International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02
Home
Articles
Conferences
Editors
Scope
AUTHOR GUIDELINES
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-5 Issue-4 Published on April 30, 2016
07
Volume-5 Issue-4 Published on April 30, 2016

  Download Abstract Book

S. No

Volume-5 Issue-4, April 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.

1.

Authors:

Gautham Allur Subramanya, Aakash Agrawal, Nikhil Kothari, Shreenivas B

Paper Title:

Challenges Faced By Next-Generation-Networks

Abstract: This paper will address the challenges thatNext-Generation-Networks will face and how to tackle them. As we are pumping more and more data into the current networks, there exists an inescapable need for improvement in our current telecommunication networks. This has fuelled a lot of research and surveys on the development of Next-Generation-Networks. But developing these "better networks" is not a very easy task and the process will face a lot challenges such as, (1) maintaining optimum energy efficiency, (2) keeping an eco-friendly outlook while developing new technologies, (3) dealing with security issues such as jamming and spoofing, (4) dealing with software bugs that would arise with the use of SDN (Software Defined Networking) as well as many other SDN related problems. Addressing these challenges can eventually lead to lesser costs and more efficiency.

Keywords:
 Next-Generation-Networks, SDN, Cognitive Radio


References:

1.           Simon Haykin, “Cognitive Radio: Brain-Empowered Wireless Communications” IEEE Journal On Selected Areas In Communications, VOL. 23, NO. 2, February 2005.
2.           Raffaele Bolla and Franco Davoli, DIST-University of Genoa. Roberto Bruschi, National Inter-University Consortium for Telecommunications. Ken Christensen, University of South Florida. Flavio Cucchietti, Telecom Italia. Suresh Singh, Portland State University, “The Potential Impact of Green Technologies inNext-Generation Wireline Networks: Is There Room for Energy Saving Optimization?” IEEE Communications Magazine • August 2011.

3.           Teena Hammond, article for ZDNET, “Research: IT leaders slow toembrace software-defined networking”

4.           Omid Mashayekhi, “Spectral Utilization and Coexistence Strategiesin Cognitive Radio Devices” Stanford.edu

5.           Andrea Goldsmith, Syed Ali Jafary, Ivana Maric and Sudhir Srinivasa, “Breaking Spectrum Gridlock with Cognitive Radios: An Information Theoretic Perspective” Stanford.edu

6.           Scott Reeves, article for TechRepublic, “Key features of Next Generation Networks”

7.           Vinod Namboodiri, Department of Electrical Engineering and Computer Science, Wichita State University, “Are Cognitive Radios Energy Efficient? A Study of the Wireless LAN Scenario”

8.           Ian F. Akyildiz, Won-Yeol Lee, Mehmet C. Vuran , Shantidev Mohanty, “NeXt generation/dynamic spectrum access/cognitive radiowireless networks: A survey” Elsevier, 2006.

9.           Shigang Chen ; Illinois Univ., Urbana, IL, USA ; Nahrsted K, “Anoverview of quality of service routing for next-generation high-speed networks: problems and solutions” Network, IEEE (Volume:12 , Issue: 6 ).

10.        Huber, J.F. ; Inf. & Commun. Mobile Networks, Siemens AG, Munich, Germany, “Mobile next-generation networks” MultiMedia, IEEE (Volume:11 , Issue: 1 ).

11.        Ramjee, R. Lucent Technol. Bell Labs., USA La Porta, T.F. ; Salgarelli, L. ; Thuel, S. ; Varadhan, K. ; Li Li, “IP-based accessnetwork infrastructure for next-generation wireless data networks” Personal Communications, IEEE(Volume:7 Issue: 4 )

12.        Lillian Goleniewski authored book, “Telecommunications Essentials: The Complete Global Source for Communications Fundamentals, Data Networking and the Internet, and Next-generation Networks”.

13.        Bradley Mitchell, QoS article, About.com

14.        Thomas D. Nadeau, “What are the hard (and interesting) open Research problems in the SDN Space?” IETF 85 –IRTF SDN Research Group.

15.        Witsa.org “Next Generation Networks and the Policy Implications”

16.        Tech Target article, “Real-Time Transport Protocol (RTP)”

17.        Sdsu.edu article, “Multimedia over IP”

18.        Nick Mc Keown, Stanford University; Tom Anderson, University of Washington; Hari Balakrishnan, MIT; Guru Parulkar, Stanford University; Larry Peterson, Princeton University; Jennifer Rexford, Princeton University; Scott Shenker, University of California, Berkeley; Jonathan Turner, Washington University, “Open Flow: Enabling Innovation
in Campus Networks” Openflow.org

19.        Marc Mendonca, University of California, Santa Cruz, USA; Katia Obraczka, University of California, Santa Cruz, USA; Thierry Turletti, INRIA, Sophia Antipolis, France, “The Case for Software–Defined Networking in Heterogeneous Networked Environments”

20.        K. Yap, R. Sherwood, M. Kobayashi, N. Handigol, N. Mc Keown, and G. Parulkar. “Blueprint for introducing innovation into wireless mobile networks”.

21.        M. Yu, J. Rexford, M. Freedman, and J. Wang. “Scalable flow-based networking with define”


1-5

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

2.

Authors:

Abubakr Mustafa Elkhaleefa

Paper Title:

Waste Engine Oil Characterization and Atmospheric Distillation to Produce Gas Oil

Abstract:  Two type of used engine oil (A and B)has been characterized along with a fresh sample of each type and hence the properties changes and degradation was observed. The samples (A and B) subjected to a batch atmospheric distillation process. The distillation product analyzed and the results show that the product specifications are similar to the gas oil.

Keywords:
 Used engine oil, characterization, atmospheric distillation, gas oil


References:

1.              Bhaskar, T., et al., Recycling of waste lubricant oil into chemical feedstock or fuel oil over supported iron oxide catalysts. Fuel, 2004. 83(1): p. 9-15.
2.              Hamad, A., E. Al-Zubaidy, and M.E. Fayed, Used lubricating oil recycling using hydrocarbon solvents. Journal of environmental management, 2005. 74(2): p. 153-159.

3.              Fuentes, M., et al., Pyrolysis and combustion of waste lubricant oil from diesel cars: decomposition and pollutants. Journal of Analytical and Applied Pyrolysis, 2007. 79(1): p. 215-226.

4.              Fan, W.T.-C., Regeneration of used petroleum-based lubricants and biolubricants by a novel green and sustainable technology. 2010: University of Southern California.

5.              Rincon, J., P. Canizares, and M.T. Garcia, Regeneration of used lubricant oil by ethane extraction. The Journal of supercritical fluids, 2007. 39(3): p. 315-322.

6.              Bartz, W.J., Lubricants and the environment. Tribology international, 1998. 31(1): p. 35-47.

7.              Kannan, S., et al., Studies on Reuse of Re-Refined Used Automotive Lubricating Oil. Research Journal of Engineering Sciences ISSN. 2278: p. 9472.

8.              Nerın, C., et al., Behaviour of different industrial waste oils in a pyrolysis process: metals distribution and valuable products. Journal of Analytical and Applied Pyrolysis, 2000. 55(2): p. 171-183.

9.              Udonne, J., A comparative study of recycling of used lubrication oils using distillation, acid and activated charcoal with clay methods. Journal of Petroleum and Gas Engineering, 2011. 2(2): p. 12-19.

10.           Emam, E. and A. Shoaib, Re-Refining of Used Lube Oil, I-by Solvent Extraction and Vacuum Distillation Followed By Hydrotreating. Petroleum & Coal, 2013. 55(3): p. 179-187.


6-8

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

3.

Authors:

Ionuț Daniel Smărăndescu, Petre-Marian Nicolae

Paper Title:

About Electric Scooter Mobility. Aspects Regarding the Designing of a Brushless DC Motor for an Electric Scooter

Abstract:   The paper deals with the electric scooter mobility in Europe and with the designing of a brushless dc motor for an electric scooter. In the first part of the paper, the context and the motivation of the theme are presented. In the second part of the paper, the electric scooters market is described. Then, the main parts equipping an electric scooter are exposed. The final part of the paper deals with the designing of a permanent magnet brushless dc motor for electric scooter propulsion. 

Keywords:
designing, electric scooter, electric scooter mobility, permanent magnet brushless dc motor.


References:

1.           Braconi Dario, „Green two-wheeled mobility-Material Hygiene and life cycle analysis of an electric scooter”, Dissertation, Stockholm, Sweden, 2014.
2.           http://www.teslamotors.com/en_GB/about/executives/elonmusk.

3.           http://www.kth.se/en/itm/inst/mmk/forskning/forskningsenheter/systemkomponentdesign/ecodesign.

4.           Colella Wh. G., „Market prospect, design features, and performance of a fuel cell powered scooter”, Journal of Power Sources, 2000.

5.           Electric motorcycle development action plan”, EPA, Environmental protection administration, 1998.

6.           http://www.oxforddictionaries.com/definition/english/scooter.

7.           https://en.wikipedia.org/wiki/Electric_motorcycles_and_scooters.

8.           The motorcycle industry statistical overview, ACEM, 2013.

9.           Environmental annual report”, Honda, 2013.

10.        Corporate Social Responsibility report”, Piaggio, 2013.

11.        http://www.navigantresearch.com/research/navigant-research-leaderboard-report-electricscooters.

12.        Jiangsu Xinri E-Vehicle Co., http://english.xinri.com.

13.        Vmoto, http://www.vmoto.com.

14.        Sym, http://www.sym-global.com/index.

15.        Vectrix, http://www.vectrixitalia.it.

16.        Terra Motors, http://www.terra-motors.com.

17.        Govecs, http://www.govecs.it.

18.        Yamaha Motors, http://www.yamaha-motor.eu/it/prodotti/scooter/index.aspx.

19.        Peugeot scooter, http://www.peugeotscooters.it.

20.        iO scooter, http://www.io-scooter.com.

21.        Nimag B.V. (Nimoto), http://www.nimoto.nl/contact.

22.        http://www.icpe.ro/ro/d/2/p/scuter-electric.

23.        Billings Randy, „Z Electric Vehicle Introduces New Model 5000 Scooter”, EV World.com, 9 May 2012.

24.        Sullivan J.L. and Gaines L., „Status of life cycle inventories for batteries”, Energy Convension and Management, Vol. 58, pp. 134-148, 2012.

25.        http://vega.unitbv.ro/~ogrutan/Microcontrollere2011/5-motoare.pdf.

26.        Brushless DC motors - three phased”, Electronica AZI, web access: http://electronica-azi.ro/2004/07/08/motoare-de-curent-continuu-fara-peri-trifazate (in romanian).

27.        Larminie J. and Lowry, J., “Electric machines and their controllers”, Electric Vehicle Technology Explained, Chapter 6, Second Edition, 2012.

28.        ***https://ro.wikipedia.org/wiki/Motor_electric_de_curent_continuu_f%C4%83r%C4%83_perii.

29.        http://www.scrigroup.com/tehnologie/electronica-electricitate/Motoare-de-curent-continuu-far73164.php.

30.        Fransua Al., Măgureanu R., Câmpeanu A., Condruc M., Tocaci M. – “Machines and electric drive systems”, Ed. “Tehnică”, Bucharest, 1978 (in romanian).


9-13

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

4.

Authors:

Kavita Burse, Subrato Howlader, Prateek Wankhade

Paper Title:

Breathing Sensor Operated Wheel Chair for Paralyzed Persons

Abstract:  The proposed breathing sensor based wheel chair (BSWC) can be controlled using breathing commands. Therefore a ‘disabled’ person can control the BSCWC by himself. Computer input system with breathing commands does not work in real time bases. Moreover it is not robust against various background noises and vibrations. Through experiment it is found that the proposed BSWC is robust against the above mentioned influencing factors. Moreover it is confirmed that the proposed BSWC can be controlled by breathing accurately and safely. The proposed research is a computer controlled wheel chair where sensor and intelligent control algorithm have been used to minimize the level of human intervention.

Keywords:
BSWC, breathing sensor, wheel chair, paralysis  


References:

1.             Vasundhara G. Posugade, Komal K. Shedge, Chaitali S. Tikhe “Touch-screen based wheelchair system” International Journal of Engineering Research and Applications (IJERA) Vol. 2, Issue 2, Mar-Apr 2012, pp.1245-1248.
2.             Dr. Shaik Meeravali, M. Aparna “Design and development of a hand-glove controlled wheel chair based on MEMS” International Journal of Engineering Trends and Technology (IJETT), Volume 4, Issue 8, August 2013, pp: 3706-3712.

3.             Rakhi A. Kalantri, D. K. Chitre “Automatic wheelchair using gesture recognition” International Journal of Engineering and Advanced Technology (IJEAT), Volume 2, Issue 6, August 2013, pp: 146-150.

4.             Pradeep Kumar Rattewal, Parteek Kumar “Design and fabrication of low cost intelligent wheelchair” International Journal of Engineering and Computer Science (IJECS), Volume 3, Issue 6, June, 2014 Page No. 6432-6437.

5.             Nirmal T M “Wheelchair for physically and mentally disabled persons” International Journal of Electrical and Electronics Research, Volume 2, Issue 2, April - June 2014, pp: 112-118.

6.             Mr. Vijendra P. Meshram, Ms. Pooja A. Rajurkar, Ms. Mohini M. Bhiogade, Ms. Arundhati C. Kharabe, Mr. Dhiraj Banewar. “Wheelchair automation using head gesture” International Journal of Advanced Research in Computer Science and Software Engineering,  Volume 5, Issue 1, January 2015, pp: 641-646.


14-16

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

5.

Authors:

Suhas S, Abhishek Joshi, Ravi Srinivas, Nagarjun C S

Paper Title:

FPGA Implementation for Integrated Circuit Technology Tester

Abstract:     Integrated Circuits have dominated every walk of life in the present world. In this Integrated Circuit era, the need of testing of ICs has become the need of the hour. The implementation and fabrication of new ICs on a daily basis have brought testing to new heights. Albeit these requirements, not many efficient, cheap and readily available testing solutions have been realized. In the following paper, a simple yet highly effective solution to various testing concerns of digital circuits or ICs along with its implementation has been brought out. The real time results got are validated and are readily available for verification of the design under test.

Keywords:
Digital designs, Field Programmable Gate Array [FPGA], Testing


References:

1.                Md. Fokhrul Islam, M. A. Mohd. Ali,  Burhanuddin Yeop Majlis, “ FPGA Implementation Of An LFSR Based Pseudorandom Pattern Generator For MEMS Testing”, International Journal of Computer Applications (0975 – 8887) Volume 75– No.11, August 2013
2.                R. V. PrasadaRao, N. A. Varaprasad, G. S. Babu and C. M. Mohan, “Power Optimization of Linear Feedback Shift Register for Low Power BIST Implemented in HDL”, International Journal of Modern Engineering Research (IJMER), Vol. 3, Issue. 3, pp. 1523-1528 (2013).

3.                C. R. Reddy, S. Zilani and V. Sumalatha, “Low Power, Low-Transition Random Pattern Generator”, International Journal of Engineering Research & Technology (IJERT), Vol. 1, Issue 5 (2012).

4.                Jutman, A. Tsertov and R. Ubar, “A tool for Advanced Learning of LFSR-Based Testing Principles”, Baltic Electronics Conference, 2006 International.

5.                Nazeih.M.Botros “HDL Programming Using VHDL and VERILOG”, John Weily India, 2008.


17-19

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

6.

Authors:

Priyanka Khare, Kavita Burse, Anjana Pandey

Paper Title:

Comparing Various Classification Techniques Through Weka for Ovarian Cancer

Abstract: In today’s world, enormous amount of data is presented in various fields. This data can provide important and helpful information for making important decisions. Data mining is the method of finding valuable information. There are numerous data mining techniques used for extracting information classification is one of them. Classification is the process of classifying various data according to established criteria. In this paper, various classification algorithms are used for classifying the data set before these relevant features are selected by the process of feature selection. The performance of various classifiers is analyzed on the basis of accuracy and time taken to build the model.

Keywords:
  feature selection, classification, weka, Interquartile range, navies bayes, instance based learning (IB1) ,k-nearest neighbour (IBK) , K-STAR, logical analysis of data(LAD) Tree


References:

1.           F. J. Ferri, V. Kadirkamanathan and J. Kittler, “Feature subset search using genetic algorithms”, Proceedings of the IEEE Workshop on Natural Algorithms in Signal Processing, vol. 740, 1993.
2.           J. Yang and V. Hanover, “Feature subset selection using genetic algorithm”, Journal of IEEE Intelligent Systems, vol. 13, pp. 44-49, 1998.

3.           K. Jain and B. Chandrasekaran, Dimensionality and Sample Size Considerations in Pattern Recognition Practice, Amsterdam: Handbook of Statistics, vol. 2, 1987.

4.           Blum and P. Langley. Selection of relevant features and examples in machine learning. Artijicialintelligence, 97:245- 271" 1997.

5.           http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.11.454&rep=rep1&type=pdf

6.           http://stattrek.com/statistics/dictionary.aspx?de finition=Interquartile%20range.

7.           http://www.cs.ccsu.edu/~markov/weka-tutorial.pdf


20-23

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

7.

Authors:

Satyapriya Behera, Deepak Khare, Prabhash Kumar Mishra, Sangitarani Sahoo

Paper Title:

Application of Statistical Downscaling Model for Prediction of Future Rainfall in Bhudhabalanga River Basin, Odisha (India)

Abstract:    The impact of climate change in the hydrology sector, often require fine scale spatial resolution climate information for studying present as well as future scenario. Global climate Models (GCMs) assess climate change scenarios on coarse partial resolution. There are different techniques to downscale to downscale coarser grid scale data to finer scale as coarse resolution of GCMs data cannot be used directly to asses climate impact for a particular area. Therefore downscaling of Global climate Models (GCMs) output is important to estimate regional climate change impacts. Precipitation is one of the important climate variables that is used as inputs in hydrologic models in many water resources studies. In this present study, Statistical Downscaling Model (SDSM) has been adopted to downscale daily precipitation to generate future climate outputs for Budhabalanga river basin in Odisha. Multiple linear regression (MLR) technique is used in SDSM. The daily precipitation data (1961-2001) representing Budhabalanga river catchment area has been used as input of the SDSM Model. The model has been calibrated and validated with large-scale National Central for Environmental Prediction (NCEP) reanalysis data for the period 1961-1990 and 1991-2001 respectively. The prediction of future daily precipitation for the period 2025s, 2050s and 2080s for the study area has been carried out corresponding to Hadley Centre Coupled Model version 3 (HadCM3 A2 and B2). The study results show that during the calibration and validation, confirm the SDSM model acceptability in regards to its downscaling performance for daily and annual rainfall. The results of the downscaled daily precipitation for future period indicates an increasing trend for the period 2025s and 2050s where as decrease in  trend for the period 2080s for mean daily precipitation.

Keywords:
   Climate change, Global climate model, Scenario generation, Statistical downscaling, Precipitation, Budhabalanga basin


References:

1.              Bardossy A (1997)  Downscaling from GCM to local climate through stochastic linkages. J Environ Manage 49:7-17
2.              Crawford T. Bretts NS, Favis-Mortlock D (2007) GCM grid-box choice and predictor selection associated with statistical downscaling daily precipitation over Northern Ireland. Clim Res 34:145-160

3.              Ghosh S. Mujmudar PP (2006)  Future rainfall scenario over Orissa with GCM projections by statistical downscaling. Curr Sci 90(3): 396-404

4.              Giorgi  F, Mearns LO, (1991) Approaches to the simulation of regional climate change: a review, Rev. Geophys. 29, 191-126

5.              Hasmi MZ, Shamseldin Ay, Melville, B.W (2009)  Statistical downscaling of precipitation, state of the art and application of Bayesian Multi-model approach for uncertainty assessment. Hydrology and Earth System Sciences, 6: 6535-6579

6.              Hasmi MZ, Shamseldin Ay (2011) Comparison of SDSM and LARS-WG for simulation and downscaling of extreme precipitation events in a watershed. Stoch Environ Res Risk Assess 25: 475-484.

7.              Hassan Z, Harun S (2012) Application of statistical downscaling model for long lead rainfall prediction in Kurau river catchment of Malaysisa. Malays J Civ Eng 24(1): 1-12

8.              Hewitonson BC, Crane RG (1996) Climate downscaling: techniques and application. Climatic Res 7:85-95

9.              Kannan S, Ghosh S (2010)  Prediction of daily rainfall state in a river basin using statistical downscaling from GCM output. Stoch Environ Res Risk Assess. DoI:10.1007/s00477-010-0415-y

10.           Kodra E, Ghosh S, Ganguly AR (2012)  Evaluation of global climate models for Indian monsoon Climatology. Environ Res Lett. Doi; 10.1088/1748-9326/7/1/014012

11.           Lall M, Nozawa T, Emori S, Harasawa H, Takahashi K, Kimoto M, Abe-ouchi A, Nakajima T, Takemura T, Numaguti A (2001) Future climate change: implication Indian Summer monsoon and its variability. Curr Sci 81(9):1196-1207

12.           Mishra PK, Khare D, Mondal A, Kundu S (2014)  Multiple Linear Regression Based Statistical Downscaling of Daily Precipitation in a canal command. Climate Change and Biodiversity Vol.1 73-83-DoI: 10.1007/978-4-431-54838-6

13.           Ojha CSP, Goyal MK, Adeloye AJ (2010)  Downscaling and neural networks. Open Hydrol J 4:122-136

14.           Prudhomme C, Jakob D, Svenssoon C (2003) Uncertainty and climate change impact on the flood region of small UK catchments J Hydrol 277:1-23

15.           Raje D, Mujumdar PP (2009)  A conditional random field e-based downscaling method for assessment of climate change impact on multisite daily precipitation in the Mahanadi basin. Water Resour Res 45:1-20

16.           Raje D, Mujumdar PP (2011) A comparison of three methods for downscaling daily precipitation in the Punjab region, Hydrol Process 25:3575-3589

17.           Salath’e EP (2003)  Comparison of various precipitation downscaling methods for the simulation of stream flow in a rainshadow river basin, International Journal of Climatology 23, 887-901

18.           Wilby RL, Wigley TML (1997) Downscaling general circulation model output: a review of methods and limitations. Progr Phys Geogr 21:530-548

19.           Wilby RL, Dawson CW (2007) SDSM 4.2- A decision support tool for the assessment of regional climate change impacts UK


24-30

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

8.

Authors:

Shankar Mane, S. G. Bhatawadekar, Pravin R. Kubade

Paper Title:

Optimization of Processing Parameters in Electrochemical Machining of AISI 304 using Taguchi Design Technique

Abstract:     Electro chemical polishing is a process by which metal is removed from a work piece by passage of electric current while the work is submerged in a specially-designed solution. This study investigate the effect of temperature, current, time and electrolyte composition on the surface characteristics and metal removal rate (M.R.R.) of austenitic stainless steel AISI 304 in phosphoric acid and sulphuric acid bath. In case of MRR, time was the most influential factor and then the relative influence decreases in the order current (I), temperature (T) and electrolyte composition (C). For Surface Roughness it was seen that temperature (T) being the most influential factor and current (I), electrolyte concentration(C) and time being less influential in the order they are mentioned.

