International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02
Home
Articles
Conferences
Editors
Scope
AUTHOR GUIDELINES
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-3 Issue-5 Published on June 30, 2014
19
Volume-3 Issue-5 Published on June 30, 2014

  Download Abstract Book

S. No

Volume-3 Issue-5, June 2014, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Sandhia Valsala, Anil R

Paper Title:

Review and Analysis of Software Release Planning Models

Abstract:   Software maintenance is generally recognized to consume majority of resources in many organizations. Regular replacement of legacy systems with new ones is not a feasible solution. Planning releases so as to maximize the functionality and quality of software is very much in need now. Release Planning plays a very important role in managing and maintaining releases and helps in the delivery of a high quality product to the end-users. Software Release planning involves proper grouping of activities in the release of one or more versions of software to one or more customers. This paper analyzes the various release planning models and the factors considered by these models for feature selection. 32 release planning models are considered and taxonomy of requirement selection factors is constructed. The main contribution of this paper is to assist software engineers in finding out the real factors that need to be considered in planning a release and to assess the effect of these identified factors on a release so as to plan releases efficiently and effectively.

Keywords:
 Release planning, Software maintenance, Legacy systems, Requirement selection.


References:

1.        .http://searchsystemschannel.techtarget.com/definition/   release-management
2.        http://timelessmind.com/t/TME_releasemanager.html

3.        http://en.wikipedia.org/wiki/Maintenance_release

4.        http://www.spamlaws.com/windows-operating-system.html

5.        Hans Christian Benestand , Jo E Hannay “A Comparison of Model-based and Judgement based Release planning on  Incremental Software Projects

6.        Saad Bin Saleem and Muhammad Usman Shafique , A Study on Strategic Release Planning Models of Academia and Industry Through Systematic Review and Industrial Interviews,  School of Engineering Blekinge Institute of Technology  ,Sweden

7.        Mikael Svahnberg_, Tony Gorschek, Robert Feldt, Richard Torkar,Saad Bin Saleem, Muhammad Usman Shafique, A Systematic Review on Strategic Release Planning Models, Blekinge Institute of Technology,Sweden

8.        J. Karlsson and K. Ryan. A cost-value  approach study for prioritizing requirements, IEEE   software, 14(5):67–74, 1997.

9.        Denne, M. and Cleland-Huang, J., “The Incremental Funding Method: Data Driven Software Development,” IEEE: pp. 39-47, 2004.

10.     D. Greer and G. Ruhe. Software release planning: an evolutionary and iterative approach. Information and Software Technology, 46(4):243–253, 2004

11.     Ruhe, G., and Des, G., "Quantitative Studies in Software Release Planning under Risk and Resource Constraints", Proceedings of the 2003 International Symposium on Empirical Software Engineering, pp. 262-270, 2003.
12.     Ruhe, G., and Ngo, A., “Hybrid Intelligence in Software Release Planning”, Int. J. Hybrid Intell. Syst. vol.1, no.1-2, pp.99-110, 2004.
13.     Saliu, O., Ruhe, G., "Supporting Software Release Planning Decisions for Evolving Systems", 29th Annual IEEE/NASA Software Engineering Workshop, pp. 14-26, 2005.

14.     Maurice, S., Ruhe, G., Saliu, O., and Ngo-The, A., "Decision Support for Value-Based Software Release Planning", Journal of Value-Based Software Engineering, pp. 247-261, 2006

15.     Ruhe, G., Momoh, J., "Strategic Release Planning and Evaluation of Operational Feasibility, "Proceedings of the 38th Annual Hawaii International Conference on System Sciences, HICSS„05, pp. 313b-313b, 2005.

16.     G. Ruhe and M. O. Saliu. The art andscience of software release planning”. IEEESoftware, 22(6):47–53, 2005.

17.     Ngo-The, A., and Ruhe, G., “A Systematic Approach for Solving the Wicked Problem of Software Release Planning”, Soft Comput, vol. 12, no.1, pp. 95-108, 2007.

18.     Fabricio G Freitas, Daniel P Coutinho, Jefferson T Souza ,“Software next release planning approach through exact optimization,”, International Journal of Computer Applications, May 2011.

19.     A New Approach to the Software Release Planning”, Brazilian Symposium on Software Engineering,2009

20.     Yuanyuan Zhang, Mark Harman,S Afshin Mansouri ,“The Multiobjective next release problem”, Proceedings of the 9th annual conference on Genetic and evolutionary computation

21.     Saliu, O., and Ruhe, G., “Bi-objective Release Planning for Evolving Software Systems”, In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC-FSE '07), pp.105-114, 2007.

22.     Ruhe, G., Eberlein, A., and Pfahl, D., "Trade-off Analysis for Requirements Selection", International Journal of Software Engineering and Knowledge Engineering, vol. 13,
pp. 345-66, 2003

23.     Regnell, B., Karlsson, L., and Martin, H., “An Analytical Model for Requirements Selection Quality Evaluation in Product Software Development", Proceedings of the 11th IEEE International Conference on Requirements Engineering, pp. 254-263, 2003.

24.     Regnell, B., Svensson, R.B., and Olsson, T.,"Supporting Road mapping of Quality Requirements", IEEE Software, vol.25, no.2, pp.42-47, 2008

25.     Van den Akker, M., Brinkkemper, S., Diepen, G. and Versendaal, J., "Software Product Release Planning through Optimization and What-if Analysis," Information and
Software Technology, vol.50, issue.12, pp.101-11, 2008

26.     Samuel Fricker1 and Susanne Schumacher,” Release Planning with Feature Trees: Industrial Case”, REFSQ 2012, LNCS 7195, pp. 288–305, 2012,Springer-Verlag Berlin Heidelberg 2012

27.     Qing Huang Yu, Wen Chiang Chuan, Hsu Huang Cheng , Applying a MAX-MIN Ant System with a Dynamic Roulette Wheel Strategy to Software Release Planning, International Conference on advance computer science and electronics Information, July 2013

28.     Pfahl, D., Al-Emran, A., and Ruhe, G., "A System Dynamics Simulation Model for Analyzing the Stability of Software Release Plans", Software Process Improvement and Practice, vol.12, pp. 475-490, 2007

29.     Pfahl, D., Al-Emran, A., and Ruhe, G., "A System Dynamics Simulation Model for Analyzing the Stability of Software Release Plans", Software Process Improvement and Practice, vol.12, pp. 475-490, 2007

30.     Ngo, A., Ruhe, G., and Wei, S., "Release Planning under Fuzzy Effort Constraints", Proceedings  of the Third IEEE International Conference on Cognitive Informatics, pp. 168-175, 2004

31.     Amandeep, A., Ruhe, G., and Stanford, M., "Intelligent Support for Software Release Planning", 5th International Conference on Product Focused Software Process
Improvement, pp. 248-262, 2004

32.     Van den Akker, J. M., Brinkkemper, S., Diepen, G., and Versendaal, J., "Determination of the Next Release of a Software Product: An Approach using Integer Linear Programming”, Proceeding of the Eleventh International Workshop on Requirements Engineering, vol.10, pp. 119-24, 2005.

33.     Ngo-The, A., and Saliu, O., "Fuzzy Structural Dependency Constraints in Software Release Planning”, The 14th IEEE International Conference on Fuzzy Systems (FUZZ '05), pp.442-447, 2005

34.     Ngo-The, A., and Saliu, O., "Measuring Dependency Constraint Satisfaction in Software Release Planning using Dissimilarity of Fuzzy Graphs", Fourth IEEE Conference on Cognitive Informatics, (ICCI 2005), pp. 301-307, 2005

35.     Ziemer, S., Falcone Sampaio, R. P., and Stalhane, T., “A decision modeling approach for analyzing requirements configuration trade-offs in time-constrained Web Application Development”, Eighteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2006), pp.144-149, 2006.

36.     Du, G., Richter, M. M., and Ruhe, G., "An Explanation Oriented Dialogue Approach and Its Application to Wicked Planning Problems," Journal of Computing and Informatics, vol. 25, pp. 223-49, 2006.

37.     Mingshu, L., Meng, H., Fengdi, S., and Juan, L., "A Risk-Driven Method for Extreme Programming Release Planning", Proceedings of the 28th International Conference on Software Engineering, pp., 2006.

38.     Mark Przepiora, Reza Karimpour, Guenther RuheA Hybrid Release Planning Method and its Empirical Justification, 2013.


1-7

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Rinkal Patel, Rajanikanth Aluvalu

Paper Title:

A Reduced Error Pruning Technique for Improving Accuracy of Decision Tree Learning

Abstract:   Decision tree inductions are well thought-out as it is one of the most accepted approaches for representing classifiers. Many researchers from varied disciplines like Statistics, Pattern Reorganization; Machine Learning measured the problem of growing a decision tree from available data. Databases are the rich sources of hidden information that can be used for intelligent decision making. Classification and Prediction techniques of data mining are two form of data analysis that can be used to discovering this type of hidden knowledge. Classification techniques deal with categorical attributes whereas prediction model is the continuous value function. Training data are analyzed by classification algorithm. In decision tree construction attribute selection measure are used to select attributes, that best partition tuples into different classes. The branches of decision tree may reflect noise or outliers in training data. So tree pruning techniques applies to identify and remove those branches which reflect noise with the aim of improving classification accuracy. But still scalability is the issue of decision tree from large database. This paper present implementation of decision tree induction algorithm in java with reduced error pruning(REP) technique for improving accuracy of classifier.

Keywords:
  Data Mining, Classification Decision Tree Induction, Information Gain, C4.5, Tree Pruning.


References:

1.        Matthew N. Anyanwu & Sajjan G. Shiva,” Comparative Analysis of Serial Decision Tree Classification Algorithms”, Department of Computer Science The University of Memphis,Memphis, TN 38152, U.S.A.
2.        Tapio Elomaa ,Matti Kääriäinen,” An Analysis of Redued Error Pruning ”, Department Journal of Artificial Intelligence  Research 15 (2001) 163-187.

3.        Lior Rokach and Oded Maimon, “Top-Down Induction of Decision Trees Classifiers—A Survey”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS
PART C: APPLICATIONS AND REVIEWS, VOL. 35, NO. 4, NOVEMBER 2005.

4.        Arno J. Knobbe, Arno Siebes, Daniël van derWallen,” Multi-Relational Decision Tree Induction”, 3821 AE Amersfoort the Netherlands.

5.        A. S. Galathiya, A. P. Ganatra and C. K. Bhensdadia,” : Improved Decision Tree Induction Algorithm with Feature Selection, Cross Validation, Model Complexity and Reduced Error Pruning”, A. S. Galathiya et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3427-3431.

6.        Chen Jin, Luo De-lin, Mu Fen-xiang,” An Improved ID3 Decision Tree Algorithm”, Proceedings of 2009 4th International Conference on Computer Science & Education.

7.        Vaibhav Tripathy,” A Comparative Study of Multi-Relational Decision Tree Learning Algorithm”, International Journal of Scientific and Technology Research Volume 2, Issue 8, August 2013.

8.        Ravindra Changala,Annapurna Gummadi, G Yedukondalu,UNPG Raju, ” Classification by Decision Tree Induction Algorithm to Learn Decision Trees from the class-Labeled Training Tuples” ,  International Journal of Advanced Research in  Computer Science and Software Engineering April 2012.

9.        Jaiwei Han, Micheline kamber, “Data Mining Concepts and Techniques”, Morgan Kaufmann Publishers, 2006, pp 360-361.

10.     Maytal Saar-Tsechansky, Foster Provost,” Handling Missing Values when Applying Classification Models”, Journal of Machine Learning Research 8 (2007) 1217-1250.

11.     Lior Rokach and Oded Maimon,”Decision Tree”, Department of Industrial Engineering Tel-Aviv University.

12.     Patel Nimisha R., Sheetal Mehta,”  A Survey on Mining Algorithms”, International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-2, Issue-6, January 2013.

13.     Pea-Lei Tu Jen- Yao Chung,” A New Decision-Tree Classification Algorithm for Machine Learning”, Proc. of the 1992 IEEE Int. Conf. on Tools with AI Arlington, VA, Nov. 1992.

14.     Rodrigo Coelho Barros, M´arcio Porto Basgalupp, Andr´e C. P. L. F. de Carvalho, and Alex A. Freitas,” A Survey of Evolutionary Algorithms for Decision-Tree Induction”, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS.

15.     Raj Kumar,Dr. Rajesh verma,” Classification Algorithms for Data Mining: A Survey”, International Journal of Innovations in Engineering and Technology (IJIET).

16.     Liu Peng, Lei Lei,” A Review of Missing Data Treatment Methods”, Department of Information Systems, Shanghai University of Finance and Economics, Shanghai, 200433, P.R. China.

17.     B.N. Lakshmi,G.H. ,G.H. Raghunandhan,” A Conceptual Overview of Data Mining”, Proceedings of the National Conference on Innovations in Emerging Technology-2011 Kongu Engineering College, Perundurai, Erode, Tamilnadu, India.17 & 18 February, 2011.pp.27-32.

18.     Chowdhury Farhan Ahmed ,Syed Khairuzzaman Tanbeer ,Byeong-Soo Jeong andYoung-Koo Lee,” HUC-Prune: an efficient candidate pruning technique to mine high utility patterns”, Springer Science+Business Media, LLC 2009.

19.     Yongjian Fu,”Data Mining: Tasks, Techniques and Applications”, Depertment of Computer Science University of Missouri –Rolla.

20.     Kalyani M Raval,” Data Mining Techniques” ,  International Journal of Advanced Research in Computer Science and Software Engineering, October 2012.

21.     Salvatore Ruggieri,”Efficient C4.5”, Dipartimento di Informatica, University a di Pisa Corso Italia 40, 56125 Pisa Italy.

22.     Wei Peng, Juhua Chen and Haiping Zhou,” An Implementation of ID3 - Decision Tree Learning Algorithm”, University of New South Wales, School of Computer Science & Engineering,Sydney, NSW 2032, Australia.

8-11

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Sameer Duggal, Gagan Deep Aul

Paper Title:

Review on Effect of Electric Permittivity and Magnetic Permeability over Microwave Absorbing Materials at Low Frequencies

Abstract:   The dielectric properties of any material is the most important parameters to judge its microwave absorptive properties. This paper reviews the sufficient conditions for absorption of electromagnetic waves by a material by taking electric permittivity and magnetic permeability of materials into consideration. At the end of this paper the electric permittivity and magnetic permeability of different materials having single layer (composite structures) and multilayer structure is compared to see the effect of electric permittivity and magnetic permeability.

Keywords:
 Real permittivity, imaginary permittivity, real permeability, Imaginary permeability, dielectric losses, impedance matching.


References:

1.        Hong-Mei Xiao, X.-M. L.-Y. (2006). Synthesis, magnetic and microwave absorbing properties of core-shell structure MnFe2O3/TiO2 nanocomposites. Elsevier .
2.        Gagulin, V. P. (2000). Microwave Absorbing Materials. ghg. (2014). hgy , 7-9.

3.        Wei-ping Li, L.-q. Z.-c. (2011). Microwave absorption properties of fabric coated absorbing materials using modified carbonyl iron powder. Elsevier

4.        Brosseau, F. Q. (2012). A review and analysis of microwave absorption in polymer composite filled with carbonaceous particles. Journal of Applied Physics .

5.        K.H. Wu, T. T. (2007). Electromagnetic and microwave absorbing properties of Ni0.5Zn0.5Fe2/bamboo charcoal core-shell nanocomposites. Elsevier .

6.        Zhanhu Guo, S. P. (2007). Magnetic and Electromagnetic Evaluation of the iron nanoparticles filled polyurethane. Journal of Applied Physics .

7.        Baoshan Zhang, Y. F. (2006). Microwave-Absorbing Properties of DE-Aggregated Flake-Shaped Crbonyl-Iron particles composite at 2-18 GHz. IEEE .

8.        M.N Afsar, A. S. (2009). Microwave Permittivity and Permiability Properties and Microwave Reflection of Micro/Nano Ferrite Powder. IEEE .

9.        Xinwei Ji, M. L. (2013). Electromagnetic Wave Absorption Properties of Coating with Carbonyl-iron Particles coated by Silicon dioxide Nano-Powder. World Science Publisher .

10.     Yuping Duan, G. L. (2009). Magnetic Properties of Carbonyl Iron and their microwave absorbing characterization as filler in silicone rubber. Springer .

11.     Yongquing Yang, J. W. (2014). Synthesis and Characterization of a Microwave Absorbing Material Based on Magnetoplumbite ferrite and graphite nanosheet. Elsevier .

12.     E. Baharudin, A. I. (2013). Determination of Pulverized Material Permittivity for Microwave Absorber Application. IEEE .


12-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Vikas Mittal

Paper Title:

Enhanced Two Dimensional Circular Encryption Algorithm

Abstract:   In recent years, many multimedia and image encryption techniques based on chaotic maps have been proposed. Recently, a new signal security system called TDCEA (two-dimensional circulation encryption algorithm) was proposed for real-time multimedia data transmission. There exist some essential security defects in TDCEA. This paper gives an analysis on the security of TDCEA and proposed enhanced encryption algorithm. Proposed encryption scheme is based on two digital chaotic maps, which in turn are used to generate two different chaotic sequences. Detail description of the security analysis of TDCEA, proposed encryption technique and performance analysis of enhanced encryption algorithm on various parameters of security is given in later sections of this paper.

Keywords:
 Multimedia, Encryption, Decryption, Two Dimensional Circular Encryption Algorithm (TDCEA), Piecewise Linear Chaotic Map (PWLCM), Enhanced Two Dimensional Circular Encryption Algorithm (Enhanced TDCEA).


References:

1.        H. C. Chen, J. I. Guo, L. C. Huang, and J. C. Yen, “Design and realization of a new signal security system for multimedia data transmission,” EURASIP Journal of Applied Signal Processing. vol. 2003, no. 13, pp. 1291–1305, 2003.
2.        N.K. Pareek, Vinod Patidar, “Image encryption using chaotic logistic map”, Image and Vision Computing 24 (2006) 926–934.

3.        J. C. Yen and J. I. Guo, “Design of a new signal security system,” in Proc. IEEE International Symposium on Circuits and Systems (ISCAS ’02), vol. 4, pp. 121–124, Scottsdale, Ariz, USA, May 2002.

4.        J. C. Yen and J. I. Guo, “A new image encryption algorithm and its VLSI architecture,” In Proceedings IEEE Workshop on Signal Processing Systems (SiPS ’99), pages.  430–437, Taipei, Taiwan, October 1999.

5.        K. L. Chung and L. C. Chang, “Large encrypting binary images with Higher security,” Pattern Recognition Letters, vol. 19, no. 5-6, pages 461–468, 1998.

6.        N. Bourbakis and C. Alexopoulos, “Picture data encryption using scan patterns,” Pattern Recognition, vol. 25, no. 6, pp. 567–581, 1992.

7.        C. Alexopoulos, N. Bourbakis, and N. Ioannou, “Image encryption method using a class of fractals,” J. of Electronic Imaging, vol. 4, no. 3, pp. 251–259, 1995. Australia, December 2000.

8.        Li Shujun, “Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems,” IJBC, vol. 16, no. 8, pages 2129-2151, 2006.

9.        Coppersmith, D. “The Data Encryption Standard and Its Strength Against Attacks.” IBM journal Of Research and Development, May 1994.

10.     Rivest, R.; Shamir, A.; and Adleman, L. “A Method for Obtaining Digital Signatures and Public Key Cryptosystems.” Communications of ACM, February 1978.

11.     Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard. "Dr. Dobb's Journal, March 2001.

12.     William Stallings, “ Cryptography and Network Security, Principles and Practices”, third edition.


20-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Arkan R. Ridha, Wasan Z. Majeed, Ali D. Salloum

Paper Title:

Effects of Occupation Numbers on Charge Density Distributions, Elastic Form Factors, and Root-Mean Square Radii for Some Nuclei in 1s-1p Shell

Abstract:   The effects of occupation numbers on the ground state charge density distributions, elastic form factors and root mean square (RMS) radii are investigated for 4He, 12C, and 16O nuclei in 1s-1p shell using single-particle radial wave functions of harmonic-oscillators (HO) potential. For such potential, two HO size parameters are used one for neutron ( ) and the other for proton ( ). For the calculated charge density distributions, the results showed good agreement with experimental data except the fail to produce the hump in the central region for 12C and 16O nuclei. For elastic charge form factors the results in general, showed excellent agreement to predict the positions of diffraction minima. The match of calculated charge form factor for 12C with experimental data was excellent at all q range, but for 4He and 16O it was obtained an underestimation at high q values. Finally, the calculated RMS charge radii in general, showed an overestimation comparing with those of experimental data, while those of matter showed excellent agreement with experiment.

Keywords:
 Stable Nuclei, Shell Model, Charge Density Distribution, Elastic Charge Form Factor, RMS Charge, Neutron, And Matter Radii.


References:

1.       A. Bohr and B. R. Mottelson, Nuclear Structure. vol.1, Singapore: World Scientific, 1969, ch. 2.
2.       I. Tanihata, "Neutron halo nuclei," Journal of Physics G, Vol. 22, pp. 157-198. 1996.

3.       C. J. Batty, E. Friedman, H. J. Gils, and H. Rebel, "Experimental methods for studying nuclear density distributions," Advances in Nuclear Physics, Vol. 19, pp. 1-188, 1989.

4.       R. Hofstadter, "Electron Scattering and Nuclear Structure," Reviews of Modern Physics, Vol. 28, pp. 214-254, 1956.

5.       T.W.  Donnelly and I. Sick, "Elastic magnetic electron scattering from nuclei, " Reviews of Modern Physics, Vol. 56, pp. 461-566, 1984.

6.       A. H. Wapstra, G. Audi, and R. Hoekstra, "Atomic masses from (mainly) experimental data, " Atomic Data and Nuclear Data Tables, Vol. 39, pp. 281-287, 1988.

7.       E. Caurier, G. Martinez-Pinedo, F. Nowacki, A. Poves, and A. P. Zuker, "The shell model as a unified view of nuclear structure, " Reviews of Modorn Physics, Vol.  77, pp. 427-488, 2005.

8.       W. C. Haxton and C.-L. Song,  “Morphing the Shell Model into an Effective Theory," Physical Review Letters, Vol. 84, pp. 5484-5487, 2000.

9.       D. Vautherin  and D. Brink, "Hartree-Fock Calculations with Skyrme's Interaction. I. Spherical Nuclei," Physical Review C, Vol. 5, pp. 626-.647, 1972.

10.     V. A.  Khodel and E. E. Saperstein, "Finite Fermi systems theory and self-consistency relations," Physics Reports, Vol. 92, pp. 183-337, 1982.

11.     P. King and P. Schuck, The nuclear many-body problem. New York: Springer-Verlag, 1980, ch. 5.

12.     A. N. Antonon, P. E. Hodgson, and I. Zh. Petkov, Nucleon momentum and density distributions in nuclei. Oxford: Oxford university press,, 1988, ch. 4.

13.     Y. Chu, Z. Ren, T. Dong, and Z. Wang, "Theoretical study of nuclear charge densities with elastic electron scattering," Physical Review C, Vol. 79 (044313), pp. 1-7, 2009.

14.     B. A. Brown, R. Radhi, and B. H. Wildenthal, "Electric quadrupole and hexadecupole nuclear excitations from the perspectives of electron scattering and modern shell-model theory," Physics Reports. Vol. 101, pp. 313-358, 1983.

15.     R. A. Radhi, Calculations of elastic and inelastic electron scattering in light nuclei with shell-model wave functions. Ph.D.Thesis. Department of Physics,       Michigan State University, USA. p.11, 1983.

16.     P. J. Brussard, and P. W. M. Glademans, Shell model Applications in Nuclear Spectroscopy. Amsterdam: North-Holland Publishing Company, 1977, appendix A.

17.     L. R. B. Elton, Nuclear Sizes.  London: Oxford University Press, 1961, ch. 2.

18.     H. De Vries, C. W. De Jager, and C. De Vries, "Nuclear charge-density-distribution parameters from elastic electron scattering,” Atomic Data and Nuclear Data Tables. Vol. 36, pp. 495-536, 1987.

19.     A. Ozawa, T. Suzuki, and I. Tanihata, "Nuclear size and related topics," Nuclear Physics A, Vol. 693, pp. 32-62. 2001

20.     R. Frosch, "Shell model analysis of elastic e−-4He scattering," Physics Letters B, Vol. 37, pp. 140-142, 1971.

21.     R. G. Arnold, B. T. Chertok, S. Rock, W. P. Schütz, Z. M. Szalata, D. Day, J. S. McCarthy, F. Martin, B. A. Mecking, I. Sick, and G. Tamas,  "Elastic Electron Scattering from He3 and He4 at High Momentum Transfer," Physical Review Letters, Vol. 40, pp. 1429- 1432, 1978.

22.     I. Sick and J. S. McCarthy, "Elastic electron scattering from 12C and 16O," Nuclear Physics A, Vol. 150, pp. 631-654, 1970.


24-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Vaibhav Muddebihalkar, R.M.Goudar

Paper Title:

Remote Data Access for Control of TCP/IP Network using Android Mobile Device with Fast Transfer of Images

Abstract:   In today’s world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as to create application that controls the desktop nodes in the network with help of client server architecture. This paper purpose x The application connects the system node by server and server connects to android mobile which will easy to control network from any mobile place. The application having functionality to capture a screenshot of client node to know the state of system which will have to capture picture and send over network which will required some time. By adding compression technique for image as screenshot which helps to send faster over the network. This all implemented using JAVA and servlets which also increase performance.

Keywords:
 Android, Remote control, JAVA- Servlets, image compression.


References:

1.       Remote Control of Mobile Devices in  Android Platform , Angel Gonzalez Villan, and Josep Jorba Esteve, , IEEE 2012
2.       PocketDroid - A PC Remote Control Chaitali Navasare, Deepa Nagdev and Jai Shree, IPCSIT vol. 37 (2012
3.       Design and Application of Remote Control System Using Mobile Phone with JNI Interface Lingyan Bi1, Weining Wang1, Haobin Zhong1,Wenxuan Liu ,International Conference on Embedded Software and Systems Symposia (ICESS2008)

4.       VNC ARCHITECTURE BASED REMOTE DESKTOP ACCESS THROUGH ANDROID MOBILE PHONES Archana Jadhav , International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2012

5.       Adam, Skurski, Bartlomiej Swiercz, "VNC- based Remote Control for Symbian OS smartphones", MIXDES (Mixed Design of Integrated Circuits and Systems) 2009, June 25-27, 2009

6.       A Review of Image Compression and Comparison of its Algorithms Sachin Dhawan , IJECT Vol. 2, Issue 1, March 2011.

7.       www.jpeg.org

8.       GPRS Based Intranet Remote Administration GIRA ,Shashi Kumar N.R. ,R Selvarani ,Pushpavathi T.P. , JRI, Volume 1 Issue 1 December 2008.


31-34

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Ravindra S. Thube

Paper Title:

Effect of Tool Pin Profile and Welding Parameters on Friction Stir Processing Zone, Tensile Properties and Micro-hardness of AA5083 Joints Produced by Friction Stir Welding

Abstract:   AA5083 aluminium alloy has gathered wide acceptance in the fabrication of light weight structures requiring a high strength to weight ratio. Compared to the fusion welding processes that are routinely used for joining structural aluminium alloys, friction stir welding (FSW) process is an emerging solid state joining process in which the material that is being welded does not melt and recast. This process uses a non-consumable tool to generate frictional heat in the abutting surfaces. The welding parameters and tool pin profile play major roles in deciding the weld quality. In this investigation, an attempt has been made to understand the effect of tool speed (rpm) and tool pin profile on Friction Stir Processing (FSP) zone formation in AA5083 aluminium alloy. Friction stir welding between 5083 aluminium alloy plates with a thickness of 2.5 mm was performed. Five different tool pin profiles (straight cylindrical, tapered cylindrical, triangular, square and cone) have been used to fabricate the joints at three different rotational speeds i.e. 900, 1400 and 1800 rpm under a constant traverse speed of 16 mm/min. The formation of FSP zone has been analysed macroscopically. Tensile properties of the joints have been evaluated and correlated with the FSP zone formation. From this investigation it has been found that the tool pin profiled designs had little effect on heat input and tensile properties, weld properties were dominated by thermal input rather than the mechanical deformation by the tool for the plate thickness of 2.5 mm. straight cylindrical pin profiled tool produces mechanically sound and metallurgically defect free welds compared to other tool pin profiles.

Keywords:
 AA5083 aluminium alloy, friction stir welding, macrostructure, micro-hardness, tensile properties, tool pin profile


References:

1.       W.M. Thomas, E.D. Nicholas, J.C. Needam, M.G. Murch, P. Templesmith, C.J. Dawes, GB Patent Application No. 9125978.8, December 1991 and US Patent No. 5460317, October 1995.
2.       G. Bussu, P.E. Irving, The role of residual stress and heat affected zone properties on fatigue crack propagation in friction stir welded 2024-T351 aluminium joints, Int. J. Fatigue 25 (2003) 77–88.

3.       R. John, K.V. Jata, K. Sadananda, Residual stress effects on near threshold fatigue crack growth in friction stir welded aerospace alloys, Int. J. Fatigue 25 (2003) 939–948.

4.       K.V. Jata, K.K. Sankaran, J. Ruschau, Friction stir welding effects on microstructure and fatigue of aluminum alloy 7050-T7451, Metall. Mater. Trans. 31A (2000) 2181–2192.

5.       M. Guerra, C. Schmidt, J.C. McClure, L.E. Murr, A.C. Nunes, Flow patterns during friction stir welding, Mater. Char. 49 (2003) 95– 101.

6.       P. Ulysse, Three-dimensional modeling of the friction stir welding process, Int. J. Mach. Tools Manuf. 42 (2002) 1549–1557.

7.       M. Grujicic, G. Arakere, H.V. Yalavarthy, T. He, C.-F. Yen, and B.A. Cheeseman, Modeling of AA5083 Material Microstructure Evolution During Butt Friction-Stir Welding, Journal of Materials Engineering and Performance, Volume 19(5) July 2010 672-684

8.       Y.S. Sato, M. Urata, H. Kokawa, K. Ikeda, Hall–Petch relationship in friction stir welds of equal channel angular-pressed aluminium alloys, Mater. Sci. Eng. A354
(2003) 298–305.

9.       P.B. Berbon, W.H. Bingel, R.S. Mishra, C.C. Bampton, M.W. Mahoney, Friction stir processing: a tool to homogenize nanocomposites aluminium alloys, Scripta Mater. 44 (2001) 61–66.

10.     W.B. Lee, Y.M. Yeon, S.B. Jung, The improvement of mechanical properties of friction stir welded A356 Al alloy, Mater. Sci. Eng. A355 (2003) 154–159.

11.     Y.S. Sato, S.H.C. Park, H. Kokawa, Metall. Mater. Trans. A 32 (2001) 3023.


35-40

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Richa Sharma, Sachin Sharma, Nitin Pundir

Paper Title:

Windowed Independent Update Algorithm for ODCT-I

Abstract:   Data Compression is the process to eliminate redundancy between the neighboring pixel. To do this DCT is much more efficient. In this paper, an algorithm has been developed for DCT-V or ODCT-I using rectangular window. These updated DCT coefficient are independent of the Odd DST coefficient.

Keywords:
 DCT,DST,EDCT,ODCT


References:

1.       B. G. Sherlock, Y. P. Kakad, A. Shukla, “Rapid update of odd DCT and DST for real-time signal processing, IEEE Trans. Proc. of SPIE Vol. 5809 471.
2.       P. Yip and K. R. Rao, “On the Shift Property of DCT’s and DST’s”, IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-35, No.3, March 1987, pp. 404-406.

3.       Le-Nan Wu, “Comments on ‘On the Shift Property of DCT’s and DST’s”, IEEE Transactions on Acoustics, Speech, and Signal Processing, Vol. ASSP-38, No. 1, January 1990, pp. 186-188.

4.       B.G. Sherlock and Y.P Kakad, “Windowed Discrete Cosine and Sine Transforms for Shifting Data”, submitted to Signal Processing, March 2000.

5.       V. Britanak, P. C. Yip, K. R. Rao, "Discrete Cosine and Sine Transforms: General Properties, Fast Algorithms and Integer Approximations", Academic Press 2006.

6.       Syed Ali Khayam, The Discrete Cosine Transform: Theory and Application, March 10th 2003, ECE 802 –602: Information Theory and Coding.

7.       J.F.Blinn, “What is deal with DCT,” IEEE Computer Graphics and Application, Vol-13,March 1993, issue: 4,pp:78-83\
8.       H.Kwakernaak, R Sivan, Modern Signals and Systems, Prentice-Hall, Englewood Cliffs, NJ, 1991.

