International Journal of Engineering and Advanced Technology(TM)
Exploring Innovation| ISSN:2249-8958(Online)| Reg. No.:61902/BPL/CE/2011| Published By BEIESP| Impact Factor: 5.02
Publication Fee
Privacy Policy
Associated Journals
Frequently Asked Questions
Contact Us
Volume-5 Issue-6 Published on August 30, 2016
Volume-5 Issue-6 Published on August 30, 2016

 Download Abstract Book

S. No

Volume-5 Issue-6, August 2016, ISSN:  2249-8958 (Online)
Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. 

Page No.



Greeshma T S, Subu Surendren

Paper Title:

Community Detection on Social Network – A Survey

Abstract: Social network is an important application in the internet which represent the geographically dispersed users. Social network provides a variety of methods for explaining patterns and entities. Social networks are mostly represented as graphs,   which contain nodes and edges. Nodes are used to represent actors such as people and organizations whereas edges show the relationship between these nodes. Several data sources involved in the social network forms communities which work in self-descriptive manner.  A collection of nodes which are connected by edges with high similarity is called a community. The community detection in social network, intend to partition the the graph with dense region which correspond to closely related entities. The selection of data sources and determination of community detection approaches can enhance the accuracy, efficiency and scalability of community. In this survey, different community detection approaches are discussed.

social network, community detection, community structure


1.       Michel Plantic, Michel Crampes ,"Survey on Social Community Detection", Springer Publishers, 25 March 2013.
2.       James P Bagro, "Evaluating Local Community Method in Network ", Journals of Statistical Mechanism Theory and Experience, 2008.

3.       C.C Aggarwal, H.Wang,"Survey of clustering algorithm for graph data managing and Mining Graph Data ",Springer, 2010.

4.       A.Pothen,"Graph Partitioning Algorithm with Application to Scientific Computing ", Springer, 1997.

5.       M.Girvan and M.E.Newman ,"Community Structure in Social and Biological Networks", Proceeding of National Academy of Science, June 11,2002.

6.       A.Hasian and M.J Zahi,"A Survey of Link Prediction in Social Network", Springer , March 11,2011.

7.       J.Han,M.Konnber and J.Pei,"Datamining Concepts and Techniques", Morgen Kaufmann,2006.

8.       R.Xu and D.Wunsch,"Survey of Clustering Algorithm ",Neural Network ,IEEE Transaction, May 2005.

9.       N.F.Chikki,B.Rothenburger and N.Aussenac Gilles," Combining Link and Content for Community detection : a discriminative approach", Proceedings of 15th ACM SIGMM workshop on Social Media, June 28,2009.

10.    F.Moser, R.Ge and M. Ester,"Joint Cluster Analysis of Attribute and Relationship Data without a -prior-specification of number of clusters" Proceedings of 13th ACMSIGDD International Conference on Knowledge Discovery andDatamining, August 07, 2007.

11.    S.Fortunate,"Community Detection in Graph", Physics report ,2009.

12.    S.Papadopacelos, Y.Kompatsiaris,A.Vakali, and P.Spyridones, "Community Detection in Social Media ", Datamining and Knowledge Discovery, June 14,2011.

13.    Yangyang Li,Ruachen Liu and Jiamhe Wu, "A Spectral Clustering Based Adapive Hybrid Multionjective Harmony Search Algorithm for Community Detection ", WCC12012 IEEE World Congress on Computational Intelligance, June 15,2012.

14.    Deepjyoti Chaudhery, Saprativa Bhattachayie , Anirban Das,"An Empirical Study of Community and Sub community Detection in Social Network Applying Newmann Girvan Algorithm," Emerging Trends and Application in Computer Science ,Sep 14,2013.

15.    Ganjaliyev.F," New Method for Community Detection in Social Network Extracted from the Web" , Problems of Cyberneties and Information ,Sep 14, 2012.

16.    Michael Ovelganne ,"Distributed Community Detection in Website Network",Advance in Social Network Analysis and Mining ,IEEE,  Aug 28, 2013.

17.    Guo-Jun Qil,Charu C,Aggarwal and Thomas Huangl ," Community Detection with Edge Content in Social Media Network ", Data Engineering ,IEEE , April 1,2012.

18.    Yomna M.ElBarawy, Ramedan F Mohammad and Naveen I Ghali," Improving Social Network Community Detection Using DBSCAN Algorithm" , Computing Application and Research ,Jan 20,2014.

19.    Ahmed Ibrahem Hafez, Abaul Ella Hassanien , Aly A. Fahm and M.F. Talba, "Community Detection in Social Network by Using Bayesian Network and Expectation Maximization Technique", IEEE , Dec 16,2013.

20.    M .E.J .Newmann ,"Community Structure in Social and Biological Network " IEEE, April 6, 2002.

21.    Hastic , T.R. Tibshirani and J.H Friedmann,"The elements of Statistical Learning," IEEE ,Auguest 2008

22.    A.Y.Ng, M.I.Jordan, Weiss,"On Spectral Clustering Analysis and Algorithm ", Stanford Alhab, 2001.





Diejo Jara, Estefania Salinas, Julio Romero, Michael Valarezo

Paper Title:

Mathematical Modeling to Establish the Balance of Heat in a Capacitor

Abstract:  The teaching-learning process in the field of exact sciences strengthened by the practical activity of a technological nature, in which to facilitate the safe reasoning and concise leads to the application of principles of physics and chemistry as well as updating processes industrial in the field of Mining, Pulp, Forest, Food, Chemical and Process. Which have potentiated a high degree of modelling and automation? This automation involves some advantages that have just moved to the quality and improvement of the final product. In this case, establishing the heat balance in a condenser. Includes ensure both a more competitive cost and simultaneously strengthening formation activity and the mathematical model to determine the hot balance in a capacitor means using parameters dependent pressure define variables as the volume of water and the amount of steam saturation entry and quantified by developed and simplified quantification and analysis of material balance equations. Thus, in this article the calculations used are presented to establish the mathematical modeling for the heat balance in a capacitor, for it was selected and implemented, with teams making and data records, pointing to possible strategies to conceive established the study of the processes of heat transfer and control systems as an integral part of an automation project

 Automation, analytical calculation, mathematical modelling, analytical, design and construction.  


1.    Aplein Ingenieros: Diseño y realización de la sala de control y operaciones de la planta Bilbao Bizkaia Gas. En URL:, (2009)
2.    Beyer, H., Hotzblatt, K.: Contextual design. Defining customer-centered systems. Morgan Kaufmann, San Francisco, (1998)

3.    Constantine, L.L., Loockwood, L.A.D.: Software for use: a practical guide to the models and methods of usage-centered design. Addison-Wesley, (1999)

4.    Good, M., Spine, T.M., Whiteside, J., George, P.: User-derived impact analysis as a tool for ACM, (1986)

5.    Granollers, T.: User centred design process model. Integration of usability engineering and software engineering. Proceedings of INTERACT 2003, Zurich, Suiza, (2003)

6.    Smith., Van Ness. Introducción a la Termodinámica en Ingeniería Química. Editorial McGrawHill. México 1981




Michael Valarezo, Estefania Salinas, Julio Romero, Diejo Jara

Paper Title:

Application of an OPC System for Mineral Extraction in a Copper Mine Laboratory Scale

Abstract:   For their importance in the mining industry of copper in the south of the Ecuador, an application of a system of OPC is presented that transfers the copper mineral extracted using the action of a motor of C.A, which moves a transportable band. The programs MATLAB® and LabVIEW® possess an academic profile and for this reason, they have a very limited use inside this technology OPC. Also, these are part of the school formation of the students of the career of Electromechanical Engineering of the National University of Loja (UNL) in the Ecuador. Keeping in mind that pointed out, these programs will use the mark of the technology OPC in the process of extraction of the copper mineral. Finally, a comparison of the found results with these two programs is made

  Data exchange, OLE, OPC Client / Server, PLC. 


1.        Andariz Automation, «Solución de control para molinos SAG,» [En línea]. Available: [Último acceso: 2015 Mayo 29].
2.        SIEMENS, «Un Sistema de Control de Procesos a la altura del proyecto minero Spence, Tecnología Minera,» 29 Mayo 2015. [En línea]. Available: [Último acceso: 2015 Mayo 29].

3.        ¿. s. p. a. a. u. P. S.-1. m. u. P. A. y. q. s. h. d. t. e. cuenta?, «SIEMENS,» 08 Agosto 2014. [En línea]. Available: [Último acceso: 2015 Mayo 26].

4.        N. Instruments, «Comunicación del S7200 de SIEMENS con OPC Server,» [En línea]. Available:

5.        M. d. Carmen, «Control PID de la velocidad de una banda transportadora para clasificación de objetos,» 2008.

6.        Mathworks, «Mathworks,» [En línea]. Available:

7.        N. Instruments, «National Instruments,» [En línea]. Available: [Último acceso: 10 octubre 2013].

8.        J. O. Caizaluisa, Escritor, Dosificador y Comunicación OPC LabView. [Performance]. Universidad Pontificia Salesiana, 2013.

9.        LabView-OPC-PLC. [Performance]. 2011.

10.     N. Instruments, «Comunicación del S7-200 de Siemens con NI OPC Server 2009 mediante el cable USB/PPI,» NI, 31 Agosto 2011. [En línea]. Available: [Último acceso: 18 Mayo 2015].






Jiin-Yuh Jang, Chien-Nan Lin, Sheng-Chih Chang, Chao-Hua Wang

Paper Title:

The 3-D Numerical Simulation of a Walking Beam Type Slab Heating Furnace with Regenerative Burners

Abstract:    This study investigates the furnace thermal efficiency for a walking-beam type slab heating furnace with regenerative burners. The walking-beam type heating furnace is composed of five zones, namely, flameless, preheating, first heating, second heating and soaking zones with regenerator efficiency 90 %. The furnace uses a mixture of coke oven gas as a fuel to reheat the slabs. The numerical model considers turbulent combustion reactive flow coupled with radiative heat transfer in the furnace. It is shown that with regenerator burners, the furnace thermal efficiency is 72%, which is significantly higher than that of a furnace using the conventional burner without regenerator. Comparison with the in-situ experimental data from steel company in Taiwan shows that the present heat transfer model works well for the prediction of thermal behavior of the slab in the reheating furnace with regenerator burners.

   Reheating Furnace, Combustion, Radiative Heat Transfer, Regenerative burner


1.    T. Ishii, C. Zhang, and S. Suglyama, “Numerical simulations of highly preheated air combustion in an industrial furnace,” Transactions of the ASME, Vol. 120, 1989, pp. 276–284. 
2.    Y. Suzukawa, S. Sugiyama, Y. Hino, M. Ishioka, and I. Mori, “Heat transfer improvement and NOx reduction by highly preheated air combustion,” Energy Convers, Mgmt Vol. 38, No. 10–13, 1997, pp. 1061–1071.

3.    J. G. Kim and K. Y. Huh, “Three-dimensional analysis of the walking-beam-type slab reheating furnace in hot strip mills,” Numerical Heat Transfer A38, 2000, pp. 589–609.

4.    T. Ishii, C. Zhang, and Hino. Y, “Numerical study of the performance of a regenerative furnace,” Heat Transfer Engineering, 23:4, 2002, pp. 23–33.

5.    N. Rafidi and W. Blasiak, “Thermal performance analysis on a two composite material honeycomb heat regenerators used for HiTAC burners,” Applied Thermal Engineering, Vol 25, 2005, pp. 2966–2982.

6.    J. P. Ou, A. C. Ma, S. H. Zhan, J. M. Zhou, and Z. O. Xiao, “Dynamic simulation on effect of flame arrangement on thermal process of regenerative reheating furnace,” J. Cent. South Univ. Technol., 2007.

7.    S. H. Han, D. Chang, and C. Y. Kim, “A numerical analysis of slab heating characteristics in a walking beam type reheating furnace,” International Journal of Heat and Mass Transfer, Vol 53, Issue 19–20, 2010, pp. 3855–3861.

8.    S. H. Han, D. Chang, and C. Huh, “Efficiency analysis of radiative slab heating in a walking-beam-type reheating furnace,” Energy, Vol 36, Issue 2, 2010, pp. 1265–1272.

9.    T. Morgado, P. J. Coelho, and P. Talukdar, “Assessment of uniform temperature assumption in zoning on the numerical simulation of a walking beam reheating furnace,” Applied Thermal Engineering, Vol 76, 2015, pp. 496–508.

10. J. M. Casal, J. Porteiro, J. L. Míguez, and A. Vazquez, “New methodology for CFD three-dimensional simulation of a walking beam type reheating furnace in steady state,” Applied Thermal Engineering, Vol 86, 2015, pp. 69–80.







Nithin V G, Libish T M

Paper Title:

Smart Grid State Estimation by Weighted Least Square Estimation

Abstract:     The smart grid is an advanced power grid with many new added functions and more reliability than the traditional grid. More controlled power flow is enabled in the smart grid by use of features from fields of communication, control system, signal processing etc. Knowing the present condition of the system is critical for signal processing applications and hence more accurate state estimation is important. State of the system along with information about the network topology will give complete information about the power grid network. In this paper the network topology is modeled using the MATPOWER package, a powerful software package of MATLAB. Weighted Least Square (WLS) state estimation is used to develop equations and algorithms for state estimation. The linear state estimation problem is formulated with linear methods using phasor measurement unit (PMU) data. The measurements which are included in the observation vector and also the size of the system (given by number of busses in the system) are important and these features affect the accuracy of the system state estimate. In this paper, state estimates of IEEE standard bus system of different size are stimulated using MATPOWER package. Also state estimates are stimulated, with different measurement parameters in the observation vector and the stimulation result obtained are compared.

Smart Grid, State Estimation, Weighted Least Square Estimation, Modeling of Smart Grid.

1.        M. Sasson, S. T. Ehrmann, P. Lynch, and L. S. Van Slyck, Automatic power system network topology determination,” IEEE Trans. Power App. Syst., vol. PAS-92, no. 1, pp. 610–618, Mar. 1973.
2.        A.G. Phadke and J. S. Thorp, Synchronized Phasor Measurements and Their Aplication, Springer Science + Business Media, 2008.

3.        T. L. Baldwin, L. Mili, M. B. Boisen, Jr., and R. A. Adapa, "Power System Observability with Minimal Phasor Measurement Placement," Power Systems, IEEE Transactions on, vol. 8, pp. 707-715, 1993.

4.        R. D. Zimmerman, C. E. Murillo-S_anchez, and R. J. Thomas, \Matpower: Steady State Operations, Planning and Analysis Tools for Power Systems Research and Education," Power Systems, IEEE Transactions on, vol. 26, no. 1, pp. 12{19, Feb. 2011.

5.        Abur and A. G. Exposito, Power System State Estimation- Theory and Implementation: CRC, 2004.

6.        Yi Huang, Mohammad Esmalifalak, Yu Cheng, Husheng Li, Kristy A. Campbell, and Zhu Han, “Adaptive Quickest Estimation Algorithm for Smart Grid Network Topology Error”, IEEE systems journal, vol. 8, no. 2, June 2014.

7.        Y. Huang, L. Lai, H. Li, W. Chen, and Z. Han, “Online quickest multiarmed bandit algorithm for distributive renewable energy resources,” in Proc. IEEE Conf. Smart Grid Commun., Tainan, Taiwan, Nov. 2012, pp. 558–563.

8.        The Smart Grid: An Introduction, U.S. Department of Energy (DOE), Washington, DC, USA, Sep. 2010.

9.        J. Chen and A. Abur, “Placement of PMUs to enable bad data detection in state estimation,” IEEE Trans. Power Syst., vol. 21, no. 4, pp. 1608–1615, Nov. 2006.

10.     Synchrophasor Based Tracking Three Phase State Estimator and It‟s Applications, A.G. Phadke Virginia Tech, Blacksburg, VA. DOE 2010 Transmission Reliability Program Peer Review, October 19-20, 2010.

11.     R. F. Nuqui and A. G. Phadke, "Phasor Measurement Unit   Placement Techniques for Complete and Incomplete Observability," Power Delivery, IEEE Transactions on, vol. 20, pp. 2381-23




Hamdy Mohamed Soliman

Paper Title:

Sinusoidal PWM to Drive the Induction Motor with Reducing the Torque Ripple and THD

Abstract:   Three phase voltage source inverter are widely used to drive the AC motors as the induction motor. There are many techniques to make the inverter reliable to treatment the AC motor.  From among these techniques, the sinusoidal pulse width modulation. The paper used this technique due to have some advantages as, reduce the total harmonic distortion and torque ripples. Also in this Paper the open and closed loop scalar controls with the sinusoidal pulse width modulation are compared to show the advantages of the closed loop control. The torque ripples and total harmonic distortions is calculated through many modulation index. The PI current controlled is added to the closed loop drive system to minimize the torque ripple and total harmonic distortion this is to show the effect of adding these PIs on the performance overall. 

 Induction motor, PI controller, Scalar control and SPWM.


1.     M.D. Murphy, F.G Turnball: Power electronic control of A.C motors, Pergamon press, 1986.
2.     Bose B.K: Power Electronics and Variable Frequency Drives, IEEE Press, 1997.

3.     W.B Rosink: Analogue control system for A.C motor with PWM variable speed, in proceedings of Electronic Components and Application, Vol. 3, No.1, November 1980, pp. 6-15

4.     B.G. Starr, J.C.F. Van Loon: LSI circuit for AC motor speed control, in proceedings of Electronic Components and Application, Vol. 2, No.4, August 1980, pp. 219-229

5.     Shengxian Zhuang, Xuening Li and Zhaoji Li, “ The application in the speed regulating of asynchronous machine vector frequency changing based on adaptive internal model control (Periodical style),” Journal of University of Electronic Science and Technology of China, vol. 28,no.5, pp.502-504, 1999.

6.     P. L. Jansen and R. D. Lorentz, "Transducerless position and velocity estimation in induction and salient AC machines", IEEE Trans. Ind. Applicat., vol. 31, pp. 240–247, Mar./Apr. 1995.

7.     Pankaj H Zope, Pravin G.Bhangale, Prashant Sonare ,S. R.Suralkar “Design and Implementation of carrier based Sinusoidal PWM Inverter.” International journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering. Vol. 1, Issue 4, October 2012.

8.     “Performance of Sinusoidal Pulse Width Modulation based Three Phase Inverter.” International Conference on Emerging Frontiers in Technology for Rural Area (EFITRA) 2012 Proceedings published in International Journal of Computer Applications® (IJCA).

9.     M. P. Kazmierkowski, and L. Malesani, "Current control techniques for three-phase voltage-source PWM converters: a survey", IEEE Trans. Ind. Electron., vol. 45, no. 5, October, 1998, pp. 691-703.

10.  B. k. Bose, "An adaptive hysteresis-band current control technique of a voltage - fed PWM inverter for machine drive system", IEEE Trans., on Ind. Appl., Vol.IA-37, pp.402-408, 1990

11.  Hamdy Mohamed soliman and S. M. EL. Hakim," Improved Hysteresis Current Controller to Drive Permanent Magnet Synchronous Motors Through the Field Oriented Control", International Journal of Soft Computing and Engineering , Vol. 2, No. 4, September 2012, pp. 40-46.




Abhishek Pratap Singh, Manoj Gupta

Paper Title:

Robust Performance Comparison of Unstable Videos and their Quality Improvement Implementing Block-Based Frame Matching Technique for Obtaining Digital Video Stabilization

Abstract:  In the context of Digital Image stabilization (DIS), based on morphological frame division and comparing, to estimate matching between local and global motion vectors by the means of averaging pixel information of frames; surprisingly proposes an indispensable Digital video stabilization (DVS) technique which can enhance the quality of an input video stream. Videos captured by hand-held devices (e.g. Cell phones, portable camcorders etc.) sometimes appear remarkably shaky hence Digital video stabilization technique can be implemented to refine the video quality by removing unwanted jitters. It’s an important step for several video processing amenities to acquire video stream without intervening jerkiness, eliminating unnecessary camera movements and withdrawing the superfluous inter frame motion between two successive frames. In order to get the stabilized video sequence, first promising step is to check the validity of local motion vector (LMV), and finally global motion vector (GMV) is obtained by averaging to further enhance the reliability. Here low pass filters and moving average filters are used for smoothing estimated motion vectors to get a stabilized sequence. Experiments show that this video stabilization technique is an efficient method to stabilize the input unstable video stream. In this paper we study the digital video stabilization technique with the use of keen motion estimation and finally performance comparison and conclusion of un-stabilized and stabilized video sequence with the efficacy of our technique of digital video stabilization. . 

Digital Video Stabilization (DVS), Digital Image Stabilization (DIS), Inter Frame Motion, Local Motion Vector (LMV), Global Motion vector (GV).


1.        Hansen M.,, “Real time scene stabilization and mosaic construction”. Int. Proc. DARPA Image understanding Workshop, 0-8186-6410-X, 457-465, Monterey, CA, November (1994).
2.        Szeliski R., “Image Alignment and Stitching: A Tutorial,” Technical Report MSR-TR- 2004-92, Microsoft Corp., (2004).

3.        Matsushita Y.,, “Full frame video Stabilization with motion inpainting.”Transactions on Pattern Analysis and Machine Intelligence, 28 (7), 1150-1163, IEEE, July (2006).

4.        Hu1 R.,, “Video Stabilization Using Scale Invariant Features”.11th International. Conference on Information Visualization IV'07., Zurich, 871-877, IEEE, July 4-6 (2007).

5.        Albu F.,, “Low Complexity Global Motion Estimation Techniques for Image Stabilization”, ”, International Conference on Consumer Electronics (ICCE), Las Vegas, NV, 1-2, IEEE, January 9-13 (2008).

6.        Tico M., Vehvilainen M., “Robust Method of Digital Image Stabilization”, International Symposium on Communication, Control and Signal Processing (ISCCSP), St. Julians, 316-321, IEEE, March 12-14 (2008).

7.        Battiato S.,, “A Robust Video Stabilization System By Adaptive Motion Vectors Filtering”, International conference on Multimedia and Expo, Hannover, Germany, 373-376, IEEE, June 23-April 26 (2008).

8.        Bosco A.,, “Digital Video Stabilization through Curve Warping Techniques” Transactions on Consumer Electronics, 54(2), 220-224, IEEE, May (2008).

9.        Kuo T Y., Wang C H., “Fast Local Motion Estimation and Robust Global Motion Decision for Digital Image Stabilization”, International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Harbin, 442-445, IEEE, August 15-17 (2008).

10.     Liu F.,, "Content-Preserving Warps for 3D Video Stabilization," ACM Transactions on Graphics (Proceedings of SIGGRAPH 2009), 28(3), 44:1-44:9, (2009).

11.     Pang D.,, “Efficient Video Stabilization with Dual-Tree Complex Wavelet Transform”, EE368 Project Report, Spring (2010).

12.     Peng X.,, “Robust Digital Image Stabilization Based On Spatial-Location Invariant Criterion”, 37th Annual conference on IEEE Industrial Electronics Society, Melbourne, VIC, 2250-2254, IEEE, November 7-10 (2011).

13.     Li C., Liu Y., “Global Motion Estimation Based On Sift Feature Match For Digital Image Stabilization”, International conference on computer science and network technology, Harbin, China ,2264-2267,IEEE, December 24-26 (2011).

14.     Song C.,, “Robust Video Stabilization Based on Particle Filtering with Weighted Feature Points”, Transactions on Consumer Electronics, 58(2), 570-577, IEEE May (2012).

15.     Okade M., Biswas P., “Fast Video Stabilization In The Compressed Domain”, International conference on Multimedia and Expo, Melbourne, Australia, 1015-1020, IEEE, July 09-13 (2012).

16.     Mohamadabadi B.,, “Digital Video Stabilization Using Radon Transformation”, International conference on Digital Image Computing Techniques and Applications (DICTA),Fremantle, WA, 1-8, IEEE, December 3-5 (2012).