Keywords:
    AISI 304, Electrochemical machining, Optimization


References:

1.             Leonardo S. Andrade, Sandro C. Xavier, Romeu C. Rocha-Filho, Nerilso  Bocchi, Sonia R. Biaggio, (2005),  “Electropolishing of AISI-304 stainless steel  using an oxidizing solution originally used for electrochemical coloration”,  Electrochimica Acta 50, pp. 2623–2627.
2.             Feroze Nazneen,Paul Galvin, (2012), “Electropolishing of medical-grade stainless steel in preparation for surface nano-texturing”, J Solid State Electrochem 16, pp. 1389-1397.

3.             H. Ramasawmy, L. Blunt, “3D surface topography assessment of the effect of   different electrolytes during electrochemical polishing of EDM surfaces”,
International Journal of Machine Tools & Manufacture 42 (2002), pp. 567–574.

4.             P.S. Kao, H. Hocheng, (2003), “Optimization of electrochemical polishing of stainless steel by grey relational analysis”, Journal of Materials Processing Technology, 140, pp. 255–259.

5.             Delstar, “Electropolishing: A user’s guide to applications, quality standards and specification  Metal finishing”, INC, Houston January 2003, Ninth edition.

6.             Shuo-Jen Lee, Jian-Jang Lai, (2003), “The effects of electropolishing (EP) process parameters on corrosion resistance of 316L stainless steel”, Journal of Materials    Processing Technology , 140 , pp. 206–210.

7.             S. Ganesh Sundara Raman and K.A. Padmanabhan, (1995), “Effect of  electropolishing on the room temperature low-cycle fatigue behaviour of AISI 304LN  stainless steel,” Int. J. Fatigue Vol. 17, No. 3, pp. 179–182.

8.             D. R. GABE, (1973), “Electropolishing of mild steel in phosphoric and percholric  acid containing electrolytes”, Corrosion Science, Vol. 13, pp. 175–18.

9.             Pravin R.Kubade, Sunil S.Jamadade et al.,”Parametric study and optimization of WEDM parameters for Titanium di-boride TiB2”, IRJET Vol.2, Issue 4, July-2015, pp. 1-5.

10.          L. Ponto, M. Datta, D. Landolt, (1987), “Electropolishing of iron-chromium alloys in phosphoric acid-sulphuric acid electrolytes”, Surface and coating technology, 30, pp. 265-275.

11.          Ishimaru, Yoshiyasu, Ashida, Yutaka, (1922), “ Polishing of inside walls of stainless steel vacuum container”, Chemical Abstract 116 p 116.

12.          Pravin R. Kubade & Sudhakar Lohar “Current Research and Development in AWJM : A Review” IJSR Vol. 5, Issue-1, Jan. 2016, PP. 996-999

13.          Ramezanali Mahdavinejad, Mohammadreza Hatami, (2008), “On the application of electrochemical machining for inner surface polishing of gun barrel chamber”, journal of materials processing technology 202 , pp. 307–315.

14.          Pravin R. Kubade, V. S. Jadhav, “An Experimental Investigation of Electrode Wear Rate (EWR), Material Removal Rate (MRR) and Radial Overcut (ROC) in EDM of High Carbon-High Chromium Steel (AISI D3)”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June
2012, pp. 135-140.

15.          Y.N. Hu, H. Zhou, L.P. Liao, H.B. Deng, (2003), “Surface quality analysis of the electropolishing of cemented carbide”, Journal of Materials Processing Technology 139, pp. 253–256.

16.          Necip Unlu, (2008), “ Preperation of high quality Al TEM specimens via a double-jet electropolishing technique”, Materials Characterization ,59, pp. 547-553.

17.          Andrew P. Abbott, Glen Capper, Katy J. McKenzie, Karl S. Ryder, (2006),  Voltammetric and impedance studies of the electropolishing of type 316 stainless steel in a choline chloride based ionic liquid, Electrochimica Acta 51, pp. 4420–4425.


31-37

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

9.

Authors:

Torres Ramirez Raisa Ivanova, Tambo Encalada Walter Simón, Valarezo Riofrio Jorge Michael, Gonzalez Sisalima, Fermín Alexander, Jose Leonardo Benavides Maldonado.

Paper Title:

Generation of Geology, Geomorphology and Geological Threats for the Updating of the Development and Land Management Plan of Quilanga Canton of Loja Province, scale 1: 25 000.

Abstract: This project refers to the generation of geology, geomorphology and geological hazards for the updating of the Development and Land Management Plan of Quilanga canton. For which 76 aerial photographs and Digital Terrain Model (DTM) at 1:25 000 scales of SIGTIERRAS of 2012 were used, in addition to the official geological maps of Gonzanamá and the plowed scale 1: 100 000 and topographic maps of Gonzanamá and the plowed at 1:50 000 scale The generated base cartography allowed obtaining the water supply, road network, and settlements through 3D vision allowed by the Arc Scene extension; The analysis of geology, geomorphology, and geological hazards was characterized based on the genesis, morphology, morphometry and identification of landslides; additionally, it should empathize that these digital tools allowed the obtaining the result. For each terrain feature, was obtained through the field validation photo interpreted data, which affect was georeferenced performed the respective corrections, there obtained to qualitative and quantitative end map for each one. Finally, with the assistance of information generated, the landslide susceptibility map was obtained through the State Matrix of Analytic Hierarchy, according to on the methodology that consists of an appraisal, normalization, and weighting of the factors.

Keywords:
 Geology, Geomorfholopy, Geological, Geographic Information Systems (GIS).


References:

1.           Hupb Lugo, J. (1989). Geomorphological Dictionary
2.           Lopez V., M. (1988). Fotogeología Manual 

3.           Rye, J.D.; Friar, J.M., others (1994). Geomorphology Practice

4.           very happy, A. (2009). The use of digital terrain models in the study of the physical environment.

5.           Saaty, T. (1980).

38-42

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

10.

Authors:

Solomani Coulibaly, Sidiki Tibina Koné

Paper Title:

Improving Process Quality by 5s Tool in a Handling Company: Case Study

Abstract:  To get advantage in an increasingly intense competition, companies have to satisfy their customers by offering them a service or product of quality. An unorganized work-station, uncomfortable working environment and the excessive wastes in the company are some reasons to lost competitiveness facing to concurrence. To face these challenges “Handling Co” was undertaking a project by introducing the 5S practice into their business. The present research case study reports the 5S practice experience from “Handling Co”. The results show that, the 5S practice improves productivity, efficiency, customers’ satisfaction of the company. Three month of 5S implementation show that productivity, efficiency and customer satisfaction have progressed from 51.5% to 75.0%. However, a greater involvement from top management and a rigorous following are absolutely necessary for the success of the 5S implementation.

Keywords:
     5S, 5S Practice, 5S project, Process Quality


References:

1.              Stevenson, W.J., 2009. Operations management. 10th ed. Boston, MA: McGraw-Hill.
2.              R. S. Agrahari, P.A. Dangle, K.V.Chandratre, 2015. Implementation of 5S Methodology in the Small Scale Industry: A Case Study. International journal of scientific & technology research Vol 4, Issue 04: 180-187. ISSN 2277-8616.

3.              José H. Ablanedo-Rosas, Bahram Alidaee, Juan Carlos Moreno and Javier Urbina, 2010. Quality improvement supported by the 5S, an empirical case study of Mexican organizations. International Journal of Production Research Vol. 48, No. 23, 1, 7063–7087.

4.              Warwood, S.F. and Knowles, G., 2004. An investigation into Japanese 5-S practice in UK industry. The TQM Magazine, 16 (5), 347–353.

5.              Mohd Nizam Ab Rahman, Nor Kamaliana Khamis, Rosmaizura Mohd Zain, Baba Md Deros and Wan Hasrulnizzam Wan Mahmood, 2010. Implementation of 5S practices in The Manufacturing Companies: A case study. American Journal of Applied Science 7(8): 1182-1189.

6.              Osada, T., 1991. The 5S’s: five keys to a total quality environment. Tokyo: Asian Productivity Organization.

7.              O’hEocha, M., 2000. A study of the influence of company culture, communications and employee attitudes on the use of 5Ss for environmental management at Cooke Brothers Ltd. TQM Magazine. 12: 321-330. DOI: 10.1108/09544780010341923

8.              Vibhor Kakkar, Vijay Singh Dalal, Vineet Choraria, Ashish S. Pareta, Anmol Bhatia, 2015. Implementation of 5S Quality Tool in Manufacturing Company: A Case Study. International journal of scientific & technology research Vol. 4, Issue 02: 208-213. ISSN 2277-8616.

9.              Shraddha P. Deshpande, Vipul V. Damle, Merang L. Patel, Akshay B. Kholamkar, 2015. Implementation of ‘5S’ technique in a manufacturing organization: A case study. International Journal of Research in Engineering and Technology Volume: 04 Issue: 01: 136-148. eISSN: 2319-1163; pISSN: 2321-7308.

10.           Creative safety supply https://www.creativesafetysupply.com/5s-audit-scorecard/


43-47

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

11.

Authors:

Alex Raj S.M., Rita Maria Abraham, Supriya M.H.

Paper Title:

Vision-Based Underwater Cable/Pipeline Tracking Algorithms in AUVs: A Comparative Study

Abstract:   The advancement in the field of communication has led to laying of cables in the seafloor. Pipelines that are used for transporting gas and oil are laid in a similar manner. Due to the dynamic nature of the seabed, these structures may get worn out easily and become useless. In such a situation, regular surveillance of seafloor is unavoidable. As the process is difficult for a human operator, vehicles are used for the same, and are called Autonomous Underwater Vehicles (AUV). AUVs carry out surveys for inspection. Embedding intelligence into AUVs increases the speed of computation and the accuracy is improved. Various sensors associated with AUVs contribute to algorithms for navigational purposes. Various techniques are in use for cable/ pipeline inspection, out of which vision based systems offer cheaper but efficient solutions. This paper provides a review on such vision oriented systems for underwater surveillance.

Keywords:
Autonomous Underwater Vehicles (AUVs), navigation,  Underwater image, vision-based


References:

1.             Wynn, Russell B., et al. "Autonomous Underwater Vehicles (AUVs): Their past, present and future contributions to the advancement of marine geoscience." Marine Geology 352 (2014): 451-468.
2.             Ortiz, M. Simo, and G. Oliver, “A vision system for an underwater cable tracker," Machine vision and applications,vol. 13, no. 3, pp. 129-140, 2002.

3.             Szyrowski, Tomasz, et al. "Developments in subsea power and telecommunication cables detection: Part 1–Visual and hydroacoustic tracking." Underwater Technology 31.3 (2013): 123-132.

4.             Hallset, Jan O. "Simple vision tracking of pipelines for an autonomous underwater vehicle." Robotics and Automation, 1991. Proceedings., 1991 IEEE International Conference on. IEEE, 1991.

5.             Chen, Chao, and Masayuki Nakajima. "A Study on Underwater Cable Automatic Recognition Using Hough Transformation." MVA 94 (1994): 532-535.

6.             Matsumoto, Shigetaka, and Yoshihiko Ito. "Real-time vision-based tracking of submarine-cables for AUV/ROV." OCEANS'95. MTS/IEEE. Challenges of Our Changing Global Environment. Conference Proceedings.. Vol. 3. IEEE, 1995.

7.             Balasuriya, B. A. A. P., et al. "Vision based autonomous underwater vehicle navigation: underwater cable tracking." OCEANS'97. MTS/IEEE Conference
Proceedings. Vol. 2. IEEE, 1997.

8.             Balasuriya, Arjuna, and Tamaki Ura. "Autonomous target tracking by underwater robots based on vision." Underwater Technology, 1998. Proceedings of the
1998 International Symposium on. IEEE, 1998.

9.             Grau, Antoni, Joan Climent, and Joan Aranda. "Real-time architecture for cable tracking using texture descriptors." OCEANS'98 Conference Proceedings. Vol. 3.
IEEE, 1998.

10.          Zingaretti, Primo, and Silvia Maria Zanoli. "Robust real-time detection of an underwater pipeline." Engineering Applications of Artificial Intelligence 11.2 (1998): 257-268.

11.          Balasuriya, Arjuna, and Tamaki Ura. "Autonomous target tracking by Twin-Burger 2." Intelligent Robots and Systems, 2000.(IROS 2000). Proceedings. 2000 IEEE/RSJ International Conference on. Vol. 2. IEEE, 2000.

12.          Ortiz, Alberto, Miquel Simó, and Gabriel Oliver. "Image sequence analysis for real-time underwater cable tracking." Applications of Computer Vision, 2000, Fifth IEEE Workshop on.. IEEE, 2000.

13.          Foresti, Gian Luca. "Visual inspection of sea bottom structures by an autonomous underwater vehicle." Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on 31.5 (2001): 691-705.

14.          Conte, G., S. M. Zanoli, and D. Scaradozzi. "An automatic guidance system for a small work-class ROV." 15th IFAC World Congress. 2002.

15.          Lim, Daniel Loung Huat. "Design of a vision system for an autonomous underwater vehicle." Bachelor of Engineering Honours Thesis, School of Electrical, Electronic and Computer Engineering, University of Western Australia (2004).

16.          Asif, Muhammad, and Mohd Rizal Arshad. An active contour and kalman filter for underwater target tracking and navigation. INTECH Open Access Publisher, 2006.

17.          Horgan, Jonathan, et al. "Real-time vision based AUV navigation system using a complementary sensor suite." IFAC Conference on Control Applications in Marine Systems (CAMS'07). 2007.

18.          Wirth, Stephan, et al. "Using particle filters for autonomous underwater cable tracking." IFAC Workshop on Navigation, Guidance and Control of Underwater Vehicles. Vol. 2. 2008.

19.          Narimani, Mehdi, Soroosh Nazem, and Mehdi Loueipour. "Robotics vision-based system for an underwater pipeline and cable tracker." OCEANS 2009-EUROPE. IEEE, 2009.

20.          Ortiz, Alberto, Javier Antich, and Gabriel Oliver. "A particle filter-based approach for tracking undersea narrow telecommunication cables." Machine Vision and
Applications 22.2 (2011): 283-302.

21.          Cheng, Chi-Cheng, and Bo-Tung Jiang. "A robust visual servo scheme for underwater pipeline following." Systems, Signals and Image Processing (IWSSIP), 2012
19th International Conference on. IEEE, 2012.

22.          Drews Jr, Paulo, Vinicius Kuhn, and Sebastião Gomes. "Tracking system for underwater inspection using computer vision." Offshore and Marine Technology: Science and Innovation (NAVTEC), 2012 International Conference on. IEEE, 2012.

23.          Devendra Goyal, Karan R. Shetti, Timo Bretschneider,Robust Vision-based Detection and Tracking of Underwater  Pipelines, Proceedings of International Conference on Underwater Remote Sensing,2012

24.          Ortiz, A., and J. Antich. "Bayesian visual tracking for inspection of undersea power and telecommunication cables." Journal of Maritime Research 6.2 (2014): 83
94.

25.          Chen, Hsin-Hung, Wen-Ning Chuang, and Chau-Chang Wang. "Vision-based line detection for underwater inspection of breakwater construction using an ROV." Ocean Engineering 109 (2015): 20-33.

48-52

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

12.

Authors:

Jameel Ahamed, Hemendra Kumar Tiwari

Paper Title:

Suppression of side lobe power for Cognitive Radios based on OFDM using Windowing Techniques

Abstract:    With the introduction of new technology in wireless applications with high data rate and increase of existing wireless services, need for additional bandwidth is speedily enhancing. Existing spectrum allocation policies of the Federal Communications Commission (FCC) forbids unlicensed access to licensed spectrum, confining them to various heavily populated, interference-prone frequency bands, which causes shortage in spectrum. Orthogonal frequency division multiplexing (OFDM) is used for cognitive radio (CR) transmission because it supports high data rates that are vigorous to channel impairments. The immense problem for transmission of OFDM is high out-of-band (OOB) radiation, which is due to sinc-type function representing the symbols throughout one time constant. Thus, high sidelobe may happen that will intervene with neighboring transmissions. In this paper we used windowing techniques to decrease the effects of sidelobe transmission.

Keywords: 
OFDM, CR, Windowing


References:

1.                Federal Communications Commission, “Spectrum policy task force report.” EE Docket No. 02-135, 2002.
2.                R. Rajbanshi, OFDM-based cognitive radio for DSA networks. Ph.d dissertation, University of Kansas, Lawrence, KS, USA, May 2007.

3.                T. A. Weiss and F. K. Jondral, “Spectrum pooling: an innovative strategy for the enhancement of spectrum efficiency,” IEEE Commun. Mag., vol. 43, pp. 8–14, March 2004.

4.                J. Mitola III, “Cognitive radio for flexible mobile multimedia communications,” in Proc. IEEE Int. Wksp. Mobile Multimedia Commun., vol. 1, (San Diego, CA, USA), pp. 3–10, Nov. 1999.

5.                R. Prasad, OFDM for Wireless Communication Systems. Artech House Inc., 2004.

6.                R. Rajbanshi, A. M. Wyglinski, and G. J. Minden, “An efficient implementation of the NC-OFDM transceivers for cognitive radios,” in Proc. IEEE Int. Conf. on Cognitive    Radio Oriented Wireless Networks Commn., (Mykonos, Greece), June 2006

7.                T. A. Weiss, J. Hillenbrand, A. Krohn and F. K. Jondral, “Mutual interference in OFDM based spectrum pooling systems,” in Proc. IEEE Veh. Tech- nol. Conf. - Fall, vol. 4, pp. 1872–1877, May 2004.

8.                S. Kapoor and S. Nedic, “Interference suppression in DMT receivers using windowing,” in Proc. IEEE Int. Conf. on Commun., vol. 2, (New Orleans, LA, USA), pp.
778–782,   June 2000.

9.                S. Brandes, I. Cosovic, and M. Schnell, “Sidelobe supression in OFDM systems by insertion of cancellation carriers,” in Proc. 62nd IEEE Veh. Technol. Conf. - Fall, vol. 1,pp. 152–156, Sept. 2005.

10.             I.Cosovic, S. Brandes, and M. Schnell, “Subcarrier weighting: A method for sidelobe  suppression in OFDM systems,” IEEE Commn. Letters, vol. 10, No.6, June 2006.

11.             Cosovic and T. Mazzoni, “Suppression of sidelobes in OFDM systems by multiple choice sequences,” European Trans. Commun., vol. 1, pp. 623–630, Dec. 2006.

12.             Srikanth Pagadarai “Sidelobe Suppression For Ofdm Based Cognitive Radios In Dynamic Spectrum Access Networks” thesis University of Kansas, 2007.


53-56

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

13.

Authors:

G. Prasanna Kumar, N. Seetharamaiah, B. Durga Prasad

Paper Title:

Finite Element Analysis of Magneto-Rheological Fluid (MRF) Boring Bar

Abstract:     Chatter is a concern in boring process, due to the low dynamic stiffness of long cantilever boring bars. Chatter suppression in machining permits higher productivity and better surface finishes. In order to improve the performance of boring operations, several researchers have investigated electro- and magneto-rheological fluids and piezoelectric and electromagnetic actuators as vibration absorbers. The MR fluid, which changes stiffness and undergoes a phase transformation when subjected to an external magnetic field, is applied to adjust the stiffness of the boring bar and suppress chatter. The stiffness and energy dissipation properties of the MR fluid boring bar can be adjusted by varying the strength of the applied magnetic field. In this study, a finite element model of a MR fluid boring bar is established to investigate the strength of magnetic field at various locations of the boring bar for different current inputs.

Keywords:
 Chatter, MR Fluid, Boring bar, Magnetic Flux Density, Finite Element Model.


References:

1.             Tewani, S.G., Rouch, K.E., Walcatt, B.L., 1995. A study of cutting process stability of a boring bar with active dynamic absorber. International Journal of Machine Tools and Manufacture 35, 91–108.
2.             Tanaka, H., Obata, F., 1994. Active chatter suppression of slender boring bar using piezoelectric actuators. JSME International Journal

3.             Marra, M.A., Walcott, B.L., Rouch, K.E., Tewani, S.G., 1995. H∞ vibration control for machining using active dynamic absorber technology. In: Proceedings of the American Control Conference, Seattle, Washington, pp. 739–743.

4.             Li, C.J., Ulsoy, A.G., Endres, W.J., 2006. The effect of spindle speed variation on chatter suppression is rotating-tool machining. Materials Science Forum 505–507, 859–864.

5.             Pratt, J.R., Nayfeh, A.H., 2001. Chatter control and stability analysis of a cantilever boring bar under regenerative cutting conditions. Philosophical Transactions: Mathematical, Physical and Engineering Science, Nonlinear Dynamics in Metal Cutting 359, 759–792.

6.             Pan, G., Xu, H., Kwan, C.M., Liang, C., Haynes, L., Geng, Z., 1996. Modeling and intelligent chatter control strategies for a lathe machine. In: Proceedings of the 1996 IEEE International Conference on Control Applications, Dearborn, MI, pp. 235–239.

7.             Wong, B.W., Walcott, B.L., Rouch, K.E., 1995. Active vibration control via electromagnetic dynamic absorbers. In: Proceedings of the Fourth IEEE International Conference on Control Applications, Albany, NY, pp. 868–874.

8.             Rivin, E.I., Kang, H., 1992. Enhancement of dynamic stability of cantilever tooling structures. International Journal of Machine Tools and Manufacture 32 (4), 539–561.

9.             Wang, M., Fei, R.Y., 1999. Chatter suppression based on nonlinear vibration characteristic of electrorheological fluids. International Journal of Machine Tools and Manufacture 39, 1925–1934.

10.          Lam, H.F., Liao, W.H., 2001. Semi-active control of automotive suspension systems with magnetorheological dampers. Proceedings of SPIE 4327, 125–136.

11.          Srinivasan, A.V., McFarland, D.M., 2001. Smart Structures: Analysis and Design. Cambridge University Press, Cambridge.

12.          Yang, S., Tang, H.L., 1983.  Machine Tool Dynamics. China Machine Press, Beijing


57-61

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

14.

Authors:

F. González, W. Tambo, M. Valarezo,  l. González, J. Romero, J.Benavides

Paper Title:

Landslide Susceptibility in the Community Neighborhood Road, the National University of Loja to 0.9 Km Stretch, the city, Canton, and Province of Loja.

Abstract:      This article has as the main purpose to identify landslide prone areas in the Community Neighborhood Road, in the section between the Julio Ordoñez Urbanization and the National University of Loja in about 0.9 kilometers in Loja city-Ecuador. The implementation needed to develop in two phases of field and office: the first was to use specialized equipment to carry out the survey of the topography, geology, land use, geomorphology and geotechnical investigation directly scan standard penetration tests (SPT), and indirectly with vertical electrical sounding (SEV). This information after being analyzed entered into software (ArcGIS 10.1. Ilwis 3.06 and ArcView 3.2) and then perform modeling using susceptibility calculation methods to landslides. The methods utilized in this investigation for determining susceptibility are, deterministic based on the computation of safety factor (FS) and heuristic method with the combination of factors maps whose weights assigned according to the knowledge of the actual conditions of the sector which obtained from the SEV, SPT, and bibliographic sources. The heuristic method was systematized in ArcGIS 10.1 software by applying the model tool builder for combining raster maps using the tool weighted sum, through the assignment of values to each of the variables that are: Geology 0.4, slope 0.3, geomorphology 0.2 and vegetation cover 0.1. In contrast, to the deterministic method, a digital terrain model (DTM) in Ilwis software was developed, after calibrated and modeled in ArcGIS 10.1 software, being the most relevant parameters angle of internal friction and soil cohesion. Moreover, an inventory of landslides was performed, which were located within the area of high susceptibility to match the physical-mechanical characteristics of the soil resulting from SPT and SEV analysis.