41-45

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Chukwuma G.J. Nmegbu, Jossy Spiff

Paper Title:

Chemical Flocculation of Microorganisms in the Reservoir During Meor

Abstract:   Clogging of the pores of a porous medium can be caused chemically by formation of a precipitate, physically by entrainment of suspended particles or biologically by the formation of biomass by microbes. All these mechanisms are potentially relevant to enhanced oil recovery. This paper investigates the level of flocculating activity in a Berea core sample dosed with Bacillus and Pseudomonas species, Nutrient agar and Salt diluent. Three of such samples were prepared and incubated for 12, 24 and 48hours. From scan pictures of the core, slimy substances were seen suggesting the production of biofilms, crystalline substances were observed inferring the production of biopolymers by the microorganisms and colloids observed, proving the production of biosurfactants. Heat was also generated during the process and the basic characteristics of the crude oil changed as seen in the flow of the crude oil. Thus, the chemical flocculation of these microorganisms in the reservoir aids in the recovery of substantial amounts of crude oil.

Keywords:
 Bioflocculants, Chemical flocculation, MEOR, Microbial Flocculation.


References:

1.        D. Momeni and T. Yen, “Introduction to Microbial Enhanced Oil Recovery”, Principles and Practice, CRC Press, Boca Raton, Florida, 1990
2.        C. Yokoi, F.L. Toledo, J. Gonzalez and C. Calvo, “Production of bioemulsifiers by Bacillus subtilis, alcaligenes faeculis and enterobacter species in liquid culture”, Biores Technol, vol.  99, 1996, pp. 8470-8475

3.        R.E. Bachanan and N.E. Gibbons, “Bergeys Manual of Determinative Bacteriology”, 9th Edition, The Williams and Williams company, Baltimore, 1994, pp. 39-596

4.        J.S. Kumar, S. Joshi, Y. Bharucha, A. Nerukar and A.J. Desai, “Biosurfactant production using molasses and why under thermophilic conditions, Biores Tech, vol. 99, 2004, pp.195-199

5.        J.D. Desai, and I.M. Banat, “Microbial production of surfactants and their commercial potential”, Microbial, vol 61, 1997, pp. 47 – 64

6.        F.C. Koizumi, M.C. Finald and J.G. Holt, “The shorter Bengegs Manual of Determination of Bacteriology”, Baltimore, Vol. 2, 1991

7.        S.H. Tokeda and S.A. Kuran, “Extracellular biopolymeric flocculants”, Recent trends and Biotechnology importance, Biotechnology Adv., Vol. 19, No. 5, 1991, pp.371-385

8.        P.L. Busch and W. Stumn, “Chemical Interactions in the Aggregation of bacteria bioflocculation in waste treatment”, Division of Engineering and Applied Physics, Harvard University, Cambridge, 1968

9.        R.H. Lee, E. Jamshidi, A. Mazahari and H. Bonakdarpour, “Isolation and Production of Biosurfactant from pseudomonas aeruginosa isolated from Iranian Southern oil wells”, Environ Sci Tech, vol. 2, 1995, pp.121-127

10.     M.W. Tenney and W.  Stumn, “Chemical flocculation of microorganisms in Biological Waste Treatment”, Journal of Water Pollution Control Fed., vol. 37, 1965, pp.1370 – 1388

11.     W. Slili, S. Mei, L. Wei, L. Guanzhi and H. Peihui, “Laboratory study on MEOR after polymer flooding”, 2001

12.     J.L. Takeda and L.M. Kurane, “The field pilot of MEOR in a high temperature reservoir”, Pet. Sci. Eng, vol. 48, 1999, pp.265-271

13.     J.I. Ofume, “Bacteriological Examination of clinical specimens”, Achua Publications, Ama J.K. Recreation Park, Owerri, Nigeria, 1991

46-49

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

S. B. Kulkarni, Kirthishree C. Katti, Arun A. Kumbi, R. B. Kulkarni, Vinita K. Tapaskar

Paper Title:

Analysis of Iris Image Segmentation in a Color Space Model

Abstract:   The paper presents the iris localization using circular Hough transform. Circular Hough transform localized the inner and outer boundaries of the iris.The software of the application is based on detecting the circles surrounding the exterior iris pattern from a set of images in different spaces. The iris segmentation system is based on the combination of the canny edge detection method, adaptive histogram Equalization method, circular Hough Transform and Euclidean Distance formula methods. The main part of Iris recognition is the segmentation of iris part of the eye. The performance of the segmentation is analyzed using UBIRIS, IITD, PALACKY, MMU database with adaptive parameters.

Keywords:
 Segmentation, Canny Edge Detection, Adaptive Histogram Equalization, Circular Hough Transform and Euclidean Distance Formula.


References:

1.        R. Bolle and S. Pankanti, eds, A. Jain, ‘’Biometrics:      Personal Identification in a Networked Society’’, Kluwer, 1999
2.        Rajesh. Bodade and Dr. S. Talbar, “Dynamic Iris Localization: A Novel Approach suitable for Fake Iris Detection”, IEEE Conferences, 9781-4244-3941-6/09.

3.        Jain, A., Pankanti, S., Prabhakar, S., Hong, L., Ross, A.: Biometrics: A grand challenge. In: Proceedings of the 17th International Conference on Pattern Recognition (ICPR). vol. 2, pp. 935{942. IEEE (2004).

4.        J. Daugman, "High confidence visual recognition of persons by a test of statistical independence", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, 1993, pp. 1148-1161.

5.        Rajesh Bodade and Sanjay Talba, ‘'Novel approach of accurate iris localization form high resolution eye images suitable for fake iris detection’’, International Journal of Information Technology and Knowledge Management, Volume 3, No. 2, pp. 685-690, July-December 2010.

6.        J. Daugman, “How iris recognition works”, IEEE Transactions on Circuits and Systems for Video Technology, vol. 14, pp. 21–30,January 2004.

7.        R. Wildes, “Iris Recognition: An Emerging Biometric Technology”, Proc. IEEE, vol. 85, pp. 1348-1363, 1997.

8.        J. Daugman, "High confidence visual recognition of persons by a test of statistical independence", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, 1993, pp. 1148-1161.

9.        E. Krichen, "Reconnaissance des personnesparl iris enmode dégradé", PhD thesis, Evry-Val Essonne University, 2007.

10.     R. P. Wildes, " Iris recognition: An emerging biometric technology ", Proceedings of the IEEE, Vol. 85, No. 9, 1997, pp. 1348-1363.

11.     L. Masek, "Recognition of human iris patterns for biometric identification", B.S. thesis, The School of Computer Science and Software Engineering, The University of Western Australia, Crawley WA, Perth, Australia, 2003.

12.     S. V. Dhavale, "Robust Iris Recognition Based on Statistical Properties of Walsh Hadamard Transform Domain", IJCSI International Journal of Computer Science
Issues, Vol. 9, No 2, 2012.

13.     M. Mahlouji and A. Noruzi, "Human Iris Segmentation for Iris Recognition in Unconstrained Environments", IJCSI International Journal of Computer Science Issues, Vol. 9, No 3, 2012.

14.     S. Nithyanandam, K. S. Gayathri, P. L. K. Priyadarsini, "A New IRIS Normalization Process For Recognition System with Cryptographic Techniques", IJCSI International Journal of Computer Science Issues, Vol. 8, No 4, 2011.

15.     X. Liu, K. W. Bowyer, and P. J. Flynn, "Experiments with an improved iris segmentation algorithm", in Proc. of IEEE 4th Workshop on Autom. Identification and Advanced Technologies, 2005, pp. 118–123.

16.     Q. Tian, Q. Pan, Y. Cheng, and Q. Gao, "Fast algorithm and application of Hough transform in iris segmentation" in 3rd Int. Conf. Mach. Learn. Cybern 2004, vol. 7, pp.3977–3980.

17.     C. L. Fancourt, L. Bogoni, K. J. Hanna, Y. Guo, R. P.Wildes, N. Takahashi, and U. Jain, "Iris recognition at a distance", in Int. Conf. AVBPA, 2005, pp. 1–13.

18.     M. Elsayed, M. Mansour, H. Saad, "Non cooperative Iris Segmentation", IJCSI International Journal of Computer Science Issues, Vol. 9, No 1, 2012.

19.     E. Sung, X. Chen, J. Zhu, and J. Yang, "Towards non cooperative iris recognition systems", in Proc. of 7th ICARCV, 2002, vol. 2, pp. 990–995.

20.     K. Miyazawa, K. Ito, T. Aoki, K. Kobayashi and H. Nakajima, "An effective approach for iris recognition using phase-based image matching", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 30, No. 10,2008, pp. 1741-1756.

21.     J. Zuo, N.K. Ratha and J.H. Connell. "A new approach for iris segmentation", in IEEE Computer Society Conf. on Computer Vision and Pattern Recognition Workshops (CVPRW'08) 2008.

22.     W. Ryan, D. Woodard, A. Duchowski, and S. Birchfield" Adapting starburst for elliptical iris segmentation", in Conf. BTAS, 2008, pp. 1–7.

23.     T. A. Camus and R. P.Wildes, "Reliable and fast eye finding in close up images", IEEE 16th Int. Conf. on Pattern Recognition, 2004, pp. 389-394.

24.     H. Ghodrati, M. J. Dehghani, M. S. Helfroush, "Localization of Noncircular Iris Boundaries Using Morphology and Arched Hough Transform", 2ndInternational Conference Image Processing Theory Tools and Applications (IPTA), 2010; pp. 458-463.

25.     J. De Mira, Jr. and J. Mayer, "Image feature extraction for application of biometric identification of iris – A morphological approach", in 16th Proc. Symp. Comput. Graph. Image Process, 2003, pp. 391–398.

26.     Y. Zhu, T. Tan, Y. Wang, "Biometrics personal identification based on iris pattern", in 15th Int. Conf. on pattern recognition, 2000, Vol. 2, pp.801-804.

27.     W. Q. Yuan, L. Xu, Z.H. Lin, "Iris localization algorithm based on gray distribution features of eye images", Journal of Optoelectronics-Laser, Vol. 17, No, 2, 2006,
pp.226-230.

28.     W. Q. Yuan, J. F. Ma, W. B. Di, "A new method of iris location based on the active contour", Journal Computer Engineering and Application, Vol. 40, No. 34, 2003, pp.104-107.

29.     J. Zuo, A. Natalia, "On a methodology for robust segmentation of non-ideal iris images", IEEE Trans. Syst.Man Cybern. B, Vol. 40, No. 3, 2010, pp. 703–718.

30.     J. Daugman, "New methods in iris recognition", IEEE Trans. Syst., Man, Cybern. B, Cybern. Vol. 37, No. 5, 2007, pp. 1167–1175.

31.     J. Daugman, "Probing the uniqueness and randomness of iris codes: Results from 200 billion iris pair comparisons", Proc. IEEE, Vol. 94, No. 11, 2006, pp. 1927–1935.

32.     X liu, "Optimizations in Iris Recognition", PhD thesis, University of Notre Dame, 2006.

33.     X. Zhang, Z. Sun, T. Tan, “Texture removal for adaptive level set based iris segmentation”, Proceedings of IEEE 17th International Conference on Image Processing, 2010.

34.     R. Chen, X. Lin, T. Ding, J. Ma, "Accurate iris segmentation Applied to Portable Image Capture Device", International Workshop on Imaging Systems and Techniques, 2009, pp. 80-84.

35.     S. Shah, A. Ross, "Iris Segmentation Using Geodesic Active Contours" IEEE Transactions on Information Forensics and Security (TIFS), Vol. 4, No. 4, 2009, pp.824-836.

36.     M. Vatsa, R. Singh, A. Noore, "Improving Iris Recognition Performance Using Segmentation, Quality Enhancement, Match Score Fusion, and Indexing", IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, Vol. 38, 2008, pp.1021 -1035.

37.     Sergei Azernikov. Sweeping solids on manifolds. In Symposium on Solid and Physical Modeling, pages 249–255, 2008.

38.     John Canny. A computational approach to edge detection. Pattern Analysis and Machine Intelligence, IEEE Transactions on, PAMI-8(6):679–698, Nov. 1986.

39.     “Adaptive Histogram Equalization and Its Variations” by S.M. Pizer, E.P. Amburn, J.D. Austin, R.Cromartie, A.Geselowitz, T.Greer, B.M.terHaar, Romeny, J.B. Zimmerman, K.J. Zuiderveld.

40.     www.cs.utah.edu/~sujin/courses/reports/cs6640/project2/ahe.html

41.     Canny Edge Detection Implementation on TMS320C64x/64x+ Using VLIB by Y Senthil Kumar Nov 2009


50-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Piyush Pant, Navneet K Pandey, S. Rajesha, Gaurav Jain

Paper Title:

Experimental Study of Surface Roughness in Wedm Process and Ann Modelling

Abstract:   Surface roughness is an effective parameter in representing the quality of machined surface and is one of the most common performance measurements in machining process. This paper reports the effect and optimization of pulse-on time, gap voltage, wire feed rate on surface roughness in wire electrical discharge machining (WEDM) process for die steel D3 using L27 orthogonal array. Signal-to noise (S/N) ratio and ANOVA are used as statistical analyses to achieve optimum levels and to study the population distribution of the response characteristic respectively. It has been found that pulse on-time is the most significant factor affecting the surface roughness. The experimental data is later used to model the surface roughness using artificial neural network.

Keywords:
 Surface roughness, Taguchi, Wire cut electrical discharge machining, Die steel Artificial neural networks.


References:

1.       Nalbant, M., G okkaya, H., Sur, G., 2007. Application of Taguchi method in the optimization of cutting parameters for surface roughness in turning. Mater. Des. 28, 1379–1385.
2.       Ozc¸ elik, B., Oktem, H., Kurtaran, H., 2005. Optimum surface roughness in end milling Inconel 718 by coupling neural network model and genetic algorithm. Int. J. Adv. Manuf. Technol. 27, 234–241.

3.       B. B. Pradhan, M. Masanta, B. R. Sarkar, B. Bhattacharyya, “Investigation of electro-discharge micro-machining of titanium super alloy” , The International Journal of Advanced Manufacturing Technology April 2009, Volume 41, Issue 11-12, pp 1094-1106.

4.       Poros,  D. and Zaborski “Semi-empirical  model  of  efficiency  of  wire electrical Discharge machining of hard-to-machine materials”,  Journal of materials processing technology”, 209, 1247–1253, 2009.

5.       Jun Qu, Albert J. Shih, Ron O. Scattergood, and Samuel B. McSpadden “Cylindrical Wire Electrical Discharge Machining Process Development” Journal of Mechanical Processing Technology, Vol. 28, pp. 127-138, 2006.

6.       Sarkar, S., Mitra, S., Bhattacharyya,  B., “Parametric analysis and optimization of wire electrical discharge machining of γ-titanium aluminide alloy”, Journal of Materials Processing Technology, 159, 286–294, 2005.

7.       Kanlayasiri K., Boonmung S. , “An investigation on effects of wire-EDM machining parameters on surface roughness of newly developed DC53 die steel”, Journal of Materials Processing Technology, 187–188, 26–29.

8.       Deepak Kumar Panda, Rajat Kumar Bhoi, ”Artificial Neural Network Prediction of Material Removal Rate in Electro Discharge Machining” , Materials and Manufacturing Processes 2005, 20: 4, 645 — 672.

9.       M K Pradhan, R Das, and C K Biswas, “Comparisons of neural network models on surface roughness in electrical discharge machining”, J. Engineering Manufacture (2009), Vol. 223, Part B, 801-808.

10.     A.Thillaivanan, P. Asokan, K.N.Srinivasan, R.Saravanan, “Optimization of operating parameters for EDM process based on the Taguchi Method and Artificial Neural Network”, International Journal of Engineering Science and Technology, 2010, Vol. 2(12), 6880-6888.

11.     G. Krishna Mohana Rao and D. Hanumantha Rao, “Hybrid modeling and optimization of hardness of surface produced by electric discharge machining using artificial neural networks and genetic algorithm”, Asian Research Publishing Network (ARPN), 2010, Vol. 5, No. 5, 72-81.

12.     S. Di, X. Chu, D. Wei, Z. Wang, G. Chi and Y. Liu, Analysis of kerf width in micro-WEDM,  International Journal of Machine Tools & Manufacture, 49 (2009) 788-792.

13.     M. D. Gokler and A. M. Ozanozgu, Experimental investigation of effects of cutting parameters on surface roughness in the WEDM process, International Journal of Machine Tools & Manufacture, 40 (2000) 1831-1848.

14.     Ho, K.H., Newman, S.T., Rahimifard, S., Allen, R.D. (2004), “State of art in wire electrical discharge machining (WEDM)”, International Journal of Machine Tools and Manufacture, 44, 1247-1259.

15.     Ozdemir, N. and Ozek, C.  (2006), “An investigation on machinability of nodular cast iron by WEDM”, International Journal of Advanced Manufacturing Technology, 28, 869–872.

16.     Kuriakose, S., Shunmugam, M.S. (2005), “Multi-objective optimization of wire electro discharge machining process by non-dominated sorting genetic algorithm”, Journal of Materials Processing Technology, 170,133-141.

17.     Chiang, K.T., Chang, F.P. (2006), “Optimization of the WEDM process of particle reinforced material with multiple performance characteristics using grey relational analysis”, Journal of Materials Processing Technology, 180, 96-101.

18.     Adeel Ikram, Nadeem Ahmad Mufti, Muhammad Qaiser Saleem, Ahmed Raza Khan, “Parametric optimization for surface roughness, kerf and MRR in wire electrical discharge machining (WEDM) using Taguchi design of experiment”, Journal of Mechanical Science and Technology 27 (7) (2013) 2133~2141.

19.     Hari Singh and Rohit Garg (2010), “Effect of process parameters on surface roughness and dimensional accuracy in wire cut electro discharge machining", Journal of Machining and Forming Technologies.

20.     Ho, K.H., Newman, S.T., Rahimifard, S., Allen, R.D. (2004), “State of art in wire electrical discharge machining (WEDM)”, International Journal of Machine Tools and Manufacture, 44, 1247-1259.

21.     Holman, J.P. (1971), “Experimental methods for engineers (second ed.)”, McGraw Hill Inc., Tokyo.

22.     Parmeswara, C.V.S. and Sarcar, M.M.M. (2009), “Evaluation of optimal parameters for machining brass with wire cut EDM”, Journal of Scientific and Industrial Research, 68, 32-35.

23.     Peace, G.S. (1993), Taguchi Methods: A hands on approach, Addison Wesley, New York.

24.     Phadke, M.S. (1986), “Design optimization case studies”, AT & T Technical Journal, March-April, 65, 51-84.

25.     Phadke, M.S. (1989), Quality engineering using robust design, Prentice-Hall, N.J., USA.

26.     Maneesh k. Yadav, Shailesh M.Pandey, Sumit Chaudhary, Qasim Murtaza, “Effects of Machining Variables on Surface Roughness in Wire EDM of AISI D3”, IJMRS’s International Journal of Engineering Sciences, Vol. 01, Issue 03, September 2012, ISSN: 2277-9698.

27.     C. Sanjay, C. Jyothi, A study of surface roughness in drilling using mathematical analysis and neural networks. Int. J. Adv. Manuf. Technol. 29 (2006) 846–852.


57-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Manoj Barnela, Suresh Kumar, Akhil Kaushik, Satvika

Paper Title:

Implementation and Performance Estimation of FIR Digital Filters using MATLAB Simulink

Abstract:   In modern communication systems, filtering is the most widespread and extremely important signal processing technology. FIR filters form the basis of wireless systems in medical devices, industrial control, consumer electronics, and cellular infrastructure. A filter network selectively changes the wave-shape of a signal in a desired approach. The most common filtering purpose is to remove the noise from the signal. The FIR filters are of finite transient duration, more stable, efficiently realisable and providing exact linear phase as compared to IIR filters .FIR filter structure can be used to realize almost any sort of frequency response digitally. FIR filters are invariably used in the situation where linear phase characteristics within the passband of the filter is required. In this paper, implementation and simulation of 1-D and 2-D FIR filters is presented in the MATLAB and Simulink environment. The comparison of the output waveforms show that 2-D FIR filter posses higher speed than  1-D FIR filter.     

Keywords:
 Digital filters, 1-D FIR filters, 2-D FIR filters, Simulink.


References:

1.       S. Salivahanan, A. Vallavaraj, Gnanapriya, Digital Signal Processing,  McGRAW-HILL/TMH, 2000.
2.       M. Eshtawie and M. B. Othman, “ An Algorithm Proposed for FIR Filter Coefficient Representation, ” International Journal of Mathematics and Computer Sciences 2008, pp 24-30. 

3.       T. Zhang ,"Research on Design FIR Digital filter using MATLAB and Window Function Method, " Journal of Theoretical and Applied Information Technology, Vol. 48 No.1, 10th February 2013.

4.       A.R.Narasimha,K. Rajasekhar, A.S.Rani, "Implementation of LOW Area and Power Efficient Architectures of Digital FIR filters," International Journal of Advance Research in Computer Science and Software Engineering", vol. 2, issue 8, august 2012.

5.       R.A. Losada , Digital Filters with MATLAB,  The Mathworks,Inc.,May 18,2008.

6.       S.Gupta, A.Panghal, "Performance Analysis of FIR Filter Design by using Rectangular, Hanning and Hamming Windows Methods, "International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 6, June 2012.

7.       Prokis John G., Manolakis Dimitris , Digital Signal Processing- Principles, Algorithms and Applications,  Pearson.

8.       L.C Loong, N.C Kyun, C.J Hui and N.K Noordin ,”Design and Developmnt of  a  Multirate  Filters in Software  Defined  Radio Environment, ”  International Journal of Engineering and Technology, Vol. 5, No. 2, 2008, pp. 74-82.


62-65

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

P. P. Badgujar, M. G. Rathi

Paper Title:

Taguchi Method Implementation in Abrasive Waterjet Machining Process Optimization

Abstract:   Abrasive waterjet machining (AWJM) is a non-conventional metal removal process as well as one of the best manufacturing processes suitable for machining on very hard material. The objective of this paper is to optimize the input parameters of AWJM, such as pressure within pumping system, abrasive material grain size, stand-off distance, nozzle speed and abrasive mass flow rate for machining SS304. The Taguchi design of experiment, the signal-to-noise ratio, and analysis of variance are employed to analyze the effect of the input parameters by adopting L27 Taguchi orthogonal array (OA). In order to achieve the minimum surface roughness (SR), five controllable factors, i.e. the parameters of each at three levels are applied for determining the optimal combination of factors and levels. The results reveal that the SR is greatly influence by the abrasive material grain size. Experimental results affirm the effectiveness of the solving the stated problem within minimum number of experiments as compared to that of full factorial design.

Keywords:
 Surface roughness, Taguchi method


References:

1.       Asif Iqbal, Naeem U Dar, Ghulam Hussain, Optimization of Abrasive Water Jet Cutting of Ductile Materials, Wuhan University of Technology and Springer-Verlag Berlin Heidelberg, 2011, pp. 88-92.
2.       Azmir, M.A., Ahsan, A.K.,  Investigation on glass/epoxy composite surfaces machined by abrasive water jet machining, journal of materials processing technology, vol. 1 9 8, 2008, pp. 122–128.

3.       Azmir, M. A. , Ahsan, A.K. , Rahmah, A, Investigation on abrasive waterjet machining of kevlar reinforced phenolic composite using Taguchi approach, Proceedings of the International Conference on Mechanical Engineering, 2007, pp. 29- 31.

4.       Hlavac, L. M., Hlavacova, I. M., Gembalova, L., Kalicinsky, J., Fabian, S., Mestanek, J., Kmec, J. and Madr, V., 2009, Experimental method for the investigation of the abrasive water jet cutting quality, Journal of Materials Processing Technology, No. 209, pp. 6190–6195.

5.       Valicek, J., Drzik, M., Hloch, S., Ohlidal, M., Miloslav, L., Gombar, M., Radvanska, A., Hlavacek, P., Palenikova, K., 2007, Experimental analysis of irregularities of metallic surfaces generated by abrasive waterjet, International Journal of Machine Tools & Manufacture, Vol. 47, pp. 1786-1790.

6.       Marinkovic Velibor, Madic Milos, Optimization of surface roughness in turning alloy steel by using Taguchi method, Scientific Research and Essays Vol. 6(16), 2011,  pp. 3474-3484.

7.       Khan, A.A., Haque, M.M., Performance of different abrasive materials during abrasive water jet machining of glass, Journal of Materials Processing Technology, No. 191, 2007, pp. 404–407.

8.       John Rozario Jegaraj, J.,  and Ramesh Babu, N., 2007, A soft computing approach for controlling the quality of cut with abrasive waterjet cutting system experiencing orifice and focusing tube wear, Journal of Materials Processing Technology, No. 185, pp. 217–227.

9.       Ahmet Hascalık,  Ulasş Caydas, Optimization of turning parameters for surface roughness and tool life based on the Taguchi method, Int J Adv Manuf Technol, 2008, pp. 896–903.

10.     Nalbant, M., Gokkaya H., Sur G., Application of Taguchi method in the optimization of cutting parameters for surface roughness in turning, Materials and Design, No. 28, 2007, pp. 1379–1385.

11.     Junkara, M., Jurisevica, B., Fajdigab, M., Grahc, M., Finite element analysis of single-particle impact in abrasive water jet machining, International Journal of Impact Engineering, vol. 32, 2006, pp. 1095–1112.

12.     M. Chithirai Pon Selvan, N. Mohana Sundara Raju, Analysis of surface roughness in abrasive waterjet cutting of cast iron, International Journal of Science, Environment and Technology, Vol. 1, No 3, 2012, pp. 174 – 182.


66-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

Arshad I. Esmael, Minerva E. Matta,   Hisham A. Halim, Farouk M. Abdel Azziz

Paper Title:

Adsorption of Heavy Metals from Industrial Wastewater using Palm Date Pits as Low Cost Adsorbent

Abstract:   The removal of heavy metals from industrial wastewater is of great concern as heavy metals are non-biodegradable, toxic elements that cause serious health problems if disposed of in the surrounding environment. In this study, the removal of three heavy metals: copper, hexavalent chromium, and iron through adsorption using palm date pits was studied. Palm date pits are considered a low cost source of activated carbon. Heavy metals adsorption was studied for individual elements, and for industrial wastewater samples collected from a tannery and an electroplating factory. The kinetic studies showed that Cu, Cr+6, and Fe were adsorbed very rapidly within the first 30minutes, while equilibrium was attained within 90min, the optimum pH range for their adsorption was found to be (4.5-6.5), depth of adsorbent layer (70-90)cm,  and particle size(0.5-0.75)mm. The adsorption capacity and removal efficiency for individual elements reached 89.17% for Cu, 71.30% for Cr+6, and 85.17% for Fe respectively. As for the removal of heavy metals from industrial wastewater collected from the tannery, removal efficiency reached 85.17% for Cu, 65.42% for Cr+6, and 87.03% for Fe and for the electroplating factory effluent: 82.857% for Cu, 61.65% for Cr+6, and 89% for Fe. The equilibrium sorption data for synthetic wastewater at temperature 27+ 2°C was described by both the Langmuir and Freundlich isotherm models. Experimental data were better fitted to the Freundlich equation rather than to the Langmuir equation.

Keywords:
 Adsorption; heavy metals; industrial wastewater; low cost adsorbents; palm date pits.


References:

1.        W. Zheng, X. Li, Qi. Yang, G. Zeng, Xiang-Xinshen, Y. Zhang, J. Liu. “Adsorption of Cd(II) and CU(II) form aqueous solution by carbonate hydroxylapatite derived from eggshell waste”. J Hazard Mater. 2007; 147(1-2), pp. 534-539.
2.        T.A. Kurniawan, G.Y.S.Chan, W. Lo, S. Babel. “Comparisons of low-cost adsorbents for treating waste waters laden with heavy metals”. Sci Total Environ. 2006; 366 (2-3) pp.  409-426.

3.        M. Teker, M. Imamoglu, and O. Saltabas. “Adsorption of copper and cadmium ions by activated carbon from rice hulls”. Turk J. Chem..1999; 23(2): 185-191,

4.        K. Kadirvelu, M. Palanival, R. Kalpana, and S. Rajeswari. “Activated carbon from an agricultural by-product, for the treatment of dyeing industry wastewater”. Bioresource Technol. 2000; 74(3): pp. 263-265.

5.        A.S.A.Neama. “A Study on adsorption characteristics of heavy metals from wastewater by low cost adsorption”. M.sc. Thesis, Cairo University, Faculty of Engineering, Dept. of Chemical Engineering, 2009.

6.        W.H.A. Al-Taliby. “Evaluation of Methylene Blue Removal from Wastewater by Adsorption Onto Different Types Of Adsorbent Beds”. M.Sc. Thesis, University Of Babylon, College Of Engineering, Dept. Of Civil Engineering, 2009.

7.        M. Husseien , A.A Amer , A. El-Maghraby , N.A. Taha N A. “Utilization of barley straw as a source of  activated carbon for removal of methylene blue from aqueous solution”. Journal of Applied Sciences Research. 2007; 3(11):pp. 1352-1358.

8.        M. Saleem. “Pharmaceutical Wastewater Treatment: A Physicochemical Study”. Journal of Research (Science), Bahauddin Zakariya University, Multan, Pakistan. 2007; 18(2): pp.125-134.

9.        L.A.A. Ahmed. “Removal of heavy metals from wastewater by date palm tree wastes”. Eng. & Tech. Journal. 2010; 28(1).

10.     W.H. Barreveld. “Date Palm Products”. FAO Agricultural Services Bulletin No.101, Food and Agriculture Organization of the United Nations, Rome, 1993.

11.     O. Al-Attas. “The Production of Activated Carbon from Local Palm-Date Pits for Pollution Removal Process”. M.Sc. Thesis, Civil Eng., King Fahd University of Petroleum and Minerals, K.S.A, 2003.

12.     Yağşi, NU. Production and Characterization of Activated Carbon from Apricot Stones, M.Sc. Thesis, the Middle East Technical University, Ankara, 2004.

13.     D.C.K. Ko , J.F. Porter, and G. McKay. “Fixed bed studies for the sorption of metal ions onto peat”. Trans. I. Chem. E., 2003; 81(B), pp.73-86.

14.     Standard Method for the Examination of Water and Wastewater, APHA,Washington D.C.,  2005.

15.     A. I. Esmael, M. E. Matta,   H. A. Halim, F. M. Abdel Azziz “Adsorption of Heavy Metals from Industrial Wastewater Using Palm Date Pits as Low Cost Adsorbent” M.sc. Thesis, Cairo University, Faculty of Engineering, Public works Department, 2013.


71-76

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Sourabh Bisht, Bhaskar Nautiyal, Upendra Mohan Bhatt, Pankaj Joshi

Paper Title:

Plasma Applications for Environmental Protection

Abstract:   Plasmas (both thermal and non-thermal) are known to be utilized for various environmental applications. These applications mostly include fields of air pollutant treatment, wastewater and drinking water decontamination, and thermal disposal of solid waste. The non-thermal plasmas used for environmental applications are mainly high-pressure discharges, such as DBDs, pulsed corona discharges, microwave plasmas, electron beams and dielectric packed bed reactors. An increasing number of investigations are devoted to the decomposition of nitrogen and sulphur oxides in flue gases, and of volatile organic compounds (VOC) emitted from various industrial processes. Many hazardous organic compounds are readily attacked by excited species, free radicals, electrons, ions and/or UV photons generated in DBDs. Moreover, investigations are going on to use dielectric barrier discharges (DBDs) for the generation of H2 and elemental sulphur from H2S and for the conversion of the greenhouse gases CO2 and CH4 to liquid fuels. The thermal plasmas mostly used for this purpose include several kinds of arcs.

Keywords:
 Corona Discharge, Dielectric Barrier Discharge, Ozonation


References:

1.       Malik M. A., Ghaffar A., Malik S. A. (2001). Water purification by electrical discharges. Plasma SourcesScience and Technology, 10, p. 82 – 91.
2.       Environmental Impact Assessment, Course Module, retrieved on September 2010, from http://eia.unu.edu/course/?page_id=93.

4.       Covelo V. T., Merkhofer M. W., Risk Assessment Methods, 1993. Approaches for Assessing Health and Environmental Risks.

5.       B Resource Guide: Conducting Environmental Audits and Reviews, bcorporation.net, retrieved on September 2010, from http://www.bcorporation.net/resources/bcorp/documents/ B%20Resources%20-%20Environmental%20Audit.pdf.

6.       Orfanoudakis N., Vakalis A., Krallis K., Hatziapostolou A., Vlachakis N., (2005). “Emission reduction techniques and economics in coal-fired power plants”.

7.       Air pollution control devices and techniques technical manual. Selective catalytic reduction control theory and design, retrieved on September,2010,fromhttp://www.arb.ca.gov/cap/manuals/cntrldev/sncr_etc/309scr.htm.

8.       Air pollution control, Hamon Research-Cottrell, Inc. NOx selective non-catalytic reduction (SNCR), retrieved on September, 2010, from http://www.hamon
researchcottrell.com/tech_nox.

9.       Wang L. K., Pereira N. C., Hung Y., (2004). Air pollution control engineering, Handbook on environmental engineering, Volume 1. Humana Press, Totowa, New Jersey.