17.     Raimbault F., Incesu Y., “Adaptive Video Stabilization With Dominant Motion Layer Estimation For Home Video And Tv Broadcast”, International conference Image Processing (ICIP), Melbourne, Vic, 3825-3829, IEEE, September 15-18 (2013).

18.     Wang T., Kim T., “An Efficient Video Stabilization System for Low Computational Power Devices”, International Conference on Consumer Electronics (ICCE), Berlin, 73-74,   IEEE, September 9-11 (2013).

19.     Tanakian M.,, “Digital Video Stabilization System by Adaptive Fuzzy Kalman Filtering”, Journal of Information Systems and Telecommunication, 1(4), 223-232, October - December (2013).

20.     Blanc-Talon J.,, “Automatic Feature-Based Stabilization of video with Intentional Motion through a Particle Filter” , (Eds. Blanc-Talon, J., Kasiniski, A., Philips, W., Popescu, D., Scheunders, P.), Advanced Concepts for Intelligent Vision Systems, Springer International Publishing,356-370,(2013).

21.     Rawat P., Singhai J., “Efficient Video Stabilization Technique for Hand Held Mobile Videos”, International Journal of Signal Processing and Image Processing and Pattern Recognition, 6(3), 17-31, June (2015).

22.     Bhukjwal D., Pawar B., “Review of Video Stabilization Techniques Using Block Based Motion Vectors”, International Journal Of Advanced Research in Science, Engineering and Technology, 6(3), 1741-1747, March (2016).

23.     Chongwu Tang, Xiaokang Yang, Li Chen, “A fast video stabilization algorithm based on block matching and edge completion”, 13th International Workshop on Multimedia Signal Processing (MMSP),  1-5, IEEE, 2011.




Mohammed Khalid, P. Sajith Sethu

Paper Title:

Video Denoising using Surfacelet Transform By Optimised Entropy Thresholding

Abstract: The primary aim of all video denoising systems is to remove noise from a corrupted video sequence. A video is corrupted often due to the limitations of the acquisition and processing devices. Most of the conventional video denoising schemes employ the technique of motion estimation or the optical flow estimation. Motion estimation is mostly an arduous technique particularly in conditions with lighting variations. Motion estimation step is also worsened due to the aperture problem of the optical flow estimation. This limitation of motion estimation paved the way for wavelet transform based video denoising techniques. Unfortunately, those systems resulted in videos with jittery edges and curves. Surfacelet transform is a potential tool used for the processing of multidimensional data. Video signals, which can be dealt as a different type of 3D signal, can be processed using surfacelet transform which preserves the visual quality and edge information. Entropy thresholding optimized using Artificial Bee Colony(ABC) is used to threshold the surfacelet coefficients which can be used to reconstruct the video signal with improved visual quality and with a higher peak signal to noise ratio (PSNR) and structural similarity(SSIM) index.  

 Surfacelet transform, Artificial Bee Colony Algorithm,Entropy  Threshold, NDFB, PSNR, SSIM  


1.     F. A. Mujica, J.-P. Leduc, R. Murenzi, and M. J. T.Smith, “A new motion parameter estimation algorithm based on the continuous wavelet transform,” IEEE Trans. Image Proc., vol. 9, no. 5, pp. 873–888, May2000.
2.     W. Selesnick and K. Y. Li, “Video denoising using2D and 3D dual-tree complex wavelet transforms,” in Proc. of SPIE conference on Wavelet Applications in Signal and Image Processing X, San Diego, USA, August2003.

3.     M. N. Do and M. Vetterli, “The contourlet transform: an efficient directional multiresolution image representation,” IEEE Trans. Image Proc., vol. 14, no. 12, December 2005.

4.     E. Chang and A. Zakhor, “Subband video coding based on velocity filters,” in Proc. IEEE International Symposium on Circuits and Systems, May 1992.

5.     R. H. Bamberger and M. J. T. Smith, “A filter bank for the directional decomposition of images: Theory and design,” IEEE Trans. Signal Process., vol. 40, no. 4, Apr. 1992, pp. 882–893.

6.     Y. M. Lu and M. N. Do, “Multidimensional Directional Filter Banks and Surfacelets," in IEEE Transactions on Image Processing, vol. 16, no. 4, pp. 918-931, April 2007.

7.     S. Park, “New directional filter banks and their applications in image processing,” Ph.D. dissertation, Georgia Inst. Technol., Atlanta, 1999

8.     Malfait M, Roose D, “Wavelet Based Image Denoising Using a Markov Random Field a Priori Model,” IEEE Transaction on Image Processing, Vol. 6, No. 4, 1997, pp.549-565.

9.     Kazubek M, “Wavelet Domain Image Denoising by Thresholding and Wiener Filtering,” IEEE Signal Processing, Vol. 10, No. 11, 2003, pp. 324-326.

10.  Van De Ville D, Van der Weken D ,Nachtegael M, Kerre E. E., Philips W., and Lemahieu I, “Noise Reduction by Fuzzy Image Filtering,” IEEE Transaction on Fuzzy Systems, Vol. 11, No. 4, 2003,pp. 429-436

11.  Sadhar S. I., and Rajagopalan A. N, “Image Estimation in Film-Grain Noise,”  IEEE Signal Processing Letters, Vol. 12, No. 3, 2005, pp.238-241.

12.  Ozkan M. K., Sezan I., and Tekalp A. M, “Adaptive Motion Compensated Filtering of Noisy Image Sequences,” IEEE Transaction on Circuits and Systems for Video Technology, Vol.3, No. 4, 1993, pp.277-290.

13.  Dugad R., and Ajuha N., “Video Denoising by Combining Kalman and Wiener Estimates,” IEEE International Conference on Image Processing, Kobe, Japan, 1999, pp. 152-161.

14.  Gupta N, Swamy M. N. S, and Plotkin E. I, “Low Complexity Video Noise Reduction in Wavelet Domain,” IEEE 6th Workshop on Multimedia Signal Processing, 2004, pp.  239-242.

15.  Chan T.-W, Au O. C, Chong T. S, and Chau W.S, “A Novel Content-Adaptive Video Denoising Filter,” IEEE ICASSP, Philadelphia, PA, USA, Vol. 2, 2005, pp. 649-652.

16.  S. Das, A Abraham and A Konar, “Particle Swarm Optimization and Differential Evolution Algorithms: Technical Analysis, Applications and Hybridization Perspectives, “Studies in Computational Intelligence (SCI), 2008.




Madhuri Mhaske, Sachin Patil

Paper Title:

An Image Reranking Model Based on Attributes and Visual Features Eliminating Duplication

Abstract: An image search on internet is increasing day by day. Users type keywords in various search engines like Google, Yahoo, Bing etc for retrieval of relevant images. These search engines search the images from large pool of database. But as the keywords entered by user are generally short and ambiguous, different kinds of images are retrieved and sometimes these results are irrelevant. In this paper, semantic approach is proposed to solve this ambiguity. An image search reranking is definitely a superior approach over the text based image search. Using single modality for image searching is not sufficient as the different images have different features. This paper considers both the textual features as well as visual features for reranking. Attributes of images are classified into the groups. Based on those attributes from classifiers and the visual features of the images, each image is represented. The ranking score is used to evaluate the relevance of the image with query image. Hypergraph models these images based on the ranking scores .Content based image retrieval (CBIR) technique is used for extracting visual features. CBIR focuses on the content of the images such as color, texture, shape or any other information related with the images. Duplicate images found in search results are detected and eliminated by using SURF (Speeded Up Robust Feature) technique.

   Attribute, Hypergraph, CBIR, SURF. Etc


1.       Junjie Cai, Zheng-Jun Zha,Meng Wang, Shiliang Zhang, and Qi Tian,” Attribute Assisted Reranking Model Based on Web Image Search”, In Proceedings of the IEEE Transactions of Image Processing VOL. X, NO. XX, 2015,
2.       Jun. Y, D. Tao and M. Wang.,” Adaptive Hypergraph learning and its application in image classification.”,  IEEE Transactions on Image Processing, vol. 21, no. 7, pp. 3262-3272, 2012.

3.       H. Zhang, Z. Zha, Y. Yang, T.-S. Chua, “ Attribute-augmented semantic hierarchy.” In Proceedings of the ACM Conference on Multimedia, 2013.

4.       N. Morioka and J. Wang., “Robust visual reranking via sparsity and ranking constraints.”, Proceedings of ACM Conference on Multimedia,2011.

5.       F. Yu, R. Ji, M-H Tsai, G. Y and S-F. Chang.,” Weak attributes for large-scale image retrieval.” In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2012.

6.       W. H. Hsu, L. S. Kennedy and S.-F. Chang.,” Video search reranking via  information bottle principle.”, In Proceedings of ACM Conference on Multimedia, 2006.

7.       R. Yan, A. G. Hauptmann and R. Jin.,” Multimedia search with pseudorelevance feedback.” In Proceedings of ACM International Conference on Image and Video Retrieval, 2003

8.       X. Tian, L. Yang, J. Wang, Y. Yang, X. Wu and X.-S. Hua.,” Bayesian video search reranking.” Transaction on Multimedia, vol. 14, no. 7, pp.131-140, 2012.

9.       F. Jing and S. Baluja.,”  Visualrank: Applying pagerank to large-scale image search.” IEEE Transaction on Pattern Analysis and Machine Intelligence, vol.30, no.7, pp.1877-1890, 2008.

10.    Siddiquie, R.S.Feris and L. Davis.,” Image ranking and retrieval based on multi-attribute queries.” In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2011.

11.    J. Cai, Z.-J. Zha, W.-G. Zhou, Q. Tian.,”  Attribute-assisted reranking for web image retrieval.” In Proceedings of the ACM International Conference on Multimedia, 2012.

12.    N. Kumar, A. C. Berg, P. N. Belhumeur and S. K. Nayar.,” Attribute and simile classifers for face verification.” In Proceedings of the IEEE International Conference on Computer Vision, 2009.

13.    X. Tang, K. Liu, J. Cui, F. Wen and X. Wang.,” IntentSearch: Capturing User Intention for One-Click Internet Image Search.”,  IEEE Transaction on Pattern Analysis and Machine Intelligence, vol.34, no.7, pp.1342-1353, 2012.







Ronald Alexander Reyes Asanza, José Leonardo Benavides Maldonado

Paper Title:

Identification and Control based on PID and Smith Predictor Applied to a Prototype Crushing

Abstract:  This article discusses the identification of the crushing process, which widely used in copper mining discussed; this is done using the ident tool with MATLAB®. Then apply two strategies to control process one based on PID (Proportional out, integral, derivative) and another on the Smith Predictor, mainly by the big current delay in the process. Finally, the best option is chosen, and the results were shown.

Identification Systems, PID control, Smith Predictor Control,


1.       Santos, L. R. (1999). Inexpensive apparatus for control laboratory experiments using advanced control methodolgies. Recuperado el 15 de 11 de 2014
2.       Moriano, P., & Freddy, N. (Julio/Septiembre de 2012). Modelado y control de un nuevo sistema bola viga con levitación magnética. RIAI (Revista Iberoamericana de Automática e Informártica Industrial), 9(3), 258. Recuperado el 08 de Marzo de 2015

3.       Ljung, L. (1999). System Identification Theory for the user (Second ed.). New Jersey: Prentice Hall . Recuperado el 10 de Noviembre de 2014

4.       Duthoit, V. (2000). Crushing and Grinding (Vol. 9). Balkema-Rotterdam: Louis Primel and Claude Tourenq. Recuperado el 22 de Noviembre de 2014

5.       Weiss, N. L. (1985). Jaw Crushers . (N. Weiss, Ed.) New York, EE-UU: SME Mineral Proceessing Handbook. Recuperado el 21 de Noviembre de 2014

6.       Donovan, J. G. (2003). FRACTURE TOUGHNESS BASED MFracture Toughness Based Models For The Prediction Of Power Consumption, Product Size, And Capacity Of Jaw Crushers. Faculty of the Virginia Polytechnic Institute and, Blacksburg, VA. Recuperado el 26 de Noviembre de 2014

7.       Gupta, S. (2003). Elements of Control Sistems. New Delhi: Prentice-Hall of India.

8.       Dorf, R., & Bishop, R. (2008). Sistemas de Control Moderno. Madrid-España: Pearson Prentice-Hall.

9.       Mathworks. (s.f.). Mathworks. Obtenido de

10.    Aguado, A. (2010). Temas de Identificación de Control Adaptable. Habana, Cuba: ICIMAF.




Chae-sil. Kim, Jae-min. Kim, Chang-min. Keum, Min-jae. Shin

Paper Title:

A Study on the Vibration Reduction in Manufacturing the Deep Groove Holes with the Tool Holders and Sleeves using Design of Experiment (DOE)

Abstract: Deep hole drilling is a machining process with a high ratio of length to diameter (L / D). If the depth is greater than the diameter, vibration frequently occurs at the end portion of the cutting tool resulting in a product with defective hole surface and size. To solve this problem, dampened bars are installed to absorb vibration. Depending on their length, the dampened bars can lower process efficiency. Instead, a mill turret developed with a holder and sleeve could enhance quality and improve productivity while reducing vibration. In this study, an optimized model of a mill turret holder and sleeve was developed to reduce vibration and replace the dampened bar. To optimize the design parameters, a Design of Experiment (DOE) was used. A finite element analysis was performed using ANSYS. Using Modal analysis and Harmonic analysis, the control factors affecting stress and displacement were examined using a derived signal to noise (S/N) ratio.

 Taguchi Method, Mill turret tool holder, Modal Analysis, Harmonic Analysis


1.    W. S. Yoo, Q. Q. Jin and Y. B. Chung, “A Study on the Optimization for the Blasting Process of Glass by Taguchi Method,” Journal of society of Korea Industrial and Systems Engineering Vol.30, No. 2, pp. 8 – 14, June 2007.
2.    W. G. Jang, “Optimal Design of the Front Upright of Formula Race Car Using Taguchi’s Orthogonal Array,”    Journal of society of Korea Society of Manufacturing Technology Engineers Vol. 22, No. 1, pp. 112 – 118, 2013.




Vineeth Teeda, K.Sujatha, Rakesh Mutukuru

Paper Title:

Robot Voice A Voice Controlled Robot using Arduino

Abstract:  Robotic assistants reduces the manual efforts being put by humans in their day-to-day tasks. In this paper, we develop a voice-controlled personal assistant robot. The human voice commands are taken by the robot by it’s own inbuilt microphone. This robot not only takes the commands and execute them, but also gives an acknowledgement through speech output. This robot can perform different movements, turns, wakeup/shutdown operations, relocate an object from one place to another and can also develop a conversation with human. The voice commands are processed in real-time, using an offline server. The speech signal commands are directly communicated to the server using a USB cable. The personal assistant robot is developed on a micro-controller based platform. Performance evaluation is carried out with encouraging results of the initial experiments. Possible improvements are also discussed towards potential applications in home, hospitals, car systems and industries.

  Robotic assistants, operations, wakeup/shutdown, USB cable, personal assistant and industries, systems, Performance


1.    A Voice-Controlled Personal Robot AssistantAnurag Mishra, Pooja Makula, Akshay Kumar, Krit Karan and V.K. Mittal, IIIT, Chittoor, A.P., India.
2.    H.Uehara,H. HigaandT.Soken,“A Mobile Robotic Armfor people with severe disabilities”, International Conference on Biomedical Robotics and Biomechatronics (BioRob), 3rd IEEE RAS and EMBS , Tokyo, pp. 126- 129, September 2010, ISSN:2155-1774.

3.    David Orenstein, “People with paralysis control robotic arms using brain", (Last viewed on October 23, 2014).

4.    Lin. H. C, Lee. S. T, Wu. C. T, Lee. W. Y and Lin. C. C, “Robotic Arm drilling surgical navigation system”, International conference on Advanced Robotics and Intelligent Systems (ARIS), Taipei, pp. 144-147, June 2014.

5.    Rong-Jyue Wang, Jun-Wei Zhang, Jia-Ming Xu and Hsin-Yu Liu, “The Multiple-function Intelligent Robotic Arms”, IEEE International Confer- ence on Fuzzy Systems, FUZZ-IEEE, Jeju Island, pp. 1995 - 2000, August 2009, ISSN:1098-7584.

6.    "Programming Arduino Getting Started with Sketches". McGraw-Hill. Nov 8, 2011. Retrieved 2013-03-28.


8.    The National Staff, “Robot arm performs heart surgeries at Sharjah hospital", surgeries-at-sharjah-hospital (Last viewed on November 13, 2014).




Nizar Hussain M.

Paper Title:

Analytic Hierarchy Process based Methodology for Ranking Healthcare Management Information Systems

Abstract:  Ranking of Healthcare Management Information System (HMIS) help practitioners to select the best from the trivial many for the success of the organization. The objective of this study is to rank the CSF of HMIS using a suitable Multi-Criteria Decision Making technique (MCDM). Here, Analytic Hierarchy Process (AHP) is the tool used to determine the relative importance of the CSF in influencing the adoption and use of HMIS. In order to rank the factors, this study is planned and performed in two stages. At the first stage to identify the critical success factors of HMIS, a through literature review is made. At the second stage, a pair wise comparison is designed based on AHP method. The weightage got from AHP can also be used for ranking of various HMIS installations in different hospitals.

   Critical Success Factors, Healthcare Management Information System, Multi Criteria Decision Making, Analytic Hierarchy Process


1.          Al Farsi, M., and West, D. J., Jr., Use of electronic medical records in Oman and physician satisfaction. J. Med. Syst. 30:17–22, 2006.
2.          Alquraini, H., Alhashem, A.M., Shah, M.A., Chowdhury, R.I., Factors influencing nurse's attitudes towards the use of computerized health information systems in Kuwaiti hospitals, J. Adv. Nurs. 57 (4) (2007) 375–378.

3.          Barbeite, F.G., E.M. Weiss, Computer self-efficacy and anxiety scales for an Internet sample: testing measurementequivalence of existing measures and development of newscales, Comput. Hum. Behav. 20 (1) (2004) 1–15.

4.          Barsukiewicz, C. K., Computerized medical records: physician response to new technology. The Pennsylvania State University, Pennsylvania, 1998.

5.          Bedard, J.C., C. Jackson, M.L. Ettredge, K.M. Johnstone, The effect of training on auditors’ acceptance of an electronic work system, Int. J. Account. Inform. Syst. 4 (2003) 227–250.

6.          Bhattacherjee, A., & Hikmet, N. (2008). Reconceptualizing organizational support and its effect on information technology usage: evidence from the health care sector. The Journal of Computer Information Systems, 48(4), 69-75.

7.          Brady, M. K., Cronin, J. J., & Brand, R. R. (2002). Performance-only measurement of service quality: A replication and extension. Journal of Business Research, 55(1), 17–31. doi:10.1016/S0148- 2963(00)00171-5

8.          Buss, M.D.J., 1983. How to rank computer projects. Harvard Business Review 61 (1), 118–125.

9.          Can U ¨ nal and Mu¨ cella G. Gu¨ner, Selection of ERP suppliers using AHP tools in the clothing industry, International Journal of Clothing Science and Technology, Vol. 21 No. 4, 2009, pp. 239-251.

10.       Chau, P. (2001). Influence of computer attitude and self-efficacy on IT usage behavior. Journal of End User Computing, 13(1), 26-33.

11.       Cheng, G. Y., Educational workshop improved information seeking skills, knowledge, attitudes and the search outcome of hospital clinicians: a randomised controlled trial. Health Info. Libr. J. 20(Suppl 1):22–33, 2003.

12.       Chin, K. S., Xu, D. L., Yang, J. B., & Lam, J. P. K. (2008). Group-based ER–AHP system for product project screening. Expert Systems with Applications, 35(4), 1909–1929.

13.       Chisolm, D. J., McAlearney, A. S., Veneris, S., Fisher, D., Holtzlander, M., and McCoy, K. S., The role of computerized order sets in pediatric inpatient asthma treatment. Pediatr. Allergy Immunol. 17:199–206, 2006.

14.       Connelly, D. P., Werth, G. R., Dean, D. W., Hultman, B. K., and Thompson, T. R., Physician use of an NICU laboratory reporting system. Proc. Annu. Symp. Comput. Appl. Med. Care. 8–12, 1992.

15.       Crosson, J. C., Isaacson, N., Lancaster, D., McDonald, E. A., Schueth, A. J., DiCicco-Bloom, B., Newman, J. L., Wang, C. J., and Bell, D. S., Variation in electronic prescribing implementation among twelve ambulatory practices. J. Gen. Intern. Med. 23:364– 371, 2008.

16.       Crowe, B., and Sim, L., Implementation of a radiology information system/picture archiving and communication system and an image transfer system at a large public teaching hospital - Assessment of success of adoption by clinicians. J. Telemed. Telecare 10:25–27, 2004.

17.       Cumbers, B. J., and Donald, A., Using biomedical databases in everyday clinical practice: the Front-Line Evidence-Based Medicine project in North Thames. Health Libr. Rev. 15:255– 265, 1998.

18.       D’Alessandro, D. M., Kreiter, C. D., and Peterson, M. W., An evaluation of information-seeking behaviors of general pediatricians. Pediatrics 113:64–69, 2004.

19.       De Lone, W. H., E.R. McLean, The DeLone and McLean model of information systems success: a ten-year update, Journal of Management Information Systems 19 (4) (2003).

20.       Di Pietro, T., Coburn, G., Dharamshi, N., Doran, D., Mylopoulos, J., Kushniruk, A., Nagle, L., Sidani, S., Tourangeau, A., Laurie- Shaw, B., Lefebre, N., Reid-Haughian, C., Carryer, J., and McArthur, G., What nurses want: diffusion of an innovation. J. Nurs. Care Qual. 23:140–146, 2008.

21.       Eley, D., Hegney, D., Wollaston, A., Fahey, P., Miller, P., McKay, M., and Wollaston, J., Triage nurse perceptions of the use, reliability and acceptability of the Toowoomba Adult Triage Trauma Tool (TATTT). Accident Emerg. Nurs. 13:54–60, 2005.

22.       Firby, P. A., Luker, K. A., and Caress, A. L., Nurses’ opinions of the introduction of computer-assisted learning for use in patient education. J. Adv. Nurs. 16:987–995, 1991.

23.       Galligioni, E., Berloffa, F., Caffo, O., Tonazzolli, G., Ambrosini, G., Valduga, F., Eccher, C., Ferro, A., and Forti, S., Development and daily use of an electronic oncological patient record for the total management of cancer patients: 7 years’ experience. Ann. Oncol. 20:349–352, 2009.

24.       Gillingham, W., A. Holt, J. Gillies, Hand-held computers in health care:what software programs are available? The New Zealand Medical Journal 115 (1162) (2002).

25.       Goodhue, D. L., & Thompson, R. L. (1995). Task-technology fit and individual performance. Manage¬ment Information Systems Quarterly, 19(2), 213–236. doi:10.2307/249689

26.       Hains, I. M., Fuller, J. M., Ward, R. L., and Pearson, S. A., Standardizing care in medical oncology: are Web-based systems the answer? Cancer 115:5579–5588,

27.       Hanafizade, P., Ghafori Rayni, S.A., 2007 "Critical Success Factor in Enterprise Strategic Planning for Information Systems ", Iran Economic Bulletin, Vol. 7 No. 26.

28.       Hasan, B., The influence of specific computer experiences on computer self-efficacy beliefs, Comput. Hum. Behav. 19 (4) (2003) 443–450.

29.       Haynes, R. B., McKibbon, K. A., Walker, C. J., Ryan, N., Fitzgerald, D., and Ramsden, M. F., Online access to MEDLINE in clinical settings. A study of use and usefulness. Ann Intern Med. 112:78–84, 1990.