Keywords:
  Sensitivity, SPT standard penetration test, Vertical electrical sounding SEV, Deterministic, Heuristic, Model builder, Weighted sum, DTM.


References:

1.              Braja M Das. Fundamentos de Ingeniería Geotécnica, Sacramento Universidad de California, Editorial Thomson Learning. 1999 608pp.
2.              CLIRSEN, (2012). Ficha de Fotointerpretación geomorfológica.

3.              Demek, J., (Ed.), (1972), Manual of detailed geomorphological mapping, International Geographical Union, Commission on Geomorphological Survey and Mapping, Prague, 344 p.

4.              Sarkar, S., Kanungo, D.P. (2004) “An integrated approach for landslide susceptibility mapping using remote sensing and GIS”. Photogrammetric Engineering and Remote Sensing, 70: pp. 617-625.

5.              SIG-TIERRAS (Sistema Nacional de Información y Gestión de Tierras Rurales e Infraestructura Tecnológica). Disponible en: http://www.sigtierras.gob.ec/.

6.              Tambo Walter. (2011) “Estudio del Peligro de deslizamiento del Norte de la ciudad de Loja, Provincia de Loja. Ecuador”.

7.              Van Westen, C. (1994) “Aplicación del Sistema de Información Geográfica para la zonificación del peligro de deslizamiento”.

8.              Janssen y Van Herwijnen, (1994). “Pesos de criterios usando el Método de Suma de Rango”. Apoyo de decisión multiobjetivo a dirección ambiental. Decisiones definidas.

9.              Westen C.J. (2002). “Statistical landslide hazard analysis”. International Institute for Geo-Information Science and Earth Observation (ITC).

62-70

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

15.

Authors:

Hernán Fabricio Alvarado, Emperatriz Elizabeth Bailón Abad, José Leonardo Benavides Maldonado Francisco Aleaga Loaiza, Manuel Pesantez

Paper Title:

Analysis of Mechanical Strength Concrete with Addition of Fiber PAMBIL

Abstract:       In the second decade of the twentieth-century housing still plays a decisive role in the quality of life of the population of the countries in the developing world and it represents the primary investment and the most important assets of middle and low-income families. However, despite acknowledging recognizing its importance, the deficits recorded for the countries of Latin America are more than 25 million housing units (CEPAL, 1995) and to Ecuador, a requirement of 1 million, two hundred thousand solutions.  The causes that prevent the provision of accommodation associated with the unequal distribution of wealth, the high costs of building materials, and the dependence on technology and the lack of local research and ingenuity. Currently, the predominant use of concrete has led to the discovery of composite materials, achieved through the addition of fiber to the real matrix, aiming to reduce costs. In this case, the design of concrete performed under the Maximum Density Method and utilized Iriartea deltoidea or Pambil as fiber reinforcement, which is readily available in the province of Zamora Chinchipe, located in the southeastern part of Ecuador. It used in varying percentages of 0.50, 1.50 and 2.5% and whose sizes retained in sieves 4 and 8, placed randomly in the concrete mix. The results obtained show that the addition of fiber elements tested under compression improves the characteristics of the composite. However, about flexion the concrete strength decreases, showing not so encouraging results for the manufacture of composite concrete and fiber pambil.  This adverse outcome does not guarantee the success of the composite concrete, which under experimental conditions is technically recommendable, but still does not prove to be economically appropriate solutions.

Keywords:
   composite materials, organic fibers. Reinforced concrete.


References:

1.              BERALDO, A. (1997). COMPOSITOS BIOMASSA VEGETAL CIMENTO. IN TOLEDO. FILHO D. MATERIAIS NAO CONVENCIONAIS PARA CONSTRUCO ES RURAIS, 48.
2.              CEPAL. (1995). SOCIAL PANORAMA OF LATÍN AMÉRICA. SANTIAGO DE CHILE, CHILE.

3.              CEPEDA, R. E. (1997). ISCYC MAGAZINE. SAN SALVADOR.

4.              HERNÁNDEZ, R. (2003). OF THE RESEARCH METHODOLOGY (SENIORS.). MEXICO D.F. MC GRAW-HILL.

5.              LEWIS, G. M. (1979). NATURAL VEGETABLE FIBERS AS REINFORCEMENT IN CEMENT SHEETS. MAFAZINE OF CONCRETE RESEARCH, 31 (107), 104-108.

6.              MACVICAR, R. M. (1999). AGING MECHANISMS IN CELLULOSE FIBER REINFORCED CEMENT COMPOSITES. CEMENT AND COMPOSITES. V. 21.

7.              PAZMINO, C. (2006). INVESTIGACION CIENTIFICA. TIEMPO DE INVESTIGAR (SEGUNDA EDICION ED.). QUITO: GRUPO LEER.

8.              RICH, P. M. (1987). MECHANICAL STRUCTURE OF THE STEM OF ARBORESCENT PALMS. BOTANICAL GAZZETE .

9.              SZALACHMAN, R. (2000). PROFILE DEFICIT AND HOUSING POLICIES OF SOCIAL INTEREST: SITUATION OF THE COUNTRIES OF THE REGION IN THE NINETIES. CEPAL.

71-77

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

16.

Authors:

Ahmed H. El-Masry, Mohamed A. Dabaon, Tarek F. El-Shafiey, Abd El-Hakim A. Khalil

Paper Title:

Numerical Modeling of Innovative Connection Between RC Beam and Steel Column

Abstract: Transferring the load from beam to the column by a safe way is considered one of the critical issues which have been studied by many researchers in many fields. The failure of the connection between the column and the beam is one of the major reasons which causes structures failure and has a great effect on the acceleration of collapse. Experimental study has been provided to investigate the transfer part technique as a structural system which aims to keep the failure location at the beams side. This paper presents the finite element modeling to simulate that technique for expanding the research field. A discussion is provided for the effect of increasing the column stiffness through the experimental results. The study indicates that the use of finite element modeling by a specific materials and elements could be given an asymptotic behavior of the behavior of the experimental test.

Keywords:
    Finite element modeling, RC beam, Steel column, Transfer Part.


References:

1.                 W. Li, L Hai Han, ‘‘Seismic performance of CFST column to steel beam joints with RC slab: Analysis’’ Journal of Constructional Steel Research, 2011.
2.                 J. Garzόn-Roca, J.M. Adam, P.A. Calderόn and I.B. Valente, ‘‘Finite element modelling of steel-caged RC columns subjected to axial force and bending moment’’ Journal of Engineering Structures, February 2012.

3.                 Dabaon M. A, El-Boghdadi M. H and Kharoob O. F., ‘‘Semi-Rigid Joints in Bare Steel and Composite Frames Subjected to Loading in Space, Part II: finite element modeling’’ Twelfth International colloquium on Structural and Geotechnical Engineering, December 2007.

4.                 A.-Elremaily, A. Azizinamini“Experimental Behavior of Steel beam to CFT Column Connections,” Journal of Constructional Steel Research, June 2001.

5.                 A.Elremaily, A. Azizinamini“Design Provisions for Connections between Steel Beams and Concrete Filled Tube Columns,” Journal of Constructional Steel Research, April 2001.

6.                 A.H. El-Masry, M.A. Dabaon, T.F. El-Shafiey and A.A. Khalil, ‘‘Investigate on an innovative way to connect RC Beam and Steel Column ’’, International Journal of Civil, Structural, Construction and Architectural Engineering Vol:9, No:4, 2015.

7.                 ANSYS multiphysis v14 user’s manual.

8.                 Eurocode 3.,‘‘Design of Steel Structures’’part 1.8 Design of joints CEN.2005.

9.                 T.M. Khalifa, " Static and Dynamic nonlinear analysis of frames with semi rigid joint" Ph. D thesis (2008), Tanta University, Egypt.

10.              P. Desayi and S.krishnan, “Equation for the stress0strain curve of concrete,” ACI jornal, Proc.61 (3), PP. 345-350 (1964).

11.              J.D. Carreira and. K.H. CHU, ‘‘Stress-Strain relationship for plain concrete in compression’’ ACI Journal, 82, No. 6, PP. 797-804 (1985).

12.              A.N. Sherbourne and M.Bahaari, ‘‘Finite Element Prediction of End Plate Bolted Connection Behavior; Parametric Study’’ Journal of Structural Engineer February (1997) 157-164.
13.              Egyptian Standard Specifications No 262-1999, "Tensile testing of materials".


78-82

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

17.

Authors:

Mark Obegi Kenyatta

Paper Title:

Sources of Payment Problems in the Construction Industry of Kenya: a Perspective of the National Construction Authority

Abstract:  The underlying sources of payment problems have not only troubled many countries but have also seen contractors and those below the supply chain blacklisted by the credit reference bureaus. Whilst those who contract in the construction industry expect prompt and regular payments for work done, in reality this happens not to be the case. This paper therefore investigates the sources of payment problems from the perspective of the National construction authority. Besides review of secondary literature, a focus group discussion was employed to collect qualitative data. By a way of themes synchronized with a “black letters” approach, data was analyzed and discussed. The study finds out that sources of payment problems are attributable to client related factors, contractor related, actions of the consultants and the procurement route chosen.  It is generally hoped that the awareness created around this subject may trigger industry to commission further research and subsequent action by a way of new regulations.

Keywords:
 Construction industry, Contractor, Payments, construction contracts


References:

1.                AngSuSin, T. (2007). Payment issues - the present dilemmas of malaysian construction industry. kuala lumpur: Univeristi Teknologi Malaysia Istitutional Repostory.
2.                Ansah, S. K. (2011). Causes and Effects of Delayed Payments by Clients on Construction Projects in Ghana. Journal of Construction Project Management and Innovation, 1(1), 27 - 45.

3.                Ashworth, A. (2012). Contarctual Procedures (6th ed.). New delhi: Pearson Education Limited.

4.                BERR. (2007). Improving Payment Practices in the Construction Industry: Consultation on proposals to amend Part II of the Housing Grants Construction and Regeneration Act 1996 and the Scheme for Construction Contracts (Scotland) Regulations 1998. Retrieved from http://www.gov.scot/Publications/2007/08/28153225/3

5.                Bryman, A. (2012). Social research methods (4th  ed.). New York: Oxford University Press.

6.                Cheng, T., Soo, G., Kumaraswamy, M., & Jin, W. (2010). Security of payment for Hong Kong construction industry. Proceedings of Institution of Civil Engineers: Management, 163(1), 17-28.

7.                Chitkara, K. K. (2011). Construction Project Management - Planning,Scheduling & Control (2nd  ed.). New Delhi: Tata McGraw-Hill.

8.                CIDB. (2010). Delayed Payments in the Construction Industry. Johannesburg: Construction Industry Development Board of Sourth Africa.

9.                Creswell, J. W. (2003). A Framework for Design. In research design:Qualitative,Quantitative and Mixed Methods Approaches (pp. 1-26). Thousand Oaks, London & New Delhi: SAGE Publications-International Educational and Professional Publisher.

10.             Danuri, M. S., Munaaim, C. M., Rahman, A. H., & Hanid, M. (2006). Late and Non Payment Issues in the Malaysian Construction Industry-A Contractor's Perspective. Sustainable Development through Culture and Innovation, The Joint International Conference on Construction Culture, Innovation and Management
(CCIM), 613-623.

11.             Fleming, Q. W., & Koppelman, J. M. (2008). Performance based payments (PBPs). PM World Today, 10(4).

12.             Graham, D. (2006). Managing Residential Construction Projects - Strategies and Solutions. New York: McGraw-Hill.

13.             Harris, F., & McCaffer, R. (2006). Modern Construction Management (6th  ed.). Oxford: Blackwell.

14.             Hasmori, M. F., Ismail, I., & Said, I. (2012 12-13-March). Issues of Late and Non-Payment Among Contractors in Malaysia. International conference on business and economic, 82-93.

15.             Kenyatta, M. O., Alkizim, A. O., & Mbiti, T. K. (2015, September). Recapitulating The Payment Default Effects to Contractors in The Kenyan Construction Industry. International Journal of Soft Computing and Engineering (IJSCE), 5(4), 2231-2307.

16.             KLR. (2011). The national construction authority act no 41 of 2011. Nairobi: National Council for Law Reporting.

17.             KNBS. (2015). Economic Survey Highlights. Nairobi: KNBS.

18.             Latham, M. (1994). Constructing the Team. UK: HMSO.

19.             Maritz, M. J., & Robertson, D. C. (2012). What are the legal remedies available to contractors and consultants to enforce payment? Journal of the south african institution of civil engineering, 54(2), 27-35.

20.             Marx, H. J. (2014). Results of the 2014 Survey of the CIDB Construction Industry Indicators. Free State: University of the Free State.

21.             Mbachu, J. (2011). Sources of contractor's payment risks and cashflow problems in the New Zealand construction industry:Project team's perceptions of the
risks and mitigation measures. Construction Management and Economics, 29(10), 1027-1041.

22.             Mbiti, T. K. (2008). A System Dynamics Model of Construction Output in Kenya. Melbourne: Unpublished PHD Thesis.Australia: MIT.

23.             Murdoch, ,. J., & Hughes, W. (2008). Construction Contracts: Law and Management (4th  ed.). London: Taylor and Francis.

24.             NCA. (2014). Code of Conduct and Ethics for the Construction Industry. Nairobi: National Construction Authority.

25.             NCASL. (2008). Report on payment delays in sri lankan construction industry - prepared by : national construction association of sri lanka (southern branch). National Construction Association of Sri Lanka(Southern Branch).

26.             NEC. (2008). OGC fair payment practices for use with NEC Contracts. London: Thomas Telford Ltd.

27.             NESC. (2014). Credit gurantee schemes: The road to expanding business and investiment in Kenya. Nairobi: National Economic and Social Council with support fro USAID Kenya.

28.             Prism. (2013). The Need for Prompt Payment Legislation in the Construction Industry. Ontario: Reed Elsevier Incl.

29.             ProInvest. (2011). Critical Review of the Kenyan Construction Industry. Nairobi. Retrieved from www.iqskenya.org/the-kenyan-construction-industry.pdf

30.             Shapiro, B. (2005). Inherent Conflicts in the Construction Industry and the Structure of Contracts. The Fundamentals of Construction Contracts. Vancouver, BC,: Lorman Education Services.

31.             Silverman, D. (2010). Doing Qualitative Research (3rd  ed.). New York: SAGE.

32.             Thomas, R., & Wright, M. (2011). Construction Contract Claims (3 ed.). Hampshire: palgrave macmillan.

33.             Uff, J. (2009). Construction Law (10th  ed.). London: Thomson Reuters.

34.             Wahome, G. W. (2014). Influence of Public Procurement Oversight Authority's Standard Tender Document on Public Building Projects in Kenya. Nairobi:
Unpublished Masters Thesis.Nairobi: University of Nairobi.

35.             Warsaw, Ankara, Ascot, & Mondavio. (2012). Strengthening of European Union funds absorption capacity for infrastructure construction projects. In E. Commission (Ed.), Manual Procurement Strategy in Construction. TRAIN TO CAP.

36.             Ye, K. M., & Rahman, H. A. (2010). Risk of Late Payment in the Malaysian Construction Industry. World Academy of Science, Engineering and Technology, 1(41), 538-546.


83-88

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

18.

Authors:

Aashita Nyati, Emil Christian, Shairal Neema

Paper Title:

Smart Street Light System: Innovation and Revolution

Abstract:   Presently, 18-38% of the total energy bill goes to the global street lighting and most urban cities still use Metal Halide bulbs, High Pressure Sodium Vapor Lamps and CFLs that neither provide efficient lighting nor energy savings. Therefore this is one domain that needs major attention in an objective of saving energy.  So,  the paper discusses about the  use of LED arrays powered by solar panels in the existing street light system and automate the same using  Light Dependent Resistor( LDR),Passive Infrared(PIR) sensors, presence detectors and brightness sensor .    

Keywords:
 LDR, LED arrays, Zigbee, PIR, microcontroller.


References:

1.  Abhilasha Jain, Chandrashekhar  Nagarajan, “Efficient Control Algorithm for a Smart Solar Street Light,” India: IEEE, 2015.
2.   Yusnani Mohd Yusoff, Roszainiza Rosli, Mohd Uzir Kamaluddin, Mustaffa Samad,"Towards Smart Street Lighting System in Malaysia " in Electrical, Malaysia: IEEE,2013.

3.   Noriaki Yoshiura, Yusaku  Fujii, Naoya Ohta, "Smart street light system looking like usual street lights based on sensor networks", Japan: IEEE,2013.

4.   Guawan Wibisono and Achmad Bayhaki, "Design and implementation of Smart Wireless Street Lighting System With Ad-Hoc Network Configuration ", Indonesia : IEEE, 2014


89-92

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

19.

Authors:

P.R. Thorat, K.V. Patil

Paper Title:

Identification of Diabetic Retinopathy from Segmented Retinal Fundus Images by using Support Vector Machine

Abstract:    Segmentation of images has become important and effective tool for many technological applications like vessel segmentation from fundus images, medical imaging and many other post-processing techniques. Diabetic Retinopathy is an eye disease which is caused by changes in blood vessels of retina of diabetes. It is the primary cause of blindness in the universe. To avoid blindness of diabetes detection of diabetic retinopathy as early as possible is the only option as number of persons are becoming blind because of this disease. Many studies have shown that early diagnosis is the most efficient way to cure this disease. This paper presents identification of diabetic retinopathy from segmented retinal images by using support vector machine. In pre-processing, first the input image is converted into green channel image and converted into binary image. After that we have segmented the vessels using thresholding. For tracing of vessels, graph tracer algorithm is used. Through the project we have developed an algorithm for identifying the diabetic retinopathy from fundus images. For identification we have used GLCM features and SVM classifier together. The results indicate a potential for developing an automatic algorithm to segment and trace vessels and diabetic retinopathy classification for  planning of treating the disease. For this, we have collected the database of 24 retinal fundus images from Dongaonkar Eye hospital, Kranti chowk, Aurangabad.  The proposed system is implemented in MATLAB software.

Keywords:
  Vessel Segmentation, Graph tracer algorithm, Feature Extraction, GLCM (Gray Level Co-occurrence Matrix), SVM (Support Vector Machine).

References:
1.             Qiangfeng Peter Lau, Mong Li Lee, Wynne Hsu, and Tien Yin Wong, “Simultaneously Identifying All True Vessels From Segmented Retinal Images”   IEEE Transactions on  biomedical engineering, Vol. 60, No. 7, July 2013
2.             R. C. Gonzalez, R. E. Woods, “Digital Image Processing”, 3rd Edition, pp.738-756.
3.             Vallabha, D., Dorairaj, R., Namuduri, K., and Thompson, H., Automated detection and classification of vascular abnormalities in diabetic retinopathy, Proceedings of 13th IEEE Signals, Systems and Computers 2:1625-1629, 2004

4.             Walter T, Massin P, Erginay A, Ordonez R, Jeulin C, Klein J-C "Automatic Detection of Micro aneurysms in Color Fundus Images Medical Image analysis"2007.

5.             Hussain F. Jaafar, Asoke K. Nandi and Waleed Al-Nuaimy,A utomated detection and grading of hard exudates from retinal fundus images, 9th European Signal Processing Conference (EUSIPCO 2011), Barcelona, Spain, August 29 - September 2, 2011.
6.             Acharya, U. R., Chua, K. C., Ng, E. Y. K., Wei, W., and Chee, C. Application of higher order spectra for the identification of diabetes retinopathy stages. J. Med. Systems, 2008, 32(6), 48 1-488.
7.             Wong, L. Y., Acharya, U. R., Venkatesh, Y. V., Chee, C., Lim, C. M., and Ng, E. Y. K., Identification of different stages of diabetic retinopathy using retinal optical images. Information Sciences 178(1):106–121, 2008.

8.             Nayak, J., Bhat, P. S., Acharya, U. R., Lim, C. M., and Kagathi, M., Automated identification of different stages of diabetic retinopathy using digital fundus images. J. Med. Syst., USA, 32 (2):107–115, 2008.

9.             Selvathi D, N.B.Prakash, Neethi Balagopal “Automated detection of Diabetic Retinopathy for early diagnosis using feature extraction and support vector     machine” International Journal of Emerging Technology and Advanced Engineering  (ISSN 2250-2459, Volume 2, Issue November 2012)

10.          C. I. Sánchez, R. Hornero, M. I. Lopez, J. Poza “Retinal Image Analysis to Detect and Quantify Lesions Associated with Diabetic Retinopathy” Proceedings of the     26th Annual International Conference of the IEEE EMBS  San Francisco, CA, USA September 1-5, 2004

11.          SujithKumar S B,  Vipula Singh  “Automatic Detection of Diabetic Retinopathy  in Non-dilated RGB Retinal Fundus Images” International Journal of Computer Applications (0975 – 888) Volume 47– No.19, June 2012

12.          Romany Fouad Mansour “Using Genetic Algorithm for Identification of Diabetic Retinal Exudates in Digital Color Images” Journal of Intelligent Learning Systems and Applications, 2012, 4, 188-198


93-98

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

20.

Authors:

Sheetal Shinkhede

Paper Title:

Emerging Trends to Relieve Power System Stress Condition

Abstract:     To relieve congestion in the power swystem while increasing static security margin and voltage profile, demand response (DR) and demand side manage-ment (DSM) encourages the costumer in smart grid to use the electricity in response to varying electricity prices. In this paper the distributed algorithm and load management for price based demand response scheduling is studied. The future scope is suggested to relive the power system stress condition. Power system stress issues like issues like small signal analysis, transient conditions and voltage stabilities are studied.

Keywords:
   Energy management, demand side management (DSM), demenad response(DR), load modeling

References:

1.              C.W. Gellings, M. Samotyj, and B. Howe. “The future’s smart delivery system [electric power supply].” Power and Energy Magazine, IEEE, 2(5):40–48, 2004.
2.              Ding Li, Sudharman K Jayaweera, Olga Lavrova, and Ramiro Jordan. “ Load management for price-based demand response scheduling-a block scheduling model”. In International Conference on Renewable Energies and Power Quality (ICREPQ11),(Las Palmas de Gran Canaria, Spain), 2011.

3.              T. Facchinetti and M.L. Della Vedova. Real-time modeling for direct load control in cyber-physical power systems. Industrial Informatics, IEEE Transactions on, 7(4):689–698, Nov 2011.

4.              J. Dickert and P. Schegner. Residential load models for network planning purposes. In Modern Electric Power Systems (MEPS), 2010 Proceedings of the International Symposium, pages 1–6, Sept 2010.

5.              Therese Peffer, Marco Pritoni, Alan Meier, Cecilia Aragon, and Daniel Perry. How people use thermostats in homes: A review. Building and Environment,
46(12):2529–2541, 2011.