10.     Air pollution control devices and techniques technical manual. Flue gas desulfurization, retrieved on September, 2010, from http://www.arb.ca.gov/cap/manuals/cntrldev/scrubber/313fgd_sulfur.htm.

11.     Air pollution control equipment, Nosun Engineerin Sales, Inc. Flue gas deacidification, retrieved on September, 2010, from http://nosuneng.com/so2-acid-gas-emission-control.asp.

12.     Desulphurization process. Wet limestone-gypsum method machines, Jiangsu Hongbang Environment Engineering Co, retrieved on September, 2010, from http://jshongbang.en.alibaba.com/product/ 251768453-209429696/ Desulphurization_ Process_Wet_Limestone_Gypsum_Method_Machines.html.

13.     Air pollution control. VOC treatment, Waterleau, retrieved on October, 2010, from http://www.water-leau.com/en/technology/air.

14.     Shareefdeen Z., Singh A. (2005). Biotechnology for odour and air pollution control. Germany, p. 3 - 4, p. 137 - 139.

15.     Environmental impact assessment report of 700 MW extension of Deir Ali combined cycle power plant project, (2007). PEEGT, Syria.


77-81

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

P. Deepa, Upendra saharkar

Paper Title:

To Study the Capability Model for Sustainable E –Business Environment in Construction Industries in Maharashtra Region

Abstract:  This paper focuses on studying a capability model for an individual firm in relation to e business in construction industries within Maharashtra region. The paper describes a framework for theorization of adoption of e- business overcoming different barriers faced by them. Capability model though it comes from the field of software development, it is also used as a general model to aid in business processes. The adoption of e- business is considerably less in small and medium enterprises due to barriers like lack of knowledge, lack of trust, lack of fund which requires attention. This research study confirms this lacking and focuses on providing solution through capability frame work.

Keywrds:
 E-business, capability model, SMEs, framework, construction industries


References:

1.        Rajendra Rajaram, “A needs analysis of financial management and accounting skills in the SME sector in KwaZulu-Natal” University of KwaZulu-Natal, November 2008.
2.        Kumar, R. 2005. Research Methodology. 2nd Edition. London: Sage Publications Ltd.

3.        Aranda-Mena, Guillerm,”E-business adoption in construction : international review on impediments. CRC for Construction Innovation”, Brisbane. 2004.

4.        Emmanuel akoi-gyebi adjei, “Motivational strategies to improve productivity in the construction industry in Ghana”  july 2009.

5.        Hans Wamelink & Wim Teunissen, “E-Business in the construction industry: a search for practical applications using the Internet ” Eindhoven,The Netherlands.

6.        Anushi Rodrigo, “Development of e-business capability maturity assessment tool for construction organisations”.

7.        Faisal Iddris, “Adoption of E-Commerce Solutions in Small and Medium-Sized Enterprises in Ghana” Kumasi, Ghana , Vol 4, No.10, 2012.

8.        Yongjie Chen, Kirti D. Ruikar ,  Patricia M. Carrillo, “ Strategic e-business framework: a holistic approach for organisations in the construction industry ’’  Journal of Information Technology in Construction - ISSN 1874-4753,  April 2013.


82-84

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

M. Iqbal, I. Shahid, S. H. Farooq

Paper Title:

Behavior of Polymer Strengthened Plain Concrete

Abstract:   In developing countries, structures damaged due to extreme loading such as earthquakes or deteriorated due to aging needs to be frequently repaired instead of replacement for economic reasons. In this research, effectiveness of polymer modified mortar on the mechanical properties of repaired Plain Cement Concrete (PCC) was studied through laboratory testing. 69 specimens (18 x Prisms, 30 x cubes and 21 x cylinders) were cut in different ways including horizontal, vertical, single, double and inclined cuts. The cut specimens were then repaired using mortars modified with three polymers namely Styrene Butadiene Rubber Latex, ZUBA (latex of various polymers) and Polyvinyl Acetate polymers and were tested under compressive and flexural load and the strength was compared with reference specimen. The restored compressive strength of the repaired specimens was in the range of 54 to 98 percent of the original strength of reference specimen. In case of cubes and prisms, the failure plane of repaired specimens was away from the cut plane showing the effectiveness of polymer modified mortar.

Keywords:
 Strengthening; Plain Concrete; Polymers


References:

1.       Ohama Y (2004), “Recent progress in research and development activities of concrete-polymer composites in Japan: polymers in concrete. 11 th International congress on polymers in concrete, Germany, June, 2004. BAM, Berlin, p 605
2.       Ohama Y (1995), “Handbook of polymer-modified concrete and mortars: Properties and process technology.” Noyes, New Jersey.

3.       Dhir R, Hewlett P, Lota J, Dyer T (1994), “An investigation into the feasibility of formulating ‘‘self-cure’’ concrete.”, Journal of Material Structure 27:606–615.

4.       Rixom R, Mailvaganam N (1999), “Chemical admixtures for concrete.”, E & FN Spon, London.

5.       Lovell P, El-Aasser M (eds) (1997), “Emulsion polymerization and emulsion polymers.” John Wiley and Sons, Chichester.

6.       Fowler W (2004), “State of the art in concrete-polymer materials in the U.S: polymers in concrete.” 11th International Congress on polymers in concrete, Germany, June, 2004. BAM, Berlin, p 597

7.       Knapen E, Beeldens A, van Gemert D, van Rickstal F (2004), “Modification of cement by means of polymers in solution: polymers in concrete.”, 11th International Congress on polymers in concrete, Germany, June, 2004. BAM, Berlin, p 83

8.       Jenni A, Zurbriggen R, Holzer L, Herwegh M (2006), “Changes in microstructures and physical properties of polymer-modified mortars during wet storage.”, Cem Concr Res 36:79–90.

9.       Jenni A, Holzerb L, Zurbriggen R, Herwegh M (2005), “Influence of polymers on microstructure and adhesive strength of cementitious tile adhesive mortars.”, Cem Concr Res 35:35–50

10.     Beeldens A, Gemert DV, Schorn H, Ohama Y, Czamecki L (2005), “From microstructure to macrostructure: an integrated model of structure formation in polymer-modified concrete.” Journal of Material Structure  38:601–607


85-93

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Saad F. Oboudi, Muna M. Abbas, Nadein Q. Raoof

Paper Title:

Effect of Li Substitution on Bi (Pb)-2223 Superconductors

Abstract:   Samples of stoichiometric composition Bi2-xLixPb0.3Sr2Ca2 Cu3O10+δ with x = 0.0, 0.1, 0.2, 0.3, 0.4 and 0.5 were prepared by a solid state reaction method. The process consists of three steps. Firstly a Bi2-xLixPb0.3Sr2Ca2 Cu3O10+δ sample was sintered in the air at 850 °C for 50 hrs; subsequently the sintered sample was regrind and sintered again at 850 °C for another 50 hrs. While in the third step the sample resintered it at 830 °C for 40 hrs, and then slowly cooled in furnace with a rate of 2 ºC/min. The process enhances growing a superconducting phase unidirectional and suppresses the high phase intrusion which leading to the production of well textured samples. Li particles were introduced into Bi2Pb0.3Sr2Ca2u3O10+δ powder in various concentrations. Bulk samples were made from the Bi2223/Li powder and heat-treated at various processes. The phase formation and the microstructure were studied for different amounts of Li. It was found that sample with x = 0.3  Li showed the highest Tc-zero at 130 K. Increasing Li content to 0.5 decreases the critical temperature to 113 K. The samples were characterized by X-ray diffraction, and DC electrical resistivity. The X-ray diffraction studies were done at room temperature and the lattice constants of the material were determined by indexing all the peaks observed.

Keywords:
 Bi-based superconductors, Li substitution, Phase formation


References:

1.       O. Ozturk, D. Yegen, M. Yilmazlar, A. Varilci, C. Terzioglu,: Physica C 451 (2007) 113-117.
2.       P. L. Chen and I. W. Chen, Journal of the Ame- rican Ceramic Society, Vol. 79, No. 12 (1996) 3129-3135. doi:10.1111/j.1151-2916.1996.tb08087.x

3.       D. R.Yang, D. S. Tsai and H. C. Liu, Journal of Material Science, Vol. 30, No. 17 (1995) 4463-4468. doi:10.1007/BF00361532

4.       Gul, I.H., Amin, F., Abbasi, A.Z., Anis-ur-Rehman,M., Maqsood, A.: Physica C 449 (2006) 139–147.

5.       M.Truccato, S.Cagliero, A.Agostino, M.Panetta and G.Rinaudo, Supercond. Sci. Technol. 19 (2006) 1003–1009.

6.       A. Y. Iiyushechkin, T. Yamashita, J. A. Alarco and I. D. R. Markinnon, Supercon. Sci.Technol. 10 (1997) 330-336.

7.       M.Wang, G.Xiong, X.Tang and Z. Hong; Physica C 210 (1993) 413-416.

8.       E. Sahin, N. Basturk,” Preparation of Pb Doped 110 K Phase BiSrCaCuO Thick Films by Screen Printing”, Turk Journal of Physics 25 (2001) 257-263.

9.       K. Kocaba_s, Turkish Jou of Phys, V.22 (1998) 437.

10.     O. Bilgili .Y. Selamet . K. Kocabas, J Supercond Nov Magn,Vol 21,No(2008) 439-449.

11.     Saleh, S.A.: Physica C 444 (2006) 40-44.

12.     G.A.AL-Dahash; (Effect of Deformation on Electronic Structure and Magnetic properties of Some High Temperature Superconductors)  Ph.D.Thesis , Baghdad University , College of Science (1998).

13.     Kamali, P., Salamati, H., Physica C 403 (2004) 60–66.

14.     M. J. Iqbal, R. Mehmood, Journal of Alloys and Compounds,   V.477, issues 1-2 (2009).

15.     Y. Mizauno, A. Sawa, H. Obara, M. Umeda, and H. Yamasaki, Physica, C. 2255 (1997) 282.

16.     S.A.Halim, S.S.H.Ravandi, M.I.Adam, S.K.Chen and K.P.Lim. Sci, Technol  , V.18, N.1 (2010) 266.


94-97

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

Chukwuma G. J. Nmegbu

Paper Title:

Modeling the Diffusion Rate of Biogenic Gases Produced During Microbial Enhanced Oil Recovery

Abstract:   Different transport mechanisms occur within the subsurface region. To have a vast comprehension of these transport modes, researchers, scientists, scholars etc. are charged with the responsibility of providing concrete answers to lingering subsurface mass transfer  questions. In this study, the prediction of diffusion rates of biogenic gases for a MEOR subjected core is investigated using a developed predictive model, which when compared to results from experiments conducted showed a great level of precision. The 50 -50 mixtures of both microbes for the MEOR investigation were also found to reduce the formation permeability and heavy crude viscosity, all of which constitute mobility improvement techniques.

Keywords:
 Biogenic gases, Diffusion, Microbes.


References:

1.        Dejun, D., Chenglong, L., Quanyi, J., Pingcang, W. and Dietrich, F. L.: “Systematic Extensive Studies of Microbial EOR Application Results in Chanqing Oilfield.” SPE Paper 54380, in proceedings of the 1999 SPE Asia Pacific Oil and Gas Conference and Exhibition, Jakarta, Indonesia, April 20th -22nd , 1999. PP 1-9.
2.        Strappa, L. A., De-lucia, J> P., Maure, M. A. and Lopez,  M. L.: “A Novel and Successful  MEOR Pilot Project in a Strong Water-Drive Reservoir.” SPE Paper 89456, in proceedings of the 2004 SPE/DOE 14th Symposium on improved oil recovery, Tulsa, Ok, 17th -21st April, 2004.

3.        Donaldson, S. L and Thomas, P. L.: “Reservoir Engineering Analysis of Microbial Enhanced Oil Recovery.” SPE Paper 63229, Presented at the SPE Annual Technical Conference and Exhibition, Dallas, Texas, 1st October, 2000.

4.        Fontes, D. E., Mills, A. L., Homberger, G. M and Herman, J. S.: “ Applied Enviromental Microbiology.” Physical and Chemical Factors Influencing Transport of Microorganisms Through Porous Media, 1991.

5.        Richard, B., Hetndon, F. G., Jewell, W. J., Cumming, R. J and White, T. E.: “in-situ Methane Enrichment in Methanogenic Energy Crop Digesters.” PP 274-275, 1994.

6.        Foglar, H. S.: “ External Diffusion Effects on Heterogeneous Reactions.” , Elements of Chemical Engineering. Practice Hall PTR International, 4th  Edition. PP 758 – 810. 2006.

7.        Tiem, E.: “Diffusion Through a Cell Membrane.” , [Online] www.teim.utk.edu/bioed

8.        Chang, M.-M., Bryant, R.S., Tina-Hrng, C. and Hong, W.G.: ”Modeling and Investigation of  Microbial Transport phenomena in porous Media.” DOE Report DE92-548. 1991.

9.        Jose, L. Z and Rhonda, P. L.: “ Physical and Chemical Factors Influencing Transport of Microorganisms Through Porous Media.” Applied Environmental Microbiology. 57, PP 2473- 2481, 1997.

10.     Jang, L. K, Sharma, M. M, Findley, J. E, Cang, P. W anf Yen, T. F.: An Investigation of Transport of Bacteria Through Porous Media.” Proc. Int. Con-microbial enhancd oil recovery, Afton, OK, DOE. Conf-8205140 PP 60-70 16th – 21st May, 1982.


98-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Ambati Raghu

Paper Title:

Improving Performance with Security Mechanism for Wireless Multi-Hop Relay Network

Abstract:   Wireless relay network consist of distribution of network topology commonly used in wireless network. Where it sender and receiver are interconnected by mean some of mobile nodes. Relay technology are used enhance packet delivery and increase performance of wireless networks such as worldwide interoperability for microwave access and LTE-A. Later developed automatic repeat request (ARQ) [11]technique that to reduced packet lose and increase latency but we recognizes potential drawbacks of automatic repeat request techniques that’s  are ambiguous error report, packet overhead and number of acknowledgement in case of successful received data. Authentication schema is most important factor in relay network to secure, protect from attackers because of   thousands of users are communicated each other’s without any identification. Authentications in relay network have been proposed public-key cryptographic algorithm developed based on Diffie-Hellman key exchange algorithm. The process of Diffie-Hellman key exchange algorithm is two users to securely exchange a keys that keys ultimately using to encrypt the message. Our research is going on reduced workload in relay network and improve performance by consider some Components that mobility factor, battery power and workload. These components Consider to establishing reliable path to reduced delay and increase data transmission speed and finally data transmission is one of major problem in wireless network then we consider hop-by-hop scheme.

Keywords:
 Authentication, establish reliable path, hop-by-hop communication


References:

1.        A. B. Saleh, O. Bulakci, and J. Hamalainen (2012),“Analysis Of the impact of site planning on the Performance of relay Deployments,” IEEE Trans. Veh. Technol., vol. 61, no. 7, pp. 3139–3150
2.        A. Sunny, J. Kuri, and S. Aggarwal (2011) “Delay modeling for a Single-hop wireless mesh network under light aggregate traffic,” Proc. IEEE ICCSP, Kerala, India, pp. 271–275

3.        Chu Y H, Rao S G, Seshan S, Zhang H (2000).“A Case for end System multicast. “Proceedings of the ACM SIGMETRICS. Santa Clara, USA, 2000.

4.        D. Soldani and S.Dixit (2008) “Wireless relays for Broadband Access [radioCommunications series]”, IEEE Commun. Mag vol.46 no. 3, pp. 58– 66.

5.        F. Ono, K. Sakaguchi(2009)“STBC MIMO Network Coding for Bi-Directional Multi-Hop Relay Networks,” IEICE Trans. Commun.      Vol. E92-B, no.   12, pp. 3676–3682.

6.        I. F. Akyildiz, T. Melodia, and K. R. Chowdhury (2007) “A survey  On wireless Multimedia sensor networks,” Computer Networks  vol. 51, no. 4, pp. 921–960.

7.        H. Wiemann, M. Meyer, R. Ludwig, and O. Chang   Pae(2005) “A Novel multi-hop ARQ concept,” Proc. IEEE 61st VTC, Stockholm,       Sweden, pp. 3097–3101.

8.        K. Mizutani, K. Sakaguchi, K. Araki (2009) “MIMO-OFDM two- Way multihop network and Network synchronization scheme,”  IEICE Tech.  Report on Software Radio, vol. 109, no. 61SR2009-7, pp. 43-49, May.

9.        Li Bo, Yin Hao(2007) “The peer-to-peer live video  Streaming in The Internet: Issues, existing Approaches and challenges”. IEEE      Communications Magazine, 45(6): 94-99.

10.     LIU Xuening , YIN Hao , LIN Chuang , DU  Changlai(2009)” Efficient User Authentication and Key Management for Peer-toPeer Live Streaming Systems” ISSNll1007-0214ll13/18llVolume14, Number 2, pp234-241

11.     R. Vaze(2011)“Throughput-delay-reliability tradeoff with ARQ In wireless ad hoc networks,” IEEE Trans. Wireless Commun.vol. 10, no. 7, pp. 2142– 2149

12.     S. Misra, M. Reisslein, and X. Guoliang(2008)“A survey of Multimedia streaming in wireless sensor networks,” IEEE Commun. Surveys & Tutorials, vol. 10, pp. 18–39.

13.     Shivashankar, Suresh H.N, Varaprasad Golla, Jayanthi G (2013)“Designing Energy Routing Protocol with Power Consumption Optimization in MANET” IEEE Transactions on Emerging Topics in Computing,

14.     T. Issariyakul, E. Hossain, and A. S. Alfa (2006) “End-to-end Batch transmission in a multihop and multirate wireless network Latency, reliability, and throughput analysis,” IEEE Trans. Mobile Comput, vol. 5, no. 9, pp. 1143–1155.


103-108

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Shaikh Tausif, L.G.Kalurkar

Paper Title:

Review Integral Abutment Bridge Behavior in Different Condition

Abstract:   This paper presents findings of a literature review of behavior of Integral Abutment Bridge (IAB) ,  The purpose of the report is to identify problems and uncertainties, and to gain insight into the interactions between the foundation piles, the integral abutment, and the surrounding ground and Synthesize the information available on the general behavior of integral abutment bridges. Integral Abutment Bridge (IAB is joint less bridge in which the deck is continuous and monolithic with abutment walls. The outperform their non-integral counterparts in economy and safety. Their principal advantages are derived from the absence of expansion joints and sliding bearings in the deck, making them the most cost effective system in terms of construction, maintenance, and longevity. The main purpose of construction IAB is to prevent the corrosion of structure due to water seepage through joints. The simple and rapid construction provides smooth, uninterrupted deck that is aesthetically pleasing and safer for riding. The single structural unit increases the degree of redundancy enabling higher resistance to extreme events.  To gain a better understanding of the mechanism of IAB, a comparative study is carried out on a typical IAB and a simply supported bridge. A literature review focusing on past numerical models of. A discussion on results of analysis of the IAB with different geometry and comparison with simply supported bridge and each experiencing same temperature change scenarios and same loading pattern is observed.

Keywords:
 Integral Abutment Bridge, Simply Supported Bridge, Soil Interaction, Comparison.


References:

1.       Arockiasamy  M., Butrieng N. and Siva Kumar M., “State of the Art-Integral Abutment Bridges: Design and practice.” Journal of Bridge Engineering, Vol 9, No.5 September-October 2004, pp. 497-506.
2.       Spring man C.W.W, S.M, Nourish, A.R.M., “Soil-structure interaction of spread base integral bridge abutments” Japanese Geotechnical Society.”.Soil and Foundation, Vol. 38, No. 1, 1998, pp.145-162.

3.       Khodair, Roman E., Y.A., Hassiotis, S., “A survey of current issues on the use of integral Abutment bridges” Proceedings of the Engineering Mechanics Conference , May 2002, New York Bridge Structures, Volume 1, Issue 2 , June 2005, pp 81-101

4.       Cross, H. , “ Analysis of Continuous Frames by Distributing Fixed End Moments, ” ASCE Proceedings, American Society of Civil Engineers, New York , May 1930

5.       Abendroth, R. E., and Greimann, L. F. _2005_. “Field testing of integral abutments.” Final Rep. HR-399, Iowa State Univ., Ames, Iowa,_http://www.ctre.iastate.edu/reports/hr399.pdf_.

6.       Burdette, E. G., Tidwell, J. B., Ingram, E. E., Goodpasture, D. W., Howard, S. C., Wasserman, E. P., and Deatherage, J. H. _2004_. “Lateral load tests on prestressed concrete piles supporting integral abutments.”PCI J., 49_5_, 70–77.

7.       M. Arockiasamy, P.E., M. ASCE, and M. Sivakumar, 2005_Time-Dependent Behavior of Continuous Composite Integral Abutment Bridges,” 10.1061/~ASCE!1084-0680~2005!10:3~161!

8.       Mourad, S. and Tabash, S.W., “Deck slab stresses in Integral Abutment Bridges”, journal of Bridge Engineering, Vol.4, No.2, May 1999, pp. 125-130.

9.       Alampalli S. and Yannotti A.P., “In-Service Performance of Integral Bridges and Joint less Decks”, Transportation Research Record 1624, 1998. Paper No.98, pp.540-549.

10.     Faraji, S., Ting, J.M., Crovo, D.S., Ernst, h,. “Non-linear Analysis of Integral Bridges: Finite Element Model”, Journal of Geotechnical and Geo-environmental Engineering, Vol. 127, No.5, May 2001, pp. 454-461.

11.     American Petroleum Institute (API), “ Recommended practice for planning, designing , and constructing fixed offshore platforms working stress design”, 20th Edition, Washington, D.C.1993, pp.67-79.

12.     Greimann, L.F., Abendroth, R.E., Johnson, D.E., and Ebner, P.B.,” Pile Design and tests for Integral Abutment Bridges”. Lowa state University, December 1987, pp.16-23.


109-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Gursharan Saini, Harpreet Kaur

Paper Title:

K-Mean Clustering and PSO: A Review

Abstract:  Clustering is a method which divides data objects into groups based on the information found in data that describes the objects and relationships among them.  There are a variety of algorithms have been developed in recent years for solving problems of data clustering.  Data clustering algorithms can be either hierarchical or partitioned. Most promising among them are K-means algorithm which is partitioned clustering algorithm .Moreover k-mean Algorithm is an efficient Clustering Algorithm but it can generate a local optimal solution. On the other hand, Particle Swarm Optimization is used for global optimization. Thus K-means algorithm shows improved results when used with the combination of PSO (Particle Swarm Optimization).

Keywords:
 Data clustering, Data Mining, K-Mean PSO


References:

1.       Pallavi Purohit and Ritesh Joshi March 2013 A New Efficient Approach towards k-means Clustering Algorithm ,International Journal of Computer Applications (0975-8887) Volume 65-No.11.
2.       Pritesh Vora, Bhavesh Oza February 2013 A Survey on K-mean Clustering and Particle Swarm Optimization, International Journal of Science and Modern Engineering, (IJISME) ISSN: 2319-6386, Volume-1, Issue-3.

3.       Manpreet Kaur and Usvir Kaur 2013A Survey on Clustering Principles with K-means Clustering Algorithm Using Different Methods in Detail , IJCSMC, Vol.2 Issue.5.

4.       Sunita Sarkar, Arindam Roy, Bipul Shyam Purkayastha 2013 Application of Particle Swarm Optimization in Data Clustering, International Journal of Computer Applications (0975 – 8887) Volume 65– No.25, 2013.         

5.       Mehdi Neshat, Shima Farshchian Yazdi, Daneyal Yazdani and Mehdi Sargolzaei 2012 A New Cooperative Algorithm Based on PSO and K-Means for Data Clustering , Journal of Computer Science 8 (2): 188-194.

6.       Sandeep Rana, Sanjay Jasola and Rajesh Kumar 2010 A hybrid sequential approach for data clustering using K-Means and particle swarm optimization algorithm ,International Journal of Engineering, Science and Technology Vol. 2, No. 6.

7.       Rajeev Kumar, Rajeshwar Puran and Joydip Dhar 2010 Enhanced K-Means Clustering Algorithm Using Red Black Tree and Min-Heap , International Journal of Innovation, Management and Technology, Vol. 2, No. 1.

8.       Baolin Yi, HaiquanQiao, Fan Yang 2010 An Improved Initialization Center Algorithm for K-Means Clustering  CSE International Conference.

9.       Napoleon and P. Ganga lakshmi 2010 An efficient K-Means clustering algorithm for reducing time complexity using uniform distribution data points, Trendz in Information Sciences & Computing (TISC).

10.     David Pettinger and Giuseppe Di Fatta  Dec.2010 Space Partitioning for Scalable K-Means, Machine Learning and Applications (ICMLA), 2010 Ninth International Conference.


112-114

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Nmegbu Chukwuma Godwin Jacob, Pepple Daniel Dasigha

Paper Title:

The Diffusion Model for the Longitudinal Mixing of Microbes in Reservoir Beds of Finite Length

Abstract:   Microbial injection in petroleum reservoirs for enhancing oil recovery has recently been an area of intensive study in the oil and gas industry. Before the application of this non-expensive, environmental friendly method of recovery is employed, the comprehension of its modus operandi is paramount, most essential being its movement and transport techniques through tortuous porous media in petroleum reservoirs. This study reveals the patented process of microbial transport through advection within a finite length reservoir by development and Simulation of a mathematical model which when validated with microbial and reservoir parameters, showed a great degree of similarity with an already established model. Simulation of these models presented a visual description of the longitudinal mixing process of dispersing microbes in the reservoir using the SIMULINK program.

Keywords:
 Diffusion, Dispersion, MEOR, Microbes.


References:

1.        Haug, W. E. (2002).: “ The Role of Transverse Mixing of Electron Acceptors and Carbon Substrates in Natural Attentuates. PhD thesis, University of Sheffield, Sheffield.
2.        Gramling, C.M., Harvey, C. F., Meigs, L. C. (2002).: “Reactive Transport in Porous Media: A Comparison of Model Prediction With Laboratory Visualization.”  Enviromental Science and Technology 36(11) PP2 508 – 2514.

3.        Prommer, H., David, G. B. and Barry, D. A (2002).: “ Modeling Physical and Reactive Process During the Biodegradation of a Hydrocarbon Plume Under Transient Ground water Flow Conditions” J. Cont. Hydrol, 58. PP 113-131

4.        Blackwell, R. J (1959): “Experiments on Mixing by Fluid Flow in Porous Media” Proceedings of Amer.Inst. Chem. Eng and Soc. of Petrol. Eng. 29.

5.        Harvey, R. W. (1991).: “Parameters involved in Modeling Movement of Bacteria in Groundwater”. American Society of Microbiology, Washington D.C, PP89 – 114

6.        Schotting, R. J., Moser, H., Hassanizadeh, S. M. (1991).: “High concentration Gradient dispersion in porous media: Experiments, Analysis and Approximations”. Adv.  Water resources. Res.22(7) PP 665 – 680.

7.        Bear, J and Bachmat, T. (1967) “A Generalized theory on Hydrodynamic Dispersion in Porous Media. IASH Symposium, Haifa publications, 72. PP 7- 16.

8.        Simunek, J., Van Genuchten, M. T. and Sejna, M. (2005).: the HYDRUS-ID Software Package for Simulating  the One Dimension Movement of Water, Heat and Multiple Solutes in Variably-saturated Porous Media”. Version 3.0, HYDRUS software series 1, Department of Enviromental Sciences, University of California, Riverside, CA,

9.        Healy, R. W. (1990).: “ Simulation of Solute transport in variably Saturated Porous Media with Supplemental Information on Modifications to th U.S Geological Survey Computer Program VS2D”. U.S. Geology Survey, Water Resources Investigation Report.

10.     Perkins, T. K and Johnston, Q. C (1963).: “ A review of diffusion and Dispersion in Porous Media”. Society Of Petroleum Engineers. J. 3(1), 7086.

11.     Bradford, S. A., Yates, S. R., Bettahar, M. and Simunek, J. (2002).: Physical Factors Affecting the Transport and Fate of Colloids in Saturated Porous Media”. Water Resources. Res. 38, 1327, doi: 10.1029/2002WR001340.

12.     Zahari, I., Mohd, I. O., Khoesiak, F., Ezrin, J. E. and Mohamed, O. (2004).:“Simulation Analysis of Microbial Well Treatment of Bokor Field, Malysia”. SPE paper 88453. In proceedings of the SPE Asia Pacific Improved Oil Recovery and Exhibition, Perth, Australia, October 18th – 20th PP 1 – 6.


115-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

Shiny G, M.R.Baiju

Paper Title:

Space Vector based Pulse Width Modulation Scheme for a Five - Level Inverter using Open - End Winding Induction Motor

Abstract:   A Space Vector based Pulse Width Modulation (SVPWM) scheme for a 5-level inverter is presented. Sector identification is carried out using an approach based on fractal concept. To represent the space vectors, 60° coordinate frame work is used. The use of 60° coordinate system eliminates fractal arithmetic compared to Cartesian coordinate system, and increases speed of computation. No look up tables are used to generate sectors and switching vectors. The scheme also works in over modulation region. Experimental results for a 5-level inverter using induction motor in open-end winding configuration are presented to validate the scheme.

Keywords:
 Space vector, fractal, inverter, open-end winding


References:

1.        Samir Kouro,  Mariusz Malinowski,   K. Gopakumar, Josep Pou,  Leopoldo G. Franquelo, BinWu, Jose Rodriguez, Marcelo A. Pérez, and Jose I. Leon, “Recent Advances and Industrial Applications of Multilevel Converters”, IEEE Transactions on Industrial Electronics, vol.57, No. 8, August 2010,  pp 2553-2580.
2.        Haitham Abu-Rub, Joachim Holtz, Jose Rodriguez and Ge Baoming, “Medium-Voltage Converters-State of the Art, Challenges, and Requirements in Industrial Applications”, IEEE Transactions on Industrial Electronics, vol.57, No. 8, August 2010,  pp 2581-2596.

3.        Jose Rodriguez, Leopoldo G. Franquelo, Samir Kouro, Jose I. Leon et al, “Multilevel Converters: An Enabling Technology for High-Power Applications”, Proceedings of the IEEE, vol. 97, No. 11, November 2009, pp 1786–1817.

4.        L. G. Franquelo, J. Rodriguez, J.I. Leon, S. Kouro, R. Portillo, and M.A.M Prats, “The Age of Multilevel Converters Arrives”, IEEE Industrial  Electronics Magazine, vol. 2, No. 2, June 2008, pp 28–39.

5.        J.-S. Lai and F. Z. Peng, “Multilevel converters—A new breed of power converters”, IEEE Transactions on  Industry  Applications,  vol. 32, No. 3, May 1996, pp 509–517.

6.        Shivkumar E.G, Gopakumar. K, Sinha S.K, Andre Pittet, and Ranganathan V.T, “Space Vector PWM control of dual inverter fed open- end winding induction motor drive”, Proc. Applied Power Electronics Conf (APEC), 2001, pp 399-405.

7.        Shivkumar E.G, Somasekhar V.T, Krushna K, Mohapatra K, Gopakumar. K, Umanand L, and S.K. Sinha, “A multilevel space phasor based PWM strategy for an  open- end winding induction motor drive using two inverters with different DC link voltages”,  Proc. IEEE PEDS,  2001, pp 169-175.

8.        V.T.Somasekhar, K.Gopakumar, M.R.Baiju, Krishna K.Mohapatra, and L.Umanand, “A Multilevel Inverter System for an Induction Motor with Open-end Windings”, IEEE Transactions on Industrial Electronics, vol.52, No.3, June 2005, pp 824-836.

9.        M.R.Baiju, K.K.Mohapatra and K.Gopakumar,“PWM Signal Generation for Dual Inverter Fed Open-end Winding Induction Motor Drive Using Only the Instantaneous Reference Phase Amplitudes”. Pro. IEEE   PEDS, 2003, pp 450-455.

10.     Anish Gopinath, Aneesh Mohamed A.S and M.R.Baiju, “Fractal Based Space Vector PWM for Multilevel Inverters – a Novel Approach”,  IEEE Transactions on Industrial Electronics, vol.52, No. 4, April 2009, pp 1230-1238.   

11.     N.Celanovic and Dushan Boroyevich, “A Fast Space-Vector Modulation Algorithm for Multilevel Three-Phase Converters”, IEEE Transactions on Industry
Applications, vol.37, No.2, March/April 2001, pp 637-641.

12.     Wenxi Yao, Haibing Hu and Zhengyu Lu, “Comparison of Space Vector Modulation and Carrier based Modulation of Multilevel Inverter”, IEEE Transactions on Power Electronics, vol.23,No.1, January 2008, pp 45-51.

13.     Sanmin Wei, Bin Wu, Fahai Li and Congwei Liu, “A General Space Vector PWM Control Algorithm for Multilevel Inverters”, Proc. APEC, 2003, pp 562-568.

