radiation and productivity in tropical ecosystems”. J.Appl. Ecol. 9,747-766.

17.     Monteith, J.L., 1977. “Climate and the efficiency of crop production Britain”. Phil. Trans.Roy.Soc.Lond. B 281,277-294.

18.     Reynolds, M. Yittayew, D. C(2000).Slack, “Estimation of crop yields and production by integrating the FAO Crop Speci. C Water Balance model with real-time satellite data and ground-based ancillary data”. Int.g. remote sensing, 2000, vol,21, no.18,3487-3508

19.     M. Becker,   K. H. Diekmann,  J. K. Ladha,  S. K. De Datta,  J. C. G. Ottow, “Effect of NPK on growth and nitrogen fixation of Sesbania rostrata as a green manure for lowland rice (Oryza sativa L.)” Plant and Soil, April 1991, Volume 132, Issue 1, pp 149-158

20.     Suzuki.M, Kamekawa.k, Sekiya.S and Shiga.H in the paper titled “Effect of continuous application of organic or inorganic fertilizer for sixty years on soil fertility and rice yield in paddy field” Trans.14th Int.congr. soil sci. 4:14-19, Vol.4


316-320

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

Rajeshwari.S, Malathi.K, Regina.B

Paper Title:

A Survey on Characterization of Defense Mechanisms in DDOS Attacks

Abstract:    Distributed Denial of Service (DDoS) Attack is a poisonous threat to our security professionals. DDoS Attack is defined as the attack which targets one or more systems using multiple systems which are compromised usually by Trojan Horse at the same instance of time. DDos Attack does not allow legitimate users to access their resource and their services by taking advantage of the system vulnerability .DDoS Attack is independent of the protocols used .The goals  of DDoS Attack is Twofold. First it overloads the server which may lead to crash and the second goal is to acquire and steal the bandwidth by generating a large scale of traffic.The attack is set up by a Master called as BotMaster by controlling armies of system to attack which is injected by malware called as Botnets. Effective and Collaborative Defense Mechanisms for DDoS Attack in Wired Network Systems is the main Scope of Intrusion Detection. Exploration of defense mechanisms for DDoS Flooding Attack in Wired Network Systems along with their classification and study of various structures of Botnets is discussed in this paper. We also highlight all the techniques already used before the attack, during the attack and after the attack. As application level attacks are common and stealthier when compared to network /transport level attacks we focus more on http DDoS flooding attacks. 

Keywords:
   DDoS (Distributed denial of service) Attacks ,TrojanHorse ,BotMaster, Collaborative Defense Mechanisms, Http DDoS flooding attacks, Intrusion Detection, application level attacks.


References:

1.       [online]  http://techcrunch.com/2010/11/28/wikileaks-ddos-attack/
2.       [online] http://isc.sans.edu/diary.html?storyid=6622

3.       Yahoo on Trail of Site Hackers, Wired.com, Feb. 8, 2000, [online] http://www.wired.com/news/business/0,1367,34221,00.html

4.       Powerful Attack Cripples Internet, Oct. 23, 2002, [online]http://www.greenspun.com/bboard/q–and–a–fetch–msg.tcl?msgid=00A7G7 

5.       Mydoom lesson: Take proactive steps to prevent DDoS attacks, Feb. 6, 2004,     [online]

6.       Lazy Hacker and Little Worm Set Off Cyberwar Frenzy, July 8,2009,[online] http://www.wired.com/threatlevel/2009/07/mydoom/

7.       New ”cyber attacks” hit S Korea, July 9, 2009,[online]http://news.bbc.co.uk/2/hi/asia-pacific/8142282.stm

8.       Operation Payback cripples MasterCard site in revenge for WikiLeaks ban,Dec.8,2010, [online]http://www.guardian.co.uk/media/2010/dec/08/operation–payback–masterc  ard–website–wikileaks

9.       T. Kitten, DDoS: Lessons from Phase 2 Attacks, Jan. 14, 2013, [online]http://www.bankinfosecurity.com/ddos-attacks-lessons-from-phase-2-a-5420/op-1

10.     Worldwide Infrastructure Security Report: Volume VI, 2011 Report,  Arbor Networks, Feb. 1st, 2011, [online]  http://www.arbornetworks.com/report

11.     Prolexic Technologies, [online]    http://www.prolexic.com/index.phpknowledge–center/frequently–ask  ed–questions/index.html

12.     J. Mirkovic and P. Reiher, A taxonomy of DDoS attack and DDoS  defense mechanisms, ACM SIGCOMM Computer Communications Review, vol. 34, no. 2, pp. 39-53, April 2004.