30.       Hier, D. B., Rothschild, A., LeMaistre, A., and Keeler, J., Differing faculty and housestaff acceptance of an electronic health record one year after implementation. Medinfo 11:1300– 1303, 2004.

31.       Hortman, P.A., Thompson, C.B., Evaluation of user interface satisfaction of a clinical outcomes database, Comput. Inform. Nurs. 23 (6) (2005) 301–307.

32.       Hou, I. C., Chang, P., and Wang, T. Y., Qualitative analysis of end user computing strategy and experiences in promoting nursing informatics in Taiwan. Stud. Health Technol. Inform. 122:613–615, 2006.

33.       Igbaria, M., & Iivari, J. (1995). The effects of self-efficacy on computer usage. Omega International Journal of Management Science, 23(6), 587–605. doi:10.1016/0305-0483(95)00035-6

34.       Ioannis N. Lagoudis*, Maria B. Lekakou and Helen A. Thanopoulou, Evaluating ferry services through an AHP estimated KPI system: a focus on central Aegean, Int. J. Decision Sciences, Risk and Management, Vol. 3, Nos. 1/2, 2011.

35.       Joos, D., Chen, Q., Jirjis, J., and Johnson, K. B., An electronic medical record in primary care: impact on satisfaction, work efficiency and clinic processes. AMIA Annu. Symp. Proc. 394–398, 2006.

36.       Jose L. Salmeron, Ines Herrero, An AHP-based methodology to rank critical success factors of executive information systems, Computer Standards & Interfaces 28 (2005) 1 –12

37.       Jousimaa, J., Kunnamo, I., and Makela, M., An implementation study of the PDRD primary care computerized guidelines. Scand. J. Prim. Health Care 16:149–153, 1998.

38.       Kamadjeu, R. M., Tapang, E. M., and Moluh, R. N., Designing and implementing an electronic health record system in primary care practice in sub-Saharan Africa: a case study from Cameroon. Inform. Prim. Care. 13:179–186, 2005.

39.       Keshavjee, K., Troyan, S., Holbrook, A. M., and VanderMolen, D., Measuring the success of electronic medical record implementation using electronic and survey data. Proc. AMIA Symp. 309–313, 2001.

40.       Ketelhohn,W.,1998 "What is a key success factor?" European Management Journal, Vol. 16, No.3, and pp: 335-40.

41.       Kouri, P., Turunen, H., and Palomaki, T., ‘Maternity clinic on the net service’ and its introduction into practice: experiences of maternity-care professionals. Midwifery 21:177–189, 2005.

42.       Lai, F., Macmillan, J., Daudelin, D. H., and Kent, D. M., The potential of training to increase acceptance and use of computerized decision support systems for medical diagnosis. Hum. Fact. 48:95–108, 2006.

43.       Lai, V.S., Trueblood, R.P., Wong, B.K., 1999. Software selection: A case study of the application of the analytical hierarchical process to the selection of a multimedia authoring system. Information & Management 36, 221–232.

44.       Lapointe, L., and Rivard, S., Getting physicians to accept new information technology: insights from case studies. Can. Med. Assoc. J. 174:1573–1578, 2006.

45.       Larcher, B., Arisi, E., Berloffa, F., Demichelis, F., Eccher, C., Galligioni, E., Galvagni, M., Martini, G., Sboner, A., Tomio, L., Zumiani, G., Graiff, A., and Forti, S., Analysis of user satisfaction with the use of a teleconsultation system in oncology. Med. Inform. Internet Med. 28:73–84, 2003.

46.       Lee, J.W., Kim, S.H., 2000. Using analytic network process and goal programming for interdependent information system project selection. Computers & Operations Research 27, 367–382.

47.       Lee, T. T., Mills, M. E., and Lu, M. H., The multimethod evaluation of a nursing information system in taiwan. Comput. Inform. Nurs. 27:245–253, 2009.

48.       Lee, T.T., Lee, T.Y., Lin, P.C., Chang, Factors affecting the use of nursing information systems in Taiwan, J. Clin. Nurs. 50 (2) (2005) 170–178.

49.       Lee, T.T., Yeh, C.H., Ho, L.H., Application of a computerized nursing care plan system in one hospital: Experiences of ICU nurses in Taiwan, J. Adv. Nurs. 39 (1) (2002) 61–67.

50.       Lesley Davis and Glyn Williams, Evaluating and Selecting Simulation Software Using the Analytic Hierarchy Process, Integrated Manufacturing Systems, Vol. 5 No. 1, 1994, pp. 23-32.

51.       Likourezos, A., Chalfin, D. B., Murphy, D. G., Sommer, B., Darcy, K., and Davidson, S. J., Physician and nurse satisfaction with an Electronic Medical Record system. J. Emerg. Med. 27:419–424, 2004.

52.       Lu, Y,  Y. Xiao, A. Sears, J. Jacko, Review and a framework of handheld computer adoption in healthcare, International Journal of Medical Informatics 74 (5) (2005).

53.       Lucas, H.C., Moore Jr., J.R., 1976. A multiple-criterion scoring approach to information system project selection. Infor. 14 (1), 1–12.

54.       Magrabi, F., Westbrook, J. I., and Coiera, E. W., What factors are associated with the integration of evidence retrieval technology into routine general practice settings? Int. J. Med. Inform. 76:701–709, 2007.

55.       Marcy, T. W., Kaplan, B., Connolly, S. W., Michel, G., Shiffman, R. N., and Flynn, B. S., Developing a decision support system for tobacco use counselling using primary care physicians. Inform. Prim. Care. 16:101–109, 2008.

56.       Martinez, M. A., Kind, T., Pezo, E., and Pomerantz, K. L., An Evaluation of community health center adoption of online health information. Health Promot. Pract. 2007.

57.       Mehmert, P.A., Dickel, C.A., Mckeighen, R.J., Computerizing nursing diagnosis, Nurs. Manage. 20 (7) (1989) 24–30.

58.       Ngai, E. W. T., & Chan, E. W. C. (2005). Evaluation of knowledge management tools using AHP. Expert Systems with Applications, 29(4), 889–899.

59.       O’Connell, R. T., Cho, C., Shah, N., Brown, K., and Shiffman, R. N., Take note(s): differential EHR satisfaction with two implementations under one roof. J. Am. Med. Inform. Assoc. 11:43–49, 2004.

60.       Ovretveit, J., Scott, T., Rundall, T. G., Shortell, S. M., and Brommels, M., Improving quality through effective implementation of information technology in healthcare. Int. J. Qual. Health Care 19:259–266, 2007.

61.       Pagliari, C., Clark, D., Hunter, K., Boyle, D., Cunningham, S., Morris, A., and Sullivan, F., DARTS 2000 online diabetes management system: formative evaluation in clinical practice. J. Eval. Clin. Pract. 9:391–400, 2003.

62.       Pare, G., Sicotte, C., and Jacques, H., The effects of creating psychological ownership on physicians’ acceptance of clinical information systems. J. Am. Med. Inform. Assoc. 13:197–205, 2006.

63.       Popernack, M. L., A critical change in a day in the life of intensive care nurses: rising to the e-challenge of an integrated clinical information system. Crit. Care Nurs. Q. 29:362–375, 2006.

64.       Pourasghar, F., Malekafzali, H., Koch, S., and Fors, U., Factors influencing the quality of medical documentation when a paperbased medical records system is replaced with an electronic medical records system: an Iranian case study. Int. J. Technol. Assess. Health Care 24:445–451, 2008.

65.       Pugh, G. E., and Tan, J. K., Computerized databases for emergency care: what impact on patient care? Methods Inf. Med. 33:507–513, 1994.

66.       Rahimi, B., Timpka, T., Vimarlund, V., Uppugunduri, S., and Svensson, M., Organization-wide adoption of computerized provider order entry systems: a study based on diffusion of innovations theory. BMC Med. Inform. Decis. Mak. 9:52, 2009.

67.       Saaty, R.W. (1987) ‘The analytic hierarchy process-what it is and how it is used’, Mathematical Modelling, Vol. 9, Nos. 3–5, pp.161–176.

68.       Saaty, T. L. (1994). How to make decision: the analytical hierarchy process.  Interfaces, 24(6), 19-43.

69.       Saaty, T. L. (1996). The analytic hierarchy process: Planning, priority setting, resource allocation (2nd Ed.), Pittsburg, PA: RWS Publications.

70.       Saaty, T. L. (2008). Decision making with analytic hierarchy process. International Journal of Services Sciences, 1(1), pp. 83-98

71.       Saaty, T.L. and Vargas, L.G. (2000). Models, Methods, Concepts and Applications of the Analytic Hierarchy Process, Boston: Kluwer Academic Publishers.

72.       Saaty, T.L., 1980. The Analytic Hierarchy Process. McGraw- Hill, New York

73.       Santhanam, R., Kyparisis, G.J., 1995. A multiple criteria decision model for information system project selection. Computers & Operations Research 22 (8), 807

74.       Sarker, S., J.S. Valacich, S. Sarker, Technology adoption by groups: a valence perspective, Journal of the Association for Information Systems 6 (2) (2005).

75.       Schniederjans, M.J., Wilson, R.L., 1991. Using the analytic hierarchy process and goal programming for information system project selection. Information & Management 20, 333–342.

76.       Seddon, P. B., & Kiew, M. Y. (1996). A partial test and development of DeLone and McLean’s model of IS success. Australian Journal of Information Systems, 4(1), 90–109.

77.       Sepahvand, R., Arefnezhad, M., Prioritization of Factors Affecting the Success of Information Systems with AHP (A Case study of Industries and Mines Organization of Isfahan Province), International Journal of Applied Operational Research Vol. 3, No. 3, pp. 67-77, Summer 2013.

78.       Simpson, C.A., Weaver, R.L.,  Administrative application of information technology for nursing managers, in: V.K. Saba, K.A. McCormick (Eds.), Essentials of nursing informatics, McGraw Hill, Boston, 2005.

79.       Soar, J., Ayres, D., and Van der Weegen, L., Achieving change and altering behaviour through direct doctor use of a hospital information system for order communications. Aust. Health Rev. 16:371–382, 1993.

80.       Stahl, Michael J, Encyclopedia of health care management, Sage Publications, 2004.

81.       Sutirtha Chatterjee, Suranjan Chakraborty , Saonee Sarker , Suprateek Sarker , Francis Y. Lau, xamining the success factors for mobile work in healthcare: A deductive study, Decision Support Systems 46 (2009) 620–633

82.       Teltumbde, A., 2000. A framework of evaluating ERP projects. International Journal of Production Research 38, 4507–4520.

83.       Thoman, J., Struk, C., Spero, M. O., and Stricklin, M. L., Reflections from a point-of-care pilot nurse group experience. Home Healthc. Nurs. 19:779–784, 2001.

84.       Torkzadeh, G., T.P. Van Dyke, Effects of training on Internet self-efficacy and computer user attitudes, Comput. Hum. Behav. 18 (5) (2002) 479–494.

85.       Travers, D., and Parham, T., Improving information access with an emergency department system. Proc. AMIA Annu. Fall Symp.121–125, 1997.

86.       Tsai, Y.J., Wu, S., Chiang, B.C., Exploring factors affecting the performance of hospital information systems, J. Inf. Manage. 11 (2) (2004) 191–210.

87.       Vanmeerbeek, M., Exploitation of electronic medical records data in primary health care. Resistances and solutions. Study in eight Walloon health care centres. Stud. Health Technol. Inform.110:42–48, 2004.

88.       Varshney, U., Pervasive healthcare, Computer 36 (2) (2003).

89.       Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management Science, 46(2), 186-204. doi: 10.1287/mnsc.

90.       Venkatesh, V., Morris, M. G., Davis, G. B., & Da¬vis, F. D. (2003). User acceptance of information technology: Toward a unified view. Management Information Systems Quarterly, 27(3), 425–478.

91.       Verhoeven, F., Steehouder, M. F., Hendrix, R. M., and van Gemert-Pijnen, J. E., Factors affecting health care workers’ adoption of a website with infection
control guidelines. Int. J. Med. Inform. 78:663–678, 2009.

92.       Walji, M. F., Taylor, D., Langabeer, J. R., 2nd, and Valenza, J. A., Factors influencing implementation and outcomes of a dental electronic patient record system. J. Dent. Educ. 73:589–600, 2009

93.       Whittaker, A. A., Aufdenkamp, M., and Tinley, S., Barriers and facilitators to electronic documentation in a rural hospital. J. Nurs. Scholarsh. 41:293–300, 2009.

94.       Wu, S, Lee, A., Tah, J.H.M.  and Aouad, G., The use of a multi-attribute tool for evaluating accessibility in buildings: the AHP approach, Facilities, Vol. 25 No. 9/10, 2007, pp. 375-389.

95.       Yeh, S. H., Jeng, B., Lin, L.W., Ho, T. H., Hsiao, C. Y., Lee, L. N., and Chen, S. L., Implementation and evaluation of a nursing process support system for long-term care: a Taiwanese study. J. Clin. Nurs. 18:3089–3097, 2009.

96.       Zheng, K., Padman, R., Johnson, M. P., and Diamond, H. S., Understanding technology adoption in clinical care: clinician adoption behavior of a point-of-care reminder system. Int. J. Med. Inform. 74:535–543, 2005.




Nasr Litim, Ayda Baffoun

Paper Title:

Investigation of Acrylic Resin Treatment and Evaluation of Cationic Additive Quality Impact on the Mechanical Properties of Finished Cotton Fabric

Abstract:   Statistical design of experiment (DOE) is an important tool to improve and developed of existing products or processes. This paper investigates the effect of essential finishing factors; curing temperature, curing time, resin, catalyst and cationic additive concentrations on the mechanical properties, especially on 3D ranks of cotton treated fabric with a copolymer acrylic resin. After that, it evaluates the impact of cationic additive class on 3D ranks and mechanical properties loss (breaking strength, breaking elongation and tear strength) of treated fabric with acrylic resin. The results, showed that cationic type effect; firstly (Electroprep) has the best quality on 3D rank of treated fabric and effect a little loss on mechanical properties, secondly (Easy stone super X), whereas (Easystone K) lead to a negatively loss on mechanical properties and gives undesired 3D rank. In order to investigate the causes of resin finish resumption and downgrading of garments in textile industry caused by ingredient concentration in bath resin. The main effect plot, interaction plot and contour plot method applied give to the textile engineer the possibility to predict the effect of resin treatment factors on the final quality desired of 3D rank and preserving the mechanical characteristics of treated fabric.

 Mechanical properties, Cotton, Resin, 3D ranks, Cationic


1.    H. Tavanai1, S. M .Taheri, M. Nasiri. (2005), “Modelling of Colour Yield in Polyethylene Terephthalate Dyeing with Statistical and Fuzzy Regression”, Iranian Polymer Journal, 14 (11), pp 954-967
2.    F. Asim, Mahmood, (2012), “Optimization of process parameters for simultaneous fixation of reactive printing and crease resistant finishing”. Journal of Textile and apparel Technology Management, 7(3).

3.    Y. H. El Hamaky, S. Tawfeek, D. F. Ibrahim, D. Maamoun, S. Gaber (2007), “Printing Cotton Fabrics with Reactive Dyes of High Reactivity from an Acidic Printing Paste”, Coloration Technology, 123(6), pp 365-373.

4.    M . S. Hassan (2009), “Crease Recovery Properties of Cotton Fabrics Modified by Urea Resins under the Effect of Gamma      Irradiation”. Radiation Physics and Chemistry. 78(5), pp 333-337.

5.    W.Udomkichdecha, S.Kittinaovarat, U.Thanasoonthornroek, P. Potiyaraj, and P.Likitbanakorn, (2003), Textile Research Journal. 73, 401.

6.    Pastore and P. Kiekens (2000), “Surface Characteristics of Fibers and Textiles”, Surfactant Science Seriesm Vol. 94, pp.3-30

7.    C.R. Hicks. (1982), ”Fundamental concepts in the design of experiments”, 3rd Ed, CBC College Publishing.

8.    W. Weishu and Y. Charles Q, AIP Conference Proceedings, Athens, August, 1997, Georgia, USA, pp 10-15.

9.    Cooke, T.F. and Weigmann, H.D., (1982).Textile Chemical Coloris. Vol.14, pp 100-106.





Mohammad Reza Elyasi, Mahmoud Saffarzade, Amin Mirza Boroujerdian

Paper Title:

A PLS/SEM Approach Risk Factor Analysis in Road Accidents Caused by Carelessness

Abstract: Many developed countries in line with the increase in road transport, and consequently an increase in the rate of accidents, are searching for effective ways to reduce road accidents. In the area of traffic safety, in order to identify factors contributing to accidents, conventional methods which generally based on regression analysis are used. However, these methods only detect accidents in different roads, but cannot clearly identify the cause of accidents and define the relationship between them. In addition, the methods used have two major limitations: 1- Postulate the structure of the model, and, 2- Observability of all variables. Due to the limitations discussed and also due to the complex nature of human factors, and the impact of road conditions, vehicle and environment on human factors, the aim of this study is to provide a useful tool for defining and measuring road, traffic and human factors, to evaluate the effect of each of them in accidents which caused by carelessness, directly and indirectly by using structural equation modeling with the partial least squares approach. Compared with the regression-based techniques or methods of pattern recognition that only a layer of relationships between independent and dependent variables is determined, the SEM approach provides the possibility of modeling the relationships between multiple independent and dependent structures. Moreover, the ability to use unobservable  hidden variables, by using observable variables would be possible.

  Human factors, Road safety, Road factors; accident analysis; Partial Least Square (PLS); Structural Equation Modeling (SEM).


1.       World health organization(WHO), Road traffic injuries, Fact sheet N°358, Updated October ; 2015.
2.       Fell, J. C., & Freedman, M. (2001). The relative frequency of unsafe driving acts in serious traffic crashes. Washington, DC: National Highway Traffic Safety Administration.‏

3.       Lord D, Geedipally S.R, Guikema  S.  Extension of the application of Conway-Maxwell-Poisson models: analyzing traffic crash data exhibiting under-dispersion. Submitted to the 89th Annual Meeting of the Transportation Research Board, Washington, D.C; 2009. [10] Anastasopoulos P.C, Mannering F.L. A note on modeling vehicle accident frequencies with random-parameters count models. Accident Analysis and Prevention 41(1); 2009, 153-159.

4.       Lord D, Washington S.P, Ivan J.N. Further notes on the application of zero inflated models in highway safety. Accident Analysis and Prevention 39(1); 2007, 53-57.

5.       Oh J, Washington S.P, Nam D. Accident prediction model for railway-highway interfaces. Accident Analysis and Prevention 38(2); 2006, 346-56.

6.       Lord D, Mahlawat M. Examining the application of aggregated and disaggregated Poisson-gamma models subjected to low sample mean bias. Transportation Research Record 2136; 2009, 1-10.

7.       Xie Y, Zhang Y, Crash frequency analysis with generalized additive models. Transportation Research Record 2061; 2008, 39-45.

8.       Shankar V.N, Albin R.B, Milton J.C, Mannering F.L. Evaluating median cross-over likelihoods with clustered accident counts: an empirical inquiry using random effects negative binomial model. Transportation Research Record 1635; 1998, 44- 48.

9.       Hauer E. Statistical Road Safety Modeling. Transportation Research Record 1897; 2004, 81–87.

10.    Anastasopoulos P.C, Mannering F.L. A note on modeling vehicle accident frequencies with random-parameters count models. Accident Analysis and Prevention 41(1); 2009, 153-159.

11.    Lord M, Mannering F. The Statistical Analysis of Crash-Frequency Data: A Review and Assessment of Methodological Alternatives, Forthcoming in Transportation Research, Part A; 2010.

12.    Wood A.G, Mountain L.J., Connors R.D., Maher M.J., Ropkins K. Updating outdated predictive accident models, Accident Analysis and Prevention 55; 2013, 54-66.

13.    Nelson E , Atchley P, Little T. The effects of perception of risk and importance of answering and initiating a cellular phone call while driving. Accident Analysis and Prevention 41 (3); 2009,  438–444.

14.    Geedipally S.R, Lord D. Investigating the effect of modeling single-vehicle and multi-vehicle crashes separately on confidence intervals of Poisson-gamma models. Submitted for publication in Accident Analysis and Prevention; 2009.

15.    N'Guessan A. Analytical Existence of solutions to a system of nonlinear equations with application. Journal of Computational and Applied Mathematics, 234; 2010, 297

16.    Park E.S, Lord D. Multivariate Poisson-lognormal models for jointly modeling crash frequency by severity. Transportation Research Record 2019; 2007, 1-6.

17.    Park E.S, Park J, Lomax T.J. 2010, A fully Bayesian multivariate approach to before after safety evaluation, Accident Analysis and Prevention; 2009, in press.

18.    Park B.J, Lord D. Application of finite mixture models for vehicle crash data analysis. Accident Analysis and Prevention, 41(4); 2009, 683-691.

19.    Malyshkina N.V, Mannering F.L, Tarko A.P. Markov switching negative binomial models: an application to vehicle accident frequencies. Accident Analysis and Prevention 41(2); 2009, 217–226.

20.    Malyshkina N, Mannering F. Zero-state Markov switching count-data models: An empirical assessment. Accident Analysis and Prevention 42(1); 2010, 122-130.

21.    Xie Y, Lord D, Zhang Y. Predicting motor vehicle collisions using Bayesian neural networks: an empirical analysis. Accident Analysis and Prevention 39(5); 2007, 922- 933.

22.    Gang Ren, Zhuping Zhou. Traffic safety forecasting method by particle swarm optimization and support vector machine, Expert Systems with Applications: An International Journal, Volume 38 Issue 8; 2011, 10420-10424.

23.    Pham M.H, Bhaskar A,  Chung E, Dumont A.G. Random forest models for identifying motorway Rear-End Crash Risks using disaggregate data, Intelligent Transportation Systems (ITSC); 2010.

24.    Hamdar Samer H, Mahmassani Hani S, ChenRoger B. Aggressiveness propensity index for driving behavior at signalized intersections, Accident Analysis and Prevention 40; 2008, 315–326.

25.    Qiu lin, Nixon Wilfrid. PERFORMANCE MEASUREMENT FOR HIGHWAY WINTER MAINTENANCE OPERATIONS, IIHR—Hydroscience and Engineering College of Engineering the University of Iowa; , 2009.

26.    Kim K, P Pant, E Yamashita. Measuring Influence of Accessibility on Accident Severity with Structural Equation Modeling. In Transportation Research Record 2236, TRB,
National Research Council, Washington D.C; 2011, pp. 1-10.

27.    Lai S.F. The Accident Risk Measuring Model for Urban Arterials, Paper Presented at the 3rd International Conference on Road Safety and Simulation, Indianapolis, USA; 2011, 14-16.

28.    Atchley P, Atwood S, Boulton A. The choice to text and drive in younger drivers: behavior may shape attitude. Accident Analysis and Prevention 43 (1); 2011, 134–142.

29.    Hassan H. improving traffic safety and drivers’ behavior in reduced visibility conditions, Ph.d dissertation, University of Central florida; 2011.

30.    American Association of State Highway Transportation Officials (AASHTO).(2009), Highway Safety Manual, 1st Edition, Washington, DC.

31.    Wang K, X Qin. Using structural equation modeling to measure single-vehicle crash severity, Transportation Research Record, Report No. 14-0801. TRB, National
Research Council, Washington, D.C; 2014.

32.    Huang Jun-Chih. Research of the Taiwan Fujian area road traffic accident, National Central University, Department of Graduate Institute of Statistics; 2006, Master paper.

33.    Zhang Guangnan, Yau Kelvin K.W, Gong  Xiangpu, Traffic violations in Guangdong Province of China: Speeding and drunk driving, Accident Analysis & Prevention, Vol. 64; 2014, pp.30-40.

34.    Chiou Yu-Chiun. Hwang Cherng-Chwan, Chang Chih-Chin, Fu Chiang, Modeling two-vehicle crash severity by a bivariate generalized ordered probit approach, Accident Analysis & Prevention, Vol. 51; 2013,  pp.176-184.