14.     P.F Seixas, M.A. Severo Mendes, P.Donoso Garcia, A.M.N. Lima, “A Space Vector PWM Method for Three-Level Voltage Source Inverters”,  Proc. APEC, 2000, vol.1, pp 549-555.

15.     Joohn-Sheok Kim, Seung-Ki Sul, “A Novel Voltage Modulation Technique of the Space Vector PWM”, IPEC Yokohama-1995,  pp 742-747.

16.     Aneesh Mohamed A.S, Anish Gopinath and M.R.Baiju, “A Simple Space Vector PWM Generation for any General N-Level Inverter”,  IEEE Transactions on Industrial Electronics, vol.56,No. 5, May 2009, pp 1649-1656.


119-127

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Abhimanyu Kanneganti, Manasa, Prathyusha Doddapaneni

Paper Title:

A Sustainable Approach Towards Synthesis of Moo3 Nanoparticles using Citrus Limetta Pith Extract

Abstract:   Our research focused on a sustainable approach for synthesis of molybdenum trioxide nanoparticles, which can be utilized in oxidation catalyst and electrochemical devices research. This study reports the exploit of pith, generally considered as waste, to prepare an aqueous extract of citrus limetta as an eco-friendly agent for synthesis of MoO3 nanoparticles. The obtained product was subjected to X-ray diffraction analysis to confirm the formation of MoO3 nanoparticles by comparing the peak values with JCPDS software which matched with JCPDS card no.35-0609. The transmission electron microscope micrographs were analyzed to study the size and morphology of the nanoparticles. The absorbance spectrum of MoO3 nanoparticles was studied using the UV-spectroscopy and the absorbance peak was observed at 257nm. The functional groups present in the final product were studied using Fourier transform infrared spectroscopy.

Keywords:
 sustainable approach, molybdenum trioxide nanoparticles, green synthesis, citrus limetta.


References:

1.        ARNAB  GANGULY  and  RAJI  GEORGE "Synthesis, characterization and gas sensitivity of MoO3 nanoparticles" Bull.  Mater.  Sci.,  Vol.  30,  No.  2,  April  2007,  pp.  183-185.  ©  Indian  Academy  of  Sciences.
2.        F.A. Deorsola a, N. Russo a, G.A. Blengini b, D. Fino "Synthesis, characterization and environmental assessment of nanosized MoS2 particles for lubricants applications" Chemical Engineering Journal 195-196 2012 1-6.

3.        J. Sivakumar, C. Premkumar, P. Santhanam and N. Saraswathi (2011)," Biosynthesis of Silver Nanoparticles Using Calotropis gigantean Leaf", African Journal of Basic & Applied Sciences, Vol. 3, No.6, pp. 265-270.

4.        Ravindra P. Singh, Vineet K. Shukla, Raghvendra, S. Yadav, Prashant K. Sharma, Prashant K. Singh, Avinash C. Pandey (2011), "Biological approach of zinc oxide nanoparticles formation and its characterization", Advanced Materials Letters, Vol. 2 No.4, pp.313-317.

5.        M. Zheng, F. Davidson, and X. Huang, J. Am. Chem. Soc. 125, 7790 (2003).

6.        Gyu-Chul Y, Chunrui W. and Won Il P. "ZnO nanorods: synthesis, characterization and applications" Semicond. Sci. Technol, 20, S22, 2005.

7.        J. Sivakumar, C. Premkumar, P. Santhanam and N. Saraswathi (2011), Biosynthesis of Silver Nanoparticles Using Calotropis gigantean Leaf, African Journal of Basic & Applied Sciences, Vol. 3, No.6, pp. 265-270.

8.        Sheldon R A and Dakka 1994 J. Catal. Today 19 215

9.        Ravindra P. Singh, Vineet K. Shukla, Raghvendra, S. Yadav, Prashant K. Sharma, Prashant K. Singh, Avinash C. Pandey (2011), Biological approach of zinc oxide nanoparticles formation and its characterization, Advanced Materials Letters, Vol. 2 No.4, pp.313-317.

10.     D. C. Reynolds, D. C. Look, B. Jogai, J. E. Hoelscher, R. E. Sheriff, M. T. Harris, and M. J. Callahan, J. Appl.Phys. 88, 2152 (2000).

11.     Chen, Y.B., D.M.; Koh, H.J.; Park, K.T.; Hiraga,K.; Zhu, Z.; Yao, T., Plasma assisted molecular beam epitaxy of ZnO on c-plane sapphire :Growth and characterization. J. Appl. Phys., 1998. 34: p. 3912-3918.

12.     M. S. Tokumoto, V. Briois, and C. V. Santilli, J. Sol-Gel Sci. Technol. 26, 547 (2003).


128-130

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Jnana Ranjan Tripathy, Hrudaya Kumar Tripathy, S.S.Nayak

Paper Title:

Artificial Neural Network Implementation in Microchip PIC 18F45J10 8-Bit Microcontroller

Abstract:   Implementing neural networks on an 8-bit microcontroller with limited computing power presents several programming challenges. In order for the network to perform as quickly as possible, creating the software at the assembly level was chosen. Writing the software in assembly allows a level of customization that cannot be achieved with C. However, the need for hardware portability was also a motivating factor and a more generic C implementation was also created. It was also very important to manually manage the very limited amount of data memory. Several assembly routines were created with this purpose in mind. A pseudo floating point arithmetic protocol was created exclusively for neural network calculations along with a multiplication routine for multiplying large numbers. A tanh compatible activation function was also needed. The final procedure is capable of implementing any neural network architecture on a single operating platform.

Keywords:
 Neural Architecture (NA), Microcontroller, Embedded C, Pseudo Floating Point, Activation Function


References:

1.       A. M. Zin, M. Rukonuzzaman, H. Shaibon, and K. I. Lo, "Neural network approach of harmonics detection," in Proc. Int. Conf. Energy Management and Power Delivery EMPD '98, 1998, pp. 467-472.
2.       H. C. Lin, "Dynamic power system harmonic detection using neural network," in Proc. IEEE Conf. Cybernetics and Intelligent Systems, 2004, pp. 757-762.

3.       S. Osowski, "Neural network for estimation of harmonic components in a power system," IEE Proceedings C Generation, Transmission and Distribution, vol. 139, pp. 129-135, 1992.

4.       Z. Jin and B. K. Bose, "Neural-network-based waveform Processing andDelayless filtering in power electronics and AC drives," Industrial Electronics, IEEE Transactions on, vol. 51, pp. 981-991, 2004.

5.       M. J. Embrechts and S. Benedek, "Hybrid identification of nuclear power plant transients with artificial neural networks," Industrial Electronics, IEEE Transactions on, vol. 51, pp. 686-693, 2004.

6.       L. Hsiung Cheng, "Intelligent Neural Network-Based Fast Power SystemHarmonic Detection," Industrial Electronics, IEEE Transactions on, vol. 54, pp. 43-52, 2007.

7.       H. C. Lin, "Intelligent Neural Network-Based Fast Power System Harmonic Detection," IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, vol. 54, pp. 43-52, 2007.

8.       W. Qiao and R. G. Harley, "Indirect Adaptive External Neuro-Control for a Series Capacitive Reactance Compensator Based on a Voltage Source PWM Converter in Damping Power Oscillations," IEEE Transactions on Industrial Electronics, vol. 54, pp. 77-85, 2007.

9.       B. Singh, V. Verma, and J. Solanki, "Neural Network-Based SelectiveCompensation of Current Quality Problems in Distribution System," IEEE Transactions on Industrial Electronics, vol. 54, pp. 53-60, 2007.

10.     S. S. Ge and W. Cong, "Adaptive neural control of uncertain MIMO nonlinear systems," Neural Networks, IEEE Transactions on, vol. 15, pp. 674-692, 2004.

11.     E. B. Kosmatopoulos, M. M. Polycarpou, M. A. Christodoulou, and P. A.Ioannou, "High-order neural network structures for identification of dynamical systems," Neural Networks, IEEE Transactions on, vol. 6, pp. 422-431, 1995.


131-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Srikantarao S, Radhika K R

Paper Title:

Overview of Sap Hana: In-Memory Computing Technology and ITS Applications

Abstract:   Traditional database management systems are designed for optimizing performance on hardware with constrained main memory. Disk I/O was the main bottleneck. The focus was on optimizing disk access, where by minimizing the number of disk pages to be read into main memory during processing. The SAP HANA database is designed from the ground up around the idea that memory is available in abundance. Instead of optimizing I/O hard disk access, SAP HANA optimizes memory access between the CPU cache and main memory. SAP HANA is a massively parallel (distributed) data management system that runs fully in main memory, allowing for row- and column based storage options, and supporting built-in multitenancy.

Keywords:
 High-Performance Analytic Appliance (HANA), Structured query language (SQL), multidimensional expression (MDX), Online transaction processing (OTLP),  Online analytical processing (OLAP).


References:

1.        http://www.decisionfirst.com/uploads/SAP%20HANA/SAP_HANA_Technical_Overview.pdf
2.        http://help.sap.com/hana/SAP_HANA_Modeling_Guide_en.pdf

3.        http://docs.media.bitpipe.com/io_10x/io_109274/item_671528/VCE_sSAP_IO%23109274_E-Guide_042313.pdf

4.        http://help.sap.com/hana_one/SAP_HANA_Developer_Guide_en.pdf

5.        http://www.sap.com/pc/tech/cloud/software/business-management-bydesign/overview/index.html

6.        http://www.news-sap.com/indian-cricketing-franchisee-teams-sap-hana/

7.        http://help.sap.com/hana/SAP_HANA_Master_Guide_en.pdf
8.        http://help.sap.com/hana/SAP_HANA_Security_Guide_en.pdf

136-139

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

D.G.Wadnere, G.A.Wadnere

Paper Title:

PC based Digital Sound Level Analyzer

Abstract:  Sound energy meters measures sound pressure level & are used in noise pollution studies.Most of the sound level meters are hand held,battery powered devices & are often limited in functionality beacause of poor processing power limited storage & poor display. A Pc based sound level meter will not only overcome these limitation but more advanced functionalities can be implemented in it. Ac signal from microphone is converted into DC.It will make use of MAX187,Max 232 & LM 358 ICs as main component for converting sound into digital signal.The working of this meter will confirm the noise levels as per environments. It is easy to use & has small package size. This circuit is ideal for the circuits where power consumption & space are crucial.This project also is able to detect ,analyze & matches the frequency of a particular human being as per our requirements. This project is basically design for classroom application

Keywords:
 LM 358, MAX 187,MAX 232,Sound energy meter.


References:

1.        Matthew Reynolds ,Richard Blair, Jonathan crossland, thearon wills, visual basic.net.
2.        Jhon Kauffman & briann Mastic ,beginning SQL programing.

3.        Rajan parekh,Multimedia techniques.

4.        Prokies & Monolakis, Digital Signal Processing.

5.        hhtp://en.wikipedia.org/wiki/COM(hardware_interface).htm

6.        investissements.com/sound-1f493-level-meter-c

7.        http://www.studiosixdigital.com/audiotools/

8.        http://www.virtins.com/

9.        P. S. Damle , U. Kheere and A. Patil  "Effects of modulated pure tone (400/ 406 Hz) on the memory function, as tested by psychological methods",  Indian Journal of Psychology,  1994.

10.     O. Lippold  The origin of the Alpha rhythm,  1975 :Churchill Livingstone.

11.     E. R. Kandel and S. Schwartz  Principles of Neural Science,  pp.810 -814 1985 :EISEVIER.

140-141

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Monowar Hussain, Arnab Paul

Paper Title:

A Survey on Graph based Web Service Discovery and Composition Techniques

Abstract:   Web Service composition technique provides the features to users that an individual web service cannot perform. There are several web services available over the web for performing different tasks. When there is no unique service capable of performing user request, there must be some way to sufficiently compose basic services to satisfy the user’s request. Now it becomes very important to determine which service composition system is the most efficient one. This paper presents the requirement for service composition, the required technologies to perform service composition. It also provides several different graph based web service composition techniques. At service composition time, the composition of these services depends on the requester’s inputs, outputs parameters and other non-functional parameters. Web service composition is a difficult task due to the asymmetric nature of results of the various services. In order to evaluate the best approach, various composition approaches were justified. We consider number of comparative parameters for evaluating the best composition plan.

Keywords:
 Web Services, Semantic Web Services, Web Service Discovery, Graph Based Web Service Composition.


References:

1.        Schahram Dustdar and Wolfgang Schreiner, “A Survey on Web Services Composition”, Int. J. Web and Grid Services, Vol. 1, No. 1, 2005.
2.        D. Brickley and R. V. Guha, “Resource Description Framework (RDF)   Vocabulary Description Language (Version 1.0): RDF Schema,  2004”, Available: http://www.w3.org/TR/rdf-schema/

3.        Maurice H. ter Beek, Antonio Bucchiarone, and Stefania Gnesi, “A Survey on Service Composition Approaches: From Industrial Standards to Formal Methods”, In Proceedings of the Second International

4.        Conference on Internet and Web Applications and Services (ICIW '07),Washington, DC, USA, 2007 © IEEE Computer Society, doi:10.1109/ICIW.2007.71

5.        Narges Hashmi Rostami , Eshmaeil Kherkha and Mehrad Jalali, “Web Services Composition Methods and Techniques: A Review”, IJCSEIT: International Journal of Computer Science, Engineering and Information Technology, Vol. 3, No. 6, December 2013  

6.        Qianhui Althea Lang, “AND/OR Graph and Search Algorithm for Discovering Composite Web Services”, International Journal of Web Services Research, 2(4), pp.
46-64, October-December 2005.

7.        Hajar Elmaghraoui, Imane Zaoui, Dalila Chiadmi and Laila Benhlima, “Graph based E-Government Web Service Composition”, IJCSI: International Journal of Computer Science Issues, Vol. 8, Issue 5, No. 1, September 2011, ISSN (Online): 1694-0814

8.        M. Paolucci et al., “Semantic Matching of Web Services Capabilities”, In First International Semantic Web Conference, Sardinia, Italy, 2002, pp. 333-347.

9.        Chaker Ben Mahmoud, Fathia Bettahar, Hajer Abderrahim and Houda Saidi, “Towards a Graph Based Approach for Web Services Composition”, IJCSI: International Journal of Computer Science Issues, Vol. 10, Issue 1, No. 3, January 2013, ISSN (Print): 1694-0784 | ISSN (Online): 1694-0814

10.     Seyyed Vahid Hashemian and Farhad Mavaddat, “A Graph-Based Approach to Web Services Composition”, In Proceedings of the 2005 Symposium on Applications and the Internet (SAINT’05)

11.     H. N. Talantikite et al., “Semantic Annotations for Web Services      Discovery and Composition”, Computer Standards Interfaces, 31(6), 1108-1117, Elsevier B.V, 2009.

12.     I. B. Arpinar et al., “Ontology-driven Web Services Composition Platform”, Inf. Syst. E-Business Management, 2005, 3(2):175–199

13.     Aydogan, H. Zirtiloglu, “A Graph-based Web Service Composition Technique using Ontological Information”, 2007, Vol. 0. Los Alamitos, CA, USA: IEEE Computer Society, pp. 1154–1155.

14.     J. Gekas, M. Fasli, “Automatic Web Service Composition based on Graph Network Analysis Metrics”, In Proceedings of the International Conference on Ontology, Databases and Applications of Semantics (ODBASE), Agia Napa, Cyprus, 2005, pp. 1571-1587

15.     Nacera Temglit, Mohamed Ahmed Nacer, “Graph Based Approach for Dynamic Discovery of Composite Web Services” In 2012 IEEE Conference on Open Systems (ICOS), Kuala Lumpur, Malaysia, Print ISBN: 978-1-4673-1044-4, 2012 © IEEE Computer Society, doi: 10.1109/ICOS.2012.6417635

16.     Seog-Chan Oh et al., “BF*: Web Services Discovery and Composition as Graph Search Problem”, In Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE-05), 2005 © IEEE Computer Society, Print ISBN: 0-7695-2274-2, doi: 10.1109/EEE.2005.41

17.     Kun Yue, Mingliang Yue, Weiyi Liu and Xiong Li, “A Graph-Based Approach for Type Matching in Web Service Composition”, Journal of Computational Information Systems 6:7(2010) 2141-2149, ©2010 Binary Information Press, Available: http://www.jofcis.com

18.     Antonio Bucchiarone, “A Survey on Services Composition Languages and Models”, International Workshop on Web Services Modeling and Testing (WS-MaTe 2006)


142-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Geeta, Puja Kumari Singh

Paper Title:

Electromagnetic Radiation Influencing Stomatal Patterning in Oxalis Corniculata L

Abstract:   This paper attempts for assessing the effect of Electromagnetic field and low intensity radiations from haphazardly erected network of cell towers on some  plants which are being exposed continuously in their natural habitat. Although the electrosmog being unsmelt and unfelt, its potential harm over long periods of exposure could be realized  on plants in the manifestation of morphological and biochemical disorders.  Such kind of manifestations when aimed at Oxalis corniculata at various distances from cell tower positively indicated in its stomatal patterning. Increased stomatal density and stomatal index at certain distances followed by a sharp fall in values compels to think that this invisible threat has become a new environmental challenge.

Keywords:
 EMF, Exposure, Radiation,Stomatal patterning


References:

1.       Rodenburg, J., C.R. Riches and J. M. Kayeke.2010.Addressing current and fiture problems of parasitic weeds in rice. Crop prot., 29: 210-221.
2.       Barber, J. L., Thomas, G. O., Kerstiens, G., and K. C. Jones(2004). Current issues and uncertainties in the measurement and modelling of air-vegetation exchange and within-plant processing of POPs. Environmental Pollution. 128, 99-138.

3.       Kasevich RS, 2000. Cell Towers, Wireless Convenience or Environmental Hazards? Proceedings of the “Cell Towers Forum” State of the Science/State of the Law. Chapter 11, Levitt BB (Ed.), Canada: New Century Publishing, pp. 170–175.

4.       Chatterjee, A., and Kar, S.S., Radio Frequency – A blessing or a curse. Every man’s Science , vol .XLVIII No. 5, Dec’13- Jan’14, 370-374.

5.       Jones, H.G. (1987). Breeding for stomatal characters. In: Stomatal Function, Zieger, E.,Farquhar, G.D. and Cowan, I.R. (eds). Stanford University Press, Stanford (CA), pp. 431-443.

6.       PARIVESH  newsletter ,2010. Mobile tower installations in INDIA & its impact on environment.Central pollution control board.

7.       Lake et.al , Nature , 411 : 154, 10th May 2001.

8.       Levitt BB, Lai H, 2010. Biological effects from exposure to electromagnetic radiation emitted by cell tower base stations and other antenna arrays. Canada: NRC Research Press, 369–395.

9.       Kumar N, Kumar G, 2009. Biological effects of cell tower radiation on human body. Electrical engineering department, IIT Bombay. December 16–19, ISMOT, 2009, New Delhi, India.

10.     Havas M, 2006. Electromagnetic hypersensitivity: biological effects of dirty electricity with emphasis on diabetes and multiple sclerosis. Electromagnetic Biology and Medicine, 25: 259–268.


147-150

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Avinash Kadam, Pravin Hujare

Paper Title:

Optimization of Segmented Constrained Layer Damping Literature Review

Abstract:   constrained layer damping has extensively used since many years to damp flexural vibrations by producing shear forces in between constraining and constrained layer. This creates shear deformation is responsible for dissipation of vibration energy. CLD is a sandwiched structure of viscoelastic material between upper constraining layer and base layer. Enhancing the results of damping efficiency of CLD can be achieved by cutting constraining and constraining layer, this is called as segmentation. The main objective of this paper is to provide guidelines for optimization of segmentation of viscoelastic material in between composite structure.

Keywords:
 Constrained Layer Damping, Damping, Optimization, Vibration Control.


References:

1.       Kerwin, “Damping of Flexural Vibrations by means of Constrained Viscoelastic Laminate,” Journal of Acoustic Society of America, 1959, pp. 952-962.
2.       Gerald Kress, “Optimization of Segmented Constrained Layer Damping with Mathematical Programming Using Strain Energy analysis and Modal data” Elsevier, Material & Design, 2009.

3.       Ross, E. Unger, Kerwin, “Damping of Flexural Vibrations by Means of Viscoelastic laminate” Structural Damping, ASME, New York,1959.

4.       Palash Dewangan, “Passive Viscoelastic Constrained Layer Damping for Structural Application,” Thesis, NIT Raurkela, May, 2009.

5.       Ramji Koona, Ganesh Kumar, M. Lavnya“Optimization of Surface Damping Treatments for Random Vibration Control,”https://www.pdfe2ce.org/pdf-1217498/

6.       A. L. Marujo, P. Martins, C. A. Mota Sores, "Damping Optimization of Viscoelastic Laminated Sandwich Composite Structure," Springer-Verag 569-579, May, 2009.

7.       Takao Yamgunch, A. Shigeo, Akira Mabuchi, “Study on Evaluation Method for Vibration Damping Material” SAE 901756.

8.       Plunket, C. T.  Lee, “Length Optimization of Constrained Viscoelastic Layer Damping” Journal of the Acoustic Society of America, 48(1), Part2: 150-161.

9.       Vasudeven Rajamohen, “Segment Optimization of a Rotating Viscoelastic Constrained Layer Damping treatment,” Journal of Sound and Vibration, IMCE-63399, 2011.

10.     D. J.  Mead, Markus, “The Forced Vibration of a three Layer Damped Sandwich Beam with Arbitrary Boundary Conditions” Journal of Sound and Vibration, 10(2), 1969.

11.     Hasan Koruk, Kenan Y. Sanliturk, “On measuring dynamic properties of damping materials using Oberst beam method”, Journal Sound and Vibration, 2010, ESDA-24452.

12.     P. Bangarubabu, K. Kishore Kumar, Y. Krishna, “Damping effects of viscoelastic materials on sandwich beams”, ICTIME, 2012.


151-153

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Pramod Patil, Ashish Patel, Parag Kulkarni

Paper Title:

Density-Based Clustering Based on Probability Distribution for Uncertain Data

Abstract:   Today we have seen so much digital uncertain data produced. Handling of this uncertain data is very difficult. Commonly, the distance between these uncertain object descriptions are expressed by one numerical distance value. Clustering on uncertain data is one of the essential and challenging tasks in mining uncertain data. The previous methods extend partitioning clustering methods like k-means and density-based clustering methods like DBSCAN on uncertain data based on geometric distances between objects. Such method facing the problems with the data that they cannot handle uncertain objects that are geometrically indistinguishable ( such as weather data across the world at same time). In this paper, we model uncertain objects in both continuous and discrete domains with the help of probability distribution. We use Kullback-Leibler divergence to measure similarity between uncertain objects in both the continuous and discrete Values, and integrate that into partitioning and density-based clustering methods to cluster uncertain objects. We first find out uncertain objects and then we cluster uncertain data according to partitioning based clustering. Then remaining data we clustered by using any traditional method of clustering.

Keywords:
 Clustering, Uncertain Data, Probabilistic Mass Function, Probabilistic Density Estimation, Fast Gaussian Transform.


References:

1.       Jiang, Jian Pei, Yufei Tao, Member and XueminLin,”Clustering Uncertain Data Based on Probability Distribution Similarity,”IEEE TRANSACTIONS ON KDE, VOL. 25, NO. 4, APRIL 2013.
2.       H. P. Kriegel and M. Pfeifle,” Hierarchical Density-Based Clustering of Uncertain Data,” Proc. IEEE Int’l Conf. Data Mining(ICDM).

3.       S. Kullback and R.A. Leibler, “ On Information and Suffficiency,” The Annals of Math Statistics.

4.       J. Han and M. Kambler Data Mining: Concept and Techniques.

5.       M. Ester, H-P. Kriegel, J. Sander and X.Xu,”A Density-Based Algorithm for Discovering Clusters in Large  Spatial databases with Noise,” Published in Proceedings of 2nd International Conference on Knowledge Discovery and Data Mining (KDD-96).

6.       T. Imielinski and W. L. Lipski Jr.,” Incomplete Information in relational Databases,” J. ACM , vol. 31,pp. 761-791,1984.

7.       J.B. MacQueen,” Some Methods for Classification and Analysis of Statistics and Probability, 1967.

8.       W.K.Ngai,B. Kao,C.K. Chui,R,Cheng,M,Chau and K. Y. Yip,”Efficient Clustering of Uncertain Data,” Proc. Sixth Int’l Conf. ICDM,2006.

9.       J.M. Ponte and W. B. Croft,”A Language Modeling Approach to Information Retrival,” Proc. 21st Ann. Nt’l ACM SIGIR Conf. Research and Development in Information Retrieval (SIGIR),1998.

10.     D.W. Scott, Multivariate Density Estimation: Theory, Practical and Visualization,Wiley,1992.

11.     B.W. Silverman, Density Estimation for Statistics and Data Analysis. Chapman and Hall,1986

12.     J. Xu and W.B. Croft,” Cluster-Based Language Models for Distributed Retrival,” Proc. 22nd Ann, Int’l ACM SIGIR,1999.

13.     C. Yang R. Duraiswami NA. Gumerov and L.S. Davis,” Improved Fast Gauss Transform and Efficient Kernel Density Estimation,” Proc. IEEE Int’l Conf. Computer Vision (ICCV) 2003.


154-158

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Neha Bansal, Ashish Chaudhari, Manish Mishra, Jenish K Jadav

Paper Title:

Fabrication of a Cost effective Automatic Dual/Single Axis Active Solar Tracker with Built in Inverter Designed for Grid Connectivity and Standalone Systems

Abstract:   In our Dual axis automatic solar tracker project, AT89S52 micro-controller has been used. Four photo-sensors (LDR VAC54) are used for sensing the sunlight to know sun’s movement. Two gear motors (12V, 300 rpm) are there to rotate the solar panel (E-W and N-S) as the sun changes its direction. ADC chip 0808 is used to decode analog voltage to digital voltage. PROTEUS software coding has been used for designing and simulating the tracker. Photo sensors, battery charging level and solar panel voltage will be monitored by the micro-controller through ADC chip. Attempts have been made to make this pilot project cost-effective with successful completion for standalone systems and can be expanded further for grid connectivity.

Keywords:
 Dual/Single axis solar tracker, ADC, Crystal Oscillator, multi-vibrator, micro-controller, PCB, Gear motors, Inverter, Proteus software simulation.


References:

1.       Modi V, Sukhatme and S.P., “Estimation of daily total and diffuse insolation in India from weather data”, Solar Energy, vol. 22, p. 407, 1979.
2.       Sukhatme, S.P., Solar Energy: Principles of Thermal Collection and Storage, Tata Mc Graw Hill publication, New Delhi, 2nd ed., 1984.

3.       ADC0808 / ADC0809 datasheet,  National semiconductor corporation.

4.       Chintan, S.S. and Solanki, C.s.,“Experimental evaluation of V-trough PV concentrator system using commercial PV modules”,Solar Energy Materials and Solar cells, vol. 91, p.453, 2007.

5.       http://www.allearthrenewables.com/products/solar/

6.       C. Sungur, “Multi-Axes Sun-Tracking System with PLC Control for Photovoltaic Panels in Turkey”,RenewableEnergy,34(2009), pp. 1119–1125.


159-162

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Umesh Kumar, Praveen Kumar, Sapna Gambhir

Paper Title:

Analysis and Literature Review of IEEE 802.1x (Authentication) Protocols

Abstract:   This paper gives us detailed study of some of the commonly used EAP authentication protocol. But before understanding these authentication methods we have to understand what EAP is and how EAP work because it’s all start with EAP. So our aim in this paper is to provide detailed study of EAP and its architecture. This paper also covers literature review of authentication protocols. EAP is a frame work and it consists of different types of protocols nearly forty but we will study only those protocols which are very common in use and also their advantages and disadvantages.

Keywords:
 EAP, MD5, LEAP, TLS, TTLS, PEAP.


References:

1.       Jyh-Cheng and Yu-Ping Wang “Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience” IEEE DEC 2005 ISSN 0163-6804/05.
2.       C.Rigney, et al, “Remote Authentication Dial User Service (RADIUS),” IETF RFC, June 2000.

3.       Samuel Sotillo “Extensible Authentication Protocol (EAP) Security Issues” Dept. of Technology System East Carolina University.

4.       Kshitij R.Mawale, Dhananjay M.Dakhane and Ravindra L.Pardhi “Authentication Methods for WiFi Networks” IJAIEM Vol. 2, Issue 3 ISSN 2319-4847 March 2013. 

5.       B. Aboba and D. Simon “PPP EAP TLS Authentication Protocol” IETF RFC 2716, October 1999.

6.       Bahareh Shojaie, Iman Saberi, Mazleena Salleh, Mahan Niknafskermani and Seyyed Morteza Alavi “Improving EAP-TLS Performance Using Cryptographic Methods” International conference on computer & Information Science 2012.

7.       Khidir M.Ali and Ali Al-Khalifah “A Comparative Study of Authentication Methods for Wi-Fi Networks” 3rd ICCICSN November 2011.

8.       Bakytbek Eshmurzaev and Gokhan Dalkilic “Analysis of EAP-FAST Protocol” 34th  int. Conf. on Information Technology Interfaces Cavtat, Croatia 2012

9.       Kwang-Hyun Baek, Sean W. Smith, David Kotz “A Survey of WPA and 802.11i RSN Authentication Protocols” Dartmouth Collage Computer Science TR2004-524 November 2004.

10.     B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H. Levkowetz, Ed “Extensible Authentication Protocol (EAP)  ” IETF RFC 3748 June 2004

11.     Jyh-Chen and Yu-Ping Wang “Extensible Authentication Protocol (EAP) and IEEE 802.1x: Tutorial and Empirical Experience ” IEEE Dec 2005 ISSN 0163-6804/05.

12.     Bahareh Shojaie, Iman Saberi , Mazleena Salleh “Improving EAP-TLS Performance Using Cryptographic Methods ” International Conference on Computer & Information Science 2012.

13.     Bakytbek Eshmurzaev and Gokhan Dalkilic “Analysis of EAP-FAST Protocol ” 34th Int. Conf. on Information Technology Interfaces  Cavtat , Croatia June 2012.

14.     Khidir M. Ali and Ali Al-Khalifah “A Comparative Study of Authentication Methods For Wi-Fi Networks ” 3rd International Conference on Computational Intelligence communication System and Network 2011.

15.     C. Shyamala Kumari and M. Deepa Rani “Hacking Resistance Protocol For Securing Passwords Using Personal Device ” IEEE Dec 2012 ISSN 978-1-4673-4603-0/12.

16.     Albert Fernandez-Mir, Jordi Castella-Roca and Alexandre Viejo “Secure and Scalable RFID Authentication Protocol ” Springer-Verlag Heidelberg 2011.

17.     Jing-Wei Zhou and Sheng-Ju Sang “Analysis and Improvements of PEAP Protocol in WLAN ”International Symposium on Information Technology in Medicine and Education 2012.

18.     P. Bachan and Brahmjit Singh “Performance Evaluation of Authentication Protocols for IEEE802.11 Standard ” Int’I Conf. on Computer & Communication Technology [ICCCT’ 10] 2010.

19.     Kenneth G. Paterson and Douglas Stebila “One-Time-Password-Authentication Key Exchange” Springer- Verlag Berlin Heidelberg 2010.

20.     Bayalagmaa Davaanaym  , Young Sil Lee , Hoonjae Lee , SangGon Lee and Ho Teak Lim “A Ping Pong Based One-Time-Passwords Authentication System ” 5th International Joint Conference on INC, IMC and IDC 2009.

21.     Thomas Guillet, Rim Moalla , Ahmed Serhrouchni , Abdelatif Obaid “SIP Authentication Based on HOTP ” IEEE 2009 ISSN 978-1-4244-4657-5/09.

22.     Wen-Bin Hsieh and Jenq-Shiou Leu “Design of a Time and Location Based One-Time Password Authentication Scheme” IEEE 2011 ISSN 978-1-4577-9538-2/11.

23.     LI TongLiang and JIN ZhiGang “A New Low Cost One Time ID and Password Authentication Protocol Using Popular Removable Strong Devices ” 2nd international conf. on Intelligent Networks and Intelligent System  2009.

24.     Anjali K. Rai, Shivendu Mishra and Vimal Kumar “Strong Password Based EAP-TLS Authentication Protocol for WiMAX” International Journal on Computer Science and Engineering Vol. 02,No. 08, 2010, 2736-2741.

25.     Myeonggil Choi, Nguyen Manh Thang “An Exensible Authentication Protocol with Transport Layer Security and One Time Password in Multi Hop Mesh Network” Recent Researches in Business Administration, Finance and Product Management ISSN: 978-960-474-265-3.

26.       N. Asokan, Vaitteri Niemi, Kaisa Nyberg “Man-in-the Middle in Tunneled Authentication Protocols” Nokia Research Centre , Finland, November 2002.

27.     Mark Vandenwauver, Rene Govaerts and Joos Vandewalle “Overview of Authentication Protocols” Katholieke Universiteit Leuven, Belgium.