13.     T.Peng, C.Leckie, and K.Ramamohanarao, Survey of network-based defense mechanisms countering the DoS and DDoS problems, ACM Comput. Surv. 39, 1, Article 3, April 2007.

14.     RioRey, Inc. 2009-2012, RioRey Taxonomy of DDoS Attacks, RioReyTaxonomyRev2.32012,2012. [online]http://www.riorey.com/xresources/2012/RioRey Taxonomy DDoS Attacks 2012.eps

15.     “C. Douligeris, and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, Vol. 44, No. 5, pp. 643-666, April 2004.”

16.     “S. Ranjan, R. Swaminathan, M. Uysal, A. Nucci, and E. Knightly,  DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer attacks, IEEE/ACM Trans. Netw., Vol. 17, No. 1, pp. 2639, February 2009.”

17.     Arbor Application Brief: The Growing Threat of Application-LayerDDoS Attacks, Arbor Networks, Feb. 28, 2011, [online]http://www.arbornetworks.com/component/docman/doc download/467-the-growing-threat-of-application-layer-ddos-attacks?Itemid=442.

18.     BreakingPoint Labs, Application-Layer DDoS Attacks Are Growing: Three to Watch Out For, Oct. 4, 2011, [online]http://www.breakingpointsystems.com/resources/blog/application-layer-ddos-attacks-growing/

19.     S. Shekyan, Are you ready for slow reading?, Jan. 5, 2012, [online]https://community.qualys.com/blogs/securitylabs/2012/01/05/slow-ad

20.     J. Lo et al., An IRC Tutorial, April, 2003, irchelp.com 1997, [online]http://www.irchelp.org/irchelp/irctutorial.html#part1.

21.     “B. Hancock, Trinity v3, a DDoS tool, hits the streets, Computers & Security, Vol. 19, no. 7, pp. 574-574, Nov., 2000.”

22.     Bysin, knight.c sourcecode, 2001, [online]http://packetstormsecurity.org/distributed/ knight.c.

23.     Team-cymru Inc., A Taste of HTTP Botnets, July, 2008, [online]http://www.teamcymru.com/ReadingRoom/Whitepapers/2008/httpbotnets.Eps

24.     J. Nazario, BlackEnergy DDoS Bot Analysis, Arbor Networks, 2007, [online]http://atlaspublic.ec2.arbor.net/docs/BlackEnergy+DDoS+Bot+Analysis.eps

25.     C. Wilson , DDoS and Security Reports: The Arbor Networks Security Blog, Arbor Networks, 2011, [online]http://ddos.arbornetworks.com/2012/02/ddos-tools/.

26.     “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding AttacksSaman Taghavi Zargar, Member, IEEE, James Joshi, Member, IEEE, and David Tipper, Senior Member, IEEE”

27.     [online] http://infosecisland.com/blogview/12395–DDoS–Attack–Utilizes–Self–Destructing–Botnet.html

28.     “L. C. Chen, T. A. Longstaff, and K. M. Carley, Characterization of defense mechanisms against distributed denial of service attacks, Computers & Security, vol. 23, no. 8, pp. 665-678, December 2004”

29.     “U. Tariq, M. Hong, and K. Lhee, A Comprehensive Categorization     ofDDoS Attack and DDoS Defense Techniques, ADMA LNAI 4093, pp. 1025-1036, 2006”


321-324

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

Sabbar Insaif Jasim

Paper Title:

Jamming Attacks Impact on the Performance of Mobile Ad-Hoc Network and Improvement Using MANET Routing Protocols