6.              Keshtkar and S. Arzanpour. A fuzzy logic system for demand-side load management in residential buildings. In Electrical and Computer Engineering (CCECE), 2014 IEEE 27th Canadian Conference on, pages 1–5, May 2014.

7.              H.P. Khomami and M.H. Javidi. An efficient home energy management system for automated residential demand response. In Environment and Electrical Engineering (EEEIC), 2013 13th International Conference on, pages 307–312, Nov 2013.

8.              Wilma Mert, Jurgen¨ Suschek-Berger, and Wibke Tritthart. Consumer ac-ceptance of smart appliances. Smart domestic appliances in sustainable energy systems (Smart-A), 2008.

9.              M. Pipattanasomporn, M. Kuzlu, and S. Rahman. Demand response implementation in a home area network: A conceptual hardware archi-tecture. In Innovative Smart Grid Technologies (ISGT), 2012 IEEE PES, pages 1–8, Jan 2012.

10.           Chua Liang Su. Optimal demand-side participation in day-ahead electricity markets. PhD thesis, The University of Manchester, 2007.

11.           Mohamed H Albadi and EF El-Saadany. A summary of demand response in electricity markets. Electric power systems research, 78(11):1989– 1996, 2008.

12.           Jiaqi Liang, D.D. Molina, G.K. Venayagamoorthy, and R.G. Harley. Two-level dynamic stochastic optimal power flow control for power systems with intermittent renewable generation. Power Systems, IEEE Transactions on, 28(3):2670–2678, Aug 2013.

13.           Giorgio C Buttazzo. Hard real-time computing systems: predictable scheduling algorithms and applications, volume 24. Springer Science & Business Media, 2011.

14.           E. Williams, S. Matthews, M. Breton, and T. Brady. Use of a computer-based system to measure and manage energy consumption in the home. In Electronics
and the Environment, 2006. Proceedings of the 2006 IEEE International Symposium on, pages 167–172, May 2006.

15.           Ding Li and S.K. Jayaweera. Distributed smart-home decision-making in a hierarchical interactive smart grid architecture. Parallel and Distributed Systems, IEEE Transactions on, 26(1):75–84, Jan 2015.

16.           Q QDR. Benefits of demand response in electricity markets and recommendations for achieving them. 2006.

17.           Shengnan Shao. An approach to demand response for alleviating power system stress conditions due to electric vehicle penetration. PhD thesis, Virginia Polytechnic Institute and State University, 2011.

18.           Hongyu Wu, M. Shahidehpour, and M.E. Khodayar. Hourly demand response in day-ahead scheduling considering generating unit ramping cost. Power Systems,
IEEE Transactions on, 28(3):2446–2454, Aug 2013.

19.           P. Chavali, Peng Yang, and A. Nehorai. A distributed algorithm of appliance scheduling for home energy management system. Smart Grid, IEEE Transactions on, 5(1):282–290, Jan 2014.

20.           A.M. Salamah, S.J. Finney, and B.W. Williams. Autonomous controller for improved dynamic performance of ac grid, parallel-connected, single-phase inverters. Generation, Transmission Distribution, IET, 2(2):209–218, March 2008.

21.           M. Shahabi, M.-R. Haghifam, M. Mohamadian, and S.A. Nabavi-Niaki. Microgrid dynamic performance improvement using a doubly fed induction wind generator.
Energy Conversion, IEEE Transactions on, 24(1):137–145, March 2009.

22.           R. Majumder. Some aspects of stability in microgrids. Power Systems, IEEE Transactions on, 28(3):3243–3252, Aug 2013.


99-102

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

21.

Authors:

Swapnil S. Jogal, K. Jayarajan, Aqleem Siddiqui

Paper Title:

Effect of Link Length Ratio on the Workspace of A Delta Robot

Abstract:      Delta robot design has attracted a great interest in industry and in academia. The aim of this paper is to study the effect of link length ratio on the vertical reach of a delta robot. Link length ratio is defined as the ratio of the length of a link attached to the motor at the base plate to the total length of links between the base plate and the moving plate. Based on the study, the optimum link length ratio is obtained for maximum depth of workspace. The study makes use of inverse kinematic algorithm. Workspace is plotted using MATLAB.

Keywords:
    Delta Robot, Inverse kinematics, Link length ratio, Workspace.

References:

1.             J.  P.             Merlet,     “Parallel   Robots”,  Springer,Netherlands, 2006, pp. 1-18.
2.             J. P. Merlet, “Direct Kinematics and Assembly Modes of Parallel Manipulators”, in the International Journal of Robotics Research, Vol.11, No.2, April 1992, pp. 150-162.  

3.             Robert  L.  Williams  II  and  Brett  H.  Shelley, “Inverse Kinematics for Planar Parallel Manipulators”, in Proceedings of DETC ’97 1997 ASME Design Technical Conferences, September 14-17, 1997, Sacramento, California, pp. 1-6.

4.             Xin-Jun Liu, Jay ilJeong, and Jongwon Kim, “A three translational DOFs parallel cube- manipulator”, in Robotica, Vol. 21, 2003, pp. 645-653.

5.             VieraPoppeová, JurajUriček, Vladimir Bulej, Peter Šindler, “Delta Robots – Robots for high speed manipulation”, in Technical Gazette 18, 2011, pp.435-445.

6.             M Lopez1, E Castillo, G Garcia, and A Bashir, “Delta robot: inverse, direct and intermediate Jacobians”, in Proc. IMechE Vol. 220 Part C: J. Mechanical Engineering Science, 2006, pp. 103-109.       

7.             L. W. Tsai, G. C. Walsh and R. E. Stamper, “Kinematics and Workspace of a Novel Three DOF Translational Platform” in Technical Research Report, Mechanical Engineering Department and Institute   for   Systems   Research,   University  of Maryland, May 29, 1996.

8.             http://www.parallemic.org/Reviews/Review002.html 


103-106

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

22.

Authors:

Megha I Mathapati, Shrikant Salotagi

Paper Title:

Handling Dead-Ends, Load Balancing and Providing Security in Wireless Sensor Networks

Abstract: This paper represents load balancing around the dead ends using adaptive load balancing algorithm and rainbow protocol providing security using RSA algorithm. This is brief introduction to various algorithms to handle the load balancing. This represents the converge-casting protocol in wireless sensor networks. The protocol is localized and distributed, and adapts efficiently to vary traffic. Graphs are analyzed using NS-2 simulator. This is done for 41 nodes in NS-2 simulation.

Keywords:
     LBA, Rainbow mechanism, RSA algorithm

References:

1.             Chiara Petrioli, Michele Nati,Paolo Casari,Michele Zorzi, and Stefano Basagni, “ALBA-R: Load-Balancing Geographic Routing Around Connectivity Holes in Wireless Sensor Networks”, IEEE TRANSACTIONS, VOL. 25, NO. 3, MARCH 2014.
2.             A LBA-R: Load balancing geographic routing in wireless sensor networks, S.Sujeet,  Mr. P.Karunakaran and Mr.C.Venkatesh International Journal of Scientific & Engineering Research,Volume 5, Issue 1, January -2014 1908 ISSN 2229 -5518

3.             An Efficient Location Based Routing for Mobile Adhoc Networks , ISSN(Online): 2320 - 9801ISSN (Print): 2320 -9798 International Journal of Innovative Research in Computer and C ommunication E ngineering S.Saranya , D.Gokilapriya , M.Maheswari

4.             Locating and bypassing holes in sensor networks INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies  (Volume:4 ) Date of Conference:7-11 March 2004

5.             Ad-hoc, Mobile, and Wireless Networks: 11th International Conference, ADHOC ...edited by Xiang-Yang Li, Symeon Papavassiliou, Stefan Ruehrup Xiang-Yang Li, ‎Symeon Papavassiliou, ‎Stefan Ruehrup - 2012

6.             A Survey of Localization in Wireless Sensor Network  Long Cheng,1 Chengdong Wu,1 Yunzhou Zhang,1 Hao Wu,2 Mengxin Li,3 and Carsten Maple4International Journal of Distributed Sensor Networks Volume 2012 (2012), Article ID 962523, 12 pages

7.             Geometric spanners for routing in mobile networks, jie gao , member, ieee, leonidas j. guibas, john hershberger, li zhang, and an zhu selected areas in communications, vol. 23, no. 1, january 2005

8.             RSA Cryptosystem using Object -Oriented Model ing Technique N. C. Ashioba , R. E. Yoro, Volume 4No. 2, February 2014ISSN 2223-4985 International Journal of Information and Communication Technology Research ©2014 ICT Journal. 


107-111

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

23.

Authors:

Najmus Sehar, Santosh Kushwaha, Yogesh Rai

Paper Title:

Face Recognition Method using Mean-Shift by Means of Region Merging

Abstract:        We projected a original method for face matching from face image database. In this technique we have used set of face images because recognition conclusion is based on comparisons of face image database. In this paper we have presented an approach to region based face matching. Here the mean shift low level image segmentation method is used to segment the image into many small regions. As a well-liked segmentation scheme for color image, watershed has over segmentation as compared to mean-shift and also mean-shift conserves edge information of the object very well. The proposed technique mechanically merges the regions that are initially segmented by mean shift segmentation, effectively takes out the object contour and then, matches the obtained mask with test database image sets on the basis of color and texture. Extensive research are performed and the outcome shows that the projected method can reliably figure out the mask from the face image and efficiently matches the mask with face image sets.

Keywords:
      Face Matching, Image segmentation, Region merging, Watershed, Mean shift

References:

1.              Bo Peng, Lei Zhang and David Zhang, Automatic Image Segmentation by Dynamic Region Merging, ,” IEEE Trans. On Image Processing., vol.20, no.12, pp. 679–698, DEC 2011
2.              F. Lecumberry, A. Pardo, and G. Sapiro, “Simultaneous object classifi- cation and segmentation with high-order multiple shape models,” IEEE Trans. Image Process., vol. 19, no. 3, pp. 625–635, Mar. 2010.

3.              J.Stawiaski and E. Decenciere, “Region Merging via Graph-cuts,” in Image Anal Stereol, 2008;27, pp. 39-45.

4.              J. Ning, L. Zhang, D. Zhang, and C.Wu, “Interactive image segmentation by maximal similarity based region merging,” Pattern Recognit., vol. 43, no. 2, pp. 445–456, Feb. 2010.

5.              F. Calderero and F. Marques, “General region merging approaches based on information theory statistical measures,” in Proc. 15th IEEE ICIP, 2008, pp. 3016
3019.

6.              K. Haris, S. N. Estradiadis, N. Maglaveras, and A. K. Katsaggelos, “Hybrid image segmentation using watersheds and fast region merging,” IEEE Trans. Image Process., vol. 7, no. 12, pp. 1684–1699, Dec. 1998

7.              P. V. G. D. Prasad Reddy, K. Srinivas Rao and S. Yarramalle, “Unsupervised Image Segmentation Method based on Finite Generalized Gaussian Distribution with EM and K-Means Algorithm,” Proceedings of International Journal of Computer Science and Network Security, vol.7, no. 4, pp. 317-321, April 2007.

8.              Z. Shi and V. Govindaraju, “Historical Handwritten Document Image Segmentation using Background Light Intensity Normalization,” SPIE Proceedings on Center of Excellence for Document Analysis and Recognition, Document Recognition and Retrieval, vol. 5676, pp. 167-174, January 2005.

9.              P. F. Felzenswalb and D. P. Huttenlocher, “Efficient Graph- Based Image Segmentation,” Proceedings of International Journal of Computer Vision, vol. 59, no. 2, pp. 167-181, 2004.

10.           Mavrinac, “Competitive Learning Techniques for Color Image Segmentation,” Proceedings of the Machine Learning and Computer Vision, vol. 88, no. 590, pp.
33-37, April 2007.

11.           Y. Li, J. Sun, C. Tang, H. Shum, Lazy snapping, SIGGRAPH 23 (2004) 303–308.

12.           E. Sharon, A. Brandt and R. Basri, “Fast Multi-Scale Image Segmentation,” Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 70-77, 2000

13.           L. O. Donnell, C. F. Westin, W. E. L. Grimson, J. R. Alzola, M. E. Shenton and R. Kikinis, “Phase-Based user Steered Image Segmentation,” Proceedings of the Fourth International Conference on Medical Image Computing and Computer-Assisted Intervention, pp. 1022-1030, 2001

14.           J. Malik, S. Belongie, J. Shi and T. Leung, “Textons, Contours and Regions: Cue Integration in Image Segmentation,” Proceedings of Seventh International Conference on Computer Vision, pp. 918-925, September 1999.

15.           J. Shi and J. Malik, “Normalized Cuts and Image Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 8, pp. 888-905, 2000.

16.           Hakan Cevikalp and Bill Triggs, “Face recognition based on Image Sets,”IEEE Conference on Computer Vision and Pattern Recognition, San Francisco : United States (2010)"

17.           P. F. Felzenszwalb and D. P. Huttenlocher, “Efficient graph-based image segmentation,” Int. J. Comput. Vis., vol. 59, no. 2, pp. 167–181, Sep. 2004.

18.           Costas Panagiotakis, Ilias Grinias, and Georgeios Tziritas “Natural Image Segmentaion Based on Tree Equipartition, Bayesian Flooding and Region Merging”, IEEE Transactions on Image Processing, Vol. 20, No. 8, August 2011.

19.           Lei Zhang and Qiang Ji, “A Bayesian Network Model for Automatic and Interactive Image Segmentation”, IEEE Transaction on Image Processing, VOL. 20, NO. 9, September 2011.

20.           S. Birchfield, Elliptical head tracking using intensity gradients and color histograms, in: Proceedings of  IEEE Conference on Computer Vision and Pattern Recognition, 1998, pp. 232-237.

21.           T.Ojala, M.Pietikainen, P.Maenpaa Multiresolution gray-scale and rotation invariant texture  classification with local binary patterns, IEEE  Transactionson Pattern Analysis and Machine  Intelligence, 2002, pp.971-987.

22.           M.J. Swain, D.H. Ballard, “Color indexing” ,International Journal of Computer Vision Vol. 7 No. 1,  2002, pp. 11-32.

23.           D. Comaniciu, V. Ramesh, P. Meer, “Kernel-based object tracking”, IEEE Transactions on Pattern  Analysis and Machine Intelligence, 2003, pp. 564-577.

24.           D. Martin, C. Fowlkes, D. Tal, and J. Malik, “A database of human segmented natural images and its application to evaluating segmentation algorithms and measuring ecological statistics,” in Proc. ICCV, 2001, pp. 416–423.

25.           Y. Cheng, “Mean shift, mode seeking, and clustering”, IEEE Transactions on Pattern Analysis and  Machine Intelligence, Vol. 17, No. 8, 1995, pp. 790–799.


112-118

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

24.

Authors:

M. Mansour

Paper Title:

Heat Transport Limitations and Overall Heat Transfer Coefficient for a Heat Pipe

Abstract:        The objective of the present work is to investigate the heat transport limitations and overall heat transfer coefficient for a Copper - Acetone heat at different vapor temperatures. A dimensional  analysis  has been  made  to  the overall heat transfer  coefficient in the heat  pipe, A new correlation for the overall heat transfer coefficient has been obtained . It has been  found  that  latent  heat  vaporization , the pipe diameter and Reynolds  number  are  the  parameter  affects  the overall  heat  transfer coefficient.  A computer program was used to calculate heat pipe limits theoretical and correlated overall heat transfer coefficients using the data of (6). The sonic, capillary, and entrainment limits are increased with increasing the vapor temperature but the boiling limit is decreased with the increasing of vapor temperature. The  correlated  function  that  relates  overall  heat  transfer  coefficient  and  vapor  temperature  is  very  close  to  the  theoretical  overall  heat transfer  coefficient

Keywords:
       objective, present, transport limitations, overall, correlation, coefficient, temperature, transfer

References:

1.              Chi, W. (1976) Heat pipe theory and practice. Hemisphere Publishing Corporation, New York. 
2.              Abed Alr zaq S. Alshqirate, Mohammad Tarawneh,Mahmoud Hammad, (Dimensional analysis and empirical correlations for heat transfer and pressure drop in condensation and evaporation processes of flow inside micropipes: case study with carbon dioxide (CO2), J. Braz. Soc. Mech. Sci. & Eng. vol.34 no.1 Rio de Janeiro Jan./Mar. 2012

3.              Baturkin, V. and Olefirenko, D., "Research on Axially Grooved Heat Pipe Heat Transfer Characteristics in Ground Tests," SAE Technical Paper 2001-01-2237, 2001,

4.              Vikas Kumar ,D.gangacharyulu, and Ram gopal talhgir, Heat Transfer Studies of a Heat Pipe, Heat Transfer Engineering Volume 28, Issue 11, 2007

5.              Hussain H. Ahmad, Heat Transfer Characteristics in a Heat Pipe UsingWater-Hydrocarbon Mixture as a Working Fluid,Al Rafidain,engineering , Vol.20,No.3,pp128-137.June 2012.

6.              M.Mansur ،Performance of Heat Pipe Utilized for Atomspheric Air Heating ،Journal of Applied Mathematics and Physics ,3,1015-1021,2015.

7.              Aloke Kumar Mozumder, Mohammed Shafiul Hasib Chowdhury, and Abul Fahad Akon, Characteristics of Heat Transfer for Heat Pipe and Its Correlation, ISRN Mechanical EngineeringVolume 2011 , Article ID 825073, 7 pages

119-123

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

25.

Authors:

Aswathy G P, Niyas K Haneefa

Paper Title:

A Survey on Methods of Parallel Concatenation of LDPC Codes

Abstract:  From the time of discovery of Turbo codes, parallel concatenation of codes has become one of the fieriest topics in code theory. In the recent years, there has been a remarkable advancement in LDPC codes and has seen them outshine turbo codes in terms of performance especially in the error floor and higher code rate. On the other hand, fully parallel LDPC decoder for longer block length suffers from prohibitive implementation complexity, due to the pervasive connectivity in the bipartite graph. Subsequently, in order to achieve better performance for longer codes with reduced decoding complexity, different methods for parallel concatenation of LDPC codes were introduced.  Parallel concatenation of LDPC codes provides the advantage of breaking an equivalently long and highly complex LDPC code into multiple small and less complex LDPC codes to distribute the encoding and decoding load. This could offer scalability and scope for improving the performance of LDPC codes in practical delay-sensitive and energy-aware applications. This paper gives an overview of different methods of parallel concatenation of LDPC codes.

Keywords:
 LDPC, Parallel concatenation, PCGC, Turbo codes.

References:

1.           R. Gallager, “Low-Density Parity-Check Codes,” IRE Transaction on Information Theory, vol. IT-8, pp. 21–28, Jan. 1962.
2.           D. J. C. MacKay and R. M. Neal, “Near Shannon limit performance of low density parity check codes”, Electronics Letters, vol.32, pp.1645-1646, 1996.

3.           H. Behairy and S. C. Chang, “Parallel Concatenated Gallager codes”, Electronics Letters, vol. 36, no. 24, pp. 2025 -2026, Nov. 2000.

4.           H. Behairy and S. C. Chang, “Parallel Concatenated Gallager Codes for CDMA Applications”, Proceedings of IEEE GLOBECOM’01, San Antonio, TX, pp. 1002-1006, 2001.

5.           H. Behairy and S. C. Chang, “Analysis and design of Parallel Concatenated Gallager Codes”, Electronics Letters, vol. 38, no. 18, pp. 1039- 1040, Aug. 2000.

6.           D. J. C. MacKay and R. M. Neal, “Near Shannon limit performance of low density parity check codes,” Electronics Letters (reprint with printing errors corrected), vol.33, pp.457-458, Mar.1997.

7.           Hatim M. Behairy and Mohammed Benaissa, “Multiple Parallel Concatenated Gallager Codes: Code Design and Decoding Techniques”, IETE Journal of Research, vol: 59, issue: 6, page no: 659-664, Nov-Dec 2013.

8.           H. M. Behairy, “Dual Mode PCGCs for Advanced Wireless Communications Networks”, Proceedings of IEEE International Design and Test Workshop, IDT 2007, Cairo, Egypt, Dec. 2007.

9.           P. C. Catherine and K. M. S. Soyjaudah, “Parallel Concatenation of LDPC codes with Two Sets of Source Bits”, IEEE Proceedings of International Conference on Emerging Trends in Engineering & Technology, page no: 112-115, 2011.

10.        J. C. Serrato and T. O’Farrell, “Parallel Concatenated Gallager Codes using Euclidean and Projective Geometry LDPC Codes”, The Annual London Conference on communications (LCS 2004), University College London, UK, September 2004.

11.        J. C. Serrato and O’Farrell, “Structured Parallel Concatenated LDPC codes”, The Annual London Conference on communications (LCS 2006), University College London, UK, September 2006.

12.        R. Pravin Kumar and Rakhesh Singh Kshetrimayum, “An Efficient Methodology for Parallel Concatenation of LDPC codes with reduced complexity and decoding delay”, IEEE Proceedings of the National Conference on Communications (NCC), page no: 1-5, February 2013.

13.        D. J. C. MacKay, “Good error-correcting codes based on very sparse matrices,” IEEE Transaction on Information Theory, vol. 45, no. 2, pp. 399–431, Mar. 1999.

14.        R. Pravin Kumar, “Parallel Concatenation of LDPC codes and its applications”, M. Tech. thesis, Department of Electronics and Electrical Engineering, IIT Guwahati, India, April 2013.


124-129

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

26.

Authors:

Uthra Devi. S, Sahana. K, T.V. Narmadha

Paper Title:

Stability Analysis of Multiple Input Multiple Output System Using Sliding Mode Controller

Abstract:   This paper depicts the design and implementation of nonlinear control approach called sliding mode control for Multiple Input Multiple Output (MIMO) system. In order to provide a good regulation of output in this system it is mandatory to make them operate in the closed loop mode using conventional controllers such as P, PI and PID controller. But the use of conventional controllers have failed to provide the desired regulation of output voltage under large variation of system parameters. Due to these disadvantages of conventional controllers a nonlinear controller called sliding mode controller (SMC) is proposed here. Sliding mode controller is used to regulate the system against disturbances. Sliding mode controllers is designed for Induction motor having Multiple Input Multiple Output (MIMO) system. The design of the controller is done with an aim to regulate the output against disturbances. The main advantage of SMC over the non conventional control is its stability and good response variations with respect to the input.

Keywords:
 Induction motor, DC motor, Sliding mode control, output regulation

References:

1.             Zheng Zhang, Huangsheng Xu, Longya Xu and Layne E. Heilman, “Sensorless Direct Field-Oriented Control of Three-Phase Induction Motors based on Sliding Mode”, IEEE Transactions on Industrial Applications, Vol.42, pp.694-702,No.3,May/June 2006.
2.             R.SaravanaKumar, K.VinothKumar and Dr.K.K.Ray, “Sliding Mode Control of Induction Motor using Simulation Approach”, IJCSNS International Journal of Computer Science and Network Security, Vol.9, pp.93-105, No.10, October 2009.

3.             Nazanin Afrasiabi and Mohammadreza Hairi Yazdi , “Sliding Mode Controller for DC Motor Speed Control” Global Journal of Science, Engineering and Technology, Issue 11, 2013, pp. 45-50.