28.     Secure and Inclusive Authentication with a Talking Mobile One-Time-Password Client “Kristin S. Fuglerud and Oystein Dale” IEEE ISSN 1540-7993/11 March 2011.

29.     Kwang-Hyun Baek, Sean W. Smith, David Kotz “A Survey of WP A and 802.11i RSN Authentication Protocols” Dartmouth College Computer Science Technial
Report TR2004-524 November 2004.

30.     Shuhua Wu and Yuefei Zhu “Improved Two-Factor Authenticated Key Exchange Protocol” The International Arab Journal of Information Technology, Vol. 8, No. 4, October 2011

31.     Swati ukhija and Shilpi Gupta “Wireless Network Security Protocols A Comparative Study” International Journal of Engineering Technology and Advance Engineering ISSN: 2250-2459,   Vol. 2, Issue 1, January 2012.


163-168

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

Abhishek Vyas, S.S. Dhakad

Paper Title:

Microstrip Patch Antenna Loaded with Shapes of Triangle and Circle using Metamaterial Structure

Abstract:   In this paper, proposed Rectangular microstrip patch antenna loaded with metamaterial structure is used for bandwidth improvement at dual band operation. The proposed antenna is designed at a height 3.2 from the ground plane by using CST MICROWAVE STUDIO. The bandwidth of Microstrip patch antenna is 12 MHz and return loss is -10.36 dB at dual band.The bandwidth of desired antenna is increased up 22.8MHz at 1.824 GHz. and up 56.2 MHz at 2.85 GHz. The return loss of proposed antenna is reduced up to -36.922 dB at 1.824 GHz and up to -29dB at 2.85 GHz. This proposed design has small size, easy to fabricate and better directivity.

Keywords:
 Recangular microstrip patch antenna(RMPA), Impedance Bandwidth , Metematerials


References:

1.        IEEE standard definitions of terms for antennas, IEEE Std 145-1983, 1983.
2.        Y. P. Zhang and J. J. Wang, "Theory and analysis of differentially-driven microstrip antennas," IEEE Transactions on Antennas and Propagation, vol. 54, pp. 1092-1099, 2006.

3.        H.A. Jang, D.O. Kim , and C. Y. Kim “ Size Reduction of Patch Antenna Array Using CSRRs Loaded Ground Plane” Progress In Electromagnetics Research Symposium Proceedings, KL, MALAYSIA, March 27-30, 2012 1487.

4.        Veselago, V. G., The electrodynamics of substances with simultaneously negative values of ɛ and µ" Soviet Physics Uspekhi, Vol. 10, No. 4, 509-514, 1968.

5.        Kuo, Y. L. and K. L. Wong, Printed double-T monopole antenna for 2.4/5.2 GHz dual-band WLAN operations," IEEE Trans. Antennas Propag., Vol. 51, No. 9, 2187-2192.

6.        SKRIVERVIK, A. K., ZÜRCHER, J.-F., STAUB, O., MOSIG, J. R, PCS antenna design: The challenge of miniaturization. IEEE Antennas and Propoation Magazine, 2001, vol. 43, no. 4, p. 12–26.

7.        HIRASAWA, K. Small antennas for mobile communications. In Proceedings Antenn00, Nordic Antenna Symposium. Lund (Sweden), 2000, p. 11–15.

8.        Constantine A. Balanis, Antenna Theory and Design, John Wiley & Sons, Inc., 1997.

9.        W.L. Stutzman, G.A. Thiele, Antenna Theory and design, John Wiley & Sons, 2nd Ed., New York, 1998.

10.     Bhim Singh., Dr. Rekha Gupta, Neelima Chaudhary, Sapana Yadav,   “Rectangular microstrip patch antenna loaded with symmetrically cut  H and Hexagonal shaped metamaterial structure  for bandwidth improvement at 1.794 GHz” International Journal of Advanced Technology & Engineering Research ,Volume 2, Issue 5, Sept 2012.


169-172

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Samir S. Khalse, Dhondiram M. Kakre

Paper Title:

Computer Oriented Load Flow Study of Five Bus System using Matlab

Abstract:   Power flow analysis is the backbone of power system analysis and design. They are necessary for planning, operation, economic scheduling and exchange of power between utilities. The principal information of power flow analysis is to find the magnitude and phase angle of voltage at each bus and the real and reactive power flowing in each transmission lines. Power flow analysis is an importance tool involving numerical analysis applied to a power system. In this analysis, iterative techniques are used due to there no known analytical method to solve the problem. To finish this analysis there are methods of Mathematical calculations which consist plenty of step depend on the size of system. This process is difficult and takes a lot of times to perform by hand. The objective of this project is to develop a toolbox for power flow analysis that will help the analysis become easier. Power flow analysis software package Develops MATLAB programming and MATLAB GUI. I have used NEWTON-RAPHSON method to find the unknown parameters of 5 BUS systems. The power flow computation consists of imposing specified power and voltage input conditions to a power network and producing the complete voltage information at all the system buses. The calculation is required for both the steady state analysis and the dynamic performance evaluation of power systems.3The paper also describes the undergoing integration and initialization of the well-known system software MATLAB with the load flow program.

Keywords:
 Power flow, Bus Classification, Five Bus System, Newton Raphson method, Voltage profile. Real and Reactive Power.


References:

1.        I.G. Nagrath and D.P. Kothari, “Modern Power System Analysis”, book, Second Edition 1995, Tata McGraw Hill Publishing Company Ltd, New Delhi, pp. 163-200.
2.        R.N. Dhar, “Computer Aided Power System Operation and Analysis”, book, Third Edition 1987, Tata McGraw Hill Publication, New Delhi, pp68-87.

3.        Stagg and EI Abiad, “Computer Methods in Power System Analysis”, book, McGraw Hill International Students Edition 1995, pp.258-262.

4.        S.Abe, N. Hamada, A. Isono, “Power Apparatus and System”, IEEE Transactions on Vol. PAS 97, No: 6, Nov/Dec-1978, pp10-35.

5.        Y. Kanetkar, “Let Us C” book, Third Edition, 1999, BPB Publication New, Delhi, pp1-150.

6.        Y. Kanetkar, “C Projects” book, BPB Publication, New Delhi, pp20-52.

7.        T.D. Brown Jr. “Basic C for Basic Programmers”, book, Tata McGraw Hill Edition 1988, pp.1-10.

8.        Jim See, Wayne Carr “Real Time Distribution Analysis for Electric Utilities,” IEEE Transactions on Load Flow Analysis of Power System, Vol. PAS-115, No18, May 1993.

9.        G.M. Gilburt, “Comparison of Load Flow Analysis by Iterative Methods”,” IEEE Transactions on Power Apparatus and System, Vol. PAS-110, No.9, 1988.


173-176

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Kunj Karia, Neha Chanchlani, Karan Kashyap, Mona Deshmukh

Paper Title:

Krishi Sahyog: Image based Cognitive E-Learning

Abstract:   Krishi Sahyog is a web-based solution developed to provide basic education about farming techniques and usage of tools. The uniqueness of this project lies in the fact that it takes into account the present day farming scenario. Krishi Sahyog will help the farmers to understand various farming techniques and will acquaint them with the latest tools and technologies by means of video tutorials in regional languages. This Human Computer Interaction project, an e-learning website, is to help them get a hang of the latest technologies and the latest tools albeit not having any basic technical education, which will also make them aware of the market rate, owing to which they will be aware of the current rate of their product as compared to current market scenario. Also, the weather forecast feature will help them plan their crop accordingly.

Keywords:
 Human Computer Interaction, image based e-learning, video tutorials, optimization, regional languages.


References:

1.       G. O. Young, “Synthetic structure of industrial plastics (Book style with paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed.  New York: McGraw-Hill, 1964, pp. 15–64.
2.       Handbook of Human Factors in Web Design. Robert W. Proctor and Kim-Phuong L. Vu (eds). Lawrence Erlbaum.

3.       Catledge, L., & Pitkow, J. (1995). Characterizing browsing strategies in the World-Wide Web. In Proceedings of the Third International World Wide Web Conference, Darmstadt, Germany.

4.       Diaper, D., & Stanton, N. (Eds.) (2004)

5.       “The Handbook of Task Analysis for Human-Computer Interaction”,  Lawrence Erlbaum Associates.

6.       Human Computer Interaction Research in Web Design and Evaluation Panayiotis Zaphiris and Sri Kurniawan

7.       Joe Clark - 'Building Accessible Websires', New Riders

8.       Jeffrey Zeldman - 'Designing With Web Standards', New Riders

9.       “The Elements of User Experience: User-Centered Design” Jesse James Garrett.

10.     Alan Dix, Janet Finlay, Gregory D. Abowd, and Russell Beale, Human Computer Interaction (Third Edition), Pearson, 2004.


177-178

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Rahul Krishnaji Bawane, S.V. Channapattana, Nilima Baliram Gadge, Sandip M. Ingole

Paper Title:

Experimental Investigation of Performance Characteristics of Calophyllum Inophyllum Biodiesel in CI Engine by Varying Compression Ratio

Abstract:   In a modern day world alternative source of energy are given importance due to gradual depletion of fossil fuels reserves vegetable oils can be used as an alternative to diesel in CI engines. The use of vegetable oils in CI engine results in low CO and HC emissions compared to conventional diesel fuel. The present study covers the various aspects of biodiesels fuel derived from calophyllum inophyllum oil, which is converted to calophyllum inophyllum methyl esters (CIME) by transesterification process. An experiment is conducted to obtain the operating characteristics of the variable compression ratio (VCR) engine run on biodiesl made from calophyllum inophyllum oil, at various compression ratio, and the results are compared with diesel. From the comparison of results, it is inferred that the engine performance is improved with significant reduction in emissions for the chosen biodiesel without any engine modification. The effective compression ratio can be fixed based on the experimental results obtained in the engine since the findings of the present research work infer that the biodiesel obtained from Calophyllum Inophyllum oil is a promising alternative fuel for direct-injection four-stroke VCR engine.

Keywords:
 Biodiesel, Calophyllum Inophyllum oil, Transesterification, Various Compression Ratio, Performance and Emission Characteristics


References:

1.       Mohan T Raj and Murugumohan Kumar K Kandasamy, “Tamanu Oil - An Alternative Fuel For Variable Compression Ratio Engine” International Journal of Energy and Environmental Engineering 2012, 3:18, http://www.journal-ijeee.com/content/3/1/18.
2.       BK Venkanna, C Venkataramana Reddy “Performance, Emission And Combustion Characteristics Of Direct Injection Diesel Engine Running On Calophyllum Inophyllum Linn (Honne) Oil”, International Journal Agric & Biol Engineering, 26 March, 2011, Vol. 4 No.1, http://www.ijabe.org

3.       Murugu M. K. K., Mohanraj T. And Rajamohan G “Investigation On The Performance Of Diesel Engine Using Various Bio-Fuels And The Effect Of Temperature Variation” Journal of Sustainable Development, Volume-2,No.3,November 2009, www.ccsenet.org/journal.htmlparticles

4.       Chavan S.B., Kumbhar R.R. and Deshmukh R.B. “Calophyllum Inophyllum Linn (Honne) Oil, A Source For Biodiesel Production”, Research Journal of Chemical Sciences,  ISSN 2231-606X, Vol. 3(11), 24-31, November (2013) Res. J. Chem. Sci.

5.       H Suresh Babu Rao, DR T Venkateswara Rao and DR K Hema Chandra Reddy, “Palm Oil And Calophyllum Inophyllum Oil Are Potential Feed Stocks For Future Biodiesel In Compression Ignition Engines”, International Journal of Mechanical Engineering and Technology (IJMET), ISSN 0976 –6340(Print), ISSN 0976 – 6359(Online) Volume 4, Issue 5, September - October (2013) © IAEME.


178-183

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Anju Bansal

Paper Title:

Assessing the Relation Between Quantity of Test Cases and Amount of Code Coverage

Abstract:   The software testing process can be unpredictable due to deficiencies in the measurement process, resulting in poor quality of software releases. Code coverage analysis is a vital activity in any software testing process. It provides developers with a measure of how well their source code is being exercised by the test runs. Several types of code coverage include the statement, branch and symbol coverage. The focus of this paper is to find out the relationship, if any, between the quantity of test cases and amount of code coverage. Code coverage process is automated through software known as code coverage tool. In this research, NCover code coverage tool is used to measure the above mentioned relationship. NCover is the .Net code coverage tool which shows the untested part of code. For analyzing the relationship, we have used a project “Secure Mailing System” which a web based application that sends and receives messages in a secure manner by encrypting them. Results showed that there is no relationship between number of test cases and amount of code coverage. Code coverage depends on the quality of test cases rather than the quantity. The association found in this research is an important software quality indicator capable for use in describing the software test effectiveness. The results of this research are valuable data for guidance to future research in code coverage analysis.

Keywords:
 Code Coverage, Coverage Metrics, NCover, Software Testing


References:

1.       Ammann, P. & Offutt, J., Introduction to Software Testing, Cambridge University Press. ISBN: 978-0-521-88038-1, 2008
2.       Antonia Bertolino, Software Testing Research: Achievement, Challenges, Dreams, IEEE Computer Society, 2007.

3.       M. Gittens, K. Romanufa, D. Godwin, and J. Racicot, "All code coverage is not created equal: a case study in prioritized code coverage," Conference of the Center for Advanced Studies on Collaborative research, pp. 1-15, Toronto, Ontario, Canada, 2006.

4.       Gupta A. & Bhatia R., Testing Functional Requirements using B-model specifications. ACM SIGSOFT Software Engineering Notes, pp 1-7, 2010

5.       Taipale O., Observation on Software testing practice. Lappeenranta University of Technology, Lappeenranta, Finland, 2010

6.       ISTQB, “International Software Testing Qualification Board” version 2.0, 2007 www.istqb.org

7.       Baird, K.C. Ruby by example: Concepts and code.San Fransisco, 2007

8.       E Kajo-Mece , Megi Tartari , “An Evaluation of Java Code Coverage Testing Tools”,pp 72-75 , 2012.

9.       Shahid Muhammad, Ibrahim Suhaimi, “An Evaluation of Test Coverage Tools in Software Testing”, International Conference on Telecommunication Technology and Applications, Proc .of CSIT vol.5, Singapore, pp 216-222, 2011.

10.     Cornett S., Minimum Acceptable Code Coverage. Retrieved from http://www.bullseye.com/minimum.html

11.     Shahid Muhammad, Ibrahim Suhaimi, Harihudin Selamat, Test Coverage Measurement and Analysis on the Basis of Software Traceability Approaches, International Journal of Information and Electronics Engineering, Vol. 1, No. 2, September 2011

12.     Ohba  M., Caruso J., Piwowarski P., Coverage measurement experience during function test. Los Alamitos, CA, USA, 1993

13.     Mercer T.W., Mucha M.R., Williams J.P., Code coverage, what does it mean in terms of quality? Philadelphia, 2001

14.     Slonim J., Bauer M., Ye J., Software Reliability Assurance in early Development Phase: A Case Study in an Industrial Setting. Aspen, CO, USA, 1996

15.     Monica Hutchins, Herb Foster, Tarak Goradia, and Thomas Ostrand, Railway applications Communication, signaling and processing systems Software for railway control and protection systems. Los Alamitos, CA, USA, June 2011

16.     Namin A.S. , Andrews J.H., The influence of size and coverage on test suite effectiveness. New York, 2009

17.     Sarabi M., Evaluation of Structural Testing Effectiveness in Industrial Model-driven Software Development, Malardalen University ,Sweden, 2012

18.     Park S., Hussain I.,Taneja K., Hossain B.M., Grechanik M., Chen Fu, Qing Xie, CarFast: Achieving Higher Statement Coverage Faster, November 2012

19.     Y. W. Kim. Efficient use of code coverage in large-scale software development. In CASCON ’03, pages 145–155, 2003

20.     Malaiya, Y.K., Li, M.N., Bieman, J.M. and Karcich, R. (Software reliability growth with test coverage. IEEE Trans. Reliab., 51, 420–426,2002.

21.     John Joseph Chilenski and Steven P. Miller, "Applicability of Modified Condition/Decision Coverage to Software Testing", Software Engineering Journal, September 1994, Vol. 9, No. 5, pp.193-2000.

22.     Panday A., Singh M.K., Gupta M., Ali N., Test Case Redundancy Detection and Removal Using Code Coverage Analysis, MIT International Journal of Computer Science & Information Technology Vol. 3, No. 1,  pp. 6–10, Jan. 2013.

23.     Nirpal P.B. and Kale K.V., Comparison of Software Test Data for Automatic Path Coverage Using Genetic Algorithm, International Journal of Computer Science & Engineering Technology, Vol. 2, No. 2, 2011

24.     Waldschmidt, P.  NCover Complete: The Code Coverage Analyzer Retrieved from: http://www.ncover.com/


184-188

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

J.B.Shaikh, J.S.Sidhu

Paper Title:

Experimental Investigation and Optimization of Process Parameters in Turning of AISI D2 Steel using Different Lubricant

Abstract:   Vegetable oils have traditionally been applied in food uses but recent trend suggests that it has economic usefulness as an industrial fluids. Increasing crude oil prices and emphasis on the development of renewable, environment friendly fluids have brought vegetable oils to a place of prominence. As environment pollution and health problem are becoming more and more concerned, the use of environment friendly lubricants is strongly supported by manufacturers’. The objective of this work is to determine the influence of lubricant on surface roughness and material removal rate (MRR) by using CNC LATHE Machine with AISI D2 steel. Taguchi Method is used for determining and optimising operating parameters. The experimentation is proposed to identify the influence of cotton seed oil on AISI D2 steel. Further the usability of cotton seed oil will be checked in turning operation at low and high speeds. The performance of cotton seed oil is compared with servo cut oil and soybean oil. The above experimentation results may help practitioners to compare and increase MRR, Surface finish using more environment friendly oil as lubricant.

Keywords:
 Cotton seed oil, Servo cut and soya bean oil, AISI D2 steel, CNMG carbide insert and Taguchi method.


References:

1.        Taylor, F. W., on the art of cutting metals, American Society of Mechanical Engineers 28(1907) 31-350
2.        Sunday Albert Lawal.,  A Review of Application of Vegetable Oil-Based Cutting Fluids in Machining Non- Ferrous Metals. Indian Journal of Science and Technology Vol: 6 Issue: (2013 ). 

3.        Yuzan Yu, Yugao Guo, Lei Wang & Enqi Tang  Development of Environmentally Friendly Water-Based Synthetic Metal-Cutting Fluid Modern Applied Science Vol. 4, No. 1(2010).

4.        Bartz W.J. Ecological and Environmental Aspects of Cutting Fluids. Journal of the Society of Tribologists and Lubrication Engineers, vol.57, no.3, 2001, pp. 13-16.

5.        N.A.H. Jasni and M.A.Lajis.,  A comparative study on surface roughness in machining of AISI D2 steel. Advanced material research Vol. 576 (2012) pp60-63.

6.        S.R.Das.,R.P.Nayak & D.Dhupal., Optimisation of cutting parameters on tool wear and workpiece surface temperature in turning of AISI D2 steel. International Journal of lean thinking Vol.03 Issue 02(2012).

7.        J.A. Arsecularatne, L.C. Zhang , C. Montross and P. Mathew., On machining of hardened AISI D2 steel with PCBN tools. Journal of  Materials Processing Technology 171 (2006) pp 244–252.

8.        Gurpreet singh., Sehijipal singh., Manjot Singh and Ajay kumar., Experimental investigations of vegetable  and mineral oil performance  during machining of EN-31 steel with minimum quantity lubrication. International Journal of research in engineering and technology VOL.02 Issue: 06 (2013) pages 1-8.

9.        Kurem ,E., Ozcelik ,B., Demirbas E and Sik,E.  Effect of cutting fluid types and cutting parameters on surface roughness and thrust force. Proceeding of the word congress on engineering Vol. 02 (2010).

10.     DHAR N.R.and M.Khan ., A study of effect of MQL on temperature , force ,tool wear and product quality  in turning of AISI 9310 steel . Net field wise seminar on manufacturing and material processing, Issue 02 (2006) pp30-35.

11.     M Venkata Ramana, K.srinivasulu & G.Krishna Mohan Rao., Performance evaluation and selection of optimal parameters in turning of Ti-6AL-4V alloy under different cooling conditions. International journal of innovative technology & creative engineering vol.01 (2011)

12.     Ashok kumar Sahooa and Bidyadhar Sahoob.  Surface roughness model and parametric optimization

13.     V. R. Kagade and R. R. Deshmukh. Experimental investigation of turning operation using carbide inserts . International Journal of Applied Research in Mechanical Engineering, Volume-1, Issue-1, (2011) pages 1-4.

14.     S. R. Das., D. Dhupal and A. Kumar3. Experimental Study & Modeling of Surface Roughness in Turning of Hardened AISI 4340 Steel Using Coated Carbide Inserted. International Journal of Automotive Engineering Vol-03, Number 1. (2013).

15.     Shaw, M.C., Metal Cutting Principles, Oxford, 1984. Pp.206-307.

16.     M. Nalbant,H. Go.kkaya and G. Sur, Application of Taguchi method in the optimization ofcutting parameters for surface roughness in turning’’ Materials and Design ,28.Availabale . www.elsevier.com/locate/matdes. PP1379–1385 (2007).

189-197

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

Tripti Yadav, Aditi Gupta

Paper Title:

Application of Ayurveda for Treatment of Non Communicable Disease - Human Blood Cancer

Abstract:   Acute myeloid leukemia is a cancer of the blood and bone marrow. This type of cancer usually gets worse quickly if it is not treated. It is the most common type of acute leukemia in adults. Benefits  of ayurveda utilized in cancer treatment are Increase haemoglobin & platelates, Maintain W.B.C. count, Increase immunity, Increases Appetite, increase Sufficient blood supply to every part of body, Reduce weakness& laziness, Reduces side effects of allopathy, Feel fresh & energetic all the time, Heal wounds, Reduce depression, Useful as a Tonic for all age groups to maintain good health and most effective on all types of blood related disorders. Thus ayurveda can be helpful in the management of cancer in many ways such as—prophylactic, palliative, curative and supportive.

Keywords:
 ayurveda, haemoglobin, platelates, allopathy.


References:

1.       Database on medicinal plants used in Ayurveda PC Sharma, MB Yelne, TJ Dennis, A Joshi, KV Billore - 2000 - agris.fao.org
2.       Ayurveda and natural products drug discovery B Patwardhan, ADB Vaidya… - CURRENT SCIENCE- …, 2004 - iisc.ernet.in

3.       Cancer—an ayurvedic perspective P Balachandran, R Govindarajan - Pharmacological research, 2005 - Elsevier

4.       Natural compounds for cancer treatment and prevention S Nobili, D Lippi, E Witort, M Donnini, L Bausi… - Pharmacological …, 2009 - Elsevier

5.       An assessment of the ayurvedic concept of cancer and a new paradigm of anticancer treatment inayurveda RH Singh - The Journal of Alternative & Complementary …, 2002 - online.liebertpub.com

6.       Triphala, Ayurvedic formulation,for treating andpreventing cancer: a review MS Baliga - The Journal of Alternative and Complementary …, 2010 - online.liebertpub.com

7.       Potential synergism of natural products in the treatment of cancerS hemaiswarya, M Doble - Phytotherapy research, 2006 - Wiley Online Library

8.       Plant-based Rasayana drugs from Ayurveda SP Balasubramani, P Venkatasubramanian… - Chinese journal of …, 2011 - Springer

9.       A Review on Ayurveda and Siddha: Indian Systems of MedicineSB Patil, MS Patil, KP Chittam, RD Wagh - Pharma Science Monitor, 2014 - pharmasm.com


198-199

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

P.Rathina Kumar, M.G.Thiruselvan, J M Babu, M.Rajagopal

Paper Title:

Weight Optimization of Buck Stays using Castellated Beams

Abstract:   The present water-tube boiler construction is based on membrane walls (tube wall panels) to form furnace envelope. Buckstay is a supporting element external to the boiler envelope stiffening the furnace against pressure differentials between gases inside the furnace and outside atmosphere. The membrane walls forming the furnace envelope alone could not withstand those pressure differentials. Hence membrane walls have been stiffened with the buckstay system placed to prevent large deformations. Buckstays are designed in accordance with any structural codes (IS 800, BS 5950 etc.) against shear, bending and axial stresses. Typical rolled & fabricated ‘I’ sections may be used as buckstay beam. This technical paper provides applicable loadings on buckstay, design considerations design procedure and to reduce the weight of buckstays using castellated beams.

Keywords:
 Water tube boiler, boiler construction, supporting structure, mechanical properties.


References:

1.        IS 800 - 2007 - Code of practice for general construction in steel
2.        Boilers for power and process by Kumar Royaprolu

3.        JINDAL steel beam properties table

4.        Castellated beam properties table


200-203

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

S. M. Lim, D. C. Wijeyesekera, A. J. M. S. Lim, I. B. H. Bakar

Paper Title:

Critical Review of Innovative Soil Road Stabilization Techniques

Abstract:   New roads are vital socio-economic pathways to a better quality of life for the thirty-five per cent of the Malaysian living in rural areas. However, building of roads in rural areas is always hindered by geographic limitation and often can be costly and energy inefficient. Hence it causes more adverse impact on the environment. Roadways designed for low-volume traffic are constructed of local soils containing high percentages of fines and high indices of plasticity. These soils may not have characteristics appropriate for use in soil road construction, but can often be upgraded with soil stabilization technology to successfully recondition and strengthen existing road base and sub-base materials for extended life and heavier traffic duty. In this paper, an attempt is made to bring in together soil road stabilization technologies for the extremes of dry and wet condition and discuss their positive impacts so as to convince the field engineers to adopt such technologies effectively.

Keywords:
 California bearing ratio; enzyme; soil roads; soil stabilization.


References:

1.       A. U. Ravi Shankar, H. K. Rai, and R. Mithanthaya, “Bio-enzyme stabilized lateritic soil as a highway material,” Indian Road Congress, in press.
2.       B. I. Siswosoebrotho, M. Hossain, A. Alias, and B. K. Huat, “Stabilization of tropical residual soils,” Taylor and Francis Group, 2004, pp145-167.

3.       D. Daud, P. C. Tan, M. Lee, and D. Q. Wu, “Green and quality rural roads in Malaysia,” unpublished.

4.       M. A. Kestler, “Stabilization selection guide for aggregate and native-surfaces low volume roads,” U.S. Department of Agriculture, 2009.

5.       M. Lee, P. C. Tan, Daud, and D. Q. Wu, “Green approach to rural roads construction – Stabilization of in-situ soils and construction wastes,” Asia Pacific, in press.

6.       M. Terashi, and I. Juran, “Ground Improvement – State of the art,” GeoEng, Sydney Ullah, 2000.

7.       M. Vedula, P. Nath G, and B. P. Chandrashekar, “A critical review of innovative rural road construction techniques and their impacts,” unpublished.

8.       P.T. Sherwood, and M.D. Ryley, “The use of stabilized pulverized fuel ash in road construction,” Road Research Laboratory, RRL Report No. 49, Crowthorne, 1966.

9.       T. Abadjieva, “Chemical stabilization for low cost roads in Botswana,” unpublished.

10.     T. E. Kowalski, and D. W. Starry, “Modern soil stabilization techniques,” Annual Conference of Transportation Association of Canada: Saskatoon, 2007, pp 1-16.

11.     T. T. Abood, A. B. Kasa, and Z. B. Chik, “Stabilization of silty clay soil using chloride compounds,” Journal of Engineering Science and Technology, Vol. 2, No.1, 2007, pp. 102-110.

12.     US Army, “Field mannual-410: Military soils engineering- Chapter 9: Soil Stabilization for roads and airfields, Department of the Army, Washington, D. C. June, 1997.

13.     W. H. Bushman, T. E. Freeman, and E.J. Hoppe, “Stabilization techniques for unpaved roads,” Virginia Transportation Research Council, June 2004.

14.     Y. Yilmaz, A.G. Gungor, and C. Avsar, “Stabilization of clays using liquid enzymes,” Taylor & Francis Group: London, 2009, pp.65–69.

204-211

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Nitha V Panicker, Sukesh Kumar A

Paper Title:

BER Performance Evaluation of Different Digital Modulation Schemes for Biomedical Signal Transceivers under AWGN and Fading Channel Conditions

Abstract:   The RF transceivers play an important role in the wireless medical monitoring system. Compared to the conventional RF transceiver, the transceiver in medical sensor nodes has more stringent constraints in terms of power consumption, size limitation and the quality of transmission. Digital modulation schemes used in the wireless transceivers plays an important role in the performance of the transceiver. In this paper the Bit error rate (BER) of different digital modulation schemes are compared under AWGN, Rayleigh and Rician fading channels to identify a suitable digital modulation scheme for biomedical application.

Keywords:
 probability of error, BER, transceiver, AWGN, Rayleigh, Rician


References:

1.       Proakis J G, Digital. Communications, 4th Ed., New York, McGraw-Hill, 2001.
2.       A. Alimohammad, S.F.Fard, B.F.Cockburn and C.Schlegal, “Compact Rayleigh and Rician fading simulation based on random walk processes”, IET Communications, 2009, Vol.3, Issue 8, pp 1333-1342.

3.       Yahong Rosa Zheng and Chengshan Xiao, “Simulation models with correct statistical properties for Rayleigh fading channels”, IEEE Transactions on communications, Vol. 51, No. 6, June 2003.

4.       Simon, M.K., and Alouini, M.S., Digital modulation over fading channels- A Unified   Approach to Performance Analysis, 1st Ed., Wiley 2000

5.       www.mathworks.in/help/comm/ug/bit-error-rate-ber.html

6.       Andrea Goldsmith, Wireless Communications, Cambridge University Press, 2005

7.       Nitha V. Panicker, Sukesh Kumar A “Current Trends in Wireless Technologies for Telemedicine Applications,” in Proc. National Conf. Adv. In Computational Intelligence and Communication. Technology (NCACICT ‘13), India, June 26-27,2013, pp.

8.       Simon M.K, “on the bit error probability of differentially encoded QPSK and Offset QPSK in the presence of carrier synchronization”, IEEE trans. Commn. Vol.54 May 2006,pp 806-812.

9.       ZigBee Alliance[online]. Available: http://www.zigbee.org/


212-215

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

R. K. Raghuwanshi, V. K. Verma

Paper Title:

Mechanical and Thermal Characterization of Aero Grade Polymethyl Metha Acrylate Polymer used in Aircraft Canopy

Abstract:   Aircraft canopies are designed for high visibility and resistance to damage from foreign objects. The trend in aircraft canopy design is towards stronger, tougher, and thicker canopies. The drive towards lighter aircraft is leading towards the trend to reduce weight associated with the systems. The system must be reliable, safe, lighter in weight, and cost effective. Acrylics are thermoplastics which are widely used in diverse industries such as building, automotives, lighting appliances and aircrafts. The term acrylics not only covers the polymers and resins made from acrylics esters, but also polymerisable derivatives of both acrylics and methacrylic acids as well as the acid chlorides nitrides and amides. Natural gas, compressed gas and acetone are the basic raw materials from which monomers for acrylics resins are produced. By combining the carbon, hydrogen, oxygen and nitrogen from the natural gas and air, methanol and ammonia are obtained. These raw materials and intermediates are then converted in several steps to PMMA and other members of broad family of acrylics monomers Polymerization is accompanied by adding organic catalyst and heat to the reactive mixture through either bulk, suspension or emulsion polymerization. Moreover, stress whitening quantification methods in the literature are simply used to compare different testing conditions or material compositions. A new approach for stress whitening quantification is essential for establishment of quality control over thermoformed products and development of possible relations between stress whitening level and the state of thermoformed product. It is also desirable to replicate actual thermoforming procedure on small scale samples rather than large size panels in order to reduce the cost and the labor in such experimental studies.  PMMA are virtually unaffected by alkalis, hydrocarbons acids, saltwater, photographic or battery solution. PMMA resins are available in a complete range of transparent, translucent, opaque and custom colors in varying grades of melt flow and heat resistance. Other properties include a high Young's modulus and greater hardness. PMMA is one of the hardest and highly scratch resistant thermoplastic. Parts made of PMMA have high mechanical strength and good dimensional stability.

Keywords:
 Poly methyl methaacrylate, Aircraft canopy, Environmental degradation, Mathematical modeling


References:

1.        Rosato D. V.,“Plastics Institute of America Plastics Engineering, Manufacturing and Data Handbook”, Kluwer, Dordrecht, 2002.
2.        Green D.J. “An Introduction to the Mechanical Properties of Ceramics”, Cambridge University Press NY, 1998.

3.        Roylance David “Stress-Strain Curves”, MA 02139 1 August 23, 2001.

4.        Griffith A.A. “The phenomena of rupture and flow in solids”, Philosophical Transactions of the Royal Society of London, Series A,221, 163-198, 1920.