Abstract:    Security in MANET has been a challenging task ever since the wireless networks came into existence. A number of works have been developed to accomplish this task. Jamming attacks can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. This paper introduced the effect of jammer in Mobile Ad Hoc Network and presented how routing protocols can improve the performance of network in terms of some parameters. MANET Routing protocols taken in this study are OLSR ( Proactive routing protocol), DSR (Reactive routing protocol), TORA and GRP (Hybrid Routing Protocol). This study was done using OPNET Modeler (v14.5) in terms of number of scenarios' parameters for HTTP application such as (Delay, Throughput, Data dropped, traffic received and sent). The results showed that Jammers would reduce the performance by increasing delay and data dropped and decreasing throughput. MANET routing protocols could improve system performance by increasing throughput and data dropped at the expense of increasing delay.

Keywords:
   MANET, OPNET, Routing Protocols, Jammers, attacks.


References:

1.       Harminder S. Bindra1, Sunil K. Maakar and A. L. Sangal, "Performance Evaluation of Two Reactive Routing Protocols of MANET using Group Mobility Model", IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 10, May 2010, pp38-44.
2.       Wenyuan Xu, Wade Trappe, Yanyong Zhang and Timothy Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, MobiHoc’05, , UrbanaChampaign, Illinois, USA., ACM 1595930043/ 05/0005 , May 25–27, 2005.

3.       Tajinderjit Kaur, Sangeeta Sharma, “Mitigating the Impact of Jamming Attack by Using Antenna Patterns in MANET”, VSRD International Journal of CS & IT Vol. 2 (6), 2012, pp. 437-445.

4.       Abhay Kumar Rai, Rajiv Ranjan Tewari, Saurabh Kant Upadhyay, “Different Types of Attacks on Integrated MANET-Internet Communication”, International Journal of Computer Science and Security (IJCSS) Volume (4): Issue (3), 2010, pp.265-274.

5.       Chanchal Aghi1,  Chander Diwaker, “Black hole attack in AODV routing protocol: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering,  Volume 3, Issue 4, April 2013, pp.820-823.

6.       Kannhavong, B. , Nakayama H., Nemoto Y., Kato N, Jamalipour  A., “A survey of routing attacks in mobile ad hoc networks“,IEEE Wireless Communications, Volume: 14, Issue: 5, 2007, pp.85-91.

7.       Ali Hamieh, Jalel Ben-Othman, “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution", IEEE International Conference on Communications, 2009, pp.1-9.

8.       Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012, pp.269-275.

9.       Kwangsung Ju and Kwangsue Chung, “Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi-hop Tactical Networks”, International Journal of Security and Its Applications Vol. 6, No. 2, April, 2012, pp.149-154.

10.     Rajeshwar Singh, Dharmendra K Singh, Lalan Kumar, “Performance Evaluation of DSR and DSDV Routing Protocols for Wireless Ad Hoc Networks”, International  Journal of Advanced Networking and Applications  Vol. 02, Issue: 04, 2011, pp. 732-737.

11.     Anuj K., Dr. Harsh S., Dr. Anil K., “Performance analysis of AODV, DSR & TORA Routing Protocols”, IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010, pp. 226-231.

12.     Kirti Aniruddha Adoni and Radhika D. Joshi, “Optimization of Energy Consumption for OLSR Routing Protocol in MANET”, International Journal of Wireless & Mobile Networks (IJWMN) Vol. 4, No. 1, February 2012, pp. 251-262.

13.     Chang Wook Ahn, “Gathering-based routing protocol in mobile ad hoc networks”, Computer Communications 30 (2006) 202–206.

14.     OPNET official website www.opnet.com


325-330

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

Sneha .P. Meshram, Rushi Longadge, Latesh Malik

Paper Title:

An Analysis on Biometric Template Protection Schemes

Abstract:    A biometric authentication system operates by acquiring raw biometric data from a subject e.g., fingerprint and iris images. This paper summarizes the various aspects of biometric system security. It broadly categorizes the various factors that cause biometric system failure and identify the effects of such failures. In this system, biometric templates are stored in central database. Preserving the privacy of this digital biometric template has become very important. The main focus of this paper is on Biometric template security. It also provides a high-level classification of the attacks on biometric templates and a detail overview of different template protection approaches that have been proposed in the literature.