35.    Elyasi, M.R., Saffarzadeh M, Boroujerdian,A novel dynamic segmentation model for identification and prioritization of black spots based on the pattern of potential for safety improvement. Transportation Research Part A: Policy and Practice, 91; 2016, 346–357.
36.    Milton John C, Shankar Venky N, Mannering Fred L. Highway accident severities and the mixed logit model: An exploratory empirical analysis, Accident Analysis and
Prevention, Volume: 40, Issue: 1; 2008,  pp. 260-266.

37.    Mahmoud Saffarzadeh, Maghsoud Pooryari, Accident Prediction Model Based on Traffic and Geometric Design Characteristics, International Journal of Civil Engineering, Vol.3, No. 2(9-b- 13); 2005.

38.    Ramirez B Arenas, Izquierdo F Aparicio, Fernández C González, Méndez A Gómez. The influence of heavy goods vehicle traffic on accidents on different types of Spanish interurban roads, Accident Analysis & Prevention, Volume 41, Issue 1; 2009, Pages 15–24.

39.    Kwon O.H, Park M.J, Yeo H, Chung K. Evaluating the performance of network screening methods for detecting high collision concentration locations on highways. Accident Analysis and Prevention 51; 2013, 141– 149.

40.    Mirbaha Babak, Saffarzadeh Mahmoud, Noruzoliaee Mohamad Hossein. A Model for Schoolchildren Accidents in the Vicinity of Rural Roads based on Geometric Design & Traffic Conditions,  International Journal of Transportation, No. 1, Vol. 1 ;2012. (9-b- 22).

41.    Samuel C, keren N, shelley M. C. Freeman S.A, frequency analysis of hazardous material transportation incidents as a function of distance from origin to incident location, Journal of loss prevention in the process Industries, 22, pp; 2009, 783-790.

42.    Anastasopoulos P.Ch, Tarko A.P., Mannering F.L.. Tobit analysis of vehicle accident rates on interstate highways. Accident Analysis and Prevention 40 (2); 2008, 768

43.    Wong K., Kwong K., Partial Least Squares Structural Equation Modeling (PLS-SEM) Techniques Using SmartPLS, Marketing Bulletin, Vol. 24, No. 1, 1-32.

44.    Ralph O.M., Basic Principales of Structural Equation Modeling (An Introduction to LISREL and EQS), Springer, 1996.

45.    Tenenhaus M, Esposito Vinzi, V, Chatelin Y M, Lauro C. PLS path modeling. Computational Statistics & Data Analysis, 48(1); 2005, 159–205.

46.    Mueller, R. O. (1999). Basic principles of structural equation modeling: An introduction to LISREL and EQS. Springer Science & Business Media.


48.    Hair J.F,  Ringle, C. M, Sarstedt M. PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2); 2011, 139–151.

49.    Henseler Jorg, M Ringle, Christian, Sinkovics  Rudolf R. The use of Partial least squares path modeling in international marketing, New Challenges to International Marketing Advances in International Marketing, Volume 20; 2009, 277–319.

50.    Fornel C, Larcker D.F. Evaluation structural equation models with unobserved variable and variables and measurement error, journal of technology of marketing research; 1981, 39-50. Cohen, J. (1992). A power primer. Psychological bulletin, 112(1), 155.

51.    Cunningham WA, Preacher KJ, Banaji MR, 2001, Implicit attitude measures: Consistency, stability, and convergent validity, Psychological science 12 (2), 163-170

52.    Iacobucci, D., & Duhachek, A. (2003). Advancing alpha: Measuring reliability with confidence. Journal of consumer psychology, 13(4), 478-487.‏






Raad Farhood Chisab, Begard Salih Hassen, Aassyia Mohammed Ali Jasim Al-A'assam

Paper Title:

Performance of Single Carrier Frequency Division Multiple Access Under Different Channel Cases

Abstract:  Single Carrier Frequency Division Multiple Access (SCFDMA) is currently a favorable tool for uplink broadcast in 4G mobile communications method. It merges the “single carrier frequency domain equalization (SC-FDE)” and “frequency division multiple access (FDMA)” methods. It inserts DFT before OFDMA modulation to drawing the sign from every operator to a subsection of the existing subcarriers. It is a new system joining best of the benefits of OFDMA with the small “Peak-to-Average Power Ratio (PAPR)”. For that aims, it accepted as a promising technique on the uplink of wireless systems. In this paper the performance of SCFDMA was measured under different variable parameter in order to verify the robustness of the system. The system is tested under parameters like modulation type, subcarrier mapping, Doppler frequency, time of sample, second path gain and roll-off factor.



1.       Wafaa Radi, Hesham Elbadawy and Salwa Elramly, “Peak to Average Power Ratio Reduction Techniques for Long Term Evolution- Single Carrier Frequency Division Multiple Access System”, International Journal of Advanced Engineering Sciences and Technologies, , ISSN: 2230-7818, Vol No. 6, Issue No. 2, 230 – 236, 2011.
2.       Masayuki Nakada, Kazuki Takeda and Fumiyuki Adachi, “Channel Capacity of SCFDMA Cooperative AF Relay Using Spectrum Division & Adaptive Subcarrier Allocation”, Proceedings of IC-NIDC2010, 978-1-4244-6853-9/10/IEEE, 2010.

3.       Tae-Won Yune, Jong-Bu Lim, and Gi-Hong Im, “Iterative Multiuser Detection with Spectral Efficient Relaying Protocols for Single-Carrier Transmission”, IEEE Transactions on Wireless Communications, Vol. 8, NO. 7, July 2009.

4.       Zid Souad and Bouallegue Ridha, “SOCP Approach for Reducing PAPR System SCFDMA in Uplink via Tone Reservation”, International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.6, , DOI : 10.5121/ijcnc.2011.3610 157, November 2011

5.       Yibing LI, Xin GUI and Fang YE, “Analysis of BLER Performance for LTE Uplink Baseband Simulation System” Journal of Computational Information Systems” , ,  (2012) 2691–2699,  1553–9105 / 2012.

6.       Pochun Yen and Hlaing Minn, “Low complexity PAPR reduction methods for carrier-aggregated MIMO OFDMA and SC-FDMA systems”, EURASIP Journal on Wireless Communications and Networking 2012, 2012:179,  , 2012.

7.       Gaurav Sikri and Rajni, “A Comparison of Different PAPR Reduction Techniques In OFDM Using Various Modulations”, International Journal of Mobile Network Communications & Telematics (IJMNCT) Vol.2, No.4, , DOI : 10.5121/ijmnct.2012.2406 53, August 2012.

8.       Md. Masud Rana, Jinsang Kim and Won-Kyung Cho, “An Adaptive LMS Channel Estimation Method for LTE SC-FDMA Systems”, International Journal of Engineering & Technology IJET-IJENS Vol: 10 No: 05, 2015.

9.       Uyen Ly Dang, Michael A. Ruder, Robert Schober andWolfgang H. Gerstacker, “MMSE Beamforming for SC-FDMA Transmission over MIMO ISI Channels”, EURASIP Journal on Advances in Signal Processing, Hindawi Publishing Corporation, Volume 2011, Article ID 614571, 11 pages, doi:10.1155/2011/614571, 2011.

10.    Faisal S. Al-kamali,Moawad I. Dessouky, Bassiouny M. Sallam, Farid Shawki and Fathi E. Abd El-Samie, “Carrier Frequency Offsets Problem in DCT-SC-FDMA System: Investigation and Compensation”, International Scholarly Research Network ISRN Communications and Networking, Volume 2011, Article ID 842093, 7 pages, doi:10.5402/2011/842093, 2011.




Anderson Rigoberto Cuenca S, Jose Leonardo Benavides M, Manuel Augusto Pesantez G

Paper Title:

Comparison PID and MPC Control, Applied to a Binary Distillation Column

Abstract: Using binary distillation column in the industry is currently imperative, the reason why the control parameters that are highly nonlinear necessary to apply classic strategies as advanced control and raised here. These techniques are the PID controller and the MPC; the data that are to perform the calculations are of IFAC event whose mixture is alcohol with water. Finally with the help of software MATLAB® / Simulink simulations for comparing which of the two drivers is the best delivery results when controlling the composition on the bottom, top and pressure in binary distillation column performed.

  Chemical Industry, Distillation Columns, MPC (Predictive Control Method), PID Control.


1.       B. Huick, K. D. (2 de Septiembre de 2011). Identification of a Pilot Scale Distillation Column: A Kernel Based Approach. 18 th IFAC World Congress. Recuperado el 16 de 9 de 2014
2.       Borroto, M. A. (2015). Identificación y Control Predictivo de una columna de destilación Etanol-Agua. CIE2015 (pág. 1). Villa Clara: UCLV. Recuperado el 2 de Julio de 2015

3.       Camacho, E., & Berenguel, M. (1997). Robust adaptive model predictive control of a solar plant with bounded uncertainties. Int. J. Adapt. Control Signal Process, vol 11(4), pp. 311-325.

4.       Camacho, E., & Bordons, C. (2004). Model Predictive Control (2nd ed. ed., Vol. XXII). London, England: Springer-Verlag.

5.       Cruz, P. P. (2010). Intligencia Artificial con Aplicaciones a la Ingeniería. México: Alfaomega.

6.       E.J.Davison. (1967). Control of a distillation column with pressure variation (Vol. 45). Toronto, Ontario, Cánada: Trans Institute of Chemical Engineers. Recuperado el 05 de Julio de 2014

7.       Fernández, D. M. (2014). Torre de Destilación. La Habana, La Habana, Cuba. Recuperado el 10 de Julio de 2014

8.       Frejo, D., & Camacho, E. (2012). Global versus local MPC algorithms in freeway traffic control with ramp metering and variable speed limits. IEEE Trans. Intell. Transport. Syst, vol. 13(no.4), pp. 1556-1565.

9.       Gene F. Franklin, J. D.-N. (1991). Control de Sistemas Dinámicos con Retroalimentación. Wilmington , Delaware , E.U.A: Addison-Wesley Iberoamerica.

10.    Hegrenaes, O., & Gravdahl, J. a. (2005). Spacecraft attitude control using explicit model predictive control. Automática, vol 41(no. 12), pp. 2107-2114.

11.    J.J. Téllez Guzmán, J. F.-C. (23 al 26 de Octubre de Ocutbre de 2012). Event-Based LQR Control for Attitude Stabilization of a Quadrotor. XV Congreso Latinoamericano de Control Automático. Recuperado el 28 de Agosto de 2014

12.    Kuo, B. C. (2012). Sistemas de Control Automático. México.

13.    Macías, M. G. (7 de 10 de 2011). Distillation and Absorption . Obtenido de

14.    Maestre, M., de la Peña, D., & Camacho, E. (2009). Distributed MPC: A supply chain case study. in Proc. Conf. Descion Control, pp. 7099-7104.

15.    Nabais, L., Negenborn, R., C, B., & Botto, M. (Oct. de 2013). Setting cooperative relations among terminals at seaports using a multi-agentsystem. Proc. 16th Int IEEE Conf. Intelligent Transportation Systems.

16.    Negenborn, R., Van Overloop, P., Keviczky, T., & De Scutter, B. (2009). Distributed model predictive control of irrigation canals. Netw. Heterogeneus Media, vol. 4(no. 2), 359-380.

17.    Perez, S. (6 de 3 de 2014). Modelos de Estado. Obtenido de

18.    Qin, J., & Badgwell, T. (July de 2003). A survey of industrial model predictive control technology . Control Eng. Pract., vol. 11(no.7), pp. 733-764.

19.    Rawlings, B., & Mayne, D. (2009). Model Predective Control; Theory and Design. Madison: Nob Hill Publishing.

20.    Richalet, A., & Rault, J. (1978). Model Predictive Heuristic control; Applications to industrial processes. Automatica, vol 14(5), pp. 413-428.

21.    Richard C. Dorf, R. H. (2008). Sistemas de Control Moderno. Madrid-España: Pearson Prentice-Hall.

22.    Riverso, R., Farina, M., & Ferrar-Trecate, G. (Oct. de 2013). Plug and Play decentralized model predictive control for linear systems. IEEE Trans. Autom. Control, vol. 58(no. 10), pp.2608-2614.

23.    Rojas, A. (4 de 5 de 2010). Columna de destilación binaria - Parte 1. Obtenido de

24.    Ruíz, V. M. (Costa Rica-2002). Ecuaciones para Controladores PID Universales. Ingeniería, 11-20.


26.    Xia, F., Tian, C., Li, Y., & Sung, Y. (2007). Wireless sensor /actuator network design for mobile control applications. Sensors, vol.7(no. 10), pp.2157-2173.




Sonal Yadav, Sharath Naik

Paper Title:

Shortest Path Computation in Multicast Network with Multicast Capable and Incapable Delay Associated Nodes

Abstract: Multicast transmission results in a bandwidth and cost efficient solution for transmission purpose .If we consider the real life scenario then the nodes considered can either be multicast capable nodes or multicast incapable nodes. In this paper, a method is proposed to increase the success rate of finding the minimum cost path within a given network with both multicast incapable and capable nodes. For this, a real life network is considered with 80 nodes complied within it. The nodes considered can either be multicast capable nodes or multicast capable nodes conforming with real life situations .It is shown that if we make use of algorithm proposed in the paper along with delay association and proper bandwidth consideration then success rate of finding the minimum cost path can be increased up to a significant value

Multicast capable nodes, multicast incapable nodes, minimum cost path


1.       “Cisco Visual Networking Index: Forecast and Methodology, 2009-
2.       2014,”“ paper c11-481360 ns827 Networking Solutions White Paper.html”, Cisco Inc., 2010.

3.       L. Tang, W. Huang, M. Razo, A. Sivasankaran, P. Monti, M. Tacca, and A. Fumagalli, “Computing Alternate Multicast Trees with Maximum Latency Guarantee,” 11th International Conference on High Performance Switching and Routing, 2010.

4.       J. Jannotti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O’Toole, Jr., “Overcast: Reliable Multicasting with an Overlay Network,” in Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4, 2000.

5.       “Extensions to Resource Reservation Protocol - Traffic Engineering (RSVP-TE) for Point-to-Multipoint TE Label Switched Paths (LSPs),”“”, IETF, 2007.

6.       X. Zhang, J. Y. Wei, and C. Qiao, “Constrained Multicast Routing in WDM Networks with Sparse Light Splitting,” Journal of Lightwave Technology, 2000.

7.       G. Gutin, A. Yeo, and A. Zverovich, “Traveling Salesman Should not be Greedy: Domination Analysis of Greedy-Type Heuristics for the TSP,” Discrete Applied Mathematics, 2002.

8.       H. Vardhan, S. Billenahalli, W. Huang, M. Razo, A. Sivasankaran, L. Tang, P. Monti, M. Tacca, and A. Fumagalli, “Finding a Simple Path with Multiple Must-include Nodes,” 17th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis and Simulationof Computer and Telecommunication Systems, 2009

9.       Limin Tang,” Multicast tree computation in networks with multicast incapable nodes” High Performance Switching and Routing (HPSR), 2011 IEEE 12th International Conference

10.    Takashima, E.,” A Method for Distributed Computation of Semi-Optimal Multicast Tree in MANET”, Wireless Communications and Networking Conference, 2007.WCNC 2007. IEEE






CH. Bhanu Prakash, M.N.V.S.A. Sivaram.K, G.H. Tammi Raju, CH.N.V.S. Swamy

Paper Title:

Comparative Experimental study on a Photovoltaic Panel with Low Cost Performance Improvement Techniques

Abstract:  The main objective of our project is to increase the efficiency of the solar panel by removing the heat from it. The photovoltaic (PV) cells suffer efficiency drop as their operating temperature increases especially under high insolation levels. The operating temperature is one of the important factors that can affect the efficiency of the PV panels. We rectified this problem by using two techniques which reduces the temperature of the panel. One is cooling the solar panel by water where heat transfer takes place and reduces the panel temperature and the other is placing the Low E-glass which allows only visible light and reflects the non-visible light. In the solar spectrum heat is produced due to non-visible light, temperature of solar panel is reduced by the reflection of non-visible light. Decrease in temperature of the solar panel results increase in the efficiency.

 Photovoltaic (PV) cells, Efficiency, Cooling, Resistance temperature detector, low E-glass.


1.       J.K. Tonui, Y. Tripanagnostopoulos, "Air-cooled PV/T solar collectors with low cost performance improvements". Solar Energy 81 (4) (2007) 498e511.                                 
2.       W. He, T. T. Chow, J. Ji, et al., “Hybrid Photovoltaic and Thermal Solar-Collector Designed for Natural Circulation of Water,” Applied Energy, Vol. 83, No. 3, 2006, pp. 199-    220.

3.       Z. J. Weng and H. H. Yang, “Primary Analysis on Cooling Technology of Solar Cells under Concentrated Illumination,” Energy Technology, Vol. 29, No. 1, 2008, pp. 16-18.

4.       M. Brogren and B. Karlsson, “Low-Concentrating-Water Cooled PV-Thermal Hybrid Systems for High Latitudes,” 29th IEEE PVSC, New Orleans, May 2002, pp. 1733- 1736.

5.       G. Anderson, P. M. Dussinger, D. B. Sarraf and S. Tamanna, “Heat Pipe Cooling of Concentrating Photovoltaic Cells,” 33rd IEEE Photovoltaic Specialists Conference, San Diego, May 2008, pp.

6.       Raghuraman. P "Analytical predictions of liquid and air photovoltaic/thermal", flat-plate collector performance. J Solar Energy Eng 1981, 103:291–8.

7.       S. Krauter, "Increased electrical yield via water flow over the front of photovoltaic panels", Solar Energy Materials & Solar Cells, 82, 2004, 131-137.

8.       Hongbing Chen, Xilin Chen, Sizhuo Li, Hanwan Ding, "Comparative study on the performance improvement of photovoltaic panel with passive cooling under natural ventilation", International Journal of Smart Grid and Clean Energy, 3(4), 2014, 374-379.

9.       Shiv Lal, Pawan Kumar, Rajeev Rajora, "Performance analysis of photovoltaic based submersible water pump", International Journal of Engineering and Technology, 5(2), 2013, 552560.

10.    P. Gang, Fu Huide, Z. Huijuan, JiJie, "Performance study and parametric analysis of a novel heat pipe PV/T system", Energy, 37(1), 2012, 384-395.

11.    H. Bahaidarah, Abdul Subhan, P. Gandhidasan, S. Rehman, "Performance evaluation of a PV (photovoltaic) module by back surface water cooling for hot climatic conditions", Energy, 59, 2013, 445-453.

12.    H.G. Teo, P.S. Lee, M.N.A. Hawlader, "An active cooling system for photovoltaic modules", Applied Energy, 90, 2012, 309-3105.




Geethu S S, Sreeletha S H

Paper Title:

An Efficient Depth Segmentation Based Conversion of 2d Images to 3d Images

Abstract:   In the 3D consumer electronics world have a wide increase in demands of more and more 3D technology, so this has led to the conversion of many existing two-dimensional images to three-dimensional images. The depth is an important factor in the conversion process. Determining the depth for a single image is very difficult. There are many techniques widely used for the depth estimation process. In this paper we propose an automatic depth estimation technique. Firstly, we partition the image using graph cut segmentation method. The main goal of segmentation is to simplify or change the representation of an image into something that is more meaningful and easier to analyze. Then we construct a higher order statistics map. The HOS is mainly used for solving detection and classification problems. We can estimate depth map from HOS mean. Finally, creating left view image and right view image and combined with depth map to generate an enhanced stereoscopic image.

 2D to 3D, Segmentation, Graph cut, HOS, Filtering, Stereoscopic image.


1.       Saravanan Chandran , Novel Algorithm for Converting 2D Image to Stereoscopic Image with Depth Control using Image Fusion, Vol. 2, No. 1, March 2014 J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
2.       J. Konrad, M. Wang, and P. Ishwar, 2D-to-3D image conversion by learning depth from examples, , in Proc. IEEE Comput. Soc. CVPRW, Jun. 2012, pp. 16-22. K. Elissa, “Title of paper if known,” unpublished.

3.       Zeal ganatra, conversion of 2d images to 3d using data mining algorithm, international journal of innovations and advancement in computer science, ijiacs , vol. 22, no. 9, september 2013.

4.       Janusz Konrad, Learning-Based, Automatic 2D-to-3D Image and Video Conversion, Fellow, IEEE, Meng Wang, Prakash Ishwar, Senior Member, IEEE, Chen Wu, and Debargha Mukherjee, 2012.

5.       Raymond Phan, Richard Rzeszutek, Dimitrios Androutsos, semi- automatic 2d to 3d image conversion using scale-space random walks and a graph cuts based depth prior,18th IEEE International Conference on Image Processing, 2011.

6.       Q. Wei,2D to 3D: A Survey, Information and Communication Theory Group (ICT) Faculty of Electrical Engineering, Mathematics and Computer Science Delft University of Technology, the Netherlands, December.

7.       M. H. Feldman and L. Lipton, “Interactive 2D to 3D Stereoscopic Image Synthesis”, in Proc. of the SPIE, Vol.    5664, pp. 186-197 (2005).

8.       Battiato, S.; Capra, A.; Curti, S.; and La Cascia, M, “3D Stereoscopic Image Pairs by Depth-Map Generation”, in           Proc. of 2nd International Symposium on 3D Data Processing Visualization and Transmission, 3DPVT  (2004).

9.       W.J Tam, F. Speranza, L.Zhang, R. Renaud, J. Chan, and C. Vazquez, " Depth image based rendering for multiview stereoscopic displays: Role of information at object boundaries ", in Proc. of the SPIE, Vol. 6016, pp. 75-85 (2005).

10.    W. J. Tam and L. Zhang, "Non-uniform smoothing of depth maps before image-based rendering", in Proc. of the  SPIE, Vol. 5599, pp. 173-183 (2004).

11.    Jaeseung Ko, Manbae Kim and Changick Kim, School of Engineering, Information and Communications University  Munji-dong, Yuseong-gu, Deajeon, Korea, Proc. of SPIE Vol. 6696  66962A-1.

12.    Salvatore Curti, Daniele Sirtori, and Filippo Vella, "3D Effect Generation from Monocular View", in Proc. of the  First International Symposium on 3D Data Processing visualization and Transmission, 3DPVT (2002).

13.    S. A. Valencia and R. M. Rodriguez-Dagnino, "Synthesizing Stereo 3D Views from Focus Cues in Monoscopic 2D  Images", in Proc of the SPIE, Vol. 5006, pp.377-388 (2003).

14.    Pedro F. Felzenszwalb and Daniel P. Huttenlocher, "Efficient Graph-Based Image Segmentation", International  Journal of Computer Vision, Vol. 59, Number 2,
Sept. 2004.

15.    O. Chapelle, B. SchÄolkopf and A. Zien. Semi-Supervised Learning. MIT Press, Cambridge, MA, 2006.




Chanchal Verma, B. Anjanee Kumar

Paper Title:

Improvement of Output Power for Wind Driven Induction Generator using SEPIC Converter

Abstract: This paper deals with dc-dc converter known as SEPIC stands for single ended primary inductor converter. SEPIC is integrated with wind energy in order to maximize the performance of the system. With the help of simple method of tracking maximum power from wind energy to extract maximum power. Basically wind energy is used to generate electricity and the wind is not in uniform speed. So, by using different electronic components .The main part is dc-dc converter and by using SEPIC in place of normal dc-dc converter the output power i.e. THD will enhanced .Here DBR is used to convert AC to DC. The SEPIC can perform both bucks as well as boost converter. It gives the result in microseconds. The simple algorithm is the main advantage of the proposed work. The output is shown in DC microgrid and AC microgrid. It is for the small scale WECS.The work is supported with experimental results and also the output i.e. THD is calculated and compared with Cuk converter.