5.        Eshelby J. D., “Fracture Mechanics, Science Progress”, 59, 161-179, 1971.

6.        Metallurgical classics, Transactions of the American Society for Metals, 61, 871-906 (1968).

7.        Shaw B.A., Aylott C and Hara P. O.,  Brimble K., “The role of residual stress on the fatigue strength of high performance gearing” International Journal of  Fatigue 25 (2003) 1279–1283

8.        Lennon A.B., Prendergast P.J., “Residual stress due to curing can initiate damage in porous bonecement”, pp 9-15, 2001.

9.        Marius C. Costache “The thermal degradation of poly(methyl methacrylate) nanocomposites with montmorillonite, layered doublehydroxides and carbon nanotubes” 17: 272–2802006

10.     A. Balamurugan, S. Kannan, V. Selvaraj and S. Rajeswari “Development and Spectral Characterization of Poly(Methyl Methacrylate) /Hydroxyapatite Composite for Biomedical Applications” Vol 18 (1), pp 41-45 (2004)

11.     Beguelin P.H. and  Kausch H.H. “The effect of the loading rate on the fracture toughness of Polymethyl methacrylate, Polyacetal, Polyetheretherketone and modified PVC”, Journal of materials science  volume 29, Number 1, 91 98, 2007.

12.     Ania F., Martinez -Salazar J. and  Balta Calleja F. J. “Physical ageing and glass transition in amorphous polymers as revealed by microhardness” Journal Of Materials Science Volume 24, Number 8, 2934-2938, DOI: 10.1007/BF0238565, 2007.

13.     Kashiwagi T, Inaba A, Brown E.J.  “Effects of weak linkages onthe thermal and oxidative degradation of polymethylmethacrylates. Macromolecules 1986; 19: 2160–2168.

14.     Chemistry and Material Science Volume, 1387-1390, DOI: 10.1007/ BF0054482, 2007

15.     Kasano and Abe, “A new analytical model for predicting the perforation characteristics of unbounded multi-layered composite plate”, pp5-23, 1997.

16.     Rodney D. Priestley, Christopher J. Ellison, Linda J. Broadbelt, John M. Torkelson, “Structural Relaxation of Polymer Glasses at Surfaces”, pp 48-56, 2004.

17.     Balzano M. and  Ravi Chandar K. “Temperature effects on quasi-static fracture of PMMA” journal of materials science Volume 26, Number 5, 1387-1390, DOI: 10.1007/BF00544482, 2007.

18.     Greiner R.and Schwarz F. R. “Thermal contraction and volume relaxation of amorphous polymers 59, 151-169, 1981”.

19.     Roger L. Blaine “Determination of Polymer Crystallinity by DSC” Ph. D.TA Instruments, 109 19720, USA

20.     McKenna G.B., “Comprehensive Polymer Science” Vol. 2, Pergamon, 1990.

21.     Hutchinson J.M. “Progress in Polymer Science”, Vol. 20, 703-760, 1995.

22.     Hodge I.M. “Journal of Non-Crystalline  Solids”, Vol. 169, 211-266, 1994.


216-219

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

Avinash Taskar, Bhushan Sinkar

Paper Title:

Privacy-Preserving Location Query Service using Privacy Preserving Distance Computation

Abstract:   Today’s world is none of other than Smart Phones, Tablets, and High Speed Media, and its context-rich functionalities attract considerable users. Many LBS providers use users' location information to offer them convenience and useful functions. However, the LBS could greatly breach personal privacy because location itself contains much information. Hence, preserving location privacy while achieving utility from it is still an challenging question now. This paper tackles this non-trivial challenge by designing a suite of novel fine-grained Privacy-preserving Location Query Protocol (PLQP). Our protocol allows different levels of location query on encrypted location information for different users, and it is efficient enough to be applied in mo bile platforms.

Keywords:
 LBS, protocol, PLQP.


References:

1.       T. Hashem and L. Kulik, “Safeguarding location privacy i n wireless ad-hoc networks,” Ubicomp 2007: Ubiquitous Computing, pp. 372–390, 2007.
2.       C. Bettini, X. Wang, and S. Jajodia, “Protecting privacy against location-based personal identification,” Secure Data Management, pp. 185–199, 2005.

3.       M. Mokbel, C. Chow, and W. Aref, “The new casper: query processing for location services without compromising privacy,” in Proceedings of the 32nd international conference on Very large data bases, VLDB Endowment, 2006, pp. 763–774.

4.       K. Vu, R. Zheng, and J. Gao, “Efficient algorithms for k-an onymous location privacy in participatory sensing.” in IEEE INFOCOM, 2012.

5.       L.  Sweeney  et  al.,  “k-anonymity:  A  model  for  protecting  privacy,” International Journal of Uncertainty Fuzziness and Knowledge Based Systems, vol. 10, no. 5, pp. 557–570, 2002.

6.      H. Zang and J. Bolot, “Anonymization of location data doe s not work: A large-scale measurement study,” in Proceedings of the 17th annual international conference on Mobile computing and networking, 2011, pp. 145–156.

7.       H. Kido, Y. Yanagisawa, and T. Satoh, “Protection of loca tion privacy using dummies for location-based services,” in 21st International Con-ference on Data Engineering Workshops, 2005, pp. 1248–1248.

220-224

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Neelam Thakur, Ajay Kumar Yadav

Paper Title:

Design of Novel UWB Coupled Line Band Pass Filter with Improved Stop Band Performance

Abstract:   As we know that the conventional filter synthesis procedure is adequate only for the relatively narrow band filters and is not suitable for the Wideband and Ultra wideband filters .Therefore we are intend to design a Ultra Wideband filter. In this study a compact Ultra Wide Band pass filter consisting of quarter wave resonant conductor like micro strip lines is proposed to design. We have to increase the Bandwidth by using suitable techniques also have to improve the stop band performance. A microwave filter is frequency selective two-port network used to control the frequency response at a certain point in a microwave system by providing transmission at frequencies within the pass band of the filter and attenuation in stop band of the filter. Microwave filters specifically band pass filters have found large number of application in varying fields such as satellite communication, GSM networks, Bluetooth, remote sensing, navigation etc.

Keywords:
 GSM, Bluetooth, Remote Sensing, Navigation, Ultra Wideband Filter


References:

1.        Darren Mc Carthy, “Tackling UWB/WiMedia measurement Challenges,” Journals of microwave, Vol 51, No. 11, November Supplement 2008, Page 12 .
2.        Cohn, S.B, “Parallel-Coupled Transmission-Line-Resonator Filters”, Microwave Theory and Techniques, IRE Transactions, Volume 6, Issue 2, April 1958  page(s):223 – 231.

3.        Makimoto, M.; Yamashita, S. “Band Pass Filters Using ParallelCoupled Strip line Stepped Impedance resonators”,Microwave Theory and Techniques, IEEE Transactions, Volume 28, Issue 12, Dec 1980 Page(s): 1413 – 1417.

4.        Ozaki, H.,and J.Ishii, “Synthesis of a Class of Strip line Filters,” IRE Trans., Vol. CT-5, 1958, pp. 104 – 109.

5.        J.S. Hong and M.J. Lancaster, “End-coupled Micro strip slowwave resonator filter,” Electronics letter, vol. 32, no. 16, pp.1494-1496, 1996.

6.        Peng Cai, Zhewang Ma, Xuehui Guan1, Yoshio Kobayashi,Tetsuo Anada and Gen Hagiwara,” Synthesis and Realization of Novel Ultra-Wideband Band Pass Filters Using 3/4 Wavelength Parallel-Coupled Line Resonators”, Microwave Conference, 2008. APMC 2008. Asia-Pacific, Volume, Issue, 16-20 Dec.2008, Page(s):1 – 4.

7.        Z. M. Hejazi and A. Omar, “Modeling and simulation of novel ultra narrow band miniature Micro strip filters for mobile and wireless critical applications,” Microw. Opt. Technol. Lett., vol.  45, no. 1, pp. 35–39, 2005.

8.        Anand K. Verma, Adel B. Abdel-Rahman, Ahmed Boutejdar & A.S. Omar “Control of Band stop Response of Hi-Lo Micro 59 strip Low Pass Filter Using slot in Ground Plane”, IEEE, Transactions on MTT, Vol. 52, No3, March 2004.

9.        A. Abdel Rahman, A.K. Verma, A. Boutejdar and A. S. Omar “ Compact stub Type Micro strip Band Pass Filter Using Defect Ground Plane,” IEEE Microwave and  wireless components Letters, Vol 14, No 4 April 2004.

10.     D. F. Williams and S. E. Schwarz, “Design and Performance of  Coplanar Waveguide Band pass Filters,” IEEE Transactions on Microwave Theory and Techniques, vol. MTT-31, No.7, July 1983.

11.     Tsung-Nan Kuo, Shih-Cheng Lin, Chun Hsiung Chen “Compact Ultra-Wideband Bandpass Filters Using Composite Micro strip & Coplanar-Waveguide Structure”, Microwave Theory and Techniques, IEEE Transactions, Oct. 2006, Volume: 54, Issue: 10, page(s): 3772-3778.

12.     Pozar, M David, “Microwave Engineering”, 2nd edition, John Wiley & Sons, Inc.

13.     Hong, Jia Sheng, Lancaster, M. J., “Micro strip Filters for RF / Microwave Applications”, John Wiley & Sons, Inc.

14.     G. Mattaei, L. Young, and E.M.T. Jones, Microwave Filters, Impedance Matching Networks, and Coupling Structures, Artech House, Norwood, MA, 1980.

15.     Lin-Chuan Tsai , Ching -Wen Hsue , “Dual-band Band Pass filters using equal-length coupled-serial-shunted lines and ZTransform Technique” , Microwave Theory
and Techniques, IEEE Transactions, April 2004,Volume:52, Issue:4 on page(s): 1111- 1117.

16.     Chao-Huang Wu, Yo-Shen Lin, Chi-Hsueh Wang, and Chun Hsiung Chen, “Novel Microstrip Coupled-Line Band Pass  60 Filters With Shortened Coupled Sections for Stop band Extension”, IEEE Transaction on MTT, Vol. 54, No. 2, February 2006 pages(s): 541-546.

17.     Peng Cai; Zhewang Ma; Xuehui Guan; Xuexia Yang;Kobayashi, Y.; Anada, T.; Hagiwara, G., “A compact UWB Band Pass filter using two-section open-circuited stubs to realize Transmission Zeros”, Microwave Conference Proceedings, 2005. APMC 2005. Asia-Pacific Conference Proceedings,Volume 5, Issue , 4-7 Dec. 2005
Page(s): 4.

18.     L. Zhu and W. Menzel, “Compact Microstrip Band Pass filter with two Transmission Zeros using a stub-tapped halfwavelength line resonator,”IEEE Microwave Wireless Component Lett, vol. 13, no. 1, pp. 16–18, 2003.

19.     M. Krishnan and R.H.Jansen, “Accurate wide-range design equations for parallel coupled Micro strip lines,” IEEE Trans., MTT-32, Jan.1984, page(s):83-90.

20.     Kumar, P., Kishor, J., Gupta, S.C. “Theoretical analysis of dispersion characteristics of Micro strip line DGS/DMS”,National Conference on emerging trends in embeddedtechnology” 13- 15 Feb. 2009.Page (s) 67-68.


225-229

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Swapnali Zagade, Smita Bhosale

Paper Title:

Secret Data Hiding in Images by using DWT Technique’s

Abstract:   Steganography method used in this paper is based on biometrics. And the biometric feature used to implement steganography is skin tone region of images [1]. Communication of data by maintaining confidentiality is a major issue everywhere, so to increase the security a non – conventional approach called steganography is proposed. “Steganography” is an art of “hiding data within data” [1, 2]. In general, Stego means “covering” and graphic means “writing”. Combining these two terms gives the meaning of steganography, i.e. “covered writing” [2]. Here secret data is embedded within skin region of image that will provide an excellent secure location for data hiding. For this skin tone detection is performed using HSV (Hue, Saturation and Value) color space. Additionally secret data embedding is performed using frequency domain approach - DWT (Discrete Wavelet Transform). In DWT Different techniques are used. Secret data is hidden in one of the high frequency sub-band of DWT by tracing skin pixels in that sub-band. Different steps of data hiding are applied by cropping an image interactively. Cropping results into an enhanced security than hiding data without cropping i.e. in whole image, so cropped region works as a key at decoding side. This study shows that by adopting an object oriented steganography mechanism, in the sense that, we track skin tone objects in image, we get a higher security. And also satisfactory PSNR (Peak- Signal-to-Noise Ratio) is obtained and MSE.

Keywords:
 Skin tone detection, B-Panel, Cropping, DWT Security, PSNR, MSE.


References:

1.     Anjali A.Ahejul And U.L.Kulkarni, “A DWT based Approach for Steganography Using Biometrics”,International Conference on Data Storage and Data Engineering,2010
2.     A. Cheddad, J. Condell, K. Curran and P. Mc Kevitt, “Biometric inspired digital image Steganography”, in: Proceedings of the 15th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS’08), Belfast, 2008, pp. 159-168.

3.     Lin, E. T. and Delp, E. J.:“A Review of Data Hiding in Digital Images”.Retrieved on 1.Dec.2006 from Computer Forensics, Cyber crime and Steganography Resources, Digital Watermarking Links and Whitepapers, Apr 1999

4.     Johnson, N. F. and Jajodia, S.: “Exploring Steganography: Seeing the Unseen.” IEEE Computer, 31 (2): 26-34, Feb 1998.

5.     Fridrich J. Goljan, M. and Du, R.., (2001). “Reliable Detection of LSB Steganography in Grayscale and Color Images.” Proceedings of ACM, Special Session on Multimedia Security and Watermarking, Ottawa, Canada, October 5, 2001, pp. 27- 30.

6.     Po-Yueh Chen and Hung-Ju Lin “A DWT Based Approach for Image Steganography”, International Journal of Applied Science and Engineering, 2006. 4, 3: 275-290

7.     Ahmed E., Crystal M. and Dunxu H.: “Skin Detection-a short Tutorial”, Encyclopedia of Biometrics by Springer-Verlag Berlin Heidelberg 2009


230-235

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Sushant Wagh, Dhananjay Panchagade

Paper Title:

Analyzing Effect of Impeller Width on Mass Flow Rate of Centrifugal Blower using CFD

Abstract:   to predict the mass flow rate from the centrifugal blower, Computational Fluid Dynamics (CFD) analysis is one of the advanced tools used in industry. A detailed CFD analysis was done to predict the mass flow rate at outlet of blower for different widths of impeller. The CFD analysis was done using Fluent software. The CAD models of the blower were modeled using CAD modeling software ProE WF2. Three different CAD models were made with impeller width of 17, 20 and 21.5 mm at the tip. The CFD results were validated experimentally for 17 mm width impeller by measuring the outlet velocity with the help of an anemometer and then calculating mass flow rate. It was observed that CFD results were having very good correlation with measured values.

Keywords:
 CFD, Blower, Mass flow Rate, Impeller Width


References:

1.        O. P. Singh & R. Khilwani, “Parametric Study of Centrifugal Fan Performance: Experiments and Numerical Simulation”, International Journal of Advances in Engineering & Technology, Vol.1, Issue # 2, pp. 33-50, May 2011
2.        V. Ahuja, A. Hosangadi & M. Slipper “Impeller Design of a Centrifugal Fan with Blade Optimization ”,  International Journal of Rotating Machinery, Vol. 2011, Article ID 537826, May 2011

3.        H.Dumitrescu & V. Cardos, “Flow Predication in a Blower Casing, ”University of Targoviste, 2007

4.        C.Jang & K. Choi, “ Optimal Design of Splitters Attached to Turbo Blower Impeller by RSM”, Journal of Thermal Science, Vol.21, pp 215-22, 2012

5.        Jin-Hyuk Kim1, Kyung-Hun Cha, Kwang-Yong Kim & Choon-Man Jang, “Numerical Investigation on Aerodynamic Performance of a Centrifugal Fan with Splitter Blades”,  International Journal of Fluid Machinery and Systems, Vol. 5, Issue #4, Dec 2012

6.        A. Manivannan, “Computational fluid dynamics analysis of a mixed flow pump impeller”, International Journal of Engineering, Science and Technology, Vol.2, Issue# 6, pp. 200-206, 2010

7.        K. Vasudeva Karanth & N. Yagnesh Sharma, “CFD Analysis on the Effect of Radial Gap on Impeller-Diffuser Flow Interaction as well as on the Flow Characteristics of a Centrifugal Fan”, international Journal of Rotating Machinery, Vol. 2009, 2009 


236-238

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

50.

Authors:

Rukhsana Khan, Prashant Sonare, Yogesh Sharma

Paper Title:

Comparison of Dual Band UWB Microstrip Antennas

Abstract:  The basic objective of the paper is to design a microstrip patch antenna for UWB wireless communication. The paper presents different types of microstrip antennas and compares their performance based on various characteristics so as to find the best antenna that can be used We have compared them on the basis of gain, return loss, VSWR, radiation efficiency, bandwidth, single and dual frequency operation. The developed prototype may find its application in mobile networks, base antennas, IEEE 802.11 a and j standards. Conclusion has been drawn from the two designs and the antenna providing optimal performance is selected for further implementation 

Keywords:
 Gain, MoM, modified E-shape. return loss VSWR


References:

1.        Ramesh Garg, Prakesh Bhartia ,Inder Bhal, Apisak Ittipiboon ,Micro strip Antenna design handbook, Boston, Artech  House.
2.        J.R.James and P.S. Hall, Handbook of Micro strip Antenna London, Peter Perigrinus, 1989.

3.        Roger F. Harrington, Field computation by moment methods

4.        C.A. Balanis, Antenna Theory analysis and design, 2nd Edition

5.        K.L. Wong, “Compact and Broadband Micro strip Antenna”, John Wiley & Sons, New York, USA, 2002

6.        G. Kumar and K.P. Ray, “Broadband Micro strip Antennas”, First Edition, USA, Artech House, 2003

7.        Amit A. Deshmukh and K. P. Ray, “Compact Broadband Slotted Rectangular Micro strip Antenna”, IEEE VOL antennas and wireless propagation letters, 8, 2009

8.        Zulkifli, F.Y. ; Halim, H. ; Rahardjo, E.T. “a compact multiband micro strip antenna using u slot ant s slot “Antennas and Propagation Society International
Symposium, 2008. AP-S 2008. IEEE

9.        E. Lee, P. S. Hall, and P. Gardner, “Dual Band Folder Monopole/Loop Antenna for Terrestrial Communication System”, Electron. Lett, vol-36, pp. 1990-1991, Nov 2000

10.     Alok Singh,”Dual band E-shaped patch antenna (ESPA) for ultra wide band application,”978-1-4244-2802-1/09/2009 IEEE


239-243

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

51.

Authors:

Manjula Das Ghatak, P. Mahanta

Paper Title:

Kinetic Assessment of Biogas Production from Lignocellulosic Biomasses

Abstract:   In this paper the kinetics of biogas production was studied by performing a series of laboratory experiments using different lignocellulosic biomass mixed with fresh cattle dung at three different temperatures. Laboratory digesters each of 1000 ml capacity were used for the laboratory experiments in batch mode. Five different types of lignocellulosic biomasses such as bamboo dust, saw dust, sugarcane bagasse, rice straw and rice husk were considered for biogas production, each mixed with fresh cattle dung, in the ratio of 1:3. Water was mixed with the prepared feed material in 1:3 ratio for digestion in the aforementioned digesters. The experiments were carried out in the temperature range 45°C-55°C in a step of 5°C. The purpose of this research was to study the biogas production kinetic from lignocellulosic biomass in batch mode anaerobic digestion. Modified Gompertz equation was used to compare the data obtained from the experiments. It was found that the kinetic parameters such as biogas production rate (U ml/gm/day) and maximum biogas production potential (A ml/gm) improved with increase in temperature for all the biomasses, whereas the lag phase period (λ days) reduces with increase in temperature. 

Keywords:
 anaerobic digestion, kinetics, biogas production, lignocellulosic biomasses, batch mode.


References:

1.        Raven, P.H., Evert, R.F.: Biology of plants (6th edition). W.H. Freeman and com-pany/Worth Publishers, (1992).
2.        Sims, Kristen M.: Strategies to enhance conversion of lignocellulosic biomass to fermentable sugars and to enhance anaerobic digestion of algal biomass for biomass production, All Graduate Plan B and other Reports. Paper 256. (2013). http://digitalcommons.usu.edu/gradreports/256

3.        Fan, L.T., Gharpuray, M.M., Lee, Y.H.: Evaluation of pretreatment for enzymatic conversion of agricultural residues. Biotechnol. Bioeng. Symp., 11, 29-45 (1988).

4.        Palmowski, L., Müller, J.: Influence of the size reduction of organic waste on their anaerobic digestion. Proc. 2nd International Symposium on Anaerobic Digestion of Solid Waste, IWA Publishing, London, 137–144 (1999).

5.        Lehtomaki, A., Huttunen, S., Rintala, J.A.: Laboratory Investigations on co-digestion of Energy Crops and Crop Residues with Cow manure for Methane Production: Effect of Crop to Manure Ratio. Resources, Conservation and Recycling. 51, 591-609 (2006).

6.        Das Ghatak, M., Mahanta, P.: Biogas production from lignocellulosic biomasses. Proceedings of the 22nd National and 11th International ISHMT-ASME Heat and Mass Transfer Conference, organized by IIT Kharagpur, India, 28th to 31st Dec’2013.

7.        Hills, D.J., Roberts, D.W.: Anaerobic digestion of dairy manure and field crop residues. Agricultural Wastes, 3, 179-189 (1981).

8.        Usman, M.A., Olanipekun, O.O., Ogunbanwo, O.A.: Effect of temperature on Biogas production from lignocellulosic substrate. International Journal of Research in Chemistry and Environment, 2, 68-71 (2012).

9.        Mahanta, P., Saha, U.K., Kalita, P.:  The influence of temperature and total solid concentration on the gas production rate of a biogas digester. Journal of Energy in Southern Africa. 15, 112-117 (2004).

10.     Carlos, V., John, B.: Anaerobic Digestion of Laminaria digitata: The effect of temperature on biogas production and composition. Waste Biomass Valor, 4, 509-515 (2013).

11.     Das Ghatak, M., Mahanta, P.: Effect of Temperature on Biogas Production from Lignocellulosic Biomasses, 1st International Conference on Non Conventional Energy (ICONCE 2014), published in IEEE xplore digital library, pp.117-121.  (2014), DOI:10.1109/ICONCE.2014.6808702

12.     Garba, B: Effect of temperature and retention period on biogas production from lignocellulosic material. Elsevier science Ltd. 938 (1996).

13.     Van Lier, J B.: Thermophilic anaerobic wastewater treatment: temperature aspects and process stability.  Ph.D thesis, wageningen Agricultural University, Wageningen, The Netherlands (1995).

14.     Feilden N.E.H.: A note on the temperature for maximum net gas production in an anaerobic digester system. Agricultural Wastes, 3, 75-79 (1981).

15.     Henze M. and Harremoes P.: Anaerobic treatment of wastewater in fixed film reactors – a literature review. Wat Sci Techn, 15, 1-101, (1983).

16.     Rintala J.A. and Lettinga G.: Effects of temperature elevation from 37 to 55 °C on anaerobic treatment of sulphate rich acidified wastewaters. Environ Technol Lett, 13, 801-812 (1992).

17.     Speece R.E. and Kem J.A.: The effect of short-term temperature variations on methane production. J Wat Poll Contr Fed, 42, 1990-1997, (1970).

18.     Van Lier J.B., Rintala J., Sanz Martin J.L. and Lettinga G.: Effects of short-term temperature increase on the performance of a mesophilic UASB reactor. Water Sci Technol, 22, 183-190 (1990).

19.     Gavala, N. H., Angelidaki, I.., Ahring, B. K.: Kinetics and modelling of anaerobic digestion process. Advances in Biochemical Engineering, 81, 57–93. (2003). doi: 10.1007/3-540-45839-5 3.

20.     Budiyono, Widiasa, I.N., Johari, S., Sunarso:  The kinetic of biogas production rate from cattle manure in batch mode. International Journal of chemical and biological Engineering, 3(1), 39-44 (2010).

21.     ]Zhu, B., Gikas, P., Zhang, R., Lord, J., Jenkins B., Li, X.: Characteristics and biogas production potential of municipal solid wastes pretreated with a rotary drum
reactor. Bioresource Technology, 100, 1122-1129 (2009).

22.     Elaiyaraju, P., and Partha, N.: Biogas production from co-digestion of orange peel waste and jatropha de-oiled cake in an anaerobic batch reactor. African Journal
of Biotechnology, 11(14), 3339-3345 (2012).

23.     Nopharatana, A., Pullammanappallil, P.C. Clarke, W.P.: Kinetics and dynamic modelling of batch anaerobic digestion of municipal solid waste in a stirred reactor. Waste Management,  27(5), 595–603 (2007).

24.     Patil J.H., Antony Raj M., Muralidhara P.L., Desai S. M., and Mahadeva Raju G. K.: Kinetics of Anaerobic Digestion of Water Hyacinth Using Poultry Litter as Inoculum. International Journal of Environmental Science and Development, 3(2), 94-98 (2012).

25.     Adiga, S., Ramya, R., Shankar, B.B., Patil J.H., Geetha, C.R.: Kinetics of anaerobic digestion of water hyacinth, poultry litter, cow manure and primary sludge:A comparative study. International Conference on Biotechnology and Environment Management, 2, 14: 73-78 (2012).

26.     Zwietering, M.H., Jongenburger, I., Rombouts F.M., van’tRiet: Modelling the bacterial growth curve.  Applied and Environmental Microbiology, 56(6), 1875-1881 (1990).

27.     Lo, H.M., Kurniawan, T.A., Sillanpää, M.E.T., Pai, T.Y., Chiang, C.F., Chao, K.P., Liu, M.H., Chuang, S.H., Banks, C.J., Wang, S.C., Lin, K.C., Lin, C.Y., Liu, W.F., Cheng, P.H., Chen, C.K., Chiu, H.Y., Wu, H.Y.: Modeling biogas production from organic fraction of MSW co-digested with MSWI ashes in anaerobic bioreactors. Bioresource Technology, 101(16), 6329-6335 (2010). doi: 10.1016/j.biortech.2010.03.048

28.     Agulanna C.N., Onuoha G.N., Anyanwu E.E., Ejike E.N.O, and Ogueke N.V. Experimental Studies of Anaerobic Digestion of Organic Fraction of Municipal Solid Waste Using a Bioreactor with Integral Flow Features. Journal of Emerging Trends in Engineering and Applied Sciences (JETEAS), 3 (3), 461-469 (2012).

29.     Santosh, Y., Sreekrishnan, T. R., Kohli, S., Rana, V.: Enhancement of biogas production from solid substrates using different techniques—a review. Bioresource Technology, 95, 1–10 (2004). doi: 10.1016/j.biortech.2004.02.010.

30.     Kacprzak, A., Krzystek, L., Ledakowicz, S.: Co-digestion of agricultural and industrial wastes. Chemical Papers, 64, 127–131 (2010).  doi: 10.2478/s11696-009-0108-5.

31.     Yusuf, M.O.L., Debora, A., Ogheneruona, D.E.: Ambient temperature kinetic assessment of biogas production from co-digestion of horse and cow dung. Res. Agr. Eng., 57(3), 97-104 (2011).

32.     Kim,J. K., Oh, B. R., Chun, Y.N., Si Wouk Kim, S.W.: Effects of temperature and hydraulic retention time on anaerobic digestion of food waste. Journal of Bioscience and Bioengineering, 102 (4), 328–332 (2006).doi: 10.1263/jbb.102.328


244-249

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

52.

Authors:

Jitendra Kumar Gothwal, Ram Singh

Paper Title:

Study of Fragile Watermarking to Protect the Fingerprint Database Template

Abstract:   Biometric based authentication, described as the science of recognizing an individual based on physical or behavioral characteristics for identity verification is becoming a security mainstay in much areas. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity. Protection of biometric data & templates is gaining interest and crucial issue for the security of biometric systems. Digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. These attacks are intended to either circumvent the security afforded by the system or to deter the normal functioning of the system. Thus a protective scheme is needed which will preserve fidelity and prevent alterations. One possible solution to gratify this problem is by using fragile image watermarking techniques which is one of the sub disciplines of watermarking techniques in information hiding domain. This paper proposed one of the information hiding techniques which is called fragile watermarking techniques that will embed a secondary data into the fingerprint images to cater the vulnerability of the images. In this way, the authenticity of the fingerprint images can be established.

Keywords:
 Biometrics, Fingerprint, Information hiding, Fragile watermarking, Authenticity.


References:

1.       A.K. Jain, A. Ross and S. Prabhakar,”An Introduction to Biometric Recognition”, IEEE Transactions on  Circuits and Systems  for Video Technology, Special issue on  Image- and Video-Based Biometrics, Vol. 14(1), pp. 4-20, Jan. 2004.
2.       A. K. Jain, A. Ross, and S. Pankanti. ”A prototype hand geometry-based verification system,” in Proc. AVBPA’99, Washington, D.C., USA, March 1999, pp. 166–171.

3.       R. Christian and J.L. Dugelay. “A Survey of Watermarking Algorithms for Image Authentication.” EURASIP Journal on Applied Signal Processing,   vol. 2002(6), pp. 613-621, Jun. 2002.

4.       D.Maltoni, D. Maio, A.K.Jain, and S. Prabhakar. Handbook of Fingerprint Recognition. New-York: Springer-Verlag, 2003.

5.       S.C.Sharat. “Online Fingerprint Verification System”, M.S. Thesis,  Department of Electrical Engineering, State University of New York, Buffalo, USA, 2005.

6.       J. D. Woodward. “Biometrics: Privacy’s foe or privacy’s friend?,” IEEE Journal (Special Issue on Automated Biometrics), vol. 85, pp. 1480–1492. Sep. 1997.

7.       B.Ruiz-Mezcua, P. Domingo-Garcia. et al. “Biometrics verification in a real environment,” in Proc. IEEE/ICCST International Carnahan Conference on Security,1999, pp. 243-246.

8.       M. Yeung and F. Mintzer, “Invisible watermarking for image verification,” Journal of Electronic Imaging, vol. 7, no. 3, pp. 578-591, July 1998.

9.       A. Ross, A.K. Jain. et al. “A hybrid fingerprint matcher.” The Journal of Pattern Recognition, vol. 36, pp. 1661-1673, Nov. 2002.

10.     L.C.Ferri, A. Mayerhofer. et al. “Biometric authentication for ID cards with hologram watermarks,” in Proc. SPIE, Security and Watermarking of Multimedia
Contents IV, vol. 4675, Jan. 2002, pp. 629–640.

11.     R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual Watermarks for Digital Images and  Video", Proceedings of the IEEE, vol. 87, no. 7, pp. 1108- 1126, July 1999.

12.     A.K. Jain, S. Pankanti. et al. “Biometrics: A Grand Challenge,” in Proc. IEEE International Conference on Pattern Recognition ICPR-2004, vol. 2, 2004,   pp. 935-942.

13.     A. Ross and A.K. Jain. “Multimodal biometrics: An overview,” in Proc. of 12th European Signal Processing Conference (EUSIPCO), 2004, pp.1221–1224.

14.     U. Uludag, S. Pankanti, and A.K. Jain. “Fuzzy vault for fingerprints,” in Proc. 5th International Conference, AVBPA 2005, vol. 3546, Springer, 2005, pp. 310-319.

15.     B. Schneider, Applied Cryptography. New York: Wiley, 1996, ch. 4.

16.     S. Pankanti and M. Yeung, “Verification watermarks on fingerprint recognition and retrieval,”  Proceedings of the IS&T/SPIE Conference on Security and Watermarking of Multimedia Contents, pp. 66-78, San Jose, California, January 1999.

17.     M. D. Swanson, M. Kobayashi. et al. “Multimedia data-embedding and watermarking technologies.” In IEEE Journal (Special Issue on Multimedia Signal Processing), vol. 86, pp. 1064–1087, Jun. 1998.

18.     J. Fridrich. “Applications of Data Hiding in Digital Images,” in Proc. of the Fifth International Symposium on Signal Processing and its Applications, vol. 1, 1999,
pp.24-31.

19.     I.S. Moskowitz and Neil F. Johnson. A Detection Study of an NRL Steganographic method. Washington DC: Naval Research Laboratory, 2002.


250-254

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

53.

Authors:

Abhijit D. Rane, Venkat N. Ghodke

Paper Title:

Reliability of Thin (Metal) Film Resistors Impact of Pulse Screening

Abstract:   Field defects are the most delicate and severe failures passive components can have. The cost of the  individual failed component is quite low, however, the consequential losses and liability-related costs could be extremely high. The impact of defects could go as far as "No-Go" for vehicles in automotive or aerospace applications or, even worse, in safety-relevant equipment. Specified failure levels of 0,05 ppm (parts per million) for thin-film resistors are quite common in quality assurance contracts between component supplier and customer today. That sounds quite low. But in practice that still means accepting a thousand more or less severe field defects amongst approx. 20 billion produced, sold, and used metal-film resistors world-wide per year. In a long-term study (more than 8 years) the root causes of field defects on thin-film resistors have been studied. Two major groups were isolated and Investigated intensively: Defects cause by (specified) pulse loads, and Defects caused by corrosion of resistive films. Several improvements by reengineering on product and manufacturing process were developed by project teams. The effects will be discussed in detail. As a result of this basic long-term process the failure rate of thin film resistor has been dramatically reduced by three orders of magnitude, down towards sub-ppb-level (parts per billion).Furthermore through this study new knowledge has been gained on control loops of process changes affecting field defect minimization. Paper will show the length of time after which the effectiveness of a Corrective action will become obvious in field data, and the length of time from introduction of an optimized process before significant effects on failure rates in field become measurable.