4.             Abdelkrim Benchaib,  Ahmed Rachid, , Eric Audrezet, and Mohamed Tadjine, “Real-Time Sliding-Mode Observer  and Contol Of an Induction motor”  IEEE transactions on Industrial Electronics, Vol.46 , pp.128-139, No.1 ,February 1999.

5.             Miran Rodi.C,and Karel Jezernik, “Speed-Sensorless Sliding-Mode Torque Control of an Induction Motor” IEEE Transactions on Industrial Electronics, Vol.49, pp.87-95, No.1, February 2002.

6.             C. M. Kwan, F. L. Lewis, and K. S. Yeung, “Robust adaptive control of induction motors without flux measurements,” in Proc. IEEE ACC, Seattle, WA, 1995, pp.
3515–3520.

7.             W. Leonhard, Control of Electrical Drives, 2nd ed. Berlin, Germany: Springer-Verlag, 1990.

8.             R. Marino, S. Peresada, and P. Vagili, “Adaptive input-output linearizing control of induction motors,” IEEE Trans. Automat. Contr., vol. 38, pp.208–221, Feb. 1993.

9.             R. Ortega, C. Canudas, and S. Seleme, “Nonlinear control of induction motor: Torque tracking with unknown load disturbance,” IEEE Trans.Automat. Contr., vol. 38, pp. 1675–1679, Nov. 1993.

10.          I. Utkin, “Sliding mode control design principles and applications to electric drives,” IEEE Trans. Ind. Electron., vol. 40, pp. 23–36, Feb.1993.


130-135

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

27.

Authors:

Vaishali Chaudhari

Paper Title:

Smart Clearance System

Abstract:    The manual clearance system is one of the tedious process because this takes lot of time.one reason of this happen is because this task involves the manual work and there is no special technology involved in automating the job. Involvement of manual work calls lots of irregularities. In this we propose the concept of replacing manual job or work in manual process by smart clearance system at workspace. This smart clearance system replaces the conventional process by smart card. In addition password authentication is placed in the machine in order to check correct user access. If the user is correct user, the next process takes place. A soon as the input is given, the dues for the particular person are detected and deducted from the account setting up at the time of admission of that person in the particular institution or college. The embedded controller is preprogrammed in a such a way to perform the similar operations. In this smart clearance system, GSM module is used which further sends the details about the transactions on the registered mobile number linked with the system in the form of text message. Hence it is easy as well as the reliable system. In this system the document verification also takes place which frees student to carry the files regarding the documents. .

Keywords:
    Academic Requirement, Administrator module, Clearance

References:

1.             Embedded C Programming and the Atmel AVR ” By Barnett.Cox and O,Cull
2.             About AT mega 16  from www.atmel.com

3.             Carelin Felix and I. Jacob Raglend, "Home Automation Using GSM", Proceedings of 2011 International Conference on Signal Processing,Communication, Computing and Networking Technologies, pp. 15-19, 2011.

4.             Pravada P. Wankhade1 and Prof. S. O. Dahad2, "Real Time Vehicle locking and Tracking System using GSM and GPS Technology-An Anti-theft System", International Journal of Technology and Engineering System (IJTES): Jan –March 2011- Vol. 2. No. 3.

5.             Mazidi, Muhammad Ali, the 8051 Microcontroller and Embedded Systems, Second Edition, Prentice Hall, 2007.

6.             http://www.atmel.com/avr.

7.             http://eforengineers.blogspot.in/2012/12/lcd-interfacing-with-8051-in-8-bit-mode.h

8.             Principles and applications of GSM by Vijay Kumar Garg, Joseph E. Wilkes , Prentice Hall PTR,1999

9.             Wireless communications, principle and practice, second edition by Theodore S. Rappaport.

10.          Programming and customizing the microcontroller AVR, of McGraw-hill 18-sep-2000, By Dhananjay V. Gadre.


136-138

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

28.

Authors:

Georgewill M. Onengiye, Ezeofor J. Chukwunazo

Paper Title:

Design and Implementation of RF based Wireless Remote Control Generator SystemDesign and Implementation of RF based Wireless Remote Control Generator System

Abstract:     this paper presents the design and implementation of RF based wireless remote control generator system that can be interfaced with automatic changeover. We noticed that generator system is designed to be powered ON by pressing a button or turning a key or drawing the rope tiled on its body. The generators are kept on the back corridor or outside of the house due to the noise they generate. The owners usually walk a distance where they are kept to switch ON or switch OFF the generator system. This has been a stressful process to the generator owners whenever the service of the generator is needed. This work is designed to bridge the gap (or distance) between the generator and the owner. The owner can remotely switch ON or switch OFF the generator kept at hundred (100) meter distance around his or her building which operates with a radio frequency of 435MHz.The remote controlled generator involves a transmitter unit which sends a wireless signal through an antenna and this signal is received by the reception unit. This signal is further processed by the controller unit and the processed signal is sent to relay which acts as a switch to trigger the generator ON or OFF. This work is tested with accuracy and finally interfaced with the automatic changeover.

Keywords:
     wireless remote, Arduino Uno, Generator system, radio frequency

References:

1.              Fang Yao; Xin Lu, “ZigBee based Home Automation system”, Consumer Electronics, IEEE Transaction on May 2009.
2.              Gynanendra K Verma, Pawan Tripathi, IIIT Allahabad a paper on “A digital security system with door lock system using rfid technology”

3.              K.Srinivasa Ravi, G.H.Varun, T.Vamsi, P.Pratyusha “RFID Based Security System”

4.              Muhammad Naveed, Wasim Habib, Usman Masud, Ubaid Ullah, and Gulzar Ahmad,” Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment”,   International Journal of Network Security, Vol.14, No.3, PP. 173{179, May 2012

5.              Oke, A.O., O.M. Olaniyi, O.T. Arulogun, and    O.M.  Olaniyan. 2009. “Development of a Microcontroller-   Controlled switching System”. Pacific Journal of Science and Technology. 10(2):398-403.

6.              Parvety A,Venkata Rohit Raj,Venumadhav Reddy M, Manikanta Chaitanya G “RFID based exam hall maintenance system,” IJCA Special Issue on “Artificial Intelligence Techniques - Novel Approaches & Practical Applications “AIT, 2011

7.              Pik-Yiu Chan, Enderle J. D.,” Automatic door openr”, Bioengineering conference 2000 proceeding of IEEE 26th Annual Northeast 2000. Gill K. Shuang-Hua Yang;

8.              Salim G Shaikh and Shankar D Nawale.,”Secure access of RF system”, International Journal of Scientific & Engineering Research, Volume 3, Issue 8, August-2012.

9.              Stephen a. Weis, Sanjay E.Sarma, Ronald.L.Rivest a paper on “Security and privacy aspects of low cost radio frequency identification systems”

10.           Verma, G. K.; Tripathi, P., “A Digital Security System with Door Lock System Using RF communication Technology”, International Journal of Computer Applications (0975 – 8887), 2010, Vol5, pp 6-8.

11.           Yong Tae Park, Sthapit, P.;Jae-Yong Pyun, ,” Smart digital door lock for the home automation”, TENCON 2009-2009 IEEE Region 10 Conference Jan 2009.


139-143

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

29.

Authors:

Rushinesh Bagal, Kaushik Deshpande, Digvijay Yadav

Paper Title:

Hydrogen Fuel Cell in Automobile

Abstract:      one of the most dynamic fields which have been developing rapidly with time is automobile. It has been observed that even today after so much of advancement automobile makers are striving hard to make it a perfect machine in every aspect, enabling it to face any problems that would come up in future, and one such biggest problem is the depletion of fossil fuels which forces us to look for alternate and equally efficient fuels. This paper is based on a study done in this direction. Hydrogen is not an energy source, it is an energy carrier. It can store and deliver energy but still, must be produced from compounds that contain it. Hydrogen can be produced using diverse, domestic resources including fossil fuels, such as coal (with carbon sequestration) and natural gas; nuclear; and biomass("Hydrogen Production.")  Hydrogen fuel cells convert the energy in hydrogen to electricity. They are much more efficient at converting the energy source than other methods. Hydrogen fuel cell vehicles use electric motors and are much more energy efficient. They use 40-60 percent of the fuel’s energy. This would correspond to more than a 50% reduction in fuel consumption when compared to a conventional vehicle with an internal combustion engine. Fuel cells are also much quieter, have fewer moving parts, and are well suited to a variety of applications. This paper is based on “HYDROGEN FUEL CELL”.A Fuel Cell is an electrochemical device that combines hydrogen and oxygen to produce electricity, with heat as its by-product. Firstly we understand the main concept of fuel cell. Then working, the need for having an alternate fuel. Next we see how the fuel technology can be used. Then we see the advantages of the fuel cells by understanding their detailed composition and functioning. Then the efficiency of fuel cell. And then challenges to fuel cell..

Keywords:
Energy, Fuel cell, Hyrogen application, Environmental benefits, Environment, Sustainable development

References:

1.        EIA (Energy Information Administration). (2005). Official energy statistics from the U.S. Government. Via http://tonto.eia.doe.gov/steo_query/app/pricepage.htm.
2.        Conte, M., Iacobazzi, A., Ronchetti, M., Vellone, R "Hydrogen economy for a sustainable development: state-ofthe-art and technological perspectives". Journal of Power,Sources, Vol.100, 001, 171-187.

3.        Hopwood, B. Mellor, M. and O’Brien, G. "Sustainable development: mapping different approaches". Sustainable Development, Vol. 13, 2005, 38–52.

4.        Jordan Journal of Mechanical and Industrial Engineering,   Hydrogen and Fuel Cell Technologies for Sustainable Future, Ibrahim Dincer, Faculty of Engineering & Applied Science, University of Ontario Institute of Technology, North Oshawa, Canada. Volume 2, Number 1, Mar. 2008, ISSN 1995-6665.

5.        AE (Automotive Engineering). (1996). “Life cycle analysis: getting the total picture on vehicle engineering alternatives”,March 1996, 49-52.

6.        www.fuelcelltoday.com/history

7.        www.altenergy.org/renewables/fuel_cells_history.html

8.        Book- Hydrogen and Fuel cells (second edition)

9.        Wikipedia (Diagram)


144-146

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

30.

Authors:

Anurekha Mukherjee, Sohini Mondal

Paper Title:

Analysis and Study of V-I Characteristics by Replacing Low-K Dielectric (HfO2) with High-K Dielectric (La2O3) in MOSFET

Abstract:      This project journal paper presents the analysis and study of Lanthanum oxide La2O3, one of the promising high-k dielectric films used in the MOSFET over hafnium dioxide, HfO2. Capacitance-Voltage measurements were carried out to investigate properties such as oxide charges and interface trap charges that exist in the dielectric La2O3 , an inorganic compound containing the rare earth element lanthanum and oxygen . The investigation has been carried out by experiment and modeling. With the advent of semiconductor technology in VLSI era, the channel length of a metal oxide semiconductor has drastically gone down. DIBL (Drain Induced Barrier Lowering) is one of the short channel effects which degrade the performance of a MOSFET with its down scaling. To understand this effect the study of the nature of surface potential and energy is very important. In this project an analytical model for threshold voltage of short channel MOSFETs is presented. For such devices, the depletion regions due to source/ drain junctions occupy a large portion of the channel, and hence are very important for accurate modeling. The proposed threshold voltage model is based on a realistic physically – based model for the depletion layer depth along the channel that takes into account its variation due to the source and drain junctions .With this, the unrealistic assumption of a constant depletion layer depth has been removed , resulting in an accurate prediction of the threshold voltage. The graphs between different parameters of HfO2 and La2O3 are verified against the simulator MATLAB and the comparative analysis of the features of the graph of both the oxides has been done

Keywords:
  Channel Length, DIBL, Pocket doping, Threshold Voltage

References:

1.                G. D. Wilk, R. M. Wallace, and J. M. Anthony, J. Appl. Phys. 89, 5243 2001.
2.                J. Robertson, Rep. Prog. Phys. 69, 327 2006.

3.                D.-Y. Cho, T. J. Park, K. D. Na, J. H. Kim, and C. S. Hwang, Phys. Rev. B 78, 132102 2008.

4.                N. D. Afify, G. Dalba, U. M. K. Koppolu, C. Armellini, Y. Jestin, and F. Rocca, Mater. Sci. Semicond. Process. 9, 1043 2006.
5.                N. D. Afify, G. Dalba, and F. Rocca, J. Phys. D: Appl. Phys. 42, 115416 2009
6.                D. A. Neumayer and E. Cartier, J. Appl. Phys. 90, 1801 2001

7.                J. Morais, L. Miotti, K. P. Bastos, S. R. Teixeira, I. J. R. Baumvol, A. L. P. Rotondaro, J. J. Chambers, M. R. Visokay, L. Colombo, and M. C. Martins Alves, Appl. Phys. Lett. 86, 212906 2005

8.                L. Armelao, D. Bleiner, V. Di Noto, S. Gross, C. Sada, U. Schubert, E. Tondello, H. Vonmont, and A. Zattin, Appl. Surf. Sci. 249,  2772005

9.                M. Grilli, F. Menchini, A. Piegari, D. Alderighi, G. Toci, and M. Vannini, Thin Solid Films 517, 17312009

10.             S. M. Edlou, A. Smajkiewicz, and G. A. Al-Jumaily, Appl. Opt. 32, 5601 1993

11.             R. B. Tokas, N. K. Sahoo, S. Thakur, and N. M. Kamble, Curr.Appl. Phys. 8, 5892008

12.             AJAY KUMAR SINGH “An Analytical Model of Short Channel Effects  in Sub-Micron MOS Devices” 

13.             Ritesh Gupta, Mridula Gupta, R.S. Gupta” Generalized guide for  MOSFET  miniaturization ”. 

14.             K.N Ratnakumar and J.D Meindl“Short channel MOSFET threshold voltage model”. 

15.             J.D.Marshall“Performance limits of silicon  enhancement/depletion MOSFET integrated circuit”, Stanford University, CA,Tech pp 46-47. 

16.             .Xing Zhou, Khee Yong Lim - “A general approach to compact threshold Voltage formulation based on 2-D numerical simulation and experimental correlation for  deep. sub-micron VLSI technology development”   

17.             Vivek K. De and James D. Meindl” An analytical  Threshold voltage and sub-threshold  current model for short channel MOSFET ”.

18.             Kai Chen and Chenming Hu - “Performance and Vdd scaling in deep sub micrometer CMOS”

19.             Resve Saleh, Michael Benoit and Pete Mc Crorie - “Power distribution planning”   

20.             Sung-Mo, Yusuf – “CMOS digital integrated circuits”  

21.             Haldun H. – “Digital microelectronics”

22.             Sani R. Nassif – “Design for Variability in DSM Technologies”

23.             Lim, Zhou, Zu, Ho, Loiko, Lau, Tse, Choo – “A predictive semi-analytical  threshold voltage model for deep-submicron MOSFET’s”

24.             Weste, Eshraghian – “Principles of CMOS VLSI Design”

25.             Websites: Wikipedia.org, http://ieeexplore.ieee.org/


147-157

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

31.

Authors:

Gaurav Kumar, E. Yazhini, Pankaj Agarwal

Paper Title:

Voice Customizable Text-To-Speech Conversion System for Dumb

Abstract:   The text-to-speech conversion system is a useful interface for the speechless who wants to communicate effectively in public places and official areas. This system uses the MATLAB software, wherein the text entered is converted into its corresponding speech signal using a graphical user interface development environment. A text database is created and a set of corresponding signals are recorded, both of which are interfaced to the MATLAB code. The speech signal undergoes framing and de-framing in order to convert a non-stationary signal into a stationary one. This is necessary because any signal processing tool takes into assumption that the signal it receives would be stationary in nature.  The MATLAB platform has been used to reduce the cost of this system.

Keywords:
   text-to-speech, MATLAB code, corresponding signals, recorded, signal processing.

References:

1.           Yan-You Chen, Yu-Wei Bai1, Chun-Yu Tsai, Jhing-Fa Wang, Bo-Wei Che,  IEEE Digital Library
2.           Fredrik Berglund, Hans Jahanesson, Goran Gustafsson, Chalmers University of Technology, Goteborg  Sweden, Multidisciplinary project based product development.

3.           Helenca Duxans I Barrobes, Dr. Antonio Bonafonte Cavez, Universitat Politechnica, Voice Conversion applied to text-to-speech systems.

4.           K. Sreenivasa Rao, B. Yegnanarayana, IIT Guwahati, Voice Conversion and voice tract modification.


158-160

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

32.

Authors:

Mina Safwat Garas, Hassan El-Kamchouchi, Tawfik Namour

Paper Title:

Analysis and Design of Micro-Electromechanical Sensors

Abstract:    In developing Micro Electro Mechanical Systems (MEMS), using the MATLAB software , many modeling tasks in MEMS can be implemented easily. Additionally, their performance can also be determined so that it satisfies the needs of various fields. With this kind of approach, the performance of the devices can be easily expanded, as well as reducing the time and cost of MEMS production. This paper focuses on the modeling of silicon MEMS accelerometer in an attempt to design a surface micro-machined accelerometer that satisfies certain pre-determined specifications.

Keywords:
    component; Acceleration, Accelerometer, Design, Displacement, MEMS, Modeling, Velocity

References:

1.             B. S. Sreeja and S. Radha, “Design and implementation of MEMS based differential voltage controlled oscillator”, In Proceedings of EIT'2009, Windsor, Canada, 2009, pp.202-206.
2.             N. Yazdi, F. Ayazi, and K. Najafi, “Micromachined inertial sensors”, in IEEE Proceedings, vol 86, no 8, 1998, pp. 1640 1659.

3.             Electronics Engineer's Reference Book edited by F. F. Mazda.

4.             K. H. Denishev, and M. R. Petrova, “Accelerometer design”, In Proceedings of ELECTRONICS’2007, 2007, pp. 159-164.

5.             " Using Accelerometer in a data Acquisition System "by Bob Judd united electronic industries www.endevco.com, www.pcb.com and www.sensormag.com .

6.             The Measurement, Instrumentation, and Sensors: Handbook By John G. Webster.

7.             Wiley Survey of Instrumentation and Measurement By Stephen A. Dyer.


161-165

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

33.

Authors:

Shifali M Patil

Paper Title:

Image Fusion using Wavelet Transform

Abstract:     Image fusion is the process of extracting meaningful visual information from two or more images and combining them to form one fused image. Image fusion is important within many different image processing fields from remote sensing to medical applications. Previously, real valued wavelet transforms have been used for image fusion. Although this technique has provided improvements over more naive methods, this transform suffers from the shift variance and lack of directionality associated with its wavelet bases. These problems have been overcome by the use of a reversible and discrete complex wavelet transform (the Dual Tree Complex Wavelet Transform DT-CWT). However, the existing structure of this complex wavelet decomposition enforces a very strict choice of filters in order to achieve a necessary quarter shift in coefficient output. The proposed work introduces an alternative structure to the DTCWT that is more flexible in its potential choice of filters and can be implemented by the combination of four normally structured wavelet transforms. The use of these more common wavelet transforms enables this method to make use of existing optimized wavelet decomposition and recomposition methods, code and filter choice.

Keywords:
  Image fusion, wavelet transform, fused mages, wavelet based fusion, multi-resolution.

References:

1.                H. Li, B.S. Manjunath, S.K. Mitra, Multisensor image fusion using the wavelet transform, GMIP: Graphical Models Image Process. 57 (3) (1995) 235-245.
2.                P.J. Burt and R.J. Kolczynski, Enhanced image capture through fusion, Proceedings of the 4th International Conference on Computer Vision, pages 173–182, 1993.

3.                Zhu Shu-long, Image Fusion Using Wavelet Transform, Symposium on Geospatial Theory, Process and Applications, Ottawa 2002.

4.                Paul Hill, Nishan Canagarajah and Dave Bull, Image Fusion using Complex Wavelets, BVMC 2002.

5.                L.G. Brown, A survey of image registration, ACM

6.                Computer Survey 24 (1992) 325-376.

7.                S. Banerjee, D.P. Mukherjee, D. Dutta Majumdar, Point landmarks for the registration of CT and MR images, Pattern Recognition Lett. 16 (1995) 1033-1042.

8.                Colligon, D. Vandermeulen, P. Seutens, G. Marchal, Registration of 3D multimodality medical imaging using surfaces and point landmarks, Pattern Recognition
Lett. 15 (1994) 461-467

9.                D.M. Mount, N.S. Netanyahu, J.L. Moigne, Efficient algorithms for robust feature matching, Pattern Recognition 32 (1999) 17-38.

10.             A.A. Goshtasby, J.L. Moigne, Image registration Guest Editor's introduction, Pattern Recognition 32 (1999) 1-2.

11.             Stephane G. Mallat, A Theory for Multi-resolution Signal Decomposition: The Wavelet Representation, IEEE Transaction on Pattern Analysis andd Machine Intelligence. Vol. II No. 7, July 1989,pages 671-693

12.             R C Gonzalez, Richard E Woods, Digital Image Processing, Second Edition, Prentice Hall Publication, 2002.

13.             V.P.S. Naidu and J.R. Raol, “Pixel-level Image Fusion using Wavelets and Principal Component Analysis”, Defence Science Journal, Vol. 58, No. 3, May 2008, pp. 338-352. 

14.             Sruthy, S.; Parameswaran, L.; Sasi, A.P., "Image fusion technique using DT-CWT", Automation, Computing, Communication, Control and Compressed Sensing,
2013 International Multi-Conference on , vol., no., pp.160,164, 22-23 March 2013.

15.             “Dipalee gupta” “Siddharth Choubey” “ Descret wavelet transform for image processing” ISSN-2250-2459, vol.4, march 2015 .

16.             Jiang Tao, Ji Dabin, Han Jinfang “Comparison Study of Different Fusion Methods Based on Remote Sensing Image”, 3rd International Congress on Image and Signal Processing, ©2010 IEEE.

17.             “Shaik Mahammed waseem” “ Analysis of multi focus gray scale image fusion using wavelets” IJRT,ISSN-2319-1163, pISSN-2321-7308. 

166-169

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

34.

Authors:

Suhas S, Gayatri Malhotra, Rajini V.H

Paper Title:

Comparison of Hsclone and Roulette Genetic Algorithms on the Application of Combinational Circuits

Abstract:      Future planetary and deep space exploration require robust methods of operation to operate spacecraft in the outer atmosphere without any variations or faults. The best fault tolerant method which can be used for operations of this kind is the class of Genetic Algorithms (GA) which are a sort of evolutionary algorithm. In this domain of operation, a combinational circuit is designed by the method of Cartesian Genetic Programming (CGP). The Circuit after the design is fed to the two GAs, namely, HsClone and Roulette. The main advantage in this use of GA is the likely determination of the best possible circuit within the space of a thousand circuits. The combinational circuit design is applied to both the algorithms and tested for fitness. After the required fitness is obtained, both the algorithms are compared with respect to their cumulative generational fitness and other allied aspects. The better algorithm will hence be determined to integrate it into the future design of spacecraft hardware. This is expected to help the spacecraft recover from Single Event Upsets (SEU) which usually occur due to hostile temperature conditions and outer atmospheric radiation.