Keywords:
   Authentication, Biometric templates, Steganography, Watermarking.


References:

1.        Arun Ross and Asem Othman, “Visual Cryptography for Biometric Privacy”, IEEE Transaction on Information Forensic and Security, vol. 6, no. 1, March 2011.
2.        A. K. Jain, A. Ross, and S. Pankanti, “Biometrics: a tool for information security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, 2006.

3.        D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition. Springer-Verlag,2003.

4.        U. Uludag and A. K. Jain, “Attacks on biometric systems:a case study in fingerprints,” in Proc. SPIE, Security, Seganography and Watermarking of Multimedia.

5.        N. Ratha, J. H. Connell, and R. M. Bolle, “An analysis of minutiae matching strength,” in Proc. Audio and Video-based Biometric Person Authentication (AVBPA), pp. 223–228, (Halmstad, Sweden), June 2001.

6.        A. Adler, “Can images be regenerated from biometric templates?,” in Biometrics Consortium Conference, (Arlington, VA), September 2003.

7.        C. J. Hill, “Risk of masquerade arising from the storage of biometrics,” B.S. Thesis, Australian National University, November 2001, http://chris.fornax.net/biometrics.html.

8.        Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005.

9.        R. Cappelli, R. Erol, D. Maio, and D. Maltoni, “Synthetic fingerprint-image generation,” in Proc. Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478, (Barcelona, Spain), September 2000.

10.     Soutar, “Biometric system security,” White Paper, Bioscrypt,
http://www.bioscrypt.com.
11.     A. Adler, “Images can be regenerated from quantized biometric match score data,” in Proc. Canadian Conf. Electrical Computer Eng., pp. 469–472, (Niagara Falls,
anada), May 2004.

12.     M. Yeung and S. Pankanti, “Verification watermarks on fingerprint recognition and retrieval,” in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 66–78, (San Jose, USA), January 1999.
13.     A. K. Jain and U. Uludag, “Hiding biometric data,” IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 25, no. 11, pp. 1493–1498, 2003.
14.     L. C. Ferri, A. Mayerhofer, M. Frank, C. Vielhauer, and R. Steinmetz, “Biometric authentication for ID cards with hologram watermarks,” in Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 629–640, (Bellingham, WA), January 2002.

15.     N. Ratha, J. Connell, and R. bolle, “Enhancing  security and privacy in biometrics-based authentication systems,” IBM Systems Journal, vol. 40, no. 3, pp. 614–634, 2001.

16.     U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004.

17.     U. Uludag, S. Pankanti, and A. K. Jain, “Fuzzy vault for fingerprints,” To appear in Proc. Audio- and Videobased Biometric Person Authentication (AVBPA), (Rye
Brook, NY), July 2005.

18.     J. Dong and T. Tan, “Effects of watermarking on iris recognition performance,” in Proc. 10th Int. Conf. Control, Automation, Robotics and Vision, 2008 (ICARCV 2008), 2008, pp. 1156–1161.

19.     N. Agrawal and M. Savvides, “Biometric data hiding: A 3 factor authentication approach to verify identity with a single image using steganography, encryption and matching,” in Proc. Computer Vision and Pattern Recognition Workshop, 2009, vol. 0, pp. 85–92.

20.     A. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP J. Advances Signal Process., pp. 1–17, 2008.

21.     Naor .M and Shamir .A, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.  [22] Maltoni.D, Maio.D, Jain .A, and Prabhakar .S, Handbook of Fingerprint Recognition. Secaucus, NJ: Springer-Verlag New York, Inc.,2003.