Keywords:
 Field defects, Pulse load application, Electrochemical corrosion, Failure rate, Defect level.


References:

1.        TaNFilm vs. Nichrome, Moisture Performance Comparison. Company information from IRC.
2.        Kuehl, R.W., Reliability of thin-film resistors: Impact of third harmonic screenings. Microelectronics Reliability 42 (2002) 807 – 813.

3.        Möser, R., Internal communication VISHAY BEYSCHLAG.

4.        Kullmann, R., Internal communication VISHAY BEYSCHLAG.

5.        Reiner W. Kühl, Reliability of Thin (Metal) Film esistors- Towards Sub-PPB-Level - AEC Reliability Workshop 2004.


255-259

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

54.

Authors:

Rashmi Kashyap, Jaspal Bagga

Paper Title:

Equalization Techniques for MIMO Systems in Wireless Communication: A Review

Abstract:   The main objective of this paper is to provide a review of equalization techniques in multiple input, multiple output (MIMO) communication system. In wireless communication inter symbol interference is major obstacle which greatly affect the data quality. The chief goal of equalization techniques is to rebuild the actual signal with the help of filter or any other methods and remove the effect of ISI so that the reliability of data transmission is maintained. Different kind of equalization techniques proposed earlier has been reviewed here.

Keywords:
 MIMO, interference, MMSE, Adaptive, filter, ISI


References:

1.        G.L. Stuber, J.R. Barry, S.W. McLaughlin, Ye Li, M.A. Ingram and T.G. Pratt, “Broadband MIMO-OFDM wireless communications,” Proceed-ings of the IEEE, vol. 92, No. 2, pp. 271-294, February. 2004.
2.        DIG-COMM-BARRY LEEMESSERSCHMITT],Digital Communication:Third Edition, by John R. Barry, Edward A. Lee, David G. Messerschmitt

3.        Shailesh Shankhi, K.Satya Prasad, “Performance Analysis of Channel Estimation Based on MMSE Equalizer in OFDM System”, International Journal of Advanced Innovative Research, Vol. 2 Issue 8, ISSN: 2278-7844, pp. no.-155-159.

4.        Madan Lal, Hamneet Arora, “BER Performance of Different Modulation Schemes for MIMO Systems”, International Journal of Computer Science and Network Security (IJCSNS), VOL.11 No.3, pp.no.-69-72. March 2011.

5.        Kala Praveen Bagadi, Prof. Susmita Das, MIMOOFDM Channel Estimation using Pilot Carries, International Journal of Computer Applications, ISSN No.- 0975 – 8887, Volume 2 – No.3, pp 81-88, May 2010

6.        WIRELESS-TSE,VISWANATH] Fundamentals of Wireless Communication, David Tse, Pramod Viswanath.

7.        G. Leus, S. Zhou, and G. B. Giannakis, “Orthogonal multiple access over time- and frequency-selective channels,” IEEE Transactions on Information Theory, vol. 49, no. 8, pp. 1942–1950, 2003.

8.        H. Nyquist, “Certain topicisn telegraph transmission theory,”Trans. AIEE, vol. 47, pp. 617-644, Apr. 1928.

9.        B. Widrow and M. E. Hoff, Jr., ”Adaptive switching circuits,”in /REWESCON Conv. Rec., pt. 4, pp. 96-104, Aug. 1W.

10.     “Techniques for adaptive equalization  of digital communication systems,” Bell Syst. Tech. I., vol. 45, pp. 255-286,Feb. 1966.

11.     J, W. Smith, “The joint optimization of transmitted signal and receiving filter for data transmission systems,” Bell Spt. Tech. J., voi. 44, pp. 2363-2392, Dec. 1965.

12.     D. W. Tufts, “Nyquist’s problem-The joint optimization of transmitter and receiver in pulse amplitude modulation,” Proc. IEEE, vol. 53, pp. 248-260, Mar. 1965.

13.     D. A. George, ’Matched filters for interfering signals,” IEEE Trans. Inform. Theory  (Corresp.), vol. IT-11,  pp. 153-154, Jan.1965.

14.     D. M. Brady, “An adaptive coherent diversity receiver for data transmission through dispersive media,” in Proc. 7970 IEEE Int. Conf. Commun., pp. 21-35 to 21-39, June 1970.

15.     C. D. Forney, S. U. H. Qureshi, and C. K. Miller, “Multipoint networks: Advances in modem design and control,” in Nat.Telecom. Conf. Rec., pp. 50-1 -1 to 50-1 -4, Dec. 1976.

16.     H. L. Logan and C. D. Forney, Jr., “A MOS/LSI multiple configuration 9600 b/s data modem,” in Proc. IEEE Int. Conf. Commun., pp. 48-7 to 48-12, June 1976.

17.     P. Monsen, “Theoretical and measured performance of a DFE modem on a fading multipath channel,” IEEE Trans. Commun., vol. COM-25, pp. 1144-1153, Oct. 1977.

18.     M. L. Honig and D. G. Messerschmitt, Adaptive Filters; Structures, Algorithms, and Applications. Boston, MA: Kluwer Academic Pub., 1984.

19.     M. Morf, T. Kailath, and L. Ljung, “Fast algorithms for recursive identification,” in Proc. 7976 IEEE Conf. Decision Contr.(Clearwater Beach, FL, Dec. 1976), pp. 9l6-921.

20.     M. S. Mueller, “Least-squares algorithms for adaptive equalizers,” Bell Spt. Tech. I., vol. 60, pp. 1905-1925, Oct. 1981.

21.     “On the rapid initial convergence of least-squares equalizer adjustment algorithms,” Bell Syst. Tech. J., vol. 60, pp. 2345-2358, Dec. 1981.

22.     K. Murano, Y. Mochida, F. Amano, and T. Kinoshita, “Multiprocessor architecture for voiceband data processing (application to 9600 bps modem),” in Proc. IEEE Int. Conf. Cornmun., pp. 37.3.1-37.3.5, June 1979.

23.     J. M. Cioffi and T. Kailath, “Fast, recursive-least-squares,transversal filters for adaptive filtering,” IEEE Trans. Acoust.,Speech, Signal Process., vol. ASSP-32, pp. 304-337, Apr. 1984.

24.     J. M. Cioffi and T. Kailath, ”An efficient exact-least-squares fractionally spaced equalizer using intersymbol interpolation,“ IEEE J, Selected Areas Commun., vol. SAC-2, pp. 743-756, Sept. 1984

25.     D. D. Falconer and L. Ljung, “Application of fast Kalman estimation to adaptive equalization,” IEEE Trans. Commun., VOIC. OM-26, pp. 1439-1446, Oct. 1978

26.     F. Ling and J. G. Proakis, “A generalized multichannel least squares lattice algorithm based on sequential processing stages,” IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-32, pp. 381-389, Apr. 1984.

27.     J. Makhoul, “A class of all-zero lattice digital filters: properties and applications,” IEEE Trans. Acoust., Speech, Signal Process., vol. ASSP-26, pp. 304-314, Aug. 1978.

28.     M. Morf, T. Kailath, and L. Ljung, “Fast algorithms for recursive identification,” in Proc. 7976 IEEE Conf. Decision Contr. (Clearwater Beach, FL, Dec. 1976), pp. 9l6-921.

29.     E. H. Satorius and S. T. Alexander, “Channel equalization using adaptive lattice algorithms,” IEEE Trans. Commun. (Concise Paper), vol. COM-27, pp. 899-905, June 1979.

30.     E. H. Satorius and J. D. Pack, ”Application of least squares lattice algorithms to adaptive equalization,” IEEE Trans. Commun., vol. COM-29, pp. 136-142, Feb. 1981.

31.     B. Friedlander, ”Lattice filters for adaptive processing,” Proc. IEEE , voi. 70, pp. 829-867, Aug. 1982.

32.     Digital Communications. New York: McCraw-Hill,1983.

33.     “Adaptive Equalization” by SHAHID U. H. QURESHI, SENIOR MEMBER, IEEE Vol.4, No.4, October, 2010

34.     “ZERO-FORCING EQUALIZATION FOR TIME-VARYING SYSTEMS WITH MEMORY “ by Cassio B. Ribeiro, Marcello L. R. de Campos, and Paulo S. R. Diniz.

35.     ZERO-FORCING FREQUENCY DOMAIN EQUALIZATION FOR DMT SYSTEMS WITH INSUFFICIENT GUARD INTERVAL by Tanja Karp , Martin J. Wolf , Steffen Trautmann , and Norbert J. Fliege

36.     Wireless communications and networks : second edition, by Theodore S. Rappaport

37.     G. Leus, S. Zhou, and G. B. Giannakis, “Orthogonal multiple access over time- and frequency-selective channels,” IEEE Transactions on Information Theory, vol. 49, no. 8, pp. 1942–1950, 2003.

38.     Amit Kumar Sahu, Sudhansu Sekhar Singh, “BER Performance Improvement Using Mimo Technique Over Rayleigh Wireless Channel With Different Equalizers”, International Journal of Engineering and Technology (IJET), ISSN No.- ,333-340.

39.     Anuj Kanchan, Shashank Dwivedi, “Comparison of BER Performance in OFDM Using Different Equalization Techniques”, International Journal of Engineering and Advanced Technology(IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-6, August 2012, pp. no.- 139-143.

40.     V.Jagan Naveen, K.Murali Krishna, K.Raja Rajeswari, “Performance analysis of equalization techniques for MIMO systems in wireless communication”, International Journal of Smart Home Vol.4, No.4, pp. no.-47-63, October 2010.

260-264

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

55.

Authors:

Vedkiran Saini, Parvinder Bangar

Paper Title:

Design and Implementation of Advanced Encryption Standard Algorithm-128 using Verilog

Abstract:   Security has become an increasingly important feature with the growth of electronic communication. The Symmetric in which the same key value is used in both the encryption and decryption calculations are becoming more popular. AES is a symmetric encryption algorithm processing data in block of 128 bits. Under the influence of a key, a 128-bit block is encrypted by transforming it in a unique way into a new block of the same size. In this paper our main concerns is study AES algorithm and implement all modules of AES algorithm on FPGA. This methodology uses verilog HDL implementation of all the modules of AES algorithm Substitution Bytes Transformation, Shift Rows, Transformation, Mix Columns Transformation, Add Round Key Transformation and present power two different frequency 25 MHz.  and 50 Mhz. frequency. The codes have been synthesized using Xilinx ISE 9.1i software for a Virtex 5 FPGA device.

Keywords:
 Advanced Encryption Standard (AES), Rinjdael, Cryptography.


References:

1.       Xinmiao Zhang and Keshab K. Parhi “Implementation Approaches for the Advanced Encryption Standard Algorithm”IEEE 2002
2.       X. Zhang and K. K. Parhi, “High-speed VLSI architectures for the AES algorithm,”IEEE Transactions on Very Large Scale Integration Systems, vol.12, issue 9, pp.95 967, Sep. 2004.

3.       Hui QIN, Tsutomu SASAO, Yukihiro IGUCHI “An FPGA Design of AES Encryption Circuit with 128-bit Keys”GLSVLSI’05, ACM 2005.

4.       Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar “FPGA Implementation of AES Encryption and Decryption” International Conference on Control,Automation, Communication and Energy conservation -2009

5.       Chih-Peng Fanand and Jun-Kui Hwang “FPGA Implementations Of High Throughput Sequential And Fully Pipelined AES Algorithm” International journal of Electrical Engineering, vol.15, no.6, pp. 447-455, 2008.

6.       Pachamuthu Rajalakshmi, “Hardware-software co-design of AES on FPGA” International Conference on Advances in Computing, Communications and
Informatics, Pages 1118-1122, 2010.

7.       Mehran Mozaffari-Kermani and Arash Reyhani-Masoleh “Efficient and High Performance Parallel Hardware Architecture for the AES-GCM” IEEE Transactions On
Computers, vol.61, no. 8, August 2012.

8.       Saambhavi Baskaran and Pachamuthu Rajalakshmi “Hardware Software Co-Design of AES on FPGA” ICACCI ’12,ACM August 2012.

9.       Pallavi Atha et al, “Design & Implementation Of AES Algorithm Over FPGA Using VHDL”, International Journal of Engineering, Business and Enterprise Applications (IJEBEA)”, ISSN (Online): 2279-0039,pp. 58-62,2013

10.     M. komala subhadra et al, “Advanced Encryption Standard - VHDL Implementation”, International Journal For Technological Research In Engineering, ISSN (Online): 2347 - 4718, Volume 1, Issue 3, pp.132-137 November – 2013.

11.     Archana garg et al, “Implementation of Advanced Encryption Standard Algorithm using VHDL”, International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9, pp. 3956- 3961,September 2013

12.     Yoshimura, M. et al, “Defect and Fault Tolerance in VLSI and Nanotechnology Systems (DFT)”, IEEE International Symposium on Page(s):278 – 283, 2013

13.     Hui QIN, Tsutomu SASAO, Yukihiro IGUCHI “An FPGA Design of AES Encryption Circuit with 128-bit Keys” GLSVLSI’05, ACM 2005

14.     Chih-Peng Fanand and Jun-Kui Hwang “FPGA Implementations of High Throughput Sequential and Fully Pipelined AES Algorithm” International journal of Electrical Engineering, vol.15, no.6, pp. 447-455, 2008.

15.     Mehran Mozaffari-Kermani and Arash Reyhani-Masoleh“Efficient and High Performance Parallel Hardware Architecture for the AES-GCM” IEEE Transactions On Computers, vol.61, no. 8, August 2012.

16.     Archna Garg et al, “Efficient Field Programmable Gate ArrayImplementation of Advanced Encryption Standard Algorithm using VHDL”, International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9, pp. 3956-3961,September 2013

17.     Saambhavi Baskaran and Pachamuthu Rajalakshmi “Hardware Software Co-Design of AES on FPGA” ICACCI ’12,ACM August 2012.

18.     Ashwini M. Deshpande, Mangesh S. Deshpande and Devendra N. Kayatanavar “FPGA Implementation of AES Encryption and Decryption” International Conference on Control, Automation, Communication and Energy conservation -2009.

19.     Richa Sharma, Purnima Gehlot, S. R. Biradar, “VHDL Implementation of AES-128, UACEE International Journal of Advances in Electronics Engineering – IJAEE, Volume 3 : Issue 2, [ISSN 2278 – 215X],pp-17-20, 2013

20.     X. Zhang and K. K. Parhi, “High-speed VLSI architectures for the AES algorithm,”IEEE Transactions on Very Large Scale Integration Systems, vol.12, issue 9, pp.95 967, Sep. 2004.

21.     Jin Gong ,Wenyi Liu, Huixin Zhang “Multiple Lookup Table- Based AES Encryption Algorithm Implementation” Elseveir- 2012 vol.25 pg no.842 – 847.

22.     Biham, Eli and Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993.

23.     National Institute of Standards and Technology, “Federal Information Processing Standards Publication 197”, 2001

24.     Jin Gong ,Wenyi Liu, Huixin Zhang “Multiple Lookup Table- Based AES Encryption Algorithm Implementation” Elseveir- vol.25 pg no.842 – 847, 2012.

25.     SCHNEIER, B. : Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, 1996

26.     O. Prasanthi ,M. Subba Reddy et al., “RSA Algorithm Modular Multiplication”, International Journal of Computer Applications in Engineering Sciences , VOL II, ISSUE II, pp.53-55,JUNE 2012

265-268

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

56.

Authors:

Bhalchandra D. Dhokale, Ramesh Y. Mali

Paper Title:

A Robust Image Watermarking Scheme Invariant to Rotation, Scaling and Translation Attack using DFT

Abstract:   Rapid development of digital technology has improved the ease of access to digital information copied, processed, stored and distributed among unauthorized users using freely available software.  It  also  leads  to  the consequence  of  making the illegal production  and  redistribution  of digital  media  easy  and undetectable. Hence,  the  risk  of  copyright  violation  of  multimedia  data  has  increased  due  to  the  enormous  growth  of computer  networks  So, digital watermarking technique provides solution to the problem. Watermarking is the process in which an informal data is incorporated in original data to protect the owner’s copyright over that content... Traditional watermarking schemes are sensitive to geometric distortions, in which synchronisation for recovering embedded information is a challenging task because of the disorder caused by rotation, scaling or translation (RST). The existing RST resistant watermarking methods still have limitations with respect to robustness, capacity and fidelity. Several  types  of  watermarking algorithms  have  been  developed  so  far  each  of  which  has  its  own  advantage and  limitations. Among these discrete Fourier transform (DFT)  based  watermarking  algorithms  have  attracted researchers  due to its simplicity  and some  attractive  mathematical properties  of  DFT.  Experimental results have been compared with existing algorithm which seems to be promising.

Keywords:
 Rotation, RST, DFT, scale, translation, watermarking.


References:

1.       Felix O. Owalla, Student Member,” A Robust Image Watermarking Scheme Invariant to Rotation,Scaling and Translation Attacks” IEEE and Elijah Mwangi, Member, IEEE,2012
2.       IEEE Trans.” Image Process”. :Vol. 20, No. 12, pp.3524-3533, 2011.

3.       Ó Ruanaidh et al., "Rotation, Scale and Translation Invariant Digital Image Watermarking," Proc. IEEE Int. Conf. on Image Processing, Oct. 1997, pp. 536-539.*

4.       R. Gonzalez, R.E. Woods, S.LProcessing, 3rd Edition, New Delhi, InLearning Pvt. Ltd, 2008.

5.       H.C. Huang, S.C. Chu “VQ-Based Watermarking Techniques”, Journal of Comput., Vol.17, No.2,pp.37-50, July 2006.

6.       Wilson Wai Lun FUNG and Akiomi KUNISA,” rotation, scaling, and translation-invariant multi-bit watermarking based on log-polar mapping and discrete fourier transform” 0-7803-9332-5/05 ©2005,IEEE.

7.       I. Cox, M. Miller, and J. Bloom, Digital Watermarking. New York:Morgan Kaufmann, 2002.

8.       I. J. Cox, M. L. Miller, and J. A. Bloom,” Digital Watermarking”, SanFrancisco, CA: Morgan, Kaufman, 2001.


269-273

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

57.

Authors:

A. Chandra Suresh, K.V.N.M. Prasad, R. Upender Rao

Paper Title:

Development and Implementation of PRTOS on Robotic Navigation System

Abstract:   A real-time operating system (RTOS) is a software which ensures that time critical events are processed as efficiently as possible. In this paper, an attempt has been taken to implement a real time operating system, named Preemptive Real Time Operating System (PRTOS), in which all of the important tasks regarding to a real time application have been considered. In this PRTOS, strictly preemptive scheduling algorithm has been used. This Scheduling policy makes sure that important tasks are handled first and the less important later. In this paper we are using free RTOS. Free RTOS” is a small but powerful real-time kernel and it is used in many commercial applications. In this paper our intention is to design and construct a self navigating robot which works on Preemptive priority algorithm. This Free  RTOS supports Tasking, Semaphores, Timer Management, Message Queues, Single Step Debugging support, and with Task synchronization.  In this paper Robot is operated with Global Positioning system which allows the robot to aware of its position on the earth. Here PRTOS concept is implemented to control the different operational tasks .Hence This robots found some   Real time applications like war fields ,mines and complex locations  where the humans unable to reach.

Keywords:
 Pre-emitive prioroity algorithm,Task synchronisation,Real Time operating system,Scheduling policy,Self navigation,Global position System


References:

1.        Dedicated Systems Experts, “What makes a good RTOS. Brussels”, Dedicated Systems Experts, Belgium, 2001
2.        Brian Santo, “Embedded Battle Royale,” IEEE Spectrum, pp.36-41, December, 2001.

3.        VxWorks Programmer’s Guide, 5.1, Wind River Systems, 1993.

4.        L. M. Thompson, “Using pSOS+ for embedded real-time  computing,” in COMPCON, pp. 282-288, 1990.

5.        D. Hildebrand, “An architectural overview of QNX,” in Proc. Usenix Workshop on Micro-Kernels and Other Kernel Architectures, Apr. 1992.

6.        Sriram V Iyer, Pankaj Gupta, “Embedded Realtime Systems Programming”, Tata McGraw-Hill, 2004.

7.        Andrew S. Tanenbaum, Albert S. Woodhull, “Operting Systems Design and Implementation”, Second Edition, Prentice-Hall, 2001.

8.        Jean J. Labrosse, ìC/OS: The Real-Time Kernel, R&D Publications, Lawrence, 1993.

9.        S.-J. Oh, et al., “Deterministic Task Scheduling for Embedded Real-Time Operating Systems,” IEICE Trans. Inf. & Syst., Vol. E87-D, No. 2, pp. 123-126 , Feb. 2004.


274-279

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

58.

Authors:

Panduranga Talavaru, Nagaraj Naik R, V. Kishore Kumar Reddy V

Paper Title:

Microcontroller Based Closed Loop Speed and Position Control of DC Motor

Abstract:   Direct current (DC) motor has become an important drive configuration for many applications across a wide range of powers and speeds, due to its easy control and excellent performance. This project is mainly concerned on design and implementation of bidirectional dc motor speed and position control system by using microcontroller ATMEGA32 and Lab VIEW software. It is a closed-loop real time control system, where optical encoder is coupled to the motor shaft to provide the feedback speed signal and angular position of shaft to the microcontroller. Pulse Width Modulation (PWM) technique is used which is generated using microcontroller Atmega32 the PWM signal generated will drive the motor driver circuit. By varying the duty cycle the voltage across the motor is varied.  Lab VIEW software is used to provide a graphic user interface (GUI) for the user to enter desired speed or desired angle. From the hardware results it is observed that the speed of dc motor remains constant irrespective of the load across it. The angular position control was on par with the desired values.

Keywords:
 Mmicrocontroller ATMEGA32, Graphical User Interface, Pulse width modulation


References:

1.       Umeno, T. “Robust speed control of DC servomotors using modern two degrees-of-freedom controller design” IEEE transaction on Industrial electronics, Volume: no -38, Issue: 5, pp .363 – 368, Oct 1991.
2.       Utkin, V.I. “Sliding mode control design principles and applications to electric drives” IEEE transaction on Industrial electronics, Volume: no -40, Issue: 1, pp .23
36, Feb 1993.

3.       Mao-Fu Lai “Fuzzy logic in the phase-locked loop DC motor speed control system” Proceedings of the IEEE International Symposium on Industrial Electronics, 1997, volume no-3, pp- 1222 – 1227, 7-11 Jul 1997.

4.       Kadwane, S.G.”Converter Based DC Motor Speed Control Using TMS320LF2407A DSK” 1st IEEE Conference on Industrial Electronics and Applications, pp 1-5, Print ISBN: 0-7803-9513-1, 26 May 2006.

5.       Machbub, C “Design and implementation of adaptive neural networks algorithm for DC motor speed control system using simple microcontroller” Power Electronics and Drive Systems, 2001. Proceedings. 2001 4th IEEE International Conference, volume no 2, pp 479-483, 25 Oct. 2001.

6.       Machbub, C “Design and implementation of adaptive neural networks algorithm for DC motor speed control system using simple microcontroller” Power Electronics and Drive Systems, 2001. Proceedings. 2001 4th IEEE International Conference, volume no 2, pp 479-483, 25 Oct. 2001.

7.       Jonathan Scott, W. Howell Round “Speed Control with Low Armature Loss for Very Small Sensor less Brushed DC Motors” IEEE Transactions on Industrial Electronics, Volume no 56, issue 4, pp 1223 - 1229, Apr 2009.

8.       D. R. Tutakne, Hiralal M. Suryawanshi “Adaptive Pulse Synchronizing Control for High-Power-Factor Operation of Variable Speed DC-Drive” IEEE Transactions on Power Electronics, Volume: no -22, Issue: 6, pp 2499 - 2510, Nov, 2007.

9.       Betin, F.“A time-varying sliding surface for robust position control of a DC motor drive” IEEE Transactions on industrial electronics, Volume: no -49, Issue: 5, pp .462 – 473, Apr 2002.

10.     Sharaf, A.M.” A flexible gain error driven position controller for DC motor drives” Proceedings of ICECS '99. The 6th IEEE International Conference on Electronics, Circuits and Systems, 1999. Volume no 2, pp 981 – 984, Sept 1999.

11.     Aaron, K.R “Closed-loop position control system using Lab VIEW” Southeast Con, Proceedings IEEE, volume no 34, pp 283-286, Apr 2002.

12.     Morales-Caporal, R.“DSP-Based Digital Torque/Motion Control of DC Motors for Direct-Drive Industrial Robotic Applications” Conference on Electronics, Robotics and Automotive (CERMA) Mechanics, pp 613 - 618, Oct 2010.


280-285

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

59.

Authors:

Priyanka Nanaware, Rahul Ambekar

Paper Title:

Enhancing Scalable Database-Driven Reverse Dictionary

Abstract:   Contrasting a traditional Forward Dictionary which convert word to their meaning ,we express design and implementation of reverse dictionary,  a reverse dictionary return a set of candidate words that assure the input phrase, that input phrase concerning the desired idea. in current paper , we here a set of algorithms and the results of a set of experiment showing the retrieval accurateness of our methods and the runtime response time performance of our completion. This effort has Major useful for general public those who work closely with word also in general field of conceptual search. Our  conduct experiment judge against the quality of the result to currently available implementations of reverse dictionary also to provide major improvements in performance level.

Keywords:
 Dictionaries, Search process, Web-based services, Reverse mapping


References:

1.        Ryan Shaw, Debra Vander Meer and Kaushik Dutta ”Building a Scalable Database-Driven Reverse Dictionary”, vol. 25,no. 3,march 2013.
2.        T. Dao and T. Simpson,  “Measuring Similarity between Sen-tences, ”http://opensvn.csie.org/WordNetDotNet/trunk/Projects/Thanh/Paper/WordNetDotNet_Semantic_Similarity.pdf(last accessed 16 Oct. 2009), 2009.

3.        Dictionary.com, LLC, “Reverse Dictionary,”http://dictionary. reference.com/reverse, 2009.

4.        E. Gabrilovich and S. Markovitch, “Wikipedia-Based Semantic Interpretation for Natural Language Processing,” J. Artificial Intelligence Research, vol. 34, no. 1, pp. 443-498, 2009.

5.        T. Hofmann, “Probabilistic Latent Semantic Indexing,” Proc. Int’l Conf. Research and Development in Information Retrieval (SIGIR),pp. 50-57, 1999.

6.        OneLook.com, “Onelook.com Reverse Dictionary,” http://www.onelook.com/, 2009.

7.        X. Phan and C. Nguyen, “A c/c++ Implementation of Latent Dirichlet Allocation (lda) Using Gibbs Sampling for Parameter Estimation and Inference,” http://gibbslda.sourceforge.net/, 2010.

8.        D. Milne and I. Witten, “Learning to Link with Wikipedia,” Proc.17th ACM Conf. Information and Knowledge Management, pp. 509-518, 2008.

9.        D. Widdows and K. Ferraro, “Semantic Vectors,”http://code.google.com/p/semanticvectors/, 2010


286-289

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

60.

Authors:

Vijay Singh Solanki, Siddhartha Rokade, Anuj Jaiswal

Paper Title:

Leakage of Transit Ridership in BCLL Bus Service over Private Bus Service Provider in Bhopal

Abstract:   Leakage in the primary public transport system comparing other secondary private transport is major problem in Bhopal as other Indian cities. There are numbers of corridors on which both BCLL buses (government undertaking) and private buses are running, but major problem is leakage in transit ridership mean in these corridor the ridership in private buses are more compared to the BCLL buses although the better facilities are provided in BCLL buses. This becomes the major cause that affects the revenue of BCLL buses which are government undertaking. For increasing the revenue of BCLL buses, there is a need to shift the bus users from private bus service to BCLL bus services. For this study, we select the corridor from HEG Mandideep to Bharat Takies known as Trunk Route no.2 (TR-2) for identifying the reasons for leakage in transit ridership. In this study we have selected three parameters of travel behavior as they directly affected the demand generation in our context. The selected parameters are travel cost, travel time and service qualities as mentioned in the study. Six major bus stops in the corridor are selected and conduct the opinion survey along these stops mainly to understand the reasons for not using BCLL for that trip and the priority under which a commuter can have the mode choice.

Keywords:
 Leakage in Transit Ridership, BCLL, Public Transport System.


References:

1.        City Development Plan, Bhopal under JNNURM, A Report, Bhopal Municipal Corporation, Bhopal,2009
2.        Damor, N.M. kumara, S. Hajiani, N.D (April 2014) “Review of Comparative study on ridership for urban mass transit systems: a case study of Ahmedabad” International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-4

3.        Jaiswal, A and Sharma, A 2012, “Optimisation of Public transport demand: case study of Bhopal”, International Journal of Scientific and Research Publication, vol 2, issue 7,pp 1-16

4.        Kadiyali,L.R,(2008) “Traffic Engineering and Transportation Planning”, Khanna Publishers, Seventh Edition, Delhi

5.        Muthukannan, M and Thirumurthy A (April 2008) “modelling for Optimization of Urban Transit System Utility”, ARPN Journal of Engineering and Applied Sciences, vol.3, no.2, pp. 71-74

6.        Ramesh, M. Kumar, “Discrete Choice Model For Optimization of Urban Transit System : A Case Study.”

7.        Shimazaki, T. Kazunori, H. and Shihana, S. M. 1994.“Comparative study of transportation modal choice in Asian countries”, Transportation Research Record. 1441: 71-83.

8.        Schimek, P, 1996. “Automobile and public transit use in the United States and Canada: comparison in the postwar trends”,Transportation Research Record 15.3-11


290-294

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

61.

Authors:

Lasker, Md. Minhaz Zaman, Majumdar, Md. Shahadat Hossain, Chowdhury, H.M. Ashiqur Rahman Ferdous, Jannatul, Chisty, Nafiz Ahmed

Paper Title:

Design of a Device for Power Harvesting From Radio Frequency Signal

Abstract:   This paper discusses a prototype that will harvest available RF waves in urban areas especially from 700 MHz to 6 GHz. The harvested energy, which of very low magnitude, is later amplified to a suitable value for the use in consumer appliances, especially for mobile devices. It will increase the mobility of the device and allow to use the unused electromagnetic wave for daily purposes, thus reducing the pressure on national power grid in a broad sense. In addition describes efficient methods for extracting DC power from electromagnetic radiation.

Keywords:
 Yagi-Uda antenna, CST software, RF signal, Energy harvesting device


References:

1.        Lasker, Md. Minhaz Zaman, Majumdar, Md. Shahadat Hossain, Chowdhury, H.M. Ashiqur Rahman, Ferdous, Jannatul, “Design and implementation of a device for power harvesting from radio frequency signal” [Unpublished]
2.        IEEE, "IEEE Standard Definitions of Terms for Antennas," IEEE, pp. 0-1, February 1983. [Online].Available:http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=30651&isnumber=1290 

3.        Antenna, Antenna Masts and Pre-Amplifiers. [Online]. Available:www.frankoniagroup.com/.../Antennas/Antennas%20Komplett.pdf

4.        Full wave bridge rectifierAvailable: http://www.circuitstoday.com/full-wave-bridge-rectifier

5.        Voltage Regulator General Design Fundamentals(2009).[online]Availableon:http://www.analog.com/static/imported-files/pwr_mgmt/PM_vr_design_08451a.pdf

6.        Types of Voltage Regulators by Matthew Burris.[Online]Available on: http://components.about.com/

7.        Mario Delgadillo, Maringan Pardamean Panggabean, “2.4GHz Yagi-Uda Antenna”, EE 172 Extra Credit Project, SAN JOSE STATE UNIVERSITY

8.        Radiated Efficiency: A True Measure of Antenna Performance by JouniLifländer, RF Designer, Pulse Finland Oy. Available:http://www.pulseelectronics.com/download/3720/g040/pdf


295-302

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

62.

Authors:

Pramod Kumar Sahu, Dinesh Kumar Whavnani

Paper Title:

Thyroid Segmenetation and Area Measurement using Active Contour

Abstract:   In this paper, we are presenting a simple guide to determine the thyroid Segmentation and Area lobes in the thyroid ultrasound image using a MATLAB.  The thyroid measurement, recognition and segmentation system is very useful in the medical field because it measurement is important for the doctor diagnostic and medical analysis. Ultrasound image using undergoes the contrast enhancement and enhancement image .The enhancement image is used segmentation the thyroid region by local region active contour. The thyroid region is segmented into the 2 parts that is right and left with the active contour method separately. the thyroid have two lobes; right lobe and left lobe. We take five samples, different people have different size and area of thyroid, especially for measurement of the width, depth and area Therefore, measurements only involve the width, depth and area of the thyroid of particular region. The result of thyroid measurement is successfully calculated in pixel unit that can be  converted in centimetre (cm) unit. The proposed method is benefited to enhance the image and segmentation the thyroid lobe.