 MPPT, SEPIC (single ended primary inductor converter), THD, wind energy.


1.    Nayanar, V., Kumaresan, N. and Ammasai   Gounden, N.,”A single sensor based MPPT controller for wind driven Induction Generators Supplying DC Microgrid”, IEEE Transactions on Power Electronics ,Vol.31,  Issue: 2 .pp1161 – 1172,feb. 2016.
2.    A.Yazdani and P.P. Dash,”A control methodology and characterization of dynamics for a photovoltaic (PV) system interfaced with a distribution network,” IEEE Tans. Power Del.,vol.23,no.3,pp.1538-1551.jul 2009.

3.    H.Li and Z. Chen,” Overview of different wind generator systems and their comparisons,” IEEE Renew. Power Gener.,vol.2,no.2,pp123-138,jun.2008.

4.    Monica Chinchilla, Santigo Arnaltes, Juan Carlos Burgos: “Control of permanent magnet generators applied to variable speed wind energy systems connected to the grid”, IEEE  Transaction on energy conversion ,vol.21, NO.1, MARCH 2006.

5.    K. Padmanabham and K. Balaji Nanda Kumar     Reddy:” A New MPPT Control Algorithm for Wind Energy Conversion System”, (IJERT) ISSN: 2278-0181 ,Vol. 4 Issue 03, March-2015

6.    Gayathri Deivanayaki. VP, Dhivyabharathi. R,Surbhi. R and Naveena. P.” comparative analysis of bridgeless CUK and SEPIC converter.”IJICSE, vol.3,issue1,jan-feb 2016,pp15-19.

7.    Notes of IIT, Kharagpur, DC to DC Converters, Module -3.




Joseph Zacharias, Celine George, Vijayakumar Narayanan

Paper Title:

Hybrid Wired and Wireless System Involving Non-upling Technique

Abstract:  A hybrid Radio over Fiber (RoF) system which is compatible with both wired and 90 GHz wireless transmission is proposed in this paper. Baseband and millimeter wave signals are considered as wired and wireless signal respectively. Hybrid signal consisting of wired and wireless signal is generated using a single Dual Drive Mach-Zehnder Modulator (MZM). Using a 10 GHz local oscillator, non-upling (nine times) increase in signal is achieved. As the system uses low frequency local oscillator and a single modulator, overall cost of the system can be reduced considerably. Results obtained show that the system can transmit both wired and wireless signals over a fiber of length 70 km with acceptable bit error rate (BER).

Fiber-to-the-Home, Radio-over-Fiber, W-Band


1.    S. E. Alavi, I. S. Amiri, M. Khalily, N. Fisal, A. S. M. Supa’at, H. Ahmad, and S. M. Idrus., ”W-Band OFDM for Radio-Over-Fiber Direct Detection Link Enabled by Frequency Nonupling Optical Up-Conversion,” IEEE Photon. J., vol. 6, no.6, Dec. 2014.   
2.    C. H. Chang, P. C. Peng, Q. Huang, W. Y. Yang, H. L. Hu, W. C. Wu, J. H. Huang, C. Y. Li, H. H. Lu and H. H. Yee, “FTTH and Two-Band RoF Transport Systems Based on an Optical Carrier and Colorless Wavelength Separators,” IEEE Photon. J., vol. 8, no.1, Feb. 2016.

3.    Tong Shao, F. Paresys, Y. Le Guennec, G. Maury, N. Corrao and B. Cabon, “Convergence of 60 GHz Radio Over Fiber and WDM PON Using Parallel Phase Modulation With a Single Mach-Zehnder Modulator,” IEEE Light Wave Technol. J, vol.30, no.17, Sep. 2012.

4.    C. W. Chow, and Y. H. Lin, “Convergent optical wired and wireless long-reach access network using high spectral efficient modulation,” Opt. Exp., vol. 20, no. 8, pp. 9243-9248, Apr. 2012.

5.    H. T. Huang, Chun-Ting Lin, Chun-Hung Ho, Wan-Ling Liang, Chia-Chien Wei, Yu-Hsuan Cheng and Sien Chi, “High Spectral Efficient W-band OFDM-RoF System with Direct-Detection by Two Cascaded Single-Drive MZMs,” Opt. Exp., vol. 21, no. 14, pp. 16615-16620, Jul. 2013.

6.    G. H. Nguyen, B. Cabon and Y. Le Guennec, “Generation of 60-GHz MB-OFDM Signal-Over-Fiber by Up-Conversion Using Cascaded External Modulators,” Journal of Lightwave Technology, vol. 27, pp. 1496-1502, Jun. 2009.

7.    Jianxin Ma, J.Yu, Chongxiu Yu, Xiangjun Xin, Xinzhu Sang and Qi Zhang, “64 GHz Optical Millimeter-Wave Generation by Octupling 8 GHz Local Oscillator via a Nested LiNbO3 modulator,” Opt. Laser Technol., vol. 42, pp. 264-268, 2010.

8.    Jianjun Yu, Zhensheng Jia, L. Yi, Y. Su, Gee-Kung Chang and Ting Wang, “Optical Millimeter-Wave Generation or Up-Conversion using External Modulator,” IEEE Photon. Technol. Lett., vol. 18, no. 1, pp. 265-267, Jan. 2006.

9.    H. C. Chien, Y. T. Hsueh, A. Chowdhury, J. Yu and G. K. Chang, “Optical millimeter-wave generation and transmission without carrier suppression for single- and multi-band wireless over fiber applications,” J. Lightw. Technol., vol. 28, no. 16, pp. 2230-2237, Aug. 2010.




J. Srinivasan, S. Audithan

Paper Title:

Anonymous Secure Routing Protocol for Multi hop Wireless Mesh Network (ASRP)

Abstract: Anonymous communications are important for many applications of the Wireless Mesh Networks (WMNs) deployed in adversary environments. A major requirement on the network is to provide unidentifiability and unlinkability for nodes and their traffics. The existing protocols are vulnerable to the attacks of fake routing packets or denial-of-service (DoS) broad- casting, even the node identities are protected by pseudonyms. In this paper, we propose Anonymous Secure Routing Protocol for Multi hop Wireless Mesh Network (ASRP) to protect the attacks and multi hop secure data transmission in WMN. ASRP offers anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. The key-encrypted onion routing is designed to prevent intermediate nodes from inferring a real receiver node. Simulation results indicate that the efficiency of the proposed ASRP protocol with improved performance as compared to the existing protocols.

Anonymous, Onion Routing, Encryption, Decryption, Wireless Mesh Networks.


1.       Asad Amir Pirzada a, Marius Portmanna,b, Ryan Wishart a, Jadwiga Indulska, SafeMesh: A wireless mesh network routing protocol for incident area communications, Pervasive and Mobile Computing, vol.5, pp.201-221, 2009.
2.       J. Sun, C. Zhang ; Y. Fang, A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks, IEEE 27th Conference on Computer Communications, 2008.

3.       Yahui Li, Xining Cui, Linping Hu, Yulong Shen, Efficient Security Transmission Protocol with Identity-based Encryption in Wireless Mesh Networks,IEEE, 2010.

4.       D. Benyamina A. Hafid, M. Gendreau b, J.C. Maureira, “On the design of reliable wireless mesh network infrastructure with QoS constraints”, Computer Network, vol.55, pp. 1631-1647, 2011.

5.       Jaydip Sen, “Security and Privacy Issues in Wireless Mesh Networks: A Survey”, Innovation Labs, Tata Consultancy Services Ltd. Kolkata, INDIA.

6.       Kamran Jamshaid  Basem Shihada Ahmad Showail, Philip Levis, Deflating link buffers in a wireless mesh network, Ad Hoc Networks 16 (2014) 266–280.

7.       J. Kong and X. Hong, “ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad hoc networks,” in Proc. ACM MobiHoc’03, Jun. 2003, pp. 291–302.

8.       MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks Yanchao Zhang, Student Member, IEEE, Wei Liu, Wenjing Lou, Member, IEEE, and Yuguang Fang, Senior Member, IEEE.

9.       K. E. Defrawy and G. Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” IEEE Trans. on Mobile Computing, vol. 10, no. 9, pp. 1345–1358, Sept. 2011.

10.    Z. Wan, K. Ren, and M. Gu, “USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks,” IEEE Trans. on Wireless Communication, vol. 11, no. 5, pp. 1922–1932, May. 2012.

11.    Yanchao Zhang, and Yuguang Fang, ARSA: An Attack-Resilient Security Architecture for Multi hop Wireless Mesh Networks, IEEE Journal On Selected Areas in Communications, Vol. 24, no. 10, 2006.




Aleena Xavier T, Rejimoan R.

Paper Title:

A Particle Swarm Optimization Approach With Migration for Resource Allocation in Cloud

Abstract:  Cloud computing is an emerging technology. The main motivation behind the proposed work is to design a Cloud Broker for efficiently managing cloud resources and to complete the jobs within a deadline. The proposed approach intends to achieve the objectives of reducing execution time, cost and workload based on the defined fitness function. The work is simulated in CloudSim and the results prove the effectiveness of the proposed work. A better allocation was achieved when all of the three factors were considered. The analysis of work was done by comparing one of the previous works where only time and cost were the objectives. By plotting a graph against Response time and deadline and another graph depicting the relation between the idle time and deadline this result has been proved.

Resource allocation, Job scheduling, Cloud Computing, IaaS, Particle Swarm Optimization


1.       S. Binitha, S.Siva Sathya, A survey of bio inspired optimization algorithms, Int.J. Soft Comput. Eng. (IJSCE) (ISSN: 2231-2307) 2 (2) (2012).
2.       J. Kennedy, R. Eberhart, Particle swarm optimization (PSO), in: Proc. IEEE International Conference on Neural Networks, Perth, Australia, 1995, pp. 1942–1948.

3.       Aman kumar, Emmanueel S.Pilli and R.C.Jshi,” An efficient framework for resource allocation in cloud computing” ,in IEEE 4th ICCCNT - 2013, Tiruchengode, India

4.       M. c. D. Pandit and N. Chaki, “Resource allocation in cloud computing using simulated annealing,” IEEE applications and innovations in mobile computing, 2014.

5.       Suraj Pandey, Linlin Wu, Siddeswara Mayura Guru, Rajkumar Buyya, “A particle swarm optimization-based heuristic for scheduling workflow applications in cloud computing environments, in: AINA’10 Proceedings of the 2010 24th IEEE International Conference on on Advanced Information Networking and Applications

6.       Chandrashekar S.Pawar and Rajnikant B.Wagh, Priority Based Dynamic Resource Allocation in Coud Computing, International Symposium on Cloud ans Services Computing, 2012, pp.1-6.

7.       Biao Song, Mohammad Mehedi Hassan, Eui-nam Huh, A novel heuristicbased task selection and allocation framework in dynamic collaborative cloud service platform, in: CloudCom 2010, pp. 360–367

8.       Eun-Kyu Byuna, Yang-Suk Keeb, Jin-Soo Kimc, Seungryoul Maeng, Cost optimized provisioning of elastic resources for application workflows, Future Gener. Comput. Syst. 27 (2011) 1011–1026.

9.       M. Mezmaz, Choon Lee Young, N. Melab, E.-G. Talbi, A.Y. Zomaya, A bi-objective hybrid genetic algorithm to minimize energy consumption and makespan for precedence-constrained applications using dynamic voltage scaling, in: 2010 IEEE Congress on Evolutionary Computation, CEC, 18–23 July 2010

10.    O.O. Sonmez, A. Gursoy, A novel economic-based scheduling heuristic for computational grids, Int. J. High Perform. Comput. Appl. 21 (1) (2007) 21–29.

11.    S. Chaisiri, Bu-Sung Lee, D. Niyato, Optimization of resource provisionin cost in cloud computing, IEEE Trans. Serv. Comput. 5 (2) (2012) 164–177.

12.    M.F. Tasgetiren, Y.-C. Liang, M. Sevkli, G. Gencyilmaz, A particle swarm optimization algorithm for makespan and total flowtime minimization in the permutation flowshop sequencing problem, European J. Oper. Res. 177 (3) (2007) 1930–1947

13.    M. Dorigo, V. Maniezzo, A. Colorni, Ant system: optimization by a  colony of cooperating agents, IEEE Trans. Syst. Man Cybern. B 26 (1) (1996) 29–41.

14.    Genetic Algorithm, J.H. Holland, Genetic algorithms and the optimal allocation of trials, SIAM J. Comput. 2 (2) (1973) 88–105.

15.    Thamarai Selvi Somasundaram, Kannan Govindarajan, “CLOUDRB: A framework for scheduling and managing High-Performance Computing (HPC) applications in science cloud”, Future Generation Computer Systems 34 (2014) 47–65.





C. Ramachandra, Sarat Kumar Dash

Paper Title:

ESD Induced Reliability Problems in Space Grade Devices

Abstract: ESD induced reliability problems in an IC have been studied in detail. PEM (Photon Emission Microscopy) analysis has indicated characteristic emission spots at same location from all the failed devices. Reprocessing of the failed device reveals Gate oxide rupture as root cause of the failure. Protection circuits have been designed to prevent ESD induced damage to the devices. The devices are found to be safe till 4500 V stress after protection circuit is implemented.

ESD (Electro Static Discharge), HBM (Human Body Model), PEM (Photon Emission Microscope), BPSG (Boron Phosphorous silicate glass)


1.       Jie Wu,“ Gate Oxide reliability under ESD – like pulse stress” IEEE Transactions on Electron Devices. Vol : 51, Issue : 7, pp : 1192 – 1196; July 2004
2.       Amerasekera and D. Campbell, "ESD pulse and continuous voltage breakdown in MOS capacitor structures", Proc. EOS/ESD Symp., pp. 208-213, 1986

3.       Y. Fong and C. Hu, "The effect of high electric field transients on thin gate oxide MOSFETs", Proc. EOS/ESD Symp., pp. 252-257, 1987

4.       H. Wolf, H. Gieser, and W. Wilkening, "Analyzing the switching behavior of ESD-protection transistors by very fast transmission line pulsing", Proc. EOS/ESD Symp. , pp. 28-37, 1999

5.       J. Wu, P. Juliano, and E. Rosenbaum, "Breakdown and latent damage of ultrathin gate oxides under ESD stress conditions", Proc. EOS/ESD Symp., pp. 287-293, 2000

6.       S. G. Beebe, "Simulation of complete CMOS I/O circuit response to CDM stress", Proc. EOS/ESD Symp., pp. 259-270, 1998

7.       P. E. Nicollian, W. R. Hunter, and J. C. Hu, "Experimental evidence for voltage driven breakdown models in ultrathin gate oxides", Proc. IRPS, pp. 7-15, 2000

8.       E. Wu, A. Vayshenker, E. Nowak, J. Sune, R.-P. Vollertsen, W. Lai, and D. Harmon, "Experimental evidence of ${t}_{\rm BD}$power-law for voltage dependence of oxide breakdown in ultrathin gate oxides", IEEE Trans. Electron Devices, vol. 49, pp. 2244-2253, 2002

9.       C. Leroux, P. Andreucci, and G. Reimbold, "Analysis of oxide breakdown mechanism occurring during ESD pulses", Proc. Int. Rel. Phys. Symp., pp. 276-282, 2000

10.    S.-J. Wang, I.-C. Chen, and H. L. Tigelaar, "TDDB on poly-gate single doping type capacitors ", Proc. IRPS, pp. 54-57, 1992

11.    T. Nigam, R. Degraeve, G. Groeseneken, M. Heyns, and H. Maes, "A fast and simple methodology for lifetime prediction of ultrathin oxides", Proc. IEEE Int. Rel. Phys. Symp., pp. 381-388, 1999

12.    T. Nigam, R. Degraeve, G. Groeseneken, M. Heyns, and H. Maes, "Constant current charge-to-breakdown: Still a valid tool to study the reliability of MOS structures?", IEEE Int. Rel. Phys. Symp., pp. 62-69, 1998

13.    R. Tu, J. King, H. Shin, and C. Hu, "Simulating process-induced gate oxide damage in circuits", IEEE Trans. Electron Devices, vol. 44, pp. 1393-1400, 1997




Neethu.M.S, Jayalekshmi.S

Paper Title:

Dependency Based Scheme for Load Balancing in Cloud Environment

Abstract: Cloud computing provides an opportunity to dynamically share the resources among the users through virtualization technology. In this paper, a scheme for load balancing is proposed on the basis of dependency among the tasks. CMS consists of three algorithms including Credit-based scheduling for independent tasks, Migrating Task and Staged Task Migration for dependent tasks. The Credit-based method is used for scheduling the independent tasks considering both user priority and task length. Each task will be assigned a credit based on their task length and its priority. In the actual scheduling of the task, these credits values will be considered. Task Migration algorithm is used to guarantee balancing of loads among the virtual machines. Task migration is done such that the tasks gets migrated from heavily loaded machines to comparatively lighter ones. Thus, no rescheduling is required. For dependent tasks, the dependencies between tasks are considered and the technique termed as data shuffling is used. In data shuffling, a job is divided into several tasks according to the execution order. The method used here is that the tasks in one stage run independently, while the tasks in different stages must be executed serially. Finally the system is simulated and experiments are conducted to evaluate the proposed methods. This work also concentrates on a simulated study among some common scheduling algorithms in cloud computing on the basis of the response times. The algorithms being compared with the work includes: Random, Random Two Choices (R2C) and On-demand algorithms. The evaluations demonstrate that Credit-based scheduling algorithm significantly reduces the response time.

 Load Balancing, Virtual Machine, Task Scheduling, Dependency.


1.       Buyya, R., Ranjan, R., and Calheiros, R.N. “ Modeling and Simulation of Scalable Cloud Computing Environments and the CloudSim Toolkit: Challenges and Opportunities” , International Conference on High Performance Computing and Simulation, HPCS 2009.
2.       N. Susila, S. Chandramathi, Rohit Kishore, “A Fuzzy-based Firefly Algorithm for Dynamic Load Balancing in Cloud Computing Environment”, Journal of Emerging Technologies in Web Intelligence, vol. 6, no. 4,pp.435-440, IEEE November 2014.

3.       DineshBabu.L.D,P.VenkataKrishna,“HoneyBeeinspiredloadbalancingoftasks in cloud computing environment”, Applied Soft Computing, vol.13,pp.2292-2303 ,Elsevier 2013.

4.       Elina Pacini,Cristian Mateos,Carlos Garcia Garino, “Balancing throughput and response time in online scientific clouds via Ant Colony Optimization”, Advances in Engineering Software, vol.8,pp.31-47 ,Elsevier 2015.

5.       Brototi Mondala, Kousik Dasgupta, Paramartha Dutta,“ Load Balancing in Cloud Computing using Stochastic Hill Climbing-A Soft Computing Approach”, Procedia Technology, vol.4, pp.783-789, Elsevier 2012.

6.       Kousik Dasgupta, Brototi Mandal, Paramartha Dutta, Jyotsna Kumar Mondal, Santanu Dam,“ A Genetic Algorithm (GA) based Load Balancing Strategy for Cloud Computing”, International Conference on Computational Intelligence: Modeling Techniques and Applications (CIMTA), Elsevier, 2013.

7.       B. R. Kandukuri, R. Paturi V, A. Rakshit, “Cloud Security Issues”, IEEE International Conference on Services Computing, pp. 517-520, IEEE 2009.

8.       Yu Liu, Changjie Zhang, Bo Li, Jianwei Niu .“ DeMS: A hybrid scheme of task scheduling and load balancing in computing clusters”, Journal of Network and Computer Applications, Elsevier 2015.

9.       GaochaoXu, Junjie Pang, and Xiaodong Fu, “A Load Balancing Model Basedon Cloud Partitioning for the Public Cloud”, vol.18 ,pp. 34-39,IEEE 2013.

10.    Aarti Singha, Dimple Junejab, Manisha Malhotraa ,“Autonomous Agent Based Load Balancing Algorithm in Cloud Computing ”, International Conference on Advanced Computing Technologies and Applications (ICACTA2015), vol.45, pp.832-841 , Elsevier 2015.

11.    Michael Mitzenmacher, “The Power of Two Choices in Randomized Load Balancing”, IEEE Transactions on Parallel and Distributed Systems, vol. 12, no. 10, pp.1094-1104 ,IEEE 2001.

12.    Antony Thomas, Krishnalal G, Jagathy Raj V P ,“Credit Based Scheduling Algorithm in Cloud Computing Environment”, Procedia Computer Science, vol.46, pp. 913 920, Elsevier 2015.

13.    Venubabu Kunamneni.,“ Dynamic Load Balancing for the Cloud”, International Journal of Computer Science and Electrical Engineering (IJCSEE), ISSN No. 2315-4209, vol-1 issue-1, 2012

14.    L. Wang, GregorLaszewski, Marcel Kunze, Jie Tao, “Cloud Computing: A Perspective Study”, New Generation Computing- Advances of Distributed Information Processing, pp. 137-146, vol. 28, no. 2, 2008.

15.    Ousterhout K, Wendell P, Zaharia M, Stoica I, “Batch sampling: low overhead schedulingforsub-secondparalleljob”, Berkeley: University of California; 2012.

16.    Weiwei Chen, Ewa Deelman, “Work flow Sim: A Toolkit for Simulating Scientific Work flows in Distributed Environments”, The 8th IEEE International Conference on E Science (E Science 2012), Chicago, 2012.




Sharafunisa S, Smitha E S

Paper Title:

Reversible Watermarking Technique for Relational Data using Ant Colony Optimization and Encryption

Abstract:  Data is stored in different digital formats such as images, audio, video, natural language texts and relational data. Relational data in particular is shared extensively by the owners with communities for research purpose and in virtual storage locations in the cloud. The purpose is to work in a collaborative environment where data is openly available for decision making and knowledge extraction process. So there is a need to protect these data from various threats like ownership claiming, piracy, theft, etc. Watermarking is a solution to overcome these issues. Watermark is considered to be some kind of information that is embedded into the underlying data. While embedding the watermark, the data may modify, to overcome this we use reversible watermarking in which owner can recover the data after watermarking. In this paper, a reversible watermarking for relational data has been proposed that uses ant colony optimization and encryption for more accuracy and security.

  Ant colony optimization (ACO), Mutual information (MI), Reversible watermarking, Data recovery, Genetic Algorithm (GA).


1.       Raju Halder, Shanthanu Pal and Agostino Cortesi ,“Watermarking Techniques for Relational Databases: Survey, Classification and Comparison,” Journal of Universal Computer Science, Vol 16 ,2010, Number 21, pp.3164-3190
2.       J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking for multimedia”, IEEE Trans. Image Process., vol. 6, no. 12, pp. 16731687, Dec. 1997

3.       Ifthikar, M. Kamran and Z. Anwar, “A Survey on Reversible Watermarking Techniques for Relational Databases,” Security and communication networks, 2015.

4.       Marco Dorigo and Thomus Stultze, ”Ant Colony Optimization“, 2004.

5.       T. M. Cover, J. A. Thomas, and J. Kieffer,’Elements of information theory,” SIAM Rev., vol. 36, no. 3, pp. 509510, 1994.

6.       R. Agarwal and J. Kiernan, “Watermarking relational databases”, in Proc. 28th Int. Conf. Very Large Data Bases, 2002, pp. 155166.

7.       G. Gupta and J. Pieprzyk, “Reversible and blind database watermarking using difference expansion,” in Proc. 1st Int. Conf. Forensic Appl. Tech. Telecommun., Inf., Multimedia Workshop, 2008, p. 24.

8.       G. Gupta and J. Pieprzyk, “Database relation watermarking resilient against secondary watermarking attacks,” in Information Systems and Security. New York, NY, USA: Springer, 2009, pp. 222–236.

9.       K. Jawad and A. Khan, “Genetic algorithm and difference expansion based reversible watermarking for relational databases,” J. Syst. Softw., vol. 86, no. 11, pp. 2742–2753, 2013.