331-335

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

Ruchire Eranga Henry Wijeisnghe, Nam Hyun Cho, Kibeom Park, Yongseung Shin, Jeehyun Kim

Paper Title:

Wavelength-Filter Based Spectral Calibrated Wave number - Linearization in 1.3 mm Spectral Domain Optical Coherence

Abstract:    In this study, we demonstrate the enhanced spectral calibration method for 1.3 μm spectral-domain optical coherence tomography (SD-OCT). The calibration method using wavelength-filter simplifies the SD-OCT system, and also the axial resolution and the entire speed of the OCT system can be dramatically improved as well. An externally connected wavelength-filter is utilized to obtain the information of the wavenumber and the pixel position. During the calibration process the wavelength-filter is placed after a broadband source by connecting through an optical circulator. The filtered spectrum with a narrow line width of 0.5 nm is detected by using a line-scan camera. The method does not require a filter or a software recalibration algorithm for imaging as it simply resamples the OCT signal from the detector array without employing rescaling or interpolation methods. One of the main drawbacks of SD-OCT is the broadened point spread functions (PSFs) with increasing imaging depth can be compensated by increasing the wavenumber-linearization order. The sensitivity of our system was measured at 99.8 dB at an imaging depth of 2.1 mm compared with the uncompensated case.

Keywords:
   SD-OCT,Wavelength-filter,wavenumber-linearization.


References:

1.       D. Huang, E.A. Swanson, C.. Lin, J.S. Schuman, W.G. Stinson, W. Chang, M.R. Hee, T. Flotte, K. Gregory, C.A. Puliafito, and J.G. Fujimoto, “Optical coherence tomography,” Science, vol. 254, no. 5035, pp.1178-1181, 1991.
2.       A. F. Fercher, “Optical coherence tomography,” J. Biomed. Opt. 1, pp.157-173, 1996.

3.       A. F. Fercher, W. Drexler, C. K. Hitzenberger, and T. Lasser, “ Optical coherence tomography-principles and applications,” Rep. prog. Phys, pp.66, 239-303, 2003.

4.       Z.Yaqoob, J. Wu, and C. Yang, “spectral domain optical coherence tomography a better OCT imaging strategy,” Bio techniques 39:S6-S13, doi 10.2144/000112090, December 2005. 

5.       B. Cense, N.A. Nassif, T. C. Chen, M. C. Pierce, S.-H. Yun,B. H. Park, B. E. Bouma, G. J. Tearney, and J.F. de Boer, “Ultrahigh-resolution high-speed retinal imaging using spectral-domain Optical coherence tomography, ”Opt. Express 12, pp.2435-2447,2004.

6.       Jeehyun.K, T.E. Milner, “Real-time retinal imaging with a parallel optical coherence tomography using a cmos smart array detector,”Journal of the Korean physical society, Vol.51, No.5, pp.1787-1791, November 2007.

7.       NH Cho, U. Jung, S. Kim, W. Jung, J. Oh, HW Kang, J. Kim, “High Speed SD-OCT System Using GPU Accelerated Mode for in vivo Human Eye Imaging” Journal of the Optical Society of Korea, vol. 17, no. 1, pp. 68-72, 2013

8.       M. Mujat, B. H. Park, B. Cense, T. C. Chen, and J. F. de Boer, “Auto calibration of spectral-domain optical coherence tomography spectrometers for in vivo quantitative retinal nerve fiber layer birefringence determination,” J. Biomed. Opt. 12,041205, 2007.

9.       Z. Wang, Z. Yuan, H. Wang, and Y. Pan, “Increasing the imaging depth of spectral-domain OCT by using interpixel shift technique,” Opt. Express 14, pp.7014–7023, 2006.

10.     T. Bajraszewski, M. Wojtkowski, M. Szkulmowski, A. Szkulmowska, R. Huber, and A. Kowalczyk, “Improved spectral optical coherence tomography using optical frequency comb,” Opt. Express 16, pp.4163–4176, 2008.

11.     V. M. Gelikonov, G. V. Gelikonov, and P. A. Shilyagin, “Linear-wavenumber spectrometer for high-speed spectral-domain optical coherence tomography,” Opt.
Spectrosc. 106, pp.459–465, 2009.

12.     Z.Hu and A.M. Rollins,”Fourier domain optical coherence tomography with a linear-in-wavenumber spectrometer, “Opt. Lett.32, pp.3525-3527, 2007


336-340

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

Poonam M. Bhagat, Prasad S. Halgaonkar, Vijay M. Wadhai