Keywords:
 Thyroid medical imaging, ultrasound image, Contrast Enhancement, local area Active Contours


References:

1.       S. Chen, Bg. Mulgrew, and P. M. Grant, “A clustering technique for digital communications channel equalization using radial basis function networks,” IEEE Trans.  Neural Networks, vol. 4, pp. 570-578, July 1993.
2.       J. U. Duncombe, “Infrared navigation—Part I: An assessment of feasibility,” IEEE  Electron Devices, vol. ED-11, pp. 14-39, Jan. 1959.

3.       C. Y. Lin, M. Wu, J. A. Bloom,  J. Cox, and M. Miller, “Rotation, scale, and translation resilient public watermarking for images,” IEEE Trans. Image Process., vol. 10, no. 5, pp. 767-782, May 2001.

4.       A. Cichocki and R. Unbehaven, Neural Networks for Optimization and Signal Processing, 1st ed. Chichester, U.K.: Wiley, 1993, ch. 2, pp. 45-47.

5.       W.-K. Chen, Linear Networks and Systems, Belmont, CA: Wadsworth, 1993, pp. 123-135.

6.       R. A. Scholtz, “The Spread Spectrum Concept,” in Multiple Access, N. Abramson, Ed. Piscataway, NJ: IEEE Press, 1994, ch. 3, pp. 121-123.

7.       G. O. Young, “Synthetic structure of industrial plastics,” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New York: McGraw-Hill, 1964, pp. 15-64.

8.       S. P. Bingulac, “On the compatibility of adaptive controllers,” in Proc. 4th Annu. Allerton Conf. Circuits and Systems Theory, New York, 1994, pp. 8-16.

9.       W. D. Doyle, “Magnetization reversal in films with biaxial anisotropy,” in Proc. 1987 INTERMAG Conf., 1987, pp. 2.2-1-2.2-6.

10.     Tay, P.C.,Garson, C.D., Acton, S.T., and Hossack, J.A., Ultrasound Despeck- ling for Contrast Enhancement. IEEE Transactions on Image Processing,

11.     2010, 19 (7), pp. 1847-1860.

12.     Frederic L. Lizzi, Ernest J. Feleppa, Image Processing and Pre-Processing forMedical Ultrasound. AIPR '00 Proceedings of the 29th

13.     Applied Imagery Pattern Recognition Workshop, 2000.

14.     SoongDer C., Ramli A.R., Contrast Enhancement using Recursive Mean- Separate Histogram Equalization for Scalable Brightness Preservation. IEEE Transcation on Consumer Electronics, 2003, 49 (4), pp. 1301-1309.

15.     Lankton, S.; Tannenbaum, A., Localizing Region-Based Active Contours.  IEEE Transaction on Image Processing, 2008, 17(11), pp. 2029-2039.

16.     Robert J. Amdur, Ernest L. Mazzaferri, Basic Thyroid Anatomy, in Essentials of Thyroid Cancer Management, Springer US, 2005. pp. 3-6.

17.     Savelonas, M., Maroulis, D., Iakovidis, D., Karkanis, S., Dimitropoulos, N., A variable background active contour model for automatic detection of thyro- id nodules  in ultrasound  images.  International  Conference on Image Processing (ICIP), 2005, pp.17-20.

18.     H.  Jack  Baskin,  Daniel  S.  Duick, Thyroid Ultrasound  and Ultrasound- Guided FNA, Springer, Second Edition, NY, USA, 2008, pp. 253.

19.     Kollorz, E.N.K., Hahn, D.A., Linke, R., Goecke, T.W., Hornegger, J., Kuwert, T., Quantification of Thyroid Volume Using 3-D Ultrasound Imaging, IEEE Transaction on Medical Imaging, 2008, 27(4), pp.457- 466.

20.     Eko Supriyanto, Lai Khin Wee, Too Yuen Min, Ultrasonic Marker Pattern Recognition  Measurement Using Artificial Neural Network,  9th WSEAS International Conference on Signal Processing (SIP) Italy, 2010, pp. 35-40.

21.     K. W. Lai, E. Supriyanto, Automatic Detection of Fetal Nasal Bone in 2 Di- mensional Ultrasound Image using map matching. Proceedings of the 12th WSEAS International Conference on Automatic Control, Modelling & Simu- lation, 2010. pp. 305-309

22.     Tsu-Cheng Jen, Hsieh, B., Sheng-Jyh Wang, Image contrast enhance- ment based on intensity-pair distibution. International Conference on Im- age Processing (ICIP), 2005, pp. 913-916

23.     Mendi E., Milanova M., Image segmentation with active contours based on selective visual attention. Proceedngs of the 8th WSEAS International Con- ference on Signal Processing, 2009, pp. 79-84.


303-307

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

63.

Authors:

Y. M. Gaikwad, K. N. Pawar

Paper Title:

Artificial Neural Network Based Visual Recognition System using Dwt for Hearically Impaired Person

Abstract:   Generally image processing is done to process an image for different application. There is variety of transform base feature extraction method. Visual recognition system or lip reading method is important generally in noisy condition. The new modality in image processing area is gives you dictation of voice. The discrete cosine transforms (DCT) and discrete wavelet transform (DWT) are techniques for converting a signal into elementary frequency components. These are widely used in image compression. Here we develop some functions to compute the DWT and to compress images. These functions illustrate the power of Mathematic in the prototyping of image processing algorithms. The rapid growth of digital imaging applications, including desktop publishing, multimedia, teleconferencing, and high-definition television (HDTV) has increased the need for effective and standardized image compression techniques.

Keywords:
 ANN, DCT, DWT, HMM.


References:

1.        K.N.Pawar,Y.M.Gaikwad “A visual recognition systems for hearically impaired person –Review”(2014) ,IJETAE
2.        Rachel Ostrand, Sheila E. Blumstein, James L. Morgan ‘When Hearing Lips and Seeing Voices Becomes Perceiving Speech: Auditory-Visual Integration in Lexical Access’.

3.        Rowan Seymour, Darryl Stewart, and JiMing ‘Comparison of Image Transform-Based Features for Visual Speech Recognition in Clean and Corrupted Videos’,Received 28 February 2007; Revised 13 September 2007; Accepted 17 December 2007.

4.        E. D. Petajan, ‘Automatic lipreading to enhance speech recognition’, Ph.D. thesis, University of Illinois, Urbana-Champaign, Ill, USA, 1984.

5.        G. Potamianos and H. P. Graf, “Linear discriminant analysis for speech reading,” in Proceedings of 2nd IEEE Workshop on Multimedia Signal Processing (MMSP ’98), pp. 221–226, Redondo Beach, Calif, USA, December 1998.

6.        www.mathwork.com

7.        N. Puviarasan , S. Palanivel ‘Lip reading of hearing impaired persons using HMM’, Department of Computer Science and Engineering, Annamalai University, Annamalainagar 608 002, India.

8.        Ben Krose, Patrick van der Smagt a book on  ‘An introduction to neural network’ Eighth edition , November 1996.

9.        A.K.Jain and Jianchang Mao ‘A Artificial neural network –A tutorial’march 1996.

10.     C. M. Bishop a book on ‘neural networks for pattern recognition’ Clarendon Press OXFORD 1995

11.     A. Kundu, Y. He, P. Bahl, ‘Recognition of handwritten word: first and second order hidden Markov model based approach, Pattern Recognition’ 22 (3) (1989) 283–297.

12.     J. Yamato, J. Ohya, K. Ishii, ‘Recognizing human action in time sequential images using hidden Markov models’, Proceedings IEEE Conference on Computer Vision and Pattern Recognition (1992) 379–385.

13.     J. Schlenzig, E. Hunter, R. Jain, ‘Recursive identification of gesture inputs using hidden Markov models’, Proceedings Second Annual Conference on Applications of Computer Vision (1994) 187–194.\

308-310

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

64.

Authors:

Alireza Memarian, Navid Niazkar

Paper Title:

The Lost Space of Architecture in the Context of Urban Lost Space

Abstract:   Among various functional concepts in architecture what takes our attention mostly, is the word “SPACE”. The concept which might have been unseen in many cases of today world’s architecture, but this carelessness has been developed until we can see its impact on conversion of the word “UNSEEN” to the word “LOST”. Space…? Lost…? First it is better to perceive the meaning of space and after that it is more interesting to know what the “Lost Space” means. One and maybe the most essential duty of any architect is the creation of space. But, what is the definition of “SPACE”? Assuming architecture presents the issue of space, having in mind the present time’s notions as well as being responsible for the projects prospective and demands, taking into account what the space accepts and how it happens, will bring us to more qualitative aspects of space. The essential elements of architectural design consist of two factors “Mass and Space”.  The essence of design is the interaction between these two factors. The awareness of space is much more than a mental activity. This awareness occupies all domains of our senses and feelings, which needs a vast presence of essence to find a perfect response. In fact, any surrounded space, or better said, a building as a small member of the city, has to be in total harmony and solidarity with the whole city and the adjacent areas. Lack of attention to these criterions, qualitative policies and aesthetic parameters had led to our characterless current urban images. The space which is the basics for nowadays cities and urban architecture had lost its inner spirit; chiefly, it is a blind and decayed space without any organic communication with important capabilities of human being. Lack of various qualitative surfaces and volumes in space is simply the reduction of space to the quantitative aspect of humans. This happened while the current human being had broken down the priority of tradition due to its limitations and managed to get into the pathway of the modern world with a joyous approach. Another important issue in creating space is memory which is used as an essential factor in space formation and is dependent on the political, social and economic fluctuations further than functional operations. With growth of urbanism and the massive movement of the city toward modernism, an avoidable discussion, is the creation of space as well as its influence on the creation of place. In other words, what we understand from our environment and our recognition and perception of that space, is quite a different category of the massive shape through the surrounding walls. The important issue that emerges is the spatial experience and the massive function of space which makes its identity. In this research by utilizing both field research and library researches, the above discussion is complied and studied. We try to work with creating dynamics and shaping spaces with modern architecture through identifying the relation between architecture and urbanism in the middle of our cities. Also, this is actually an effort through identifying dynamic spaces in the middle of unidentified ones, and at the end donates them once again to the cities. On the procedure of this study, classified lost spaces are obtained and finally tried to design a space with the capability of responding to the primary demands of the contemporary society and also the future demands which are hardly to foresee;, a space for an interactive sensibility and responsibility not dictating an idea or aManuscript Received on June 2014. Alireza Memarian, Asst. Prof., Department of Architecture, (Ghaem Shahr Branch), Islamic Azad University, Ghaem Shahr, Iran. Navid Niazkar, AA (Architectural Association School of Architecture) Membership & Visiting Member, London, England. BA of Architectural Engineering, UCL (University College of Rouzbahan), Sari, Iran definite rule.

Keywords:
 odern architecture.


References:

1.       M. R. Purzargar, S. Mostofi, Architecture and People, Journal of Architecture, 2011, 104, 10
2.       N. Niazkar, Z. Zahedi, T. Hamed, P. Heydari, Analysis of Lack Tendency of People to Residential Complexes Constructed by “Civil Housing & Urban Planning Organization” (Case Study – Golsar Residential Complex of Sari) – (Paper), Iran Architectural and Urbanism Journal, 2012 – 2013, 3, 83

3.       S. B. Hosseini. S. Norouzian Maleki, Suitable City & Housing for Disabilities – Mobility People, Case Study: Tehran 8th District, 2009 - 2010, 196.

4.       D. Shayegan, lectures, conference contemporary architecture in Iran, 2003

5.       Dr. M. J. Mahdavi Nezhad, Dr. M. A. Jerry, R. Askari Moghadam.  Renewed alive recognition trends in the architecture after the Islamic revolution in Iran, Journal
of Arts and Culture, 2008, 1, 10

6.       A. Memarian, Revive the historical and cultural context of Imam Yahya Sari Shrine, [MA Thesis], Edmund Bacon, Awareness of Apace as an Experience.

7.       E. Bacon, Awareness of Space as an Experience

8.       M. Haj Hassani, discomforts apt housing, Journal human Housing, 3rd Year, 2, 1

9.       Francis D. K. Ching, Z. Qragozlu (Translator), Architecture Form, Space and Order, Tehran University Press, 2008, 108

10.     A. Espnaei, climate cognitive capabilities, Vernacular Architecture (case studies: Kish Island), Year 2, 2, 86

11.     R. Daneshmir, invisible object (paper), Journal of Architecture, 52 and 53, 37

12.     S. Gideon, M. Mozayani (Translator), Space, Time, and Architecture, 2005, 359

13.     V. Ghobadian, Western Contemporary Architecture, Office of Cultural Research, 2003, 23 and 24

14.     Le Corbusier, M. M. Falamaki (Translator), Athens Prism - Fourth International Congress of Modern Architecture, 2002, 35

15.     B. Bavanat, [MA Thesis] argumentative thesis, University of Pretoria (South Africa), 2006, Section IV, 28

16.     Dr. K. Bazrafkan, Dr. A. A. Saremi, F. Aref Nazari; impact on creativity of space, Architectural Design Journal, 2010, 174

17.     M. Torabi Azar, [MA Thesis], Palimpsest (insert modern architecture in the old).

18.     Sh. Rastin, architecture, space, cinema, Journal of Iranshahr, 2005, 5, 130

19.     Z. Azizi; city, memories, feelings, experiences, Journal of Architecture, 2011, 104, 98

20.     M. Falamaki, shaping the experience of architecture in Iran and the West, 50, 44 and 45

21.     R. Transik, Finding Lost Space, 1986


311-321

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

65.

Authors:

Monika Tiwari, Kanwar Preet Kaur

Paper Title:

Analysis on Lowering the Effect of Timing Jitter in OFDM System using Oversampling

Abstract:   The limitation of the high speed analog to digital converters and synchronization systems causes the miss-timed sampling of the signals, which results the timing jitter. The seriousness of this effect greatly increases for the multicarrier systems like OFDM, because of their structure where all sub-carriers may get affected by single sample. The removal (or suppression) of the timing jitter is hence one of the challenging task for the system designers. This paper presents an analysis of one of the jitter suppressing technique named “Over-Sampling”, for its effectiveness the paper presents a detailed analysis on the basis of most practical OFDM mathematical modeling and simulation. The presented model facilities to analyze different size, type of modulation symbol, effect of jitter probability, amplitude independently, and to select different OFDM modulation techniques. Finally the simulation result shows that the BER can be reduced by half for any value of jitter at fixed AWGN when the oversampling rate is doubled.

Keywords:
 Timing jitter, OFDM, oversampling.


References:

1.        Lei Yang, Kusha Panta, and Jean Armstrong, “Impact of Timing Jitter and I/Q Imbalance in OFDM Systems”, IEEE COMMUNICATIONS LETTERS, VOL. 17, NO. 2, FEBRUARY 2013.
2.        Omid Abari, Fabian Lim, Fred Chen, and Vladimir Stojanović, “Why Analog-to-Information Converters Suffer in High-Bandwidth Sparse Signal Applications”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS 2013.

3.        Qinghua Shi, Liang Liu, Yong Liang Guan, and Yi Gong, “Fractionally Spaced Frequency Domain MMSE Receiver for OFDM Systems”, IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 9, NOVEMBER 2010.

4.        Ville Syrjälä, Vesa Lehtinen and Mikko Valkama, “Sampling Jitter in Charge Sampling Radio”,Information and Faculty of Electrical Engineering.

5.        Sebastian Hoyos, Srikanth Pentakota, Zhuizhuan Yu, Ehab Sobhy Abdel Ghany, Xi Chen, Ramy Saad, Samuel Palermo, and Jose Silva-Martinez, “Clock-Jitter-Tolerant Wideband Receivers: An Optimized Multichannel Filter-Bank Approach”, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS—I: REGULAR PAPERS, VOL. 58, NO. 2, FEBRUARY 2011.

6.        Jean Temga, Liu Deming, Mahamadou Hamidine, Zhang Minming & Carine H. Maiawe, “Phase Noise Jitter Synchronization for Coherent Optical OFDM via Pilot-Data-Aided and Wiener Filter”, Computer and Information Science; Vol. 7, No. 2; 2014. 

7.        Debarati Sen, Saswat Chakrabarti, and R. V. Raja Kumar, “Combined BER Analysis for Time-Frequency Synchronization Schemes for MB-OFDM UWB”, IEEE COMMUNICATIONS LETTERS, MAY 2011. 

8.        Ville Syrjälä and Mikko Valkama, “Receiver DSP for OFDM Systems Impaired by Transmitter and Receiver Phase Noise”, IEEE COMMUNICATION LETTERS, JUNE 2011.

9.        Ville Syrjälä and Mikko Valkama, “Sampling Jitter Cancellation in Direct-Sampling Radio”, IEEE COOMUNICATION LETTERS, APRIL 2010.

10.     Lei Yang and Jean Armstrong, ” Oversampling to Reduce the Effect of Timing Jitter on High Speed OFDM Systems” IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 3, MARCH 2010.

11.     Rendong Yang, Shanghai Jiaotong, “Interference Blocking Algorithm for OFDM Systems” IEEE COMMUNICATION LETTER, MARCH 2007.

12.     Guo Yi, Liu Gang and Ge Jianhua, “A Novel Time and Frequency Synchronization Scheme for OFDM Systems” IEEE COMMUNICATIONS LETTERS, NOVEMBER 2010

13.     Tuan Ta, “Synchronization in OFDM” in September 2010


322-324

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

66.

Authors:

Kale Sanket B, Satyajit A. Pangaonkar

Paper Title:

Design and Development of Low Cost Automotive Vehicular Communication System Based on ARM

Abstract:   Several European research projects in the vehicular area address the enhancement of vehicular safety. In the frame of the Caring Cars project, an on-board car-gateway embedded architecture for safety and wellness applications has been designed. This paper puts forward the essentials of this modular, dynamic and robust architecture and defines in detail the advanced navigation, Data acquisition and Safety features built in a single board computer. By mean of this device, the emergency services will always be able to track the affected vehicle and monitor the state of the vehicle. Thus the system can help the vehicle occupants and inform the status to the emergency services to save the occupants in critical situations also it gives real time traffic information Security and accident prevention on single To improve the level of supervision and management for cargo transport vehicles, especially trucks carrying coal it is important to develop transport vehicles remote monitoring module.

Keywords:
 Embedded Linux ,C++, Qtopia ,Qt Creator ,Linux Drivers for USB CAM ,ADC Device Drivers, UART Protocol for Data transmission & Receive for GPS and GSM Module, ARM Mini2440 Board, S3c2440 ARM 9 Processor, GPS , GSM , Temperature sensor ,USB Camera, DC Motor.


References:

1.        National Marine Electronics Association, “NMEA 0183 Standard for Interfacing Marine Electronic Devices,” Version 3.01, January 1, 2002.
2.        S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z.  Mushtaq, “Autonomous Vehicle Monitoring & Tracking System,” SCONEST 2005, pp. 1 – 4, 2005.

3.        Joseph A. O'Sullivan, Robert Pless, “Advances in Security Technologies: Imaging, Anomaly Detection, and Target and Biometric Recognition”, Microwave Symposium IEEE/MTT-S International Volume, Page(s):761 – 764, 2007.

4.        M. A. Al-Taee, O. B. Khader, and N. A. Al-Saber,“ Remote monitoring of Automobile diagnostics and location using a smart box with Global Positioning System and General Packet Radio Service,” in Proc. IEEE/ACS AICCSA, May 13–16, 2007, pp. 385–388.

5.        M. AL-Rousan, A. R. AI-Ali and K. Darwish “GSM-Based Mobile Tele-Monitoring and Management System for Inter-Cities Public Transportations”, International Conference on Industrial Technology (ICIT), Computer Engineering Dept., American University of Sharjah, UAE in 2004, pages 859-862.

6.        Thuong Le-Tien, Vu Phung-The “Routing and Tracking System for Mobile Vehicles in Large Area”, Fifth IEEE International Symposium on Electronic Design, Test & Applications Dept. of Electrical Electronics Engineering, HCM University of Technology, Vietnam in 2010.

7.        Sadagopan, V.K.; Rajendran, U.; Francis, A.J., "Anti theft control system design using embedded system," Vehicular Electronics and Safety (ICVES), 2011 IEEE International Conference on, vol.,no., pp.1, 5, 10-12 July 2011

325-328

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

67.

Authors:

Nirmala M, Hamsaveni N

Paper Title:

Robust Human Body Tracking using PCA and SVM Classifier

Abstract:   This paper deals with an intelligent image processing method for the video surveillance systems. We propose a technology detecting and tracking moving Human Body, which can be applied to consumer electronics such as home and business surveillance systems consisting of an internet protocol (IP) camera and a network video recorder (NVR). A real-time surveillance system needs to detect moving objects robustly against noises and environment. In the proposed system SVM classifies the data in a wide variety range of applications. SVM is powerful to approximate any training data and generalizes better on given datasets. Extended Kalman filter which makes the system more robust by tracking and reduce the noise introduced by inaccurate detections. Extended Kalman filter outperforms other state-of –the –art algorithms in terms of efficiency, robustness and accuracy.

Keywords:
 Multiple moving object tracking, (IP) camera and a network video recorder (NVR)


References:

1.        N Sulman, T Sanocki, D Goldgof, R Kasturi, How effective is human video surveillance performance in 19th International Conference on Pattern Recognition, (ICPR 2008) (IEEE, Piscataway, 2008), pp. 1–3.
2.        C. Chang, R. Ansari, and A. Khokhar, “Multiple Object Tracking with Kernel Particle Filter,” Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, Vol.1, pp.566-573, May 2005.

3.        F. Chang, C. J. Chen, and C. J. Lu. “A Linear-time Component Labeling Algorithm Using Contour Tracing Technique,” Computer Vision and Image Understanding, Vol. 93, No. 2, pp. 206-220, 2004.

4.        A. Hampapur, L. Brown, J. Connell, A. Ekin, N. Haas, M. Lu, H. Merkl, S. Pankanti, A. Senior, C. Shu, and Y. L. Tian, “Smart Video Surveillance,” IEEE Signal Processing
Magazine, Vol. 22, No.2, pp. 38- 51, Mar. 2005.

5.        R. M. Haralick, S. R. Stemberg, and X. Zhuang, “Image Analysis Using Mathematical Morphology,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. PAMI-9, No. 4, pp. 532-550. 1987.

6.        Haritaoglu, D. Harwood, and L. S. Davis, “W4: Real-time Surveillance of People and Their Activities,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 22, No.8, pp. 809-830, Aug. 2000.

7.        M. Haseyama and Y. Kaga “Two-phased Region Integration Approach for Effective Pedestrian Detection in Low Contrast Images” IEEE International Conference on Consumer Electronics, pp. 1-2, Jan. 2008.

8.        O. Javed and M. Shah, “Tracking and Object Classification for Automated Surveillance,” 7th European Conference on Computer Vision, Lecture Notes in Computer Science 2353, pp. 343–357, 2002.

9.        S. Kang, J. Paik, A. Koschan, B. Abidi, and A. Abidi, “Real-time Video Tracking Using PTZ Cameras,” Proceedings of SPIE 6th International Conference on Quality Control by Artificial Vision, Vol. 5132, pp. 103- 111, 2003.

10.     W. Lao, J. Han, and H. N. Peter, “Automatic Video-based Human Motion Analyzer for Consumer Surveillance System” IEEE Transactions on Consumer Electronics, Vol. 55, No. 2, pp. 591-598, May 2009.

11.     D. Makris and T. Ellis, “Automatic Learning of an Activity-based Semantic Scene Model,” Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 183-188, Jul. 2003.

12.     M. H. Sedky, M. Moniri, and C. C. Chibelushi, “Classification of Smart Video Surveillance Systems for Commercial Applications,” IEEE Conference on Advanced Video and Signal Based Surveillance, pp. 638- 643, Sep. 2005.

13.     C. Stauffer and W. Grimson, “Learning Patterns of Activity Using Real Time Tracking,” IEEE Transactions on Pattern Analysis and machine Intelligence, Vol. 22, No.8, pp. 747-767, Aug. 2000.

14.     M. Valera and S. A. Velastine, “A Review of the State-of-art in Distributed Surveillance Systems,” IEE Intelligent Distributed Video Surveillance Systems, pp.1-30, 2006.

15.     Y. Zhai, M. B. Yeary, S. Cheng, and N. Keharnavaz, “An Object- Tracking Algorithm Based on Multiple-model Particle Filtering with State Partitioning,” IEEE Transactions on instrumentation and measurement, Vol.58, No.5, pp. 1797-1809, May 2009.

16.     R. Zhang, S. Zhang, and S. Yu, “Moving Objects Detection Method Based on Brightness Distortion and Chromaticity Distortion,” IEEE Transactions on Consumer Electronics, Vol. 53, No. 3, pp. 1177-1185, Aug. 2007.

17.     C Stauffer, W Grimson, Adaptive background mixture models for real-time tracking, in IEEE Conference on Computer Vision and Pattern Recognition (CVPR 1999) (IEEE, Piscataway, 1999), pp. 246–252.

18.     YL Tian, RS Feris, H Liu, A Hampapur, M-T Sun, Robust detection of abandoned and removed objects in complex surveillance videos. Syst. Man Cybern. Part C Appl. Rev. IEEE Trans. 41(5), 565–576 (2011).

19.     DS Lee, Effective Gaussian mixture learning for video background subtraction. IEEE Trans. Pattern Anal. Mach. Intell. 27(5), 827–835 (2005).


329-333

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

68.

Authors:

Shujaat Hussain Buch, Muhammad Dilawar Bhat

Paper Title:

Retrofitting of a Damaged School Building: A Case Study

Abstract:   A three story damaged school building which has developed multiple cracks in floor slabs is investigated and analyzed. The building vertical load paths are determined and failure patterns studied. The retrofitting (strengthening) measures are worked out. The building is provided with suitable strengthening features to limit the damage and prevent future damages.

Keywords:
 Cracks, retrofit, strengthening, yield-line

References:

1.       FEMA 307, Evaluation of earthquake damaged concrete and masonry wall buildings. ATC, California, 1998.
2.       FEMA 232, Homebuilders’ Guide to Earthquake-Resistant Design and Construction. National Institute of Building Sciences, Washington, D.C., 2006.

3.       IS 1893, Criteria for earthquake resistant design of structures. Part 1, BIS, 2002.

4.       G. Kennedy, C. H. Goodchild, Practical Yield Line Design. The concrete Centre, 2004, ch. 1-4.

5.       S 1905, Code of Practice for Structural use of Un-Reinforced masonry. BIS, 1987.

6.       FEMA 547, Techniques for the Seismic Rehabilitation of Existing Buildings, nehrp, 2006, p. (21)1- 60.


334-338

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

69.

Authors:

S. B. Kulkarni, U. P. Kulkarni,  Siddu Tushara M. S.

Paper Title:

Iris Recognition using Color Models with Artificial Neural Network

Abstract:   Biometrics plays a vital role for an extensive array of highly secure identification and personal verification systems. Iris Recognition is the recognition of an individual based on iris features. It is regarded as the most promising biometric identification system available. In this paper, the iris recognition is applied on UBIRIS database. Image is segmented using circular Hough transform, then converted into a fixed sized rectangular block using Daugman’s Rubber sheet model. Iris features are extracted using CMYK color model and a feature vector is created using 2D Walsh Hadamard transform, finally these are classified based on Artificial Neural Network(ANN) using MLP. Based on the database size  ROC(Receiver Operating Characteristic) curve is plotted using true positive rate and false positive rate in order to analyze for what size efficiency may be good. 

Keywords:
 Artificial neural network, Biometrics, Receiver operating characteristic curve.


References:

1.        R. P. Broussard, L. R. Kennell, D. L. Soldaan, R. W. Ives “Using Artificial Neural Network and Feature saliency Techniques for Improved Iris Segmentation” United States naval ACAD, Annapolish in Proceeding of neural Networks,2007. IJCNN 2007.
2.        Rahib H Abiyev , Koray Altunkaya “Personal Iris Recognition using Neural Network”. International Journal of Security and its Applications Vol. 2, No. 2, April, 2008

3.        Ruggero Donida Labati, Vincenzo Piuri Fellow “Neural based Iterative Approach for Iris Detection in Iris   recognition systems”

4.        R M Farouk, R Kumar, K A Riad

5.        Mrunal M. Khedkar, S. A. Ladhake “Robust human Iris Pattern Recognition System Using Neural Network Approach” 2013

6.        Tom Fawcett (tom.fawcett@hp.com) HP Laboratories, MS 1143, 1501 Page Mill Road, Palo Alto, CA 94304 March 16, 2004 ROC Graphs: Notes and Practical Considerations for Researchers.

7.        Amol D. Rahulkar, Raghunath S. Holambe, “Partial iris feature extraction and recognition based on a new combined directional rotated directional wavelet filter banks”, Neurocomputing, Elsevier, Science Direct, 81, 2012 pp.12-23.

8.        R.M.Farouk, “Iris recognition based on elastic graph matching and Gabor wavelets”, Computer Vision and Image Understanding, Elsevier, Science Direct, 115 (2011), pp. 1239 1244.

9.        R.M. Farouk, R.Kumar, K.A.Raid, “Iris matching using multi dimensional artificial neural network”, IET Computer Vision, 2011 Vol.5. Issue.3, pp.178-184.

10.     Fadi n Saibai, Hafsa I. Hosani, Raja M. Naqbi, Salima Dhanhani, Shaikha Shehhi, “Iris recognition using artificial neural networks”, Expert System with Applications, Elsevier, Science Direct, 38 (2011) pp.5940-5946.

11.     Makram Nabti, Ahmed Bouribane, “An effective and fast iris recognition system based on a combined multiscale feature extraction technique”, Pattern Recognition, Elsevier, Science Direct, Vol.41, 2008, pp.868-879.

12.     Mrunal M. Khedkar S. A. Ladhake,” Robust human Iris Pattern Recognition System Using  Neural Network Approach”.

13.     H. Proenca and L. A. Alexandre, UBIRIS: A Noisy Iris ImageDatabase [Online]. Available: http://iris.di.ubi.pt/


339-341

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

70.

Authors:

Rehan Masood, Babar Mujtaba, Muhammad Ali Khan, Tariq Ali

Paper Title:

Adoption of Integrated Management System (IMS) by Construction Firms in Pakistan

Abstract:   Construction firms faced multi-faceted challenges to adopt standards due to unique operations in comparison with manufacturing firms having repetitive processes. Management systems (quality, environment and safety & health) in firms helps in development of standardized procedures and operations which are beneficial to get high performance on construction sites. Integrated Management system (IMS) is based on management system related to quality, environment and safety, which enhance the performance of firms and projects as well.  This study aims to investigate the adoption and implementation of IMS in construction firms of Pakistan. Firms’ websites visited for evidence of ISO certifications and then online questionnaire survey was conducted for availability and status of ISO standards; level of implementation, alignment and integration; internal and external barriers in adoption of IMS. Results showed that adoption of IMS is very low among construction firms but firms having all certifications have effective IMS; level of implementation gradually decrease from top to low category of firms; for implementation internal barriers were found as lack of skill and training, lack of awareness and requirement of high effort; external barriers were inexperience consultants;  insufficient driver and benefits and high cost of certification;  external barriers are more significant than internal barriers. International standards certifications should be considered by engineering councils for registrations and should be legitimate by government through national and international bodies. These standards should also be considered during contractor procurement. Contracting firms should embed international standards in to organization management system to get maximum benefits and training of these systems should be essential part of employee growth.

Keywords:
 Integrated management system (IMS), International standards, Construction firms, Pakistan.


References:

1.       Reason, J.T., “Managing the risks of organizational accidents”, Ashgate, Aldershot, 1997.
2.       Lingard, H., Blismas, N. & Wakefield, R., “The effect of supervisory leadership style on group level safety climate in the Australian construction industry”, Proceedings of the COBRA Construction Research Conference, July 4-8, 2005, Brisbane, Australia.

3.       Tam, C.M., Zing, S.X., and Deng, Z.M., “Identifying elements of poor construction safety management in China”. Safety Science, 2004,  42(7), 569-586.

4.       Jorgensen, T., Simonsen, G., “Prospects of a Unified Management System. Corporate Social Responsibility and Environmental Management”. Wiley Inter Science. 2002, Vol.9 (2), p.91-98.

5.       Raišiene, A. G., “Advantages and Limitations of Integrated Management System: The Theoratical Viwpoint”. SOCIALINES TECHNOLOGIJOS, 2011

6.       Koehn, E., and Datta, N.K.,“Quality, Environmental, and Heath and Safety Management Systems for Construction Engineering”, Journal of Construction Engineering and Management, 2003, 129 (5), 562- 569.

7.       Pojasek, R.B., &ldquo