Keywords:
Cartesian Genetic Programming (CGP), GeneticAlgorithm (GA), Evolvable Hardware (EHW), Reconfigurable FPGA, Evolutionary Algorithm (EA)

References:

1.                D B Verneker. Gayatri Malhotra, V Colaco “Reconfigurable FPGA using Genetic Algorithm” International Conference and Workshop on emerging Technology (ICWET 2010).
2.                Vedavati A, Meena K.V, Gayatri Malhotra “VHDL Implementation of Genetic Algorithm for 2 bit adder” International conference on Electronics and communication engineering, 20th May 2012, Bangalore, ISBN: 978-93-81693-29-2.

3.                L Sekania, Stepan Friedl “An Evolvable Combinational unit for FPGAs Draft”. Computing Informatics, Vol. 23, 2004, 461-486, 2005-July-7.

4.                Zhenhuan Zhu, David Mulvaney, and Vassilios Chouliaras, “A NovelGenetic Algorithm Designed for Hardware Implementation”, World Academy of Science, Engineering and Technology International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering Vol: 1, No: 12, 2007

5.                Lukas Sekanina and Stepan Friedl, “An Evolvable combinational Unit for FPGAs”, Computing and Information, Vol.23, 2004, 461-486, V2005- Jul7.

6.                Julian. F. Miller and P. Thomson, “Cartesian genetic programming, inGenetic Programming”, Proceedings of EuroGP 2000. Springer-Verlag, 2000, pp. 121,132.

7.                M. Oltean, C.Grosan, “Evolving digital circuits using Multiexpression programming”, Proceedings of the 2004 NASA/DoD Conference on Evolvable Hardware, 24-26 June 2004, pages: 87-94

8.                H. Mostafa, A. Khadragi, Y. Hanafi, “Hardware implementation of

9.                Genetic Algorithm on FPGA”. Zdenek Vasicek and Lukas Sekanina, “An evolvable hardware system in Xilinx Virtex II Pro FPGA”, Int. J. Innovative Computing and Application, Vol. 1, No. 1, 2007”

10.             R.S.Zebulum, A.Stoica, D.Keymeulen, M.I. Ferguson, A. Thakoor, “Evolvable, Reconfigurable Hardware For Future Space Systems”, Jet Propulsion Laboratory, California Institute of Technology. K. Chong, I. Aris, S.M.Bashi, “Application of Evolutionary Algorithm in NOptimizing Digital Structure Design”, AIML Journal, Vol. 6, December 2006.

11.             K. Chong, I. Aris, “Digital Circuit Structire design via Evolutionary
12.             Algorithm Method”. Sharawi, M.S., Quinlan, J. and Abdel-Aty-Zohdy, H.S., “A hardware implementation of genetic algorithms for measurement characterization”,
13.             IEEE 9th International Conference of Electronics, Circuits, and Systems, Dubrovnik, Croatia, 3, 2002, pp.1267-1270


170-175

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

35.

Authors:

M A Khamis, K Ennser

Paper Title:

Model for a Thulium-Doped Silica Fiber Amplifier Pumped at 1558 nm and 793 nm

Abstract:   This paper investigates the static behavior of Thulium-doped fiber amplifier (TDFA) operating around 2 µm at two different pump wavelengths. The developed model provides the influences of the amplified spontaneous emission (ASE) noise, the wavelength and the power of the seed, the thulium-doped fiber length and the pumping power into the TDFA. Simulation results show that the amplifier with pump at 1558 nm is more efficient than one with pump at 793 nm with core pumped low concentration thulium-doped silica fiber. Our findings reveal that a larger amplified signal can be achieved by increasing the pump power and the thulium-doped fiber length. In case of in-band pumping, the maximum gain reaches up to 34.4 dB with a 2 W pump power when a -10 dBm seed wavelength at 1900 nm is used. In contrast to indirect pumping, only 30 dB maximum gain is achieved under the same conditions. Also, it is important to take into account the selection of the seed wavelength in the TDFA design because high amplification can be produced when the selection seed wavelength is near the center of the emission cross-section curve

Keywords:
  Amplified spontaneous emission, cross-relaxation process, silica glass material, Thulium-doped fiber amplifier.

References:

1.             K. Thyagarajan and A. Ghatak ‘Lasers: Fundamentals and Applications’ Springer, USA, 2010.
2.             S. W. Henderson, P. J. M. Suni, C. P. Hale, S. M. Hannon, J. R. Magee, D. L. Bruns, and E. H. Yuen, “Coherent laser radar at 2 μm using solid state lasers,”IEEE Trans. Geosci. Remote Sens. Vol. 31, no. 1, pp. 4–15, 1993.

3.             N. M. Fried, “Thulium fiber laser lithotripsy: An in vitro analysis of stone fragmentation using modulated 110-Watt thulium fiber laser at 1.94 μm,” Lasers Surg. Med. Vol. 37, no. 1, pp. 53–58, 2005.

4.             G. J. Koch, J. Y. Beyon, B. W. Barnes, M. Petro, J. Yu, F. Amzajerdian, M. J. Kavaya, and U. N. Singh, “High-energy 2 μm Doppler lidar for wind measurements,” Opt. Eng. , vol. 46, no. 11, pp. 116201–116214, 2007.

5.             T. Bleuel, M. Brockhaus, J. Koeth, J. Hofmann, R. Werner and A.Forchel, “single-mode DFB lasers for gas sensing in the 2-μm wavelength range,” Proc. SPIE 3858, Advanced Materials and Optical Systems for Chemical and Biological Detection, 119 , December 15, 1999.

6.             G. Bouwmans, F. Luan, J. C. Knight, P. St. J. Russell, L. Farr, B. J. Mangan, and H. Sabert, ”properties of a hollow-core photonic band-gap fiber at 850 nm wavelength,” Opt. Express, vol. 11, no. 14, pp. 1613-1620, 2003.

7.             N. Mac Suibhne, Z. Li, B. Baeuerle and J. Zhao, "WDM Transmission at 2μm over Low-Loss Hollow Core Photonic Band-gap Fiber," in Optical Fiber Communication Conference/National Fiber Optic Engineers Conference 2013, OSA Technical Digest (online) (OSA, 2013), paper OW1I.6.

8.             Z. Li, S. U. Alam, J. M. O. Daniel, P. C. Shardlow, D. Jain, N. Simakov, A. M. Heidt, Y. Jung, J. K. Sahu, W. A. Clarkson and D. J. Richardson, “90 nm Gain Extension Towards 1.7 µm for Diode-Pumped Silica-Based Thulium-doped Fiber Amplifiers,“ in (2014). Paper Tu.3.4.2.

9.             Z. Liu, Z. Li and Y. Chen., “52.6Gbit/s Single-Channel Directly-Modulated Optical Transmitter for 2µm Spectral Region,” Optical fiber communication conference, (2015), paper Th1E.6.

10.          Y. Wang; H. Po, "Dynamic characteristics of double-clad fiber amplifiers for high-power pulse amplification," J. of Lightwave Technology, vol. 21, no. 10, pp. 2262-2270, 2003.

11.          J. E. Crahay, P. Megret, P. Froidure, J. C.  Lamquin, and M. Blondel , "Analysis of numerical methods efficiency for EDFA modeling," in Electrotechnical Conference, 1994. Proceedings., 7th Mediterranean 1, pp. 12-14, 1994.

12.          S. D. Jackson and T. A. King, "Theoretical modeling of Tm-doped silica fiber lasers," J. of Lightwave Technology 17(5), 948-956 (1999).

13.          Y. L. Tang and J. Q. Xu, “Effects of excited-state absorption on self pulsing in Tm3+-doped fiber lasers,” J. Opt. Soc. Am., vol.  27, no.2, pp. 179–186, 2010.

14.          F. Wang, D. Shen, H. Chen, D. Fan, and Q. Lu, "Modeling and optimization of stable gain-switched Tm-doped fiber lasers," Optical Review, vol. 18, no. 4, pp. 360-364,  2011.

15.          M. Gorjan, T. North, and M. Rochette, "Model of the amplified spontaneous emission generation in thulium-doped silica fibers," J. Opt. Soc. Am. B, vol. 29, no.10, pp. 2886-2890, 2012.

16.          Z. Y. Hu, P. Yan, Q. Liu, E. C. Ji, Q. R. Xiao, and M. L. Gong, “High-power single-stage thulium-doped superfluorescent fiber source,” Appl. Phys. B, vol. 118, no. 1, pp. 1–7,  2014.

17.          G. Yu, J. Chang, Q. Wang, X. Zhang, Z. Liu, and Q. Huang, “A theoretical model of thulium-doped silica fiber’s ASE in the 1900 nm waveband,” Optoelectron.
Lett., vol.  6, no. 1, pp. 45–47, 2010.

18.          Z.-Y. Hu, P. Yan, Q.-R. Xiao, Q. Liu, and M.-L. Gong, “227-W output all-fiberized Tm-doped fiber laser at 1908 nm,” Chinese Phys. B, vol.  23, no. 10, pp. 104206, 2014.

19.          J. Xu, M. Prabhu, J. Lu, K. Ueda, and D. Xing, “Efficient double-clad thulium-doped fiber laser with a ring cavity,” Appl. Opt., vol. 40, no. 12, pp. 1983–1988, 2001.

20.          S. D. Jackson, “The spectroscopic and energy transfer characteristics of the rare earth ions used for silicate glass fibre lasers operating in the shortwave infrared,” Laser Photon. Rev., vol.  3, no.  5, pp. 466–482, 2009.

21.          S.D. Emami, S. W. Harun, H.A.A. Rashid and H. Ahmad, ”Thulium-Doped Fiber Amplifier, Numerical and Experimental Approach,” Nova Science Puplishers, Inc., pp. 15-60, 2011.


176-180

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

36.

Authors:

Arya S P, Aparna P R

Paper Title:

Markerpixel using Watershed Transformation

Abstract:    We  describe a  new  method  for  the  generation of  superpixels which  can  be  implemented  using  watershed  transformation.  Our  method  aims  at  the  extraction  process  of  local  and  global  impression of a  given  image.  We  propose  a  gradient-based  low level  segmentation  process  inorder  to  fulfill  the  adherence  property of  the  segmented  image.  We  also  show  this  as  an  efficient  method  to achieve  the  regularity  and  adherence  property  of  the  segmented  image. Since  we  are  dealing  with  marker controlled  Watershed  transformation technique, the  problem  of  oversegmentation  can  be  avoided  to  a  great  extreme.  Here, we try to showcase ‘markerpixels’  as  an  efficient  tool  for  the  creation  of superpixels  using  Watershed  transformation.

Keywords:
   markerpixels, segmentation, watershed, clusters

References:

1.              D. Comaniciu and P. Meer, “Mean shift: A robustapproach toward feature space analysis,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 5, pp. 603-619, May 2002
2.              P. Felzenszwalb and D. Huttenlocher, “Efficient graphbased image segmentation,” Int. J. Comput. Vis., vol. 59, no. 2, pp. 167-181, 2004

3.              X. Ren and J. Malik, “Learning a classification model for segmentation,” in Proc. 9th IEEE ICCV, Oct. 2003, pp. 10-17

4.              D. Comaniciu and P. Meer. Mean shift: A robust approach toward feature space analysis. TPAMI, 24(5):603–619, 2002.

5.              P. F. Felzenszwalb and D. P. Huttenlocher. Efficient graphbased image segmentation. IJCV, 59(2):167–181, 2004.

6.              P. Moore, S. J. Prince, J. Warrell, U. Mohammed, and  G. Jones. Superpixel lattices. In CVPR, 2008.

7.              L. Vincent and P. Soille. Watersheds in digital spaces: anefficient algorithm based on immersion simulations. TPAMI, 13(6):583 –598, 1991


181-183

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

37.

Authors:

Arun K, Preeja V

Paper Title:

Android Malware Detection Techniques- A Survey

Abstract:     Smart phone users are increasing day to day. Most of the smart phone users connect to internet for various purposes and still they remain unprotected from malware attacks. One of the most commonly used operating system in smart phones is Android. A lot of applications available in play store makes android popular. The available applications can be easily installed from play store. Still it is very difficult to distinguish between clean and malicious application. This paper reviews four different methods for detecting android malwares.

Keywords:
    Android, Malware, Mobile Malware, Malware Detection, Permission Pattern

References:

1.                 http://developer.android.com/index.html
2.                 Fang Binxing, Cui Xiang, Wang Wei. “Survey of Botnets,” Journal of Computer Research and Development vol. 48, pp. 1315-1331, 2011.

3.                 Yue Li, Lidong Zhai, Zhilei Wang, Yunlong Ren. “Control Method of Twitter-and SMS-Based Mobile Botnet,” in Proceedings of Trustworthy Computing and Services in Beijing, pp. 644-650, 2013.

4.                 Bill Miller, Dale Rowe. “A survey SCADA of and critical infrastructure incidents,” in Proceedings of the 1st Annual conference on Research in information technology, pp. 51-56, 2012.

5.                 Blue Coat. Blue Coat Systems 2013 mobile malware report. 2013.

6.                 BHAS N. Press Release: More Than 80% of Smart phones Remain Unprotected from Malware and Attacks, Juniper Research Finds [EB/OL].[2014-02-23] http://www.juniperresearch.com/viewpressrelease.php? pr=404.

7.                 Shuai Zhao, Xiaohong Li, Guangquan Xu, Lei Zhang and Z. Feng, “Attack tree based android malware detection with hybrid analysis,” IEEE, pp.380-387, 2014.

8.                 Androguard. http://code.google.com/p/androguard/.

9.                 William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, et al. TaintDroid: an information-flow tracking system for real time privacy monitoring on smart phones. USENIX Symposium on Operating Systems Design and Implementation, 2012.

10.              Zhao Xiaoyan , Fang Juan, Wang Xiujuan “Android Malware Detection Based on Permissions,” IEEE, 2015

11.              Song Jie, Party Li Cheng, Guo Chao, Zhao Meng, Security Mechanisms Analysis and Application Research of Android mobile

12.              platform [J]. Computer Technology and Development, vol. 20(6), pp. 152-155, 2010.

13.              PIETRASZEK T, TANNER A. Data Mining and Machine Learning-Towards Reducing False Positives in Intrusion Detection [J]. Information Security Technical Report, vol.10(3), pp. 169-183, 2005.

14.              Xiong Ping, Wang Xiaofeng, NIU Wenjia, ZHU Tianqing, LI Gang, “Android Malware Detection with Contrasting Permission Patterns,” IEEE,  2014

15.              Lidong Zhai, Yue Li, Zhaopeng Jia, Li Guo. “APT Threat Detection and Protection of Integrated Network Space,” Netinfo security vol. 3, pp. 58-60, 2013.

16.              Zhou, Yajin, and Xuxian Jiang. “Dissecting android malware: Characterization and evolution,” Security and Privacy (SP), 2012 IEEE Symposium, IEEE. pp. 95-109,  2012.

17.              Jun Li, Lidong Zhai, Xinyou Zhang, Daiyong Quan,“ Research of Android Malware Detection Based on Network Traffic” Monitoring”, IEEE , pp. 1739-1744, 2014

18.              C C Chang, C J Lin. “LIBSVM: a library for support vector machines,” ACM Transactions on Intelligent Systems and Technology (TIST), vol. 2, pp. 27, 2011

19.              Boser,I. Guyon, and V. Vapnik. “A training algorithm for optimal margin classifiers,” in Proceedings of the Fifth Annual Workshop on Computational Learning Theory, pp. 144-152, 1992.

20.              Cortes C, Vapnik V. “Support-vector networks,” Machine learning vol. 20, pp. 273–297, 1995.


184-186

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

38.

Authors:

Mrudang Patel, Nirav Oza

Paper Title:

Design and Analysis of High Efficiency Cross-Flow Turbine for Hydro-Power Plant

Abstract:    flow turbine has gained much attention as it is low head turbine and can be used at remote places where a small waterfall of 10-15 meters is located. The objective of this study is to design a cross-flow turbine with maximum efficiency and doing static and model analysis of it. Complete design calculations of turbine have been performed along with static and model analysis of the turbine. The design parameters include runner diameter, runner speed, runner length,   turbine power, number of blades blade spacing, radius of blade curvature, attack angle and the blade and exit angles.

Keywords:
     Cross-flow turbine, design parameters, maximum efficiency, analysis.

References:

1.             http://www.ossberger.de/cms/en/hydro/the-ossberger-turbine-for-asynchronous-and-synchronous-water-plants/
2.             Mockmore, C. A. and Merryfield, F.: "The Banki water turbine", Engineering Experiment Station Bulletin Series, No. 25, February, 1949.

3.             Bilal Abdullah Nasir:” Design of High Efficiency Cross-Flow Turbine for Hydro-Power Plant”, International Journal of Engineering and Advanced Technology
(IJEAT), Volume-2, Issue-3, February 2013.

4.             CelsoPenche: "layman's Guide book on how to develop a small hydro site", Published by ESHA, Second Edition, Belgium, June, 1998.

5.             Durgin, W. W. and Fay, W. K.: "Some fluid flow characteristic of cross-flow type turbine", The Winter Annual Meeting of ASME, New Orleans, pp. 77-83, Dec., 1984.

6.             Nadim, M. A. and Desia, V. R.: "An experiment study of the effect of some design parameters in cross-flow turbine efficiency", Engineering report, Department of Civil Engineering, Clemson University, 1991.

7.             Wakati, R.: "Development of cross-flow turbine for local manufacturing", M. Sc. Thesis, University of Dar Es Salaam, 2010.

8.             Fiuzat, A.A. and B.P. Akerkar, 1989. The use of interior guide tube in cross flow turbines. Proceeding of the International Conference on Hydropower (WATERPPOWER, 89). London, UK

9.             Sammartano, V., C. Aricò, A. Carravetta, O. Fecarotta and T. Tucciarelli, 2013. Banki-michell optimal design by computational fluid dynamics testing and hydrodynamic analysis. Energies, 6: 2362-2385.

187-193

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

39.

Authors:

Renitha T V, Raghunandan Kumar

Paper Title:

Optimised Cost Design of Reinforced Concrete Frame

Abstract:     Cost optimization of Reinforced Concrete (RC) frames carried out in the present study. A three bay, three storey RC frame is optimised for minimum cost using global optimization toolbox in MATLAB software. The design variables taken for this study are effective depth and area of reinforcement of beams and columns. The design constraints included are geometric, strength and reinforcement areas confirming to IS 456:2000 code. The concept of grouping is incorporated for the simplicity of the design. The material properties are considered as constants. A MATLAB program is developed which expects to input constant parameters like grade of concrete and steel, cost of materials, live load etc. The program output is design variables and the cost of frame for optimized design. Reliable results have been obtained and are validated with manual design by Limit State Method. Comparison of optimised result with ETABS design result is made.

Keywords:
      ETABS, Genetic Algorithm, MATLAB, Optimization, RC Frame

References:

1.              Aga A, Adam F M, Design Optimization of ReinforcedConcrete Frames, Open Journal of Civil Engineering,5, 74-83 ,2015
2.              Ketkuka T S, Abubakar I, S P Ejeh, Optimum DesignSensitivity Of Reinforced Concrete Frames, InternationalJournal of Advanced Engineering Research andTechnology (IJAERT) Volume 2 Issue 5, August 2014,ISSN No.: 2348 8190,2014

3.              Yousif S T and Najem M Rabi, Optimum Cost Designof Reinforced Concrete Columns Using Genetic Algorithms,Al-Rafidain Engineering Vol.22, No. 1,2014

4.              Gholizadeh S. and Aligholizadeh V., Optimum designof reinforced concrete frames using bat meta-heuristicalgorithm, Int. J. Optim. Civil Eng., 2013; 3(3):483-497 ,2013

5.              Gharehbaghia S. and Fadaee M.J., Design Optimizationof RC Frames under Earthquake Loads. InternationalJournal of Optimization in Civil Engineering, 2,459-477.,2012

6.              Mahmoud Maher Jahjouh, Design Optimization ofRC Frames using Artificial Bee Colony Algorithm,Msc(Civil Eng.) Thesis,The Islamic University ofGaza,2012

7.              Kaveh A and Sabzi O., Optimal design of reinforcedconcrete frames Using big bang-big crunch algorithm,International Journal of Civil Engineering, Vol. 10,No. 3,2012

8.              Yousif S.T., ALsaffar. I.S. and Ahmed, S.M. , OptimumDesign of Singly and Doubly Reinforced ConcreteRectangular Beam Sections: Artificial NeuralNetworks Application, Iraqi Journal of Civil EngineeringVol. 6,1-19,2012

9.              Camp. C.V., Pezeshk, S. and Hansson, H., FlexuralDesign of Reinforced Concrete Frames Using a GeneticAlgorithm, Journal of Structural Engineering(ASCE),
129, 105-115,2003

10.           Moharrami H. and Grierson, D.E , Computer AutomatedDesign of Reinforced Concrete Frameworks.Journal of Structural Engineering (ASCE), 119, 2036-2058,1993

11.           Izadi. M. Niaki and Maheri M. R, Optimum designof 2-d reinforced concrete frames using a genetic algorithm,3rd International Conference on Concrete andDevelopment ,2014

12.           Bikramjit Singh, Optimisation of RCC Beam, InternationalJournal of Engineering, Business and EnterpriseApplications (IJEBEA), 14-316,2014

13.           Mehta S Zubin, Cost Optimization of ConcreteBeam Element By Direct Exhaustive Search Method,International Journal of Innovations in Engineeringand Technology(IJIET), Vol.2, Issue2. ISSN:2319-1058,2013

14.           Gandomi AH, Mixed variable structural optimizationusing Firefly Algorithm, Computers and Structures,Vol. 10 ,2011

15.           Mohammed A Ismail, Design Optimization of StructuralConcrete Beams Using Genetic Algorithms,Msc(Civil Eng.) Thesis, The Islamic University ofGaza,2007
16.           Rajeev S and Krishnamoorthy C S, GeneticAlgorithm-Based Methodology for Design Optimizationof Reinforced Concrete Frames, Computer-AidedCivil and Infrastructure Engineering, Vol.13,1998
17.           J H Holland, Adaptation in Natural and ArtificialSystems.AnnArbor, MI: MIT Press, 1975.

18.           David Beasley, An overview of genetic algorithms:Part 2, research topics. University Computing,15(4):170-181, 1993.

19.           Arora J S(1989), Introduction to Optimum Design,McGraw-Hill,

20.           N Subramanian, Design of Reinforced ConcreteStructures , Oxford University Press

21.           Rao S S, Engineering Optimization: Theory andPractice, John Wiley and Sons

22.           IS 456:2000 code, ”Plain and Reinforced Concrete-Code of Practice”

23.           MathworksInc., Global OptimizationToolbox: User’s Guide (r2011b),http://www:mathworks:com=help=pd fdoc/gads/gadstb.pdf


194-199

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

40.