10.    M. E. Farfoura and S.-J. Horng, “A novel blind reversible method for watermarking relational databases,” in Proc. IEEE Int. Symp. Parallel Distrib. Process. Appl., 2010, pp. 563–569

11.    Iftikhar S, Kamran M, Anwar Z.,“ RRW-a robust and reversible watermarking technique for relational data, IEEE transactions on Knowledge and Data Engineering , 2015, Volume: 27,Issue: 4, pp: 1132 – 1145

12.    K. Huang, H. Yang, I. King, M. R. Lyu, and L. Chan,”Biased minimax probability machine for medical diagnosis“, AMAI, 2004.




Jasher Nisa A J, Sumithra M D

Paper Title:

Adaptive Minimum Classification Error based KISS Metric Learning for Person Re-identification

Abstract: Person re-identification becoming an interesting research area in the field of video surveillance and is taken as the area of intense research in the past few years. It is the task of identifying a person from a camera image, who is already been tracked by another camera image at different time at different location. Manual re-identification in large camera network is costly and mostly of inaccurate due to large number of camera that he had to simultaneously operate. In a crowded and unclear environment, when cameras are at a lengthy distance, face recognition is not possible due to insufficient image quality. So, visual features based on appearence of people, using their clothing, objects carried etc. can be exploited more reliably for re-identification. A person’s appearence can change between different camera views, if there is large changes in view angle, lighting, background and occlusion, so visual feature extraction is not possible accurately. For solving a person re-identification problem, have to focus on “developing feature representations which are discriminative for identity,but invarient to view angle and lighting”.  Recently, Minimum Classification Error (MCE) based KISS metric learning is considered as one of the top level algorithm for person re-identification. It uses VIPeR feature set as input, which contains the extracted features. MCE-KISS is more reliable with increasing the number of training samples.  It uses the smoothing technique and MCE criteria to improve the accuracy of estimate of eigen values of covarience metrics. The smoothing technique can compensate for the decrease in performance which arose from the estimate errors of small eigenvalues. Here, the value of average number of small eigen values of the covarience metrics is set as a constant. So it does not work well for a large number of samples. In such situation, introduce a new method to find the value of average of such small eigen values by maximizing the likelihood function. The new scheme is termed as Adaptive MCE-KISS and conduct validation experiments on VIPeR feature dataset.

 reidentification, matric learning, covarience matrics, likelihood method.

1.       Vezzani, R., Baltieri, D., Cucchiara, R.: People reidenti_cation in surveillance and forensics: A survey. ACM Computing Surveys (CSUR) 46(2) (2013) 29.
2.       Dapeng Tao, Lianwen Jin, Member, IEEE, Yongfei Wang, and Xuelong Li, Fellow, IEEE “Person Reidentification by Minimum Classification Error-Based KISS Metric Learning”,  ieee transactions on cybernetics, vol. 45, no. 2, february 2015.

3.       H. Hotelling, “Analysis of a complex of statistical variables into principal components,” J. Educ. Psychol., vol. 24, no. 6, pp. 417–441, 1933.

4.       McDermott, T. J. Hazen, J. Le Roux, A. Nakamura, and S. Katagiri, “Discriminative training for large-vocabulary speech recognition using minimum classification
error,” IEEE Trans. Audio, Speech, Lang.Process., vol. 15, no. 1, pp. 203–223, Jan. 2007.

5.       Kimura, K. Takashina, S. Tsuruoka, and Y. Miyake, “Modified quadratic discriminant functions and the application to Chinese character recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 9, no. 1, pp. 149–153, Jan. 1987.

6.       K. Q. Weinberger and L. K. Saul, “Distance metric learning for large margin nearest neighbor classification,” J. Mach. Learn. Res., vol. 10, pp. 207–244, Feb. 2009.

7.       J. V. Davis, B. Kulis, P. Jain, S. Sra, and I. S. Dhillon, “Informationtheoretic metric learning,” in Proc. ICML, Corvallis, OR, USA, 2007, pp. 209–216.

8.       L. Yang, R. Jin, R. Sukthankar, and Y. Liu, “An efficient algorithm for local distance metric learning,” in Proc. AAAI, 2006, pp. 543–548.

9.       B. Prosser, W.-S. Zheng, S. Gong, T. Xiang, and Q. Mary, “Person re-identification by support vector ranking,” in Proc. BMVC, 2010.

10.    D. Tao, L. Jin, Y. Wang, Y. Yuan, and X. Li, “Person re-identification by regularized smoothing KISS metric learning,” IEEE Trans. Circuits Syst. Video Technol., vol. 23, no. 10, pp. 1675–1685, Oct. 2013.

11.    M. Kostinger, M. Hirzer, P. Wohlhart, P. M. Roth, and H. Bischof, “Large scale metric learning from equivalence constraints,” in Proc. IEEE CVPR, Providence, RI, USA, 2012, pp. 2288–2295.

12.    M. Kostinger, M. Hirzer, P. Wohlhart, P. M. Roth, and H. Bischof “Large scale metric learning from equivalence constraints,” in Proc. IEEE Conf. Comput. Vision Pattern Recogn., Jun. 2012, pp. 2288–2295.

13.    Kimura, K. Takashina, S. Tsuruoka, and Y. Miyake, “Modified quadratic discriminant functions and the application to Chinese character recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 9, no. 1, pp. 149–153, Jan. 1987.

14.    B.-H. Juang, W. Hou, and C.-H. Lee, “Minimum classification error rate methods for speech recognition,” IEEE Trans. Speech Audio Process., vol. 5, no. 3, pp. 257–265, May 1997.

15.    D. Gray, S. Brennan, and H. Tao, “Evaluating appearance models for recognition, reacquisition, and tracking,” in Proc. 10th PETS, 2007.

16.    T. Ojala, M. Pietikainen, and T. Maenpaa, “Multiresolution gray-scale and rotation invariant texture classification with local binary patterns,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 24, no. 7, pp. 971–987, Jul. 2002.

17.    Shamik Sural, Gang Qian and Sakti Pramanik, “segmentation and histogram generation using the hsv color space for image retrieval”.

18.    D. Gray, S. Brennan, and H. Tao, “Evaluating appearance models for recognition, reacquisition, and tracking,” in Proc. 10th PETS, 2007.




Rita Anitasari, Rizki Fitriani, Erna Triastutik, Alief Makmuri Hartono, Totok R. Biyanto

Paper Title:

Converting Fuel Oil to Gas in Combustion System for CO2 Emission Mitigation at PT. PJB UP Gresik

Abstract:  In environmental point of view, natural gas is the cleanest of the fossil fuels. The combustion of natural gas releases virtually no sulphur dioxide and ash or particulate matter, and very small amounts of nitrogen oxides. Natural gas emits 22% less carbon dioxide than oil and 40% less than coal. NOx is reduced by more than 90% and SOx by more than 95%. This paper will describes the effort of PT. PJB UP Gresik as the owner of the bigest steam power plant in Indonesia to reduce the CO2 emission by converting fuel oil to gas at existing steam power plant fuel system. In order to achive operating conditions that assure mass, energy and momentum balances, some plant modifications and new installation were performed in combustion system area. The effort was performed succesfully. The evidents were compare with the same powerplant in the world. In term of CO2 emission, PT. PJB UP Gressik lay at the best ten compared to others power plant performance in America. It is shown PT. PJB UP Gresik have been performing best green practice especially in reducing CO2 emmision in the steam power plant by utilize fuel gas.

  CO2 Emission, Mitigation, Combustion System, Converting Fuel Oil to Gas


1.       Totok R. Biyanto, Green Concept in Engineering Practice, invited speaker at1St International Seminar on Science and Technology 2015, 5 August 2015, ITS Surabaya, ISSN 2460-6170
2.       EPA, Methodology for Estimating Emissions of CO2 from Fossil Fuel Combustion, US Environmental Protection Agency: 2014

3.       E. Dendy Sloan, Fundamental principles and applications of natural gas hydrates, Nature 426, 353-363 (20 November 2003

4.       SA Iqbal, Y Mido, Chemistry of Air & Air Pollution, Discovery Publishing, 2010

5.       Roberts, R. Brooks, P. Shipway, "Internal combustion engine cold-start efficiency: A review of the problem, causes and potential solutions", Energy Conversion and Management, Volume 82, June 2014, Pages 327–350

6.       D. Sarkar, Thermal power plant, 2015.

7.       Christopher E . Van Atten, Benchmarking Air Emissions, M .J. Bradley & Associates LLC, 2013




Nikhila A, Janisha A

Paper Title:

Lossless Visual Cryptography in Digital Image Sharing

Abstract:   Security has gained a lot of importance as information technology is widely used. Cryptography refers to the study of mathematical techniques and related aspects of Information security. Visual cryptography is a secret sharing scheme which uses images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. Visual cryptography schemes (VCSs) generate random and meaningless shares to share and protect secret images. The main issue in visual cryptography is quality of reconstructed image. The secret image is converted into shares; that mean black and white pixel images. There occurs an issue of transmission loss and also the possibility of the invader attack when the shares are passed within the same network. In this paper, a lossless TVC (LTVC) scheme that hides multiple secret images without affecting the quality of the original secret image is considered. An optimization model that is based on the visual quality requirement is proposed. The loss of image quality is less compared to other visual cryptographic schemes. The experimental results indicate that the display quality of the recovered image is superior to that of previous papers. In addition, it has many specific advantages against the well-known VCSs. Experimental results show that the proposed approach is an excellent solution for solving the transmission risk problem for the Visual Secret Sharing (VSS) schemes.

visual cryptography, visual secret sharing.


1.    Kai-Hui Lee and Pei-Ling Chiu “Sharing Visual Secrets in Single Image Random Dot Stereograms” IEEE Transactions on Image Processing, Vol.23, No. 10, October 2014
2.    Ross and A. A. Othman, “Visual Cryptography for Biometric Privacy”, IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 70-81, 2011.

3.    M. Naor and A. Shamir, “Visual cryptography,” in Advances in Cryptology-EUROCRYPT 1994, ser. Lecture Notes in Computer Science, A. De Santis, Ed.

4.    R.-Z Wang and S.-F. Hsu, “Tagged visual cryptography,” IEEE Signal Process. Lett. vol. 18, no. 11, pp. 627-630, 2011.

5.    J.-B. Feng, H.-C. Wu, C.-S. Tsai, Y.-F. Chang and Y.-P. Chu, “Visual secret sharing for multiple secrets, “Patt. Recognition. vol. 41, no. 12, pp.35723581, 2008.




Neenu R S, Greeshma G Vijayan

Paper Title:

Data Mining using Meta Heuristic Approaches for Detecting Hepatitis

Abstract: Clinical Data Mining involves the process of extracting, analyzing and finding the available data for clinical decision making. Mining data from clinical data set is not an easy task as they are inserted manually. In this paper, a solution for accurately predicting the presence or absence of hepatitis is proposed. The proposed technique is applied on clinical data sets taken from University of California at Irvine (UCI) machine learning repository. The proposed system contains two main subsystems for preprocessing and classifying. In the preprocessing subsystem the missing values in the data set is handled using missing data imputation methods like litwise deletion or mean/mode imputation method. If the percentage of missing values in a tuple is greater than 25%, then the tuple is rejected from the dataset else it was imputed by the most frequently used value. After handling the missing value, the relevant attributes are selected using meta-heuristic approaches like Particle Swarm Optimization (PSO) is used for feature selection. The reducts obtained after preprocessing are fed into the classification. In the classification subsystem the selected reducts are trained and tested using back propagation neural network. This paper aims at accurate prediction of diseases by analyzing clinical data sets.

 Back propagation neural network, Clinical Data Mining, Particle Swarm Optimization (PSO), University of California at Irvine (UCI).


1.       Fabricio Voznika and Leonardo Viana, “Data Mining Classifications”.
2.       What is clinical dataming?

3.       Yamille del Valle, Ganesh Kumar Venayagamoorthy, Salman Mohagheghi, Jean-Carlos Hernandez,  and Ronald G. Harley “Particle Swarm Optimization: Basic
Concepts, Variants and Applications in Power Systems”,  IEEE Transactions On Evolutionary Computation, VOL. 12, NO. 2, APRIL 2008

4.       R. C.Chakraborty, “Back Propagation Network: Soft Computing Course Lecture”, 15-20, Aug 10,2010.

5.       Y. Kaya and M. Uyar, “A hybrid decision support system based on rough set and extreme learning machine for diagnosis of hepatitis disease”, ApplieSoft Computing Journal, vol. 13, no. 8, pp. 34293438, 2013.

6.       J. S. Sartakhti, M. H. Zangooei, and K. Mozafari, “Hepatitis disease diagnosis using a novel hybrid method based on support vector machine and simulated annealing (SVM-SA)”, Computer Methods and Programs in Biomedicine, vol. 108, no. 2, pp. 570579, 2012.

7.       Support Vector  Mechanism.-

8.       D. Çalişir and E. Dogantekin, “A new intelligent hepatitis diagnosis system: PCALSSVM”, Expert Systems with Applications, “vol. 38, no. 8, pp. 1070510708, 2011.

9.       Kindie Biredagn Nahato, Khanna Nehemiah Harichandran and Kannan Arputharaj, “Knowledge Mining from Clinical Datasets Using Rough Sets and
Backpropagation Neural Network”, Hindawi, 2015

10.    K. Bache and M. Lichman, UCI Machine Learning Repository, University of California, School of Information and Computer Science, Irvine, Calif, USA, 2013.

11.    Hany M. Harb, and  Abeer S. Desuky , “  Feature Selection on Classification of Medical Datasets based on Particle Swarm Optimization “, International Journal of Computer Applications (0975 – 8887) Volume104– No.5, October 2014.

12.    Ezgi Deniz Ülker and Sadık Ülker, “Application of Particle Swarm Optimization To Microwave Tapered Microstrip Lines”, Computer Science & Engineering: An International Journal (CSEIJ), Vol. 4, No. 1, February 2014.






Sibiyakhan M, Sumithra M D

Paper Title:

Fingerprint Classification based on Simplified Rule set and Singular Points with an Image Enhancement Scheme

Abstract:  A rule-based technique using simplified rules is proposed to overcome the challenges faced by previous fingerprint classification techniques. Two features, namely directional patterns and singular points (SPs), are combined to categorize four fingerprint classes: namely Whorl (W); Loop (L); Arch (A); and Unclassifiable (U). The use of directional patterns has recently received more attention in fingerprint classification. It provides a global representation of a fingerprint, by dividing it into homogeneous orientation partitions. With this technique, We can improve the accuracy of the classification by integrating an image enhancement scheme. In addition, incomplete fingerprints are often not accounted for. The proposed technique achieves an accuracy of 93.33% on the FVC 2002 DB1.

  Singular point (SP), Core point, Delta point, Segmentation, Preprocessing.


1.     A, Hong L, Pankanti S (2000) Biometrics: promising frontiers for emerging identification market. Comm ACM Feb:91–98
2.     D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Hand- book of fingerprint recognition. London: Springer, seconded.,2009.

3.     N. Yager and A. Amin, “Fingerprint classification: A review,” Pattern Analysis & Applications, vol. 7, pp. 77–93, Apr.2004.

4.     S. Msiza, B. Leke-Betechuoh, F. V. Nelwamondo, and N.Msimang,“A Fingerprint Pattern Classification Approach Based on  the Coordinate Geometry of Singularities, ”in
Proceedings of the 2009 IEEE International Conference on Systems, Man and Cybernetics, (San Antonio, TX, USA), pp.510–517,IEEEComputuerSociety,2009.

5.     Z. Hou, H. Lam, J. Li, H. Wang, L. Chen, and W. Yau, “A Topological Model for Fingerprint Image Analysis,” in 3rd IEEE Conference on Industrial Electronics and Applications,(Singapore),pp.2106–2111,IEEE,2008.

6.     G. Candela, P. Grother, C. Watson, R. Wilkinson, and C. Wilson, “PCASYS-A pattern-level classification automation system for fingerprints,” NIST technical report NISTIR, vol.5647,1995.

7.     J. Guo, Y. Liu, J. Chang, and J. Lee, “Fingerprint classification based on decision tree from singular points and orientation field,” Expert Systems With Applications, vol.
41, no. 2, pp.752–764,2014.

8.     A.K.Jain and S.Minut, “Hierarchical Kernel Fitting for Fingerprint Classification and Alignment, ”in Proceedings of the 16th International on Pattern Recognition, vol. 2, pp. 469– 473,IEEE,2002.

9.     R. Cappelli, A. Lumini, D. Maio, IEEE, and D. Maltoni, “Fingerprint classification by directional image partitioning,” IEEE Transactions on Pattern Analysis and Machine Intelligence,vol.21,pp.402–421,May1999.

10.  L.Liu, C.Huang, and D.C.D.Hung, “Directional Approach to Fingerprint Classification,” International Journal of Pattern Recognition and Artificial Intelligence,vol.22,pp.347– 365,Mar.2008.

11.  X. Wang, F. Wang, J. Fan, and J. Wang, “Fingerprint Classification Based on Continuous Orientation Field and Singular Points,” in IEEE International Conference on Intelligent Computing and Intelligent Systems, (China), pp. 189–193, IEEE,2009.

12.  Dali Chen, Yang Quan Chen, Dingyu Xue, Feng Pan, “Adaptive Image Enhancement Based on Fractional Differential mask,” in 24 th Chinese Control and Decision Conference(CCDC),2012.

13.  L. Wang, N. Bhattacharjee, G. Gupta, and B. Srinivasen, “Adaptive approach to fingerprint image enhancement,” in Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia, pp. 42–49, 2010.

14.  L. Hong, S. Member, Y. Wan, and A. Jain, “Fingerprint Image Enhancement: Algorithm and Performance Evaluation,” vol.20,no.8,pp.777–789,1998.

15.  Kribashnee  Dorasamy,  Leandr Webb, Prof. Jules Tapamo, Nontokozo P.Khanyile, “Fingerprint Classification Using a  Simplified Rule-Set Based on Directional Patterns and  Singularity Features,” 978-1-4799-7824-3/15/ IEEE,2015.

16.  Database-FVC2002,

17.  Database-FVC2004,

18.  K. Karuand A.K.Jain, “Fingerprint Classification,” Pattern recognition,vol.29,no.3,pp.389–404,1996.

19.  H. Jung and J. Lee, “Fingerprint Classification Using the Stochastic Approach of Ridge Direction Information,” in International Conference of Fuzzy Systems, pp. 169–174, IEEE,2009.

20.  L. Webb and M. Mmamolatelo, “Towards a Complete Rule- Based Classification Approach for Flat Fingerprints,” in 2014 Second International Symposium on Computing and Networking, (South Africa, Pretoria), pp. 549–555, IEEE, Dec.2014.




A. Nachev

Paper Title:

Analysis of Irish Labour Market using Predictive Modelling

Abstract:   This study explores empirically Irish labour market and factors affecting employability rate of Irish nationals, using data from the Quarterly National Household Survey and data mining techniques. The research is conducted according to the CRISP-DM methodology and addresses its stages. We perform data cleansing and reduction of dimensionality, analyse data, and build predictive models to measure employability rate. The study uses two statistical techniques to train the models and also provides performance analysis of the models, measures variable significance using sensitivity analysis (SA) and variable effect characteristic (VEC) curves. The paper discusses results and draws conclusions.

   data mining, classification, logistic regression, linear discriminant analysis, labour market.


1.     CSO: QNHS [Online],
2.     P. Chapman, J. Clinton, R. Kerber, T. Khabaza, T. Reinartz, C. Shearer, and R. Wirth, “CRISP-DM 1.0 - Step-by-step data mining guide,” CRISP-DM Consortium, 2000

3.     Menard, S. (2002). Applied Logistic Regression (2nd ed.). SAGE

4.     Fisher, R., The Use Of Multiple Measurements In Taxonomic Problems. Annals of Eugenics, 1936, pp.179–188

5.     McLachlan, G. J. (2004). Discriminant Analysis and Statistical Pattern Recognition., 2004, Wiley Interscience

6.     Martinez, A., Kak, A., PCA versus LDA,  IEEE Transactions on Pattern Analysis and Machine Intelligence 23 (2), 2001, pp.228–233

7.     Tao Li, Shenghuo Zhu, and Mitsunori Ogihara. Using Discriminant Analysis for Multi-Class Classification: An Experimental Investigation. Knowledge and Information Systems, vol. 10 no.4, 2006,  pp.453–72

8.     R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria, 2009,

9.     Cortez, P. “Data Mining with Neural Networks and Support Vector Machines using the R/rminer Tool”. In Proceedings of the 10th Industrial Conference on Data Mining (Berlin, Germany, Jul.). Springer, 2010, LNAI 6171, 572– 583.

10.  P. Cortez, A. Cerdeira, F. Almeida, T. Matos, and J. Reis, “Modeling wine preferences by data mining from physicochemical properties,” Decision Support Systems, vol. 47, no. 4, 2009, pp. 547–553.

11.  P. Cortez, M. Embrechts. Using sensitivity analysis and visualization techniques to open black box data mining models. Information Sciences vol. 225, 2013, pp.1-17.

12.  R. Kewley, M. Embrechts, C. Breneman “Data strip mining for the virtual design of pharmaceuticals with neural networks,” IEEE Transactions on Neural Networks, vol. 11 (3),  2000, pp. 668–679

13.  T. Fawcett, “An introduction to ROC analysis,” Pattern Recognition Letters, vol. 27, no.8, 2005, pp. 861–874.

14.  B. Jantavan, C. Tsai, "The Application of Data Mining to Build Classification Model for  Predicting  Graduate Employment", International Journal of Computer Science and Information Security, vol. 11 No 10, 2013.

15.  T. Mishra, D. Kumar, "Students' Employability Prediction Model through Data Mining", International Journal of Applied Engineering Research, vol. 11. No. 4, 2016, pp. 2275-2282.

16.  M. Sapaat, A. Mustapha, J. Ahmad, K. Chamili, R. Muhamad, "A Classification-based Graduates Employability Model for Tracer Study by MOHE", Digital Information Processing and Communications, Springer Berlin Heidelberg, 2011, pp. 277-287.

17.  J. Kirimi, C. Moturi, "Application of Data Mining Classification in Employee Performance Prediction", International Journal of Computer Applications, vol. 146,No 7, 2016, pp. 28-35.

18.  Y. Alsultanny, "Labor Market Forecasting by Using Data Mining", International Conference on Computational Science, Procedia Computer Science 18, Elsevier, 2013, pp.1700-1709.




Bouchra Gourja, Malika Tridane, Said Belaaouad

Paper Title:

Survey on the use of ICT in Physics in Moroccan Schools Survey on the use of ICT in Physics in Moroccan Schools

Abstract:    Morocco, like all developing countries, has understood the importance using and integrating ICT in the education system. The ICT are tools and resources required by the National Education programs to support teachers in their courses while increasing student understanding. The Ministry of Education (MEN) has made significant efforts to equip schools with computers. The objective of this work is to show the level of employment of ICT to Moroccan schools and what can still impede its use. For this reason, we conducted a survey on high school teachers, to measure the degree of use of digital resources. The analysis of our survey showed that more than half of high school teachers use digital resources as a teaching aid for the lessons of physical sciences. However, some teachers who have not benefited from ICT training by the department do not use digital resources in their course or not enough. Despite the MEN having made  some digital resources avaiable, these teachers do not know how to exploit them. Some teachers who have many years of experience in teaching think wasting time using ICT.

ICT, digital resources, secondary education, Moroccan schools.


1.     Charte nationale d'éducation et de formation 1999. Levier 10
2.     M.Mazaudier, &  M. Lambey,  (2009)”L'usage des TICE en Sciences Physiques “–IAIPR De Sciences Physiques. Académie de Besançon,2009, Page1/7.