Authors:

Ramakrishna Gandi, Prathimarani Palla, Madhuri Thimmapuram, Daniel Prasanth T

Paper Title:

A Novel Approach for Faculty Appraisal in Educational Data Mining using CLEMENTINE TOOL

Abstract:      Data mining, the concept of unseen predictive information from big databases is a powerful novel technology with great potential used in various commercial uses including banking, retail industry, e-commerce, telecommunication industry, DNA analysis remote sensing, bioinformatics etc. Education is a required element for the progress of nation. Mining in educational environment is called Educational Data Mining. Educational data mining is concerned with developing new methods to discover knowledge from educational database. In order to analyze opinion of students about their teachers in Professor Appraisal System, this paper surveys an application of data mining in Professor Appraisal System & also present result analysis using CLEMENTINE 12.0 tool. There are varieties of popular data mining task within the educational data mining e.g. classification, clustering, outlier detection, association rule, prediction etc. How each of data mining tasks can be applied to education system is explained. In this paper we analyze the performance of final Faculty Appraisal of a semester of a computer engineering department, Vignan Institute of Information Technology College of engineering & is presented the result which it is achieved using CLEMENTINE 12.0  tool. We have verified hidden patterns of Faculty Appraisal by students and is predicted that which Faculty will be invited to faculty classes and which Faculty will be refusing and department heads due to Appraisal reasons will ask explanations with them.

Keywords:
       Classification, Clustering, Association rule, Data mining, Appraisal, CLEMENTINE 12.0.

References:

1.          Jiawei Han. And Micheline Kamber,Jian Pei "Data  Mining: Concepts and Techniques", 3rd  edition.
2.          Sunita B Aher, Mr. LOBO L.M.R.J. Data Mining in Educational System using WEKA, IJCA,2011

3.          P. Sanjeev ve J. M, Zytkow. “Discovering Enrollment Knowledge in University Databases,” 1th Conference on KDD (Montreal.20-21 August 1995).   

4.          M.Vranić, D. Pintar, Z.Skoćır, “The Use of Data Mining in Education Environment,” ConTEL 2007. (Zagrep 13-15 June 2007), 243

5.          Shearer, “The CRISP-DM model: The new  blueprint for data mining” Journal of Data Warehousing,  (2000). 5: 13-22.

6.          http://www.the-datamine.com/Software/SPSS

7.          http://homepage.univie.ac.at/marcus.hudec/Lehre/WS%202006/Methoden%20DA/IntroClem.pdf

8.          Pushplata Pujari, Jyoti Bala Gupta,” Classification of Multi Class Data Set By Using Data mining Classifiers” International Journal of Creative Research Thoughts,
2013.

9.          Harleen Kaur and Siri Krishan Wasan “Empirical Studies on applications of Data Mining” Techniques in health care., Journal of computer Science, 2(2), 194-200, 2006, ISSN 1549-3636.


200-206

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

41.

Authors:

V Soundharya, Anil B A, Venu Gopal S, Gowreesh S S

Paper Title:

Aerodynamic Analysis of Dimple effect on Airfoil

Abstract: The main objective of aircraft aerodynamics is to enhance the aerodynamic characteristics and maneuverability of the aircraft. This enhancement includes the reduction in drag. At present different kinds of surface modifications like Vortex Generators commonly known as Dimples are being studied to improve the maneuverability of the aircraft.  Present paper attempts to evaluate the effects of such artificial modifications on the surface of a NACA 4412 Airfoil and analyze the impact on its aerodynamic performance. An external flow study was performed using commercially available software. Simulations for external flow configuration with and without dimples were carried out and analyzed in detail. The resulting pressure drop and drag were observed. The objective is to clarify whether or not dimples cause reduction of the skin friction drag and if it would provide better lift.

Keywords:
        Airfoil, Lift, Drag, Dimple, Pressure Drop.

References:

1.              E.Livya, G.Anitha and P.Valli, "Aerodynamic Analysis of Dimple Effect on Aircraft Wing”, World Academy of Science, Engineering and Technology, International Journal of Mechanical, Aerospace, Industrial, Mechatronics and Manufacturing Engineering Vol:9, No:2,2015.W.-K. Chen, Linear Networks and Systems (Book style).    Belmont, CA: Wadsworth, 1993, pp. 123–135.
2.              Dr. C. Ramprasadh and V. Devanandh Senior Assistant Professor, School of Mechanical Engineering SASTRA University, Former B.Tech Student, School of Mechanical Engineering, SASTRA University – Currently Deputy Manager, Engine R&D, Ashok Leyland Ltd, "A CFD Study on Leading Edge Wing Surface Modification of a Low Aspect Ratio Flying wing to Improve Lift Performance", International Journal of Micro Air Vehicles, Volume 7, Number 3, 2015.

3.              Bhadri Rajasai, Ravi Tej, Sindhu Srinath, "Aerodynamic effects of Dimple on Aircraft Wings", Proc. of The Fourth Intl. Conf. On Advances in Mechanical, Aeronautical and Production Techniques - MAPT 2015 Copyright © Institute of Research Engineers and Doctors, USA. All rights reserved. ISBN: 978-1-63248-072-9
doi: 10.15224/ 978-1-63248-072-9-55

4.              Dr.P. Prabhakara Rao & Sri Sampath.V, Dept.of Mechanical Engineering, Kakatiya Institute of Technology& Science Warangal-506015, "CFD Analysis on Airfoil at High Angles of Attack", International Journal of Engineering Research, Volume No.3, Issue No.7, pp : 430-434, 01 July 2014.E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for publication),” IEEE Trans. Antennas Propagat., to be published.

5.              Karna S.Patel, Saumil B.Patel, Utsav B.Patel, Prof. Ankit P.Ahuja, UVPCE, Ganpat University, "CFD Analysis of an Airfoil", International Journal of Engineering Research, Volume No.3, Issue No.3, pp : 154-158 , 01 March 2014..

6.              Bogdanovic-Jovanovic, B.Jasmina Zivojin M. Stamenkovic and Milos M. Kocic, 2012 "Experimental and Numerical Investigation of Flow around a Sphere with Dimples for various Flow Regimes", Thermal Science, Vol.16, No.4, pp.1013-102.Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interfaces (Translation Journals style),” IEEE Transl. J. Magn.Jpn., vol. 2, Aug. 1987, pp. 740–741 [Dig. 9th Annu. Conf. Magnetics Japan, 1982, p. 301].

7.              Deepanshu Srivatsav, "Flow Control Over Airfoils using Different Shaped Dimples", International Conference on Fluid Dynamics and Thermodynamics Technologies (FDTT 2012) IPCSIT Vol.33 (2012) IACSIT Press, Singapore 2012..

8.              Armin Ghoddoussi, "A Conceptual Study of Airfoil Performance Enhancements using CFD", A Thesis by Armin Ghoddoussi, Bachelor of Science, Sojo University,1998.

9.              UIUC Airfoil Data Site,    http://m-selig.ae.illinois.edu/ads/coord_database.html


207-211

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

42.

Authors:

Mathew Skaria, K. K. Abdul Rasheed, K.A.Shafi, S. Kasthurirengan, Upendra Behera

Paper Title:

Influence of Working Fluid and Operating Parameters on the Performance of Traveling Wave Thermo Acoustic Prime Mover

Abstract:  The paper present the performance studies on a traveling wave thermoacoustic system developed in our laboratory. Experiments were carried out for different working fluids such as Helium, Argon and Nitrogen and at different operating pressures. The results indicate that the working fluids with different charge pressures are critical to the performance of the system. The above experimental results are compared with simulation (CFD and Delta EC) results wherever possible and they are in good agreement.

Keywords:
 Traveling wave, prime mover, working fluid, CFD, Delta EC.

References:

1.              Peter H. Ceperley. A pistonless stirling engine – the traveling wave heat engine. J. Acoust. Soc. Am., 66(5), 1979,pp 1508–1513
2.              Backhaus S, Swift GW. A thermoacoustic Stirling heat engine. Nature (London) , 1999.pp 399:335.

3.              Yazaki T., A. Iwata, T. Maekawa, A. Tominaga, Traveling wave thermoacoustic engine in a looped tube, Phys. Rev. Lett.. 1998..81, pp 3128–3131,

4.              Swift G.W., Thermoacoustics: A Unifying Perspective for Some Engines and Refrigerators, Acoustical Society of America, Publications, Sewickley, PA, 2002

5.              Ercang Luo, Hong Ling, Wei Dai, et al. Experimental study of the influence of different resonators on thermoacoustic conversion performance of a thermoacoustic-stirling heat engine. Ultrasonics,44: 2006,pp 1507–9,

6.              Qiu L.M., Sun D.M., Yan W.L., Chen P., Gan Z.H., Zhang X.J., Chen G.B., Investigation on a thermoacoustically driven pulse tube cooler working at 80K, Cryogenics, 2005,45: pp  380–385,

7.              Sun, D., Qiu, L., Wang, B., Xiao, Y. and Zhao, L.,Output characteristics of Stirling thermoacoustic engine. Energy Conversion and Management 49(5), 2008, pp.1265-1270.

8.              Ueda, Y., Bassem, M. M., Tsuji, K. and Akisawa, A., Optimization of the regenerator of a traveling - wave thermoacoustic refrigerator. Journal of Applied Physics , 2010,107(3), 034901- 034905

9.              Yu, B., Luo, E. C., Li, S. F., Dai, W. and Wu, Z. H., Experimental study of a thermo acoustically driven traveling wave thermoacoustic refrigerator. Cryogenics, 2011,51(1):pp.49-54,.

10.           Abdul rahman Sayed Ahmed Abduljalil, Investigation of thermoacoustic processes in a travelling wave looped-tube thermoacoustic engine, PhD thesis, University  of  Manchester,2012. 


212-216

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

43.

Authors:

Parminder Kaur, Monika Sachdeva, Gagandeep

Paper Title:

Impact of Black hole Attack on Performance of AODV Routing Protocol

Abstract:   MANET includes number of wireless nodes. The network topology varies frequently. During the communication nodes act as sender, receiver and router. There is various attacks in MANET routing protocols. In this paper, we discuss about the black hole attack under AODV. Black hole attack accesses the packets and then drops packets. In this paper, we evaluate and stimulate the effect of black hole in AODV. We evaluate the performance of AODV under black hole attack using different performance metrics i.e. Energy consumption, Average Jitter, End-to end Delay and throughput. Simulation is carried out using widely used simulator Qualnet..

Keywords:
 MANET, AODV, Black hole, Performance metrics.

References:

1.             P.R.Jasmine jeni, A.Vimala Juliet, R.Parthasarathy, A.Messiah Bose “Performance Analysis of DOA and AODV Routing Protocols with Black Hole Attack in MANET”      International Conference on Smart Structures & Systems,ISBN:978-1-4673-6240-5/32©2013 IEEE.
2.             Avni Khatkar, Yudhvir Singh “Performance Evaluation of Hybrid Routing Protocols in      Mobile Adhoc Networks “ International Conference on Advanced Computing & Communication Technologies,ISBN:978-0-7695-4640-7/12©2012 IEEE.

3.             Mona N.Alslaim, Haifaa A.Alaqel, Soba S.Zaghloul “A Comparative Study of MANET Routing Protocols” ISBN:978-1-4799-3166-8©2014 IEEE.

4.             Harjeet Kaur, Varsha Sahni, Dr. Manju Bala “ A Survey of Reactive,Proactive and Hybrid Routing Protocols in MANET:A Review” IJCSIT,ISSN:0975-9646,2013.

5.             Latif Ullah Khan, Faheem Khan, Naeem Khan “Effect of Network Density on the Performance of MANET Routing Protocols” International Conference on Circuits, Power       and Computing Technologies,ISBN:978-1-4673-4922-2/13©2013 IEEE.

6.             Mr.B.Karthikeyan,Mrs. N.Kanimozhi, Dr.S.Hari Ganesh “Analysis of Reactive AODV       Routing Protocol for MANET” ISBN:978-1-4799-2877-4/14© 2014 IEEE.

7.             Gagandeep, Aashima “ Study on Sinkhole Attacks in Wireless Adhoc Networks”       IJCSE,ISSN:0975-3397,2012.

8.             Gagandeep, Aashima ,Pawan kumar “ Analysis of Different Security Attacks in       MANETs on Protocols Stack. A-Review “ IJEAT,ISSN:2249-8958,2012

9.             Abu Hasnat Md. Riadul Alam, Md. Atiqur Rahaman Khan,Jia Uddin “Network Design       and Performance Analysis of Geographical Routing Protocol in Mobile Ad-Hoc         Network” ISBN:978-1-4799-0400-6/13© 2013 IEEE.

10.          Pragya Gupta ,Sudha Gupta “Routing Protocols “ International Conference on Advanced Computing& communicationTechnologies”ISBN:9780-0-7695
49415/13©2013 IEEE.

11.          Ajinkya. D.Kadam, Prof. Sharad.S.Wagh “Evaluating MANET Routing Protocols Under Multimedia Traffic” ICCCNT-2013,IEEE-31661.

12.          Mazhar H malik*,Qasim Always#, Mohsin Jamil** and Dhyani# “Performance        Analysis of Proactive and Reactive Protocols in Mobile Ad-Hoc Networking:A
Simulation  based Analysis” ICREATE ,ISBN:978-1-4799-5132-1/14©2014 IEEE.

13.          Changling Liu.Jorg Kaiser “ A Survey of Mobile Ad Hoc Routing Protocols.

14.          Shabana Habib, Somaila Saleem, Khawaja Muhammad Saqib “ Review on MANET         Routing Protocols and Challenges “ Student Conference on Research and 
Development,ISBN:978-1-4799-2656-5/13 ©2013 IEEE.

15.          Beigh Bilal Maqbool,Prof.M.A.Peer “Classification on Current Routing Protocols for  AdHoc Networks-A Review” International Journal of Computer Application,ISSN:0975- 8887,2010.

16.          Neeraj Arora and Dr. N.C.Barwar “Evaluation of AODV,OLSR and ZRP RoutingProtocols under Black hole attack” IJAIEM,ISSN:2319-4847,2014.

17.          Harjeet Kaur, Manju Bala, Varsha Sahul “ Performance Evaluation of AODV,OLSR and  ZRP Routing Protocols under the Black hole Attacks in MANET”         IJAREEIE,ISSN:2278-8875,2013.

18.          P. Sankareswary, R. Suganthi and G. Sumathi “Impact of Selfish Nodes in Multicast Ad Hoc On  demand Distance Vector Protocol” ICWCSC, IEEE, 2010.


217-220

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

44.

Authors:

Nizar Hussain M, Suresh Subramoniam

Paper Title:

Reengineering Healthcare using Information and Communication Technology: Structural Equation Model for Healthcare Information Systems

Abstract:    It is claimed that reengineering healthcare using Information and Communication Technology (ICT) can bring many benefits to the healthcare organisation. Many ICT applications remain underused by healthcare professionals and healthcare organisations. Human and organisational factors have frequently been identified as the main causes of ICT implementation underuse. Therefore, it is very important to identify the Critical Success Factors (CSF) necessary for the implementation of Healthcare Information Systems (HIS). Existing models of CSF on information systems related to healthcare sector are practically less, globally, and almost nil with respect to India. Hence, the purpose of this research is to develop a conceptual model of CSF especially for HIS adoption, use and redesign in India. Such identified factors for redesign will also have international bearing as redesign possibilities discussed are mainly based on emerging technologies. The rationale of the purpose is justified by the fact that India is a leader in developing information systems, especially medical applications. Further, India is emerging as an international destination for healthcare due to the advancement in medical technology and is offering high quality health services at reduced cost.

Keywords:
Information and Communications Technology, Critical Success Factors, Healthcare Information Systems, Structural Equation Model.

References:

1.             Health Canada, Towards a healthy future: Second report on the health of Canadians. Federal. Provincial and Territorial Advisory Committee on Population Health, Ottawa, 1999.
2.             Berner, E. S., Detmer, D. E., and Simborg, D., Will the wavefinally break? A brief view of the adoption of electronic medical records in the United States. J. Am. Med. Inform. Assoc. 12:3–7, 2005.

3.             Brooks, R. G., and Menachemi, N., Physicians’ use of email with patients: factors influencing electronic communication and adherence to best practices. J. Med. Internet Res. 8:e2, 2006.

4.             Yarbrough, A. K., and Smith, T. B., Technology acceptance among physicians: a new take on TAM. Med. Care Res. Rev. 64:650–672, 2007.

5.             Aarts, J., Doorewaard, H., and Berg, M., Understanding implementation: the case of a computerized physician order entry system in a large Dutch university medical center. J. Am. Med. Inform. Assoc. 11:207–216, 2004.

6.             Lorenzi, N. M., Riley, R. T., Blyth, A. J., Southon, G., and Dixon, B. J., Antecedents of the people and organizational aspects of medical informatics: review of the literature. J. Am. Med. Inform. Assoc. 4:79–93, 1997.

7.             Pagliari, C., Clark, D., Hunter, K., Boyle, D., Cunningham, S., Morris, A., and Sullivan, F., DARTS 2000 online diabetes management system: formative evaluation in clinical practice. J. Eval. Clin. Pract. 9:391–400, 2003.

8.             Stahl, Michael J, Critical Success Factors, Encyclopedia of health care management, Sage Publications, 2001.

9.             Al Farsi, M., and West, D. J., Jr., Use of electronic medical records in Oman and physician satisfaction. J. Med. Syst. 30:17–22, 2006.

10.          Connelly, D. P., Werth, G. R., Dean, D. W., Hultman, B. K., and Thompson, T. R., Physician use of an NICU laboratory reporting system. Proc. Annu. Symp. Comput. Appl. Med. Care. 8–12, 1992.

11.          Crowe, B., and Sim, L., Implementation of a radiology information system/picture archiving and communication system and an image transfer system at a large public teaching hospital - Assessment of success of adoption by clinicians. J. Telemed. Telecare 10:25–27, 2004.

12.          D’Alessandro, D. M., Kreiter, C. D., and Peterson, M. W., An evaluation of information-seeking behaviors of general pediatricians. Pediatrics 113:64–69, 2004.

13.          Eley, D., Hegney, D., Wollaston, A., Fahey, P., Miller, P., McKay, M., and Wollaston, J., Triage nurse perceptions of the use, reliability and acceptability of the Toowoomba Adult Triage Trauma Tool (TATTT). Accident Emerg. Nurs. 13:54–60, 2005.

14.          Firby, P. A., Luker, K. A., and Caress, A. L., Nurses’ opinions of the introduction of computer-assisted learning for use in patient education. J. Adv. Nurs. 16:987–995, 1991.

15.          Galligioni, E., Berloffa, F., Caffo, O., Tonazzolli, G., Ambrosini, G., Valduga, F., Eccher, C., Ferro, A., and Forti, S., Development and daily use of an electronic oncological patient record for the total management of cancer patients: 7 years’ experience. Ann. Oncol. 20:349–352, 2009

16.          Hier, D. B., Rothschild, A., LeMaistre, A., and Keeler, J., Differing faculty and housestaff acceptance of an electronic health record one year after implementation. Medinfo 11:1300– 1303, 2004.

17.          Hou, I. C., Chang, P., and Wang, T. Y., Qualitative analysis of end user computing strategy and experiences in promoting nursing informatics in Taiwan. Stud. Health Technol. Inform. 122:613–615, 2006.

18.          Joos, D., Chen, Q., Jirjis, J., and Johnson, K. B., An electronic medical record in primary care: impact on satisfaction, work efficiency and clinic processes. AMIA Annu. Symp. Proc. 394–398, 2006.

19.          Jousimaa, J., Kunnamo, I., and Makela, M., An implementation study of the PDRD primary care computerized guidelines. Scand. J. Prim. Health Care 16:149–153, 1998.

20.          Kamadjeu, R. M., Tapang, E. M., and Moluh, R. N., Designing and implementing an electronic health record system in primary care practice in sub-Saharan Africa: a case study from Cameroon. Inform. Prim. Care. 13:179–186, 2005.

21.          Keshavjee, K., Troyan, S., Holbrook, A. M., and VanderMolen, D., Measuring the success of electronic medical record implementation using electronic and survey data. Proc. AMIA Symp. 309–313, 2001.

22.          Kouri, P., Turunen, H., and Palomaki, T., ‘Maternity clinic on the net service’ and its introduction into practice: experiences of maternity-care professionals. Midwifery 21:177–189, 2005.

23.          Larcher, B., Arisi, E., Berloffa, F., Demichelis, F., Eccher, C., Galligioni, E., Galvagni, M., Martini, G., Sboner, A., Tomio, L., Zumiani, G., Graiff, A., and Forti, S., Analysis of user satisfaction with the use of a teleconsultation system in oncology. Med. Inform. Internet Med. 28:73–84, 2003.

24.          Marcy, T. W., Kaplan, B., Connolly, S. W., Michel, G., Shiffman, R. N., and Flynn, B. S., Developing a decision support system for tobacco use counselling using primary care physicians. Inform. Prim. Care. 16:101–109, 2008.

25.          Magrabi, F., Westbrook, J. I., and Coiera, E. W., What factors are associated with the integration of evidence retrieval technology into routine general practice settings? Int. J. Med. Inform. 76:701–709, 2007.

26.          Martinez, M. A., Kind, T., Pezo, E., and Pomerantz, K. L., An Evaluation of community health center adoption of online health information. Health Promot. Pract. 2007.

27.          O’Connell, R. T., Cho, C., Shah, N., Brown, K., and Shiffman, R. N., Take note(s): differential EHR satisfaction with two implementations under one roof. J. Am.
Med. Inform. Assoc. 11:43–49, 2004.

28.          Ovretveit, J., Scott, T., Rundall, T. G., Shortell, S. M., and Brommels, M., Improving quality through effective implementation of information technology in healthcare. Int. J. Qual. Health Care 19:259–266, 2007.

29.          Pare, G., Sicotte, C., and Jacques, H., The effects of creating psychological ownership on physicians’ acceptance of clinical information systems. J. Am. Med. Inform. Assoc. 13:197–205, 2006.

30.          Popernack, M. L., A critical change in a day in the life of intensive care nurses: rising to the e-challenge of an integrated clinical information system. Crit. Care
Nurs. Q. 29:362–375, 2006.

31.          Pourasghar, F., Malekafzali, H., Koch, S., and Fors, U., Factors influencing the quality of medical documentation when a paperbased medical records system is replaced with an electronic medical records system: an Iranian case study. Int. J. Technol. Assess. Health Care 24:445–451, 2008.

32.          Soar, J., Ayres, D., and Van der Weegen, L., Achieving change and altering behaviour through direct doctor use of a hospital information system for order communications. Aust. Health Rev. 16:371–382, 1993.

33.          Thoman, J., Struk, C., Spero, M. O., and Stricklin, M. L., Reflections from a point-of-care pilot nurse group experience. Home Healthc. Nurs. 19:779–784, 2001.

34.          Vanmeerbeek, M., Exploitation of electronic medical records data in primary health care. Resistances and solutions. Study in eight Walloon health care centres. Stud. Health Technol. Inform.110:42–48, 2004.

35.          Whittaker, A. A., Aufdenkamp, M., and Tinley, S., Barriers and facilitators to electronic documentation in a rural hospital. J. Nurs. Scholarsh. 41:293–300, 2009.

36.          Zheng, K., Padman, R., Johnson, M. P., and Diamond, H. S., Understanding technology adoption in clinical care: clinician adoption behavior of a point-of-care reminder system. Int. J. Med. Inform. 74:535–543, 2005.

37.          Di Pietro, T., Coburn, G., Dharamshi, N., Doran, D., Mylopoulos, J., Kushniruk, A., Nagle, L., Sidani, S., Tourangeau, A., Laurie- Shaw, B., Lefebre, N., Reid-Haughian, C., Carryer, J., and McArthur, G., What nurses want: diffusion of an innovation. J. Nurs. Care Qual. 23:140–146, 2008.

38.          Haynes, R. B., McKibbon, K. A., Walker, C. J., Ryan, N., Fitzgerald, D., and Ramsden, M. F., Online access to MEDLINE in clinical settings. A study of use and usefulness. Ann Intern Med. 112:78–84, 1990.

39.          Likourezos, A., Chalfin, D. B., Murphy, D. G., Sommer, B., Darcy, K., and Davidson, S. J., Physician and nurse satisfaction with an Electronic Medical Record system. J. Emerg. Med. 27:419–424, 2004.

40.          Pugh, G. E., and Tan, J. K., Computerized databases for emergency care: what impact on patient care? Methods Inf. Med. 33:507–513, 1994.

41.          Verhoeven, F., Steehouder, M. F., Hendrix, R. M., and van Gemert-Pijnen, J. E., Factors affecting health care workers’ adoption of a website with infection control guidelines. Int. J. Med. Inform. 78:663–678, 2009.

42.          Lee, T. T., Mills, M. E., and Lu, M. H., The multimethod evaluation of a nursing information system in taiwan. Comput. Inform. Nurs. 27:245–253, 2009.

43.          Crosson, J. C., Isaacson, N., Lancaster, D., McDonald, E. A., Schueth, A. J., DiCicco-Bloom, B., Newman, J. L., Wang, C. J., and Bell, D. S., Variation in electronic prescribing implementation among twelve ambulatory practices. J. Gen. Intern. Med. 23:364– 371, 2008.

44.          Cheng, G. Y., Educational workshop improved information seeking skills, knowledge, attitudes and the search outcome of hospital clinicians: a randomised controlled trial. Health Info. Libr. J. 20(Suppl 1):22–33, 2003.

45.          Yeh, S. H., Jeng, B., Lin, L.W., Ho, T. H., Hsiao, C. Y., Lee, L. N., and Chen, S. L., Implementation and evaluation of a nursing process support system for long-term care: a Taiwanese study. J. Clin. Nurs. 18:3089–3097, 2009.

46.          Torkzadeh, G., T.P. Van Dyke, Effects of training on Internet self-efficacy and computer user attitudes, Comput. Hum. Behav. 18 (5) (2002) 479–494.

47.          Barbeite, F.G., E.M. Weiss, Computer self-efficacy and anxiety scales for an Internet sample: testing measurementequivalence of existing measures and
development of newscales, Comput. Hum. Behav. 20 (1) (2004) 1–15.

48.          Bedard, J.C., C. Jackson, M.L. Ettredge, K.M. Johnstone, The effect of training on auditors’ acceptance of an electronic work system, Int. J. Account. Inform. Syst. 4 (2003) 227–250.

49.          Hasan, B., The influence of specific computer experiences on computer self-efficacy beliefs, Comput. Hum. Behav. 19 (4) (2003) 443–450.

50.          Barsukiewicz, C. K., Computerized medical records: physician response to new technology. The Pennsylvania State University, Pennsylvania, 1998.

51.          Lai, F., Macmillan, J., Daudelin, D. H., and Kent, D. M., The potential of training to increase acceptance and use of computerized decision support systems for medical diagnosis. Hum. Fact. 48:95–108, 2006.

52.          Lapointe, L., and Rivard, S., Getting physicians to accept new information technology: insights from case studies. Can. Med. Assoc. J. 174:1573–1578, 2006.

53.          Travers, D., and Parham, T., Improving information access with an emergency department system. Proc. AMIA Annu. Fall Symp.121–125, 1997.

54.          Walji, M. F., Taylor, D., Langabeer, J. R., 2nd, and Valenza, J. A., Factors influencing implementation and outcomes of a dental electronic patient record system. J. Dent. Educ. 73:589–600, 2009.

55.          Cumbers, B. J., and Donald, A., Using biomedical databases in everyday clinical practice: the Front-Line Evidence-Based Medicine project in North Thames. Health Libr. Rev. 15:255– 265, 1998

56.          Rahimi, B., Timpka, T., Vimarlund, V., Uppugunduri, S., and Svensson, M., Organization-wide adoption of computerized provider order entry systems: a study based on diffusion of innovations theory. BMC Med. Inform. Decis. Mak. 9:52, 2009.

57.          Chisolm, D. J., McAlearney, A. S., Veneris, S., Fisher, D., Holtzlander, M., and McCoy, K. S., (2006),  The role of computerized order sets in pediatric inpatient asthma treatment. Pediatr. Allergy Immunol. 17:199–206.

58.          Hains, I. M., Fuller, J. M., Ward, R. L., and Pearson, S. A., Standardizing care in medical oncology: are Web-based systems the answer? Cancer 115:5579–5588, 2009

59.          DeLone, W. H., E.R. McLean, The DeLone and McLean model of information systems success: a ten-year update, Journal ofManagement Information Systems 19 (4) (2003).

60.          Gillingham, W., A. Holt, J. Gillies, Hand-held computers in health care:what software programs are available? The New Zealand Medical Journal 115 (1162) (2002).

61.          Lu, Y,  Y. Xiao, A. Sears, J. Jacko, Review and a framework of handheld computer adoption in healthcare, International Journal of Medical Informatics 74 (5) (2005).

62.          Sarker, S., J.S. Valacich, S. Sarker, Technology adoption by groups: a valence perspective, Journal of the Association for Information Systems 6 (2) (2005).

63.          Varshney, U., Pervasive healthcare, Computer 36 (2) (2003).

64.          Han YY, Carcillo JA, Venkataraman ST, Clark RSB, Watson RS, Nguyen TC, et al. Unexpected increased mortality after implementation of a commercially sold computerized physician order entry system. Pediatrics 2005;116:1506–12.

65.          Holden RJ, Scanlon MC, Brown RL, Karsh B. What is IT? New conceptualizations and measures of pediatric nurses’ acceptance of carcoded medication administration information technology. Annu Meet Human Factors Ergon Soc 2008;52:768–72.

66.          Chau, P. (2001). Influence of computer attitude and self-efficacy on IT usage behavior. Journal of End User Computing, 13(1), 26-33.

67.          Venkatesh, V., Morris, M. G., Davis, G. B., & Da¬vis, F. D. (2003). User acceptance of information technology: Toward a unified view. Management Information Systems Quarterly, 27(3), 425–478.

68.          Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. Manage¬ment Information Systems Quarterly, 19(2), 213–236. doi:10.2307/249689.

69.          Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega International Journal of Management Science, 23(6), 587–605. doi:10.1016/0305-0483(95)00035-6.

70.          Bhattacherjee, A., & Hikmet, N. (2008). Reconceptualizing organizational support and its effect on information technology usage: evidence from the health care sector. The Journal of Computer Information Systems, 48(4), 69-75.

71.          Sutirtha Chatterjee, Suranjan Chakraborty , Saonee Sarker , Suprateek Sarker , Francis Y. Lau, xamining the success factors for mobile work in healthcare: A deductive study, Decision Support Systems 46 (2009) 620–633.

72.          Seddon, P. B., & Kiew, M. Y. (1996). A partial test and development of DeLone and McLean’s model of IS success. Australian Journal of Information Systems,
4(1), 90–109.

73.          Brady, M. K., Cronin, J. J., & Brand, R. R. (2002). Performance-only measurement of service quality: A replication and extension. Journal of Business Research, 55(1), 17–31. doi:10.1016/S0148- 2963(00)00171-5.

74.          Boonchai Kijsanayotina, Supasit Pannarunothaib, Stuart M. Speediec, Factors influencing health information technology adoption in Thailand’s community health centers: Applying the UTAUT model, international journal of medical informatics 7 8 ( 2 0 0 9 ) 404–416.

75.          Venkatesh, V. F.D. Davis, A theoretical extension of the technology acceptance model: four longitudinal field studies, Manage. Sci. 46 (2) (2000) 186–204.

76.          Chau, P.Y.K.  P.J.H. Hu, Investigating healthcare professionals’ decisions to accept telemedicine technology: an empirical test of competing theories, Inform. Manag. 39 (4) (2002) 297–311.

77.          Gagnon, M.P. G. Godin, C. Gagne, J.P. Fortin, L. Lamothe, D. Reinharz, A. Cloutier, An adaptation of the theory of interpersonal behaviour to the study of telemedicine adoption by physicians, Int. J. Med. Inform. 71 (2003) 103–115.


221-227

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

45.

Authors:

Dheeraj S. Patil, M. V. Patil

Paper Title:

A Fast FPGA based Architecture Implementation for Reversible Image Watermarking

Abstract:     Now a day’s different techniques are available for digital image watermarking including software and hardware implementation. Reversible contrast mapping (RCM) is one of the technique is used for embed secret information into the digital form. RCM algorithm is simple integer transform of the pixel pair and there LSB bits are used for data embedding.  RCM offers high embedding rate, low mathematical calculation and good robustness. This paper focuses on implementation of Field Programmable Gate Array (FPGA) based fast image watermarking using RCM algorithm. The given architecture requires 52 slices, 52 number of flip-flop, 85 number of 4-input LUTs and transceiver data rate is up to 3.2Gbps with an operating crystal frequency is 100MHz. Given architecture is implemented with Xilinx 14.7 on Spartan-6 FPGA family. The given architecture is acceptable for various application areas such as digital cameras, medical and military applications, etc.

Keywords:
  Image Processing, RCM, FPGA

References:

1.                P Karthigaikumar, Anumol, K Baskaran, “FPGA Implementation of High Speed Low Area DWT Based Invisible Image Watermarking Algorithm”,
2.                Dinu Coltu and Jean-Marc Chassery, “very Fast Waterrmarking by Reversible Contrast mapping” IEEE signal processing letters, vol. 14, no. 4, april 2007

3.                Gaurav Bhatnagar,  Q.M. Jonathan Wu,  Balasubramanian Raman,”A new robust adjustable logo watermarking scheme”  ScienceDirect  2012 pp. 40-58.

4.                Mohanty, S.P., Ranganathan, N., Namballa, R.K, “VLSI implementation of visible watermarking for a secure digital still camera design” In: Proceedings of the 17th International Conference on VLSI Design, 2004,  pp. 1063-1068.

5.                Mohanty, S.P., Ranganathan, N., Balakrishnan, K., A dual voltage frequencyVLSI chip for image watermarking in DCT domain. IEEE Trans. Circuits Syst. II:Exp. Briefs 53 (May (5)),pp. 394–398.

6.                Maity, S.P., Kundu, M., Maity, S., 2009. Dual purpose FWT domain spread spectrumimage watermarking in real time, special issue on circuits and systems for
realtime security and copyright protection of multimedia. Int. J. Comput. Electr. Eng.35, 415–433.

7.                P Karthigaikumar, K Baskaran, “ An ASIC implementation of a low power invisible robust watermarking processor” International journal of system architecture, 2010, 57(4), 404-411.

8.                Sugreev Kaur And Rajesh Mehra, “High Speed And Area Efficient 2D DWT Processor Based Image Compression” Signal & Image Processing : An International Journal Sipij, 2010, 1(2), pp.22-31.

9.                Hirak Kumar Maitya, Santi P. Maity, “FPGA implementation of reversible watermarking in digital images using reversible contrast mapping” Science Direct June 2014.

10.             Sudip Ghosh, Bijoy Kundu, Debopam Datta, Santi P Maity     and Hafizur Rahaman, “Design and Implementation of Fast FPGA Based Architecture for Reversible Watermarking”, International Conference on Electrical Information and Communication Technology, 1-6, IEEE 2013


228-232

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

46.

Authors:

Dhanyashree T S, Sangeetha B G, Gayatri Malhotra

Paper Title:

Design and Hardware Implementation of Sun Sensor based Sun Re-Acquisition on Safe Mode Detection in Satellites

Abstract:      Satellite/spacecraft enter into Safe Mode in case of contingency when the solar panel is not rotated towards Sun in order to provide full solar array power. The transition from safe mode to sun pointing mode, carried out automatically by Sun acquisition logic. In sun acquisition logic selected yaw and roll errors are used as inputs to controller whose outputs are routed to thruster selection logic. On Safe Mode enable condition, based on the safe mode pulse from on board computer (OBC) thruster block reconfiguration is done. This initiates thruster selection logic (TSL), whose outputs are routed to thruster drivers to fire the thrusters in satellites/spacecraft to change the spacecraft orientation. The eclipse condition is also detected from 4PI pitch output on safe mode.

Keywords:
   Pitch, yaw, roll, safe mode detection,  loop-on pulse generation, long pulse detection, thruster selection, sun pointing mode.

References:

1.             Anil K. Maini, Varsha Agrawal-“Satellite technology: Principles & applications”, John Wiley & Sons Ltd., Publication
2.             Preliminary design review document of on board computer for CARTOSAT-2C, ISRO

3.             Comprehensive design document on spacecraft bus management unit(hardware) of CARTOSAT-2/2A/2B, ISRO

4.             Vinod Kumar, A.K.Kulkarni, K.Parameshwaran, R. Pandiyan and N.K.Malik, “On-Board Autonomy For ISRO Geosynchronous Spacecraft”, IAA-AAS-DyCoSS1-01-10

5.             Yasir, M.; Grillmayer, G.; Roeser, H.-P. "Development of a safe mode attitude control for a FPGA based micro satellite", Multitopic Conference, 2008. INMIC 2008. IEEE International, On page(s): 42 - 46

6.             Marcel J. Sidi, “Spacecraft dynamics and control: a practical engineering approach”, Press Syndicate of the University of Cambridge publication

7.             Andrew Rushton, “VHDL for Logic Synthesis”, John Wiley & Sons, Ltd. Publication,  2011

8.             Peter J. Ashenden, “The Designer’s Guide to VHDL”, Elsevier Inc publication, 2008


233-236

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

47.

Authors:

Kanu Monga, Krishan Kumar

Paper Title:

Performance Evaluation of Various Active Queue Management for Bufferbloat

Abstract:  Due to unprotected large buffers in network devices, the Internet is suffering from high latency and jitter which leads to decreased throughput. The  perseveringly full buffer problem, recently exposed as “bufferbloat” [1] [2] has been observed for decades, but is still with us. As a solution to this problem, several new AQM algorithms CoDel, sfqCoDel and CoDel-DT have been proposed. This paper aims to evaluate these AQM algorithms by carrying out simulations in ns-2 and compares their performance with that of DropTail. sfqCoDel outperforms various peer solutions in variety of scenarios in terms of bottleneck link utilization, packet drop rate and mean queue length..

Keywords:
    AQM, RED, CoDel, Droptail, Bufferbloat .

References:

1.              W. S. M. Allman, V. Paxson, “TCP Congestion Control,” April 1999, RFC 2581.
2.              S. Floyd and V. Jacobson, “Random Early Detection Gateways for Congestion Avoidance,” IEEE/ACM Transactions on Networking, vol. 1, pp. 397–413, August 1993.

3.              M. Hassan and R. Jain, “High Performance TCP/IP Networking: Concepts, Issues and Solutions,” 2004, Pearson Education, Inc.

4.              Braden B. et al., “Recommendations on Queue Management and Congestion Avoidance in  the Internet,” April 1998, RFC 2309.

5.              J. Gettys, “Bufferbloat: Dark Buffers in the Internet,” IEEE Internet Computing Magazine, vol. 15, p. 96, June 2011.
6.              “Bufferbloat Project,” 2011. [Online]. Available: http://www.bufferbloat.net
7.              S. Floyd, “RED: Discussions of Setting Parameters,” November 1997. [Online].  Available:http://www.icir.org/floyd/REDparameters.txt

8.              S. Floyd, R. Gummadi, and S. Shenker, “Adaptive RED: An Algorithm for Increasing the Robustness of RED’s Active Queue Management,” Tech. Rep., August 2001.

9.              K. Zhou, K. L. Yeung, and V. O. K. Li, “Nonlinear RED: a simple yet efficient Active Queue Management Scheme,” Computer Networks, vol. 50, pp. 3784–3794, December 2006. [Online]. Available: http://portal.acm.org/citation.cfm?id=1228646.1228661

10.           T. O. Lakshman, T. V. Lakshman, and L. Wong, “SRED: Stabilized RED,” in Proceedings   of  INFOCOM, 1999, pp. 1346–1355. 

11.           K. Nichols and V. Jacobson, “Controlling Queue Delay,” ACM Queue Magazine: Networks, vol. 10, no. 5, pp. 68–81, May 2012. [Online]. Available:

12.           http://queue.acm.org/detail.cfm?id=2209336  

13.           Jacobson, “Kathie Nichols CoDel,” Vancouver, Canada, July 2012, IETF-84 Transport Area Open Meeting.

14.           Dipesh M. Raghuvanshi, B. Annappa, and Mohit P. Tahiliani. ”On the Effectiveness of CoDel  for Active Queue Management.” In Proceedings of Third International Conference on Advanced Computing & Communication Technologies, ACCT ’13, pages 107-114.       IEEE Computer Society, 2013.

15.           T. Sharma, “Controlling queue delay (codel) to counter the bufferbloat problem in internet," INPRESSCO International Journal of Current Engineering and
Technology, 2014.

16.           Paul E. McKenney and Dave Tht.”SFQ on Steroids” Retrived from    http://snapon.lab.bufferbloat.net/d/lwn/SFQ2012/FQ-Codel.htmlx (January 7, 2013)

17.           V. P. Rao, M. P. Tahiliani, and U. K. K. Shenoy, “Analysis of sfqcodel for active queue  management," in Applications of Digital Information and Web Technologies(ICADIWT), 2014 Fifth International Conference on the, pp. 262-267, IEEE, 2014.

18.           G. White, “Active queue management in docsis 3.1 networks,”  Communications Magazine, IEEE, vol. 53, no. 3, pp. 126-132, 2015.

19.           “The Network Simulator - ns-2 Project.” [Online]. Available: http://www.isi.edu/nsnam/ns/
 

237-241

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

48.

Authors:

Rajesh Kumar, Pinky Ramchandra Shinde

Paper Title:

Computer Network - IP Address & Subnetting

Abstract:   The next-generation Internet Protocol, initially known as IP Next Generation (Ipng), and then later as IPv6, has been developed by the Internet Engineering Task Force (IETF) to replace the current Internet Protocol (also known as IPv4). which offers 2128 possible addresses  To enable the integration of IPv6 into current networks, several transition mechanisms have been proposed by the IETF IPng Transition Working Group. This work examines and empirically evaluates two transition mechanisms, namely IPv6 to IPv4 tunneling and dual-stack mechanism, as they relate to the performance of IPv6. The primary focus of this paper is to compare and analyze IPv4 and IPv6 networks, study their characteristics and header formats. The paper also attempts to outline the key deployment issues and security-related challenges which are being faced and dealt with during the migration process.

Keywords:
IP address, Subnet, IPV4, IPV6, Multicast Address, Unicast Address,  6-over-4, encapsulation, tunneling,

References:

1.                http://inetcore.com/project/ipv4ec/index_en.html.
2.                http://www.omnisecu.com/tcpip/ipv6/differences-between-ipv4-and- ipv6.php.

3.                "IPv6 Headers", Online: http://www.cu.ipv6tf.org/literatura/chap3.pdf, chapter 3, pp. 40-55, Des 12 1997.

4.                T. Dunn, “The IPv6 Transition,” IEEE Internet Computing, Vol.6, No.3, May/June 2002, pp.11-13

5.                IPv6 users’ site: http://www.ipv6.org.

6.                http://www.juniper.net/techpubs/en_US/junose14.2/information-products/topic-collections/swconfig-ip ipv6/index.html? topic-64529.html.

7.                http://ipv6security.wikia.com/wiki/Ipv6_header

8.                IETF IPv6 Transition Working Group, http://www.6bone.net/ngtrans.

9.                http://en.wikipedia.org.

10.             http://www.cybertelecom.org/dns/ipv6_transition.htm.

11.             RFC 4213, Basic Transition Mechanisms for IPv6 Hosts and Routers.

12.             http://www.gao.gov/new.items/d05471.pdf.

13.             RFC 3513: Internet Protocol Version 6 (IPv6) Addressing Architecture .

14.             RFC 2893: Transition Mechanisms for IPv6 Hosts and Routers.

15.             RFC 3596: DNS Extensions to Support IP Version 6 .

16.             www.linecity.de/INFOTECH_ACS_SS04/acs4_top_4.pdf.

17.             Ali, AmerNizar Abu. "Comparison study between IPV4 & IPV6." (2012).

18.             Dutta, Chiranjit, and Ranjeet Singh. "Sustainable IPv4 to IPv6 Transition."International Journal 2.10 (2012).

19.             Doshi, Jinesh, et al. "A Comparative Study of IPv4/IPv6 Co-existence Technologies."


242-246

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html

49.

Authors:

Anwaar Ahmad Wani, Gowher Mushtaq

Paper Title:

A Survey on NFC (Near Field Communication) and FFC (Far Field Communication) With Respect To RFID (Radio Frequency Identification) for Next Generation Network Infrastructure

Abstract:    This paper gives us the comprehensive analysis of security with respect to RFID (radio frequency identification) considering the Next Generation smartphone attributes i.e. NFC and FFC. The electromagnetic field that outlines the RFID antenna can be divided into two parts NFC & FFC; both are based on existing standards of the radio frequency identification network framework. NFC (near field communication) is a set of principles for Smartphone and alike devices to establish Radio Communication with each other. In this study we will try to survey the critical issues of NFC and FFC to find out the updated implementation issues for the Next Generation network infrastructures.

Keywords:
  RFID (radio frequency identification), NFC, FFC, Smartphone, Electromagnetic field, Next Generation.

References:

1.             Nandita Srivastava, “RFID Introduction, Present and Future applications and Security Implications” MSEE Student George Mason University.
2.             Charles Mutigwe and Farhad Aghdasi, “Research Trends in RFID Technology” School of Electrical and Computer Systems Engineering Central University of Technology, Free State, South Africa.

3.             HUSSEIN AHMAD AL-OFEISHAT, MOHAMMAD A.A.AL RABABAH, “Near Field Communication ( NFC)”  IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.2, February 2012

4.             K.Preethi, Anjali Sinha, Nandini “Contactless Communication through Near Field Communication”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012.

5.             Gowher Mushtaq, Shashank Singh, Neeraj Kumar Tiwari, Seemab Rasheed, Yogesh pal, “ Radio Frequency Identification Upon Near Field Communication and Far Field Communication For Next Generation Wireless Network Infrastructures ”. Trasactions on Networks and Communications Society for Science and Education
United Kingdom Volume 3, Issue 3, 9 May 2015.

6.             Wan Khairuzzaman, Wan Ismail , Paul Chan Hong Kit , Nora Buhari, Azlina Muzaini. “Acceptance of Smartphone in Enhancing Patient-Caregivers Relationship” J. Technol. Manag. Innov. Volume 7, Issue 3, 2012.

7.             Weifeng  ,Sun Guoqiang,  Zhang Jingjing  Zhou,” Next-Generation Internet and Communication”, Jun 3. Doi:  10.1155/2014/342471  PMCID: PMC4065677, Published online 2014.

247-255

www.blueeyesintelligence.org/attachments/File/fee/2checkout_download.html