3.     C. Cleary, A. Akkari,  & D;Corti,D. ,“L'intégration des TIC dans l’enseignement secondaire. Formation et pratiques d’enseignement en questions”, 2008.

4.     A.Biaz, A.Benamar, A. Khyati, M. Talbi, “ Intégration des technologies de l’information et de la communication dans le travail enseignant, état des lieux et perspectives “, Epinet : la revue électronique de l’EPI, n° ,2009. Available:

5.     M. Mastafi, “Intégrer les TIC dans l’enseignement : quelles compétences pour les enseignants ?” Formation et profession, 23(2), 2014,29-47. Available:




S. S. Sutar, A.V. Sutar, M. R. Rawal

Paper Title:

Torque Measurement in Epicyclic Gear Train

Abstract:     Gears are used to transmit power and rotary motion from the source to its application with or without change of speed or direction. Gears trains are mostly used to transmit torque and angular velocity from one shaft to another shaft, whenever there is large speed reduction requirement within confined space. In epicyclic gear trains there is relative motion between axes which useful to transmit very high velocity ratio with gears of smaller sizes in lesser space.  In this research paper torque calculations are done for epicyclic gear train. Input torque, output torque and holding or braking torque are calculated experimentally using experimental set up and analytically using tabular formulas for rpm range starting from 1000 rpm to 2800 rpm. Finally the experimental and analytical torque values are compared which shows error ranging from 6 % to 8% which is due to some frictional losses and mechanical losses.

Epicyclic gear train, output torque, holding torque.


1.     Balbayev G. and Ceccarelli M., “Design and Characterization of a New Planetary Gear Box”, Mechanisms, Transmissions and Applications, Mechanisms and Machine Science Volume 17, Springer, 2013, pp. 91-98.
2.     Syed Ibrahim Dilawer, Md. Abdul Raheem Junaidi, Dr.S.Nawazish Mehdi ―Design, Load Analysis and Optimization of Compound Epicyclic Gear Trains‖ American Journal of Engineering Research ISSN 2320-0936 Vol.-02, Issue-10, 2013, PP: 146-153.

3.     Ulrich Kissling, Inho Bae, ―Optimization Procedure for Complete Planetary Gearboxes with Torque, Weight, Costs and Dimensional Restrictions‖ Applied Mechanics and Materials Vol. 86 (2011) pp 51-54.

4.     M. Roland, R. Yves, Kinematic and Dynamic simulation of epicyclic gear trains, Mechanisa and Machine Theory, 44(2), 209, 412-424.

5.     Nenad Marjanovic, Biserka Isailovic, Vesna Marjanovic, Zoran Milojevic, Mirko Blagojevic, Milorad Bojic, ―A practical approach to the optimization of gear trains with spur gears‖ Mechanism and Machine Theory 53 (2012) PP:1–16.

6.     P. W. Jensen”Kinematic Space Requirement and Efficiency of Coupled Planetary Gear Trains”, ASME Paper, 68-MECH-45, (1969).

7.     E. Pennestri and F. Freudenstein,”The Mechanical Efficiency of Planetary Gear Trains”, Journal of Mechanical Design, 115, 645-651, (1993).

8.     M. Krstich,”Determination of the General Equation of the Gear Efficiency of Planetary Gear Trains”, International Journal of Vehicle Design, 8, 365-374, (1987).




A.V. Sutar, S.S.Sutar, J.J. Shinde, S.S. Lohar

Paper Title:

Combined Operation Boring Bar

Abstract:  This paper presents a new methodology for the combined operation boring bar. In normal boring operation it requires to replace the tool various operations. We cannot perform multiple operations on one machining tool. So it creates problems: Timeconsumption in changing of tool, cost of different tool, required for various operation. The focus of this research is the operation can be done on the same boring bar. It can able to perform various operation such as rough boring, finish boring, chamfering and spot facing, Which is not possible with conventional machine tool.

 Special purpose machine, Combine operations, Boring Bar


1.     Pradip Kumar, ‘Analysis and Optimization of parameters affecting surface roughness in Boring process’. 2014.
2.     T. Alwarsamy, ‘Theoretical cutting force prediction & analysis of boring

3.     PanyaphirawatPairoj, ‘An Optimization of machine parameters for modified horizontal boring tool using Taguchi method’, 2014.

4.     T. Moriwaki, ‘Multifunctioning machine tools’, 2014.

5.     Prof. Hansini S. Rahate, ‘Methodology of Special Purpose Spot Facing Machine’, 2013.

6.     Sharad Srivastava, ‘Multi-Function Operating Machine: A Conceptual Model’, 2014.

7.     ShivaniP.Raygor, M.S.Tak, K.P.Modi, ‘Selection of Combination of Tool and Work Piece Material using MADM Methods for Turning Operation on CNC Machine’ , 2015.

8.     B. K. Lad,M. S. Kulkarni, ‘Reliability and Maintenance Based Design of Machine Tools’, 2013.

9.     S.V. Kadam, M.G. Rathi, ‘Review of Different Approaches to Improve Tool Life’, 2014.

10.  R. Maguteeswaran,  M. Dineshkumar, ‘Fabrication of multi process machine’, 2014.




M. Raju, N. Seetharamaiah, A.M.K. Prasad

Paper Title:

Characterization of Hydro-Carbon Based Magneto-Rheological Fluid (MRF)

Abstract:   Magneto-rheological fluids (or simply “MR” fluids) belong to the class of controllable fluids. The essential characteristic of MR fluids is their ability to reversibly change from free-flowing, linear viscous liquids to semi-solids having controllable yield strength in milliseconds when exposed to a magnetic field. This feature provides simple, quiet, rapid response interfaces between electronic controls and mechanical systems. MR fluid dampers are relatively new semi-active devices that utilize MR fluids to provide controllable damping forces. The focus of this work is to synthesize and characterize the MR fluids. The first phase of the work (i.e., synthesis) involves the mixture of carrier fluid, iron particles and additives in measured quantities to form an MR fluid. This is then followed by the second phase (i.e., characterization) where the synthesized MR fluids are characterized using a suitable damper to obtain the force-velocity, pressure-velocity and variable input current behavior.

  Synthesis, Characterization, MR Fluids, MR Damper


1.     P. Phulé (2001), Magnetorheological (MR) fluids: principles and applications, Smart Materials Bulletin 2001/2 pp. 7-10.
2.     S.T. Lim, M.S. Cho, I.B. Jang, H.J. Choi (2004), Magneto rheological characterization of carbonyl iron based suspension stabilized by fumed silica, Journal of Magnetism and Magnetic Materials, Vol. 282, pp.170-173.

3.     G. Bossis, E. Lemaire (1991), Yield stresses in magnetic suspensions, Journal of Rheology, Vol.35  pp.1345-1354.

4.     H. Pu, F. Jiang, Z. Yang, (2006), Preparation and properties of soft magnetic particles based on Fe3O4 and hollow polystyrene microsphere composite, Materials Chemistry and Physics, Vol.100  pp.10-14.

5.     M. Kciuk, R. Turczyn (2006), Properties and application of magneto rheological fluids, Journal of Achievements in Materials and Manufacturing Engineering, Vol.18, pp.127-130.

6.     S.P. Rwei, H.Y. Lee, S.D. Yoo, L.Y. Wang, J.G. Lin (2005), Magnetorheological characteristics of aqueous suspensions that contain Fe3O4 nanoparticles, Colloid Polymer Science, Vol.283,  pp.1253-258.

7.     C. Holm, J.J. Weis (2005), The structure of ferrofluids: A status report, Current Opinion in Colloid and Interface Science, Vol.10, pp.133-140.

8. c/2006/preprint_a06_030.pdf

9.     L.M. Jansen, S.J Dyke (2000), Semi-active control strategies for MR dampers: comparative study, Journal of Engineering Mechanics, American Society of Civil Engineers, Vol.126, pp. 795-802.

10.  S.P. Rwei, H.Y. Lee, S.D. Yoo, L.Y. Wang, J.G. Lin (2005), Magneto rheological characteristics of aqueous suspensions that contain Fe3O4 nanoparticles, Colloid
Polymer Science, Vol.283, pp. 1253-1258.

11.  T. Pranoto, K. Nagaya (2005), Development on 2DOF-type and Rotary-type shock absorber damper using MRF and their efficiencies, Journal of Materials Processing Technology, Vol.161, pp.146-150.

12.  R. Turczyn, M. Kciuk (2008), Preparation and study of model megnetorheological fluids, Journal of Achievements in Materials and Manufacturing Engineering,  Vol.27/2  pp.131-134.

13.  J. Huang, J.Q. Zhang, Y. Yang, Y.Q. Wei (2002), Analysis and design of a cylindrical magnetorheological fluid break, Journal of Materials Processing Technology Vol.129  pp.559-562.

14.  K. Dhirendra, V.K. Jain, V. Raghuram (2004), Parametric study of magnetic abrasive finishing process, Journal of Materials Processing Technology, Vol149, pp. 22-29.

15.  K. Shimada, Y. Wu, Y. Matsuo, K. Yamamoto (2005), Float polishing technique using new tool consisting of micro magnetic clusters, Journal of Materials Processing Technology Vol.162-163, pp.690-695.

16.  Bica (2004), Magnetorheological suspension electromagnetic brake, Journal of Magnetism and Magnetic Materials, Vol.270, pp.321-326.




Hazeena A J, Sumimol L

Paper Title:

An Improved Calibration Specific Self Localization Routing Protocol in Wireless Sensor Networks

Abstract:    Localization problem is inevitable to maintain flawless performance of the Wireless Sensor Networks (WSN) which are typically based on accurate location of the sensor nodes. Sensor nodes are distributed randomly and there is no supporting infrastructure to manage after deployment. Various localization algorithms were implemented to empower the optimized discovery of the node with Maximum Likelihood (ML) and high degree of precision in routing protocols. Typical strategies were employed to improve the sensor location information by discarding the structural errors generated during the position estimation via calibration schemes in localization algorithms. Certain technologies are concentrated on either implementing calibration methods or optional error detection schemes by using Maximum likelihood methods. The proposed scheme uses a calibration method in self Localization algorithm with an augmented routing protocol to obtain the optimized location of the sensor nodes. This method is enhanced from the AODV Routing Protocol provided with an iterative calibration method which accurately estimates the localization information based on the likelihood calculated previously and comparing the relative location  with the reference node position. After ascertaining the minimal error in relativity parameter the routing protocol updates the optimal location and then establishing normal routing with other nodes. The efficiency and throughput analysis is estimated using the network simulator version 3.24. The proposed calibration scheme is efficient for sensitive sensor platforms to improve the performance characteristics of sensor networks.

WSN, Decentralized localization, RSSI, TDoA  ,  AoA , ML, Calibration Scheme ,Node Filtering, AODV


1.       Murat Uney,Bernard Mulgrew, Daniel     E.Clark,”A Cooperative Approach to Sensor Localization in Distributed Fusion Networks,” IEEE Transactions On Signal Processing,10.1109/.March.2015     .
2.       Mustafa Ilhan Akba¸s, Melike Erol-Kantarc and Damla Turgut,”Localization for Wireless Sensor and Actor Networks with Meandering Mobility”,IEEE Transactions On Computers, Vol. 64, No. 4, April 2015.

3.       Nick Iliev and Igor Paprotny,“Review and Comparison of Spatial Localization Methods for Low-Power Wireless Sensor Networks”,IEEE Sensors Journal,1 0.1109/JSEN.2015.2450742.Vol. 15, No. 10, October 2015.

4.       Aditya Vempaty,Yunghsiang S. Han, and Pramod K. Varshney,”Target Localization in Wireless Sensor Networks Using Error Correcting Codes”,IEEE Transactions On Information Theory, Vol. 60, No. 1, January 2014.

5.       Thomas Anthony and Thomas C. Jannett,“Fault Tolerant and Channel Aware Target Localization in Wireless Sensor Networks that use Multi-bit Quantization”,IEEE-Journals 978-1-4799-6585-4/14/.May 2014.

6.       Gabriele Oliva, Stefano Panzieri, Federica Pascucci, and Roberto Setola,”Sensor Networks Localization: Extending Trilateration via Shadow Edges”, IEEE Transactions On Automatic Control, Vol. 60, No. 10, October 2015.

7.       Nikos Fasarakis-Hilliard, Panos N. Alevizos and Aggelos Bletsas,“Variational Inference Cooperative Network Localization With Narrowband Radios” ,978-1-4673-6997-8/15/,IEEE  ICASSP. 2624, February 2015.

8.       Asma Mesmoudi, Mohammed Feham, Nabila Labraoui,” Wireless Sensor Networks Localization Algorithms:A Comprehensive Survey”,International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.6, November 2013.

9.       Guangjie Han ,Huihui Xu Trung ,Q.Duong Jinfang Jiang ,Takahiro Hara “Localization algorithms ofWireless Sensor Networks: A survey”,Telecom.syst.11235-011-9564-7.Feb.2013.

10.    Ian D. Chakeres,Elizabeth M. Belding-Royer,“AODV Routing Protocol Implementation Design”, Intel Corporation UC Core grantNSF..grant.(EIA0080134).Jan.2011

11.    Giuseppe C. Calafiore, Luca Carlone, Mingzhu Wei, “Network Localization from Range Measurements:Algorithms and Numerical Experiments”,IEEE MACP4LG,grant. (RU/02/26) Piemonte PRIN.grant. 978/10/March.2010.

12.    C. Sivaram Murthy and B. S. Manoj:     Ad Hoc Wireless Networks Architectures and Protocols, Prentice Hall Communications Engineering and Emerging Technologies Series TK5103.2.M89.

13.    D. Helen and D. Arivazhagan,” Applications, Advantages and Challenges of Ad Hoc Networks”, Journal of Academia and Industrial Research (JAIR) ISSN: 2278-5213 Volume 2, Issue 8 January 2014.

14.    Azzedine Boukerche, Horacio A. B,F. Oliveira, Eduardo F. Nakamura and Fucapi Antonio A. F. Loureiro,” Localization Systems For Wireless Sensor Networks”, IEEE Wireless Communications 1536-1284/07 December 2007.

15.    Mohamed Youssef,Aboelmagd Noureldin,Abdel Fattah Yousif and Naser El-Sheimy,”Self-Localization Techniques from Wireless Sensor Networks“,IEEE Journals on Wireless Communication”,-7803-9454-2/06/January.2006.

16.    Koen Langendoen,Niels Reijers,” Distributed localization in wireless sensor networks:A quantitative comparison”, ELSEVIER- Computer Networks.

17.    Murat ¨Uney, Bernard Mulgrew, Daniel E. Clark, “A Cooperative Approach to Sensor Localisation in Distributed Fusion Networks”, IEEE Transactions On Signal Processing, Vol. 59, No. 6, June 2011

18.    Gowrishankar.S , T.G.Basavaraju    Manjaiah D.H , Subir Kumar Sarkar “Issues in Wireless Sensor Networks” Proceedings of the World Congress on Engineering 2008 Vol IWCE 2008, July 2 - 4, 2008, London, U.K.




Kiran Mohan M. S, Jayasudha J. S.

Paper Title:

Prevention of Denial of Service Attacks using Multimatch Packet Classification

Abstract:     The growth of enterprise networks demands better security and quality of service. The denial of service attacks mainly focuses on the network resources or a service of a host, thereby prevent the service is being available to the normal users. This paper contains a method that effectively prevents the denial of service attack with the help of multimatch packet classification.  The method uses multimatch packet classification for identifying the multiple matches and thereby determines the different flow of traffic.  The packet migration is enforced to limit the flow of suspected packets and thus the attacking packet flow can be limited while the normal users unaffected.  The method effectively prevents denial of service attack. The multimatch classification works at high speed by identifying and isolating the attacking flows.

  Routers, packet classification, multiple match, denial of service


1.     Snort, “A free lightweight network intrusion detection system for UNIX and Windows,” 2013 [Online]. Available:
2.     P. Gupta and N. McKeown, “Packet Classification on Multiple Fields,” Proceedings Sigcomm, Comp. Commun. Rev., vol. 29, no. 4, pp. 147–60, Sept. 1999.

3.     T. V. Lakshman and D. Stiliadis, “High-Speed Policy-based Packet Forwarding Using Efficient Multi-dimensional Range Matching,” Proceedings ACM Sigcomm, pp. 191–202, Sept. 1998.

4.     V. Srinivasan et al., “Fast and Scalable Layer four Switching,” Proceedings ACMSigcomm, pp. 203–14, Sept. 1998.

5.     P. Gupta and N. McKeown, “Packet Classification using Hierarchical  Intelligent Cuttings”, IEEE Micro, vol. 20:1, pp 34-41, Jan/Feb 2000.

6.     S. Singh, F. Baboescu, G. Varghese, and J. Wang, “Packet  Classification Using Multidimensional Cutting”, ACM SIGCOMM’03, August 2003.

7.     K. Lakshminarayanan, A. Rangarajan, and S. Venkatachary, “Algorithms for advanced packet classification with ternary CAMS,”  Proceedings   ACM SIGCOMM , New York, NY, USA, pp. 193–204, 2005.

8.     M. Faezipour and M. Nourani, “Wire-speed TCAM-based architectures for multimatch packet classification,” IEEE Transaction Computer, vol.  58, no. 1, pp. 5–17, Jan. 2009.

9.     M. Faezipour and M. Nourani, “Cam01–1: a customized TCAM architecture for multi-match packet classification,”  Proceedings IEEE GLOBECOM, pp. 1–5, Dec. 2006.

10.  F. Yu, T. V. Lakshman, M. A. Motoyama, and R. H. Katz, “SSA: a power and memory efficient scheme to multi-match packet classification,” Proceedings ACM ANCS, New York, NY, USA, pp. 105–113, 2005.

11.  F. Yu, R. H. Katz, and T. V. Lakshman, “Efficient multimatch packet classification and lookup with TCAM,” IEEE Micro, vol. 25, no. 1, pp.50–59, Jan. 2005.

12.  Papaefstathiou and V. Papaefstathiou, “Memory-efficient 5D packet classification at 40 Gbps,” Proceedings 26th IEEE INFOCOM, pp. 1370–1378, May 2007.

13.  S. Dharmapurikar, P. Krishnamurthy, D.E. Taylor, “Longest Prefix Matching Using Bloom Filters”, ACM SIGCOMM’03, August 2003.

14.  Yang Xu, Zhaobo Liu, Zhuoyuan Zhang and H. Jonathan Chao, “High-Throughput and Memory-Efficient Multimatch Packet Classification Based on Distributed and Pipelined Hash Tables”,IEEE/ACM TRANSACTIONS ON NETWORKING, vol. 22, no. 3, June 2014.

15.  S. Shin, V. Yegneswaran, P. Porras, and G. Gu. AVANT-GUARD:Scalable and Vigilant Switch Flow Management in Software-Defined Networks. In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), 2013.

16.  Haopei Wang, Lei Xu and Guofei Gu, FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015.




Ramitha A T, Jayasudha J S

Paper Title:

Enhanced Personalized Web Search using Pattern-based Topic Modelling

Abstract:      Personalized Web Search is a method of searching to improve the quality and accuracy of web search. It has gained much attention recently. The main goal of personalized web search is to customize search results that are more relevant and tailored to the user interests. Effective personalization needs collecting and aggregating user information that can be private or general. Personalized search results can be improved by information filtering. Information Filtering is a system to remove irrelevant or unwanted information from an information stream based on document representations which represent users’ interest. Traditional information filtering models assume that one user is only interested in a single topic. In statistical topic modelling documents and collections can be represented by word distributions. But directly applying topic models for information filtering is insufficient to distinctively represent documents with different semantic content. In order to alleviate these problems, patterns are used to represent topics for information filtering. Pattern-based representations are considered more meaningful and more accurate to represent topics than word-based representations. Pattern-based Topic Model (PBTM) combines pattern mining with statistical topic modelling to generate more discriminative and semantic rich topic representations. In the proposed system, user information preferences are acquired as a collection of documents from user browsing history. Latent Dirichlet Allocation is used to perform topic modelling on the collected documents. Word-topic assignments from LDA are used for constructing transactional dataset.  Frequent patterns are discovered from topic models. Maximum matched Pattern-based Topic Model is used to build user interest model representing the user preference information from the collection of documents and filter the incoming documents based on the user preferences by document relevance ranking.

   Topic model, Information filtering, Pattern based mining, User interest model


1.       H. Cheng, X. Yan, J. Han, and C.-W. Hsu, “Discriminative frequent pattern analysis for effective classification,” in IEEE 23rd International Conference on Data Engineering, ICDE’2007. IEEE, 2007, pp.716–725
2.       X. Wei and W. B. Croft, “LDA-based document models for ad-hoc retrieval,” in Proceedings of the 29th annual International ACM SIGIR conference on Research and Development in Information Retrieval. ACM, 2006, pp. 178–185.

3.       T. Hofmann, “Probabilistic latent semantic indexing,” in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 1999, pp.50–57

4.       D. M. Blei, A. Y. Ng, and M. I. Jordan, “Latent dirichlet allocation,” the Journal of Machine Learning Research, vol. 3, pp. 993–1022, 2003.

5.       Y. Gao, Y. Xu, Y. Li, and B. Liu, “A two-stage approach for generating topic models,” in Advances in Knowledge Discovery and Data Mining, PADKDD’13. Springer, 2013, pp. 221–232.

6.       S. Robertson, H. Zaragoza, and M. Taylor, “Simple BM25 extension to multiple weighted fields,” in Proceedings of the thirteenth ACM International Conference on Information and Knowledge Management. ACM, 2004, pp. 42–49

7.       Y. Cao, J. Xu, T.-Y. Liu, H. Li, Y. Huang, and H.-W. Hon, “Adapting ranking svm to document retrieval,” in Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM, 2006, pp. 186–193

8.       X. Li and B. Liu, “Learning to classify texts using positive and unlabeled data,” in IJCAI, vol. 3, 2003, pp. 587–592.

9.       J. Furnkranz, “A study using n-gram features for text categorization,”Austrian Research Institute for Artificial Intelligence, vol. 3, no.1998, pp. 1–10, 1998.

10.    W. B. Cavnar, J. M. Trenkle et al., “N-gram-based text categorization,”Ann Arbor MI,vol.48113, no. 2, pp. 161–175, 1994.

11.    Y. Xu, Y. Li, and G. Shaw, “Reliable representations for association rules,” Data & Knowledge Engineering, vol. 70, no. 6, pp. 555–575,2011.

12.    T. Hofmann, “Probabilistic latent semantic indexing,” in Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval. ACM, 1999, pp. 50–57.

13.    Y. Gao, Y. Xu, Y. Li, and B. Liu, “A two-stage approach for generating topic models,” in Advances in Knowledge Discovery and Data Mining, PADKDD’13. Springer, 2013, pp. 221–232.

14.    C. Wang and D. M. Blei, “Collaborative topic modeling for recommending scientific articles,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 2011, pp. 448–456.

15.    L. Shou,H. Bai,K. Chen and G. Chen, "Supporting Privacy Protection in Personalized Web Search," IEEE Transaction on Knowledge and Data Engineering,Vol:26,No:2, 2014.




Avinash Tiwari, Anju Malik, C.P. Singh

Paper Title:

Identification of Critical Factors Affecting Construction Labor Productivity in India Using AHP

Abstract:       Construction sector plays a leading role in economic growth for countries all around the world. Since construction is a labor intensive industry, productivity is considered a primary driving force for economic development. In India, the economy is severely challenged by the combined effects of rapid population growth and the closure policy imposed on the area since 2007. Owing to this situation, construction projects are characterized by low profit margin, time and cost overrun making labor productivity a key component of company’s success and competitiveness The main aim of this study is to identify key factors affecting labor productivity in India and to give the ranking to those factors by Analytical hierarchy process. By reviewing the literature and conducting depth  interviews with experienced engineers, twenty five critical factors related to labor productivity were identified and categorized into six groups: Psychological, Human/labor, Design, Technological, Managerial and External factors. Based on the Analytical Hierarchy Process approach, a questionnaire was designed and delivered to 72 construction professionals to elicit the view on how labor  productivity might be affected. A total of 35  feedbacks were analyzed and  the results indicated that Shortage of material, Clarity of technical specifications, payment delay, site layout & construction methods have a significant impact on construction labor productivity in India. DOI:

  keywords: Productivity; CLP; labor productivity; Identification of Critical factor; Critical factors; Construction project; Ranking of factors affecting productivity; Factor affecting productivity; Analytical Hierarchy process.


1.        , J. (1987). "Construction Productivity Improvement". Elsevier Science Publishing, Amsterdam, Netherlands
2.        Adrian, J. (1990). "Improving Construction Productivity Seminar", Minneapolis, MN. The Association of General Contractors of America.

3.        A Enshassi, S. Mohamed, Z. Abu Mustafa, P. E. Mayer, “Factors affecting labour productivity in building projects in the Gaza Strip.” Journal of Constuction. Engineering and Management, vol. 13(4), pp. 245-254, 2007.

4.        M. Jarkas, “Critical investigation into the applicability of the learning curve theory to rebar fixing labor productivity,”Journal of Construction Engineering and Management, vol. 136 (12), pp. 1279-1288, 2010.

5.        Abdul Kadir, M. R., Lee, W. P., Jaafar, M. S., Sapuan, S. M., and Ali, A. A. (2005). “Factors affecting construction labor productivity for Malaysian residential projects.” Structure Survey, 23(1), 42-54.

6.        Alarcon, L. F Borcherding, J. D., and. (1991). “Quantitative effects on construction productivity.” The Construction Lawyer, American Bar Association, 11(1), 35-48.

7.        Al-Shahri, M., Assaf S., A., Atiyah S., and AbdulAziz.A, (2001). “The management of construction company overhead costs.” International Journal of Project Management, 19, 295303.

8.        Alum, J., and Lim, E. C. (1995). "Construction productivity: Issues encountered by contractors in Singapore." International Journal of Project Management, 13(1), 51-58.

9.        Anu V. Thomas and J. Sudhakumar "Factors Influencing Construction Labour Productivity: An Indian Case Study" Journal of Construction in Developing Countries, 19(1), 53–68, 2014 

10.     Anurag Sangole1, Amit Ranit2 "Identifying Factors Affecting Construction Labour Productivity in Amravati" International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 Index Copernicus Value (2013): 6.14 | Impact Factor (2013): 4.438

11.     Arditi, D. and Mochtar, K. (2000) "Trends in Productivity Improvement in the US Construction Industry", Journal of Construction Management and economics, Vol. 18, 15- 27.

12.     Bohrnstedt, G, and Knoke, D (1994). "Statistics for Social Data Analysis (3rd Edition)". F.E. Peacock Publishers, Inc., Itaska IL.

13.     Borcherding, J. D, and Liou, F.-S. (1986). "Work sampling can predict unit rate productivity." Journal of Construction Engineering and Management, 112(1), 90-103.

14.     Cheung, S. O., Suen, H. C. H., and Cheung, K. K. W. (2004). "PPMS: A web-based construction project performance monitoring system." Automation in Construction, 13(3), 361-376.

15.     DeCenzo, D, and Holoviak, S. (1990). "Employee Benefits." Prentice Hall, City, New Jersey, 5556.

16.     Drewin, F. J. (1982). Construction Productivity: Measurement and Improvementthrough Work Study, Elsevier Science Ltd., NewYork.

17.     Guhathakurta, S. and Yates, J. (1993). “International labor productivity.” Journal of Construction Engineering, 35(1), 15-25.

18.     Hanna, A. S., Taylor, C. S., and Sullivan, K. T. (2005). “Impact of extended overtime on construction labor productivity.” ASCE Journal of Construction Engineering Management, 131(6), 734-740.

19.     Hasan Hamouda, Nadine Abu-Shaaban* "Enhancing Labour Productivity within Construction Industry through Analytical Hierarchy

20.     Process, the Case of Gaza Strip" Universal Journal of Management 3(8): 329-336, 2015

21.     Heizer, J., and Render, B. (1990). Production and Operations Management “Strategic and Tactical Decisions.” Prentice Hall, NJ.

22.     Hinze, J. W. (1999). "Construction Planning & Scheduling." Prentice Hall, Upper Saddle River, NJ.

23.     Horner, R. M. W., and Talhouni, B. T. (1995). "Effects of Accelerated Working, Delays, and Disruptionson Labor Productivity." Chartered Institute of Building, London.

24.     Iyer, K. C., and Jha, K. N. (2005). “Factors affecting cost performance: Evidence from Indian construction projects.” International Journal of Project Management, 23, 283-295.

25.     Jarkas, A. M. (2005). “An investigation into the influence of build-ability factors on productivity of in situ reinforced concrete construction.” Ph.D. thesis, University of Dundee, Dundee, UK.

26.     Kaming, P.  F., Olomolaiye, P. O., Holt, G. D., and Harris, F. C. (1997). "Factors influencing craftsmen's productivity in Indonesia." International Journal of Project Management, 15(1), 2130. 

27.     Kim, D. H. (1993), "The individual and organizational learning," Sloan Management Review, 38:49

28.     Leonard, C. A. (1987). “The Effect of Change Orders on Productivity.” The Revay Report, Online. World Wide Web Revay Rep., 6(2), 1-4.

29.     Makulsawatudom, A., and Emsley, M. (2002). "Critical factors influencing construction productivity in Thailand. Proceedings of CIB 10th International Symposium
on Construction Innovation and Global Competitiveness" Cincinnati, OH.

30.     Mistry Soham, Bhatt Rajiv "Critical FactorsAffectin Labour Productivity In Construction Projects: Case Study Of South Gujarat Region Of India"International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-4, April 2013

31.     Mr.C.Thiyagu (Student)1, Mr.M.Dheenadhayalan (Guide)2) "Construction Labor Productivity and its Improvement"    International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 08 Nov-2015   

32.     Olomolaiye, P. O., Wahab, K., and Price, A. (1987). “Problems influencing craftsman productivity in Nigeria.” Building Environment, 22(4), 317-323

33.     Paulson, B. C. (1975). "Estimation and control of construction labor costs". Journal of Construction Division, 101(CO3), 623-633.  

34.     Rajen B. Mistry1, Mr. Vyom B. Pathak, Dr. Neeraj D. Sharma3 "Evaluation of Factor affecting for Labour Productivity in Construction project by AHP" International Journal of Science and Engineering ISSN: 2454 – 2016

35.     Sanders, S. R. and Thomas, H. R. (1991). “Factors affecting masonry productivity.” Journal of Construction Engineering Management, 117(4), 626-644.

36.     Stall, M. D. (1983). “Analyzing and improving productivity with computerized questionnaires and delay surveys.” Proceedings of the Project Management Institute Annual Seminar

37.     Sumanth, D. J. (1984). "Productivity Engineering and Management." McGraw-Hill, New York, NY.

38.     Thomas, H. R. (1991). "Labor productivity and work sampling: The bottom line." Journal of Construction Engineering and Management, 117(3), 423-444.

39.     Thomas, H. R., and Kramer, D. F. (1988). “The manual of construction productivity measurement and performance evaluation.” Source Document 35, Construction Industry Institute, The University of Texas at Austin.

40.     Thomas, H. R., and Sakarcan, A. S. (1994). "Forecasting labor productivity using the factor model." Journal of Construction Engineering and Management, 120(1), 228-239.

41.     Thomas, H. R., Riley, D. R., and Sanvido, V. E. (1999). "Loss of labor productivity due to delivery methods and weather." Journal of Construction Engineering and Management, 125(1), 39-46. 

42.     Vaishant Gupta1, R. Kansal2 1M.E. Student Civil Department MITS Gwalior 474005 "Improvement  of Construction Labour Productivity in Chambal Region"   IJRET: International Journal of Research in Engineering and Technology     eISSN: 2319-1163 | pISSN: 2321-7308




Md Aleemuddin Ghori, Syed Abdul Sattar

Paper Title:

Secured Packet Level Authentication Scheme for Code Update in Multihop WSN

Abstract: Wireless sensor network is an imminent technology and is getting Popularity quickly and a lot of attention because of their low cost solutions and capable to implement in military as well as for civilians. This technology has many applications as well as several environmental monitoring target tracking scientific exploration patient monitoring and data acquisition in hazardous environments. In Wireless Sensor Networks These tiny sensor nodes are deployed randomly in a hostile environment to collect sensor data and hence they are susceptible to outsider attacks therefore security is an important issue. Several security schemes have been proposed to provide the authenticity and integrity for network programming applications but they are either lacks the data confidentiality or they are not energy inefficient as they are based on digital signature. So still there is a need to design a security Scheme to Enhanced the existing security mechanism for providing the authenticity and integrity of program updates in existing network programming protocols.

   Wireless, Networks, imminent technology, program updates in existing


1.    Sangwon Hyun, Peng Ning, An Liu, and Wenliang Du. Seluge: Secure and dos-resistant code dissemination in wireless sensor networks. In IPS08:Proceedings of the 7th international conference on Information processing in sensor networks, pages 445–456, 2008.
2.     Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. Message-in-a-bottle: User-friendly and secure key deployment for sensor nodes. In SenSys ’07: Proceedings of the 5th international conference on Embedded networked sensor Systems. ACM Press, 2007.

3.     Wenyuan Xu, Wade Trappe, and Yanyong Zhang. Channel surfing: defending  wireless sensor networks from interference. In IPSN ’07: Proceedings of the 6th international conference on Information processing in sensor networks, pages 499–508, New York, NY, USA, 2007. ACM Press.

4.     Prabal K. Dutta, Jonathan W. Hui, David C. Chu, and David E. Culler. Securing the deluge network programming system. In IPSN ’06: Proceedings of the 5th international conference on Information processing in sensor networks, pages 326–333. ACM Press, 2006.

5.  Yong Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. Communications Surveys & Tutorials, IEEE, 8(2):2– 23, 2006.

6.     Carl Hartung,James Balasalle, and Richard Han. Node compromise in sensor networks: The need for secure systems. Technical report, University of Colorado at Boulder, January 2005.

7.     Karlof and D. Wagner. Secure routing in wireless sensor networks: attacks and countermeasures. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on, pages 113–127, 2003.

8.     Limin Wang. Mnp: multihop network reprogramming service for sensor networks In SenSys ’04: Proceedings of the 2nd international conference on Embedded networked sensor systems, pages 285–286. ACM Press, 2004.

9.     Chris Karlof, Naveen Sastry, and David Wagner. Tinysec: a link layer security architecture for wireless sensor networks. In SenSys ’04: Proceedings of the 2ndinternational conference on Embedded networked sensor systems, pages 162– 175. ACM Press, 2004.

10.  Jing Deng, Richard Han, and Shivakant Mishra. Secure code distribution in dynamically programmable wireless sensor networks. In IPSN ’06: Proceedings of the 5th international conference on Information processing in sensor networks, pages 292–300. ACM  Press, 2006.




Mukesh Tiwari, Arun Kumar Shukla

Paper Title:

An Implementation of FACE Recognition System (FARS) Using PCA and PSO Based Techniques

Abstract:  Feature selection (FS) is a universal optimization problem in machine learning, which reduces the number of features, removes irrelevant, noisy and redundant data, and results in acceptable recognition accuracy. It is the most important step that affects the performance of a pattern recognition system. Feature selection aims to choose a small number of relevant features to achieve similar or even better classification performance than using all features. It has two main conflicting objectives of maximizing the classification performance and minimizing the number of features. However, most existing feature selection algorithms treat the task as a single objective problem. In this paper we present a novel feature selection system, FARS, based on combination of particle swarm optimization (PSO) and Principle Component Analysis (PCA).  The proposed PSO and PCA based feature selection system is utilized to search the feature space for the optimal feature subset where features are carefully selected according to a well defined discrimination criterion. The classifier performance and the length of selected feature vector are considered for performance evaluation using MATLAB in ORL face database.

 Face Recognition, Feature selection, PSO, PCA, ORL Dataset


1.        Nagi, Syed Khaleel Ahmed and Farrukh Nagi, “A MATLAB based Face Recognition System using Image Processing and Neural Networks”, 4th International Colloquium on Signal Processing and its Applications, PP. 83 – 88, March 7-9, 2008, Kuala Lumpur, Malaysia.
2.        Hemalatha Gayatri L, Govindan V.K, “Feature Selection Using Modified Particle Swarm Optimisation For Face Recognition”, International Journal of Research in Engineering and Technology (IJRET), Volume: 04 Issue: 02, PP. 679 – 683, Feb-2015.

3.        R. Brunelli and T. Poggio, “Face Recognition: Features versus Templates,” IEEE Trans. Pattern Analysis and Machine Intelligence, Volume 15, Number 10, PP. 1042-1052, 1993.

4.        Liu and H. Wechsler, “Evolutionary Pursuit and Its Application to Face Recognition”, IEEE Transaction Pattern Analysis and Machine Intelligence, Volume 22, Number 6, PP. 570-582, 2000

5.        Shermina. J, “Illumination Invariant Face Recognition Using Discrete Cosine Transform And Principal Component Analysis”, International conference on Emerging Trends in Electrical and Computer Technology (ICETECT), 2011.

6.        C.-J. Tu, L.-Y and C.-H. Yang, “Feature Selection using PSO-SVM,” International Journal of Computer Science (IAENG), Volume 33, Number 1, IJCS_33_1_18

7.        Rabab M. Ramadan And Rehab F. Abdel – Kader, “Face Recognition Using Particle Swarm Optimization-Based Selected Features,” International Journal Of Signal Processing, Image Processing And Pattern Recognition, Volume 2, Number 2, June 2009.

8.        Chulmin Yun, Byonghwa Oh, Jihoon Yang and Jongho Nang, “Feature Subset Selection Based on Bio-Inspired Algorithms”, Journal of Information Science and Engineering, Volume 27, PP. 1667-1686, 2011

9.        Bing Xue, Mengjie Zhang, Will N. Browne, “New Fitness Functions in Binary Particle Swarm Optimization for Feature Selection”, WCCI IEEE World Congress on Computational Intelligence June, 10-15, 2012, Brisbane, Australia.

10.     Unler and A. Murat, “A discrete particle swarm optimization method for feature selection in binary classification problems, ” European Journal of Operational Research, Volume 206, Number 3, PP. 528–539, 2010.

11.     Bing Xue Mengjie Zhang Will N. Browne,” Particle Swarm Optimization for Feature Selection in Classification: A Multi-Objective Approach”, IEEE Transactions On Cybernetics, Volume 43, Number 6, December 2013

12.     Liam Cervante, Bing Xue, Mengjie Zhang,” Binary Particle Swarm Optimization for Feature Selection: A Filter Based Approach”, WCCI 2012 IEEE World Congress on Computational Intelligence June, 10-15, 2012 - Brisbane, Australia

13.     Bing Xue, A. K. Qin, and Mengjie Zhang, “An Archive     Based Particle Swarm Optimization for Feature Selection in Classification”,  IEEE Congress on Evolutionary Computation (CEC), July 6 – 11, 2014, Beijing, China.

14.     Kirby M. and Sirovich L., “Application of the Karhunen-Loeve Procedure for the Characterization of Human Faces,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 12, Number 1, PP. 103-108, 1990.

15.     Sirovich L. and Kirby M., “Low-Dimensional Procedure for the Characterization of Human Faces,” Jorurnal of Optical Society of America, Volume 4, Number. 3, PP. 519-524, 1987.

16.     Kanokmon Rujirakul, Chakchai So, Banchar Arnonkijpanich, Khamron Sunat and Sarayut Poolsanguan, “PFP-PCA: Parallel Fixed Point PCA Face Recognition”, 4th International Conference on Intelligent Systems, Modeling and Simulation, IEEE, 2013

17.     Madhuri A. Joshi, “Digital Image Processing – An Algorithmic Approach”, Prentice- Hall India Publications

18.     Riccardo Poli, James Kennedy and Tim Blackwell, “Particle swarm optimization an overview”, Swarm Intell, Springer, 2007

19.     Rabab M. Ramadan and Rehab F. Abdel – Kader, “Face Recognition Using Particle Swarm Optimization-Based Selected Features”, International Journal of Signal Processing, Image Processing and Pattern Recognition, Vol. 2, No. 2, June 2009






Aswathy V.S, Sandeep Chandran

Paper Title:

An Execution, Scrutiny and Collation on VANETs Routing Protocols

Abstract:   VANETs are termed as Vehicular Ad-hoc Networks, which are considered as one of the recent advances coming under the minor group of Mobile Ad-hoc Networks (MANETS). VANETs form an extemporaneous formation of wireless networks for data exchange in the sphere of vehicles. Due to self-formulating and adaptive nature of VANETs, that causes a numerous challenges like mobility issues, connectivity problems, security and privacy, which emerge to degrade its performance. One of the main threats is the routing protocol. There are several VANETs routing protocols, this proposed paper stipulate an implementation, analysis and comparison based on AODV and OLSR routing protocols under a city environment. To simulate the VANET scenario, requires two types of simulators: mobility simulator and network simulator. Here VANET MobiSim for generating the mobility files and Ns3 for checking the performance of routing protocols on the mobility files created by VANET MobiSim. The performance of both protocols can be analyzed and finally compared with the help of three criterions: packet-delivery-ratio, end-to-end delay and throughput. This paper arrives at a conclusion as AODV protocol is more effective than OLSR in inter-urban city scenarios.

VANETs, V2V, MANETs, AODV, OLSR, VANET MobiSim, Ns3 Simulator.


1.       Ravneet Kaur and Haramandar Kaur, “Performance Evaluation of Routing Protocols in VANET”, International Journal of Future Generation Communication and Networking, Vol. 8, No. 6 (2015), pp. 239-246.
2.       Aleksandr Huhtonen, “Comparing AODV and OLSR Routing Protocols”, Seminar on Internetworking, Sjökulla, 2004-04-26/27.

3.       Ali Khosrozadeh, Abolfazle Akbari, Maryam Bagheri and Neda Beikmahdavi, “A New Algorithm AODV Routing Protocol in Mobile ADHOC Networks”, International Journal of Latest Trends in Computing, IJLTC, E-ISSN: 2045-5364.

4.       Jamal Toutouh, Jose Garcia-Nieto, and Enrique Alba,” Intelligent OLSR Routing Protocol Optimization for VANETs”, IEEE Transactions On Vehicular Technology.

5.       Kunal V. Patil, M. R. Dhage, “The Enhanced Optimized Routing Protocol for Vehicular Ad hoc Network”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 2, Issue 10, October 2013.

6.       Man-deep Singh, Maninder Singh, “Performance of AODV, GRP and OLSR Routing Protocols in Ad-hoc Network with Directional Antennas”, International Journal of Computer Applications (0975 – 8887) Volume 83 – No2, December 2013.

7.       Jerome Haerri, Fethi Filali, Christian Bonnet, ”Performance Comparison of AODV and OLSR in VANETs Urban Environments under Realistic Mobility Patterns”, BMW Group Research & Technology.

8.       Thakore Mitesh C,” Performance Analysis of AODV and OLSR Routing Protocol with Different Topologies”, International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064.

9.       Chitraxi Raj, Urvik Upadhayaya, Twinkle Makwana, Payal Mahida, “Simulation of VANET Using NS-3 and SUMO”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 4, April 2014, ISSN: 2277 128X.

10.    Imran Khan, Amir Qayyum, ”Performance Evaluation of AODV and OLSR in Highly Fading Vehicular Ad hoc Network Environments”, IEEE, 2009.

11.    Mohammed Erritali, Bouabid El Ouahidi, “Performance evaluation of ad hoc routing protocols in VANETs”, IJACSA Special Issue on Selected Papers from Third International Symposium On Automatic Amazigh Processing.

12.    Shubhrant Jibhkate, Smith Khare, Ashwin Kamble, Amutha Jeyakumar,”AODV and OLSR Based Routing Algorithm for Highway and City Scenarios”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4, Issue 6, June 2015.

13.    Tamilarasan Santhamurthy, “A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 1, January 2012.






Rajkumar Jain, Narendra S. Chaudhari

Paper Title:

On Constraint Clustering to Minimize the Sum of Radii

Abstract: We consider the min-cost k-cover problem: For a given a set P of n points in the plane, objective is to cover the n points by k disks, such that sum of the radii of the disks is minimized. In this paper we introduce the concept of constraints for min-cost k-cover problem. In any instance I of k-cover, the optimal solution value is at most the maximum radius r of ball B(v ,r) centered at  vV in I. It implies that, in optimal solutions there always exists a constraint that separates the optimal solution. Investigation formulate that a can-not link constraint always separate the optimal solution very clearly and reduces cardinality of distinct maximal discs. Introduction of constraints improves the performance of min-cost k-cover algorithm over the existing algorithms.

 k-clustering, min-cost k-cover, minimum sum of radii cover, constraint clustering.


1.       Cormack R M. A review of classification. Journal of the Royal Statistical Society, Series A. 134 (1971) 321‒367.
2.       Hartigan J A. Clustering Algorithms. John Wiley & Sons, New York, 1975.

3.       Anderberg M R. Cluster Analysis for Applications. Academic, New York, 1973.

4.       Hansen P, Jaumard B. Minimum sum of diameters clustering. Journal of Classification. 4 (1987) 215–226.

5.       S. R. Doddi, M. V. Marathe, S. S. Ravi, D. S. Taylor, and P. Widmayer, Approximation algorithms for clustering to minimize the sum of diameters, Nordic Journal of Computing. 7  (2000) 185–203.

6.       M. Charikar and R. Panigrahy, Clustering to minimize the sum of cluster diameters, Journal of Computer Systems Science. 68 (2004) 417–441.

7.       G. Proietti and P. Widmayer, Partitioning the nodes of a graph to minimize the sum of subgraph radii, in Proceedings of the International Symposium on Algorithms and Computation (ISAAC), 2005, pp.578–587.

8.       N. Lev-Tov and D. Peleg, Polynomial time approximation schemes for base station coverage with minimum total radii, Computer Networks. 47(2005) 489–501.

9.       V. Bilo, I. Caragiannis, C. Kaklamanis, and P. Kanellopoulos, Geometric clustering to minimize the sum of cluster sizes, in Proceedings of the European Symposium on Algorithms, Lecture Notes in Computer Science 3669, Springer, New York. 3669 (2005) 460–471.

10.    H. Alt, E. Arkin, H. Bronnimann, J. Erickson, S. Fekete, C. Knauer, J. Lenchner, J. Mitchell, and K. Whittlesey, Minimum-cost coverage of points by disks, in Proceedings of the Annual Symposium on Computational Geometry, 2006,  pp. 449–458.

11.    Gibson, M., Kanade, G., Krohn, E., Pirwani, I.A., Varadarajan, K.: On clustering to minimize the sum of radii. In: SODA, SIAM, Philadelphia,2008, pp.  819–825.

12.    Gibson, G. Kanade, E. Krohn, I. Pirwani, and K. Varadarajan, On metric clustering to minimize the sum of radii, Algorithmica. 57 (2010) 484–498

13.    Gibson, M., Kanade, G., Krohn, et al. On clustering to minimize the sum of radii. SIAM Journal on Computing, 41 (2012) 47-60.

14.    Behsaz B, Salavatipour M. R. On Minimum Sum of Radii and Diameters Clustering. In:  Fomin F V, Kaski P ed. Proceeding of 13th Scandinavian Symposium and Workshops, Helsinki, Finland, Algorithm Theory – SWAT 2012, Lecture Notes in Computer Science, Springer. 7357 (2012) 71-82.

15.    Wagsta K, Cardie C, Clustering with Instance-level Constraints, Proceedings of the Seventeenth International Conference on Machine Learning, 2000, pp. 1103-1110.